CN108055299B - Portal page pushing method, network access server and Portal authentication system - Google Patents

Portal page pushing method, network access server and Portal authentication system Download PDF

Info

Publication number
CN108055299B
CN108055299B CN201711267671.4A CN201711267671A CN108055299B CN 108055299 B CN108055299 B CN 108055299B CN 201711267671 A CN201711267671 A CN 201711267671A CN 108055299 B CN108055299 B CN 108055299B
Authority
CN
China
Prior art keywords
portal
user terminal
page file
portal page
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711267671.4A
Other languages
Chinese (zh)
Other versions
CN108055299A (en
Inventor
陈睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Maipu Communication Technology Co Ltd
Original Assignee
Maipu Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Maipu Communication Technology Co Ltd filed Critical Maipu Communication Technology Co Ltd
Priority to CN201711267671.4A priority Critical patent/CN108055299B/en
Publication of CN108055299A publication Critical patent/CN108055299A/en
Application granted granted Critical
Publication of CN108055299B publication Critical patent/CN108055299B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/954Navigation, e.g. using categorised browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/06Network-specific arrangements or communication protocols supporting networked applications adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/26Push based network services

Abstract

The invention provides a Portal page pushing method, a network access server and a Portal authentication system, wherein the Portal page pushing method is applied to the network access server and comprises the following steps: acquiring a network access request sent by a user terminal, wherein the network access request comprises identity information of the user terminal; detecting whether the user terminal is authorized; if the user terminal is not authorized, searching whether a target Portal page file corresponding to the identity information is cached or not; and when the corresponding target Portal page file is found, sending the target Portal page file to the user terminal. Therefore, the user terminal can obtain the Portal page file from the network access server, the transmission path of the Portal page file is shortened, the transmission efficiency is improved, and the influence on the transmission resources of other network equipment in the Portal file pushing process is reduced.

