CN113179517A - Authentication method and device for access network, electronic equipment and storage medium - Google Patents

Authentication method and device for access network, electronic equipment and storage medium Download PDF

Info

Publication number
CN113179517A
CN113179517A CN202110513579.1A CN202110513579A CN113179517A CN 113179517 A CN113179517 A CN 113179517A CN 202110513579 A CN202110513579 A CN 202110513579A CN 113179517 A CN113179517 A CN 113179517A
Authority
CN
China
Prior art keywords
information
network
tenant
verification code
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110513579.1A
Other languages
Chinese (zh)
Inventor
曹昉赫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ziroom Information Technology Co Ltd
Original Assignee
Beijing Ziroom Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ziroom Information Technology Co Ltd filed Critical Beijing Ziroom Information Technology Co Ltd
Priority to CN202110513579.1A priority Critical patent/CN113179517A/en
Publication of CN113179517A publication Critical patent/CN113179517A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an authentication method, an authentication device, electronic equipment and a storage medium for accessing a network, which can ensure that information to be identified is matched with the identity of a real user by comparing the information to be identified with real name authentication information reserved by the user, and the real identity is more accurately verified; compared with the traditional method of only using a router password, the method has the advantages that the routing authority can be controlled to an individual through a gateway equipment end and background server end verification mechanism, so that the wireless network authority control of the renting scene is safer; compared with the traditional method that due to the fact that rent is owed, an operator needs to be informed to stop the service charge of the whole house source network, the method and the system deny the access of the user when the user is in the default state or not in the default state, so that personal second-level control can be achieved accurately, and the method and the system are more flexible and lower in cost.

Description

Authentication method and device for access network, electronic equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an authentication method and apparatus for an access network, an electronic device, and a storage medium.
Background
With the accelerated advancement of urbanization process, the service of long lease service in cities is widely developed. With the popularization of intelligent wireless terminal network equipment, the loss of network operators and network service users is increased due to unauthorized access to the network caused by weak passwords of network access equipment in the leasing process of a wireless network.
The network access equipment of the house leasing industry only depends on password setting, can not ensure that the propagation range of the password is controllable, and further can not ensure effective identification and verification; 2. as a network operator in the house leasing industry, the real identity of a network connector cannot be confirmed only by collecting the mobile phone number, so that whether network resources are stolen or not cannot be ensured; 3. in a scene that a plurality of people share a network access hotspot, only the whole network node can be switched on and off, and the limitation of network service of people without access authority cannot be accurately ensured.
Disclosure of Invention
In view of this, embodiments of the present invention provide an authentication method and apparatus for an access network, an electronic device, and a storage medium, so as to solve a problem that an identity of a network-accessing tenant cannot be effectively identified.
In a first aspect, an embodiment of the present invention provides an authentication method for an access network, including: the method is applied to a server side and comprises the following steps: acquiring information to be identified filled in by a tenant of a network to be accessed; judging whether the information to be identified is matched with the user real name information in the database; when the information to be identified is matched with the user real name information in the database and the user is not in a default state, sending verification code information to the mobile terminal of the tenant; acquiring verification code information filled by a user to be accessed into a network; judging whether the filled verification code information is matched with the sent verification code information; when the verification code information is matched with the sent verification code information, sending issuing information to gateway equipment, and issuing an access network account and effective internet surfing time to the mobile terminal of the tenant by the gateway equipment; acquiring access success information fed back by the gateway equipment; and sending login success information and displaying the login success information through a renting software terminal execution interface of the tenant so as to prompt that the page login is successful.
In one embodiment, the information to be identified at least includes: the name of the network tenant to be accessed and the mobile phone number of the network tenant to be accessed; the user real name information at least comprises a name and a mobile phone number.
In an embodiment, in the step of determining whether the information to be identified matches the user real-name information in the database, when the information to be identified does not match the user real-name information, sending identity non-compliance information and displaying the identity non-compliance information on an execution interface of the rental software terminal to prompt that the identity of the tenant is illegal.
