Unlock instant, AI-driven research and patent intelligence for your innovation.

Wireless internet access management method based on physical identity authentication

A technology of physical identity and management method, which is applied in the field of wireless communication, can solve problems such as the inability to prevent network scraping, hidden dangers of wireless network security, and lack of anti-phishing, so as to increase the difficulty of malicious intrusion, reduce network security risks, and improve security. Effect

Active Publication Date: 2020-02-25
SHENZHEN YOUHUA COMM TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]Most of the current WIFI wireless networks use standard protocols to verify and communicate with wireless terminals, which cannot prevent network scraping and does not have the function of anti-phishing. The management brings a lot of inconvenience
At the same time, the phenomenon that some users use cloned identities to intrude cannot be well avoided, which brings great security risks to the wireless networks of families or businesses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless internet access management method based on physical identity authentication
  • Wireless internet access management method based on physical identity authentication
  • Wireless internet access management method based on physical identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Such as figure 1 As shown, this embodiment provides a method for managing wireless Internet access based on physical identity authentication, which is used to manage Internet access for mobile terminals connected to a wireless gateway to request Internet access. The method includes steps:

[0045] S1: Configure several labels with unique physical identities, and establish networking and positioning between each label and the wireless gateway;

[0046] S2: Assign several MAC addresses to each sticker, and bind these MAC addresses to the physical ID of the sticker;

[0047] S3: Verify whether the MAC address of the mobile terminal requesting to access the Internet has been bound to the label; if so, perform the next step;

[0048] S31: Otherwise, reject the Internet access request of the mobile terminal requesting to access the Internet;

[0049] S4: Utilize the wireless gateway to locate the location of the mobile terminal requesting to access the Internet;

[0050] S...

Embodiment 2

[0078] refer to figure 2 As shown, the present invention also provides a method for managing wireless Internet access based on physical identity authentication, which is used to manage mobile terminals connected to a wireless gateway to request Internet access. The method includes steps:

[0079] SP1: Configure several stickers with unique physical identities and at least two wireless gateways, and establish the networking and positioning between the stickers and wireless gateways in an area. Set up a wireless gateway in each area, and each wireless gateway corresponds to a certain quantity label;

[0080] SP2: assign several MAC addresses to each label, and bind these MAC addresses to the physical ID of the label;

[0081] SP3: Verify whether the MAC address of the mobile terminal requesting to access the Internet has been bound to one of the stickers, and verify whether the sticker is connected to the wireless gateway, and if they are both, go to the next step;

[0082] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wireless internet access management method based on physical identity authentication, which comprises the following steps: configuring a plurality of labels with unique physical identities, and establishing networking and positioning between each label and a wireless gateway; allocating a plurality of MAC addresses to each label, and binding the MAC addresses with the physical ID of the label; verifying whether the MAC address of the mobile terminal requesting to surf the Internet is bound with the label or not, and if not, refusing the Internet surfing request of the mobile terminal requesting to surf the Internet; utilizing the wireless gateway to locate the position of a mobile terminal requesting to surf the Internet; judging whether the relative distance between the mobile terminal requesting to surf the Internet and the corresponding label is smaller than a preset value or not, and if not, refusing the Internet surfing request of the mobile terminal requesting to surf the Internet; and accessing the mobile terminal requesting to surf the Internet to the network, and allocating network authority. According to the invention, unlicensed equipment can be prevented from accessing the wireless network, and the phenomena of network loitering, illegal invasion and the like are effectively solved.

Description

technical field [0001] The invention relates to the technical field of wireless communication, in particular to a method for managing wireless Internet access based on physical identity authentication. Background technique [0002] Most of the current WIFI wireless networks use standard protocols to verify and communicate with wireless terminals, which cannot prevent network scraping and does not have anti-phishing functions, which brings a lot of inconvenience to the management of the network management side. At the same time, the phenomenon that some users use cloning identities to intrude cannot be well avoided, which brings great security risks to the wireless networks of families or businesses. Contents of the invention [0003] Based on this, it is necessary to provide a wireless Internet access management method based on physical identity authentication, which can prevent unauthorized devices from accessing the wireless network, and effectively solve phenomena such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/06H04W12/63H04W12/71H04W12/72
CPCH04W12/06H04W12/63H04W12/71H04W12/72
Inventor 金志虎郭南李康养彭建张宇
Owner SHENZHEN YOUHUA COMM TECH