Internet access system and method

A network access and network access technology, applied in the Internet access system and access field, can solve the problems of Internet user account theft, account uniqueness restrictions, etc., achieve convenient use, solve the problem of strong calculation of weak passwords, and promote business The effect of development

Inactive Publication Date: 2007-03-07
中国联合网络通信有限公司北京市分公司
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] In view of this, the main purpose of the present invention is to provide an Internet access system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet access system and method
  • Internet access system and method
  • Internet access system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] In the prior art, for broadband users who develop through three channels: on-site office, online acceptance, and agency, the user needs to set a query password when applying for broadband access services. The broadband access account is used when the communication company installs the phone for the user. Issued to users. Then, the user can obtain the broadband access account corresponding to the broadband access account provided by the communication company and the query password set when applying for broadband service by dialing the service phone of the broadband access (such as ADSL) account query system on the online acceptance page Password (such as the password corresponding to the ADSL account).

[0051] The present invention relies on the client, combined with the PKI (Public Key Infrastructure) security mechanism, and uses an external authentication device (a kind of special hardware, which will be explained later by using USBKey as an example, or other peripherals ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides one network interface system, which comprises the following parts: outlet identification device to store user identification information to provide to customer terminal; customer terminal to provide network interface service and to provide interface network or business to network. This invention also provides one interface method, which comprises the following steps: getting user identification information from outside device; customer ends uses identification to load network to determine user legal information to realize network interface.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an Internet access system and an access method. Background technique [0002] With the development of the Internet, broadband access and online value-added services are constantly adding new content. A user may have multiple broadband access accounts and access passwords, and may also have multiple value-added service accounts and corresponding service passwords. Login must be entered manually, which brings inconvenience to users, and problems such as account numbers and passwords being forgotten and leaked occur from time to time. The following describes several reasons for ADSL access account leakage: [0003] 1. Weak passwords lead to the theft of account numbers and passwords: [0004] On the one hand, it means that the password setting for broadband access is simple and easy to break. For example, the initial password for ADSL broadband access is only composed of 8...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 韩鼎金兰娟黄燕罗长安苏莉娜尹娜李丙立
Owner 中国联合网络通信有限公司北京市分公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products