Method for mobile terminal to securely access computer network
A technology for mobile terminals and access to the network, applied to electrical components, transmission systems, etc., can solve problems such as computer attacks and computer disadvantages
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0016] A method for a mobile terminal to access a network, characterized in that the method includes the following steps:
[0017] Step 1, the mobile terminal is connected to the computer through wireless or wired;
[0018] Step 2, the computer obtains the identification of the mobile terminal, and reads the record of the identification of the mobile terminal;
[0019] Step 3, the computer judges the identification: if the identification is recorded in the computer, then go to
[0020] Step 4: If the mark is not recorded in the computer, the computer sends a prompt for an unknown mobile terminal, and when the user chooses to reject, the computer does not allow the unknown mobile terminal to access, and when the user chooses to accept, the The identified record is increased by 1, and the indicated record changes from 0 to 1, the computer allows the mobile terminal to access the computer, and does not allow the mobile terminal to write to the computer;
[0021] Step 4, if the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More