Network authentication method, access control method and network access equipment

A technology for network access equipment and network authentication, which is applied in the fields of access control methods, network access equipment and network authentication methods, and can solve the problems of wireless network occupation and easy cracking of wireless passwords.

Active Publication Date: 2016-08-31
云账户数字科技(天津)有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the password setting is relatively simple, the wireless password is easy to be cracked. For example, illegal users can continuou

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method, access control method and network access equipment
  • Network authentication method, access control method and network access equipment
  • Network authentication method, access control method and network access equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] According to the existing authentication mechanism for network access, the network terminal device can continuously send authentication information to the network access device for identity authentication, thus causing a hidden danger to network security. Illegal users can try to authenticate by brute force cracking, and finally achieve the purpose of password cracking and occupying network bandwidth. For some simple passwords, the current cracking method only takes a few minutes.

[0040] In view of the above technical problems in the prior art, after completing the authentication information for the terminal in this embodiment of the present invention, since the network access device does not feed back the corresponding verification result, but directly establishes an association with the terminal, the connected user does not It is not known whether the access is really successful, so that the illegal user can not confirm whether the correct password has been cracked,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network authentication method, an access control method and network access equipment for implementing the network authentication method. The network authentication method comprises: after identity authentication is performed on a terminal according to authentication information, the network access equipment does not feed back an authentication result to the terminal, but is associated with the terminal. Through the network authentication method, the access control method and the network access equipment, after the authentication information of the terminal is accomplished, the network access equipment does not feed back the corresponding authentication result, but is directly associated with the terminal, so that a connected user does not know whether the access succeeds or not, an invalid user cannot confirm whether an accurate password is decrypted or not, and then the invalid user can be prevented from sending various combined passwords to the network access equipment to continue verification and finally decrypt the password.

Description

technical field [0001] The present invention relates to the field of network technologies, in particular to a network authentication method, an access control method and a network access device. Background technique [0002] With the rapid development of network technology, unprecedented changes have taken place in the way of information dissemination and information acquisition, making human society enter the information age with network technology and digital technology as the core. In particular, the wide application of wireless network technology, because of its advantages of flexibility, scalability, and mobility, further breaks the barriers to real-time information acquisition and brings great convenience to people's lives. With the maturity of wireless network technology, the rate of wireless transmission is getting faster and faster, and the number of wireless network users is also increasing. [0003] If the password setting is relatively simple, the wireless passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 何国荣
Owner 云账户数字科技(天津)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products