Description

Portal page pushing method, network access server and Portal authentication system
Technical Field
The invention relates to the technical field of network communication, in particular to a Portal page pushing method, a network access server and a Portal authentication system.
Background
In the management of visitor network access control in public places, authentication information is often acquired by interaction between a Portal authentication system (Portal authentication system) and a user terminal to control access of the user terminal to an external network. In the process of Portal authentication, a Network Access request of a user terminal is acquired by a Network Access Server (NAS), the NAS judges whether the user terminal is authenticated, and when the user terminal is not authenticated, the NAS redirects the Access request of the user terminal to the Portal Server. The user terminal accesses the Portal server, the Portal server provides a corresponding Portal page according to the identity information of the user terminal, and the user terminal inputs authentication information on the Portal page to perform online authentication.
Disclosure of Invention
In order to overcome the above disadvantages in the prior art, the present invention aims to provide a Portal page pushing method applied to a network access server, the method comprising:
acquiring a network access request sent by a user terminal, wherein the network access request comprises identity information of the user terminal;
detecting whether the user terminal is authorized;
if the user terminal is not authorized, searching whether a target Portal page file corresponding to the identity information is cached or not;
and when the corresponding target Portal page file is found, sending the target Portal page file to the user terminal.
The Portal page file is cached by the network access server, so that the user terminal can obtain the Portal page file from the nearby network access server, the transmission path of the Portal page file is shortened, the transmission efficiency is improved, and the influence on the transmission resources of other network equipment in the pushing process of the Portal file is reduced.
Optionally, in the foregoing method, the step of searching whether a target Portal page file corresponding to the identity information is cached includes:
sending the identity information of the user terminal to a Portal server;
receiving a page identifier corresponding to the identity information, which is returned by the Portal server according to a preset push strategy;
and searching whether a corresponding target Portal page file is cached or not according to the page identification.
Since the Portal page file is generally managed by the Portal server, the Portal server notifies the network access server of the Portal page file which needs to be provided for the user terminal according to a preset strategy by sending the identity information of the user terminal to the Portal server, so that the network access server can provide the correct Portal page file for the user terminal.
Optionally, in the above method, after the step of searching whether the target Portal page file corresponding to the identity information is cached or not if the user terminal is not authorized, the method further includes:
when the corresponding target Portal page file is not found, acquiring the corresponding target Portal page file from the target Portal server according to the page identifier and caching the target Portal page file;
and sending the cached target Portal page file to the user terminal.
In this embodiment, the network access server caches the target Portal page file first, and then sends the target Portal page file to the user terminal, so that the network access server can directly send out the cached target Portal page file when other user terminals need to acquire the same target Portal page file next time.
Optionally, in the above method, the step of obtaining and caching a corresponding target Portal page file from the target Portal server according to the page identifier includes:
generating a URL address for accessing the Portal server according to the page identifier;
and accessing the URL address, obtaining a target Portal page file sent by the Portal server and caching the target Portal page file.
Optionally, in the above method, after the step of searching whether the target Portal page file corresponding to the identity information is cached or not if the user terminal is not authorized, the method further includes:
when the corresponding target Portal page file is not found, redirecting the network access request of the user terminal to the Portal server to enable the user terminal to acquire the target Portal page file from the Portal server; and obtaining the target Portal page from the Portal server and caching the target Portal page.
In this embodiment, the user terminal and the network device can simultaneously obtain the target Portal page file, and the speed of obtaining the target Portal page by the user terminal is improved while the network access server is ensured to be capable of processing the target Portal page file which is cached before.
Optionally, in the above method, the method further comprises:
for each cached Portal page file, detecting the unused time length of the Portal page file;
and deleting the Portal page file when the duration exceeds a preset duration threshold.
By deleting the historical version Portal page file cached by the network access server at regular time, the storage space of the network communication equipment can be saved.
Another object of the present invention is to provide a network access server, comprising:
a network request acquisition module, configured to acquire a network access request sent by a user terminal, where the network access request generally includes identity information of the user terminal;
the authentication detection module is used for detecting whether the user terminal is authenticated and authorized;
the page searching module is used for searching whether a target Portal page file corresponding to the identity information is cached or not if the user terminal is not authorized; when the corresponding target Portal page file is found, the target Portal page file is sent to the user terminal; and when the corresponding target Portal page file is not found, acquiring the corresponding target Portal page file from the Portal server and sending the target Portal page file to the user terminal.
The Portal page file is cached by the network access server, so that the user terminal can obtain the Portal page file from the nearby network access server, the transmission path of the Portal page file is shortened, the transmission efficiency is improved, and the influence on the transmission resources of other network equipment in the pushing process of the Portal file is reduced.
Optionally, in the network access server, when the page search module searches the target Portal page file,
sending the identity information of the user terminal to a Portal server;
receiving a page identifier corresponding to the identity information, which is returned by the Portal server according to a preset push strategy;
and searching whether a corresponding target Portal page file is cached or not according to the page identification.
