Network connection authentication method and device, electronic equipment and storage medium

A network connection and authentication method technology, applied in the fields of devices, network connection authentication methods, electronic equipment and storage media, can solve the problem of increased intranet data security, inability to determine users, increased labor costs, and limitations of intranet data security, etc. To solve the problem of enterprise network security management, reduce the use of people, and improve the effect of security

Inactive Publication Date: 2018-07-06
BEIJING KNOWNSEC INFORMATION TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This undoubtedly increases labor costs and the limitations of intranet data security. When someone applies for an account, the user cannot be identified, which adds a lot of uncertainty to the security of intranet data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network connection authentication method and device, electronic equipment and storage medium
  • Network connection authentication method and device, electronic equipment and storage medium
  • Network connection authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0031] see image 3 , is a network connection authentication method applied to the above-mentioned network device 120 provided by the embodiment of the present invention, which will be combined below image 3 Describe the steps involved.

[0032]Step S101: Receive a network connection request initiated by a mobile terminal.

[0033] When the mobile terminal turns on the WiFi broadcast and enters the network coverage of the enterprise intranet, the network device can receive the WiFi broadcast information of the mobile terminal, that is, receive the network connection request initiated by the mobile terminal.

[0034] Step S102: Based on the network connection request, it is judged whether the mobile terminal has the right to connect to the network.

[0035] The network device will record and analyze the WiFi broadcast information (network connection request), and judge whether the mobile terminal has the network connection permission based on the network connection request, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network connection authentication method and device, electronic equipment and a storage medium, belonging to the technical field of network security. The network connectionauthentication method is applied to network equipment in a network management system, and the method includes the following steps: receiving a network connection request initiated by a mobile terminal; determining whether the mobile terminal has a network connection authority according to the network connection request; and when the mobile terminal has the network connection authority, allowing the mobile terminal to access the current network. Further, when the network equipment receives the network connection request initiated by the mobile terminal, whether the current mobile terminal has the network connection authority is determined based on the network connection request, and when the mobile terminal has the network connection authority, the mobile terminal is allowed to access the current network; and a fully-automatic verification method is adopted, the use cost of manual management can be reduced, the problem of existing enterprise network security management can also be solved, and the security of network data can be improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network connection authentication method, device, electronic equipment and storage medium. Background technique [0002] The enterprise network management system refers to the management system for the wireless network within the enterprise. Usually, the network used by the enterprise is generally divided into internal network and external network. The vulnerability of the data makes the risk of data security higher. [0003] The inventor of the present application found in the process of researching the present application that at present, in terms of enterprise network management technology, most companies still use manual protection mechanisms for network protection. This undoubtedly increases the investment of labor costs and the limitations of intranet data security. When someone applies for an account, the user cannot be identified, which adds a lot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/06H04W48/16
CPCH04L63/08H04L63/0876H04L67/141H04W12/06H04W48/16
Inventor 田春燕付鹏飞
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products