Network access method and system based on access authentication

A technology for access authentication and access to the network, which is applied in the field of access to the network based on the secure socket layer hypertext transfer protocol access authentication, which can solve the problems of short-term and inability to access the network, and achieve the effect of solving the short-term inability to access the network

Inactive Publication Date: 2017-08-18
PHICOMM (SHANGHAI) CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is to provide a method and system for accessing the network ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method and system based on access authentication
  • Network access method and system based on access authentication
  • Network access method and system based on access authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Such as figure 2Shown is a flowchart of a method for accessing a network based on access authentication described in this embodiment, and the method includes:

[0043] S10: judging whether the information about the success status of Portal authentication has been delivered to the terminal;

[0044] Before this step, the user sends a series of requests through the terminal. After receiving the request, the HTTPS authentication processing module sends an authentication page to the terminal. After the user fills in the relevant authentication information on the terminal, it sends it to the Portal authentication server for authentication. After the authentication, the Portal authentication server will judge the authentication status; if the authentication is successful, the Portal authentication success information will be sent to the terminal; if it is unsuccessful, the information will be sent to the HTTPS authentication processing module, and the HTTPS authentication pr...

Embodiment 2

[0069] The difference between this embodiment and the previous embodiments is that in this embodiment, a disconnection step is further included before redirecting the page accessed by the terminal.

[0070] Such as Figure 4 Shown is a flow chart of a method for accessing a network based on access authentication described in this embodiment, and the method further includes:

[0071] Disconnect the currently established HTTPS session connection.

[0072] If the HTTPS protocol is used for network access, the operation of disconnecting the currently established HTTPS session connection before redirecting the page accessed by the terminal can make the connection port of the terminal idle, which is convenient for establishing a session with the web server and redirecting The page accessed by the terminal is in contact with the server to form a double guarantee to ensure a smooth online experience.

[0073] Correspondingly, such as Figure 5 Shown is a system structure diagram of...

Embodiment 3

[0076] The difference between this embodiment and Embodiment 2 is that this embodiment also includes the monitoring of time.

[0077] Such as Figure 6 Shown is a flow chart of a method for accessing a network based on access authentication described in this embodiment, and the method further includes the following steps between the step S10 and the step S20:

[0078] S11: Record the time from the successful delivery status to the start of the terminal;

[0079] S12: Determine whether the time is greater than a preset time, if yes, proceed to step S20.

[0080] In step S11, the timing unit is set to seconds, and the timing code is executed after the successful authentication status is sent, and the time from the successful status to the start of the terminal is recorded, and the timing code can use C language, C++, JAVA, etc.

[0081] Correspondingly, such as Figure 7 Shown is a system structure diagram of an access network based on access authentication described in this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network access method and system based on access authentication, wherein the method comprises the steps of: S10, judging whether information in an access authentication success state is sent to a terminal or not; S20, if the fact that the information in the access authentication success state is sent is determined, redirecting a page accessed by the terminal; and S30, according to the redirected page information, controlling the terminal and a network server to establish a session, so that access is realized. By means of the access method, the problem that a current wireless product cannot access a network for a short time in a network access process after access authentication based on a hypertext transfer protocol over a secure socket layer is successful can be solved; access is relatively efficient and intelligent; and thus, the user experience is relatively smooth.

Description

technical field [0001] The invention relates to network communication, in particular to a method and system for accessing a network based on secure socket layer hypertext transfer protocol access authentication. Background technique [0002] In the Internet era, communication between terminals and servers is ubiquitous. In recent years, various communication technologies have emerged one after another, leading an era and changing people's daily lives. The problem of communication security is also becoming more and more prominent. Take the most popular WLAN communication nowadays as an example. Most of the WLANs are for non-stationary users and there are many. For the sake of security communication in various aspects, authentication links are required one by one. For example, Wifi network access authentication usually adopts The terminal performs authentication by popping up the Portal authentication (access authentication) page. For security reasons, more and more web serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/168H04L67/141H04L67/148
Inventor 程如亮
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products