Since the Portal page file is generally managed by the Portal server, the Portal server notifies the network access server of the Portal page file which needs to be provided for the user terminal according to a preset strategy by sending the identity information of the user terminal to the Portal server, so that the network access server can provide the correct Portal page file for the user terminal.
Another objective of the present invention is to provide a Portal authentication system, which includes the network access server and the Portal server provided by the present invention, wherein the Portal service stores Portal page files;
and when detecting that the Portal page file is updated, the Portal server generates a new page identifier for the updated Portal page file.
Another object of the present invention is to provide a readable storage medium storing executable instructions, which when executed by one or more processors, implement the Portal page pushing method provided by the present invention.
And after the Portal page file is updated, the Portal server re-determines the corresponding relation between the page identifier of the Portal page file and the identity information of the user terminal, so that the network access server can obtain the latest Portal page file when searching the target Portal page file according to the identity information of the user terminal, and the dynamic update of the Portal page file is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 is an interaction diagram of a Portal authentication system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a Portal page pushing method according to an embodiment of the present invention;
FIG. 3 is a second schematic diagram of a Portal page pushing method according to an embodiment of the present invention;
fig. 4 is a schematic functional module diagram of a network access server according to an embodiment of the present invention.
Icon: 10-Portal authentication system; 100-a network access server; 111-network request acquisition module; 112-authentication detection module; 113-a page lookup module; 200-Portal server; 20-a user terminal; 30-external network.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In the Portal authentication process in the prior art, when a network access server obtains a network access request sent by an unauthorized user terminal, the network access server redirects the network request of the user terminal to a Portal server, so that the user terminal initiates access to the Portal server, and the Portal server returns a file (such as an Html file of a Portal page) matching a corresponding Portal page to the user terminal according to identity information of the user terminal, so that the user terminal displays the corresponding Portal page, and inputs authentication information on the Portal page to complete authorization authentication.
Through a lot of researches of the inventor, under the condition that the networking environment is relatively complex, a plurality of other network devices may pass between the user terminal and the Portal server, so that the forwarding path is too long when the Portal server sends the Portal page file to the user terminal, the time for the user terminal to wait for loading the Portal page is too long, and the user experience is influenced. In addition, in the transmission process of the Portal page file, transmission resources of each network device in the path are occupied, and the pressure of network transmission is increased.
The defects existing in the above solutions are the results obtained after the inventor has practiced and studied carefully, so the discovery process of the above problems and the solutions proposed by the following embodiments of the present invention to the above problems should be the contribution of the inventor to the present invention in the process of the present invention.
Based on the above research, in this embodiment, the inventor designs that a network access server can cache a Portal page file, and when the user terminal needs to access a Portal page, the Portal page file is provided for the user terminal through the network access server accessed by the user terminal.
The details of the Portal page pushing method, the network access server and the Portal authentication system provided by the embodiment are described below.
Referring to fig. 1, fig. 1 is a schematic diagram of a Portal authentication system 10 according to a preferred embodiment of the present invention, where the Portal authentication system 10 at least includes a network access server 100 and a Portal server 200.
The network Access server 100 is configured to connect with a Portal server 200, the user terminal 20 may Access the network Access server 100 through a device such as a Wireless Access Point (AP), and perform information authorization information interaction with the Portal server 200 through the network Access server 100, after the authorization is passed, the Portal server 200 notifies the network Access server 100 that the traffic of the user terminal 20 accessing the external network 30 is allowed to pass through. In this embodiment, there may be a plurality of other network devices between the network access server 100 and the Portal server 200.
Referring to fig. 2, fig. 2 is a diagram illustrating a Portal page pushing method applied to the network access server 100 shown in fig. 1, and the steps of the method are described in detail below.
Step S110 is to obtain a network access request sent by the user terminal 20, where the network access request includes the identity information of the user terminal 20.
In this embodiment, the network access request accessed by the user terminal 20 is obtained by the network access server 100, and the network access request includes identity information of the user terminal 20, where the identity information may be information that can identify a unique identity of the user terminal 20, such as an IP address and a MAC address of the user terminal 20. The network request may be an access request initiated to the external network 30.
Step S120, detecting whether the user terminal 20 is authorized.
The network access server 100 detects whether the user terminal 20 is authorized according to the identity information of the user terminal 20, and allows the network request sent by the user terminal 20 to pass through if the user terminal 20 is authorized, so that the user terminal 20 can access the external network 30.
Step S130, if the user terminal 20 is not authorized, find whether a target Portal page file corresponding to the identity information is cached.
For different user terminals 20, different Portal pages may need to be provided for authorization verification, so in this embodiment, if the network access server 100 detects that the user terminal 20 is not authorized, it searches whether a target Portal page file corresponding to the identity information has been cached before according to the identity information of the user terminal 20.
In this embodiment, the Portal page files are managed by the Portal server 200 in a unified manner, for example, the Portal server 200 determines the corresponding relationship between the Portal page files and the identity information of the user terminal 20 according to a preset push policy, or manages the update iteration of the Portal page files. Therefore, in this embodiment, the network access server 100 needs to perform information interaction with the Portal server 200, and the Portal server 200 determines the corresponding target Portal page file according to the identity information of the user terminal 20.
