Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and system for wireless access based on identity authentication

An identity authentication and wireless access technology, applied in the field of data communication, can solve the problems of unencrypted Wi-Fi and cumbersome user experience process

Pending Publication Date: 2021-02-26
岭博科技(北京)有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current open Wi-Fi+Portal authentication Wi-Fi access method has the following problems: 1. Security issues: open Wi-Fi is not encrypted
2. The user experience process is relatively cumbersome: Compared with the 4G / 5G connection of the mobile network, Portal authentication requires the user to manually enter the account / mobile phone number, password or verification code, etc., and click to accept the license terms, etc.
[0004] However, the Hotspot 2.0 protocol has certain limitations in the actual implementation process: 1. SIM card authentication services can only be provided by mobile operators, and Wi-Fi operating points (airports, shopping malls, Hotels, etc.) need to connect with the operator RADIUS (Remote Authentication Dial In User Service, remote user dial-in authentication service) to realize the Hotspot 2.0 SIM card authentication service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for wireless access based on identity authentication
  • Method and system for wireless access based on identity authentication
  • Method and system for wireless access based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0072] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for wireless access based on identity authentication. The method comprises the steps: receiving an encrypted identity authentication message associated withthe identity authentication of user equipment, and decrypting the encrypted identity authentication message, so as to obtain an authentication request message from the user equipment; verifying the first digital signature of the authentication request message to determine whether the authentication request message passes signature verification; matching account data in the request information with a forwarding rule to determine an authentication server to which the authentication request message belongs; prompting an authentication server to which the authentication request message belongs toperform identity authentication on the authentication request message based on the identity information; and when the user equipment passes the identity authentication, sending the authorization level information and the identification information to gateway equipment to which the user equipment belongs, so that the user equipment can access the Internet through the gateway equipment in a wireless access mode based on the identity authentication.

Description

technical field [0001] The present invention relates to the field of data communication, and more specifically, to a method and system for wireless access based on identity authentication. Background technique [0002] Wi-Fi authentication in public places usually uses the Portal (portal website) authentication method, that is, after the user equipment accesses an open (unencrypted) Wi-Fi network, if it detects that the connected Wi-Fi network belongs to Captive Network, the Portal of the Wi-Fi operator will pop up automatically. Users need to be authenticated by password / verification code and can access the Internet only after the authentication is passed. The current Wi-Fi access method of open Wi-Fi+Portal authentication has the following problems: 1. Security issues: Open Wi-Fi is not encrypted. 2. The user experience process is relatively cumbersome: Compared with the 4G / 5G connection of the mobile network, Portal authentication requires the user to manually enter the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08H04W48/08H04W48/16
CPCH04W12/06H04W12/08H04W48/16H04W48/08
Inventor 吴键铭
Owner 岭博科技(北京)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More