Unlock instant, AI-driven research and patent intelligence for your innovation.

An access authentication method, and access device

A technology for accessing equipment and access authentication, which is applied in the field of communication, can solve problems such as heavy CPU load and low system efficiency, and achieve the effects of reducing CPU load, improving system efficiency, and reducing interruptions

Active Publication Date: 2020-02-18
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the above process, the central processing unit (Central Processing Unit, CPU) controls the WiFi module running on the application processor (Application Processor, AP) to complete the authentication process. This process requires the interaction between the AP and the CPU, and the AP will initiate a large number of CPU Interruption, resulting in high CPU load and low overall system efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access authentication method, and access device
  • An access authentication method, and access device
  • An access authentication method, and access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] On the one hand, the embodiment of the present invention provides an access authentication method, such as figure 1 shown, including:

[0055] 101: The wireless communication module of the access device receives an authentication request from a terminal device within the coverage of the access device;

[0056]The access device refers to the access device in the wireless communication network, and the terminal device accesses the communication network through the access device. The access device can be a wireless access point (Access Point, AP), or a base station; it can especially refer to a wireless router with WIFI function in a public place. What is the specific access device, the embodiment of the present invention does not make a unique limitation .

[0057] The authentication request is a request message sent by the terminal device to the access device to request to establish a communication connection with the access device; the request message will carry relev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an access authentication method and access equipment, wherein the method comprises the steps that a wireless communication module of the access equipment receives an authentication request from terminal equipment in the covering range of the access equipment; the wireless communication module analyzes the authentication request, obtains authentication relevant information, and confirms whether the terminal equipment is allowed to access the access equipment or not according to the authentication relevant information; after confirming the condition that the terminal equipment is allowed to access the access equipment, the wireless communication module controls emitting equipment to reply an authentication confirming message to the terminal equipment. In the access control process, the awakening of a CPU (central processing unit) is not needed; the CPU doses not need to execute interruption processing, so that the CPU work is deployed into hardware with an intelligent function; on one hand, the load balancing is realized; on the other hand, the CPU interruption is reduced, so that the CPU load can be reduced; the power consumption of a radio frequency module can also be reduced; the system efficiency of the whole terminal equipment is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an access authentication method and access equipment. Background technique [0002] Access authentication refers to the process that the network authenticates the user equipment when the terminal equipment accesses the network. An example is provided below: [0003] The terminal device searches for available wireless fidelity (WiFi) hotspots in the preset area, obtains available WiFi hotspots, and pushes available WiFi hotspots to the user; [0004] In response to the user's WiFi hotspot selection operation, identify the WiFi hotspot selected by the user; [0005] Obtain the authentication data of the WiFi hotspot selected by the user, adapt the WiFi hotspot portal (Portal) authentication protocol of the WiFi hotspot selected by the user, and log in to the WiFi hotspot Portal according to the adapted WiFi hotspot Portal authentication protocol and the authentication data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/06H04W12/08Y02D30/70
Inventor 白剑
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD