Method and system for accessing internet by mobile terminal

A mobile terminal and Internet technology, applied in the transmission system, electrical components, wireless communication, etc., can solve the problem that identity information can only be used to access the same website, access to the Internet is not safe, and achieve the effect of ensuring safety and avoiding loss

Active Publication Date: 2013-04-03
深圳市雅阅科技有限公司
3 Cites 20 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] In view of this, the main purpose of the present invention is to provide a method and system for a mobile terminal to access the Internet to solve the problem of insec...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a method for accessing internet by a mobile terminal. The method comprises the following steps that: a browser of the mobile terminal and a security authentication server determine identity information required for accessing the internet; the browser of the mobile terminal sends a hypertext transfer protocol (HTTP) request carrying the identity information and used for accessing the website to a net/wireless application protocol (WEB/WAP) server when needing to access a website; and the WEB/WAP server receives the HTTP request, validates the identity information in the HTTP request to the security authentication server, and returns a page of the website to the browser of the mobile terminal after the validation. The invention also discloses a system for accessing the internet by the mobile terminal to ensure the safety of the identity information when the mobile terminal accesses the internet. In addition, the identity information can be used to access a plurality of different websites.

Application Domain

Technology Topic

Image

  • Method and system for accessing internet by mobile terminal
  • Method and system for accessing internet by mobile terminal
  • Method and system for accessing internet by mobile terminal

Examples

  • Experimental program(1)

Example Embodiment

[0067] Example one
[0068] In this embodiment, such as figure 2 As shown, the system for accessing the Internet by a mobile terminal may include a mobile terminal, a mobile gateway, a security authentication server, a WEB/WAP server, and a WEB/WAP login server, where the mobile terminal is a mobile device capable of running a browser, such as a mobile phone; The gateway is used to provide access capabilities for mobile terminals to access the Internet, the security authentication server is used to provide security verification services and the services of mobile terminal configuration delivery; the WEB/WAP server is used to provide Internet access services, which can provide mobile terminals with required access Web pages and other content of the website; WEB/WAP login server is used to provide login services for Internet websites, and can provide mobile terminals with content such as the login pages that need to be accessed.
[0069] In this embodiment, through figure 2 In the system shown, the specific process for the mobile terminal to access the Internet may include the following steps:
[0070] Step 301: The browser of the mobile terminal obtains configuration information from the security authentication server through a private encryption protocol and saves it locally. The configuration information includes: the header name of the identity information, the configuration list of domain names that allow reading of identity information, and the configuration of allowed writing of identity information List
[0071] Wherein, the identity information may include a header name and a value, and the value of the identity information may be a character string generated based on an encryption algorithm, which is stored in the browser of the mobile terminal and the security authentication server, respectively, and can be changed during the user login process. The WEB/WAP login server generates and sends to the browser and security authentication server of the mobile terminal. The header name of the identity information is used to identify the identity information.
[0072] The configuration list of domain names allowed to read identity information includes domain names of websites that are allowed to be accessed through the identity information.
[0073] The configuration list of domain names allowed to write identity information includes the domain names of websites that allow writing identity information to the mobile terminal browser.
[0074] Step 302: When the browser of the mobile terminal needs to access a website, it is verified whether the domain name of the website is included in the configuration list of domain names allowed to read identity information, if yes, proceed to step 303, if not, end the current process;
[0075] Step 303: The browser of the mobile terminal sends an HTTP request for accessing the website to the WEB/WAP server, for example, the Uniform/Universal Resource Locator (URL, Universal Resource Locator) of the website, and the HTTP request Add the identity information needed to visit the website in the header;
[0076] Here, if the value of the identity information is currently stored in the browser of the mobile terminal, the HTTP header contains the header name and value of the identity information; if the browser of the mobile terminal is currently If the value of the identity information has not been saved, the value of the identity information contained in the HTPP header may be empty.
[0077] Step 304: After receiving the HTTP request sent by the browser of the mobile terminal, the WEB/WAP server extracts the identity information of the HTTP header in the HTTP request and verifies it with the security authentication server. If the verification is passed, proceed to step 305; if If the verification fails, proceed to step 306;
[0078] Here, the verification to the security authentication server may include: the WEB/WAP server sends the identity information to the security authentication server, and the security authentication server queries the value of the identity information locally according to the header name of the identity information, and if it can query If the value of the identity information is found, and the queried value is consistent with the value of the identity information sent by the WEB/WAP server, the verification is passed; otherwise, the verification fails.
[0079] Step 305: The WEB/WAP server returns the webpage of the website to the browser of the mobile terminal, and the browser of the mobile terminal receives the webpage of the website and displays it to the user, and the current process ends;
[0080] Step 306: The WEB/WAP server informs the browser of the mobile terminal to access the login page of the website by redirecting;
[0081] Here, the WEB/WAP server informs the browser of the mobile terminal to access the login page of the website by redirecting, and returns an HTTP response to the browser of the mobile terminal. The HTTP response may specifically be the URL of the website login page. Wait.
[0082] Step 307: The browser of the mobile terminal sends an HTTP request to the WAP/WEB login server to access the website login page to perform the user login process. When the login is successful, the WAP/WEB login server generates the value of the identity information, and then The browser of the mobile terminal is redirected to the website to be visited, and the value of the identity information is added to the HTTP header of the HTTP response returned to the browser of the mobile terminal, and at the same time, the value of the identity information is synchronized to Security authentication server;
[0083] Here, the aforementioned user login process may specifically include the following steps:
[0084] Step 1. The browser of the mobile terminal sends an HTTP request to the WAP/WEB login server to access the website login page, and the HTTP request may be a URL returned by the WEB/WAP server to the browser of the mobile terminal;
[0085] Step 2: The WAP/WEB login server receives the HTTP request sent by the browser of the mobile terminal, and returns the login page of the website to the browser of the mobile terminal;
[0086] Step 3. The browser of the mobile terminal receives the login page of the website and displays it to the user. The login page of the website prompts the user to enter the account and password. After the user enters the account and password on the login page, the mobile terminal browses The device sends the account and password entered by the user to the WAP/WEB login server;
[0087] Here, the account and password used for input correspond to the identity information and have been pre-stored in the WAP/WEB login server. The WAP/WEB login server can follow the preset encryption algorithm every time the login page is accessed. The identity information value corresponding to the account and password is dynamically generated.
[0088] Step 4. The WAP/WEB login server verifies the account and password entered by the user. If the verification is successful, proceed to step 5; if the verification is unsuccessful, proceed to step 6;
[0089] Specifically, the WAP/WEB login server verifies whether the account and password saved by itself are completely consistent with the account and password entered by the user, if yes, the verification is successful, if not, the verification is unsuccessful.
[0090] Step 5: The login is successful, the WAP/WEB login server generates the value of the identity information according to the preset encryption algorithm, and ends the current user login process;
[0091] Step 6, verify whether the number of times the user enters the account and password reaches the preset threshold, if yes, the login is unsuccessful and the current process ends; if not, return to step 2.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Classification and recommendation of technical efficacy words

  • Ensure safety
  • Avoid loss

Transaction verification method and system based on block chain

ActiveCN106548330APrevent balance leakageEnsure safetyPayment protocolsPayment circuitsVerification systemComposite number
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products