A WLAN access authentication method, related equipment and system
A technology of access authentication and authentication methods, applied in the field of communication, can solve problems such as poor user experience and single WLAN access authentication methods, and achieve the effect of improving user experience and realizing diversification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0107] In the embodiment of the present invention, the terminal user selects a temporary subscription service request authentication as an example, image 3 A flow chart of a WLAN access authentication method provided in an embodiment of the present invention, specifically including the following processing steps:
[0108] Step 301, the terminal establishes a connection with an AP in the WLAN.
[0109] Specifically, the terminal can send out a probe request, requesting to connect to the AP of the WLAN, and after the AP returns a probe response, the terminal can access the AP based on the service set identifier (SSID, Service Set Identifier) and password of the local area network where it is located.
[0110] In step 302, the AC assigns an IP address to the terminal after detecting that the terminal establishes a connection with the AP.
[0111] Step 303, the terminal sends an HTTP request to the Portal server through the AC according to the IP address assigned by the AC.
...
Embodiment 2
[0135] In this embodiment of the present invention, the terminal user chooses to request authentication from the subscription service as an example. Based on Embodiment 1 of the present invention, Embodiment 2 of the present invention performs authentication on the terminal after step 308 in Embodiment 1. In Embodiment 2 of the present invention The authentication mode selection information is that the terminal user triggers the terminal to send to the Portal server by selecting the forward order service authentication button on the comprehensive authentication page, that is, steps 401-405 are executed after the aforementioned step 308, as Figure 4 shown, including:
[0136] Step 401 , the authentication server searches whether there is user information of the terminal in the pre-stored forward subscription relationship, if yes, go to step 402 , if not, go to step 404 .
[0137] Wherein, the forward subscription relationship records user information such as user names, passwo...
Embodiment 3
[0145] Based on the same inventive concept, according to the WLAN access authentication method provided by the above-mentioned embodiments of the present invention, correspondingly, another embodiment of the present invention also provides a WLAN access authentication device, a schematic structural diagram thereof, as shown in Figure 5 shown, including:
[0146] The first sending unit 501 is configured to send a comprehensive authentication page to the terminal after the acquired HTTP request of the terminal, and the comprehensive authentication page provides at least two authentication methods for the terminal;
[0147] The first receiving unit 502 is configured to receive authentication mode selection information and account information sent by the terminal;
[0148] The second sending unit 503 is configured to send an authentication request to the authentication server through the access controller AC, where the authentication request carries the authentication mode select...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


