WO2017071348A1 - Procédé d'accès au réseau, serveur, terminal et système - Google Patents
Procédé d'accès au réseau, serveur, terminal et système Download PDFInfo
- Publication number
- WO2017071348A1 WO2017071348A1 PCT/CN2016/092418 CN2016092418W WO2017071348A1 WO 2017071348 A1 WO2017071348 A1 WO 2017071348A1 CN 2016092418 W CN2016092418 W CN 2016092418W WO 2017071348 A1 WO2017071348 A1 WO 2017071348A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network access
- identification information
- eyeball identification
- terminal
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Definitions
- the present invention relates to the field of communications, and in particular, to a network access method, a server, a terminal, and a system.
- wireless Internet access no longer uses network cables to connect to the network, it brings more convenience to users.
- the existing wireless network connection method is mainly to verify the user identity by inputting a password, and the network can be connected when the verification is passed.
- the password authentication method is easily circumvented or cracked, so the security is low, and the unregistered user may occupy the network resources of other registered users, thereby damaging the interests of the registered users, thereby greatly reducing the User Quality of Service (QoS, Quality) Of Service).
- the embodiments of the present invention provide a network access method, a server, a terminal, and a system, to solve the technical problem of the existing network connection verification mode, poor security, and poor user service quality.
- the embodiment of the invention provides a network access method, which includes:
- the terminal If it is determined that the terminal satisfies the preset network access condition, the terminal is allowed to access the network.
- the embodiment of the invention further provides a network access method, which includes:
- the verification result is determined by the network access server according to the first eyeball identification information, whether the preset network access condition is met Get it;
- the embodiment of the invention further provides a network access server, which includes:
- a first receiving module configured to receive a network access request sent by the terminal
- An obtaining module configured to acquire first eyeball identification information according to the network access request
- a determining module configured to determine, according to the first eyeball identification information, whether the terminal meets a preset network access condition
- a processing module configured to allow the terminal to access the network when determining that the terminal meets the preset network access condition.
- the embodiment of the invention further provides a network access terminal, which includes:
- a processor which is respectively connected to the first sending module, the acquiring module, the first receiving module, and the processing module;
- the first sending module is configured to send a network access request to the network access server
- the acquiring module is configured to acquire first eyeball identification information, and send the first eyeball identification information to a network access server;
- the first receiving module is configured to receive a verification result returned by the network access server according to the acquired first eyeball identification information; the verification result is determined by the network access server according to the first eyeball identification information Obtain whether the preset network access conditions are met;
- the processing module is configured to connect to the network when the verification result indicates that the verification is passed.
- the embodiment of the present invention further provides a network access system, which includes any of the foregoing network access servers and any of the foregoing network access terminals.
- the network access method, the network access server, the terminal and the system of the present invention can verify the identity of the user through the eyeball identification information, and connect to the network when the verification passes, due to the eyeball
- the composition of the identification information is relatively complicated, so it is not easy to be cracked or falsified, so that it is used in network verification, which improves the security and the quality of user service.
- FIG. 1 is a flowchart of a first preferred embodiment of a network access method according to the present invention
- FIG. 2 is a flowchart of a second preferred embodiment of a network access method according to the present invention.
- FIG. 3 is a flowchart of a third preferred embodiment of a network access method according to the present invention.
- FIG. 4 is a flowchart of a fourth preferred embodiment of a network access method according to the present invention.
- FIG. 5 is a schematic structural diagram of a first preferred embodiment of a network access server according to the present invention.
- FIG. 6 is a schematic structural diagram of a second preferred embodiment of a network access server according to the present invention.
- FIG. 7 is a schematic structural diagram of a first preferred embodiment of a network access terminal according to the present invention.
- FIG. 8 is a schematic structural diagram of a second preferred embodiment of a network access terminal according to the present invention.
- FIG. 9 is a schematic structural diagram of a network access system according to the present invention.
- FIG. 1 is a flowchart of a first preferred embodiment of a network access method according to the present invention.
- the execution body of the method is a network access server, hereinafter referred to as a server, and includes the following steps:
- Step S101 Receive a network access request sent by the terminal.
- Step S102 Acquire first eyeball identification information according to the network access request.
- Step S103 determining, according to the first eyeball identification information, whether the terminal meets a preset network access condition; if it is determined that the terminal meets the preset network access condition, step S104 is performed; otherwise, if it is determined that the terminal does not satisfy the If the network access condition is preset, step S105 is performed.
- Step S104 When the terminal is determined to meet the preset network access condition, the terminal is allowed to access the network.
- step S105 when it is determined that the terminal does not meet the preset network access condition, the prompt information is sent to the terminal.
- the network access method of the preferred embodiment ends in step S105.
- the server receives the network access request sent by the terminal, where the network access request may be performed by the user to select a wireless network to perform a network connection operation, and the terminal is a network access terminal, which may be a mobile phone or a tablet.
- a device such as a computer or a notebook. Then go to step S102;
- the server acquires the first eyeball identification information according to the network access request.
- the network access request may carry the first eyeball identification information
- the server extracts the first eyeball identification information from the network access request.
- the eyeball identification information currently input by the user is collected by the camera of the terminal, and the first eyeball identification information may include at least one of information such as iris information, scleral information, and eyeprint information. Then go to step S103;
- step S103 the server determines, according to the first eyeball identification information, whether the terminal satisfies a preset network access condition, and processes the network request sent by the user.
- step S104 is performed; otherwise, if not, step S105 is performed;
- step S104 the server allows the terminal to access the network.
- the matching result of the server is that the first eyeball identification information matches the preset eyeball identification information in the database in step S103
- the terminal is allowed to access the network corresponding to the preset eyeball identification information. That is, in the case where the verification is passed, the server allows the terminal to connect to the network selected by the user.
- the network is for example wireless network (wifi, wireless Fidelity).
- step S105 the server sends a prompt message to the terminal. For example, if the matching result of the server is that the first eyeball identification information does not match the preset eyeball identification information in the database in step S103, the prompt information is transmitted to the terminal. For example, if you send "eyeball identification information entry error, please re-enter".
- the identity of the network connection user is verified by the eyeball identification information, thereby increasing the security of the network connection.
- FIG. 2 is a flowchart of a second preferred embodiment of the network access method of the present invention.
- the execution body of the method is a network access server, hereinafter referred to as a server, and includes the following steps:
- Step S201 Send a message registration request to the terminal.
- Step S202 receiving user information returned by the terminal according to the information registration request and eyeball identification information of the current user, and storing the eyeball identification information of the current user and the user information in the database;
- Step S203 receiving a network access request sent by the terminal
- Step S204 acquiring first eyeball identification information according to the network access request
- Step S205 determining, according to the first eyeball identification information, whether the terminal satisfies the preset network access condition, and if it is determined that the terminal meets the preset network access condition, step S206 is performed; otherwise, if the terminal is determined not to satisfy the preset If the network access condition is set, step S207 is performed.
- Step S206 when the terminal is determined to meet the preset network access condition, the terminal is allowed to access the network.
- Step S207 when it is determined that the terminal does not satisfy the preset network access condition, send prompt information to the terminal.
- the network access method of the preferred embodiment ends in step S207.
- step S201 before the user uses the network, the user needs to apply for the network to be opened.
- the server needs to register the user information, such as the ID card information, the mobile phone number, and the address, etc., of course, for the later users to connect to the network.
- the server may notify the user to enter the eyeball identification information by sending a message registration request to the terminal, such as sending an eyeball identification information entry prompt message.
- step S202 the server receives the eyeball identification information and the user information of the registered user returned by the terminal according to the information registration request, and stores the eyeball identification information of the registered user and the corresponding ID card information, mobile phone number, address, and the like in the Specifically, when receiving the information registration request, the terminal collects the eyeball identification information of the registered user through the camera and receives the user information input by the user, and then sends the information to the server; for the convenience of subsequent verification, the server sends the received message to the terminal. After registering the user's eyeball identification information and user information, the eyeball identification information of the registered user and the user information of the registered user are stored in the database.
- step S203 the server receives a network access request sent by the terminal, where the network access request may be performed by the user to select a wireless network to perform a network connection operation, and the terminal is a network access terminal, which may be a mobile phone or a tablet.
- a device such as a computer or a notebook. Then go to step S204;
- step S204 the server acquires the first eyeball identification information according to the network access request, for example, the eyeball identification information currently input by the user is collected by the camera of the terminal, and the first eyeball identification information may include iris information, sclera information, and eye pattern. At least one of information and the like. Then go to step S205;
- the method for obtaining the first eyeball identification information by the server may be performed in multiple manners.
- the step of acquiring the first eyeball identification information according to the network access request may include:
- the server when the server receives the network access request sent by the user, the server sends an eyeball identification information input prompt message to the terminal for prompting the user to enter the eyeball identification information for identity verification; after the terminal collects the eyeball identification information according to the prompt information, Sending the collected first eyeball identification information to the server, and the server receives the eyeball identification information.
- the network access request may carry the first eyeball identification information
- the step of acquiring the first eyeball identification information according to the network access request may further include: extracting the first eyeball identification information from the network access request. Then go to step S205;
- step S205 the server determines, according to the first eyeball identification information, whether the terminal satisfies a preset network access condition; and processes the network request sent by the user.
- the step of determining, according to the first eyeball identification information, whether the terminal meets a preset network access condition comprises:
- the server matches the acquired first eyeball identification information with the preset eyeball identification information in the database; when the first eyeball identification information matches the preset eyeball identification information in the database, the terminal indicates that the terminal meets the preset network connection. The condition is entered, thereby verifying the identity of the user.
- the A step may specifically include:
- A1 matching the first eyeball identification information with the preset eyeball identification information in the database to obtain a plurality of matching parameters, where the matching parameter is used to indicate a matching degree;
- each wireless network corresponding server stores eyeball identification information of multiple users, when matching, the server matches the acquired eyeball identification information with each preset eyeball identification information in the database to obtain multiple matches.
- the value for example, the server pre-stores the preset eyeball identification information of the four users, and the matching values of the acquired eyeball identification information and each preset eyeball identification information in the database are 40%, 50%, 70%, and 90%, respectively; Set the preset parameter to 60%, the maximum value in the matching parameter is 90%, then the server will compare 90% with 60%; since the maximum value of the matching parameter 90% is greater than the preset parameter 60%, then the number is determined.
- the eyeball identification information matches the preset eyeball identification information in the database, so the server allows the terminal to access the network.
- step S206 is performed; otherwise, if the maximum value of the matching parameter is less than the preset parameter, step S207 is performed;
- step S206 when the matching result is that the maximum value of the matching parameter is greater than or equal to the preset parameter, the terminal is allowed to access the network.
- the terminal is allowed to access the network corresponding to the preset eyeball identification information. That is, in the case where the verification is passed, the server allows the terminal to connect to the network selected by the user.
- the network is, for example, a wireless network or the like.
- step S207 when the matching result is that the maximum value of the matching parameter is less than the preset parameter, the server sends a prompt message to the terminal, for example, sending "eyeball identification information entry error, please re-enter".
- the identity of the network access user is verified by the eyeball identification information, thereby increasing the security of the network connection.
- FIG. 3 is a flowchart of a third preferred embodiment of the network access method of the present invention.
- the main body of the method is a network access terminal, which is hereinafter referred to as a terminal, and includes the following steps:
- Step S301 sending a network access request to the network access server
- Step S302 acquiring first eyeball identification information, and transmitting the first eyeball identification information to a network access server;
- Step S303 receiving a verification result returned by the network access server according to the first eyeball identification information; the verification result is obtained by the network access server determining, according to the first eyeball identification information, whether the preset network access condition is met;
- Step S304 it is determined whether the verification result indicates that the verification is passed; if the verification result indicates that the verification is passed, step S305 is performed; otherwise, if the verification result indicates that the verification fails, step S306 is performed;
- Step S305 if the verification result indicates that the verification is passed, it is connected to the network.
- Step S306 if the verification result indicates that the verification fails, the prompt information indicating that the access network fails is displayed.
- the network access method of the preferred embodiment ends in step S306.
- the network access server hereinafter referred to as the server;
- step S301 the terminal sends a network access request to the server, and the terminal may be a device such as a mobile phone, a tablet computer or a notebook.
- the network access request for example, the user selects the wifi function on the terminal, the server displays a plurality of connectable wifi on the terminal screen, and the user selects the wifi named "CMCC" to perform the network connection operation; then proceeds to step S302;
- step S302 the terminal acquires the first eyeball identification information, and sends the first eyeball identification information to the network access server; for example, in step S301, the network connection request carries the first eyeball identification information, and thus the first eyeball identification The information can be extracted from the network connection request; of course, the current user's eyeball identification information can be obtained by the camera, and the current user's eyeball identification information is sent to the network access server; then proceeds to step S303;
- step S303 the terminal receives the verification result returned by the server according to the first eyeball identification information sent by the terminal; the verification result is obtained by the network access server according to the first eyeball identification information to determine whether the preset network access condition is met; For example, the server corresponding to “CMCC” verifies the current user's eyeball identification information to verify the identity of the user, and returns the verification result to the terminal after the verification is completed;
- step S304 the terminal determines whether the verification result indicates that the verification is passed; if the verification result indicates that the verification is passed, step S305 is performed; otherwise, if the verification result indicates that the verification fails, step S306 is performed;
- step S305 if the verification result indicates that the verification is passed, it is connected to the network.
- the server corresponding to “CMCC” verifies the current user's eyeball identification information, and if the user's identity verification passes, the server allows the terminal to connect to “CMCC”.
- step S306 if the verification result indicates that the verification fails, the prompt information indicating that the access network fails is displayed.
- the server corresponding to the “CMCC” verifies the current user's eyeball identification information. If the user's identity verification fails, the terminal may display the prompt information of the access network failure.
- the terminal obtains the eyeball identification information when connecting to the network, and verifies the identity of the user according to the acquired eyeball identification information, thereby controlling whether the terminal can be connected to the network, thereby increasing the security of the network connection. Sex.
- FIG. 4 is a flowchart of a fourth preferred embodiment of the network access method of the present invention.
- the execution body of the method is a network access terminal, hereinafter referred to as a terminal, and includes the following steps:
- Step S401 Receive a message registration request sent by the network access server.
- Step S402 collecting eyeball identification information of the current user according to the information registration request
- Step S403 Send the eyeball identification information of the current user to the network access server.
- Step S404 sending a network access request to the server
- Step S405 Receive an authentication request sent by the server.
- Step S406 collecting the first eyeball identification information according to the verification request
- Step S407 sending first eyeball identification information to the server
- Step S408 receiving a verification result returned by the server according to the first eyeball identification information
- Step S409 it is determined whether the verification result indicates that the verification is passed, and if so, step S410 is performed; otherwise, step S411 is performed;
- Step S410 If the verification result indicates that the verification is passed, connect to the network.
- Step S411 If the verification result indicates that the verification fails, the prompt information indicating that the access network fails is displayed.
- the network access method of the preferred embodiment ends in step S411.
- the specific flow of each step of the network access method of the preferred embodiment is described in detail below.
- the following network access server referred to as the server;
- step S401 the terminal receives the information registration request sent by the server; before the user can use the network, when the application needs to be opened, the server needs to register the user information, including the ID card information, the mobile phone number, and the address, etc., of course, in order to connect to the network later.
- the server needs to authenticate the user, and also needs to obtain the eyeball identification information in advance.
- the terminal may receive the server to send a message registration request, for example, send an eyeball identification information entry prompt message to remind the user to enter the eyeball identification information. Then go to step S402;
- step S402 the terminal collects the eyeball identification information of the current user according to the information registration request; for example, the terminal collects the eyeball identification information of the current user through the camera; then proceeds to step S403;
- step S403 the terminal sends the eyeball identification information of the current user to the server; for example, the terminal sends the collected eyeball identification information of the current user to the server, so as to facilitate the server to identify the information through the eyeball when the user uses the network. The identity of the user is verified. Then go to step S404;
- step S404 the terminal sends a network access request to the server; for example, if the user selects the wifi function on the terminal, the server displays multiple connectable wifis on the terminal screen, and the user selects the name as “CMCC”. Wifi to connect to the network connection operation; then proceeds to step S405;
- step S405 the terminal receives the verification request sent by the server
- the verification request is generated according to the network access request; when the server receives the network access request sent by the terminal, the terminal receives the verification request sent by the server, and the verification request, for example, the server corresponding to the CMCC sends an eye recognition to the terminal.
- the information enters the prompt information to prompt the user to enter the eyeball identification information; then proceeds to step S406;
- step S406 the terminal collects first eyeball identification information according to the verification request; for example, the terminal collects the first eyeball identification information of the current user through the camera; then proceeds to step S407;
- step S407 the terminal sends the first eyeball identification information to the server; if the terminal completes the acquisition, the eyeball identification information collected by the current user is sent to the server, so that the server verifies the identity of the user, and then proceeds to step S408;
- step S408 the terminal receives the verification result returned by the server according to the first eyeball identification information; the verification result is obtained by the network access server according to the first eyeball identification information to determine whether the preset network access condition is met; for example, The server corresponding to the CMCC "verifies the current user's eyeball identification information to verify the identity of the user, and returns the verification result to the terminal after the verification is completed; then proceeds to step S409;
- Step S409 the terminal determines whether the verification result indicates that the verification is passed, if the verification result indicates that the verification is passed, step S410 is performed; otherwise, if the verification result indicates that the verification fails, step S411 is performed;
- step S410 the terminal is connected to the network, for example, the server corresponding to "CMCC" verifies the current user's eyeball identification information, and if the user's identity verification passes, the server allows the terminal to connect to "CMCC".
- step S411 the terminal displays prompt information that the access network fails.
- the server corresponding to the “CMCC” verifies the current user's eyeball identification information. If the user's identity verification fails, the terminal may display the prompt information of the access network failure.
- the terminal acquires the eyeball identification information when the network is connected, and verifies the identity of the user according to the acquired eyeball identification information, thereby increasing the security of the network connection.
- FIG. 5 is a schematic structural diagram of a first preferred embodiment of a network access server according to the present invention.
- the network access server 50 includes: a first receiving module 51, an obtaining module 52, a determining module 53, and a processing module 54;
- the first receiving module 51 is configured to receive a network access request sent by the terminal.
- the obtaining module 52 is configured to acquire first eyeball identification information according to the network access request
- the determining module 53 is configured to determine, according to the first eyeball identification information, whether the terminal meets a preset network access condition
- the processing module 54 is configured to allow the terminal to access the network when determining that the terminal meets the preset network access condition.
- the first receiving module 51 receives the network access request sent by the terminal, and the network access request may be performed by the user to select a wireless network to perform network connection, and the terminal may be a device such as a mobile phone, a tablet computer or a notebook.
- the obtaining module 52 acquires the first eyeball identification information according to the network access request.
- the network access request may carry the first eyeball identification information
- the obtaining module 52 extracts the first eyeball identification information from the network access request.
- the obtaining module 52 collects the eyeball identification information currently input by the user through the camera of the terminal, and the first eyeball identification information may include at least one of information such as iris information, scleral information, and eye patch information.
- the determining module 53 determines, according to the first eyeball identification information, whether the terminal satisfies a preset network access condition, and processes the network request sent by the user. For example, the judging module 53 matches the acquired first eyeball identification information with the preset eyeball identification information in the database; thereby realizing verification of the identity of the user.
- the processing module 54 allows the terminal to access the network. For example, if the matching result of the determining module 53 is that the first eyeball identification information matches the preset eyeball identification information in the database, the processing module 54 allows the terminal to access the network corresponding to the preset eyeball identification information. That is, in the event that the verification passes, the processing module 54 allows the terminal to connect to the network selected by the user.
- the network is for example a wireless network.
- the network access server of this embodiment verifies the identity of the network connection user by using the eyeball identification information, thereby increasing the security of the network connection.
- FIG. 6 is a schematic structural diagram of a second preferred embodiment of a network access server according to the present invention.
- the network access server 60 includes: a first receiving module 61, an obtaining module 62, a determining module 63, and a processing module 64.
- the network access server 60 of this embodiment further includes the first embodiment. a sending module 65, a second receiving module 66;
- the sending module 65 is configured to send an information registration request to the terminal before the network access request sent by the receiving terminal;
- the second receiving module 66 is configured to receive the user information returned by the terminal according to the information registration request and the eyeball identification information of the current user, and store the eyeball identification information of the current user and the user information in the database.
- the server needs to register the user information, such as the ID card information, the mobile phone number, and the address, etc., of course, for the later users to connect to the network, User authentication, you also need to get eye recognition information in advance.
- the sending module 65 can prompt the user to enter the eyeball identification information by sending an information registration request to the terminal, for example, sending an eyeball identification information entry prompt information.
- the second receiving module 66 receives the user information returned by the terminal according to the information registration request and the eyeball identification information of the registered user, and stores the eyeball identification information of the registered user and the corresponding ID card information, mobile phone number, address, and the like in the In the database;
- the terminal when receiving the information registration request, collects the eyeball identification information of the registered user through the camera, and then sends the eyeball identification information to the second receiving module 66.
- the second receiving module 66 receives the registered user sent by the terminal. After the eyeball identification information and the user information, the eyeball identification information of the registered user and the user information of the registered user are stored in the database.
- the obtaining module 62 is specifically configured to send an authentication request to the terminal according to the network access request, and receive the first eyeball feedback that the terminal feeds back according to the verification request. information.
- the obtaining module 62 when the obtaining module 62 receives the network access request sent by the user, it sends an eyeball identification information entry prompting information to the terminal for prompting the user to enter the eyeball identification information for identity verification; and the terminal collects the eyeball recognition according to the prompt information. After the information, the collected first eyeball identification information is sent to the obtaining module 62, and the acquiring module 62 receives the eyeball identification information.
- the determining module 63 is specifically configured to match the first eyeball identification information with the preset eyeball identification information in the database; and when the first eyeball identification information matches the preset eyeball identification information in the database, determine The terminal satisfies the preset network access condition.
- the determining module 63 matches the acquired first eyeball identification information with the preset eyeball identification information in the database; when the first eyeball identification information matches the preset eyeball identification information in the database, it is determined that the terminal satisfies the preset network.
- the access conditions are implemented to verify the identity of the user.
- the eyeball identification information may have a certain error, in order to improve the matching accuracy, it is preferable to:
- the determining module 63 is configured to match the first eyeball identification information with the preset eyeball identification information in the database to obtain a plurality of matching parameters, where the matching parameter is used to indicate a matching degree; The maximum value in the parameter is compared with the preset parameters;
- the matching module 63 matches the acquired eyeball identification information with each preset eyeball identification information in the database one by one.
- the second receiving module 66 stores the preset eyeball identification information of the four users, and the matching value of the eyeball identification information acquired by the determining module 63 and each preset eyeball identification information in the database is 40%, respectively.
- the processing module 64 allows the terminal to access the network.
- the network allows users to access, which may cause the network registered by the A user to be used by the B user; it brings inconvenience to the network monitoring. After comparing the maximum value of the obtained matching parameters with the preset parameters, the above situation can be prevented, thereby further improving the security of the network.
- the processing module 64 is further configured to: when the determining module 63 determines that the terminal does not meet the preset network access condition, send the prompt information to the terminal. For example, the processing module 64 sends "eyeball identification information input error, please re-enter".
- the network access server of this embodiment verifies the identity of the network access user by using the eyeball identification information, thereby increasing the security of the network connection.
- FIG. 7 is a schematic structural diagram of a first preferred embodiment of a network access terminal according to the present invention.
- the network access terminal 70 includes: a processor, a first sending module 71, an obtaining module 72, a first receiving module 73, and a processing module 74.
- the processor is respectively associated with the first sending module 71 and the acquiring module. 72.
- the first receiving module 73 and the processing module 74 are connected.
- the first sending module 71 is configured to send a network access request to the network access server.
- the obtaining module 72 is configured to acquire first eyeball identification information, and send the first eyeball identification information to a network access server;
- the first receiving module 73 is configured to receive, by the network access server, a verification result returned according to the first eyeball identification information sent by the terminal; the verification result is determined by the network access server according to the first eyeball identification information, whether the preset is met. Obtained by network access conditions;
- the processing module 74 is configured to connect to the network when the verification result indicates that the verification is passed.
- the first sending module 71 sends a network access request to the server
- the terminal may be a device such as a mobile phone, a tablet computer or a notebook.
- the network access request for example, the user selects the wifi function on the terminal, and displays multiple connectable wifi on the screen, and the user selects the name as "CMCC" wifi for network connection operations;
- the obtaining module 72 acquires the first eyeball identification information, and sends the first eyeball identification information to the network access server; for example, the network connection request in the first sending module 71 carries the first eyeball identification information, and thus the first eyeball
- the identification information may be extracted from the network access request; of course, the current user's eyeball identification information may be acquired by the camera, and the current user's eyeball identification information is sent to the network access server;
- the first receiving module 73 receives the verification result returned by the server according to the first eyeball identification information sent by the obtaining module 72.
- the verification result is determined by the network access server according to the first eyeball identification information whether the preset network access condition is met. Obtaining; for example, the server corresponding to the "CMCC" verifies the current user's eyeball identification information to verify the identity of the user, and returns the verification result to the terminal after the verification is completed;
- the processing module 74 connects to the network when the verification result received by the first receiving module 73 indicates that the verification is passed. For example, the server corresponding to “CMCC” verifies the current user's eyeball identification information, and if the user's identity verification passes, the server allows the terminal to connect to “CMCC”.
- the terminal obtains the eyeball identification information when the network is connected, and verifies the identity of the user according to the acquired eyeball identification information, thereby controlling whether the terminal can be connected to the network, thereby increasing the security of the network connection. Sex.
- FIG. 8 is a schematic structural diagram of a second preferred embodiment of a network access terminal according to the present invention.
- the network access terminal 80 includes: a processor, a first sending module 81, an obtaining module 82, a first receiving module 83, and a processing module 84.
- the processor is respectively associated with the first sending module 81 and the acquiring module. 82.
- the first receiving module 83 and the processing module 84 are connected.
- the network access server 80 of this embodiment further includes a second receiving module 85, an acquiring module 86, and a second sending module 87.
- the second receiving module 85 is configured to access the network access server.
- the collecting module 86 is configured to collect the eyeball identification information of the current user according to the information registration request;
- the second sending module 87 is configured to connect to the network The incoming server sends the current user's eye identification information.
- the processor is further connected to the second receiving module 85, the collecting module 86, and the second sending module 87;
- the second receiving module 84 receives the information registration request sent by the server; before the user can use the network, when the application needs to be opened, the server needs to register the user information, including the ID card information, the mobile phone number, and the address, etc., of course, in order to connect to the network later.
- the server needs to authenticate the user, and also needs to obtain the eyeball identification information in advance.
- the second receiving module 84 can receive the server to send an information registration request, for example, send an eyeball identification information input prompt information to remind the user to enter the eyeball identification information.
- the collecting module 85 collects the eyeball identification information of the current user according to the information registration request; for example, the collecting module 85 collects the eyeball identification information of the current user through the camera;
- the second sending module 86 sends the eyeball identification information of the current user to the server; for example, the second sending module 86 sends the eyeball identification information of the current user collected by the collecting module 85 to the server, so as to facilitate subsequent use by the user when using the network.
- the server verifies the identity of the user through the eyeball identification information.
- the processing module 84 is further configured to display prompt information that the access network fails when the verification result is that the verification fails. For example, the server corresponding to the “CMCC” verifies the current user's eyeball identification information. If the user's identity verification fails, the processing module 84 may display the prompt information of the access network failure.
- the obtaining module 82 is specifically configured to receive an authentication request sent by the network access server, and collect first eyeball identification information according to the verification request; wherein the verification request is generated according to the network access request; and the first transmission is received at the server.
- the obtaining module 82 receives the verification request sent by the server.
- the verification request for example, the server corresponding to the CMCC sends an eyeball identification information entry prompt message to the terminal to prompt the user to enter the eyeball identification information; and then the obtaining module 82 collects the first eyeball identification information of the user through the camera.
- the terminal obtains the eyeball identification information when the network is connected, and verifies the identity of the user according to the acquired eyeball identification information, thereby controlling whether the terminal can be connected to the network, thereby increasing the security of the network connection. Sex.
- FIG. 9 is a schematic structural diagram of a network access system according to the present invention.
- the network access system 90 of this embodiment includes a network access server 91 and a network access terminal 92;
- the network access server 91 is configured to receive a network access request sent by the user's terminal, obtain first eyeball identification information according to the network access request, and determine, according to the first eyeball identification information, whether the terminal meets a preset network access condition. If the terminal is determined to satisfy the preset network access condition, the terminal is allowed to access the network.
- a network access terminal 92 configured to send a network access request to the network access server; acquire first eyeball identification information, and send the first eyeball identification information to the network access server; and receive the network access server according to The verification result returned by the first eyeball identification information; the verification result is obtained by the network access server determining whether the preset network access condition is met according to the first eyeball identification information; and when the verification result is verification pass, the connection is To the network.
- the terminal can be a device such as a mobile phone, a tablet or a notebook.
- Step S901 The network access terminal 92 sends a network access request to the network access server 91.
- Step S902 The network access server 91 receives the network access request sent by the network access terminal 92.
- Step S903 The network access server 91 acquires first eyeball identification information through the network access terminal 92.
- Step S904 The network access server 91 determines, according to the first eyeball identification information, whether the terminal satisfies a preset network access condition, and if the network access server 91 determines that the network access terminal 92 satisfies the preset network access condition, executing Step S905; otherwise, if the network access server 91 determines that the network access terminal 92 does not satisfy the preset network access condition, then step S906 is performed;
- Step S905 When the network access server 91 determines that the terminal meets the preset network access condition, the network access terminal 92 is allowed to access the network.
- Step S906 when the network access server 91 determines that the terminal does not satisfy the preset network access condition, sends prompt information to the network access terminal 92.
- the user may scan the available hotspots in the public place through the terminal, and then display the scanned available hotspots on the terminal, and the user detects the selection operation for any available hotspots through the terminal, and the server prompts to input the iris information for identity verification;
- the iris of the current user is collected by the iris recognition system and reported to the available hotspot, and the available hotspot sends the identifier of the user iris and the any available hotspot to the server, and the server compares whether the registered iris of the user iris and the available hotspot is Match, if matched, the server notifies any of the available hotspots, allowing the user terminal to access any of the available hotspots.
- the connection can access the hotspot.
- the server when the terminal connects to the network, the server acquires the eyeball identification information of the terminal, and the server verifies the identity of the user according to the acquired eyeball identification information, thereby increasing the security of the network connection.
- Each functional unit in the embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- the integrated module if implemented in the form of a software functional module and sold or used as a standalone product, may also be stored in a computer readable storage medium.
- the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
L'invention concerne un procédé d'accès à un réseau, un serveur, un terminal et un système. Le procédé d'accès au réseau consiste à : recevoir une demande d'accès au réseau envoyée par un terminal ; acquérir des premières informations de reconnaissance de globe oculaire selon la demande d'accès au réseau ; juger du fait que le terminal respecte ou non une condition d'accès au réseau prédéfinie selon les premières informations de reconnaissance de globe oculaire ; et autoriser le terminal à accéder à un réseau s'il est jugé que le terminal respecte la condition d'accès au réseau prédéfinie.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510719232.7A CN105163317A (zh) | 2015-10-28 | 2015-10-28 | 网络接入方法、服务器、终端及系统 |
| CN201510719232.7 | 2015-10-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017071348A1 true WO2017071348A1 (fr) | 2017-05-04 |
Family
ID=54804051
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/092418 Ceased WO2017071348A1 (fr) | 2015-10-28 | 2016-07-29 | Procédé d'accès au réseau, serveur, terminal et système |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN105163317A (fr) |
| WO (1) | WO2017071348A1 (fr) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111753170A (zh) * | 2020-07-04 | 2020-10-09 | 广州智云尚大数据科技有限公司 | 一种大数据快速检索系统及方法 |
| CN115242509A (zh) * | 2022-07-22 | 2022-10-25 | 河南警察学院 | 一种基于数据分析的网络接入用身份验证系统 |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105163317A (zh) * | 2015-10-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | 网络接入方法、服务器、终端及系统 |
| CN107249220A (zh) * | 2017-07-25 | 2017-10-13 | 上海与德科技有限公司 | 一种网络通讯的连接方法及装置 |
| CN112541173B (zh) * | 2020-12-02 | 2024-12-17 | 深圳市鹰硕技术有限公司 | 一种基于笔顺、ocr及人工智能的终端接入方法及系统 |
| CN114389716B (zh) * | 2021-12-14 | 2024-06-07 | 中科创达软件股份有限公司 | 一种终端接入方法、装置、设备及存储介质 |
| CN119052950B (zh) * | 2024-10-31 | 2025-02-11 | 湖南于一科技有限公司 | 基于鸿蒙系统的设备无线连接方法及系统 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020066041A1 (en) * | 2000-11-30 | 2002-05-30 | Steve Lemke | Security technique for controlling access to a network by a wireless device |
| CN101795453A (zh) * | 2008-12-31 | 2010-08-04 | 英特尔公司 | 用于建立设备连接的方法和装置 |
| US20130127591A1 (en) * | 2011-11-20 | 2013-05-23 | International Business Machines Corporation | Secure facilities access |
| CN105163317A (zh) * | 2015-10-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | 网络接入方法、服务器、终端及系统 |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102201061B (zh) * | 2011-06-24 | 2012-10-31 | 常州锐驰电子科技有限公司 | 基于多阶层过滤人脸识别的智能安全监控系统及方法 |
-
2015
- 2015-10-28 CN CN201510719232.7A patent/CN105163317A/zh active Pending
-
2016
- 2016-07-29 WO PCT/CN2016/092418 patent/WO2017071348A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020066041A1 (en) * | 2000-11-30 | 2002-05-30 | Steve Lemke | Security technique for controlling access to a network by a wireless device |
| CN101795453A (zh) * | 2008-12-31 | 2010-08-04 | 英特尔公司 | 用于建立设备连接的方法和装置 |
| US20130127591A1 (en) * | 2011-11-20 | 2013-05-23 | International Business Machines Corporation | Secure facilities access |
| CN105163317A (zh) * | 2015-10-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | 网络接入方法、服务器、终端及系统 |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111753170A (zh) * | 2020-07-04 | 2020-10-09 | 广州智云尚大数据科技有限公司 | 一种大数据快速检索系统及方法 |
| CN111753170B (zh) * | 2020-07-04 | 2021-08-17 | 上海德吾信息科技有限公司 | 一种大数据快速检索系统及方法 |
| CN115242509A (zh) * | 2022-07-22 | 2022-10-25 | 河南警察学院 | 一种基于数据分析的网络接入用身份验证系统 |
| CN115242509B (zh) * | 2022-07-22 | 2023-10-17 | 河南警察学院 | 一种基于数据分析的网络接入用身份验证系统 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105163317A (zh) | 2015-12-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2017071348A1 (fr) | Procédé d'accès au réseau, serveur, terminal et système | |
| WO2014040501A1 (fr) | Procédé et système pour générer et autoriser un mot de passe dynamique | |
| WO2011014037A2 (fr) | Système pour gérer des terminaux non enregistrés avec des informations d'authentification partagées et procédé correspondant | |
| WO2015157942A1 (fr) | Dispositif et procédé d'accès à un réseau sans fil | |
| WO2015016627A1 (fr) | Procédé et dispositif permettant de connecter un seul dispositif ap parmi de multiples dispositifs ap dans le même réseau sur un terminal | |
| WO2016111600A1 (fr) | Authentification mutuelle entre équipement utilisateur et cœur de réseau paquet évolué | |
| WO2014030889A1 (fr) | Procédé et appareil de partage de contenu | |
| EP3028403A1 (fr) | Appareil domestique et procédé de commande de celui-ci | |
| WO2017206883A1 (fr) | Procédé et appareil de traitement d'applications, support de stockage, et dispositif électronique | |
| WO2019156506A1 (fr) | Système et procédé de fourniture de contenus conversationnels | |
| WO2017067286A1 (fr) | Procédé et dispositif pour mettre à jour un modèle d'empreinte digitale, et terminal | |
| WO2016065619A1 (fr) | Procédé et dispositif de gestion de trafic de données | |
| WO2019051898A1 (fr) | Procédé et appareil de commande de dispositif, et support d'informations lisible par ordinateur | |
| WO2014019139A1 (fr) | Procédé, dispositif et système pour la mise en œuvre d'une libération d'une connexion de contrôle de ressource radio | |
| WO2018076812A1 (fr) | Procédé et dispositif de réponse à une demande de données, support de stockage, serveur et système | |
| WO2018190637A1 (fr) | Procédé d'établissement d'une liaison de communication d'un dispositif et appareil associé | |
| WO2018076840A1 (fr) | Procédé de partage de données, dispositif, support de stockage et serveur | |
| WO2018129960A1 (fr) | Procédé, dispositif de traitement de scintillement d'écran, support de mémoire et dispositif électronique | |
| EP3108663A1 (fr) | Procédé pour créer un contenu et dispositif électronique associé | |
| WO2018076873A1 (fr) | Procédé de partage de données, appareil, support, dispositif électronique, et système | |
| WO2020171466A1 (fr) | Dispositif électronique et procédé d'authentification dans le dispositif électronique | |
| WO2016126023A1 (fr) | Appareil de diffusion et procédé d'authentification de données de diffusion | |
| WO2015016655A1 (fr) | Procédé et appareil pour établir une communication entre des terminaux | |
| WO2018076870A1 (fr) | Procédé et appareil de traitement de données, support de stockage, serveur, et système de traitement de données | |
| WO2021241849A1 (fr) | Dispositif électronique pour la réalisation d'un service informatique périphérique et procédé de fonctionnement de dispositif électronique |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16858787 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16858787 Country of ref document: EP Kind code of ref document: A1 |