ADSL wireless router, method and system for using the same to realize captive portal under bridge pattern

A technology of wireless routers and captive portals, applied in transmission systems, electrical components, telephone communications, etc., can solve the problems that ADSL wireless routers cannot realize captive portal authentication

Active Publication Date: 2015-10-21
湖州帷幄知识产权运营有限公司
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the above-mentioned ADSL wireless router cannot realize captive portal authentication in bridge mod

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ADSL wireless router, method and system for using the same to realize captive portal under bridge pattern
  • ADSL wireless router, method and system for using the same to realize captive portal under bridge pattern
  • ADSL wireless router, method and system for using the same to realize captive portal under bridge pattern

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Linux Netfilter (firewall) is an important module component of the Linux kernel. Its task is to perform packet filtering actions, including INPUT (input), OUTPUT (output) and FORWARD (forwarding) chains, used to process input, output and Forward packets. Using this framework, you can also customize the kernel data packet processing process and provide a registration hook function mechanism. For example, if you register a hook function under the FORWARD chain, all data packets passing through the FORWARD chain will pass through the custom hook function to implement data packet processing. Customized analysis processing and transformation.

[0073] In order to solve the problem that the existing ADSL wireless router does not have DHCP service and domain name agent in bridge mode, and cannot realize the captive portal authentication through domain name agent deception, such as figure 1 As shown, the present invention provides a kind of ADSL wireless router, in described r...

Embodiment 2

[0102] When implementing captive portal authentication, there are still some special situations. You can connect to the network you need without mandatory authentication. There are the following special situations:

[0103] 1. Some network addresses do not require captive portal authentication, such as the router owner’s merchant’s website, etc.;

[0104] 2. Some clients do not require captive portal authentication, such as router owner clients;

[0105] 3. Some subnets do not require captive portal authentication, and routers can have multiple subnetworks. Some subnets are used to provide public network services, and these subnets require captive portal authentication; other subnets are used to provide router owners internal Using , this subnet does not require captive portal authentication.

[0106] Captive portal authentication is not required in order to implement special cases such as figure 2 As shown, the ADSL wireless router provided by the present embodiment basica...

Embodiment 3

[0133] Data packets come in from different interfaces. For example, it can be set as, for example, packets coming in from interface ra0 indicate that they are data packets coming in from the wireless port, and they are also uplink packets that need to be forwarded; packets coming in from interface eth2 indicate that they are The data packets coming in from the wired WAN port are downlink packets, which are returned to the user’s request. For the downlink packets, the module will let them all go and not process them.

[0134] Such as image 3 As shown, the router provided in this embodiment is basically the same as that in Embodiment 1, the difference is:

[0135] The judgment module also includes:

[0136] The interface judging sub-module is used for judging that the data packet enters the interface, and if the packet enters through the wired interface, the data packet is passed over.

[0137] After the data message enters the router, the data message enters the interface to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ADSL wireless router and a method and a system for using the router to realize a captive portal under a bridge pattern. A captive portal unit is arranged in a Linux kernel of the router. The captive portal unit comprises a storage module for storing network address of the captive portal; an intercepting and capturing module for intercepting and capturing a data message transmitted by a client; a judging module for judging whether the data message is a Get request message in a Http message; a processing module for generating a replying message comprising redirected network address according to the portal network address stored by the storing module; and a replying module for returning the replying message back to the browser of the client, wherein the browser of the client will initiate a new request to require the redirected network address so as to achieve the function of the captive portal.

Description

technical field [0001] The invention relates to an ADSL wireless router, in particular to a method and a system for realizing a captive portal in the bridge mode by using the ADSL wireless router in the bridge mode. Background technique [0002] A captive portal is typically a page that users using a publicly accessible network must visit and interact with before being granted access. Captive portals are commonly used in business centers, airports, hotel lobbies, coffee shops and other public places that provide free Wi-Fi hotspot service to Internet users. In a network with a captive portal, the first time a user logs in, he is presented with a Web page that requires certain actions before being granted access to the Internet. A simple captive portal would force users to at least glance at the Acceptable User Policy page, then click a button to agree to the terms of the policy. In some captive portals, advertisements sponsored by the service provider are displayed, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04M11/06
CPCH04L63/02H04L63/0209H04L67/02H04M11/06
Inventor 吴振华
Owner 湖州帷幄知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products