CN101997686A - Method for acquiring MAC user authentication by spanning firewall through Activex - Google Patents

Method for acquiring MAC user authentication by spanning firewall through Activex Download PDF

Info

Publication number
CN101997686A
CN101997686A CN2009101841450A CN200910184145A CN101997686A CN 101997686 A CN101997686 A CN 101997686A CN 2009101841450 A CN2009101841450 A CN 2009101841450A CN 200910184145 A CN200910184145 A CN 200910184145A CN 101997686 A CN101997686 A CN 101997686A
Authority
CN
China
Prior art keywords
activex
mac address
client
machine
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009101841450A
Other languages
Chinese (zh)
Inventor
曾凡玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHENJIANG JINGYING SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
ZHENJIANG JINGYING SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHENJIANG JINGYING SOFTWARE TECHNOLOGY Co Ltd filed Critical ZHENJIANG JINGYING SOFTWARE TECHNOLOGY Co Ltd
Priority to CN2009101841450A priority Critical patent/CN101997686A/en
Publication of CN101997686A publication Critical patent/CN101997686A/en
Pending legal-status Critical Current

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention relates to actual application of Activex technology in the public security and traffic management industry. An MAC (media access control) address of a WEB remote machine is accurately acquired by the Activex technology so as to determine that the remote computer is an authentication validity computer, and an operator of the remote computer is confirmed through a user password. The special person and special machine security purpose of the operator and the operated machine is fulfilled.

Description

Activex strides the method that fire compartment wall obtains the MAC user rs authentication
Technical field
The present invention relates to the practical application of Activex technology in public security traffic control industry, in the B/S development structure, realize obtaining the MAC Address of remote client's machine by the Activex technology, can see through the MAC Address that fire compartment wall and router get access to client machine accurately, utilize this unique MAC Address and client's account number cipher binding again, determine special messenger's special plane of login user, reach the purpose of secure access.
Background technology
MAC (Media Access Control, medium access control) MAC Address is that burning is at Network Interface Card (network interface card, NIC) the .MAC address of lining, also be hardware address, be by 48 bit long (6 byte), it is to distribute the .24-47 position by producer oneself that the numeral of 16 systems is formed the .0-23 position, is called to organize unique identifier (organizationally unique is the sign of identification LAN (innings .MAC territory net) node.Wherein the 40th is the multicast address flag bit.The physical address of network interface card is normally by the EPROM (a kind of flash chip usually can be erasable by program) of the burned network interface card of network interface card manufacturer, and what its was stored is really to rely when transmitting data to identify computer that sends data and the address that receives the main frame of data.
That is to say, in the physical transfer process of network bottom layer, discern main frame by physical address, it generally also is globally unique.Such as, famous Ethernet card, its physical address are the integers of 48bit (bit), as: 44-45-53-54-00-00 deposits in the host interface in machine-readable mode.Ethernet address management organization (IEEE) is with ethernet address, just the various combination of 48 bits is divided into some independently continuation address groups, and the producer of production ethernet nic just buys wherein one group, during concrete production, give Ethernet card with unique address one by one.
Vivid says that MAC Address has global uniqueness just as the ID card No. on our identity card.
The effect of identity card on ordinary days is not very big, but to the crucial moment that has, identity card is used for proving your identity.To go to bank to extract cash such as you, at this moment will use identity card.MAC Address and IP address binding are just done the reason of important thing as our identity card that carries oneself in person in daily life so.Sometimes, we are stolen in order to prevent the IP address, just by simple switch ports themselves binding (the MAC table of port uses static entry), can under only connecting the situation of a main frame, each switch ports themselves prevent to revise usurping of MAC Address, if three-layer equipment can also provide: switch ports themselves/IP/MAC three's binding prevents that the IP that revises MAC from usurping.General binding MAC address all disposes on switch and router, is that the webmaster personnel just can touch, as long as understood the effect of binding for general computer user.In campus network the notebook computer of oneself is changed to the another one dormitory such as you and just can't surf the Net, this causes because MAC Address and IP address (port) are bound.
Summary of the invention
The objective of the invention is to: at the characteristics of Activex technology, the Activex module is joined in the B/S structure, obtain the MAC Address of remote client's machine, use the MAC Address of client machine again, add the username and password that the client imports, can finish triple verifications.
Embodiment
Embodiment one
The online Health Certificate system of submitting to, this system adopts the development mode of B/S, on server, issue native system, each client does not need to install any control, directly can operate system with IE browser login native system, mode so conveniently causes the uncontrollable factor of client simultaneously.Because native system relates to the driving license information uploading of public security system, the checking of customer to customer end need reach the purpose of special messenger's special plane.Simple IP address is divided again can't firewall-penetrating, so adopt Activex module firewall-penetrating to obtain the purpose that the remote machine MAC Address reaches the visit of user side special messenger special plane.
The process of present embodiment is:
At first in database side maintenance customer name, password and client NIC MAC Address.
Secondly behind the client login system, system will take out this machine MAC Address, allow the client input login user name and password simultaneously, submit to and do authentication.When confirming that user name, password and MAC Address three do not have the system of being allowed for access of causing delay.

