Web authentication method and system

An authentication method and an authentication server technology, which are applied in the field of Web authentication methods and systems, and can solve the problems that users' Internet terminals cannot perform Web authentication, etc.

Inactive Publication Date: 2012-11-28
ZTE CORP
View PDF13 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the user's Internet access terminal is a dual-stack user, the user's Internet access terminal may use an IPv6 address to access the network when performing web authentication, while traditional web

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web authentication method and system
  • Web authentication method and system
  • Web authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] figure 2 It is a schematic flow diagram of Embodiment 1 of the Web authentication method of the present invention, and it is a specific implementation method of the Web authentication method in the scenario where the user accesses the Internet terminal to obtain an IPv4 address and an IPv6 address, and accesses an IPv6 Web page, such as figure 2 As shown, the method includes the following steps:

[0079] Step 201, the user's online terminal goes online and obtains an IPv4 address and an IPv6 address. At this time, the state of the user's online terminal on the BNG is unauthenticated, and the access authority of the user's online terminal is restricted, and only the IPv4 Web authentication server of the operator is allowed to visit.

[0080] In step 202, the user's Internet access terminal accesses a Web page based on the IPv6 address.

[0081] In step 203, the BNG intercepts the IPv6 HTTP access request in the process of the user's Internet access terminal accessing ...

Embodiment 2

[0084] image 3 It is a schematic flow diagram of the second embodiment of the Web authentication method of the present invention, and it is a specific implementation method of the Web authentication method in the scenario where the user accesses the Internet terminal to obtain an IPv4 address and an IPv6 address, and accesses an IPv4 Web page, such as image 3 As shown, the method includes the following steps:

[0085] Step 301, the user's online terminal goes online and obtains an IPv4 address and an IPv6 address. At this time, the state of the user's online terminal on the BNG is unauthenticated, and the access authority of the user's online terminal is restricted, and only allows access to the operator's IPv4 Web authentication server.

[0086] Step 302, the user's Internet access terminal accesses a Web page based on the IPv4 address.

[0087] In step 303, the BNG intercepts the IPv4 HTTP access request in the process of the user's Internet access terminal accessing the ...

Embodiment 3

[0090] Figure 4 It is a schematic flow chart of Embodiment 3 of the Web authentication method of the present invention, and it is a specific implementation method of the Web authentication method in the scenario where the user's Internet access terminal first obtains an IPv4 address, then performs Web authentication, and finally obtains an IPv6 address, such as Figure 4 As shown, the method includes the following steps:

[0091] Step 401, the user's Internet access terminal goes online and obtains an IPv4 address. At this time, the state of the user's Internet access terminal on the BNG is unauthenticated, and the access authority of the user's Internet access terminal is restricted, only allowing access to the operator's IPv4 Web authentication server.

[0092] Step 402, the user's Internet access terminal accesses a Web page based on the IPv4 address.

[0093] In step 403, the BNG intercepts the IPv4 HTTP access request in the process of the user's Internet access terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Web authentication method, which comprises the following steps that: a network access user terminal acquires an Internet protocol version 4 (IPv4) address or an IPv4 address and an IPv6 address, a broadband network gateway (BNG) limits the right of the network access user terminal over access to an IPv4 network and an IPv6 network, and when the network access user terminal accesses a Web page, the BNG reorients a hypertext transfer protocol (HTTP) access request transmitted by the network access user terminal in an access process to a Web authentication server of the IPv4 network; or the network access user terminal acquires the IPv6 address, the BNG limits the right of the network access user terminal over the access to the IPv6 network, and when the network access user terminal accesses the Web page, the BNG reorients the HTTP access request transmitted by the network access user terminal in the access process to an IPv6 friendly page. According to the technical scheme, when the network access user terminal of a double-stack user uses the IPv6 address, Web authentication can be realized.

Description

technical field [0001] The invention relates to a broadband access technology of a wireless local area network (WLAN, Wireless Local Area Networks), in particular to a Web authentication method and system. Background technique [0002] Network (Web) authentication is widely used in current WLAN broadband access technologies. The main process of IPv4 Web authentication is as follows: first, when a user's Internet access terminal (for example, user equipment (UE, UserEquipment), computer, etc.) enters a WLAN hotspot, it accesses the broadband network gateway control through an access point (AN, Access Node). The device (BNG, Broadband Network Gatewny) obtains the IPv4 address from the BNG. At this time, the user's Internet access terminal does not have the right to access the network. When a user's Internet access terminal accesses any web page through HyperText Transfer Protocol (HTTP), BNG uses HTTP redirection technology to redirect the page accessed by the user's Internet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L29/12
Inventor 袁博范亮陈勇王姝懿
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products