A network authentication method, access control method and network access device
A technology for network access equipment and access control, which is applied in the network field and can solve the problems of easy cracking of wireless passwords and occupation of wireless networks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] According to the existing network access authentication mechanism, the network terminal equipment can continuously send authentication information to the network access equipment for identity authentication, thus causing hidden dangers to network security. Illegal users can try to authenticate by brute force, and finally achieve the purpose of cracking passwords and occupying network bandwidth. For some simple passwords, the current cracking method only takes a few minutes.
[0040] In view of the above-mentioned technical problems in the prior art, after the embodiment of the present invention completes the authentication information of the terminal, since the network access device does not feed back the corresponding verification result, but directly establishes an association with the terminal, the connected user does not It is not known whether the access is successful, so that the illegal user cannot confirm whether the correct password has been cracked, so as to a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


