Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method and its device, equipment and storage medium

An authentication method and a technology to be authenticated, applied in the fields of equipment and storage media, authentication methods and devices thereof, can solve problems such as the inability to effectively prevent illegal rubbing of the Internet, and achieve the effect of identifying, preventing, and improving security

Active Publication Date: 2021-12-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present application expects to provide an authentication method and its device, equipment, and storage medium, which solves the technical problem that the prior art cannot effectively prevent illegal network scraping. When the terminal wants to connect to the wireless network, the In the authentication stage, the identity of the terminal and the information to be authenticated are matched and authenticated accordingly, which can not only improve the security of the wireless network, but also effectively identify and prevent network fraud.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and its device, equipment and storage medium
  • An authentication method and its device, equipment and storage medium
  • An authentication method and its device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the specific technical solutions of the invention will be further described in detail below in conjunction with the drawings in the embodiments of the present application. The following examples are used to illustrate the present application, but not to limit the scope of the present application.

[0034] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein are only for the purpose of describing the embodiments of the present application, and are not intended to limit the present application.

[0035] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a diff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present application provides an authentication method and its device, device, and storage medium, wherein the method includes: receiving an authentication request for connecting to a wireless network sent by a terminal to be authenticated, where the authentication request carries information to be authenticated; Based on the first correspondence table, match the acquired identification of the terminal to be authenticated, and authenticate the information to be authenticated, the first correspondence table is used to represent the mapping relationship between the authorization password and the terminal identification; if The identification of the terminal to be authenticated is successfully matched and the information to be authenticated is authenticated, and an authentication success message is sent to the terminal to be authenticated.

Description

technical field [0001] This application relates to the technical field of the Internet, involving but not limited to an authentication method and its device, equipment and storage medium. Background technique [0002] With the development of communication technology and smart terminals, people's work, life and entertainment have also undergone earth-shaking changes. People can connect to the wireless network almost anytime and anywhere, handle work routines, or watch videos for relaxation and entertainment. [0003] When the current terminal connects to a Wi-Fi (Wireless Fidelity, wireless fidelity) hotspot, it often needs to verify and log in through a password, and can connect to the network after the password is passed. Password authentication methods such as WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access, Wi-Fi network protected access), and WPA2 adopted by mainstream traditional routers cannot effectively prevent unauthorized sharing of passwords. Net beh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/02H04L29/06H04L9/08
CPCH04W12/06H04W12/02H04L63/083H04L9/0869
Inventor 殷锡艺鲁珺王奕
Owner TENCENT TECH (SHENZHEN) CO LTD