An access authentication system, method, apparatus, computer equipment and storage medium

An access authentication and authentication service technology, applied in the field of access authentication system, can solve the problem of not being able to support IoT devices friendly, and achieve the effect of reducing the amount of calculation

Active Publication Date: 2020-11-27
兴容(上海)信息技术股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to provide an access authentication system, method, device, computer equipment and storage medium, aiming to solve the technical problem that the existing access authentication methods cannot support friendly IoT devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access authentication system, method, apparatus, computer equipment and storage medium
  • An access authentication system, method, apparatus, computer equipment and storage medium
  • An access authentication system, method, apparatus, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] It can be understood that the terms "first", "second" and the like used in the present application may be used to describe various elements herein, but unless otherwise specified, these elements are not limited by these terms. These terms are only used to distinguish one element from another element. For example, a first xx script could be termed a second xx script, and, similarly, a second xx script could be termed a first xx script, without departing from the scope of the present application.

[0025] figure 1 An application environment diagram of an access authentication system provided...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention is applicable to the field of mobile communication, and provides an access authentication system, method, device, computer equipment and storage medium, wherein the access authentication system includes: an authentication network management terminal and at least one access authentication client The 3A authentication server terminal for communication, the 3A authentication server terminal communicates with the authentication network management terminal. In the access authentication system provided by the embodiment of the present invention, in the process of implementing access authentication, the 3A authentication server judges whether the access authentication request is consistent with the pre-stored authentication network management terminal, which contains at least identity information and block ciphers. Verify that the information matches, so as to determine whether to establish a connection with the access authentication client. When used for networking of Internet of Things devices, it is not necessary to perform matching after calculation one by one. Multiple access authentication clients can share block ciphers, which solves the problem Some access authentication methods have technical problems that cannot support friendly IoT devices.

Description

technical field [0001] The invention belongs to the field of mobile communication, and in particular relates to an access authentication system, method, device, computer equipment and storage medium. Background technique [0002] With the development of mobile communication technology, wireless network technology has also been developed rapidly. In a wireless network, access authentication is mostly required for terminal devices that need to be accessed, so as to ensure the security of the network transmission process. For example, when accessing the network, you need to use the unique access password configured by the Wi-Fi network device, that is, PSK (Pre-Shared Key, pre-shared key), and all terminal devices in the network use this PSK to access the network. [0003] At present, the dynamic PSK-based authentication method has good security, but each user device is bound with a globally unique private password, which requires each Wi-Fi password to be bound to a unique Wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/69
CPCH04W12/068H04W12/069
Inventor 卢国鸣
Owner 兴容(上海)信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products