Method, device and system for accessing to network

A technology for accessing the network and access authentication, which is applied in the field of network technology applications, can solve problems such as low login efficiency, and achieve the effect of solving low login efficiency and improving login efficiency

Active Publication Date: 2018-07-24
ALIBABA GRP HLDG LTD
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method, device and system for accessing a network, so as to at least solve the technical problem of low login efficiency caused by logging into a VPN in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for accessing to network
  • Method, device and system for accessing to network
  • Method, device and system for accessing to network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] According to an embodiment of the present application, a system embodiment for accessing a network is provided, figure 1 It is a schematic structural diagram of a system for accessing a network according to an embodiment of the present invention.

[0056] Such as figure 1 As shown, the access network system includes: a terminal 12 and a server 14, wherein,

[0057] The terminal 12 is used to determine that the data connection to be accessed needs to be connected to a virtual private network, verify the data to be accessed through a preset verification method, and send an access request to the server 14 according to the verification result, wherein the preset verification method is used to verify the terminal Whether the pre-stored identity verification information of 12 satisfies the standard for accessing the server 14; the network to which the server 14 belongs is a virtual private network; the server 14 is connected with the terminal 12, and is used to receive the a...

Embodiment 2

[0087] According to another embodiment of the present invention, an embodiment of a method for accessing a network is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0088] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Figure 5 It is a block diagram of a hardware structure of a computer terminal (or mobile device) for implementing a method for accessing a network according to an embodiment of the present invention. Such as Figure 5 As shown, the computer terminal 50 (or mobile device 50) may include one or more (502a, 502b, ..., 502n are used...

Embodiment 3

[0132] This application provides Figure 7 The method of accessing the network is shown. On the second terminal side, Figure 7 is a flowchart of a method for accessing a network according to Embodiment 3 of the present invention.

[0133] Step S702, the second terminal receives the access authentication request sent by the first terminal;

[0134] In the above step S702 of this application, based on the Figure 1 to Figure 3 The system for accessing the network provided is combined with the method for accessing the network provided by the first terminal side in Embodiment 2. In this embodiment of the present application, the second terminal side receives the access authentication request sent by the first terminal, wherein the access The access authentication request is used to instruct the second terminal to determine whether to confirm the first terminal's access to the virtual private network according to the pre-stored identity verification information of the first termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for accessing to a network, and the system comprises a terminal and a server, wherein the terminal is used for determining that a to-be-accesseddata connection needs to be connected to a virtual private network (VPN), verifying the to-be-accessed data through a preset verification mode and sending an access request to the server according toa result of verification, wherein the preset verification mode is used for verifying whether prestored identity verification information of the terminal satisfies a standard of accessing to the server; the network which the server belongs to is the virtual private network; and the server is connected with the terminal, and is used for receiving the access request sent by the terminal, and according to the access request, enabling the terminal to access to the virtual private network which the server belongs to. With the method, the device and the system provided by the invention, a technicalproblem of low login efficiency caused by logging in to the VPN in the existing technology is solved.

Description

technical field [0001] The present invention relates to the application field of network technology, in particular, to a method, device and system for accessing a network. Background technique [0002] With the widespread use of cloud office technology, users accessing a virtual private network (Virtual Private Network, VPN for short) has become a commonly used office method. The advantage of this office method is that as long as the computer's computing power can meet Multi-platform office can be realized on one computer, and cloud office also provides a significant contribution to information security issues, that is, the work content completed on the virtual machine or the internal information of the company group stored on the virtual machine The data will not be stored on the local computer, and there will be no information leakage due to copying on the local computer. [0003] In the existing VPN login mode, the user often needs to dial in through the VPN and complete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L12/46H04L29/06
CPCH04L12/2856H04L12/4641H04L63/08
Inventor 王青华
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products