CN113542239B - Authentication method, system, device and storage medium based on Web monitoring - Google Patents

Authentication method, system, device and storage medium based on Web monitoring Download PDF

Info

Publication number
CN113542239B
CN113542239B CN202110729292.2A CN202110729292A CN113542239B CN 113542239 B CN113542239 B CN 113542239B CN 202110729292 A CN202110729292 A CN 202110729292A CN 113542239 B CN113542239 B CN 113542239B
Authority
CN
China
Prior art keywords
authentication
user name
user
http message
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110729292.2A
Other languages
Chinese (zh)
Other versions
CN113542239A (en
Inventor
龙光武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Sipuling Technology Co Ltd
Original Assignee
Wuhan Sipuling Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Sipuling Technology Co Ltd filed Critical Wuhan Sipuling Technology Co Ltd
Priority to CN202110729292.2A priority Critical patent/CN113542239B/en
Publication of CN113542239A publication Critical patent/CN113542239A/en
Application granted granted Critical
Publication of CN113542239B publication Critical patent/CN113542239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention relates to an authentication method, a system, a device and a computer readable storage medium based on Web monitoring, wherein the method comprises the following steps: acquiring a complete authentication message, acquiring server information and authentication-related characteristics according to the authentication message, and configuring the server information and the authentication-related characteristics, wherein the authentication-related characteristics comprise user name parameters; acquiring HTTP message information of the Internet access behavior management equipment, and determining a domain name or an IP in the HTTP message according to the HTTP message information; and matching the domain name or the IP in the HTTP message with the server information, if the matching is successful, acquiring the configured user name parameter and inquiring whether the user name parameter exists in the HTTP message, if so, extracting the corresponding user name, and authenticating according to the user name. The authentication method based on Web monitoring provides a user authentication mode with simple configuration, and strong deployment flexibility and expansibility.

Description

Authentication method, system, device and storage medium based on Web monitoring
Technical Field
The present invention relates to the field of internet authentication technologies, and in particular, to an authentication method, system, device, and computer-readable storage medium based on Web monitoring.
Background
In the internet behavior management device, many services are based on authenticated users. Such as application control, application auditing, flow control, etc. Therefore, the device needs to provide an authentication function for the terminal (or perform authentication with a third party authentication server). The authentication process is roughly divided into the following four steps: the terminal accesses the external network flow, the flow is hijacked by the equipment through the equipment, and the equipment is redirected to an authentication page; the user inputs authentication information (user, password, etc.) and submits it to the device; the equipment completes authentication information check (or submits to a third-party server and then waits for an authentication result), and then returns the result to the terminal; and after receiving the authentication success information, the terminal can be connected with an external network.
After the authentication is successful, the equipment can create a corresponding user object, the session of the terminal flow is associated to the user object, and when each business function is associated with the user object, all the flow associated to the user object can be influenced, so that the behavior of the user accessing the external network is managed and analyzed; according to different authentication principles, the main authentication modes comprise local authentication, weChat authentication, short message authentication, POP3 authentication and CMCC Portal authentication.
The above authentication methods include the following characteristics that the device needs to participate in the authentication process; for example, the local authentication mode directly authenticates the terminal, while the CMCC Portal authentication performs authentication by means of a third-party authentication server, and equipment participates indirectly; the method comprises the following steps that extra configuration is needed, firstly, an authentication strategy is configured, equipment can hijack the traffic of a terminal accessing an external network, and the traffic is redirected to a corresponding authentication page; each authentication mode requires a unique configuration; for example, short message authentication requires configuring a short message server, and wechat authentication requires configuring public number information; the development is complex and is easily influenced by a third party; for example, when the API interface of the wechat public platform changes, the wechat authentication may not be successfully authenticated, and needs to be re-developed.
Disclosure of Invention
In view of the above, it is desirable to provide an authentication method, system, device and computer readable storage medium based on Web monitoring, which are used to solve the problems of complicated configuration, and poor deployment flexibility and extensibility of the existing user authentication method.
The invention provides an authentication method based on Web monitoring, which comprises the following steps:
acquiring a complete authentication message, acquiring server information and authentication-related characteristics according to the authentication message, and configuring the server information and the authentication-related characteristics, wherein the authentication-related characteristics comprise user name parameters;
acquiring HTTP message information of the online behavior management equipment, and determining a domain name or an IP in the HTTP message according to the HTTP message information;
and matching the domain name or the IP in the HTTP message with the server information, if the matching is successful, acquiring the configured user name parameter and inquiring whether the user name parameter exists in the HTTP message, if so, extracting the corresponding user name, and authenticating according to the user name.
Further, the characteristics related to authentication further include a user name type, and the acquiring of the configured user name parameters specifically includes: determining the configured user name type, and acquiring the configured user name parameters according to the user name type.
Further, performing authentication according to the user name includes: and if the internet behavior management equipment does not start the authentication keyword function, directly authenticating by using the user name.
Further, the characteristics related to authentication also include keywords, authentication is performed according to the user name, and the method further includes querying whether the HTTP message includes the authentication keywords if the internet behavior management device enables the authentication keyword function, if so, determining whether the authentication keywords match the configured keywords, and if so, performing authentication by using the user name.
Further, the authenticating by using the user name specifically includes: the online user having the IP address as a key is associated with the user object having the user name as a key, or the online user is disassociated from the user object.
Further, the authentication-related feature is contained in a URL parameter, a Cookie, or a POST form.
Further, the authentication method based on Web monitoring also comprises the steps that during authentication, a user object is created by the user name as a name, an online user is associated to the user object, and all sessions generated by a terminal are associated to the user object.
The invention also provides an authentication system based on Web monitoring, which comprises a configuration module, a message information determination module and an authentication module;
the configuration module is used for acquiring a complete authentication message, acquiring server information and characteristics related to authentication according to the authentication message, and configuring the server information and the characteristics related to authentication, wherein the characteristics related to authentication comprise a user name parameter;
the message information determining module is used for acquiring HTTP message information passing through the Internet access behavior management equipment and determining a domain name or an IP in the HTTP message according to the HTTP message information;
and the authentication module is used for matching the domain name or the IP in the HTTP message with the server information, acquiring the configured user name parameter and inquiring whether the user name parameter exists in the HTTP message if the matching is successful, and extracting the corresponding user name if the user name parameter exists in the HTTP message, and authenticating according to the user name.
The invention also provides an authentication device based on Web monitoring, which comprises a processor and a memory, wherein the memory is stored with a computer program, and when the computer program is executed by the processor, the authentication device based on Web monitoring realizes the authentication method based on Web monitoring according to any technical scheme.
