An authentication method and device

An authentication method and an authenticated technology, which are applied in the field of authentication methods and devices, can solve problems such as poor user experience, achieve the effects of reducing the number of authentications, avoiding network interruption, and improving user experience

Active Publication Date: 2019-07-09
HANGZHOU DPTECH TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] A large wireless network usually consists of multiple small local area networks. When a user roams between different local area networks, the IP (Internet Protocol, Internet Protocol) address of the wireless client device used by the user and the VLAN (Virtual Local Area Network, virtual local area network) will change, therefore, it is necessary to re-authenticate after disconnecting the network, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and device
  • An authentication method and device
  • An authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0027] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides an authentication method and device, the method comprising: when the IP address of the wireless client device changes from the first IP address to the second IP address, receiving an address change message sent by the wireless client device, and the address change message The text carries the MAC address and the second IP address of the wireless client device; find out whether there is a MAC address of the wireless client device in the MAC address white list, and the MAC address white list is used to record the MAC address of the authenticated wireless client device ; When there is a MAC address of the wireless client device, delete the first IP address in the IP address whitelist, and add the second IP address to the IP address whitelist. The IP address whitelist is used to record the authenticated wireless clients IP address of the end device. The application can avoid network interruption when wireless client devices roam across local area networks, and improve user experience.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an authentication method and device. Background technique [0002] A large wireless network usually consists of multiple small local area networks. When a user roams between different local area networks, the IP (Internet Protocol, Internet Protocol) address of the wireless client device used by the user and the VLAN (Virtual Local Area Network, virtual local area network) will change, therefore, it is necessary to disconnect the network and re-authenticate, resulting in poor user experience. Contents of the invention [0003] In view of this, the present application provides an authentication method and device. [0004] Specifically, this application is achieved through the following technical solutions: [0005] This application provides an authentication method, which is applied to a wireless client device, and the method includes: [0006] Obtaini...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W12/06H04L29/12
CPCH04W12/06H04W12/08H04L2101/622
Inventor 仇俊杰
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products