Network verification system based on fingerprints and verification method thereof

A verification system and verification method technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve the problems of cumbersome user name and password input process, poor user experience, etc., and achieve efficient entry and network reconstruction. Easy, match to find convenient effects

Inactive Publication Date: 2017-12-05
PHICOMM (SHANGHAI) CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this process, the smart phone uses a touch screen, Jiugongge input method, uppercase and lowercase switching, and English number switching. Many factors make the input process of user name and password cumbersome, and the user experience is not good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network verification system based on fingerprints and verification method thereof
  • Network verification system based on fingerprints and verification method thereof
  • Network verification system based on fingerprints and verification method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment 1, as described in the background of this article, with the development of mobile Internet technology and the hardware update of mobile smart devices, more and more people use mobile smart devices to connect to the Internet. In order to solve the network security problem of WLAN, the 802.1X protocol is proposed, which is widely used in Ethernet as the access control mechanism of LAN ports, and it is used to solve the problems of authentication and security in Ethernet; 802.1 Protocol X is a port-based network access control protocol, and port-based network access control refers to the authentication and control of the connected client at the port of the LAN access device. If the client can pass the authentication, it can access the resources in the LAN; if it cannot pass the authentication, it cannot access the resources in the LAN.

[0036] In this technical solution, the hardware construction of the entire network verification system has not changed much fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication authentication field, to be specific, relates to a network verification system based on fingerprints and the verification method thereof. The network verification system based on the fingerprints comprises a client, an equipment end, and an authentication server. The network verification system is characterized in that the client comprises a fingerprint input module, which is used to acquire fingerprint information; the authentication server comprises an information memory, which is used to store the client information of the client capable of passing the verification and the corresponding fingerprint information; the information memory also comprises a matching module, which is used to search and match the fingerprint information acquired by the fingerprint input module and the fingerprint information recorded by the information memory. The network verification system based on the fingerprints and the verification method thereof are advantageous in that the fingerprint identification module is used to acquire password information of intelligent equipment, and by matching with the physical address of the intelligent equipment, admittance registration verification of an identity is realized, and the high efficiency of the network verification is realized.

Description

technical field [0001] The invention relates to the field of communication authentication, in particular to a fingerprint-based network verification system and a verification method thereof. Background technique [0002] IEEE 802.1X is an authentication standard for user access to the network formulated by IEEE, and its full name is "port-based network access control". It was officially promulgated in 2001. It was originally designed for wired networks, and then it was revised to match wireless network access, and it was completed in 2004. [0003] The 802.1x protocol is a port-based network access control protocol, so the specific 802.1x authentication function must be configured on the device port, and the user equipment connected to the port is authenticated to control access to network resources. The 802.1x authentication system adopts the typical Client / Server (C / S) structure of the network application system, including three parts: the client (Client), the device (Dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/06
CPCH04L9/3231H04L63/0861H04W12/06
Inventor 王斌
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products