CN102710667B - Method for realizing Portal authentication server attack prevention and broadband access server - Google Patents

Method for realizing Portal authentication server attack prevention and broadband access server Download PDF

Info

Publication number
CN102710667B
CN102710667B CN201210217103.4A CN201210217103A CN102710667B CN 102710667 B CN102710667 B CN 102710667B CN 201210217103 A CN201210217103 A CN 201210217103A CN 102710667 B CN102710667 B CN 102710667B
Authority
CN
China
Prior art keywords
authentication
challenge
client
bas
request message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210217103.4A
Other languages
Chinese (zh)
Other versions
CN102710667A (en
Inventor
高平利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201210217103.4A priority Critical patent/CN102710667B/en
Publication of CN102710667A publication Critical patent/CN102710667A/en
Application granted granted Critical
Publication of CN102710667B publication Critical patent/CN102710667B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method for realizing Portal authentication server attack prevention. The method comprises the following steps of: acquiring, by a broadband access server BAS, an HTTP request message which does not pass Portal authentication from a client; establishing TCP (Transmission Control Protocol) connection; transmitting an inquiry authentication request message to the client; after receiving, by the BAS, an inquiry authentication response message returned by a browser of the client, analyzing the inquiry authentication response message and performing identity authentication on the inquiry authentication response message; and when the authentication is successful, transmitting to the browser of the client a redirect message comprising Portal server URL (Uniform Resource Locator). The invention also discloses the broadband access server BAS. According to the method and the broadband access server, before redirect message transmission, inquiry authentication is introduced to the obtained Http request by the BAS, the traffic flow produced by a non-browser application program of a client can be shielded, and the Portal server is prevented from being attacked; and meanwhile, after the inquiry authentication is introduced, the client actually needs to pass secondary authentication, and the safety of an accessed user is more strictly guaranteed.

