Unlock instant, AI-driven research and patent intelligence for your innovation.

A network authentication method, access control method and network access device

A technology for network access equipment and access control, which is applied in the network field and can solve the problems of easy cracking of wireless passwords and occupation of wireless networks.

Active Publication Date: 2020-01-14
云账户数字科技(天津)有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the password setting is relatively simple, the wireless password is easy to be cracked. For example, illegal users can continuously verify by sending various combinations of passwords to the network access device, resulting in the occupation of the wireless network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network authentication method, access control method and network access device
  • A network authentication method, access control method and network access device
  • A network authentication method, access control method and network access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] According to the existing network access authentication mechanism, the network terminal equipment can continuously send authentication information to the network access equipment for identity authentication, thus causing hidden dangers to network security. Illegal users can try to authenticate by brute force, and finally achieve the purpose of cracking passwords and occupying network bandwidth. For some simple passwords, the current cracking method only takes a few minutes.

[0040] In view of the above-mentioned technical problems in the prior art, after the embodiment of the present invention completes the authentication information of the terminal, since the network access device does not feed back the corresponding verification result, but directly establishes an association with the terminal, the connected user does not It is not known whether the access is successful, so that the illegal user cannot confirm whether the correct password has been cracked, so as to a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network authentication method, an access control method and network access equipment for implementing the network authentication method. The network authentication method comprises: after identity authentication is performed on a terminal according to authentication information, the network access equipment does not feed back an authentication result to the terminal, but is associated with the terminal. Through the network authentication method, the access control method and the network access equipment, after the authentication information of the terminal is accomplished, the network access equipment does not feed back the corresponding authentication result, but is directly associated with the terminal, so that a connected user does not know whether the access succeeds or not, an invalid user cannot confirm whether an accurate password is decrypted or not, and then the invalid user can be prevented from sending various combined passwords to the network access equipment to continue verification and finally decrypt the password.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a network authentication method, an access control method and network access equipment. Background technique [0002] With the rapid development of network technology, unprecedented changes have taken place in the ways of information dissemination and information acquisition, and human society has entered the information age centered on network technology and digital technology. In particular, the wide application of wireless network technology, because of its advantages of flexibility, scalability, and mobility, has further broken down the barriers to real-time information acquisition and brought great convenience to people's lives. With the maturity of wireless network technology, the rate of wireless transmission is getting faster and faster, and there are more and more wireless network users. [0003] If the password setting is relatively simple, the wireless password is ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 何国荣
Owner 云账户数字科技(天津)有限公司