Authentication method and system and proxy server

一种认证服务器、代理服务器的技术,应用在系统及代理服务器,认证方法领域,能够解决手工输入账号信息易输错、无法使用方案、交互方式繁琐等问题

Active Publication Date: 2016-11-16
TENCENT TECH (BEIJING) CO LTD
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Solution 1: Display the WIFI login account information in a more eye-catching place in the business place, such as the menu or on the wall of the store. The disadvantage is that the user needs to manually connect to the merchant WIFI and manually enter the account information used to log in to WIFI. In addition to this interactive method In addition to being cumbersome, manually entering account information is very easy to make mistakes
like Figure 1-2 Shown is a schematic diagram of realizing WIFI login by following the official account of the merchant. The account information for logging in to WIFI is obtained through the keywords of the official account. The information is still the account information used to log in to WIFI, such as the user name "XXXXXXX" and password "YYY", but the user does not need to enter the account information one by one, but just copy and paste the account information, which is similar to the solution 1. There is no qualitative leap, and the interaction method is still relatively cumbersome
[0006] Option 3: Similar to Option 2, the official account of the merchant is also used, such as image 3 Shown is a schematic diagram of realizing WIFI login by following the official account of the merchant. It is an optional way to follow the official account after connecting to the WIFI login through WeChat first. Following the official account is not a necessary condition. The disadvantage is: need to use A special application (such as WeChat application) is used to realize the access of WIFI login. Although there is no need to manually enter the login information, the interaction method will be limited. If the special application (such as WeChat application) is not installed, this solution cannot actually be used
[0007] For the above problems, there is no effective solution in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system and proxy server
  • Authentication method and system and proxy server
  • Authentication method and system and proxy server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0049] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, the use of suffixes such as "module", "component" or "unit" used to represent elements is only to facilitate the description of the embodiments of the present invention, and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0050]In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been disclosed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and system and a proxy server The method comprises the steps that a terminal obtains a to-be-visited address inputted by a browser webpage, and sends a first request according to the to-be-visited address; the proxy server returns a response with a redirection address to the terminal according to the first request; the terminal sends a second request to an authentication server according to the redirection address, wherein the second request carries out the hardware information of the terminal; the authentication server obtains the hardware information from the second request, generates a first identification parameter according to the hardware information, and transmits the first identification parameter to the terminal; the terminal transmits a third request for authentication to the proxy server according to the first identification parameter; the proxy server employs the first identification parameter to request the authentication server to carry out the verification of the effectiveness of the first identification parameter, and passes the authentication request of the terminal when the verification is passed.

Description

technical field [0001] The invention relates to communication technology, in particular to an authentication method, system and proxy server. Background technique [0002] With the development of smart terminals and Internet technology, users can connect to the Internet with WIFI hotspots or mobile data networks (such as 2G, 3G or 4G) at any time, so as to realize convenient life services through various applications installed on smart terminals. [0003] At present, more and more merchants can provide users with free WIFI services, so that customers can access the wireless network at any time when they enter the store, and enjoy various networking services. There are several implementation plans as follows: [0004] Solution 1: Display the WIFI login account information in a more eye-catching place in the business place, such as the menu or on the wall of the store. The disadvantage is that the user needs to manually connect to the merchant WIFI and manually enter the accou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876H04W8/18H04W8/26H04W84/12H04L63/0884H04L63/108H04W12/08H04W12/069H04L2101/622H04L67/563H04L63/12
Inventor 王伏根
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products