The network access server 100 first sends the identity information of the ue 20 to the Portal server 200, for example, by calling a specific data interface of the Portal server 200 to transfer the identity information of the ue 20 as a parameter to the Portal server 200.
The Portal server 200 pre-stores at least one Portal page file and generates a unique page identifier for each Portal page file. The page identification can be generated according to the extracted information of the Portal page file and a certain encryption algorithm; when the Portal page file changes, the corresponding page identification also changes. The Portal server 200 determines a target Portal page file to be provided to the user terminal 20 according to the identity information sent by the network access server 100 and a preset push policy, and then returns a page identifier of the target Portal page file to the network access server 100. Wherein the push policy may include a correspondence between the page identifier and the identity information of the user terminal 20.
The network access server 100 receives the page identifier returned by the Portal server 200, and searches whether a corresponding target Portal page file is cached before according to the page identifier.
Step S140, when the corresponding target Portal page file is found, the target Portal page file is sent to the user terminal 20.
When the network access server 100 finds the corresponding target Portal page file, the target Portal page file is directly sent to the user terminal 20, the user terminal 20 renders the received target Portal page file to display a Portal page, and a user can input online authentication information on the Portal page through the user terminal 20 and send the online authentication information to the Portal server 200 for online authentication.
Based on the above design, the method for pushing a Portal page provided in this embodiment may cache a Portal page through the network access server 100, determine the target Portal page through the identity information and the page identifier with a small amount of interactive data between the network access server 100 and the Portal server 200, and then directly push a Portal page file to the user terminal 20 through the network access server 100.
Therefore, the user terminal 20 does not need to perform complex network transmission when acquiring the Portal page file, thereby reducing transmission waiting time and improving user experience, and meanwhile, the network access server 100 directly completes the pushing of the Portal page file, thereby avoiding occupying transmission resources of other network equipment in the transmission process of the Portal page file.
However, in the above flow, there may be a case where the network access server 100 does not cache the corresponding target Portal page file, so in this embodiment, the network access server 100 needs to obtain the target Portal page file from the Portal server 200 when the corresponding target Portal page file is not found.
Optionally, referring to fig. 2 again, in this embodiment, the method may further include step S150A.
Step S150A, when the corresponding target Portal page file is not found, the corresponding target Portal page file is obtained from the Portal server 200 according to the page identifier and cached. And then sends the cached target Portal page file to the user terminal 20.
In this way, when another user terminal 20 needs to obtain the target Portal page file later, the target Portal page file can be directly obtained from the network access server 100.
For example, when the network access server 100 obtains the target Portal page file, a URL address for accessing the Portal server 200 may be generated according to the page identifier, for example, the domain name of the URL address is the Portal server 200, and the page identifier is one parameter of the URL address.
Then the network access server 100 accesses the URL address, and sends a page access request to the Portal server 200, and the Portal server 200 sends a corresponding target Portal page file to the network access server 100 for caching according to the page access request. And sending the target Portal page file to the user terminal 20 after caching.
Optionally, referring to fig. 3, in this embodiment, the method may further include step S150B.
Step S150B, when the corresponding target Portal page file is not found, redirecting the network access request of the user terminal 20 to the Portal server 200, so that the user terminal 20 obtains the target Portal page from the Portal server 200, and obtains and caches the target Portal page from the Portal server 200.
For example, the network access server 100 may first generate a URL address for accessing the Portal server 200 according to the page identifier, and redirect the network access request of the user terminal 20 to the URL address. Meanwhile, the network access server 100 also obtains the target Portal page from the Portal server 200 and caches the target Portal page.
Thus, when the user terminal 20 obtains the target Portal page file, the network access server 100 also obtains the target Portal page file for caching, so that the waiting time of the user terminal 20 is reduced, and the user experience is improved.
It should be noted that the above-mentioned ways for the network access server 100 to obtain and cache the target Portal page file are only two possible implementations in this embodiment, and do not constitute a limitation to this implementation, and in other implementations in this embodiment, the network access server 100 may interact with the Portal server 200 in other ways to obtain the target Portal page file.
Optionally, since the Portal server 200 manages the Portal page files in a unified manner, in this embodiment, when detecting that the Portal page file is updated, the Portal server 200 may generate a new page identifier for the updated Portal page file, and update the corresponding relationship between the page identifier and the user identity information in the push policy.
Thus, after the Portal page file is updated, the network access server 100 can always search the latest Portal page file for the user terminal 20, and dynamic update and caching of the Portal page file are realized.
Alternatively, since the network access server 100 may cache the Portal page files that were once accessed by the user terminal 20, historical versions of the Portal page files may still exist in the network access server 100 if the Portal page files are updated, but the historical versions of the Portal page files are not provided to the user terminal 20.
Therefore, in this embodiment, in order to avoid that the historical versions of the Portal page files occupy the storage space of the network access server 100, the network access server 100 may detect, for each cached Portal page file, an unused duration of the Portal page file, and delete the Portal page file when the duration exceeds a preset duration threshold.
Referring to fig. 4, the present embodiment further provides a network access server 100 applied to the network access server 100 shown in fig. 1, where the network access server 100 includes a network request obtaining module 111, an authentication detecting module 112, and a page searching module 113.
The network request obtaining module 111 is configured to obtain a network access request sent by the user terminal 20, where the network access request generally includes the identity information of the user terminal 20.
