Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and authentication equipment for implementing network access, and user equipment

A technology of user equipment and authentication equipment, which is applied in the field of communication, can solve problems such as complicated authentication process, poor network usability, and complex process, and achieve the effects of improving network security, resisting exhaustive attacks, and simplifying the authentication process

Active Publication Date: 2018-11-13
HUAWEI TECH CO LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The password-based online authentication method requires the user to set a password in advance, and the process of setting the password is more complicated
At present, the authentication process for accessing the network is complicated, the network usability is poor, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication equipment for implementing network access, and user equipment
  • Authentication method and authentication equipment for implementing network access, and user equipment
  • Authentication method and authentication equipment for implementing network access, and user equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0065] Generally, a home network often adopts technologies such as WIFI (such as 802.11), visible light communication (Visible Light Communications, VLC) (such as 802.15.7) and other technologies for wireless Internet access. During this process, the user equipment uses a password to perform an authentication operation. When user equipment adopts password to perform authentication operation, there are often the following problems: 1. Wireless equipment, such as WIFI access point (Access Point, AP), or customer premise equipment (Customer Premises Equipment, CPE) are less stable, often error occured. After a fault occurs, the wireless equipment or customer premises equipment needs to be reset and restarted. Taking a wireless dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and authentication equipment for implementing network access, and user equipment, and belongs to the technical field of communication. The method is applied to the authentication equipment. The method comprises the steps as follows: the authentication equipment receives an authentication response message sent by the user equipment, wherein the authentication response message comprises first data, and the first data is the data acquired by the user equipment according to biological characteristic data of a target user; then the authentication equipment acquires second data from a server, wherein the second data is the data acquired by the server based on the biological characteristic data of the user; when the first data is the same as the second data, the authentication equipment generates an indication message that is used for indicating the user equipment that authentication is successful; and then the authentication equipment sends the indication message to the user equipment. According to the method and equipment provided by the invention, the problems that the authentication process of network access is relatively complex, the network is relatively poor in usability and the security is relative poor are solved, the authentication process of network access is simplified, and the network usability and security are improved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to an authentication method, authentication equipment and user equipment for realizing access to a network. Background technique [0002] With the rapid development of Internet technology, a home network or a public wireless network can perform wireless Internet access. For example, a home network or a public wireless network can use a wireless fidelity (WIreless-FIdelity, WIFI) technology to perform wireless Internet access. Wherein, the WIFI technology is a technology that allows a user equipment to connect to a wireless local area network. When the user equipment accesses the network based on the WIFI technology, it often needs to perform an authentication operation. [0003] In related technologies, taking WIFI technology as an example, when a home network or a public wireless network adopts WIFI technology for wireless Internet access, the user equipment o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04L29/06
CPCH04L63/0861H04W12/06H04W12/08H04W12/63H04W12/068H04W12/69H04W12/71H04W12/03H04W12/68H04W12/069H04L63/102G06V40/70
Inventor 郑若滨
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products