Description

Realize method and the BAS Broadband Access Server of Portal certificate server attack protection
Technical field
The application relates to server anti-attacking technology field, particularly relates to the method and BAS Broadband Access Server that realize Portal certificate server attack protection.
Background technology
At present, sing on web carries out the scheme of Portal access authentication, because do not relate to client, convenient deployment, is used widely in campus network, operator's broadband access.Sing on web carries out the typical networking of Portal access authentication as shown in Figure 1, its general principle is: time not by Portal certification, user access outer net Http request all can by BAS device redirection, by Portal certificate server, certification page is pushed away to user, after user inputs correct account, encrypted message, continue follow-up authentication and accounting flow process, after certification is passed through, user can normally access outer net resource.
As shown in Figure 1, such as, user goes to the Http request of www.sina.com.cn, and after arriving BAS Broadband Access Server BAS end, the counterfeit user of BAS wants the destination gone to, to user response Http redirection message, include the local pre-configured Portal Server address of BAS equipment in redirection message, inform that user accesses Portal certificate server, user side receives redirection message, send request to Portal certificate server, certification page pushes away to user by Portal certificate server.
Find when applying in existing network, due to the diversity of user terminal (PC main frame, mobile device etc.) and the rich of application software, a lot of software on user terminal or the application program (being referred to as non-browser application program) based on the Internet, can constantly initiatively send Http detection or upgrade message, what transmission frequency had even reaches more than 10 milliseconds once.For BAS equipment, the online request that its Http request received is user browser cannot be distinguished, or from the service traffics of non-browser application program, as long as Http request message, re-orientation processes is carried out in capital, namely the transmit leg to Http request message responds redirection message, inform transmit leg access Portal certificate server, will cause so also mailing to Portal certificate server from the Http message of non-browser application program in a large number, have a strong impact on the performance of PortalServer, cause a kind of actual attack.
As shown in Figure 2, mail to Portal certificate server after a large amount of Http requests is redirected by BAS, Portal Server can respond one by one; For the Http request that non-browser application program sends, PortalServer also can respond one by one, but do not possess the page parsing of browser due to non-browser application program and the ability of subscriber identity information is interactively provided, cannot respond after receiving the back message from Portal Server, these back messages are finally abandoned by the non-browser application program of client, have wasted the resource of Portal certificate server.
Because BAS equipment cannot effectively be distinguished, really from the service traffics that online request and the non-browser application program of client browser produce, finally cause Portal certificate server under attack.
Summary of the invention
In view of this, the application proposes a kind of method realizing Portal certificate server attack protection, can effectively avoid Portal certificate server under attack.
The application also proposes a kind of BAS Broadband Access Server, can effectively avoid Portal certificate server under attack.
For achieving the above object, the technical scheme of the embodiment of the present application is achieved in that
Realize a method for Portal certificate server attack protection, comprise the following steps:
BAS Broadband Access Server BAS obtain from client not by the Http request message of Portal certification, set up TCP and connect, send Challenge Authentication request message to client;
After the Challenge Authentication response message that the browser that BAS receives described client returns, resolve described Challenge Authentication response message and authentication is carried out to it, when the authentication is successful, browser to described client sends the redirection message including Portal certificate server URL address, makes the client getting Portal certificate server URL address obtain Portal certificate server when accessing Portal certificate server and pushes away to the certification page of client.
A kind of BAS Broadband Access Server BAS, comprising: Http request message acquisition module, Challenge Authentication module, redirection module, wherein:
Http request message acquisition module, for obtain from client not by the Http request message of Portal certification, set up TCP and connect, and described Http request message is sent to Challenge Authentication module;
Challenge Authentication module, for receiving the described Http request message from Http request message acquisition module, Challenge Authentication request message is sent to client, after the Challenge Authentication response message that the browser receiving described client returns, resolve described Challenge Authentication response message and authentication is carried out to it, when the authentication is successful, the information of authentication success is sent to redirection module;
Redirection module, for receiving the information of the authentication success that Challenge Authentication module sends, browser to described client sends the redirection message containing Portal certificate server URL address, makes the client getting Portal certificate server URL address obtain Portal certificate server when accessing Portal certificate server and pushes away to the certification page of client.
The beneficial effect of the application is, BAS is before redirection message sends, by introducing Http Challenge Authentication to the Http request message going to outer net, reach the effective differentiation to the service traffics that online request and the non-browser application program of client browser produce, non-browser application program does not possess the parsing recognition capability of http Challenge Authentication head www-authenticate, Challenge Authentication request cannot be responded, therefore real Portal server address cannot also be got, thus the service traffics that can effectively shield from client non-browser application program, avoid Portal certificate server under attack.
