Access control method and device

A technology of access control and security policy, applied in the field of communication, can solve problems such as enterprise loss

Inactive Publication Date: 2017-04-19
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this will bring many IT (Information Technology, information technology) security issues, for example, if the malicious so...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0100] figure 1 It is a flow chart of an access control method shown according to an exemplary embodiment. The method can be used in devices such as a router or an AC (Access Controller, access controller). This method can be applied to solutions such as BYOD (Bring Your Own Device, bring your own device), and is not limited here. Such as figure 1 As shown, the method includes the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an access control method and device. The method includes the following steps that: under a condition that a probe request message from a wireless terminal is received, security policy processing is carried out according to security policy information and the probe request message, so that a security policy processing result is obtained, wherein the probe request message carries the device information of the wireless terminal; when the security policy processing result indicates enabling, wireless network accesses authentication and association processing are performed on the wireless terminal; after the wireless terminal is connected into a wireless network, the identity information of an account corresponding to the wireless terminal is obtained; the identity information is sent to a server, so that the server can carry out identity authentication; and access control is performed on the wireless terminal according to the security policy processing result and an identity authentication result returned by the server. With the access control method and device of the invention, the security of access control can be improved; and as for the same wireless network, access authentication and association processing are just required to be performed on the wireless terminal for only once, and therefore, an access flow in the access control can be simplified, and user experience can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of communications, and in particular to an access control method and device. Background technique [0002] BYOD (Bring Your Own Device, Bring Your Own Device) refers to bringing your own devices to work, including personal computers, mobile phones and tablets. At present, many enterprises are beginning to consider allowing employees to bring their own smart devices to use the enterprise's internal network. In a BYOD model, employees can use personal devices such as tablets for both work and personal use. But this will bring many IT (Information Technology, information technology) security problems, for example, if the malicious software on the employee's own computer is transmitted to the internal network of the enterprise, it may bring losses to the enterprise. Therefore, the use of BYOD requires sufficient security guarantees, and different security policies need to be implemented according to d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06H04W12/08H04W48/18
CPCH04L63/08H04L63/20H04W12/06H04W12/08H04W48/18
Inventor 刘佳
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products