Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for realizing zero-terminal network access

A network access and zero-terminal technology, applied in the field of computer networks, can solve problems such as the inability to use zero-terminal network access and waste of network resources, and achieve the effects of enhancing security, saving network resources, and enhancing reliability

Active Publication Date: 2020-08-21
SICHUAN XW BANK CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the zero terminal cannot install the client software, it is impossible to use the traditional network access method to realize the network access of the zero terminal; every time the traditional terminal device installs the client software, a different terminal ID will be generated to distinguish the authorized terminal. waste of network resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing zero-terminal network access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] All the features disclosed in this specification, except mutually exclusive features and / or steps, can be combined in any way.

[0019] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0020] A method for realizing network access of a zero terminal, the network access system is based on the 802.1x network access control protocol, after the zero terminal sends a network access request, the switch sends authentication information to an authentication server, and the authentication server The digital certificate in the terminal is authenticated, and the authorization and access of the network can be realized through the authentication.

[0021] The network framework adopted by the present invention is shown in Figure 1. Assuming that the invention is applied to enterprise network configuration, since the enterprise is divided into several areas, each area adopts a switch, and all switches are connected to the AD domai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of computer networks, and discloses a method and system for realizing zero-terminal network access. The network access system is based on the 802.1x network access control protocol. When the zero terminal sends a network access request, the network switch sends the authentication information to the authentication server, and the authentication server authenticates the digital certificate in the zero terminal to realize the authentication. Authorization and access of zero terminals to access the network; each zero terminal in this domain has imported a unique digital certificate for this domain, and only zero terminals that match the information in the authentication server are allowed to access the network.

Description

technical field [0001] The invention belongs to the field of computer networks, and relates to a method for realizing zero-terminal network access. Background technique [0002] At present, traditional terminals generally use the mode of client software + 802.1x protocol to realize terminal network access. With the development of science and technology, zero terminals can achieve no CPU, no memory, and no system. There is only one highly integrated computer chip in the box, and all tasks such as browsing the Internet, operating software, editing and saving files, and playing videos are all through network cables. The other end is completed by a powerful server hardware and software system. Since the zero terminal "transfers" all the data calculations, management programs, operating systems, etc. in the traditional PC host to the remote server based on the concept of cloud computing, the computer terminal on the desk can be greatly "slimmed down", and the power consumption i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/24H04L9/32
CPCH04L9/3263H04L41/0253H04L63/0815H04L63/0823H04L63/0876H04L63/10H04L61/5014
Inventor 杨凌潇田瑞龙鸿飞顾凯
Owner SICHUAN XW BANK CO LTD