In a second aspect, the present invention provides an authentication method for an access network, which is applied to a rental software terminal, and includes the following steps: acquiring the operation of connecting a network tenant to be accessed to a gateway device and popping up a verification page; receiving touch operation of a to-be-accessed network tenant on a verification code acquisition button on a verification page; collecting the information to be identified and sending the information to a server; receiving touch operation of a network tenant to be accessed on a verification code confirming button on a verification page within a preset time; acquiring verification code information filled by the network tenant to be accessed and sending the verification code information to a server; and receiving the successful login information of the network tenant to be accessed and displaying an execution interface at the end so as to prompt that the page login is successful.
In one embodiment, in the step of collecting the information to be identified and sending the information to the server, when the information to be identified is not matched with the user real name information of the server, acquiring identity non-compliance information and executing interface display to prompt that the identity is illegal;
in one embodiment, in the step of collecting and sending verification code information filled in by the tenant of the network to be accessed to the server, when the filled verification code information is not matched with the verification code information sent by the server, verification code non-compliance information is obtained and interface display is executed to prompt that the identity is illegal.
In a third aspect, the present invention provides an authentication apparatus for accessing a network, including: the first acquisition module is used for acquiring information to be identified filled in by a tenant of a network to be accessed; the first judgment module is used for judging whether the information to be identified is matched with the user real name information in the database; when the information to be identified is matched with the user real name information in the database and the user is not in a default state, sending verification code information to the mobile terminal of the tenant; the second acquisition module is used for acquiring verification code information filled by a user to be accessed into the network; the second judging module is used for judging whether the filled verification code information is matched with the sent verification code information or not; when the verification code information is matched with the sent verification code information, sending issuing information to gateway equipment, and issuing an account number of an access network and effective internet surfing time to the mobile terminal of the tenant by the gateway equipment; the third acquisition module is used for acquiring the access success information fed back by the gateway equipment; and the first sending module is used for sending login success information and displaying the login success information through a renting software terminal execution interface of the tenant so as to prompt that the page login is successful.
In a fourth aspect, the present invention provides an authentication apparatus for accessing a network, including: the fourth acquisition module is used for acquiring the operation of the tenant to be accessed to the network to connect with a gateway device and popping up a verification page; the first receiving module is used for receiving the touch operation of the to-be-accessed network tenant on a verification code acquisition button on a verification page; the first acquisition and transmission module acquires the information to be identified and transmits the information to the server; the second receiving module is used for receiving the touch operation of the tenant to be accessed to the network on the verification code confirming button on the verification page within a preset time; the second acquisition and transmission module is used for acquiring verification code information filled by the tenant of the network to be accessed and transmitting the verification code information to the server; and the third receiving module is used for receiving the successful login information of the network tenant to be accessed and displaying an execution interface at the end so as to prompt that the login of the page is successful.
In a fourth aspect, the present invention provides an electronic device comprising: a memory and a processor, the memory and the processor are communicatively connected with each other, the memory stores computer instructions, and the processor executes the computer instructions to execute the method for authenticating an access network.
In a fifth aspect, the present invention provides a computer-readable storage medium storing computer instructions for causing a computer to execute the method for authenticating an access network described above.
The technical scheme of the invention has the following advantages:
the invention provides an authentication method, an authentication device, electronic equipment and a storage medium for accessing a network, which can ensure that information to be identified is matched with the identity of a real user by comparing the information to be identified with real name authentication information reserved by the user, and the real identity is more accurately verified; compared with the traditional method of only using a router password, the method has the advantages that the routing authority can be controlled to an individual through a gateway equipment end and background server end verification mechanism, so that the wireless network authority control of the renting scene is safer; compared with the traditional method that due to the fact that rent is owed, an operator needs to be informed to stop the service charge of the whole house source network, the method and the system deny the access of the user when the user is in the default state or not in the default state, so that personal second-level control can be achieved accurately, and the method and the system are more flexible and lower in cost.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of a network connection system provided by an embodiment of the invention;
fig. 2 is a flowchart of an authentication method of an access network according to an embodiment of the present invention;
fig. 3 is a flowchart of an authentication method of an access network according to an embodiment of the present invention;
fig. 4 is a flowchart of an authentication method of an access network according to an embodiment of the present invention;
fig. 5 is a block diagram of the structure of an authentication apparatus of an access network according to an embodiment of the present invention;
fig. 6 is a block diagram of the structure of an authentication apparatus of an access network according to an embodiment of the present invention;
fig. 7 is a block diagram of the structure of an authentication apparatus of an access network according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides a network connection system, which is mainly applied to a house rental scenario, and the system includes a tenant mobile terminal (which runs a rental software terminal), a gateway device, and a server. The leasing software terminal is connected with the server, and the server is connected with the gateway equipment. The mobile terminal of the tenant waits for connecting the gateway equipment; and the mobile terminal requests to connect the gateway equipment, and after the server side succeeds in authentication, the mobile terminal can perform intercommunication. The following is an authentication method for an access network provided by the present invention, which is used to implement security of access authentication in a house lease scenario.
As shown in fig. 2, the present invention provides an authentication method for an access network, which is applied to a server side and includes the following steps S1 to S6.
And S1, the server acquires the information to be identified filled in by the renter of the network to be accessed, which is acquired by the renting software terminal. The information to be identified at least includes: the name of the network tenant to be accessed and the mobile phone number of the network tenant to be accessed; the system can also comprise iris data information of the network tenant to be accessed, voice data information of the network tenant to be accessed, face data information of the network tenant to be accessed and the like.
S2, the server judges whether the information to be identified is matched with the user real name information in the database; and when the information to be identified is matched with the user real name information in the database and the user is not in a default state, sending verification code information to the mobile terminal of the tenant. The user real name information at least comprises a name and a mobile phone number; iris data information, voice data information, face data information, and the like may also be included. And when the information to be identified is not matched with the user real name information, sending identity non-compliance information and displaying the identity non-compliance information through a rental software terminal execution interface to prompt that the identity of the tenant is illegal.
And S3, the server acquires the verification code information filled by the user of the network to be accessed and collected by the rental software terminal.
S4, the server judges whether the filled verification code information is matched with the sent verification code information; and when the verification code information is matched with the sent verification code information, sending issuing information to the gateway equipment, and issuing an account number of the access network and the effective internet surfing time to the mobile terminal of the tenant by the gateway equipment.
And S5, the server acquires the access success information fed back by the gateway equipment.
And S6, the server sends login success information and the information is displayed by an execution interface of the rental software terminal to prompt that the login of the page is successful.
As shown in fig. 3, the present invention further provides an authentication method for an access network, which is applied to a rental software terminal and includes the following steps S101 to S105.
S101, the renting software terminal obtains the operation that a network tenant to be accessed is connected with a gateway device.
S102, the renting software terminal receives the touch operation of the to-be-accessed network tenant on the verification code acquisition button on the verification page.
S103, the leasing software terminal collects information to be identified and sends the information to the server side. And when the information to be identified is not matched with the user real name information of the server, the leasing software terminal acquires the identity non-compliance information sent by the server and executes interface display to prompt that the identity is not compliant.
And S104, receiving the touch operation of the confirmation verification code button on the verification page by the renter to be accessed to the network within a preset time by the renter software terminal.
And S105, the leasing software terminal collects the verification code information filled by the tenant of the network to be accessed and sends the verification code information to the server. And when the filled verification code information is not matched with the verification code information sent by the server, the renting software terminal acquires the verification code non-compliance information sent by the server and executes interface display to prompt the identity non-compliance.
And S106, the leasing software terminal receives the successful login information of the tenant of the network to be accessed, which is sent by the server terminal, and executes an interface display to prompt that the page login is successful.
As shown in fig. 4, the present invention provides an authentication method for an access network, which is applied to a gateway device, and includes the following steps: s201 to S203.
S201, the gateway equipment acquires the issuing information sent by the server side.
S202, the gateway equipment sends the network access account and the effective internet access time to the mobile terminal.
S203, the gateway equipment sends processing success information to the server.
The invention provides an authentication method of an access network, which can ensure that information to be identified is matched with the identity of a real user by comparing the information to be identified with real name authentication information reserved by the user, and the real identity is more accurately verified; compared with the traditional method of only using a router password, the method has the advantages that the routing authority can be controlled to an individual through a gateway equipment end and background server end verification mechanism, so that the wireless network authority control of the renting scene is safer; compared with the traditional method that due to the fact that rent is owed, an operator needs to be informed to stop the service charge of the whole house source network, the method and the system deny the access of the user when the user is in the default state or not in the default state, so that personal second-level control can be achieved accurately, and the method and the system are more flexible and lower in cost.
As shown in fig. 5, the present invention provides an authentication apparatus for an access network, including: the device comprises a first obtaining module 11, a first judging module 12, a second obtaining module 13, a second judging module 14, a third obtaining module 15 and a first sending module 16.
The first obtaining module 11 is configured to obtain information to be identified, which is filled in by a tenant of a network to be accessed.
The first judging module 12 is configured to judge whether the information to be identified matches with user real name information in a database; and when the information to be identified is matched with the user real name information in the database and the user is not in a default state, sending verification code information to the mobile terminal of the tenant.
The second obtaining module 13 is configured to obtain the verification code information filled by the user to access the network.
The second judging module 14 is configured to judge whether the filled verification code information matches the sent verification code information; and when the verification code information is matched with the sent verification code information, sending issuing information to the gateway equipment, and issuing an account number of the access network and the effective internet surfing time to the mobile terminal of the tenant by the gateway equipment.
The third obtaining module 15 is configured to obtain the access success information fed back by the gateway device.
The first sending module 16 is configured to send login success information and display the login success information on an execution interface of the renting software terminal of the tenant, so as to prompt that the page login is successful.
As shown in fig. 6, the present invention further provides an authentication apparatus for accessing a network, including: the system comprises a fourth obtaining module 21, a first receiving module 22, a first collecting and sending module 23, a second receiving module 24, a second collecting and sending module 25 and a second receiving module 26.
The fourth obtaining module 21 is configured to obtain an operation of connecting a network tenant to be accessed to a gateway device and pop up a verification page.
The first receiving module 22 is configured to receive a touch operation of the to-be-accessed network tenant on a get verification code button on a verification page.
The first collecting and sending module 23 is configured to collect the information to be identified and send the information to the server.
The second receiving module 24 receives a touch operation of the to-be-accessed network tenant on the verification code confirming button on the verification page within a preset time.
The second collecting and sending module 25 is configured to collect the verification code information filled by the tenant of the network to be accessed and send the verification code information to the server.
The second receiving module 26 is configured to receive the successful login information of the tenant of the network to be accessed and display an execution interface, so as to prompt that the login of the page is successful.
As shown in fig. 7, the present invention further provides an authentication apparatus for accessing a network, including: a fifth acquiring module 31, a first sending module 32 and a second sending module 33.
The fifth obtaining module 31 is configured to obtain the issuing information sent by the server.
The first sending module 32 sends the network access account and the effective internet access time to the mobile terminal of the tenant.
The second sending module 33 sends the processing success information to the server.
In this embodiment, an authentication apparatus for accessing a network is further provided, and the apparatus is used to implement the foregoing embodiments and preferred embodiments, and details of which have been already described are omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
The authentication means of the access network in this embodiment is presented in the form of functional units, where a unit refers to an ASIC circuit, a processor and a memory executing one or more software or fixed programs, and/or other devices that may provide the above-described functionality.
Further functional descriptions of the modules are the same as those of the corresponding embodiments, and are not repeated herein.
An embodiment of the present invention further provides an electronic device, which includes the authentication apparatus for an access network shown in fig. 5 to 7.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an electronic device according to an alternative embodiment of the present invention, where the electronic device may include: at least one processor 51, such as a CPU (Central Processing Unit), at least one communication interface 53, memory 54, at least one communication bus 52. Wherein a communication bus 52 is used to enable the connection communication between these components. The communication interface 53 may include a Display (Display) and a Keyboard (Keyboard), and the optional communication interface 53 may also include a standard wired interface and a standard wireless interface. The Memory 54 may be a high-speed RAM Memory (volatile Random Access Memory) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The memory 54 may alternatively be at least one memory device located remotely from the processor 51. Wherein the processor 51 may be combined with the apparatus described in fig. 5-7, the memory 54 stores an application program, and the processor 51 calls the program code stored in the memory 54 for executing any of the above method steps.
The communication bus 52 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The communication bus 52 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 8, but this is not intended to represent only one bus or type of bus.
The memory 54 may include a volatile memory (RAM), such as a random-access memory (RAM); the memory may also include a non-volatile memory (english: non-volatile memory), such as a flash memory (english: flash memory), a hard disk (english: hard disk drive, abbreviated: HDD) or a solid-state drive (english: SSD); the memory 54 may also comprise a combination of the above types of memories.
The processor 51 may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
The processor 51 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
Optionally, the memory 54 is also used to store program instructions. The processor 51 may invoke program instructions to implement the method of authentication of an access network as shown in the embodiments of fig. 2 to 4 of the present application.
An embodiment of the present invention further provides a non-transitory computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions may execute the method for authenticating an access network in any method embodiment. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. An authentication method of an access network is applied to a server side, and is characterized by comprising the following steps:
acquiring information to be identified filled in by a tenant of a network to be accessed;
judging whether the information to be identified is matched with the user real name information in the database; when the information to be identified is matched with the user real name information in the database and the user is not in a default state, sending verification code information to the mobile terminal of the tenant;
acquiring verification code information filled by a user to be accessed into a network;
judging whether the filled verification code information is matched with the sent verification code information; when the verification code information is matched with the sent verification code information, sending issuing information to gateway equipment, and issuing an access network account and effective internet surfing time to the mobile terminal of the tenant by the gateway equipment;
acquiring access success information fed back by the gateway equipment; and
and sending login success information and displaying the login success information by a renting software terminal execution interface of the tenant to prompt that the page login is successful.
2. The method of claim 1,
the information to be identified at least includes: the name of the network tenant to be accessed and the mobile phone number of the network tenant to be accessed;
the user real name information at least comprises a name and a mobile phone number.
3. The method of claim 1,
in the step of judging whether the information to be identified is matched with the user real-name information in the database, when the information to be identified is not matched with the user real-name information, sending identity non-conforming information and displaying the identity non-conforming information by a rental software terminal execution interface so as to prompt that the identity of the tenant is illegal.
4. An authentication method of an access network is applied to a rental software terminal, and is characterized by comprising the following steps:
acquiring the operation of connecting a network tenant to be accessed to a gateway device and popping up a verification page;
receiving touch operation of the network tenant to be accessed on a verification page for a verification code acquisition button;
collecting information to be identified and sending the information to a server;
receiving touch operation of a network tenant to be accessed on a verification code confirming button on a verification page within a preset time;
acquiring verification code information filled by the network tenant to be accessed and sending the verification code information to a server; and
and receiving the successful login information of the network tenant to be accessed and displaying an execution interface at the end so as to prompt that the login of the page is successful.
5. The method of claim 4,
and in the step of collecting the information to be identified and sending the information to the server, when the information to be identified is not matched with the user real name information of the server, acquiring the identity non-conformity information and executing interface display to prompt that the identity is illegal.
6. The method of claim 4,
in the step of collecting the verification code information filled in by the tenant of the network to be accessed and sending the verification code information to the server, when the filled verification code information is not matched with the verification code information sent by the server, the verification code non-conformity information is obtained and interface display is executed to prompt the identity to be illegal.
7. An authentication apparatus for accessing a network, comprising:
the first acquisition module is used for acquiring information to be identified filled in by a tenant of a network to be accessed;
the first judgment module is used for judging whether the information to be identified is matched with the user real name information in the database; when the information to be identified is matched with the user real name information in the database and the user is not in a default state, sending verification code information to the mobile terminal of the tenant;
the second acquisition module is used for acquiring verification code information filled by a user to be accessed into the network;
the second judging module is used for judging whether the filled verification code information is matched with the sent verification code information or not; when the verification code information is matched with the sent verification code information, sending issuing information to gateway equipment, and issuing an account number of an access network and effective internet surfing time to the mobile terminal of the tenant by the gateway equipment;
the third acquisition module is used for acquiring the access success information fed back by the gateway equipment; and
and the first sending module is used for sending login success information and displaying the login success information through a renting software terminal execution interface of the tenant so as to prompt that the page login is successful.