The present invention also provides a computer-readable storage medium, on which a computer program is stored, wherein when the computer program is executed by a processor, the authentication method based on Web monitoring according to any of the above technical solutions is implemented.
Compared with the prior art, the invention has the beneficial effects that: the method comprises the steps that server information and characteristics related to authentication are obtained according to an integral authentication message, and the server information and the characteristics related to authentication are configured, wherein the characteristics related to authentication comprise user name parameters; acquiring HTTP message information of the Internet access behavior management equipment, and determining a domain name or an IP in the HTTP message according to the HTTP message information; matching the domain name or IP in the HTTP message with the server information, if the matching is successful, acquiring configured user name parameters and inquiring whether the user name parameters exist in the HTTP message, if so, extracting the corresponding user name, and authenticating according to the user name; the user authentication method is simple in configuration, and high in deployment flexibility and expansibility.
Drawings
Fig. 1 is a schematic flowchart of an embodiment of an authentication method based on Web monitoring according to the present invention;
FIG. 2 is a schematic diagram of a page of configuration server information and authenticated feature information according to the present invention;
FIG. 3 is a schematic diagram of a framework for user objects, online users, and sessions provided by the present invention;
fig. 4 is a block diagram of the authentication system based on Web interception according to the present invention.
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate preferred embodiments of the invention and together with the description, serve to explain the principles of the invention and not to limit the scope of the invention.
The invention provides an authentication method based on Web monitoring, wherein the flow schematic diagram of one embodiment is shown in FIG. 1, and in the embodiment, the authentication method based on Web monitoring comprises the following steps:
s1, acquiring a complete authentication message, acquiring server information and authentication-related characteristics according to the authentication message, and configuring the server information and the authentication-related characteristics, wherein the authentication-related characteristics comprise user name parameters;
s2, obtaining HTTP message information of the Internet access behavior management equipment, and determining a domain name or an IP in the HTTP message according to the HTTP message information;
and S3, matching the domain name or IP in the HTTP message with the server information, if the matching is successful, acquiring the configured user name parameter and inquiring whether the user name parameter exists in the HTTP message, if so, extracting the corresponding user name, and authenticating according to the user name.
In one embodiment, complete authentication messages (HTTP messages) are obtained by packet capturing software, these messages are analyzed, authentication server information (domain name or IP) is obtained, and features related to authentication are extracted, the authentication including online (login) and offline (logout); the feature information obtained from the authentication message needs to be configured on the internet behavior management device.
As a preferred embodiment, the authentication-related feature is contained in a URL parameter, a Cookie, or a POST form.
In one embodiment, the authentication-related features are included in the URL parameter, cookie, or POST form, and include Login/Logout flags (e.g., login/Logiut), username or account (e.g., account/user), terminal IP (e.g., IP), and terminal MAC (e.g., MAC). Different authentication systems have different modes of submitting authentication information, some authentication information can be distinguished through URL parameters, some authentication information can be distinguished through forms, and some authentication information can be distinguished through cookie types.
In some authentication messages, there are keywords that explicitly describe the authentication result, such as success (login or logout success) and failed (login or logout failure), and these keywords can improve the accuracy of the device's identification of the authentication result. Then, configuring the server information and the authenticated characteristic information to the internet behavior management equipment, and starting a Web monitoring function of the internet behavior management equipment; a schematic diagram of a page for configuring server information and authenticated feature information, as shown in FIG. 2, a Web server
The server address indicating the completion of terminal authentication, configurable IP address, domain name; for the method for acquiring the user name, different methods for submitting the user information in different authentication modes are different, and the user information is carried by URL parameters or submitted by a POST form; the URL parameter name or form name represents user information, such as a user name; and for the authentication success/failure keywords, judging the conditions of success, failure or logout of the terminal authentication according to the keywords.
As a preferred embodiment, the authentication-related feature further includes a user name type, and the acquiring configured user name parameters specifically includes: and determining the configured user name type, and acquiring the configured user name parameters according to the user name type.
In a specific embodiment, when the HTTP message carrying the authentication information passes through the internet access behavior management device, the message is analyzed, only the identified HTTP message is analyzed, and the message traffic of other protocol types is not analyzed.
In another embodiment, the HTTP message is analyzed, with part of the code as follows;
POST/auth/login HTTP/1.1
Host:aaa.abc.com:8080
User-Agent:Mozilla/5.0(Windows NT 10.0;Win64;x64;rv:89.0)Gecko/20100101Firefox/89.0
Accept:text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language:zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding:gzip,deflate
Content-Type:application/x-www-form-urlencoded
Content-Length:75
Origin:http://aaa.abc.com:8080
Connection:keep-alive
Referer:http://aaa.abc.com:8080/auth/login
Cookie:
XSRF-TOKEN=eyJpdiI6IkU1ZXRSXC8zUStKWWJJVTFRY2ZFRFlRPT0iLCJ2YWx1ZSI6Ik9ySTZQcjd3WmhTRDFyajZsTnEyd3pnK3piZGkzM09NeGl4c3NuUlVnR2oyb1h5alN5VFk3SXdJdzdpczZWWFlFYzEzekkwa0ZPRytOVVp4cEw3bkdnPT0iLCJtYWMiOiI0YTA3OGM4ZjhiMDcxZDUzZGEzZmRhODNlMzBkNDYzYzc1N2M2YTFkM2Q1MjNkMjljYzVjNTQyZmM1OGJmMjkzIn0%3D;laravel_session=eyJpdiI6Ikc2QWMwelhzdDl0V3VvK0VBQm4wRGc9PSIsInZhbHVlIjoiV2libDViWHBHOHR5KzU0UFhOM3dneXVhVUR3aGthU1FZald1UUVWeXpnMnlpUk5qNjVRSmNQQ2s4Q3BsWTl5TXR0M29GMkVEeFlJXC83OUdrbmxqNmxnPT0iLCJtYWMiOiJkZGFlNjEzYmY0NTlmZDFiNDI0YmFjNzYxMWRmODgxZTc0YTI4NTg4YmJlNWMzMjAyNWVmYzkxMDNiMWQwMDYxIn0%3D
Upgrade-Insecure-Requests:1
username=admin&password=admin@123&_token=5UmXXBSEyjRBT4rwa9hpEComQU1re9m1ugWIukOY;
as can be seen from the above message, the domain name of the server is aaa.abc.com (HOST header), and the user name is in the POST form, so the type selects POST, and the authenticated user name is admin, so the user form name selects filling username =;