Simultaneously, have passed the client of above-mentioned Challenge Authentication, the URL address of Portal server could be got in redirection message, and initiate certification page request to Portal Server, certification page just can push away to client by Portal certificate server, so, described client is actual by re-authentication, need more strictly ensure that the fail safe of access user.
Accompanying drawing explanation
Fig. 1 is the Portal web authentication networking schematic diagram of prior art;
Fig. 2 is the Portal web authentication message schematic flow sheet of prior art;
Fig. 3 is the method flow diagram of the embodiment of the present application;
Fig. 4 is the schematic flow sheet realizing Portal certificate server attack protection of the embodiment of the present application;
Fig. 5 is the BAS Broadband Access Server structure chart of the embodiment of the present application.
Embodiment
In order to make the object of the application, technical scheme and advantage clearly understand, below by way of specific embodiment and see accompanying drawing, the application is described in detail.
The Http authentication mechanism that the application adopts each browser all to support, certification protection is carried out in the Http request of user being accessed to outer net; Only have certification to pass through, just respond the redirection message comprising Portal certificate server URL address to client; Otherwise client cannot get the true address of Portal certificate server.
Meanwhile, get the client of Portal certificate server URL address, during access Portal certificate server, certification page can push away to client by Portal certificate server, so, described client is actual by re-authentication, need more strictly ensure that the fail safe of access user.The program has good versatility, and BAS first carries out a Http Challenge Authentication to client before transmission redirection message, to the client that certification cannot be passed through, shields Portal certificate server URL address, thus the access avoiding redundancy is attacked; To the client of authentication success, inform Portal certificate server true address by redirection message, subsequent authentication flow process and original scheme completely the same, have good compatibility.
As shown in Figure 3, a kind of method realizing Portal certificate server attack protection, comprises the following steps the method flow of the embodiment of the present application:
Step 301: BAS Broadband Access Server BAS obtain from client not by the Http request message of Portal certification, set up TCP connect.
What client sent Http request message may be browser, also may be the application program of non-browser, therefore, the Http request message that BAS receives both had comprised the Http request message that client browser sends, the Http request message (being actually the service traffics that non-browser application program produces) that the non-browser application program also comprising client sends.
If be that Portal certificate server authenticated from the Http request of client, then described Http request can mate by five-tuple the dynamic ACL ACL that BAS equipment is safeguarded, directly accesses outer net.Namely, when BAS obtains the Http request message by Portal certification from client, set this client and directly access outer net.
If when the certification of Portal certificate server is not passed through in the Http request from client, transmitted to CPU after BAS intercepting and capturing Http request message, set up TCP to connect, then follow-up Http Challenge Authentication and Http re-orientation processes is carried out, namely step 302, step 303 is performed successively, instead of as directly returned the redirection message including Portal certificate server URL address in prior art to client, cause Portal address of the authentication server to reveal in advance, thus actual access attack is formed to Portal certificate server.
Therefore, client browser or non-browser application program, send Http access request to outer net, after BAS intercepts and captures Http request message, find that this Http asks not by the certification of Portal certificate server, namely carry out Challenge Authentication, see step 302 and step 303 to client.
Step 302:BAS sends Challenge Authentication request message to client.
Be no matter browser or the non-browser application program of client, as long as BAS have received the Http request message coming from them, BAS sends Challenge Authentication request message to it.
Described Challenge Authentication request message meets the regulation of Http conditional code 401.
Http conditional code 401 (Unauthorized) specifies, Http Challenge Authentication request message must comprise message header WWW-Authenticate, after client receives this Challenge Authentication request message, just knows that the outside URL address of access needs certification.
Described WWW-Authenticate message header form is WWW-Authenticate:challenge, wherein challenge is challenge information, the concrete definition of challenge information form is see RFC2617, support Basic Authentication and digest authentication, also can further expand, authentication mode main at present has Basic Authentication, digest authentication and certificate verification simultaneously, concrete which kind of authentication mode of employing, do not do concrete restriction at this, if client and BAS hold appoint in advance just passable.
After the Challenge Authentication response message that the browser that step 303:BAS receives described client returns, resolve described Challenge Authentication response message and authentication is carried out to it, when the authentication is successful, the browser to described client sends the redirection message including Portal certificate server URL address.
After client browser receives challenge request message, can correctly resolve Challenge Authentication heading, and eject inquiry window, input account and password for user; Afterwards, Challenge Authentication response message is returned to BAS.
That is, the browser of client is only had just can to return Challenge Authentication response message.
With Challenge Authentication request message unlike, Challenge Authentication response message can carry an Authorization.
Described Authorization form is Authorization:credentials, and wherein credentials is authentication information, usually carries the account/encrypted message of client upload.Described authentication information form corresponds to the challenge information form in described Challenge Authentication request message.
For the client returning Challenge Authentication response message, after BAS receives the Challenge Authentication response message that client browser returns, resolve described Challenge Authentication response message and obtain account and password, and authentication is carried out to it, both local authentication can be selected, also far-end aaa server can be selected to carry out certification, authentication mode such as: challenge handshake authentication protocol CHAP or password authentication protocol PAP etc.
When the authentication is successful, send the redirection message meeting Http conditional code 302 to described client, in described redirection message, include Portal certificate server URL address.After client browser receives the redirection message comprising Portal server URL address, initiate certification page request to Portal certificate server; Follow-up flow process and prior art completely the same, user carries out the second time authentication of access network, simultaneously coordinate AAA issue the strategies such as charging, access control and Limit Rate, certification can by tactful accesses network resource by rear user.
When the authentication fails, perform:
Steps A, BAS Broadband Access Server BAS send the Challenge Authentication request message meeting Http conditional code 401 to described client, after user revises account/encrypted message, continue to return Challenge Authentication response message, BAS receives the Challenge Authentication response message that this client returns, resolve described Challenge Authentication response message and authentication is carried out to it, when the authentication is successful, the redirection message including Portal certificate server URL address is sent to described client, otherwise, repeated execution of steps A, until certification is passed through.
The non-browser application program of client cannot Challenge Authentication request message in analyzing step 302, only has the browser of client just can resolve described Challenge Authentication request message.Therefore, for the client non-browser application program not returning Challenge Authentication response message, BAS is not further processed.
That is, after the non-browser application program of client receives the Challenge Authentication request message from BAS, due to the WWW-Authenticate message header in Challenge Authentication request message cannot be resolved, Challenge Authentication request message is lost, the non-browser application program of client and terminating alternately of BAS, because not getting the URL address of Portal certificate server, attacking and also having no way of occurring.
In the application, as shown in Figure 4, comparison diagram 2 is known, BAS get user go to outer net Http request time, before redirection message sends, by carrying out a Challenge Authentication to client identity, effectively can distinguish above-mentioned Http and asking to be the request from client browser or the service traffics of non-browser application program.
If ask from the Http of client browser, client browser must by Challenge Authentication, can correctly resolve Challenge Authentication request message, return Challenge Authentication response message to BAS, BAS resolves described Challenge Authentication response message and obtains account and password, and authentication is carried out to it, after authentication is passed through, BAS just sends the redirection message including Portal certificate server URL address to client browser.
If from the service traffics of non-browser application program, then non-browser application program cannot pass through Challenge Authentication, namely Challenge Authentication request message can not correctly be resolved, Challenge Authentication response message cannot be returned to BAS, BAS can not send to non-browser application program the redirection message including Portal certificate server URL address, finally realize Portal Server and be immune against attacks.
As shown in Figure 5, a kind of BAS Broadband Access Server BAS, comprising the BAS Broadband Access Server structure of the embodiment of the present application: Http request message acquisition module, Challenge Authentication module, redirection module, wherein:
Http request message acquisition module, for obtain from client not by the Http request message of Portal certification, set up TCP and connect, and described Http request message is sent to Challenge Authentication module; When getting the Http request message by Portal certification from client, set described client and directly access outer net.
Challenge Authentication module, for receiving the described Http request message from Http request message acquisition module, Challenge Authentication request message is sent to client, after the Challenge Authentication response message that the browser receiving described client returns, resolve described Challenge Authentication response message and authentication is carried out to it
When the authentication is successful, the information of authentication success is sent to redirection module;
When certification is unsuccessful, perform:
Step B, send Challenge Authentication request message to described client, receive the Challenge Authentication response message that this client returns, resolve described Challenge Authentication response message and authentication is carried out to it, if authentication success, the information of authentication success is sent to redirection module, otherwise, repeated execution of steps B.
Described Challenge Authentication request message meets the regulation of Http conditional code 401.
Described Challenge Authentication request message comprises WWW-Authenticate message header, and described WWW-Authenticate message header form is WWW-Authenticate:challenge, and wherein challenge is the challenge information of RFC2617 definition.
Described Challenge Authentication response message comprises Authorization, described Authorization form is Authorization:credentials, wherein credentials is authentication information, and described authentication information form corresponds to the challenge information form in described Challenge Authentication request message.
Redirection module, for receiving the information of the authentication success that Challenge Authentication module sends, the browser to described client sends the redirection message including Portal certificate server URL address.
The foregoing is only the preferred embodiment of the application, not in order to limit the application, within all spirit in the application and principle, any amendment made, equivalent replacements, improvement etc., all should be included within scope that the application protects.

Claims (10)

1. realize a method for Portal certificate server attack protection, it is characterized in that, comprise the following steps:
BAS Broadband Access Server BAS obtain from client not by the Http request message of Portal certification, set up TCP and connect, send Challenge Authentication request message to client;
After the Challenge Authentication response message that the browser that BAS receives described client returns, resolve described Challenge Authentication response message, and authentication is carried out to it;
When the authentication is successful, browser to described client sends the redirection message including Portal certificate server URL address, makes the client getting Portal certificate server URL address obtain Portal certificate server when accessing Portal certificate server and pushes away to the certification page of client.
2. method according to claim 1, is characterized in that, described Challenge Authentication request message meets the regulation of Http conditional code 401.
3. method according to claim 2, it is characterized in that, described Challenge Authentication request message comprises WWW-Authenticate message header, described WWW-Authenticate message header form is WWW-Authenticate:challenge, and wherein challenge is the challenge information of RFC2617 definition.
4. method according to claim 3, it is characterized in that, described Challenge Authentication response message comprises Authorization, described Authorization form is Authorization:credentials, wherein credentials is authentication information, and described authentication information form corresponds to the challenge information form in described Challenge Authentication request message.
5. method according to claim 1, is characterized in that, described BAS resolves described Challenge Authentication response message and comprises further after carrying out authentication to it, when certification is unsuccessful, performs:
Steps A, BAS Broadband Access Server BAS send the Challenge Authentication request message meeting Http conditional code 401 to described client, receive the Challenge Authentication response message that this client returns, resolve described Challenge Authentication response message and authentication is carried out to it, when the authentication is successful, the redirection message including Portal certificate server URL address is sent to described client, otherwise, repeated execution of steps A.
6. a BAS Broadband Access Server BAS, is characterized in that, comprising: Http request message acquisition module, Challenge Authentication module, redirection module, wherein:
Http request message acquisition module, for obtain from client not by the Http request message of Portal certification, set up TCP and connect, and described Http request message is sent to Challenge Authentication module;
Challenge Authentication module, for receiving the described Http request message from Http request message acquisition module, Challenge Authentication request message is sent to client, after the Challenge Authentication response message that the browser receiving described client returns, resolve described Challenge Authentication response message and authentication is carried out to it, when the authentication is successful, the information of authentication success is sent to redirection module;
Redirection module, for receiving the information of the authentication success that Challenge Authentication module sends, browser to described client sends the redirection message containing Portal certificate server URL address, makes to obtain Portal certificate server during the client-access Portal certificate server getting Portal certificate server URL address and pushes away to the certification page of client.
7. BAS Broadband Access Server BAS according to claim 6, is characterized in that, described Challenge Authentication request message meets the regulation of Http conditional code 401.
8. BAS Broadband Access Server BAS according to claim 7, it is characterized in that, described Challenge Authentication request message comprises WWW-Authenticate message header, described WWW-Authenticate message header form is WWW-Authenticate:challenge, and wherein challenge is the challenge information of RFC2617 definition.
9. BAS Broadband Access Server BAS according to claim 8, it is characterized in that, described Challenge Authentication response message comprises Authorization, described Authorization form is Authorization:credentials, wherein credentials is authentication information, and described authentication information form corresponds to the challenge information form in described Challenge Authentication request message.
10. BAS Broadband Access Server BAS according to claim 6, is characterized in that, described Challenge Authentication module, is further used for when resolving described Challenge Authentication response message and carrying out authentication to it, if certification is unsuccessful, performs:
Step B, send Challenge Authentication request message to described client, receive the Challenge Authentication response message that described client returns, resolve described Challenge Authentication response message and authentication is carried out to it, if authentication success, the information of authentication success is sent to redirection module, otherwise, repeated execution of steps B.
CN201210217103.4A 2012-06-25 2012-06-25 Method for realizing Portal authentication server attack prevention and broadband access server Active CN102710667B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210217103.4A CN102710667B (en) 2012-06-25 2012-06-25 Method for realizing Portal authentication server attack prevention and broadband access server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210217103.4A CN102710667B (en) 2012-06-25 2012-06-25 Method for realizing Portal authentication server attack prevention and broadband access server

Publications (2)

Publication Number Publication Date
CN102710667A CN102710667A (en) 2012-10-03
CN102710667B true CN102710667B (en) 2015-04-01

Family

ID=46903220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210217103.4A Active CN102710667B (en) 2012-06-25 2012-06-25 Method for realizing Portal authentication server attack prevention and broadband access server

Country Status (1)

