Unlock instant, AI-driven research and patent intelligence for your innovation.

Portal authentication method and system

An authentication method and authentication system technology, applied in the field of portal authentication, can solve the problem of consuming the network resources of merchants, and achieve the effect of saving bandwidth resources and speeding up the push.

Inactive Publication Date: 2016-11-23
PHICOMM (SHANGHAI) CO LTD
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Merchants often insert a large amount of advertisements or other information into the portal pages to achieve their business goals, and the router and portal server are often not in the same area, so the above steps consume a lot of network resources of the merchants to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portal authentication method and system
  • Portal authentication method and system
  • Portal authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] The first embodiment is a portal authentication method, which is applied to a portal authentication system including a wireless access device and a portal server. The wireless access device includes a storage unit, such as figure 1 Shown, including steps:

[0064] S10, the portal server sends an authentication page to the wireless access device and stores it in the storage unit, the authentication page includes at least an authentication interface and an information push interface;

[0065] S20: When the wireless access device receives an unauthenticated user terminal requesting access to external network information, the wireless access device sends the authentication page to the user terminal;

[0066] S30: The wireless access device receives the authentication information sent by the user terminal, and forwards the authentication information to the portal server;

[0067] S40: The portal server sends an authentication result to the wireless access device;

[0068] S50: The wir...

Embodiment 2

[0075] The second embodiment further refines step S20 on the basis of the first embodiment, such as figure 2 As shown, the implementation steps of step S20 include:

[0076] S21: The wireless access device receives the first connection request message of the user terminal;

[0077] S22: The wireless access device obtains the identification information of the user terminal and the target IP address of the first connection request message from the first connection request message;

[0078] S23: The wireless access device compares the identification information of the user terminal with a pre-stored authentication list to determine whether the user terminal has been authenticated;

[0079] S24: When the user terminal has not been authenticated and the target IP address is an external network address, the wireless access device sends an authentication page to the user terminal.

[0080] After the user terminal is connected to the wireless access device, it sends a first connection request ...

Embodiment 3

[0086] On the basis of the first embodiment, the third embodiment further refines the wireless access device sending the authentication page to the user terminal in step S20, including the steps:

[0087] S25: The wireless access device sends a redirection message to the user terminal, where the redirection message specifies that the redirection address is an IP address of a LAN port of the wireless access device;

[0088] S26: The wireless access device receives a second connection request message from the user terminal, where the target IP address of the second connection request message is the IP address of the LAN port of the wireless access device;

[0089] S27: After receiving the second connection request message, the wireless access device sends connection approval response information to the user terminal, where the connection approval response information includes the authentication page.

[0090] When the wireless access device receives an unauthorized user terminal requesti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a portal authentication method applied to a portal authentication system including a wireless access device and a portal server, wherein the wireless access device comprises a storage unit. The method includes the following steps that: the portal server sends an authentication page to the wireless access device, and the authentication page is stored the storage unit, wherein the authentication page at least comprises an authentication interface and an information push interface; when the wireless access device receives an outer network information access request of a non-authenticated user terminal, the wireless access device sends the authentication page to the user terminal; the wireless access device receives authentication information sent by the user terminal and forwards the authentication information to the portal server; and the portal server sends an authentication result to the wireless access device. With the portal authentication method and system of the invention adopted, the push of authentication pages, in particular, advertising information containing a large quantity of information, can be accelerated, and bandwidth resources between the portal server and the wireless access device can be saved.

Description

Technical field [0001] The invention relates to an authentication method, in particular to a portal authentication method. Background technique [0002] In the field of commercial routers, portal authentication methods are often used to provide businesses or enterprise users with services such as pushing advertisements and authenticating Internet access. [0003] The currently commonly used portal authentication methods and procedures are as follows, assuming that baidu.com is the domain name of the target server accessed by the user device, and portal.com is the domain name of the portal server. [0004] Step 1. The unauthenticated user equipment obtains the IP address of baidu.com through DNS (Domain Name System) resolution, and after three successful handshake with Baidu server TCP (Transmission Control Protocol), the user equipment and Baidu The server establishes a TCP connection. [0005] Step 2: After the TCP connection is successfully established, the unauthenticated user equ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/08
CPCH04W12/06H04L67/55
Inventor 吴迪
Owner PHICOMM (SHANGHAI) CO LTD