Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

WEB identification method

An authentication method and authentication request technology, applied in the field of WEB authentication, can solve the problems of user worry, low security, and impact on billing accuracy, and achieve the effect of increasing security and improving billing accuracy.

Inactive Publication Date: 2005-03-23
SHENZHEN NEW GREENNET TECH
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) There is no complete protocol for authenticating the client and server, relying on some simple messages to interact, the ability to handle exceptions is poor, and function expansion is difficult;
[0005] 2) The client program uses UDP or TCP transport layer for communication, and the transport layer port of the server uses a custom non-well-known port, but some authentication servers are behind a firewall, and the firewall may only allow well-known ports such as TCP80 (HTTP) and 25 / 110 (eMail), etc., if communication is difficult, it is necessary to specifically release the non-known ports of the firewall, which will bring configuration troubles and reduce security;
[0006] 3) Some client programs use ActiveX and need to install a certificate, which affects the trust of users, and ActiveX can spread viruses, which makes users worry;
[0007] 4) The client program does not have a timing detection function with the server, and the disconnection of the user cannot be detected in time. It often depends on releasing the IP address, unplugging the network cable, or waiting for a long time, which affects the billing accuracy and hinders the operation of ordinary users. , for an account where only one user is allowed to be online, it makes it difficult for the user to go online again in a short period of time;
[0008] 5) Message interaction uses plain text, which is easy to be attacked and has low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WEB identification method
  • WEB identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] see figure 1 , the WEB authentication method of the present invention, it is based on HTTP agreement, and it comprises the following steps:

[0024] a. The user downloads the webpage from the WEB authentication server through the browser, enters the user name and password, clicks the online button, the client program runs, and sends an access request to the WEB authentication server, wherein the client uses JavaScript or JavaApplet program.

[0025] b. The WEB authentication server assigns a key and online ID to the client, and notifies the client through an access response.

[0026] c. The client encrypts the user name and password with the key, and sends an authentication request to the WEB authentication server.

[0027] d. The WEB authentication server processes the authentication request. If the authentication fails, the client will be notified of the failure with the authentication response; otherwise, the client will be notified of the successful online authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a WEB authentication method. It uses interaction of request and response message of international standard HTTP protocol as channels. Over the channels, a private protocol is built to complete user's authentication, online, time online heart beat detection and offline completing. The problem taken by firewall is avoided that non-TCP 80 messages are unable to penetrate. Online heart beat detection can be conducted, so each user offline can be detected in time, which can improve charging precision. In addition, there are encryption algorithm in authentication, heart beat detection and offline, so security is guaranteed.

Description

【Technical field】 [0001] The invention relates to a network access control method, in particular to a WEB authentication method. 【Background technique】 [0002] At present, some broadband access server devices in the industry support WEB authentication. WEB authentication means that after the user obtains the IP address, he can only access one or some limited addresses, and download the authentication page script from the built-in or external WEB authentication server of the broadband access server (BAS) through the browser. Contains client programs such as Java programs or ActiveX programs. The user enters the user name and password on the downloaded web page for authentication. The client program will interact with the WEB authentication server and go to the broadband access server for authentication. After the authentication is passed, the user is allowed to go online, which opens up the user's greater access to the Internet. , you can access more addresses, such as acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/00H04L9/00
Inventor 宋强
Owner SHENZHEN NEW GREENNET TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products