Country Link
CN (1) CN102710667B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735050B (en) * 2014-12-19 2018-03-20 武汉烽火网络有限责任公司 A kind of fusion mac certifications and the authentication method of web authentication
CN105991589B (en) * 2015-02-13 2019-04-26 华为技术有限公司 A kind of method, apparatus and system for redirection
CN104811439B (en) * 2015-03-30 2018-08-24 新华三技术有限公司 A kind of method and apparatus of Portal certifications
CN105991640B (en) * 2015-07-16 2019-06-04 杭州迪普科技股份有限公司 Handle the method and device of HTTP request
CN105187538A (en) * 2015-09-14 2015-12-23 北京星网锐捷网络技术有限公司 Web authentication noise processing method and processing device
CN105357209A (en) * 2015-11-20 2016-02-24 福建星网锐捷网络有限公司 WEB authentication method and WEB authentication device
TW201721498A (en) * 2015-12-01 2017-06-16 Chunghwa Telecom Co Ltd Wired area network user management system and method with security and function scalability wherein a network controller is used to control a programmable network switch, and divert a non-authenticated terminal device to an authentication server
CN106101063A (en) * 2016-05-25 2016-11-09 杭州迪普科技有限公司 Certification reorientation method and certification redirection device
CN107276769B (en) * 2017-07-26 2019-09-13 迈普通信技术股份有限公司 Puppet pushes away request filter method, portal server and terminal
CN109587747B (en) * 2018-10-26 2021-05-04 努比亚技术有限公司 SIM card switching control method, terminal and computer storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834866A (en) * 2010-05-05 2010-09-15 北京来安科技有限公司 CC (Communication Center) attack protective method and system thereof
CN102469069A (en) * 2010-11-02 2012-05-23 杭州华三通信技术有限公司 Method and device for preventing portal authentication attack

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834866A (en) * 2010-05-05 2010-09-15 北京来安科技有限公司 CC (Communication Center) attack protective method and system thereof
CN102469069A (en) * 2010-11-02 2012-05-23 杭州华三通信技术有限公司 Method and device for preventing portal authentication attack

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
duduwolf.HTTP认证及其在Web平台中的实现.《http://www.360doc.comcontent0507140073_1516.shtml》.2005,正文第一部分和第二部分. *
Franks,et al."HTTP Authentication:Basic and Digest Access Authentication".《rfc2617》.1999,第2-5页. *
侯建岑."基于HTTP-FLOOD"攻击的网络入侵检测防御技术研究与实现.《万方数据库》.2010,正文第4.1节及图4-1. *

Also Published As

Publication number Publication date
CN102710667A (en) 2012-10-03

Similar Documents

Publication Publication Date Title
CN102710667B (en) Method for realizing Portal authentication server attack prevention and broadband access server
US8589675B2 (en) WLAN authentication method by a subscriber identifier sent by a WLAN terminal
CN107534651B (en) Method and apparatus for communicating session identifier
US8079076B2 (en) Detecting stolen authentication cookie attacks
KR101095447B1 (en) Apparatus and method for preventing distributed denial of service attack
CN103825881B (en) The reorientation method and device of WLAN user are realized based on wireless access controller AC
CN104427499B (en) Access authentication of WLAN method and system based on WWW
US8468347B2 (en) Secure network communications
CN104917727B (en) A kind of method, system and device of account's authentication
CN101702717B (en) Method, system and equipment for authenticating Portal
CN105554098A (en) Device configuration method, server and system
KR20060017594A (en) Technique for secure wireless lan access
CN103444215B (en) For the method and apparatus for the harm for avoiding network attack
CN106559405B (en) Portal authentication method and equipment
CN104378368B (en) A kind of barcode scanning login method and system
CN106330948A (en) Message control method and message control device
WO2017181800A1 (en) Adaptive portal authentication page system based on operating system, and method for same
KR101746745B1 (en) User agent, client and method for authorization to support single sing-on
CN113055357B (en) Method and device for verifying credibility of communication link by single packet, computing equipment and storage medium
CN112910915A (en) Trusted connection authentication method, device, equipment and computer readable storage medium
CN106789884A (en) A kind of portal authentication method and system
CN114500074B (en) Single-point system security access method and device and related equipment
CN106412904B (en) Method and system for preventing counterfeit user authentication authority
CN101742507B (en) System and method for accessing Web application site for WAPI terminal
CN108494731B (en) Anti-network scanning method based on bidirectional identity authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Patentee after: Xinhua three Technology Co., Ltd.

Address before: 310053 Hangzhou hi tech Industrial Development Zone, Zhejiang province science and Technology Industrial Park, No. 310 and No. six road, HUAWEI, Hangzhou production base

Patentee before: Huasan Communication Technology Co., Ltd.

CP03 Change of name, title or address