in specific implementation, the domain name in the HTTP message is acquired and matched with configured server information (domain name or IP), and if the domain name is matched with the configured server information (domain name or IP), the processing is continued, otherwise, the process is exited; according to the configured username type (i.e. the form of the username existing, usually in the URL, cookie, post form), acquiring the configured username parameter (e.g. username =), then querying whether the username parameter exists in the corresponding message, if so, extracting the value (i.e. username) and storing the value for use when online, otherwise, exiting the process.
As a preferred embodiment, the authenticating according to the user name includes: if the internet behavior management equipment does not start the authentication keyword function, the user name is directly used for authentication.
It should be noted that, if there is no keyword indicating success or failure of authentication in the authentication message, the internet behavior management device authenticates the authentication successfully as long as matching the user name parameter, and there is an inaccurate condition.
As a preferred embodiment, the characteristics related to authentication further include keywords, and authentication is performed according to the user name, and the method further includes, if the internet behavior management device enables an authentication keyword function, querying whether the HTTP message includes an authentication keyword, if yes, determining whether the authentication keyword matches the configured keyword, and if yes, performing authentication by using the user name.
In a specific embodiment, it needs to be determined whether the internet behavior management device enables the server authentication keyword function, does not enable the authentication keyword function, and the monitored user is directly on-line. If the authentication keyword function is started, inquiring whether the HTTP message contains the authentication keywords, if so, judging whether the keywords are matched with the keywords configured on the equipment, and if so, entering an online or offline process.
As a preferred embodiment, the authentication method based on Web monitoring further includes, during authentication, creating a user object for a name by the user name, associating an online user with the user object, and associating all sessions generated by the terminal with the user object.
In a specific embodiment, after a current message is matched with configured parameters, an online or offline process is started, and when the message is online, a user object is created by using a user name acquired in the message as a name, and an online user (using a terminal ip as a keyword) is associated with the user object, wherein the user object and the online user are in a one-to-many relationship, that is, multiple terminals are allowed to use the same account for authentication. All the sessions generated by the terminal (using quintuple as a keyword) are associated to the online users, the user objects, the online users and the frame schematic diagram of the sessions, as shown in fig. 3.
As a preferred embodiment, the authenticating by using the user name specifically includes: the online user having the IP address as a key is associated with the user object having the user name as a key, or the online user is disassociated from the user object.
In a specific embodiment, the authentication comprises an online process or an offline process, wherein the online process is a process of associating an online user with an IP address as a keyword to a user object with a user name as a keyword; and the opposite is true of the down line, i.e., the online user is disassociated from the user object. After the terminal is on line, other services can control and audit the terminal flow through the user object.
The embodiment of the invention provides an authentication system based on Web monitoring, which has a structural block diagram, as shown in FIG. 4, the authentication system based on Web monitoring comprises a configuration module 1, a message information determining module 2 and an authentication module 3;
the configuration module 1 is configured to acquire a complete authentication packet, acquire server information and authentication-related features according to the authentication packet, and configure the server information and the authentication-related features, where the authentication-related features include a user name parameter;
the message information determining module 2 is configured to obtain HTTP message information passing through the internet access behavior management device, and determine a domain name or an IP in the HTTP message according to the HTTP message information;
and the authentication module 3 is configured to match the domain name or the IP in the HTTP message with the server information, obtain a configured user name parameter and query whether the user name parameter exists in the HTTP message if the matching is successful, extract a corresponding user name if the user name parameter exists in the HTTP message, and perform authentication according to the user name.
An embodiment of the present invention provides an authentication apparatus based on Web monitoring, including a processor and a memory, where the memory stores a computer program, and when the computer program is executed by the processor, the authentication apparatus implements the authentication method based on Web monitoring according to any one of the above embodiments 1.
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor, and is configured to implement the authentication method based on Web monitoring according to any one of embodiment 1 above.
The invention discloses an authentication method, a system, a device and a computer readable storage medium based on Web monitoring.A server information and characteristics related to authentication are configured by acquiring a complete authentication message and acquiring the server information and the characteristics related to authentication according to the authentication message, wherein the characteristics related to authentication comprise a user name parameter; acquiring HTTP message information of the Internet access behavior management equipment, and determining a domain name or an IP in the HTTP message according to the HTTP message information; matching the domain name or IP in the HTTP message with the server information, if the matching is successful, acquiring the configured user name parameter and inquiring whether the user name parameter exists in the HTTP message, if so, extracting the corresponding user name, and authenticating according to the user name; the user authentication method is simple in configuration, and high in deployment flexibility and expansibility.
The technical scheme of the invention ensures that the internet behavior management equipment does not need to participate in authentication and extra development, and only needs to analyze the characteristics of the authentication flow.
According to the technical scheme, the characteristics of the authentication flow are analyzed in advance and are configured to the internet behavior management equipment, when the flow is matched with the characteristics, the corresponding terminal is directly and synchronously on/off-line on the internet behavior management equipment, time-consuming butt joint development can be effectively avoided, and the internet behavior management equipment can rapidly perform authentication in a unified mode.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (8)