Claims (2)

1. at the characteristics of Activex technology, can say that the Activex module is installed in the webpage of B/S structure.Activex can obtain the higher operating right of ratio of remote system at remote computer, so just can reach long-range requirement of obtaining the machine MAC Address.
2. according to claim 1 the Activex module is joined in the B/S structure, obtain the MAC Address of remote client's machine, use the MAC Address of client machine again, add the username and password that the client imports, can finish triple verifications.Utilize this unique MAC Address and client's account number cipher binding again, determine special messenger's special plane of login user, reach the order of secure access.
CN2009101841450A 2009-08-25 2009-08-25 Method for acquiring MAC user authentication by spanning firewall through Activex Pending CN101997686A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009101841450A CN101997686A (en) 2009-08-25 2009-08-25 Method for acquiring MAC user authentication by spanning firewall through Activex

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009101841450A CN101997686A (en) 2009-08-25 2009-08-25 Method for acquiring MAC user authentication by spanning firewall through Activex

Publications (1)

Publication Number Publication Date
CN101997686A true CN101997686A (en) 2011-03-30

Family

ID=43787334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009101841450A Pending CN101997686A (en) 2009-08-25 2009-08-25 Method for acquiring MAC user authentication by spanning firewall through Activex

Country Status (1)

Country Link
CN (1) CN101997686A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468676A (en) * 2013-09-25 2015-03-25 江苏智软信息科技有限公司 Method for obtaining MAC address of user by crossing fire wall through Activex
CN105162763A (en) * 2015-07-29 2015-12-16 网神信息技术(北京)股份有限公司 Method and device for processing communication data
CN105306407A (en) * 2014-05-29 2016-02-03 中国移动通信集团云南有限公司 User account number login method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468676A (en) * 2013-09-25 2015-03-25 江苏智软信息科技有限公司 Method for obtaining MAC address of user by crossing fire wall through Activex
CN105306407A (en) * 2014-05-29 2016-02-03 中国移动通信集团云南有限公司 User account number login method and device
CN105306407B (en) * 2014-05-29 2019-09-27 中国移动通信集团云南有限公司 User account login method and device
CN105162763A (en) * 2015-07-29 2015-12-16 网神信息技术(北京)股份有限公司 Method and device for processing communication data

Similar Documents

Publication Publication Date Title
CN111414210B (en) Method, apparatus and computer readable storage medium for generating side chains based on main chains
CN101518023B (en) Apparatuses and methods for authenticating voice and data devices on the same port
CN102271132B (en) Control method and system for network access authority and client
CN100405796C (en) Admittance control method for IPv6 switch-in network true source address access
CN100496038C (en) Method for implementing experimental system of firewall under multiple user's remote concurrency control in large scale
CN107209659A (en) Mobile authentication in mobile virtual network
CN101888389B (en) Method and system for realizing uniform authentication of ICP union
CN101355557B (en) Method and system for implementing network access control in MPLS/VPN network
CN101207613A (en) Method, system and apparatus for authentication of striding network area information communication
CN103414709A (en) User identity binding and user identity binding assisting method and device
CN107534645A (en) Main frame authentication storage
JP2011107796A (en) Device and system for effectively using a plurality of authentication servers
CN104408777B (en) Internet attendance management system and method based on P2P communication realized by NAT traversal
CN105071945A (en) Network terminal address bulk binding method based on interchanger technology
CN103051643B (en) Fictitious host computer secure connection dynamic establishing method and system under cloud computing environment
CN101436923A (en) Method, equipment and network system for synchronizing clock
CN103428211A (en) Network authentication system on basis of switchboards and authentication method for network authentication system
US20150215301A1 (en) Authentication of a First Device by a Switching Center
CN101997686A (en) Method for acquiring MAC user authentication by spanning firewall through Activex
CN101554016A (en) Apparatus and methods for supporting 802.1X in daisy chained devices
WO2007138068A1 (en) A type of management method and device for network equipment
CN102130803A (en) Local area network website security architecture system
CN103188208A (en) Authority control method and authority control system of webpage access, and call center
CN101286871B (en) Isolation system configuring method based on digital certificate and security protocol
CN101599834B (en) Method for identification and deployment and management equipment thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110330