Identity authentication method and device
An identity authentication and identity technology, applied in the field of identity authentication methods and devices, can solve the problems of identifying access controllers, requesting equipment network security risks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In a communication network, the requesting device can access the network through the authentication access controller. In order to ensure that the requesting device accessing the network belongs to a legitimate user, and / or the network requested by the user is a legitimate network, the access controller and the requesting device are authenticated. Two-way or one-way authentication is usually required between devices.
[0041] For example, in the scenario where the requesting device accesses the wireless network through the authentication access controller, the requesting device may be a terminal device such as a mobile phone, a personal digital assistant (PDA), or a tablet computer, and the authentication access controller may be wireless access point. In the scenario where the requesting device accesses the wired network through the authentication access controller, the requesting device may be a terminal device such as a desktop computer or a notebook computer, and th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


