Network access method and system

A network access and network technology, applied in the electronic field, can solve the problems of user inconvenience and complicated operation, and achieve the effect of reducing the number of times

Active Publication Date: 2017-06-20
TENDYRON CORP
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, each time the terminal connects to a different router, the user needs to re-enter the password, which is cumbersome and causes great inconvenience to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method and system
  • Network access method and system
  • Network access method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment provides a network access method, such as figure 1 As shown, including the following steps (S101-S107):

[0028] S101. The terminal sends an access request to the router, and the terminal is connected to the smart key device.

[0029] In this embodiment, the terminal may be any terminal with a network access function, for example, a smart phone, a tablet computer, a PC, etc., which is not specifically limited in this embodiment. The router has an identity authentication function, specifically: the router has a built-in security chip, and the security chip stores digital certificates and / or private keys; or the router has built-in software to realize the digital certificate function; or the router is connected to an external smart key device. The smart key device is a device with a security chip. The security chip has an independent processor and storage unit, which can store PKI digital certificates, private keys, encryption and decryption keys, verific...

Embodiment 2

[0065] This embodiment provides a network access system, figure 2 A schematic structural diagram of the network access system provided in this embodiment.

[0066] Such as figure 2 As shown, the network access system provided in this embodiment includes: a smart key device 21, a terminal 22 and a router 23; the terminal 22 is connected to the smart key device 21, and is used to send an access request to the router 23; the router 23, It is used to receive an access request and send an identity authentication request to the terminal 22; the terminal 22 is also used to receive the identity authentication request, and forwards the identity authentication request to the smart key device 21; the smart key device 21 is used to receive the identity authentication request Request to query the pre-stored PIN code verification result of the smart key device and whether the pre-stored PIN code verification result of the smart key device is valid, wherein the pre-stored PIN code verific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network access method and system. The network access method comprises the following steps: a terminal sends an access request to a router; the router sends an identity authentication request to the terminal; the terminal forwards the identity authentication request to intelligent key equipment; the intelligent key equipment determines that the present PIN code verification result of the intelligent key equipment is successful when the PIN code verification result of the intelligent key equipment that is prestored is successful and is in a valid state; when the PIN code verification result of the intelligent key equipment that is prestored is in a failure state, the intelligent key equipment triggers the verification equipment to execute the process of implementing PIN code verification on the intelligent key equipment to obtain the present PIN code verification result; the intelligent key equipment sends an identity authentication response to the router through the terminal; the router receives the identity authentication response and obtains the present PIN code verification result; and when the present PIN code verification result is successful, the router carries out identity authentication and/or key negotiation processes with the intelligent key equipment and allows the terminal to access to the network.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a network access method and system. Background technique [0002] In the prior art, in order to enhance the router's control over network access, when a terminal accesses the router, the terminal user is required to input a password, and the router allows the terminal to access the network only after the password verification is passed. If the terminal changes to another router to access the network, the terminal user needs to enter the password again. That is, each time the terminal accesses a different router, the user needs to re-enter the password, which is cumbersome and inconvenient to the user. Contents of the invention [0003] The present invention aims to solve / one of the above problems. [0004] The main purpose of the present invention is to provide a network access method, [0005] Another object of the present invention is to provide a network acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L29/06
CPCH04L12/2856H04L63/083
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products