KR101746471B1 - User authentication method of ssl-vpn and sso based on yaws - Google Patents
User authentication method of ssl-vpn and sso based on yaws Download PDFInfo
- Publication number
- KR101746471B1 KR101746471B1 KR1020160005379A KR20160005379A KR101746471B1 KR 101746471 B1 KR101746471 B1 KR 101746471B1 KR 1020160005379 A KR1020160005379 A KR 1020160005379A KR 20160005379 A KR20160005379 A KR 20160005379A KR 101746471 B1 KR101746471 B1 KR 101746471B1
- Authority
- KR
- South Korea
- Prior art keywords
- vpn
- ssl
- sms
- sso
- server
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
In this embodiment, security is enhanced by performing a VPN login process, an SMS / OPT login process, an SMS authentication number issuing process and a password re-issuance process by cooperation between an SSL-VPN server based on YAWS and an SSO server, It is possible.
Description
This embodiment relates to a user authentication technique, and more particularly, to a YAWS-based user authentication technique.
In general, Erlang is a functional parallel processing language created by the Swedish Ericsson research book, which can produce light processes very quickly. Each of these Erlang-based processes can be designed to be task-directed by message passing, output the result, and have no shared memory except for the ETS and DETS memory areas.
This is similar to MPI (Message Passing Interface) at first glance, but unlike MPI, which costs a lot of money to create a single process, Erlang processes can create, run, and delete hundreds of thousands of processes in real time on a normal personal PC Can be performed.
Furthermore, Erlang is advantageous for bundling large amounts of hardware because processes can be controlled remotely over a network even if they are different computers.
Yaws is commonly known as a web server based on Erlang. This Yaws-based Web server handles dynamic parallel processing unlike ordinary Web servers that process static content, and it can process transactions several tens of times when using the same resource.
The web server based on Yaws has SSL-VPN server and SSO (Single Sign On) server that performs SSL-VPN service.
However, the authentication process performed by the SSL-VPN server and the SSO (Single Sign On) server has a weak security problem.
The present embodiment is intended to provide a user authentication method of SSL-VPN and SSO based on YAWS with enhanced authentication security.
According to one embodiment, whether or not an arbitrary user terminal transmits an SSO login screen to the user terminal according to existence of VPN session information to be verified at the SSL-VPN server when requesting a VPN login screen, A VPN login step determined by; In the state where the VPN session information does not exist, the SSL-VPN server and the SSO server perform an SMS authentication login or an OPT authentication login for SSL-VPN user authentication by using the copy SSO login screen in which the SSO login screen is copied SMS / OPT login step; An SMS authentication number issue step in which the SMS authentication request and the acceptance for the SMS authentication login are performed by the SSL-VPN server and the SSO server in a state where the VPN session information does not exist; And a password re-issuance step in which the SSL-VPN server and the SSO server perform the request and the acceptance of the personal identification information for SMS re-issuance and the SMS authentication number in the state where the VPN session information does not exist, based on the YAWS- And SSO user authentication methods.
In the VPN login step, if the VPN session information exists, the user terminal can receive the SSL-VPN login message already generated by the SSL-VPN server.
In the SMS / OPT login step, the SSL-VPN server may determine whether the ID, password, and SMS authentication number input through the copy SSO login screen are SSL-VPN users.
The SMS / OPT login step may further include requesting the SMS user authentication to the SSO server if the ID, password, and SMS authentication number are SSL-VPN users as a result of the determination.
In the SMS / OPT login step, when the SSO server confirms the ID, password, and SMS authentication number as a normal SSO user in response to the SMS user authentication request, the SMS / OPT login step considers the SMS login as a normal SMS login, Otherwise, it is considered an abnormal SMS login; And normalizing the SMS authentication login if the normal SMS login is performed.
In the step of issuing the SMS authentication number, when an SMS authentication number issue request is made using the ID, password, and SMS authentication number input through the copy SSO login screen, the ID, password, and SMS authentication number are determined to be SSL- And determining from the SSL-VPN server.
The SMS authentication number issue step may include transmitting the SSL-VPN user authentication request and the SMS authentication number issue request to the SSO server if the ID, password, and SMS authentication number are SSL-VPN users as a result of the determination .
