CN105991641A - Portal authentication method and portal authentication device - Google Patents

Portal authentication method and portal authentication device Download PDF

Info

Publication number
CN105991641A
CN105991641A CN201510478985.3A CN201510478985A CN105991641A CN 105991641 A CN105991641 A CN 105991641A CN 201510478985 A CN201510478985 A CN 201510478985A CN 105991641 A CN105991641 A CN 105991641A
Authority
CN
China
Prior art keywords
http
client device
message
portal server
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510478985.3A
Other languages
Chinese (zh)
Inventor
仇俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201510478985.3A priority Critical patent/CN105991641A/en
Publication of CN105991641A publication Critical patent/CN105991641A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention relates to a portal authentication method and a portal authentication device. The method includes the following steps that: an HTTP GET request message sent by a client device is received; whether the HTTP GET request message carries the URL address of an authentication page in a portal server is determined; and when the HTTP GET request message carries the URL address of the authentication page in the portal server, the HTTP GET request message is forwarded to the portal server. With the portal authentication method and the portal authentication device of the invention adopted, a portal authentication process in a proxy environment can be ensured, and the security of the access of the client device in the proxy environment can be also ensured.

Description

A kind of portal authentication method and device
Technical field
The application relates to network communication technology field, particularly relates to a kind of portal authentication method and device.
Background technology
Portal certification system is generally made up of client device, access device, Portal server.Access Whether equipment, when receiving the extranet access request that client device is initiated, first determines whether client device By certification, if client device is not authenticated, then client device is forced to be redirected to Portal Server is authenticated, after certification is passed through, it is allowed to client device access outer net.
When the client device in portal certification system accesses outer net by proxy server, generally will Proxy server is deployed between access device and Portal server, but this deployment way cannot use Client device is authenticated by existing Portal identifying procedure.
Content of the invention
In view of this, the application provides a kind of portal authentication method and device.
Specifically, the application is achieved by the following technical solution:
The application provides a kind of portal authentication method, is applied to access device, and the method includes:
Receive the HTTP GET request message that described client device sends;
Judge whether described HTTP GET request message carries certification page in described Portal server URL address;
As the URL carrying certification page in described Portal server in described HTTP GET request message During address, forward described HTTP GET request message to described Portal server.
The application also provides a kind of Portal authentication device, is applied to access device, and this device includes:
Receiving unit, for receiving the HTTP GET request message that described client device sends;
Judging unit, is used for judging whether described HTTP GET request message carries described Portal service The URL address of certification page in device;
Retransmission unit, for when carrying in described Portal server in described HTTP GET request message During the URL address of certification page, forward described HTTP GET request report to described Portal server Literary composition.
By above description it can be seen that the application can realize the Portal verification process under deputy environment, protect Demonstrate,prove the security that under deputy environment, client device accesses.
Brief description
Fig. 1 is Portal certification interaction flow schematic diagram in prior art;
Fig. 2 is a kind of portal authentication method flow chart shown in the application one exemplary embodiment;
Fig. 3 is the Portal certification interaction flow schematic diagram shown in the application one exemplary embodiment;
Fig. 4 is the base of a kind of Portal authentication device place equipment shown in the application one exemplary embodiment Plinth hardware architecture diagram;
Fig. 5 is the structural representation of a kind of Portal authentication device shown in the application one exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following When description relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous Key element.Embodiment described in following exemplary embodiment does not represent the institute consistent with the application There is embodiment.On the contrary, they only with as appended claims describes in detail, the one of the application The example of the consistent apparatus and method of a little aspects.
It is only merely for the purpose describing specific embodiment at term used in this application, and be not intended to be limiting The application." a kind of " of singulative used in the application and appended claims, " institute State " and " being somebody's turn to do " be also intended to include most form, unless context clearly shows that other implications.Also should Work as understanding, term "and/or" used herein refer to and comprise one or more be associated list item Any or all possible combination of purpose.
Although it should be appreciated that and term first, second, third, etc. may being used to describe various in the application Information, but these information should not necessarily be limited by these terms.These terms only be used for by same type of information that This distinguishes.For example, in the case of without departing from the application scope, the first information also can be referred to as Two information, similarly, the second information also can be referred to as the first information.Depend on linguistic context, as in this institute Use word " if " can be construed to " and ... when " or " when ... when " or " response In determination ".
Fig. 1 show under deputy environment the interaction flow schematic diagram using existing Portal authentication mode.With Under interaction flow is simply introduced.
Step 101, client device sends SYN message to external network server (not shown), Ask set up online.When this SYN message reaches access device, access device obtains source from SYN message IP address and purpose IP address, and whether judge client device according to source IP address or purpose IP address Need certification, if client device needs certification, then step 102;
Step 102, access device replaces external network server to send SYN-ACK message to client device (the SYN message sending client device confirms, sends SYN report to client device simultaneously Literary composition);
Step 103, client device sends ACK message (to receive to external network server SYN-ACK message confirms), three-way handshake completes, TCP connection establishment;
