Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for managing user access equipment, management equipment and network equipment

A technology for accessing devices and managing users. It is applied in the field of communication and can solve problems such as reduced network security and easy cracking or sharing of PSK keys, achieving the effect of reducing resource occupation and improving storage resources.

Active Publication Date: 2021-02-02
NEW H3C BIG DATA TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the PSK network, the public PSK key used by small and medium-sized enterprises is easily cracked or shared, which greatly reduces the security of the network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing user access equipment, management equipment and network equipment
  • Method for managing user access equipment, management equipment and network equipment
  • Method for managing user access equipment, management equipment and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0047] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for managing user access equipment, management equipment and network equipment. The method comprises the steps: obtaining a to-be-approved password transmitted by managed equipment, wherein the to-be-approved password is generated by the managed equipment according to an original password inputted by a user when the user accesses the managed equipment and an MAC address of the user; checking and approving the to-be-approved password according to an approved password set recorded by the to-be-approved password management equipment; if the to-be-approved passwordpasses the approval, notifying the managed equipment to give permission to the user; if the to-be-approved password does not pass the approval, notifying the managed equipment to refuse the user.

Description

technical field [0001] This specification relates to the field of communication technologies, and in particular to a method for managing user access devices, a management device, and a network device. Background technique [0002] PSK: Pre-Shared Key pre-shared key. [0003] PPSK: Private Pre-Shared Key private pre-shared key. [0004] In the PSK network, the public PSK key used by small and medium-sized enterprises is easy to be cracked or shared, which greatly reduces the security of the network. In this usage scenario, using the PPSK key can solve this problem. PPSK is a one-person-one-key authentication method that can guarantee high security. Contents of the invention [0005] This specification provides a method for managing user access equipment, management equipment and network equipment, which can reduce the resource occupation of PPSK passwords and improve the storage resources of network equipment resources in different places. [0006] This manual provides ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L29/08H04L12/24
CPCH04L63/083H04L63/0876H04L9/0863H04L9/0866H04L67/10H04L41/042
Inventor 金凌皓
Owner NEW H3C BIG DATA TECH CO LTD