The SMS authentication number issuing step corresponds to the SSL-VPN user authentication request and the SMS authentication number issuance request, and when the SSO server confirms the ID, password and SMS authentication number as a normal SSO user, it regards it as a normal SMS login Transmits the issued SMS authentication number to the user terminal, and if it is not confirmed as the normal SSO user, it can be regarded as an abnormal SMS login, and the abnormal login result can be transmitted to the user terminal.
Wherein the password re-issuing step includes: transmitting personal information received from the user terminal to the SSO server from the SSL-VPN server; Transmitting the normal result and the terminal phone number to the SSL-VPN server when the SSO server confirms the transmitted personal information; And transmitting the SMS transmission screen to the user terminal when receiving the normal result from the SSL-VPN server.
Transmitting the SMS origination request to the SSL-VPN server through the SMS origination screen; Transmitting the SMS origination request to the SSO server if the SSL-VPN server transmits an SMS origination request to the SSO server when transmitting the SMS origination request to the SSL-VPN server through the terminal phone number; And transmitting the SMS authentication number generated in the SSO server to the user terminal if the SMS origination acceptance is affirmative.
Wherein the password re-issuing step includes: transmitting an authentication request including the SMS authentication number input through the SMS origination screen to the SSL-VPN server; Transmitting the terminal telephone number and the SMS authentication number to the SSO server in response to the authentication request; And determining from the SSO server whether the terminal phone number and the SMS authentication number are SSO users.
The SSL-VPN server may further include a step of transmitting a password change screen to the user terminal when it is determined that the authentication is successful according to the determination and the SSL-VPN server confirms success.
Wherein the password re-issuing step includes: transmitting a password change request input through the password change screen to the SSO server through the SSL-VPN server; Transmitting to the SSL-VPN server whether the password change is successful in response to the password change request; And transmitting the change completion screen to the user terminal when the password change is successful.
The user authentication method may further include relaying or confirming a message transmitted and received between the SSL-VPN server and the SSO server in an ACS server connected between the SSL-VPN server and the SSO server.
As described above, this embodiment has an effect of authentication processing in which authentication security is enhanced by further performing SMS or OPT authentication login in addition to the existing authentication login.
In addition, the present embodiment has the effect of enhancing authentication security and enabling faster authentication processing by performing user login and authentication through a VPN login process, an SMS / OPT login process, an SMS authentication number issue process and a password re-issuance process.
The effects described above are not limited to the effects mentioned above, and other effects not mentioned can be clearly understood by those skilled in the art from the following description.
BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention. However, the technical features of the present embodiment are not limited to the specific drawings, and the features disclosed in the drawings may be combined with each other to constitute a new embodiment.
1 is a flowchart exemplarily showing an example of a user authentication method according to an embodiment.
FIG. 2 is a block diagram illustrating a configuration of a Yaws-based authentication processing system that performs the user authentication method of FIG. 1; FIG.
3 is a flowchart illustrating the VPN login process of FIG. 1 in more detail.
4 is a flowchart illustrating the SMS login process of FIG. 1 in more detail.
5 is a flowchart for explaining the SMS authentication number issuing process of FIG. 1 in more detail.
FIG. 6 and FIG. 7 are flowcharts illustrating the password re-issuance processor of FIG. 1 in more detail.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the like elements throughout.
It is to be understood that the terms used in the following examples are used only to illustrate specific embodiments, and are not intended to be limiting.
It is also to be understood that the singular form " above " used in the description of the various embodiments described and in the claims includes plural referents unless the context clearly dictates otherwise.
It is also to be understood that the term " and / or " disclosed in the following embodiments includes any and all possible combinations of one or more of the listed related items.
It is also to be understood that the terms such as "connected" to another element, as disclosed in the following embodiments, may be directly connected to the other element, .
It is also to be understood that the terms such as " comprising "or " comprising ", as used in the following examples, mean that a constituent element can be implanted unless specifically stated to the contrary. But should be understood to include additional elements.
<Example of user authentication method>
FIG. 1 is a flowchart illustrating an example of a user authentication method according to an exemplary embodiment. FIG. 2 is a block diagram illustrating a configuration of a Yaws-based authentication processing system that performs the user authentication method of FIG.
The Yaws-based
The communication networks, including the wireless networks or wired networks mentioned, may be connected to a network, such as the Internet, also referred to as the World Wide Web (WWW), a cellular telephone network, an intranet, such as a wireless local area network (LAN) and / or a metropolitan area network / RTI > and / or wireless communication with a wireless network and other devices.
The wireless network may be a wireless network, such as a cellular network (e.g., Global System for Mobile Communications (GSM), Enhanced Data Rates for GSM Evolution (EDGE), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA) (TDMA), Universal Mobile Telecommunications System (UMTS), Long Term Evolution (LTE), or other cellular networks), and the like.
For example, if the network data access element (s) is part of a GSM network, the network data access element (s) may be a base transceiver station (BTS), a base station controller (BSC), a mobile switching center (MSC) GPRS Support Node), and the like.
As another example, if the network data access element (s) is part of a LAN, the network data access element (s) may include one or more network switches, routers, hubs, and /
In this regard, the
The SSL-
SSL encrypts the information in the communication between the web browser and the server so that it can protect the contents of the information even if the information is leaked through the hack.
The SSL-
The ACS
The
Hereinafter, a user authentication method performed through the above-described Yaws-based
Referring to FIG. 1, a
An
The mentioned SSO login screen may include an OTP login screen or an SMS login screen. The OTP login screen supports OTP (One Time Password) login. The One Time Password (OTP) may be a user authentication scheme using a one-time password of a random number generated randomly. On the other hand, the SMS login screen supports SMS (Short Message Service) login.
The SSO login screen transmitted to the
In the SMS /
For example, when user information (eg, ID, password OPT login ID and password, SMS login ID and password, etc.) input through the copy SSO login screen is input, in order to verify that the user information is a normal login user It is possible to perform an SMS authentication login or an OPT authentication login for SSL-VPN user authentication in cooperation with the SSL-
In
At this time, the SMS authentication login can be realized through the SMS login screen of the copy SSO login screen.
Similarly, the
At this time, the OPT authentication login can be realized through the OPT login screen of the copy OPT login screen.
In the past, the SSL-
An
In the past, the SSL-
As described above, the present embodiment can perform the authentication processing with enhanced authentication security by further performing the SMS or OPT authentication login in addition to the existing authentication login.
In
The mentioned message may be a message related to success / failure of the user to be logged in, and the success / failure information.
Hereinafter, steps 210 to 240 will be described in more detail.
<Example of VPN Login Process>
3 is a flowchart illustrating the VPN login process of FIG. 1 in more detail.
Referring to FIG. 3, in a
For example, if the VPN session information exists in response to the VPN login screen request, the SSL-VPN login message that is already generated by the SSL-VPN server can be transmitted to the
In this way, the
Here, the SSO login screen may include an OTP login screen or an SMS login screen. The OTP login screen supports OTP (One Time Password) login. The One Time Password (OTP) may be a user authentication scheme using a one-time password of a random number generated randomly. On the other hand, the SMS login screen supports SMS (Short Message Service) login.
<Example of SMS Login Process>
4 is a flowchart illustrating the SMS login process of FIG. 1 in more detail.
Referring to FIG. 4, the
In an
In
In
In other words, the SSL-
For example, in
In the
For example, if the SMS-
As described above, the present embodiment can perform user authentication for the SMS login process with enhanced security through cooperation between the SL-
The OPT login process may be processed instead of the
<Example of SMS authentication number issuing process>
5 is a flowchart for explaining the SMS authentication number issuing process of FIG. 1 in more detail.
Referring to FIG. 5, the SMS authentication
First, in
In the
In an
In other words, the SSL-
If the SSL-
In
However, in an
As described above, the present embodiment can perform user authentication for the SMS authentication number issuing process with enhanced security through cooperation between the SL-
<Example of password re-issuance processor>
FIG. 6 and FIG. 7 are flowcharts illustrating the password re-issuance processor of FIG. 1 in more detail.
As shown, the
First, in
In
In an
In
In
In
In
In
In
As described above, the present embodiment can enhance the security by performing the user authentication and the password change authentication in the
Meanwhile, there may be an
The user authentication method described above can be implemented in the form of program instructions that can be executed through various computer components and recorded in a computer-readable medium.
The computer readable medium may be any medium accessible by the processor. Such media can include both volatile and nonvolatile media, removable and non-removable media, communication media, storage media, and computer storage media.
A communication medium may include computer readable instructions, data structures, program modules, other data of a modulated data signal such as a carrier wave or other transmission mechanism, and may include any other form of information delivery medium known in the art.
The storage medium may be any type of storage medium such as RAM, flash memory, ROM, EPROM, electrically erasable read only memory ("EEPROM"), registers, hard disk, removable disk, compact disk read only memory Or any other type of storage medium.
Computer storage media includes removable and non-removable, nonvolatile, and nonvolatile storage media implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules or other data, Volatile media.
Such computer storage media may be embodied as program instructions, such as RAM, ROM, EPROM, EEPROM, flash memory, other solid state memory technology, CDROMs, digital versatile disks (DVDs) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage, Lt; RTI ID = 0.0 > and / or < / RTI >
Examples of program instructions may include machine language code such as those produced by a compiler, as well as high-level language code that may be executed by a computer using an interpreter or the like.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the exemplary embodiments or constructions. You can understand that you can do it. The embodiments described above are therefore to be considered in all respects as illustrative and not restrictive.
100: authentication processing system 110:
120: SSL-VPN server 130: ACS server
140: SSO server
Claims (14)
In the state where the VPN session information does not exist, the SSL-VPN server and the SSO server perform an SMS authentication login or an OPT authentication login for SSL-VPN user authentication by using the copy SSO login screen in which the SSO login screen is copied SMS / OPT login step;
An SMS authentication number issue step in which the SMS authentication request and the acceptance for the SMS authentication login are performed by the SSL-VPN server and the SSO server in a state where the VPN session information does not exist; And
VPN server and the SSO server for requesting and accepting personal information and an SMS authentication number for re-issuing a password in the absence of the VPN session information,
The SMS authentication number issue step may include:
When an SMS authentication number issue request is made using the ID, password and SMS authentication number input through the copy SSO login screen, the SSL VPN server determines whether the ID, password, and SMS authentication number are SSL-VPN users Step
A user authentication method of SSL-VPN and SSO based on YAWS.
The VPN log-
Wherein the user terminal receives the SSL-VPN login message already generated by the SSL-VPN server when the VPN session information exists, based on the YAWS.
The SMS / OPT login step includes:
The SSL-VPN server determines whether the ID, password, and SMS authentication number input through the copy SSO login screen are SSL-VPN users
A user authentication method of SSL-VPN and SSO based on YAWS.
The SMS / OPT login step includes:
As a result of the determination, when the ID, password, and SMS authentication number are SSL-VPN users, requesting the SMS authentication of the SSO server
Based on SSL-VPN and SSO based on YAWS.
The SMS / OPT login step includes:
If the SSO server confirms the ID, the password, and the SMS authentication number as a normal SSO user in response to the SMS user authentication request, the normal SMS login is regarded as a normal SMS login. If the SSO user is not identified as the normal SSO user, ; And
If it is the normal SMS login, the step of normal processing the SMS authentication login
Based on SSL-VPN and SSO based on YAWS.
The SMS authentication number issue step may include:
VPN user authentication request and the SMS authentication number issue request to the SSO server if the ID, password, and SMS authentication number are SSL-VPN users as a result of the determination
Based on SSL-VPN and SSO based on YAWS.
The SMS authentication number issue step may include:
When the SSO server confirms the ID, password and SMS authentication number as a normal SSO user in response to the SSL-VPN user authentication request and the SMS authentication number issue request, And transmits an abnormal log-in result to the user terminal when the abnormal SSO user is not identified as the abnormal SMS log-in, and transmits the abnormal log-in result to the user terminal.
The password re-
Transmitting the personal information received from the user terminal to the SSO server from the SSL-VPN server;
Transmitting the normal result and the terminal phone number to the SSL-VPN server when the SSO server confirms the transmitted personal information; And
When receiving the normal result from the SSL-VPN server, transmitting an SMS transmission screen to the user terminal
A user authentication method of SSL-VPN and SSO based on YAWS.
The password re-
Transmitting an SMS origination request to the SSL-VPN server through the SMS origination screen;
Transmitting the SMS origination request to the SSO server if the SSL-VPN server transmits an SMS origination request to the SSO server when transmitting the SMS origination request to the SSL-VPN server through the terminal phone number; And
Transmitting the SMS authentication number generated by the SSO server to the user terminal if the SMS transmission acceptance is affirmative;
A user authentication method of SSL-VPN and SSO based on YAWS.
The password re-
Transmitting an authentication request including the SMS authentication number input through the SMS sending screen to the SSL-VPN server;
Transmitting the terminal telephone number and the SMS authentication number to the SSO server in response to the authentication request; And
Determining by the SSO server whether the terminal telephone number and the SMS authentication number are SSO users
A user authentication method of SSL-VPN and SSO based on YAWS.
The password re-
Upon receipt of the authentication success according to the determination at the SSL-VPN server and confirming success, the step of transmitting the password change screen to the user terminal
Based on SSL-VPN and SSO based on YAWS.
The password re-
Transmitting a password change request inputted through the password change screen to the SSO server through the SSL-VPN server;
Transmitting to the SSL-VPN server whether the password change is successful in response to the password change request; And
If the password change is successful, transmitting a change completion screen to the user terminal
A user authentication method of SSL-VPN and SSO based on YAWS.
The ACS server connected between the SSL-VPN server and the SSO server relays or confirms a message transmitted and received between the SSL-VPN server and the SSO server
Based on SSL-VPN and SSO based on YAWS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160005379A KR101746471B1 (en) | 2016-01-15 | 2016-01-15 | User authentication method of ssl-vpn and sso based on yaws |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160005379A KR101746471B1 (en) | 2016-01-15 | 2016-01-15 | User authentication method of ssl-vpn and sso based on yaws |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101746471B1 true KR101746471B1 (en) | 2017-06-14 |
Family
ID=59217906
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160005379A KR101746471B1 (en) | 2016-01-15 | 2016-01-15 | User authentication method of ssl-vpn and sso based on yaws |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101746471B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110798456A (en) * | 2019-10-22 | 2020-02-14 | 北京天融信网络安全技术有限公司 | SSLVPN authentication method and intranet resource access and data acquisition method |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120204245A1 (en) * | 2011-02-03 | 2012-08-09 | Ting David M T | Secure authentication using one-time passwords |
-
2016
- 2016-01-15 KR KR1020160005379A patent/KR101746471B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120204245A1 (en) * | 2011-02-03 | 2012-08-09 | Ting David M T | Secure authentication using one-time passwords |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110798456A (en) * | 2019-10-22 | 2020-02-14 | 北京天融信网络安全技术有限公司 | SSLVPN authentication method and intranet resource access and data acquisition method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102321781B1 (en) | Processing electronic tokens | |
EP2039110B1 (en) | Method and system for controlling access to networks | |
RU2440688C2 (en) | User profile, policy and distribution of pmip keys in wireless communication network | |
KR102001544B1 (en) | Apparatus and method to enable a user authentication in a communication system | |
CN103944737A (en) | User identity authentication method, third-party authentication platform and operator authentication platform | |
US8074259B1 (en) | Authentication mark-up data of multiple local area networks | |
CN106465096B (en) | It accesses network and obtains method, terminal and the core net of client identification module information | |
CN105830414A (en) | Secure network access using credentials | |
US8931068B2 (en) | Authentication process | |
CN109891921B (en) | Method, apparatus and computer-readable storage medium for authentication of next generation system | |
US20210234836A1 (en) | A proxy network with self-erasing processing elements | |
CN102215486B (en) | Network access method, system, network authentication method, equipment and terminal | |
US8943570B1 (en) | Techniques for providing enhanced network security | |
CN110719252A (en) | Methods, systems, and computer readable media for authorizing transactions over a communication channel | |
KR101746471B1 (en) | User authentication method of ssl-vpn and sso based on yaws | |
CN113411286B (en) | Access processing method and device based on 5G technology, electronic equipment and storage medium | |
CN104469772A (en) | Website equipment authentication method and device and authentication system | |
CN104335619A (en) | Remote unlocking of telecommunication device functionality | |
US20210090087A1 (en) | Methods for access point systems and payment systems therefor | |
CN111404965B (en) | Method for realizing mobile terminal application safety verification | |
JP2017055172A (en) | Radio communication device, radio communication method, and radio communication program | |
CN104980922A (en) | Wireless Internet access method and system based on public platform | |
KR102148189B1 (en) | Apparatus and method for protecting malicious site | |
KR101490549B1 (en) | Wireless Internet Access Authentication Method for Web Based Advertisement Service | |
KR101480706B1 (en) | Network system for providing security to intranet and method for providing security to intranet using security gateway of mobile communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |