Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless local area network safety authentication method

A wireless local area network and security authentication technology, applied in the field of WLAN access authentication, can solve the problems of wireless local area network paralysis, occupation of wireless resources, occupation, etc., to achieve the effect of saving wireless broadband and reducing operating pressure

Active Publication Date: 2016-08-10
华润网络(深圳)有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the wireless LAN line is unstable and prone to packet loss, or the portal page is too large and the webpage takes too long to open, users usually refresh the web page frequently to obtain the Portal webpage. This operation will cause a certain load pressure on the Portal server
Because wireless resources are very limited, Portal server resources are also limited. When the number of users in the wireless coverage area is relatively large, users frequently refresh the Web to obtain Portal pages, which will generate a large number of ineffective redundant Portal requests and occupy wireless resources. The server is under great pressure
When the user terminal equipment frequently outputs a large number of requests for network services due to some reasons (such as poisoning, etc.), it will occupy huge wireless resources and even cause the entire wireless LAN to be paralyzed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless local area network safety authentication method
  • Wireless local area network safety authentication method
  • Wireless local area network safety authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0043] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0044] like figure 1 As shown, a security authentication method of a wireless local area network is applied to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless local area network safety certificate method via which a gateway device in a wireless local area network can manage an authentication request sent by a mobile terminal accessing an authentication server. The method comprises the following steps: in step S1, the mobile terminal outputs the authentication to the gateway device; in step S2, the gateway device extracts a physical address, contained in the authentication request, of the mobile terminal and the physical address is added into a preset monitoring form list; in step S3, the gateway device identifies whether the authentication request is a preset request; if not, step S4 is executed; if yes, step S6 is executed; in step S4, the gateway device monitors the mobile terminal via a first preset strategy in a preset cycle, and the authentication request which is received at the first time is redirected as the preset request which is then sent to the authentication server; in step S5, the mobile terminal is authenticated by the authentication server according to the preset request, and whole authentication processes of the method end here; in step S6, the mobile terminal is monitored via a second preset strategy by the gateway device in a second preset cycle, the authentication request which is received at the first time is sent to the authentication server, and the current operation goes back to step S5.

Description

technical field [0001] The invention relates to the field of WLAN (Wireless Local Area Network, wireless local area network) access authentication, in particular to a security authentication method applied to a wireless local area network. Background technique [0002] Portal (wireless access) authentication is one of the mainstream technologies for WLAN access authentication. When a user accesses a WLAN, a Portal page will pop up, prompting the user to enter account information to complete access authentication. Because the wireless LAN line is unstable and prone to packet loss or the portal page takes too long to open, users usually refresh the web page frequently to obtain the portal page. This operation will cause a certain load pressure on the portal server. Because wireless resources are very limited, Portal server resources are also limited. When the number of users in the wireless coverage area is relatively large, users frequently refresh the Web to obtain Portal pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W84/12
CPCH04W12/06H04W12/08H04W84/12
Inventor 乐毅
Owner 华润网络(深圳)有限公司