Step 104, client device sends HTTP GET request message to external network server, and request is visited Ask outer net resource, below unverified client device is sent to the HTTP GET request of external network server Message is referred to as certification and triggers message;
Step 105, after access device receives certification triggering message, first sends ACK to client device Message, then sends HTTP redirection message.The Location of the http head of this HTTP redirection message (redirection) field carries the URL address of certification page.Client device receives HTTP redirection report Wen Hou, obtains the URL address that location field is carried;
Step 106, disconnects TCP and connects;
Step 107, the URL address of the certification page that client device access location field is carried is entered Row certification, below by unverified client device to the HTTP GET of Portal server request certification page Request message is referred to as authentication request packet.Owing to client device is surfed the Net by proxy server, therefore, The purpose IP address of authentication request packet and IP address that destination slogan is proxy server and port numbers. When according to the purpose IP address of authentication request packet, access device determines whether that this message passes through, by Not being the IP address of Portal server in this purpose IP address, therefore, access device does not allow this to recognize Card request message passes through, and returns step 105 and again sends HTTP redirection message to client device, Thus causing the Infinite Cyclic of certification, client device cannot be surfed the Net by certification.
It can be seen from the above description that the portal certification system comprising proxy server shown in Fig. 1 cannot By existing Portal identifying procedure, client device is authenticated.For the problems referred to above, the application Embodiment proposes a kind of portal authentication method, and the method is by the message to HTTP GET request message Content is identified confirming whether this HTTP GET request message is to be sent to recognizing of Portal server Card request message, when this HTTP GET request message of confirmation is that the certification being sent to Portal server is asked When seeking message, forward this HTTP GET request message to Portal server.
See Fig. 2, be the application portal authentication method an embodiment flow chart, this embodiment from Portal verification process is described by access device side.
Step 201, receives the HTTP GET request message that described client device sends.
It is known that http protocol is carried on TCP connection, therefore, at http protocol message Before Jiao Hu, need to set up TCP and connect.TCP establishment of connection is initiated by client device, Jing Guosan Secondary shake hands after, access device and client device complete TCP establishment of connection, and specifically setting up process can See the description of abovementioned steps 101~step 103, do not repeat them here.
After completing TCP establishment of connection, client device and access device all enter ESTABLISHED (up to) state.Access device can get client by TCP connection procedure The IP address of equipment and port numbers, and IP address and the port numbers of client device are recorded.
After setting up above-mentioned TCP connection, access device can receive client by this TCP and set The HTTP GET request message that preparation is sent.
Step 202, it is judged that whether described HTTP GET request message carries in described Portal server The URL address of certification page.
The Internet resources that client device desires access to can be carried in HTTP GET request message URL address.The application, after receiving HTTP GET request message, is not to obtain message simply Source, purpose IP address are analyzed, but the message content to HTTP GET request message is carried out point Analysis, thus judge whether this HTTP GET request message is the message accessing Portal server.For example, The URL address assuming certification page in Portal server is http: // 192.168.2.1:8080/portal_login.html, then access device is receiving HTTP GET request report Whether Wen Hou, can be by way of string search, it is judged that comprise above-mentioned in HTTP GET request message URL address information.
Step 203, when carrying certification in described Portal server in described HTTP GET request message During the URL address of the page, forward described HTTP GET request message to described Portal server.
Access device is according to the judged result of step 202, and a point following two situation is processed:
When the URL address not carrying certification page in Portal server in HTTP GET request message When, illustrate that this HTTP GET request message is not destined to the authentication request packet of Portal server, But ask the message of other Internet resources.For unverified client device, this HTTP GET please Asking message to be that certification triggers message, therefore, access device does not allow this HTTP GET request message to pass through. First access device sends ACK message to client device, then sends HTTP to client device Redirection message, forces client device to be authenticated.Wherein, this HTTP redirection message carries The URL address of certification page in Portal server, so that client device sends to Portal server The HTTP GET request message of the URL address carrying this Portal server certification page is authenticated. Access device, after sending HTTP redirection message, disconnects TCP with client device and is connected.
When HTTP GET request message carries the URL address of certification page in Portal server, Illustrate that this HTTP GET request message is the authentication request packet being sent to Portal server, then access Equipment allows this HTTP GET request message to pass through, and this HTTP GET request message is transmitted to Portal Server is authenticated.
Forwarding before HTTP GET request message to Portal server, access device first with Portal Server is set up TCP and is connected.Specifically, access device utilizes the IP of the client device of aforementioned record Address and port numbers send SYN message, wherein, the source IP ground of this SYN message to Portal server Location is the IP address of client device, and the source port number of SYN message is the port numbers of client device. Requiring emphasis, the SYN message that access device builds herein need to be with the transmission of aforementioned client device SYN message keeps consistent, sets up even with Portal server to reach access device agent client equipment The purpose connecing.The SYN message that access device sends is transmitted to Portal server via proxy server.
After Portal server receives SYN message, respond SYN-ACK message to access device, should SYN-ACK message is transmitted to access device by proxy server.
After access device receives SYN-ACK message, reply ACK message, the source of this ACK message IP address is the IP address of client device, and the source port number of ACK message is the port of client device Number.
Access device is set up after TCP is connected by above-mentioned three-way handshake and Portal server, by client The HTTP GET request message carrying Portal server certification page URL address that equipment sends turns Issue Portal server.The HTTP GET request message that access device forwards arrives first at agency service Device, then proxy server is transmitted to Portal server.
After Portal server receives HTTP GET request message (authentication request packet), to client End equipment return authentication page data message, this certification page data message sets through proxy server, access It standby is forwarded to client device.After client device receives certification page data message, disconnect client TCP between equipment, access device and Portal server connects.
See Fig. 3, be that the Portal under the deputy environment shown in the application one exemplary embodiment authenticated Journey schematic diagram.
Step 301~step 303, client device is set up TCP with access device by three-way handshake and is connected.
Step 304, client device sends HTTP GET request message on the basis of TCP connection, should HTTP GET request message carries the URL address of Portal server certification page.
Step 305, step 306, access device is confirming that the HTTP GET that client device sends please Ask after message carries the URL address of Portal server certification page, send to Portal server SYN message, the SYN message that this SYN message sends with client device in step 301 is consistent.
Step 307 step 308, Portal server responds SYN-ACK message to access device.
Step 309, step 310, access device is responded ACK message to Portal server, is completed to connect The TCP entering between equipment with Portal server is connected.
Step 311, step 312, access device be connected with the TCP that Portal server is set up to Portal server forwards the HTTP GET request message that in step 304, client device sends.
Step 313~step 315, Portal server sends ACK message to client device.
Step 316~step 318, Portal server sends certification page data message to client device, Certification page information is provided.
Step 319, client device shows certification page, and meanwhile, disconnection client device, access set TCP between standby and Portal server connects.
By foregoing description it can be seen that the application can realize the Portal verification process under deputy environment, protect Demonstrate,prove the security that under deputy environment, client device accesses.
Corresponding with the embodiment of aforementioned portal authentication method, present invention also provides Portal certification dress The embodiment put.
The embodiment of the application Portal authentication device can be applied on access device.Device embodiment can To be realized by software, it is also possible to realize by way of hardware or software and hardware combining.Implemented in software As a example by, it as the device on a logical meaning, is the processor run memory by its place equipment In corresponding computer program instructions formed.For hardware view, as shown in Figure 4, it is the application A kind of hardware structure diagram of Portal authentication device place equipment, except the processor shown in Fig. 4, network Outside interface and memory, in embodiment, the equipment at device place is generally according to the actual work(of this equipment Can, other hardware can also be included, this is repeated no more.
Refer to Fig. 5, for the structural representation of the Portal authentication device in one embodiment of the application. This Portal authentication device includes receiving unit the 501st, judging unit 502 and retransmission unit 503, wherein:
Receiving unit 501, for receiving the HTTP GET request message that described client device sends;
Judging unit 502, is used for judging whether described HTTP GET request message carries described Portal The URL address of certification page in server;
Retransmission unit 503, for when described HTTP GET request message carries described Portal service In device during the URL address of certification page, forward the described HTTP GET please to described Portal server Seek message.
Further, described device also includes:
Redirect unit, for when described HTTP GET request message does not carries described Portal service In device during the URL address of certification page, send HTTP redirection message, institute to described client device State the URL address carrying certification page in described Portal server in HTTP redirection message, so that Described client device sends to described Portal server and carries certification page in described Portal server The HTTP GET request message of URL address.
Further, described device also includes:
Record unit, for receiving, in described receiving unit 501, the HTTP that described client device sends Before GET request message, set up TCP with described client device and be connected;Record described client device IP address and port numbers;
Set up unit, for forwarding described HTTP at described retransmission unit 503 to described Portal server Before GET request message, the IP address of the client device according to record and port numbers and described Portal Server is set up TCP and is connected.
Further,
Described set up unit, specifically for sending SYN message, described SYN to described Portal server The source IP address of message is the IP address of described client device, and the source port number of described SYN message is The port numbers of described client device;Receive the SYN-ACK message that described Portal server sends; Sending ACK message to described server, the source IP address of described ACK message is that described client sets Standby IP address, the source port number of described ACK message is the port numbers of described client device.
In said apparatus the function of unit and effect to realize that process specifically refers in said method corresponding Step realize process, do not repeat them here.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so related part ginseng See that the part of embodiment of the method illustrates.Device embodiment described above is only schematically, The wherein said unit illustrating as separating component can be or may not be physically separate, makees Can be for the parts that unit shows or may not be physical location, i.e. may be located at a place, Or also can be distributed on multiple NE.Can select according to the actual needs part therein or The whole module of person realizes the purpose of the application scheme.Those of ordinary skill in the art are not paying creativeness It in the case of work, is i.e. appreciated that and implements.
The foregoing is only the preferred embodiment of the application, not in order to limit the application, all at this Within the spirit of application and principle, any modification, equivalent substitution and improvement etc. done, should be included in Within the scope of the application protects.