8. An authentication apparatus for accessing a network, comprising:
the fourth acquisition module is used for acquiring the operation of the tenant to be accessed to the network to connect with a gateway device and popping up a verification page;
the first receiving module is used for receiving the touch operation of the to-be-accessed network tenant on a verification code acquisition button on a verification page;
the first acquisition and transmission module acquires information to be identified and transmits the information to the server;
the second receiving module is used for receiving the touch operation of the tenant to be accessed to the network on the verification code confirming button on the verification page within a preset time;
the second acquisition and transmission module is used for acquiring verification code information filled by the tenant of the network to be accessed and transmitting the verification code information to the server; and
and the third receiving module is used for receiving the successful login information of the network tenant to be accessed and displaying an execution interface at the end so as to prompt that the login of the page is successful.
9. An electronic device, comprising:
a memory and a processor, the memory and the processor being communicatively connected to each other, the memory having stored therein computer instructions, the processor executing the computer instructions to perform the method of authenticating an access network according to any one of claims 1 to 6.
10. A computer-readable storage medium storing computer instructions for causing a computer to perform the method for authenticating an access network of any one of claims 1 to 6.
CN202110513579.1A 2021-05-11 2021-05-11 Authentication method and device for access network, electronic equipment and storage medium Pending CN113179517A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110513579.1A CN113179517A (en) 2021-05-11 2021-05-11 Authentication method and device for access network, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110513579.1A CN113179517A (en) 2021-05-11 2021-05-11 Authentication method and device for access network, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113179517A true CN113179517A (en) 2021-07-27

Family

ID=76929205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110513579.1A Pending CN113179517A (en) 2021-05-11 2021-05-11 Authentication method and device for access network, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113179517A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098461A1 (en) * 2006-10-24 2008-04-24 Avatier Corporation Controlling access to a protected network
CN103607372A (en) * 2013-08-19 2014-02-26 深信服网络科技(深圳)有限公司 Authentication method and device for network access
CN111935169A (en) * 2020-08-20 2020-11-13 腾讯科技(深圳)有限公司 Business data access method, device, equipment and storage medium
CN111935832A (en) * 2020-07-15 2020-11-13 北京自如信息科技有限公司 Network resource allocation method and device and computer equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098461A1 (en) * 2006-10-24 2008-04-24 Avatier Corporation Controlling access to a protected network
CN103607372A (en) * 2013-08-19 2014-02-26 深信服网络科技(深圳)有限公司 Authentication method and device for network access
CN111935832A (en) * 2020-07-15 2020-11-13 北京自如信息科技有限公司 Network resource allocation method and device and computer equipment
CN111935169A (en) * 2020-08-20 2020-11-13 腾讯科技(深圳)有限公司 Business data access method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103457738B (en) Method and system for login processing based on browser
US20180309756A1 (en) Identity Authentication Method and Apparatus
CN104636924B (en) Secure payment method, server and system
EP2814276A1 (en) Access authentication method and device for wireless local area network hotspot
WO2017024842A1 (en) Internet access authentication method, client, computer storage medium
EP3179758A1 (en) Building intercom method, nfc unlocking device and building intercom system
CN108667699B (en) Method and device for interconnecting terminal equipment and gateway equipment
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN110266642A (en) Identity identifying method and server, electronic equipment
CN104994504A (en) Secure and automatic connection to wireless network
CN105162802B (en) Portal authentication method and certificate server
CN107888592A (en) A kind of VPN login authentication methods and device
CN105025484B (en) Access the method and device of Wi-Fi Hotspot
CN105392137A (en) Household WIFI embezzlement preventing method, wireless router and terminal equipment
CN104469736B (en) A kind of data processing method, server and terminal
CN113271299B (en) Login method and server
CN105681258A (en) Session method and session device based on third-party server
CN105791235A (en) Configuration information downloading method and device
CN107872445A (en) Access authentication method, equipment and Verification System
CN109150787A (en) A kind of authority acquiring method, apparatus, equipment and storage medium
CN113014593A (en) Access request authentication method and device, storage medium and electronic equipment
CN109495362B (en) Access authentication method and device
CN105163317A (en) Network access method, server, terminal and system
CN109327455A (en) A kind of access method of NAS device, device, equipment and readable storage medium storing program for executing
CN104469772A (en) Website equipment authentication method and device and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210727