Authorized network access method and device

A technology for network access and target access, which is applied in the field of authorized network access, and can solve problems such as unsatisfactory network access, multi-network bandwidth, bandwidth occupation, etc.

Active Publication Date: 2017-02-22
XINHUASAN INFORMATION TECH CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when there are many legitimate access objects, a large amount of bandwidth is occupied, which may cause some necessary network access to be unsatisfied
For example: when there are many customers accessing the wireless netw...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorized network access method and device
  • Authorized network access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] In order to solve the problems existing in the prior art, embodiments of the present invention provide a method and device for authorizing access to a network.

[0043] A method for authorizing access to a network provided by an embodiment of the present invention will be firstly described below.

[0044] It should be noted that the method for authorizing network access provided by the embodiment of the present invention can be applied to routers. It i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authorized network access method and device. The method is applied to a router, and comprises the following steps of: obtaining an access request for a target network sent by terminal equipment, wherein the access request includes a target access password; and the target network is associated with the router; judging whether the target access password is matched with any one in self stored access passwords or not; if so, on the basis of the corresponding relationship between the access password and the access permission level, determining the target access permission level corresponding to the target access password; agreeing with the access request, and authorizing the target permission for accessing the target network to the terminal equipment, wherein the target permission is the permission corresponding to the target access permission level; and if not, refusing the access request. Visibly, under a network sharing application scene, on the premise that all legal access objects can be accessed to a network, necessary network access can be satisfied.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for authorizing access to a network. Background technique [0002] With the development of communication technology, the coverage of the network is more and more extensive, such as coffee shops, bars, barbershops and other businesses will provide networks, for example, provide wireless networks. Assuming that an object is within the coverage of a wireless network provided by a merchant, when the object wants to access the wireless network through its own mobile device, the object only needs to obtain the access password corresponding to the wireless network, and pass its own The mobile terminal in possession sends out an access request carrying the access password, and after the access request is authenticated, it can successfully access the wireless network provided by the merchant. [0003] It is easy to see that, in the above-mentioned networking mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W48/02
CPCH04W12/06H04W48/02
Inventor 王伟
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products