Claims (8)

1. a portal authentication method, is applied to access device, it is characterised in that the method includes:
Receive the HTTP GET request message that described client device sends;
Judge whether described HTTP GET request message carries certification page in described Portal server URL address;
As the URL carrying certification page in described Portal server in described HTTP GET request message During address, forward described HTTP GET request message to described Portal server.
2. the method for claim 1, it is characterised in that described method also includes:
When described HTTP GET request message does not carries certification page in described Portal server During URL address, send HTTP redirection message, described HTTP redirection to described client device Message carries the URL address of certification page in described Portal server, so that described client device Carry the URL address of certification page in described Portal server to the transmission of described Portal server HTTP GET request message.
3. method as claimed in claim 1 or 2, it is characterised in that the described client of described reception sets Before the HTTP GET request message that preparation is sent, also include:
Set up TCP with described client device to be connected;
Record IP address and the port numbers of described client device;
Described before described Portal server forwards described HTTP GET request message, also include:
The IP address of the client device according to record and port numbers set up TCP with described Portal server Connect.
4. method as claimed in claim 3, it is characterised in that the described client device according to record IP address and port numbers set up TCP with described Portal server and be connected, comprising:
Sending SYN message to described Portal server, the source IP address of described SYN message is described The IP address of client device, the source port number of described SYN message is the port of described client device Number;
Receive the SYN-ACK message that described Portal server sends;
Sending ACK message to described server, the source IP address of described ACK message is described client The IP address of end equipment, the source port number of described ACK message is the port numbers of described client device.
5. a Portal authentication device, is applied to access device, it is characterised in that this device includes:
Receiving unit, for receiving the HTTP GET request message that described client device sends;
Judging unit, is used for judging whether described HTTP GET request message carries described Portal service The URL address of certification page in device;
Retransmission unit, for when carrying in described Portal server in described HTTP GET request message During the URL address of certification page, forward described HTTP GET request report to described Portal server Literary composition.
6. device as claimed in claim 5, it is characterised in that described device also includes:
Redirect unit, for when described HTTP GET request message does not carries described Portal service In device during the URL address of certification page, send HTTP redirection message, institute to described client device State the URL address carrying certification page in described Portal server in HTTP redirection message, so that Described client device sends to described Portal server and carries certification page in described Portal server The HTTP GET request message of URL address.
7. the device as described in claim 5 or 6, it is characterised in that described device also includes:
Record unit, for receiving, in described receiving unit, the HTTP GET that described client device sends Before request message, set up TCP with described client device and be connected;Record the IP of described client device Address and port numbers;
Set up unit, for forwarding described HTTP GET at described retransmission unit to described Portal server Before request message, IP address and the port numbers of the client device according to record service with described Portal Device is set up TCP and is connected.
8. device as claimed in claim 7, it is characterised in that:
Described set up unit, specifically for sending SYN message, described SYN to described Portal server The source IP address of message is the IP address of described client device, and the source port number of described SYN message is The port numbers of described client device;Receive the SYN-ACK message that described Portal server sends; Sending ACK message to described server, the source IP address of described ACK message is that described client sets Standby IP address, the source port number of described ACK message is the port numbers of described client device.
CN201510478985.3A 2015-08-06 2015-08-06 Portal authentication method and portal authentication device Pending CN105991641A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510478985.3A CN105991641A (en) 2015-08-06 2015-08-06 Portal authentication method and portal authentication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510478985.3A CN105991641A (en) 2015-08-06 2015-08-06 Portal authentication method and portal authentication device

Publications (1)

Publication Number Publication Date
CN105991641A true CN105991641A (en) 2016-10-05

Family

ID=57040302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510478985.3A Pending CN105991641A (en) 2015-08-06 2015-08-06 Portal authentication method and portal authentication device

Country Status (1)

Country Link
CN (1) CN105991641A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453409A (en) * 2016-11-28 2017-02-22 迈普通信技术股份有限公司 Packet processing method and access device
CN109698832A (en) * 2018-12-28 2019-04-30 杭州迪普科技股份有限公司 The method and relevant device that Portal certification is quickly provided, quickly pops up Portal certification page
CN111049946A (en) * 2019-12-24 2020-04-21 深信服科技股份有限公司 Portal authentication method, Portal authentication system, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873332A (en) * 2010-07-15 2010-10-27 杭州华三通信技术有限公司 WEB authentication method and equipment based on proxy server
CN101873329A (en) * 2010-06-29 2010-10-27 迈普通信技术股份有限公司 Portal compulsory authentication method and access equipment
WO2013002538A2 (en) * 2011-06-27 2013-01-03 Ahnlab, Inc. Method and apparatus for preventing distributed denial of service attack
CN103825881A (en) * 2013-12-13 2014-05-28 福建三元达通讯股份有限公司 Method and apparatus for realizing redirection of WLAN user based on wireless access controller (AC)

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873329A (en) * 2010-06-29 2010-10-27 迈普通信技术股份有限公司 Portal compulsory authentication method and access equipment
CN101873332A (en) * 2010-07-15 2010-10-27 杭州华三通信技术有限公司 WEB authentication method and equipment based on proxy server
WO2013002538A2 (en) * 2011-06-27 2013-01-03 Ahnlab, Inc. Method and apparatus for preventing distributed denial of service attack
CN103825881A (en) * 2013-12-13 2014-05-28 福建三元达通讯股份有限公司 Method and apparatus for realizing redirection of WLAN user based on wireless access controller (AC)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453409A (en) * 2016-11-28 2017-02-22 迈普通信技术股份有限公司 Packet processing method and access device
CN106453409B (en) * 2016-11-28 2019-12-10 迈普通信技术股份有限公司 Message processing method and access device
CN109698832A (en) * 2018-12-28 2019-04-30 杭州迪普科技股份有限公司 The method and relevant device that Portal certification is quickly provided, quickly pops up Portal certification page
CN109698832B (en) * 2018-12-28 2021-07-23 杭州迪普科技股份有限公司 Method for rapidly providing Portal authentication and rapidly popping Portal authentication page and related equipment
CN111049946A (en) * 2019-12-24 2020-04-21 深信服科技股份有限公司 Portal authentication method, Portal authentication system, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110300117B (en) IOT device and user binding authentication method, device and medium
CN106131079B (en) Authentication method, system and proxy server
US8365258B2 (en) Multi factor authentication
US9756019B2 (en) DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP address
CN108881308B (en) User terminal and authentication method, system and medium thereof
CN101873332B (en) WEB authentication method and equipment based on proxy server
CN102197400A (en) Network location determination for direct access networks
CN104158818B (en) A kind of single-point logging method and system
US10693854B2 (en) Method for authenticating a user, corresponding server, communications terminal and programs
EP2770689A1 (en) Authentication method, transfer apparatus, and authentication server
CN101702717A (en) Method, system and equipment for authenticating Portal
US9065526B2 (en) Relay device, relay method, and relay device control program
JP2007310512A (en) Communication system, service providing server, and user authentication server
CN110830516B (en) Network access method, device, network control equipment and storage medium
CN103997479B (en) A kind of asymmetric services IP Proxy Methods and equipment
CN104852919A (en) Method and apparatus for realizing portal authentication
CN105871853A (en) Portal authenticating method and system
CN105991640B (en) Handle the method and device of HTTP request
CN110557358A (en) Honeypot server communication method, SSLStrip man-in-the-middle attack perception method and related device
CN104468265A (en) Method and device for detecting online states of local area network terminals
CN108259457A (en) A kind of WEB authentication methods and device
CN105991518B (en) Network access verifying method and device
CN104811439A (en) Portal authentication method and device
CN105991641A (en) Portal authentication method and portal authentication device
CN102223266B (en) Method and device for detecting protocol agent

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant after: Hangzhou Dipu Polytron Technologies Inc

Address before: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant before: Hangzhou Dipu Technology Co., Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005

RJ01 Rejection of invention patent application after publication