1. An authentication method based on Web monitoring is characterized by comprising the following steps:
acquiring a complete authentication message, acquiring server information and authentication-related characteristics according to the authentication message, and configuring the server information and the authentication-related characteristics, wherein the authentication-related characteristics comprise user name parameters and keywords;
acquiring HTTP message information of the Internet access behavior management equipment, and determining a domain name or an IP in the HTTP message according to the HTTP message information;
matching the domain name or IP in the HTTP message with the server information, if the matching is successful, acquiring configured user name parameters and inquiring whether the user name parameters exist in the HTTP message, if so, extracting the corresponding user name, and authenticating according to the user name;
wherein the authenticating according to the user name comprises: if the internet behavior management equipment does not start the authentication keyword function, authentication is directly carried out by using the user name; if the internet behavior management equipment starts the authentication keyword function, inquiring whether the HTTP message contains the authentication keyword, if so, judging whether the authentication keyword is matched with the configured keyword, and if not, authenticating by using the user name.
2. The authentication method based on Web monitoring according to claim 1, wherein the characteristics related to authentication further include a user name type, and the acquiring the configured user name parameters specifically includes: determining the configured user name type, and acquiring the configured user name parameters according to the user name type.
3. The authentication method based on Web monitoring according to claim 1, wherein the authentication using the user name specifically includes: the online user having the IP address as a key is associated with the user object having the user name as a key, or the online user is disassociated from the user object.
4. The authentication method based on the Web monitor as claimed in claim 1, wherein the authentication related features are contained in URL parameters, cookies or POST forms.
5. The authentication method based on the Web interception as claimed in claim 1, further comprising creating a user object for name by the user name during authentication, associating an online user to the user object, and associating all sessions generated by the terminal to the user object.
6. An authentication system based on Web monitoring is characterized by comprising a configuration module, a message information determination module and an authentication module;
the configuration module is used for acquiring a complete authentication message, acquiring server information and characteristics related to authentication according to the authentication message, and configuring the server information and the characteristics related to authentication, wherein the characteristics related to authentication comprise a user name parameter and a keyword;
the message information determining module is used for acquiring HTTP message information of the Internet behavior management equipment and determining a domain name or an IP in the HTTP message according to the HTTP message information;
the authentication module is configured to match a domain name or an IP in the HTTP message with the server information, obtain a configured user name parameter and query whether the user name parameter exists in the HTTP message if the matching is successful, extract a corresponding user name if the user name parameter exists in the HTTP message, and perform authentication according to the user name, where performing authentication according to the user name includes: if the internet behavior management equipment does not start the authentication keyword function, authentication is directly carried out by using the user name; if the internet behavior management equipment starts the authentication keyword function, inquiring whether the HTTP message contains the authentication keyword, if so, judging whether the authentication keyword is matched with the configured keyword, and if not, authenticating by using the user name.
7. An authentication apparatus based on Web interception, comprising a processor and a memory, wherein the memory stores a computer program, and the computer program is executed by the processor to implement the authentication method based on Web interception according to any one of claims 1 to 5.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the authentication method based on Web interception according to any one of claims 1 to 5.
CN202110729292.2A 2021-06-29 2021-06-29 Authentication method, system, device and storage medium based on Web monitoring Active CN113542239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110729292.2A CN113542239B (en) 2021-06-29 2021-06-29 Authentication method, system, device and storage medium based on Web monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110729292.2A CN113542239B (en) 2021-06-29 2021-06-29 Authentication method, system, device and storage medium based on Web monitoring

Publications (2)

Publication Number Publication Date
CN113542239A CN113542239A (en) 2021-10-22
CN113542239B true CN113542239B (en) 2022-11-01

Family

ID=78097293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110729292.2A Active CN113542239B (en) 2021-06-29 2021-06-29 Authentication method, system, device and storage medium based on Web monitoring

Country Status (1)

Country Link
CN (1) CN113542239B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902484A (en) * 2009-05-25 2010-12-01 北京启明星辰信息技术股份有限公司 Method and system for classifying local area network http application services
CN103067198A (en) * 2012-12-14 2013-04-24 北京集奥聚合科技有限公司 Method and system related to Cookie identity (ID) of user
CN107294954A (en) * 2017-05-22 2017-10-24 深信服科技股份有限公司 Cloud pipe platform, the network log-in management system and method based on cloud pipe platform
CN108092974A (en) * 2017-12-14 2018-05-29 杭州迪普科技股份有限公司 Network access authentication method and device
CN109426826A (en) * 2017-08-22 2019-03-05 中国电信股份有限公司 User behavior analysis method and apparatus
CN109714448A (en) * 2018-12-26 2019-05-03 深圳创维数字技术有限公司 The internet information statistical method and device of PON terminal
CN110972139A (en) * 2019-11-07 2020-04-07 锐捷网络股份有限公司 Method and gateway for realizing internet access authentication of mobile terminal
CN112738137A (en) * 2021-03-30 2021-04-30 深圳红途创程科技有限公司 Data acquisition and link processing method and device, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002003219A1 (en) * 2000-06-30 2002-01-10 Plurimus Corporation Method and system for monitoring online computer network behavior and creating online behavior profiles
CN105791009A (en) * 2016-03-02 2016-07-20 上海斐讯数据通信技术有限公司 Method and system for collecting user internet-surfing behavior based on SDN (Software Defined Network)
CN107395633A (en) * 2017-08-25 2017-11-24 广东欧珀移动通信有限公司 A kind of network detecting method, network detection means and intelligent terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902484A (en) * 2009-05-25 2010-12-01 北京启明星辰信息技术股份有限公司 Method and system for classifying local area network http application services
CN103067198A (en) * 2012-12-14 2013-04-24 北京集奥聚合科技有限公司 Method and system related to Cookie identity (ID) of user
CN107294954A (en) * 2017-05-22 2017-10-24 深信服科技股份有限公司 Cloud pipe platform, the network log-in management system and method based on cloud pipe platform
CN109426826A (en) * 2017-08-22 2019-03-05 中国电信股份有限公司 User behavior analysis method and apparatus
CN108092974A (en) * 2017-12-14 2018-05-29 杭州迪普科技股份有限公司 Network access authentication method and device
CN109714448A (en) * 2018-12-26 2019-05-03 深圳创维数字技术有限公司 The internet information statistical method and device of PON terminal
CN110972139A (en) * 2019-11-07 2020-04-07 锐捷网络股份有限公司 Method and gateway for realizing internet access authentication of mobile terminal
CN112738137A (en) * 2021-03-30 2021-04-30 深圳红途创程科技有限公司 Data acquisition and link processing method and device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
校园网用户定位系统设计与实现;周昌令等;《中国教育网络》;20070210(第02期);第30-32页 *

Also Published As

Publication number Publication date
CN113542239A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
US10721320B2 (en) Redirection method, apparatus, and system
CN111556006B (en) Third-party application system login method, device, terminal and SSO service platform
CN108924210A (en) Service request processing method, device, server and storage medium
US8869258B2 (en) Facilitating token request troubleshooting
CN105847245B (en) Electronic mailbox login authentication method and device
CN104092811A (en) Mobile terminal information download method, system, terminal device and server
CN110830280B (en) Micro-service gateway device and method and electronic equipment
CN108259457B (en) WEB authentication method and device
JP2017016650A (en) Method and system for detecting and identifying resource on computer network
US9787678B2 (en) Multifactor authentication for mail server access
CN110933675B (en) Wireless sensor network authentication method, system and electronic equipment
US7917941B2 (en) System and method for providing physical web security using IP addresses
CN113271299B (en) Login method and server
CN104796408A (en) Single-point live login method and device
WO2021078062A1 (en) Ssl certificate verification method, apparatus and device, and computer storage medium
CN105429978B (en) Data access method, equipment and system
CN102202071A (en) Microsoft service network (MSN)-based network video monitoring method and system
CN113542239B (en) Authentication method, system, device and storage medium based on Web monitoring
CN111064729B (en) Message processing method and device, storage medium and electronic device
CN108683651A (en) A kind of single-point logging method, server-side and system
CN109729016B (en) Message sending method, message sending equipment and computer readable storage medium
CN115529154A (en) Login management method, login management device, electronic device and readable storage medium
CN106453400B (en) A kind of authentication method and system
CN112929388B (en) Network identity cross-device application rapid authentication method and system, and user agent device
CN113518121B (en) Batch operation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant