US 12,267,304 B2
System for authenticating and controlling network access of terminal, and method therefor
Young Rang Kim, Seoul (KR)
Assigned to PRIBIT Technology, Inc., Seoul (KR)
Appl. No. 17/656,172
Filed by PRIBIT Technology, Inc., Seoul (KR)
PCT Filed Sep. 24, 2020, PCT No. PCT/KR2020/012929
§ 371(c)(1), (2) Date Mar. 23, 2022,
PCT Pub. No. WO2021/060859, PCT Pub. Date Apr. 1, 2021.
Application 17/656,172 is a continuation in part of application No. 16/580,974, filed on Sep. 24, 2019, granted, now 11,381,557.
Application 17/656,172 is a continuation in part of application No. 16/580,866, filed on Sep. 24, 2019, granted, now 11,190,494, issued on Nov. 30, 2021.
Claims priority of application No. 10-2020-0100062 (KR), filed on Aug. 10, 2020.
Prior Publication US 2022/0247721 A1, Aug. 4, 2022
Int. Cl. H04L 9/40 (2022.01); H04L 47/20 (2022.01); H04L 47/24 (2022.01)
CPC H04L 63/029 (2013.01) [H04L 47/20 (2013.01); H04L 47/24 (2013.01); H04L 63/0236 (2013.01); H04L 63/0263 (2013.01); H04L 63/0272 (2013.01); H04L 63/0428 (2013.01); H04L 63/08 (2013.01); H04L 63/126 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A terminal comprising:
a communication circuit;
a processor operatively connected to the communication circuit; and
a memory operatively connected to the processor and configured to store a target application and an access control application, wherein the memory stores instructions that cause, when executed by the processor, the terminal to:
detect a network access event for a destination network of the target application through the access control application;
determine whether data flow information corresponding to identification information of the target application and the destination network is present and generated from an external server, through the access control application;
perform authentication of a data flow based on authentication information included in the data flow information, through the access control application;
request the external server to confirm whether the authentication of the data flow is valid;
receive information from the external server to create a tunnel between the terminal and a gateway, and create a tunnel based on the information;
transmit a data packet using the tunnel, when the authentication of the data flow is confirmed to be valid and the tunnel exists between the terminal and the gateway, or drop the data packet when the data flow information is not present or the authentication of the data flow is not valid.