Portal authentication method and system
An authentication method and authentication system technology, applied in the field of portal authentication, can solve the problem of consuming the network resources of merchants, and achieve the effect of saving bandwidth resources and speeding up the push.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] The first embodiment is a portal authentication method, which is applied to a portal authentication system including a wireless access device and a portal server. The wireless access device includes a storage unit, such as figure 1 Shown, including steps:
[0064] S10, the portal server sends an authentication page to the wireless access device and stores it in the storage unit, the authentication page includes at least an authentication interface and an information push interface;
[0065] S20: When the wireless access device receives an unauthenticated user terminal requesting access to external network information, the wireless access device sends the authentication page to the user terminal;
[0066] S30: The wireless access device receives the authentication information sent by the user terminal, and forwards the authentication information to the portal server;
[0067] S40: The portal server sends an authentication result to the wireless access device;
[0068] S50: The wir...
Embodiment 2
[0075] The second embodiment further refines step S20 on the basis of the first embodiment, such as figure 2 As shown, the implementation steps of step S20 include:
[0076] S21: The wireless access device receives the first connection request message of the user terminal;
[0077] S22: The wireless access device obtains the identification information of the user terminal and the target IP address of the first connection request message from the first connection request message;
[0078] S23: The wireless access device compares the identification information of the user terminal with a pre-stored authentication list to determine whether the user terminal has been authenticated;
[0079] S24: When the user terminal has not been authenticated and the target IP address is an external network address, the wireless access device sends an authentication page to the user terminal.
[0080] After the user terminal is connected to the wireless access device, it sends a first connection request ...
Embodiment 3
[0086] On the basis of the first embodiment, the third embodiment further refines the wireless access device sending the authentication page to the user terminal in step S20, including the steps:
[0087] S25: The wireless access device sends a redirection message to the user terminal, where the redirection message specifies that the redirection address is an IP address of a LAN port of the wireless access device;
[0088] S26: The wireless access device receives a second connection request message from the user terminal, where the target IP address of the second connection request message is the IP address of the LAN port of the wireless access device;
[0089] S27: After receiving the second connection request message, the wireless access device sends connection approval response information to the user terminal, where the connection approval response information includes the authentication page.
[0090] When the wireless access device receives an unauthorized user terminal requesti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 