In this embodiment, the network request obtaining module 111 may be configured to execute step S110 shown in fig. 3, and the detailed description about the network request obtaining module 111 may refer to the description about step S110.
The authentication detection module 112 is configured to detect whether the user terminal 20 has been authenticated.
In this embodiment, the authentication detection module 112 may be configured to execute step S120 shown in fig. 2, and the detailed description about the authentication detection module 112 may refer to the description about step S120.
The page searching module 113 is configured to search whether a target Portal page file corresponding to the identity information is cached if the user terminal 20 is not authorized; when the corresponding target Portal page file is found, sending the target Portal page file to the user terminal 20; and when the corresponding target Portal page file is not found, acquiring the corresponding target Portal page file from the Portal server 200 and sending the target Portal page file to the user terminal 20.
In this embodiment, the page search module 113 can be used to execute the steps S130, S140 and S150A shown in fig. 2, and the detailed description of the page search module 113 can refer to the description of the steps S130, S140 and S150A.
Optionally, in this embodiment, when searching for the target Portal page file, the page searching module 113 first sends the identity information of the user terminal 20 to the Portal server 200, then receives a page identifier corresponding to the identity information and returned by the Portal server 200 according to a preset push policy, and then searches whether the corresponding target Portal page file is cached according to the page identifier.
In summary, the Portal page pushing method, the network access server 100 and the Portal authentication system 10 provided by the present invention cache the Portal page file by the network access server 100, and in the Portal authentication process, the network access server 100 provides the cached Portal page file according to the identity information of the user terminal 20. Thus, the user terminal 20 can obtain the Portal page file from the nearest network access server 100, the transmission path of the Portal page file is shortened, the transmission efficiency is improved, and the influence on the transmission resources of other network equipment in the pushing process of the Portal file is reduced.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. A Portal page pushing method is applied to a network access server, and comprises the following steps:
acquiring a network access request sent by a user terminal, wherein the network access request comprises identity information of the user terminal;
detecting whether the user terminal is authorized;
if the user terminal is not authorized, searching whether a target Portal page file corresponding to the identity information is cached or not;
when the corresponding target Portal page file is found, the target Portal page file is sent to the user terminal;
wherein, the step of searching whether the target Portal page file corresponding to the identity information is cached comprises the following steps:
sending the identity information of the user terminal to a Portal server;
receiving a page identifier corresponding to the identity information, which is returned by the Portal server according to a preset push strategy;
and searching whether a corresponding target Portal page file is cached or not according to the page identification.
2. The method of claim 1, wherein after the step of searching whether the target Portal page file corresponding to the identity information is cached if the user terminal is not authorized, the method further comprises:
when the corresponding target Portal page file is not found, acquiring the corresponding target Portal page file from the target Portal server according to the page identifier and caching the target Portal page file;
and sending the cached target Portal page file to the user terminal.
3. The method of claim 2, wherein said step of obtaining and caching a corresponding target Portal page file from said target Portal server based on said page identifier comprises:
generating a URL address for accessing the Portal server according to the page identifier;
and accessing the URL address, obtaining a target Portal page file sent by the Portal server and caching the target Portal page file.
4. The method of claim 1, wherein after the step of searching whether the target Portal page file corresponding to the identity information is cached if the user terminal is not authorized, the method further comprises:
when the corresponding target Portal page file is not found, redirecting the network access request of the user terminal to the Portal server to enable the user terminal to acquire the target Portal page file from the Portal server; and obtaining the target Portal page from the Portal server and caching the target Portal page.
5. The method according to any one of claims 1-4, further comprising:
for each cached Portal page file, detecting the unused time length of the Portal page file;
and deleting the Portal page file when the duration exceeds a preset duration threshold.
6. A network access server, the network access server comprising:
a network request acquisition module, configured to acquire a network access request sent by a user terminal, where the network access request generally includes identity information of the user terminal;
the authentication detection module is used for detecting whether the user terminal is authenticated and authorized;
the page searching module is used for searching whether a target Portal page file corresponding to the identity information is cached or not if the user terminal is not authorized; when the corresponding target Portal page file is found, the target Portal page file is sent to the user terminal; when the corresponding target Portal page file is not found, acquiring the corresponding target Portal page file from the Portal server and sending the target Portal page file to the user terminal;
wherein, when the page searching module searches the target Portal page file,
sending the identity information of the user terminal to a Portal server;
receiving a page identifier corresponding to the identity information, which is returned by the Portal server according to a preset push strategy;
and searching whether a corresponding target Portal page file is cached or not according to the page identification.
7. A Portal authentication system comprising the network access server of claim 6 and a Portal server, the Portal server storing a Portal page file;
and when detecting that the Portal page file is updated, the Portal server generates a new page identifier for the updated Portal page file.
8. A readable storage medium storing executable instructions which, when executed by one or more processors, perform the method of pushing Portal pages of any of claims 1-5.
CN201711267671.4A 2017-12-05 2017-12-05 Portal page pushing method, network access server and Portal authentication system Active CN108055299B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711267671.4A CN108055299B (en) 2017-12-05 2017-12-05 Portal page pushing method, network access server and Portal authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711267671.4A CN108055299B (en) 2017-12-05 2017-12-05 Portal page pushing method, network access server and Portal authentication system

