VPN login authentication method and apparatus

A login authentication and login account technology, applied in the field of communication, can solve problems such as different hardware identifications, failure to access VPN normally, etc., and achieve the effect of security guarantee

Inactive Publication Date: 2018-04-06
HANGZHOU DPTECH TECH
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In practical applications, the hardware ID of each user terminal is different. When the user needs to log in to VPN through the login account of other user terminals, since the hardware ID of other user terminals is different from the hardware ID bound to the login account, Therefore, there is a problem that users cannot access VPN normally when logging in on different terminals with the same account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN login authentication method and apparatus
  • VPN login authentication method and apparatus
  • VPN login authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In the prior art, in order to ensure the data security of VPN users, multiple login authentication methods are commonly used for authentication. The mainstream VPN login authentication method usually uses the login account, login password and the hardware identification of the user terminal for authentication.

[0045] Before VPN login, the user can first complete the registration on the VPN client carried on the user terminal. During the registration process, the user can fill in the login account and login password, and at the same time, the VPN client can obtain the hardware identification of the user terminal. At this time, the login account filled in by the user can be bound with the hardware identification obtained by the VPN client.

[0046] During the VPN login process, the user can enter a login account and a login password, and the VPN client can obtain the hardware identification of the user terminal at this time.

[0047] When the authentication server dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a VPN login authentication method, applied to an authentication server. The method comprises the following steps: receiving VPN login authentication information sent by a userterminal, wherein VPN login authentication information comprises a login account, a login password and a hardware identifier of the user terminal; authenticating the login account and the login password; determining whether the received hardware identifier is matched with a preset hardware identifier bound with the login account in the case of authentication success; and otherwise, receiving secondary VPN login authentication initiated by the user terminal. By adoption of the VPN login authentication method, on the premise of considering the security, it is ensured that when the user logs in different terminals by using the same account, the user can still normally access VPN.

Description

technical field [0001] The present application relates to the communication field, in particular to a VPN login authentication method and device. Background technique [0002] In the prior art, in order to ensure the data security of VPN users, multiple login authentication methods are commonly used for authentication. The mainstream VPN login authentication method usually uses the login account, login password and the hardware identification of the user terminal for authentication. [0003] Before VPN login, the user can first complete the registration on the VPN client carried on the user terminal. During the registration process, the user can fill in the login account and login password, and at the same time, the VPN client can obtain the hardware identification of the user terminal. At this time, the login account filled in by the user can be bound with the hardware identification obtained by the VPN client. During the VPN login process, the user can enter the login ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/46
Inventor 陈立
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products