Method for network secure access, terminal device and authentication server

An authentication server and network security technology, applied in the field of network security access, can solve problems such as the inability to determine the authenticity of the identity of the network access point, hidden safety hazards, etc.

Active Publication Date: 2017-01-11
LEADCORE TECH +1
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method for secure network access, terminal equipment and an authentication server, which solves the ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for network secure access, terminal device and authentication server
  • Method for network secure access, terminal device and authentication server
  • Method for network secure access, terminal device and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0024] The embodiment of the present invention provides a method for network security access. Before the terminal accesses the network through the network access point, the network access point is verified by the third-party authentication server; the terminal only passes the authentication through the third-party authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for network secure access, a terminal device and an authentication server. According to an embodiment of the invention, the method comprises the following steps: authenticating a network access point by a third party authentication server before a terminal accesses a network through the network access point; and the terminal accesses the network only through the network access point authenticated by the third party authentication server. According to an embodiment of the invention, after the third party authentication server judges that the network access point is a legitimate access point, the terminal accesses the network through the network access point, so that the problem that security risks are caused when the terminal accesses the network through the network access point while the authenticity of the identity of the network access point cannot be judged is solved.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for network security access in the communication field, a terminal device and an authentication server. Background technique [0002] With the development of science and technology, the application of network technology is becoming more and more extensive. However, the network environment is becoming more and more complex, and computers are vulnerable to attacks and deceptions aimed at the link layer and network layer. The hidden dangers of network security must be considered by all network equipment manufacturers. [0003] When the terminal uses WiFi access, it can only be identified by SSID (Service Set Identifier, Service Set Identifier). Others can easily forge WiFi hotspots and trick users into being fooled, thus causing great hidden dangers to user terminal security. Typical attack examples include: 1. Forge the target AP (network access point) to obtain the user's WiFi ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/08H04W12/069
CPCH04L63/0823H04L63/083H04L63/0884H04W12/08
Inventor 周瑞建
Owner LEADCORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products