Publications (2)

Publication Number Publication Date
CN108055299A CN108055299A (en) 2018-05-18
CN108055299B true CN108055299B (en) 2020-12-15

Family

ID=62122295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711267671.4A Active CN108055299B (en) 2017-12-05 2017-12-05 Portal page pushing method, network access server and Portal authentication system

Country Status (1)

Country Link
CN (1) CN108055299B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109819033A (en) * 2019-01-25 2019-05-28 杭州迪普科技股份有限公司 A kind of resource file loading method and system
CN109951487A (en) * 2019-03-22 2019-06-28 杭州迪普科技股份有限公司 A kind of portal authentication method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741888A (en) * 2008-11-11 2010-06-16 中国移动通信集团上海有限公司 Method, system and device for pushing certification page
CN104735078A (en) * 2015-04-02 2015-06-24 迈普通信技术股份有限公司 Portal access authentication system and method
CN106412893A (en) * 2016-09-18 2017-02-15 上海斐讯数据通信技术有限公司 Rapid Portal authentication method, system, and WIFI device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030005019A1 (en) * 2001-06-27 2003-01-02 Kuldipsingh Pabla Application frameworks for mobile devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741888A (en) * 2008-11-11 2010-06-16 中国移动通信集团上海有限公司 Method, system and device for pushing certification page
CN104735078A (en) * 2015-04-02 2015-06-24 迈普通信技术股份有限公司 Portal access authentication system and method
CN104735078B (en) * 2015-04-02 2018-12-25 迈普通信技术股份有限公司 A kind of Portal access authentication system and method
CN106412893A (en) * 2016-09-18 2017-02-15 上海斐讯数据通信技术有限公司 Rapid Portal authentication method, system, and WIFI device

Also Published As

Publication number Publication date
CN108055299A (en) 2018-05-18

Similar Documents

Publication Publication Date Title
EP2878115B1 (en) Online user account login method and server system implementing the method
CN103607385B (en) Method and apparatus for security detection based on browser
EP2985705A2 (en) Webpage access method and apparatus, and router
CN105939326B (en) Method and device for processing message
WO2017079795A1 (en) A distributed user profile identity verification system for e-commerce transaction security
CN102891826B (en) The control method of web page access, equipment and system
US20170339631A1 (en) System and Method for Implementing Community Wireless Communications Service
US20150113113A1 (en) Application takeover method and system, mobile terminal, and server
CN108055299B (en) Portal page pushing method, network access server and Portal authentication system
CN103051647A (en) Method, device and system for implementing session
CN108259457B (en) WEB authentication method and device
EP3170091B1 (en) Method and server of remote information query
CN105873055B (en) Wireless network access authentication method and device
CN109257373B (en) Domain name hijacking identification method, device and system
CN108809969B (en) Authentication method, system and device
CN107508822B (en) Access control method and device
US10484422B2 (en) Prevention of rendezvous generation algorithm (RGA) and domain generation algorithm (DGA) malware over existing internet services
US20190044950A1 (en) Detection of Compromised Access Points
CN106803830B (en) Method, device and system for identifying internet access terminal and User Identity Module (UIM) card
US9148444B2 (en) Rotation of web site content to prevent e-mail spam/phishing attacks
CN109788050B (en) Method, system, electronic device and medium for acquiring IP address of source station
CN106790176B (en) Method and system for accessing network
US10601864B1 (en) Using disposable profiles for privacy in internet sessions
EP3545457A1 (en) Data message authentication based on a random number
US20160050292A1 (en) Local web resource access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant