WO2015000313A1 - Access terminal - Google Patents
Access terminal Download PDFInfo
- Publication number
- WO2015000313A1 WO2015000313A1 PCT/CN2014/074683 CN2014074683W WO2015000313A1 WO 2015000313 A1 WO2015000313 A1 WO 2015000313A1 CN 2014074683 W CN2014074683 W CN 2014074683W WO 2015000313 A1 WO2015000313 A1 WO 2015000313A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- network access
- information
- packet
- server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Definitions
- FIG.1 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
- FIG.2 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
- FIG.3 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
- FIG.4 is a schematic diagram illustrating a structure of a network access device, in accordance with an example of the present disclosure.
- FIG.5 is a schematic diagram illustrating a structure of a server, in accordance with an example of the present disclosure.
- FIG.6 is a schematic diagram illustrating another structure of a server, in accordance with an example of the present disclosure.
- FIG.7 is a schematic diagram illustrating another structure of a network access device, in accordance with an example of the present disclosure.
- FIG.8 is a schematic diagram illustrating still another structure of a server, in accordance with an example of the present disclosure.
- FIG.9 is a schematic diagram illustrating still another structure of a server, in accordance with an example of the present disclosure.
- An enterprise may allow employees or visitors to carry their terminal devices to access a corporate network. Subsequently, the corporate network needs to intelligently identify types of these terminal devices, whether these terminal devices are assets of the company, and give different authorities to these terminal devices.
- FIG.1 is a flowchart illustrating a method, in accordance with an example of the present disclosure. As shown in FIG.1 , the flow may include the following blocks.
- a network access device may obtain user fingerprint information of a terminal.
- the network access device may transmit the user fingerprint information of the terminal to a portal server, so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
- the network access device may actively transmit the user fingerprint information of the terminal to the portal server, so that the portal server may push to the terminal the authentication page corresponding to the user fingerprint information of the terminal.
- a portal server may transmit an information request packet to a network access device.
- the network access device may search for user fingerprint information of the terminal, based on the IP address of the terminal carried in the information request packet, and transmit the user fingerprint information of the terminal to the portal server by using an information response packet.
- the 'user fingerprint information is information which identifies the terminal or terminal user.
- the user fingerprint information may be a MAC address of the terminal, Option 55 data information of the terminal, HTTP agent information or any combination thereof.
- the information request packet may be a packet complying with the portal protocol, which is originally configured to search for user physical information of the terminal, and may be a request-information (REQ-INFO) packet.
- the information response packet may be a packet complying with the portal protocol, which is originally configured to respond to the user physical information of the terminal.
- the information request packet is the REQ-INFO packet
- the information response packet may be an acknowledgement-information (ACK-INFO) packet.
- the REQ-INFO packet which originally requests to search for the user physical information of the terminal, enable the REQ-INFO packet not only to request the user physical information of the terminal, but also request the user fingerprint information of the terminal on the basis of requesting the user physical information of the terminal.
- the ACK-INFO packet in response to the user physical information of the terminal may also be improved, so that the ACK-INFO packet may not only carry the user physical information of the terminal, but also carry the user fingerprint information of the terminal on the basis of carrying the user physical information of the terminal.
- the information request packet and the information response packet may be packets complying with the portal protocol format, which may be newly created in the present disclosure.
- the method provided in the example may be further described in the following with an example, in which the information request packet is the REQ-INFO packet, and the information response packet is the ACK-INFO packet.
- FIG.2 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
- the user fingerprint information of the terminal may include the MAC address and Option 55 data information of the terminal.
- the terminal identifier may be the IP address of the terminal.
- the flow may include the following blocks.
- a network access device may record an IP address and Option 55 data information obtained by the terminal.
- the network access device may establish an address resolution protocol (ARP) entry for the terminal.
- the ARP entry may include at least the IP address and MAC address of the terminal.
- the terminal may transmit an HTTP request before being authenticated.
- the network access device may receive the HTTP request from the terminal, and return an HTTP redirect packet carrying a uniform resource locator (URL) to the terminal.
- URL uniform resource locator
- the URL carried by the HTTP redirect packet may be website of a portal server.
- the terminal may access the portal server, based on the URL carried by the HTTP redirect packet received.
- the portal server may transmit a REQ-INFO packet to the network access device.
- the REQ-INFO packet may carry the IP address of the terminal.
- the network access device may receive the REQ-INFO packet, search for the MAC address of the terminal in ARP entries established by the network access device, based on the IP address carried by the REQ-INFO packet, search for the Option 55 data information of the terminal in Option 55 data information recorded by the network access device, based on the IP address carried by the REQ-INFO packet, enable the MAC address and Option 55 data information of the terminal searched to form the user fingerprint information of the terminal, enable the ACK-INFO packet to carry the user fingerprint information of the terminal, and transmit the ACK-INFO packet to the portal server.
- the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal, based on the user fingerprint information of the terminal carried by the ACK-INFO packet.
- the portal server may determine type of the terminal based on the user fingerprint information of the terminal.
- the portal server may push an authentication page corresponding to the visitor.
- the portal server may push an authentication page corresponding to an enterprise terminal.
- the authentication page corresponding to the visitor terminal may be different from the authentication page corresponding to the enterprise terminal.
- a virus scan may be firstly executed for the terminal in the present disclosure, before the terminal accesses the network. After determining that the terminal is safe, the authentication may be executed for the terminal.
- the portal server may embed a virus scan identifier on the authentication page, when pushing the authentication page to the terminal. And then, the scan of the terminal may be executed by enabling the terminal to trigger the virus scan identifier, which may refer to blocks 209 to 210.
- the virus scan identifier on the authentication page may exist in the manner of button or input box, which is not limited by the present disclosure.
- the terminal may trigger the virus scan identifier on the authentication page received.
- the portal server may initiate the scan of the terminal.
- the portal server may allow the terminal to input verification information to be authenticated.
- the portal server may prompt the terminal to kill virus.
- the portal server may allow the terminal to input the verification information to be authenticated, when virus killing is completed.
- block 210 may be implemented with the following two modes.
- a mode may be as follows.
- the portal server may trigger antivirus software installed by the terminal to scan the terminal.
- the terminal may transmit a scan result to the portal server, after the scan is completed.
- the portal server may receive the scan result transmitted by the terminal, after the scan is completed.
- the portal server may prompt the terminal to kill virus.
- the portal server may allow the terminal to input the verification information to be authenticated.
- the portal server may allow the terminal to input the verification information to be authenticated.
- the terminal may be scanned by using the antivirus software installed on the terminal, when being triggered by the portal server.
- Another mode may be as follows.
- the portal server may remotely control the antivirus software installed on the portal server to scan the terminal.
- the portal server may prompt the terminal to kill virus.
- the portal server may allow the terminal to input verification information to be authenticated, when the virus killing is completed.
- the portal server may allow the terminal to input the verification information to be authenticated.
- the portal server may perform the remote scan on the terminal, by using the antivirus software installed on the portal server.
- the verification information inputted by the terminal may be user account and password.
- the terminal when being allowed to input the verification information, may input the verification information on the authentication page, and submit to the portal server.
- the portal server may encapsulate the verification information with portal protocol into a portal authentication packet, and transmit the portal authentication packet to the network access device.
- the network access device may enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server.
- the RADIUS server may authenticate the verification information carried by the RADIUS authentication packet.
- the RADIUS server may inform the network access device that the terminal authentication is successful, and issue network access authority of the terminal, based on the user fingerprint information of the terminal carried by the RADIUS authentication packet.
- the RADIUS server may determine type of the terminal, based on the user fingerprint information of the terminal. When determining that the terminal is a terminal of a visitor, the RADIUS server may issue a network access authority defined for the visitors. When determining that the terminal is a terminal of an employee, the RADIUS server may issue a network access authority defined for enterprise terminals. The network access authority defined for visitors may be generally different from the network access authority defined for enterprise terminals.
- the network access device may receive and store the network access authority of the terminal, and inform the portal server that the terminal authentication is successful. Then, the portal server may inform the terminal that the terminal authentication is successful.
- the terminal may access the network.
- the network access device may determine whether network access of the terminal crosses the border, based on the network access authority of the terminal. When determining that the network access of the terminal crosses the border, the network access device may inform the portal server that the terminal access crosses the border. Then, the portal server may provide a cross-border access prompt for the terminal, or provide a prompt that the terminal will join an isolated area for the terminal.
- the foregoing block 216 may further include the follows.
- the network access device may further inform the RADIUS server to re-issue the network access authority defined for the terminal.
- the RADIUS server may re-issue the network access authority defined for the terminal.
- the network access device may receive and store the network access authority defined for the terminal, which is re-issued by the RADIUS server, and remove previously stored network access authority defined for the terminal, so that the network access device may store the latest network access authority of the terminal issued by the RADIUS server.
- the network access device may record the user fingerprint information of the terminal in advance. It is not necessary to install on the DHCP server the DHCP agent plug-in, which is configured to transmit the user fingerprint information of the terminal to the portal server. Instead, when receiving the redirected access of the terminal to the portal server, the portal server may request the user fingerprint information of the terminal from the network access device, by using a protocol packet complying with the portal protocol, such as the REQ-INFO packet. [0065] Furthermore, in the present disclosure, the portal server may embed the virus scan identifier on the authentication page pushed. When the terminal is safe, the terminal may be authenticated, so that the terminal may access the network when guaranteeing that the terminal is safe.
- whether the terminal access crosses the border may be distinguished.
- the cross-border access prompt may be provided for the terminal, or the prompt that the terminal will join an isolated area may be provided for the terminal, so that the network security may be improved.
- FIG.3 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
- the user fingerprint information of the terminal may include the MAC address and Option 55 data information of the terminal.
- the flow may include the following blocks.
- Blocks 301 to 303 may be similar to blocks 201 to 203 in the foregoing example.
- a network access device may receive an HTTP request from a terminal, and return to the terminal an HTTP redirect packet carrying a URL and user fingerprint information of the terminal.
- the URL carried by the HTTP redirect packet may be the website of the portal server.
- the terminal may access the portal server, based on the URL carried by the received HTTP redirect packet, and transmit the user fingerprint information of the terminal carried by the HTTP redirect packet to the portal server.
- the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
- the user fingerprint information of the terminal may be transmitted by the terminal to the portal server in block 305.
- the user fingerprint information including the MAC address and option 55 data information of the terminal is transmitted by the network access device to the portal server, after the network access device searching out the MAC address and option 55 data information of the terminal.
- Blocks 307 to 315 may be similar to blocks 209 to 216 in the foregoing example, which will not be repeated here.
- FIG.4 is a schematic diagram illustrating a structure of a network access device, in accordance with an example of the present disclosure.
- the network access device may include an obtaining unit, and a transmitting unit.
- the obtaining unit is to record user fingerprint information of a terminal.
- the transmitting unit is to transmit the user fingerprint information of the terminal to a portal server, before the terminal is authenticated, so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
- the user fingerprint information of the terminal may include at least the MAC address and Option 55 data information of the terminal.
- the obtaining unit may obtain the user fingerprint information of the terminal by using the following blocks.
- the obtaining unit may record a terminal identifier and Option 55 data information of the terminal, during the interaction process between the terminal and a DHCP server.
- the obtaining unit may learn the MAC address of the terminal, and establish an ARP entry for the terminal.
- the ARP entry may include at least the terminal identifier and the MAC address of the terminal.
- the transmitting unit may transmit the user fingerprint information of the terminal to the portal server, by using the following two structure modes.
- a structure mode may be as follows.
- the transmitting unit may include a receiving sub-unit and a transmitting sub-unit.
- the receiving sub-unit is to receive an information request packet from the portal server.
- the information request packet may be transmitted by the portal server, when the portal server receives the HTTP request transmitted by the terminal before the terminal is authenticated.
- the transmitting sub-unit is to search for the user fingerprint information of the terminal, based on the terminal identifier carried by the information request packet, and transmit the searched user fingerprint information of the terminal to the portal server by using an information response packet.
- Another structure mode may be as follows.
- the transmitting unit may include a receiving sub-unit and a transmitting sub-unit.
- the receiving sub-unit is to receive the HTTP request initiated by the terminal, before the terminal is authenticated.
- the transmitting sub-unit is to enable the redirect packet to carry the user fingerprint information of the terminal and the website of the portal server, and return the redirect packet to the terminal, so that when the terminal accesses the website of the portal server carried by the redirect packet, the user fingerprint information of the terminal may be transmitted to the portal server.
- the virus scan identifier has been embedded on the authentication page.
- the receiving sub-unit is further to receive the portal authentication packet transmitted by the portal server.
- the portal authentication packet carries the verification information on the authentication page submitted by the terminal, after the terminal triggers the virus scan identifier embedded on the authentication page, and the terminal is authenticated to be safe when antivirus scan is completed.
- the network access device may further include an authentication request unit, a storing unit, and an identifying unit.
- the authentication request unit is to enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server.
- the storing unit is to receive and store the network access authority of the terminal, which is issued by the RADIUS server based on the user fingerprint information of the terminal, after the verification information passes the authentication.
- the identifying unit When receiving the network access of the terminal, the identifying unit is to determine whether the network access of the terminal crosses the border, based on the network access authority of the terminal. When determining that the network access of the terminal crosses the border, the identifying unit may inform the portal server about a cross-border access message of the terminal, so that the portal server may provide a cross-border access prompt to the terminal, or the portal server may provide a prompt that the terminal will join an isolated area to the terminal. [0099] In the present disclosure, the identifying unit is further to inform the RADIUS server to re-issue the network access authority corresponding to the terminal.
- the storing unit When receiving the network access authority corresponding to the terminal, which is re-issued by the RADIUS server, the storing unit is to remove previous stored network access authority corresponding to the terminal, and store the latest network access authority of the terminal issued by the RADIUS server.
- FIG.5 is a schematic diagram illustrating a structure of a server, in accordance with an example of the present disclosure.
- the server is a portal server.
- the server may include a receiving unit, a requesting unit, and a pushing unit.
- the receiving unit is to receive an HTTP request, which is redirected to the portal server and transmitted by a terminal, before the terminal is authenticated,
- the requesting unit is to transmit an information request packet to a network access device, to request user fingerprint information of the terminal.
- the pushing unit is to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal, based on the user fingerprint information of the terminal transmitted by the network access device.
- a virus scan identifier is embedded on the authentication page.
- the receiving unit is further to receive the triggering of the virus scan identifier embedded on the authentication page from the terminal.
- the server may further include a controlling unit.
- the controlling unit is to trigger antivirus software installed on the terminal to scan the terminal, and receive a scan result from the terminal after the scan is completed.
- the controlling unit may prompt the terminal to kill virus.
- virus killing is completed, the controlling unit may allow the terminal to input verification information to be authenticated.
- the controlling unit may allow the terminal to input the verification information to be authenticated.
- the controlling unit may remotely control antivirus software installed on the portal server to scan the terminal.
- the controlling unit may prompt the terminal to kill virus.
- the controlling unit may allow the terminal to input the verification information to be authenticated.
- the controlling unit may allow the terminal to input the verification information to be authenticated.
- the receiving unit is further to receive the verification information on the authentication page submitted by the terminal, when the terminal is allowed to input the verification information.
- the pushing unit is further to encapsulate the verification information with the portal protocol into a portal authentication packet, and transmit the portal authentication packet to the network access device, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
- the present disclosure also provides another server structure.
- FIG.6 is a schematic diagram illustrating another structure of a server, in accordance with an example of the present disclosure.
- the server may include a receiving unit and a pushing unit.
- the receiving unit is to receive user fingerprint information of a terminal transmitted by the terminal before the terminal is authenticated, when the terminal accesses a portal server.
- the pushing unit is to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
- a virus scan identifier is embedded on the authentication page.
- the receiving unit is further to receive triggering of the virus scan identifier embedded on the authentication page from the terminal.
- the server may further include a controlling unit.
- the controlling unit may trigger antivirus software installed on the terminal to scan the terminal, and receive a scan result from the terminal, when the scan is completed.
- the controlling unit may prompt the terminal to kill virus.
- the controlling unit may allow the terminal to input verification information to be authenticated.
- the controlling unit may allow the terminal to input the verification information to be authenticated.
- the controlling unit may remotely control the antivirus software installed on the portal server to scan the terminal.
- the controlling unit may prompt the terminal to kill virus.
- the controlling unit may allow the terminal to input the verification information to be authenticated.
- the controlling unit may allow the terminal to input the verification information to be authenticated.
- the receiving unit is further to receive the verification information on the authentication page submitted by the terminal, when the terminal is allowed to input the verification information.
- the pushing unit is further to encapsulate the verification information into a portal authentication packet with the portal protocol, and transmit the portal authentication packet to the network access device, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
- FIG.7 is a schematic diagram illustrating a structure of a network access device, in accordance with an example of the present disclosure.
- the network access device 70 may include a memory 701 , a processor 702 in communication with the memory 701 , and an interface 703.
- the memory 701 is to store an obtaining instruction 7011 and a transmitting instruction 7012, which are executable by the processor 702.
- the obtaining instruction 7011 indicates to record user fingerprint information of a terminal.
- the transmitting instruction 7012 indicates to transmit the user fingerprint information of the terminal to a portal server through the interface 703, before the terminal is authenticated, so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
- the user fingerprint information of the terminal may include at least the MAC address and Option 55 data information of the terminal.
- the obtaining instruction 7011 indicates to obtain the user fingerprint information of the terminal with the following blocks:
- the ARP entry may include at least the terminal identifier and MAC address of the terminal.
- the transmitting instruction 7012 indicates to transmit the user fingerprint information of the terminal to the portal server with the following two structure modes, before the terminal is authenticated.
- a structure mode may be as follows.
- the transmitting instruction 7012 may include a receiving sub-instruction 80121 and the first transmitting sub-instruction 70122 (not shown in the figure).
- the receiving sub-instruction 70121 indicates to receive an information request packet from the portal server through the interface 703.
- the information request packet is transmitted by the portal server, when the portal server receives an HTTP request transmitted by the terminal, before the terminal is authenticated.
- the transmitting sub-instruction 70122 indicates to search for the user fingerprint information of the terminal, based on the terminal identifier carried by the information request packet, and transmit the searched user fingerprint information of the terminal to the portal server with an information response packet.
- Another structure mode may be as follows.
- the transmitting instruction 7012 may include a receiving sub-instruction 80121 and a transmitting sub-instruction 70122 (not shown in the figure).
- the receiving sub-instruction 70121 indicates to receive the HTTP request initiated by the terminal through the interface 703, before the terminal is authenticated.
- the transmitting sub-instruction 70122 indicates to enable a redirect packet to carry the user fingerprint information of the terminal and website of the portal server, and return the redirect packet to the terminal through the interface 703, so that the terminal may transmit the user fingerprint information of the terminal to the portal server, when the terminal accesses the website of the portal server carried in the redirect packet.
- a virus scan identifier is embedded on the authentication page.
- the receiving sub-instruction 70121 further indicates to receive a portal authentication packet transmitted by the portal server through the interface 703.
- the portal authentication packet may carry the verification information on the authentication page submitted by the terminal, after the terminal triggers the virus scan identifier embedded on the authentication page and is authenticated to be safe, when the antivirus scan is completed.
- the memory 701 further stores an authentication request instruction 7013, a storing instruction 7014, and an identifying instruction 7015, which are executable by the processor 702.
- the authentication request instruction 7013 indicates to enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server.
- the storing instruction 7014 indicates to receive and store network access authority of the terminal, which is issued by the RADIUS server based on the user fingerprint information of the terminal, after the verification information passes the authentication.
- the identifying instruction 8015 When receiving the network access of the terminal, the identifying instruction 8015 indicates to determine whether the network access of the terminal crosses the border, based on the network access authority of the terminal. When determining that the network access of the terminal crosses the border, the identifying instruction 8015 may indicate to inform the portal server about a cross-border access message of the terminal, so that the portal server may provide a cross-border access prompt to the terminal, or the portal server may provide a prompt that the terminal will join an isolated area to the terminal.
- the identifying instruction 7015 further indicates to inform the RADIUS server to re-issue the network access authority corresponding to the terminal.
- the storing instruction 7014 When receiving the network access authority corresponding to the terminal, which is re-issued by the RADIUS server, the storing instruction 7014 further indicates to remove previously stored network access authority of the terminal, and store the latest network access authority of the terminal issued by the RADIUS server.
- FIG.8 is a schematic diagram illustrating a structure of a server 80, in accordance with an example of the present disclosure.
- the server is a portal server.
- the server may include a memory 801 , a processor 802 in communication with the memory 801 , and an interface 803.
- the memory 801 is to store a receiving instruction 8011 , a request instruction 8012 and a pushing instruction 8013, which are executable by the processor 802.
- the receiving instruction 8011 indicates to receive an HTTP request through the interface 803, which is redirected to the portal server and is transmitted by the terminal, before the terminal is authenticated.
- the request instruction 8012 indicates to transmit an information request packet to a network access device through the interface 803, so as to request user fingerprint information of the terminal.
- the pushing instruction 8013 indicates to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal, based on the user fingerprint information of the terminal transmitted by the network access device.
- a virus scan identifier is embedded on the authentication page.
- the receiving instruction 8011 further indicates to receive triggering of the virus scan identifier embedded on the authentication page from the terminal through the interface 803.
- the memory 801 is further to store a controlling instruction 8014 executable by the processor 802.
- the controlling instruction 8014 When receiving the triggering of the virus scan identifier based on the receiving instruction 8011 , the controlling instruction 8014 indicates to trigger antivirus software installed on the terminal to scan the terminal, and receive a scan result transmitted by the terminal, when the scan is completed. When the scan result shows that the terminal is not safe, the controlling instruction 8014 may prompt the terminal to kill virus. When the virus killing is completed, the controlling instruction 8014 may allow the terminal to input verification information to be authenticated. When the scan result shows that the terminal is safe, the controlling instruction 8014 may allow the terminal to input the verification information to be authenticated.
- the controlling instruction 8014 may remotely control the antivirus software installed on the portal server to scan the terminal.
- the controlling instruction 8014 may prompt the terminal to kill virus.
- the controlling instruction 8014 may allow the terminal to input the verification information to be authenticated.
- the controlling instruction 8014 may allow the terminal to input the verification information to be authenticated.
- the receiving instruction 8011 further indicates to receive the verification information on the authentication page submitted by the terminal, when the terminal is allowed to input the verification information.
- the pushing instruction 8013 further indicates to encapsulate the verification information into a portal authentication packet with the portal protocol, and transmit the portal authentication packet to a network access device, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
- the present disclosure also provides a schematic diagram illustrating another structure of a server.
- FIG.9 is a schematic diagram illustrating another structure of a server 90, in accordance with an example of the present disclosure.
- the server may include a memory 901 , a processor 902 in communication with the memory 901 , and an interface 903.
- the memory 901 may store a receiving instruction 9011 and a pushing instruction 9012, which are executable by the processor 1002.
- the receiving instruction 9011 indicates to receive user fingerprint information of a terminal through the interface 903, which is transmitted by the terminal when accessing a portal server, before the terminal is authenticated.
- the pushing instruction 9012 indicates to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal through the interface 903.
- a virus scan identifier is embedded on the authentication page.
- the receiving instruction 9011 further indicates to receive triggering of the virus scan identifier embedded on the authentication page from the terminal through the interface 1003.
- the memory 901 further stores a controlling instruction 9013 executable by the processor 902.
- the controlling instruction 9013 When receiving the triggering of the virus scan identifier through the interface 903 based on the receiving instruction 9011 , the controlling instruction 9013 indicates to trigger the antivirus software installed on the terminal to scan the terminal, and receive a scan result transmitted by the terminal, when the scan is completed.
- the controlling instruction 9013 may indicate to prompt the terminal to kill virus.
- the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated.
- the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated.
- the controlling instruction 9013 when receiving the triggering of the virus scan identifier through the interface 903 based on the receiving instruction 9011 , the controlling instruction 9013 indicates to remotely control the antivirus software installed on the portal server to scan the terminal. When determining that the terminal is not safe after the scan is completed, the controlling instruction 9013 may indicate to prompt the terminal to kill virus. When the virus killing is completed, the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated. When determining that the terminal is safe, the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated.
- the receiving instruction 9011 further indicates to receive the verification information on the authentication page submitted by the terminal through the interface 903, when the terminal is allowed to input the verification information.
- the pushing instruction 9012 further indicates to encapsulate the verification information into a portal authentication packet with the portal protocol, and transmit the portal authentication packet to a network access device through the interface 903, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
- the network access device may obtain the user fingerprint information of the terminal in advance. It is not necessary to install on the DHCP server the DHCP agent plug-in, which is to transmit the user fingerprint information of the terminal to the portal server. Instead, before the terminal is authenticated, the network access device may transmit the user fingerprint information of the terminal to the portal server, so that the portal server may push to the terminal the authentication page corresponding to the user fingerprint information of the terminal. Subsequently, it may avoid installing on the DHCP server the DHCP agent plug-in, which is to transmit the user fingerprint information of the terminal to the portal server. The network access device may transmit the user fingerprint information of the terminal to the portal server with a protocol packet.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Virology (AREA)
- Power Engineering (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
A network access device may obtain user fingerprint information of a terminal.The network access device may transmit the user fingerprint information of the terminal to a portal server,before the terminal is authenticated,so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
Description
ACCESS TERMINAL
Background
[0001] With the popularity of smart phones and tablet computers, which are represented by iPhone, iPad, and Android, bring your own device (BYOD) gradually comes into view. More and more employees may bring their own terminal devices to work in office, which may not only facilitate the employees' choices, but also enable enterprises to save a lot of fixed investments on office computers.
Brief Description of the Drawings
[0002] FIG.1 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
[0003] FIG.2 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
[0004] FIG.3 is a flowchart illustrating a method, in accordance with an example of the present disclosure.
[0005] FIG.4 is a schematic diagram illustrating a structure of a network access device, in accordance with an example of the present disclosure.
[0006] FIG.5 is a schematic diagram illustrating a structure of a server, in accordance with an example of the present disclosure.
[0007] FIG.6 is a schematic diagram illustrating another structure of a server, in accordance with an example of the present disclosure.
[0008] FIG.7 is a schematic diagram illustrating another structure of a network access device, in accordance with an example of the present disclosure.
[0009] FIG.8 is a schematic diagram illustrating still another structure of a server, in accordance with an example of the present disclosure.
[0010] FIG.9 is a schematic diagram illustrating still another structure of a server, in accordance with an example of the present disclosure.
Detailed Descriptions
[0011] For simplicity and illustrative purposes, the present disclosure is described by referring to examples. In the following description, numerous specific details
are set forth in order to provide a thorough understanding of the present disclosure. It will be readily apparent however, that the present disclosure may be practiced without limitation to these specific details. In other instances, some methods and structures have not been described in detail so as not to unnecessarily obscure the present disclosure. As used throughout the present disclosure, the term "includes" means includes but not limited to, the term "including" means including but not limited to. The term "based on" means based at least in part on. In addition, the terms "a" and "an" are intended to denote at least one of a particular element.
[0012] An enterprise may allow employees or visitors to carry their terminal devices to access a corporate network. Subsequently, the corporate network needs to intelligently identify types of these terminal devices, whether these terminal devices are assets of the company, and give different authorities to these terminal devices.
[0013] With reference to FIG.1 , FIG.1 is a flowchart illustrating a method, in accordance with an example of the present disclosure. As shown in FIG.1 , the flow may include the following blocks.
[0014] In block 101 , a network access device may obtain user fingerprint information of a terminal.
[0015] In block 102, before the terminal is authenticated, the network access device may transmit the user fingerprint information of the terminal to a portal server, so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
[0016] Until now, the flow illustrated with FIG.1 may be completed.
[0017] Based on the flow illustrated with FIG.1 , it can be seen that, in the present disclosure, when assigning authorities for terminals carried by employees or visitors, it is not necessary to install the DHCP agent plug-in, which is configured to transmit the user fingerprint information of the terminal to the portal server, on the DHCP server. Instead, before the terminal is authenticated, the network access device may actively transmit the user fingerprint information of the terminal to the portal server, so that the portal server may push to the terminal the authentication page corresponding to the user fingerprint information of the terminal.
[0018] The method illustrated with FIG.1 of the present disclosure will be described in the following with two examples.
[0019] An example may be as follows.
[0020] When receiving an HTTP request, which is transmitted by a terminal before being authenticated, a portal server may transmit an information request packet to a
network access device. The network access device may search for user fingerprint information of the terminal, based on the IP address of the terminal carried in the information request packet, and transmit the user fingerprint information of the terminal to the portal server by using an information response packet. The 'user fingerprint information" is information which identifies the terminal or terminal user. In one example the user fingerprint information may be a MAC address of the terminal, Option 55 data information of the terminal, HTTP agent information or any combination thereof.
[0021] In one example the information request packet may be a packet complying with the portal protocol, which is originally configured to search for user physical information of the terminal, and may be a request-information (REQ-INFO) packet. Correspondingly, the information response packet may be a packet complying with the portal protocol, which is originally configured to respond to the user physical information of the terminal. When the information request packet is the REQ-INFO packet, the information response packet may be an acknowledgement-information (ACK-INFO) packet.
[0022] That is to say, in the example, for the REQ-INFO packet, which originally requests to search for the user physical information of the terminal, enable the REQ-INFO packet not only to request the user physical information of the terminal, but also request the user fingerprint information of the terminal on the basis of requesting the user physical information of the terminal. Similarly, in the example, the ACK-INFO packet in response to the user physical information of the terminal may also be improved, so that the ACK-INFO packet may not only carry the user physical information of the terminal, but also carry the user fingerprint information of the terminal on the basis of carrying the user physical information of the terminal.
[0023] In the example, the information request packet and the information response packet may be packets complying with the portal protocol format, which may be newly created in the present disclosure.
[0024] The method provided in the example may be further described in the following with an example, in which the information request packet is the REQ-INFO packet, and the information response packet is the ACK-INFO packet.
[0025] With reference to FIG.2, FIG.2 is a flowchart illustrating a method, in accordance with an example of the present disclosure. In the flow shown in FIG.2, the user fingerprint information of the terminal may include the MAC address and Option 55 data information of the terminal. The terminal identifier may be the IP address of the terminal.
[0026] As shown in FIG.2, the flow may include the following blocks.
[0027] In block 201 , during interaction process between a terminal and a DHCP server, a network access device may record an IP address and Option 55 data information obtained by the terminal.
[0028] In block 202, the network access device may establish an address resolution protocol (ARP) entry for the terminal. The ARP entry may include at least the IP address and MAC address of the terminal.
[0029] In block 203, the terminal may transmit an HTTP request before being authenticated.
[0030] In block 204, the network access device may receive the HTTP request from the terminal, and return an HTTP redirect packet carrying a uniform resource locator (URL) to the terminal.
[0031] Here, the URL carried by the HTTP redirect packet may be website of a portal server.
[0032] In block 205, the terminal may access the portal server, based on the URL carried by the HTTP redirect packet received.
[0033] In block 206, when the terminal accesses the portal server, the portal server may transmit a REQ-INFO packet to the network access device.
[0034] The REQ-INFO packet may carry the IP address of the terminal.
[0035] In block 207, the network access device may receive the REQ-INFO packet, search for the MAC address of the terminal in ARP entries established by the network access device, based on the IP address carried by the REQ-INFO packet, search for the Option 55 data information of the terminal in Option 55 data information recorded by the network access device, based on the IP address carried by the REQ-INFO packet, enable the MAC address and Option 55 data information of the terminal searched to form the user fingerprint information of the terminal, enable the ACK-INFO packet to carry the user fingerprint information of the terminal, and transmit the ACK-INFO packet to the portal server.
[0036] In block 208, the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal, based on the user fingerprint information of the terminal carried by the ACK-INFO packet.
[0037] Specifically speaking, the portal server may determine type of the terminal based on the user fingerprint information of the terminal. When determining that the terminal is a terminal of a visitor, the portal server may push an authentication page corresponding to the visitor. When determining that the terminal is a terminal of an employee, the portal server may push an authentication page corresponding to an
enterprise terminal. Generally speaking, the authentication page corresponding to the visitor terminal may be different from the authentication page corresponding to the enterprise terminal.
[0038] As an example of the present disclosure, to ensure that the terminal is safe, when the terminal accesses the network, a virus scan may be firstly executed for the terminal in the present disclosure, before the terminal accesses the network. After determining that the terminal is safe, the authentication may be executed for the terminal.
[0039] To implement that the virus scan is firstly executed for the terminal before the terminal accesses the network, in the present disclosure, the portal server may embed a virus scan identifier on the authentication page, when pushing the authentication page to the terminal. And then, the scan of the terminal may be executed by enabling the terminal to trigger the virus scan identifier, which may refer to blocks 209 to 210. The virus scan identifier on the authentication page may exist in the manner of button or input box, which is not limited by the present disclosure.
[0040] In block 209, the terminal may trigger the virus scan identifier on the authentication page received.
[0041] In block 210, when receiving the triggering of the virus scan identifier from the terminal, the portal server may initiate the scan of the terminal. When determining that the terminal is safe after scanning, the portal server may allow the terminal to input verification information to be authenticated. When determining that the terminal is not safe after scanning, e.g., the terminal has been infected with a virus, the portal server may prompt the terminal to kill virus. The portal server may allow the terminal to input the verification information to be authenticated, when virus killing is completed.
[0042] In the present disclosure, block 210 may be implemented with the following two modes.
[0043] A mode may be as follows.
[0044] When receiving the triggering of the virus scan identifier from the terminal, the portal server may trigger antivirus software installed by the terminal to scan the terminal.
[0045] The terminal may transmit a scan result to the portal server, after the scan is completed.
[0046] The portal server may receive the scan result transmitted by the terminal, after the scan is completed. When the scan result shows that the terminal is not safe, the portal server may prompt the terminal to kill virus. When the virus killing is completed, the portal server may allow the terminal to input the verification information to be authenticated.
When the scan result shows that the terminal is safe, the portal server may allow the terminal to input the verification information to be authenticated.
[0047] That is, in the foregoing mode, the terminal may be scanned by using the antivirus software installed on the terminal, when being triggered by the portal server.
[0048] Another mode may be as follows.
[0049] When receiving the triggering of the virus scan identifier from the terminal, the portal server may remotely control the antivirus software installed on the portal server to scan the terminal. When determining that the terminal is not safe after the scan is completed, the portal server may prompt the terminal to kill virus. The portal server may allow the terminal to input verification information to be authenticated, when the virus killing is completed. When determining that the terminal is safe, the portal server may allow the terminal to input the verification information to be authenticated.
[0050] That is, in the mode, the portal server may perform the remote scan on the terminal, by using the antivirus software installed on the portal server.
[0051] In the foregoing two modes, the verification information inputted by the terminal may be user account and password.
[0052] In block 211 , when being allowed to input the verification information, the terminal may input the verification information on the authentication page, and submit to the portal server.
[0053] In block 212, the portal server may encapsulate the verification information with portal protocol into a portal authentication packet, and transmit the portal authentication packet to the network access device.
[0054] In block 213, the network access device may enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server.
[0055] In block 214, the RADIUS server may authenticate the verification information carried by the RADIUS authentication packet. When the verification information passes the authentication, the RADIUS server may inform the network access device that the terminal authentication is successful, and issue network access authority of the terminal, based on the user fingerprint information of the terminal carried by the RADIUS authentication packet.
[0056] Specifically speaking, the RADIUS server may determine type of the terminal, based on the user fingerprint information of the terminal. When determining that the terminal is a terminal of a visitor, the RADIUS server may issue a network access
authority defined for the visitors. When determining that the terminal is a terminal of an employee, the RADIUS server may issue a network access authority defined for enterprise terminals. The network access authority defined for visitors may be generally different from the network access authority defined for enterprise terminals.
[0057] In block 215, the network access device may receive and store the network access authority of the terminal, and inform the portal server that the terminal authentication is successful. Then, the portal server may inform the terminal that the terminal authentication is successful.
[0058] In block 216, the terminal may access the network. The network access device may determine whether network access of the terminal crosses the border, based on the network access authority of the terminal. When determining that the network access of the terminal crosses the border, the network access device may inform the portal server that the terminal access crosses the border. Then, the portal server may provide a cross-border access prompt for the terminal, or provide a prompt that the terminal will join an isolated area for the terminal.
[0059] As an example of the present disclosure, the foregoing block 216 may further include the follows.
[0060] The network access device may further inform the RADIUS server to re-issue the network access authority defined for the terminal.
[0061] The RADIUS server may re-issue the network access authority defined for the terminal.
[0062] The network access device may receive and store the network access authority defined for the terminal, which is re-issued by the RADIUS server, and remove previously stored network access authority defined for the terminal, so that the network access device may store the latest network access authority of the terminal issued by the RADIUS server.
[0063] Until now, the flow illustrated with FIG.2 may be completed.
[0064] Based on the flow illustrated with FIG.2, it can be seen that, in the present disclosure, the network access device may record the user fingerprint information of the terminal in advance. It is not necessary to install on the DHCP server the DHCP agent plug-in, which is configured to transmit the user fingerprint information of the terminal to the portal server. Instead, when receiving the redirected access of the terminal to the portal server, the portal server may request the user fingerprint information of the terminal from the network access device, by using a protocol packet complying with the portal protocol, such as the REQ-INFO packet.
[0065] Furthermore, in the present disclosure, the portal server may embed the virus scan identifier on the authentication page pushed. When the terminal is safe, the terminal may be authenticated, so that the terminal may access the network when guaranteeing that the terminal is safe.
[0066] Furthermore, in the present disclosure, whether the terminal access crosses the border may be distinguished. When the terminal access crosses the border, the cross-border access prompt may be provided for the terminal, or the prompt that the terminal will join an isolated area may be provided for the terminal, so that the network security may be improved.
[0067] With reference to FIG.3, FIG.3 is a flowchart illustrating a method, in accordance with an example of the present disclosure. In the flow shown in FIG.3, the user fingerprint information of the terminal may include the MAC address and Option 55 data information of the terminal.
[0068] As shown in FIG.3, the flow may include the following blocks.
[0069] Blocks 301 to 303 may be similar to blocks 201 to 203 in the foregoing example.
[0070] In block 304, a network access device may receive an HTTP request from a terminal, and return to the terminal an HTTP redirect packet carrying a URL and user fingerprint information of the terminal.
[0071] Here, the URL carried by the HTTP redirect packet may be the website of the portal server.
[0072] In block 305, the terminal may access the portal server, based on the URL carried by the received HTTP redirect packet, and transmit the user fingerprint information of the terminal carried by the HTTP redirect packet to the portal server.
[0073] In block 306, the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal. In the process, the user fingerprint information of the terminal may be transmitted by the terminal to the portal server in block 305. However, in the process shown in FIG.2, the user fingerprint information including the MAC address and option 55 data information of the terminal is transmitted by the network access device to the portal server, after the network access device searching out the MAC address and option 55 data information of the terminal.
[0074] Blocks 307 to 315 may be similar to blocks 209 to 216 in the foregoing example, which will not be repeated here.
[0075] Until now, the flow illustrated with FIG.3 may be completed.
[0076] The method provided by the present disclosure has been described with
foregoing examples. The device provided by the present disclosure will be described in the following.
[0077] With reference to FIG.4, FIG.4 is a schematic diagram illustrating a structure of a network access device, in accordance with an example of the present disclosure. As shown in FIG.4, the network access device may include an obtaining unit, and a transmitting unit.
[0078] The obtaining unit is to record user fingerprint information of a terminal.
[0079] The transmitting unit is to transmit the user fingerprint information of the terminal to a portal server, before the terminal is authenticated, so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
[0080] In the present disclosure, the user fingerprint information of the terminal may include at least the MAC address and Option 55 data information of the terminal.
[0081] The obtaining unit may obtain the user fingerprint information of the terminal by using the following blocks.
[0082] The obtaining unit may record a terminal identifier and Option 55 data information of the terminal, during the interaction process between the terminal and a DHCP server.
[0083] The obtaining unit may learn the MAC address of the terminal, and establish an ARP entry for the terminal. The ARP entry may include at least the terminal identifier and the MAC address of the terminal.
[0084] In the present disclosure, before the terminal is authenticated, the transmitting unit may transmit the user fingerprint information of the terminal to the portal server, by using the following two structure modes.
[0085] A structure mode may be as follows.
[0086] The transmitting unit may include a receiving sub-unit and a transmitting sub-unit.
[0087] The receiving sub-unit is to receive an information request packet from the portal server. The information request packet may be transmitted by the portal server, when the portal server receives the HTTP request transmitted by the terminal before the terminal is authenticated.
[0088] The transmitting sub-unit is to search for the user fingerprint information of the terminal, based on the terminal identifier carried by the information request packet, and transmit the searched user fingerprint information of the terminal to the portal server by using an information response packet.
[0089] Another structure mode may be as follows.
[0090] The transmitting unit may include a receiving sub-unit and a transmitting sub-unit.
[0091] The receiving sub-unit is to receive the HTTP request initiated by the terminal, before the terminal is authenticated.
[0092] The transmitting sub-unit is to enable the redirect packet to carry the user fingerprint information of the terminal and the website of the portal server, and return the redirect packet to the terminal, so that when the terminal accesses the website of the portal server carried by the redirect packet, the user fingerprint information of the terminal may be transmitted to the portal server.
[0093] In the present disclosure, the virus scan identifier has been embedded on the authentication page.
[0094] In the present disclosure, the receiving sub-unit is further to receive the portal authentication packet transmitted by the portal server. The portal authentication packet carries the verification information on the authentication page submitted by the terminal, after the terminal triggers the virus scan identifier embedded on the authentication page, and the terminal is authenticated to be safe when antivirus scan is completed.
[0095] Based on the foregoing descriptions, as shown in FIG.4, the network access device may further include an authentication request unit, a storing unit, and an identifying unit.
[0096] The authentication request unit is to enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server.
[0097] The storing unit is to receive and store the network access authority of the terminal, which is issued by the RADIUS server based on the user fingerprint information of the terminal, after the verification information passes the authentication.
[0098] When receiving the network access of the terminal, the identifying unit is to determine whether the network access of the terminal crosses the border, based on the network access authority of the terminal. When determining that the network access of the terminal crosses the border, the identifying unit may inform the portal server about a cross-border access message of the terminal, so that the portal server may provide a cross-border access prompt to the terminal, or the portal server may provide a prompt that the terminal will join an isolated area to the terminal.
[0099] In the present disclosure, the identifying unit is further to inform the RADIUS server to re-issue the network access authority corresponding to the terminal.
[0100] When receiving the network access authority corresponding to the terminal, which is re-issued by the RADIUS server, the storing unit is to remove previous stored network access authority corresponding to the terminal, and store the latest network access authority of the terminal issued by the RADIUS server.
[0101] Until now, the descriptions about the network access device shown in FIG.5 are completed.
[0102] With reference to FIG.5, FIG.5 is a schematic diagram illustrating a structure of a server, in accordance with an example of the present disclosure. The server is a portal server. As shown in FIG.5, the server may include a receiving unit, a requesting unit, and a pushing unit.
[0103] The receiving unit is to receive an HTTP request, which is redirected to the portal server and transmitted by a terminal, before the terminal is authenticated,
[0104] The requesting unit is to transmit an information request packet to a network access device, to request user fingerprint information of the terminal.
[0105] The pushing unit is to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal, based on the user fingerprint information of the terminal transmitted by the network access device.
[0106] In the present disclosure, a virus scan identifier is embedded on the authentication page.
[0107] In the present disclosure, the receiving unit is further to receive the triggering of the virus scan identifier embedded on the authentication page from the terminal.
[0108] In the present disclosure, the server may further include a controlling unit.
[0109] When the receiving unit receives the triggering of the virus scan identifier, the controlling unit is to trigger antivirus software installed on the terminal to scan the terminal, and receive a scan result from the terminal after the scan is completed. When the scan result shows that the terminal is not safe, the controlling unit may prompt the terminal to kill virus. When virus killing is completed, the controlling unit may allow the terminal to input verification information to be authenticated. When the scan result shows that the terminal is safe, the controlling unit may allow the terminal to input the verification information to be authenticated.
[0110] Or, when the receiving unit receives the triggering of the virus scan identifier, the controlling unit may remotely control antivirus software installed on the portal
server to scan the terminal. When determining that the terminal is not safe after scan is completed, the controlling unit may prompt the terminal to kill virus. When the virus killing is completed, the controlling unit may allow the terminal to input the verification information to be authenticated. When determining that the terminal is safe, the controlling unit may allow the terminal to input the verification information to be authenticated.
[0111] Based on the foregoing descriptions, in the present disclosure, the receiving unit is further to receive the verification information on the authentication page submitted by the terminal, when the terminal is allowed to input the verification information.
[0112] The pushing unit is further to encapsulate the verification information with the portal protocol into a portal authentication packet, and transmit the portal authentication packet to the network access device, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
[0113] Until now, descriptions about the server structure shown in FIG.6 are completed.
[0114] As an example of the present disclosure, the present disclosure also provides another server structure.
[0115] With reference to FIG.6, FIG.6 is a schematic diagram illustrating another structure of a server, in accordance with an example of the present disclosure. As shown in FIG.6, the server may include a receiving unit and a pushing unit.
[0116] The receiving unit is to receive user fingerprint information of a terminal transmitted by the terminal before the terminal is authenticated, when the terminal accesses a portal server.
[0117] The pushing unit is to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
[0118] In the present disclosure, a virus scan identifier is embedded on the authentication page.
[0119] The receiving unit is further to receive triggering of the virus scan identifier embedded on the authentication page from the terminal.
[0120] The server may further include a controlling unit.
[0121] When the receiving unit receives the triggering of the virus scan identifier, the controlling unit may trigger antivirus software installed on the terminal to scan the terminal, and receive a scan result from the terminal, when the scan is completed. When the scan result shows that the terminal is not safe, the controlling unit may prompt the terminal to kill virus. When the virus killing is completed, the controlling unit may allow the terminal to input verification information to be authenticated. When the scan result shows
that the terminal is safe, the controlling unit may allow the terminal to input the verification information to be authenticated.
[0122] Or, when the receiving unit receives the triggering of the virus scan identifier, the controlling unit may remotely control the antivirus software installed on the portal server to scan the terminal. When determining that the terminal is not safe after the scan is completed, the controlling unit may prompt the terminal to kill virus. When the virus killing is completed, the controlling unit may allow the terminal to input the verification information to be authenticated. When determining that the terminal is safe, the controlling unit may allow the terminal to input the verification information to be authenticated.
[0123] Based on the foregoing descriptions, the receiving unit is further to receive the verification information on the authentication page submitted by the terminal, when the terminal is allowed to input the verification information.
[0124] The pushing unit is further to encapsulate the verification information into a portal authentication packet with the portal protocol, and transmit the portal authentication packet to the network access device, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
[0125] Until now, descriptions about another server structure shown in FIG.7 are completed.
[0126] With reference to FIG.7, FIG.7 is a schematic diagram illustrating a structure of a network access device, in accordance with an example of the present disclosure. As shown in FIG.7, the network access device 70 may include a memory 701 , a processor 702 in communication with the memory 701 , and an interface 703. The memory 701 is to store an obtaining instruction 7011 and a transmitting instruction 7012, which are executable by the processor 702.
[0127] The obtaining instruction 7011 indicates to record user fingerprint information of a terminal.
[0128] The transmitting instruction 7012 indicates to transmit the user fingerprint information of the terminal to a portal server through the interface 703, before the terminal is authenticated, so that the portal server may push to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
[0129] In the present disclosure, the user fingerprint information of the terminal may include at least the MAC address and Option 55 data information of the terminal.
[0130] The obtaining instruction 7011 indicates to obtain the user fingerprint information of the terminal with the following blocks:
record a terminal identifier and Option 55 data information of the terminal, during the
interaction process between the terminal and a DHCP server;
learn the MAC address of the terminal, and establish an ARP entry for the terminal. The ARP entry may include at least the terminal identifier and MAC address of the terminal.
[0131] In the present disclosure, the transmitting instruction 7012 indicates to transmit the user fingerprint information of the terminal to the portal server with the following two structure modes, before the terminal is authenticated.
[0132] A structure mode may be as follows.
[0133] The transmitting instruction 7012 may include a receiving sub-instruction 80121 and the first transmitting sub-instruction 70122 (not shown in the figure).
[0134] The receiving sub-instruction 70121 indicates to receive an information request packet from the portal server through the interface 703. The information request packet is transmitted by the portal server, when the portal server receives an HTTP request transmitted by the terminal, before the terminal is authenticated.
[0135] The transmitting sub-instruction 70122 indicates to search for the user fingerprint information of the terminal, based on the terminal identifier carried by the information request packet, and transmit the searched user fingerprint information of the terminal to the portal server with an information response packet.
[0136] Another structure mode may be as follows.
[0137] The transmitting instruction 7012 may include a receiving sub-instruction 80121 and a transmitting sub-instruction 70122 (not shown in the figure).
[0138] The receiving sub-instruction 70121 indicates to receive the HTTP request initiated by the terminal through the interface 703, before the terminal is authenticated.
[0139] The transmitting sub-instruction 70122 indicates to enable a redirect packet to carry the user fingerprint information of the terminal and website of the portal server, and return the redirect packet to the terminal through the interface 703, so that the terminal may transmit the user fingerprint information of the terminal to the portal server, when the terminal accesses the website of the portal server carried in the redirect packet.
[0140] In the present disclosure, a virus scan identifier is embedded on the authentication page.
[0141] In the present disclosure, the receiving sub-instruction 70121 further indicates to receive a portal authentication packet transmitted by the portal server through the interface 703. The portal authentication packet may carry the verification information on the authentication page submitted by the terminal, after the terminal triggers the virus scan identifier embedded on the authentication page and is authenticated to be safe, when
the antivirus scan is completed.
[0142] Based on the foregoing descriptions, as shown in FIG.7, the memory 701 further stores an authentication request instruction 7013, a storing instruction 7014, and an identifying instruction 7015, which are executable by the processor 702.
[0143] The authentication request instruction 7013 indicates to enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server.
[0144] The storing instruction 7014 indicates to receive and store network access authority of the terminal, which is issued by the RADIUS server based on the user fingerprint information of the terminal, after the verification information passes the authentication.
[0145] When receiving the network access of the terminal, the identifying instruction 8015 indicates to determine whether the network access of the terminal crosses the border, based on the network access authority of the terminal. When determining that the network access of the terminal crosses the border, the identifying instruction 8015 may indicate to inform the portal server about a cross-border access message of the terminal, so that the portal server may provide a cross-border access prompt to the terminal, or the portal server may provide a prompt that the terminal will join an isolated area to the terminal.
[0146] In the present disclosure, the identifying instruction 7015 further indicates to inform the RADIUS server to re-issue the network access authority corresponding to the terminal.
[0147] When receiving the network access authority corresponding to the terminal, which is re-issued by the RADIUS server, the storing instruction 7014 further indicates to remove previously stored network access authority of the terminal, and store the latest network access authority of the terminal issued by the RADIUS server.
[0148] Until now, descriptions about the network access device illustrated with FIG.7 are completed.
[0149] With reference to FIG.8, FIG.8 is a schematic diagram illustrating a structure of a server 80, in accordance with an example of the present disclosure. The server is a portal server. As shown in FIG.8, the server may include a memory 801 , a processor 802 in communication with the memory 801 , and an interface 803. The memory 801 is to store a receiving instruction 8011 , a request instruction 8012 and a pushing instruction 8013, which are executable by the processor 802.
[0150] The receiving instruction 8011 indicates to receive an HTTP request through the interface 803, which is redirected to the portal server and is transmitted by the terminal, before the terminal is authenticated.
[0151] The request instruction 8012 indicates to transmit an information request packet to a network access device through the interface 803, so as to request user fingerprint information of the terminal.
[0152] The pushing instruction 8013 indicates to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal, based on the user fingerprint information of the terminal transmitted by the network access device.
[0153] In the present disclosure, a virus scan identifier is embedded on the authentication page.
[0154] In the present disclosure, the receiving instruction 8011 further indicates to receive triggering of the virus scan identifier embedded on the authentication page from the terminal through the interface 803.
[0155] In the present disclosure, the memory 801 is further to store a controlling instruction 8014 executable by the processor 802.
[0156] When receiving the triggering of the virus scan identifier based on the receiving instruction 8011 , the controlling instruction 8014 indicates to trigger antivirus software installed on the terminal to scan the terminal, and receive a scan result transmitted by the terminal, when the scan is completed. When the scan result shows that the terminal is not safe, the controlling instruction 8014 may prompt the terminal to kill virus. When the virus killing is completed, the controlling instruction 8014 may allow the terminal to input verification information to be authenticated. When the scan result shows that the terminal is safe, the controlling instruction 8014 may allow the terminal to input the verification information to be authenticated.
[0157] Or, when receiving the triggering of the virus scan identifier based on the receiving instruction 8011 , the controlling instruction 8014 may remotely control the antivirus software installed on the portal server to scan the terminal. When determining that the terminal is not safe, after the scan is completed, the controlling instruction 8014 may prompt the terminal to kill virus. When the virus killing is completed, the controlling instruction 8014 may allow the terminal to input the verification information to be authenticated. When determining that the terminal is safe, the controlling instruction 8014 may allow the terminal to input the verification information to be authenticated.
[0158] Based on the foregoing descriptions, in the present disclosure, the
receiving instruction 8011 further indicates to receive the verification information on the authentication page submitted by the terminal, when the terminal is allowed to input the verification information.
[0159] The pushing instruction 8013 further indicates to encapsulate the verification information into a portal authentication packet with the portal protocol, and transmit the portal authentication packet to a network access device, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
[0160] Until now, descriptions about server structure shown in FIG.8 are completed.
[0161] As an example of the present disclosure, the present disclosure also provides a schematic diagram illustrating another structure of a server.
[0162] With reference to FIG.9, FIG.9 is a schematic diagram illustrating another structure of a server 90, in accordance with an example of the present disclosure. As shown in FIG.9, the server may include a memory 901 , a processor 902 in communication with the memory 901 , and an interface 903. The memory 901 may store a receiving instruction 9011 and a pushing instruction 9012, which are executable by the processor 1002.
[0163] The receiving instruction 9011 indicates to receive user fingerprint information of a terminal through the interface 903, which is transmitted by the terminal when accessing a portal server, before the terminal is authenticated.
[0164] The pushing instruction 9012 indicates to push to the terminal an authentication page corresponding to the user fingerprint information of the terminal through the interface 903.
[0165] In the present disclosure, a virus scan identifier is embedded on the authentication page.
[0166] The receiving instruction 9011 further indicates to receive triggering of the virus scan identifier embedded on the authentication page from the terminal through the interface 1003.
[0167] The memory 901 further stores a controlling instruction 9013 executable by the processor 902.
[0168] When receiving the triggering of the virus scan identifier through the interface 903 based on the receiving instruction 9011 , the controlling instruction 9013 indicates to trigger the antivirus software installed on the terminal to scan the terminal, and receive a scan result transmitted by the terminal, when the scan is completed. When the
scan result shows that the terminal is not safe, the controlling instruction 9013 may indicate to prompt the terminal to kill virus. When the virus killing is completed, the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated. When the scan result shows that the terminal is safe, the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated.
[0169] Or, when receiving the triggering of the virus scan identifier through the interface 903 based on the receiving instruction 9011 , the controlling instruction 9013 indicates to remotely control the antivirus software installed on the portal server to scan the terminal. When determining that the terminal is not safe after the scan is completed, the controlling instruction 9013 may indicate to prompt the terminal to kill virus. When the virus killing is completed, the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated. When determining that the terminal is safe, the controlling instruction 9013 may indicate to allow the terminal to input the verification information to be authenticated.
[0170] Based on the foregoing descriptions, the receiving instruction 9011 further indicates to receive the verification information on the authentication page submitted by the terminal through the interface 903, when the terminal is allowed to input the verification information.
[0171] The pushing instruction 9012 further indicates to encapsulate the verification information into a portal authentication packet with the portal protocol, and transmit the portal authentication packet to a network access device through the interface 903, so that the network access device may transmit the verification information to a RADIUS server to be authenticated.
[0172] Until now, descriptions about another server structure shown in FIG.9 are completed.
[0173] Based on the foregoing technical solutions, it can be seen that, in the present disclosure, the network access device may obtain the user fingerprint information of the terminal in advance. It is not necessary to install on the DHCP server the DHCP agent plug-in, which is to transmit the user fingerprint information of the terminal to the portal server. Instead, before the terminal is authenticated, the network access device may transmit the user fingerprint information of the terminal to the portal server, so that the portal server may push to the terminal the authentication page corresponding to the user fingerprint information of the terminal. Subsequently, it may avoid installing on the DHCP server the DHCP agent plug-in, which is to transmit the user fingerprint information of the
terminal to the portal server. The network access device may transmit the user fingerprint information of the terminal to the portal server with a protocol packet.
Claims
Claims
1 , A terminal access method, comprising:
obtaining, by a network access device, user fingerprint information of a terminal;
transmitting, by the network access device, the user fingerprint information of the terminal to a portal server, before the terminal is authenticated, such that the portal server pushes to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
2, The method according to claim 1 , wherein the user fingerprint information of the terminal comprises at least a media access control (MAC) address and option 55 data information of the terminal; and
wherein obtaining by the network access device the user fingerprint information of the terminal comprises:
recording, by the network access device, a terminal identifier and the option 55 data information of the terminal, during an interaction process between the terminal and a dynamic host configuration protocol (DHCP) server;
learning, by the network access device, the MAC address of the terminal, and establishing an address resolution protocol (ARP) entry for the terminal, wherein the ARP entry comprises at least the terminal identifier and the MAC address of the terminal.
3, The method according to claim 1 , wherein transmitting by the network access device the user fingerprint information of the terminal to the portal server, before the terminal is authenticated, comprises:
receiving, by the network access device, an information request packet from the portal server,;
searching for, by the network access device, the user fingerprint information of the terminal, based on the terminal identifier carried by the information request packet, and transmitting the searched user fingerprint information of the terminal to the portal server with an information response packet.
4, The method according to claim 3, wherein the information request packet is a packet complying with a portal protocol configured to search for user physical information of the terminal, which is a request-information (REQ-INFO) packet;
the information response packet is a packet complying with the portal protocol, which responds to the packet searching for the user physical information of the terminal, the information response packet further carries the user physical information of the terminal. when the information request packet is the REQ-INFO packet, the information
response packet is an acknowledgement-information (ACK-INFO) packet.
5, The method according to claim 1 , wherein transmitting by the network access device the user fingerprint information of the terminal to the portal server, before the terminal is authenticated, comprises:
receiving, by the network access device, an HTTP request initiated by the terminal, before the terminal is authenticated;
returning, by the network access device, a redirect packet carrying the user fingerprint information of the terminal and website of the portal server to the terminal, such that the terminal transmits the user fingerprint information of the terminal to the portal server, when the terminal accesses the website of the portal server carried in the redirect packet.
6, The method according to claim 1 , wherein a virus scan identifier is embedded on the authentication page, and the method further comprises:
receiving, by the network access device, a portal authentication packet transmitted by the portal server, wherein the portal authentication packet carries verification information on the authentication page submitted by the terminal, after the terminal triggers the virus scan identifier embedded on the authentication page, and the terminal is determined to be safe when antivirus scan is completed;
enabling, by the network access device, a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, transmitting the RADIUS authentication packet to a RADIUS server;
receiving and storing, by the network access device, a network access authority of the terminal, which is issued by the RADIUS server based on the user fingerprint information of the terminal, after authentication of the verification information is passed.
7, The method according to claim 6, wherein informing by the network access device the portal server of the cross-border access message of the terminal comprises:
informing, by the network access device, the RADIUS server to re-issue the network access authority corresponding to the terminal;
when receiving the network access authority corresponding to the terminal re-issued by the RADIUS server, removing, by the network access device, the network access authority corresponding to the terminal previously stored, and storing the latest network access authority of the terminal issued by the RADIUS server.
8, A network access device, comprising a memory, a processor in communication with the memory, and an interface, wherein the memory is to store machine readable instructions which are executable by the processor to:-
record user fingerprint information of a terminal; and
transmit the user fingerprint information of the terminal to a portal server through the interface, before the terminal is authenticated, such that the portal server pushes to the terminal an authentication page corresponding to the user fingerprint information of the terminal.
9, The network access device according to claim 8, wherein the user fingerprint information of the terminal comprises at least a media access control (MAC) address and option 55 data information of the terminal; and the machine readable instructions are further to:
record a terminal identifier and the option 55 data information of the terminal, during an interaction process between the terminal and a Dynamic Host Configuration Protocol (DHCP) server;
learn the MAC address of the terminal, and establish an Address Resolution Protocol (ARP) entry for the terminal, wherein the ARP entry comprises at least the terminal identifier and the MAC address of the terminal.
10, The network access device according to claim 8, wherein the machine readable instructions are further to receive an information request packet from a portal server through the interface,;
search for the user fingerprint information of the terminal, based on the terminal identifier carried by the information request packet, and transmit the searched user fingerprint information of the terminal to the portal server with an information response packet.
11 , The network access device according to claim 8, wherein the machine readable instructions are further to receive a hypertext transfer protocol (HTTP) request initiated by the terminal through the interface, before the terminal is authenticated; enable a redirect packet to carry the user fingerprint information of the terminal and website of the portal server, and return the redirect packet to the terminal through the interface, such that the terminal transmits the user fingerprint information of the terminal to the portal server, when the terminal accesses the website of the portal server carried in the redirect packet.
12, The network access device according to claim 10, wherein a virus scan identifier is embedded on the authentication page;
and wherein the machine readable instructions are to receive a portal authentication packet from the portal server through the interface, wherein the portal authentication packet carries verification information on the authentication page submitted by the terminal, after the terminal triggers the virus scan identifier embedded on the authentication page,
and the terminal is determined to be safe when antivirus scan is completed; enable a RADIUS authentication packet to carry the user fingerprint information of the terminal and the verification information carried by the portal authentication packet, and transmit the RADIUS authentication packet to a RADIUS server through the interface; and store a network access authority of the terminal through the interface, which is issued by the RADIUS server based on the user fingerprint information of the terminal, after authentication of the verification information is passed;
and in response to receiving network access of the terminal through the interface, determine whether the network access of the terminal crosses the border, based on the network access authority of the terminal;
when determining that the network access of the terminal crosses the border, the identifying instruction further indicates to inform the portal server about a cross-border access message of the terminal, such that the portal server provides a cross-border access prompt to the terminal, or the portal server provides a prompt that the terminal will join an isolated area to the terminal.
13, The network access device according to claim 12, wherein the identifying instruction further indicates to inform the RADIUS server to re-issue the network access authority corresponding to the terminal;
when receiving the network access authority corresponding to the terminal, which is re-issued by the RADIUS server through the interface, the storing instruction indicates to remove the previously stored network access authority corresponding to the terminal, and store the latest network access authority of the terminal which is issued by the RADIUS server.
14, A server, which is a portal server, comprising a memory, a processor in communication with the memory, and an interface, wherein the memory is to store machine readable instructions which are executable by the processor to:- receive user fingerprint information of a terminal through the interface, which is transmitted by the terminal when the terminal accesses the portal server, before the terminal is authenticated; and
push to the terminal an authentication page corresponding to the user fingerprint information of the terminal through the interface.
15, The server according to claim 14, wherein a virus scan identifier is embedded on the authentication page, and the receiving instruction further indicates to receive a triggering of the virus scan identifier embedded on the authentication page from the terminal through the interface;
wherein the machine readable instructions are to:- trigger antivirus software installed on the terminal to scan the terminal in response to receiving the triggering of the virus scan identifier;
receive a scan result transmitted by the terminal after finishing a scan; when the scan result shows that the terminal is not safe, prompt the terminal to kill virus, and allow the terminal to input verification information to be authenticated after virus killing is completed; when the scan result shows that the terminal is safe, allow the terminal to input the verification information to be authenticated; or,
in response to receiving the triggering of the virus scan identifier:
remotely control antivirus software installed on the portal server to scan the terminal, when determining that the terminal is not safe after the scan is finished, prompt the terminal to kill virus, and allow the terminal to input the verification information to be authenticated when the virus killing is finished; when determining that the terminal is safe, allow the terminal to input the verification information to be authenticated;
and receive the verification information on the authentication page through the interface, which is submitted by the terminal after being allowed to input the verification information;
and encapsulate the verification information into a portal authentication packet with a portal protocol, and transmit the portal authentication packet to a network access device through the interface, such that the network access device transmits the verification information to a RADIUS server to be authenticated.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14819738.7A EP3017584A4 (en) | 2013-07-03 | 2014-04-03 | Access terminal |
US14/892,907 US10237271B2 (en) | 2013-07-03 | 2014-04-03 | Access terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310278636.8A CN104283848B (en) | 2013-07-03 | 2013-07-03 | Terminal access method and device |
CN201310278636.8 | 2013-07-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015000313A1 true WO2015000313A1 (en) | 2015-01-08 |
Family
ID=52143070
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/074683 WO2015000313A1 (en) | 2013-07-03 | 2014-04-03 | Access terminal |
Country Status (4)
Country | Link |
---|---|
US (1) | US10237271B2 (en) |
EP (1) | EP3017584A4 (en) |
CN (1) | CN104283848B (en) |
WO (1) | WO2015000313A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227576A (en) * | 2015-10-27 | 2016-01-06 | 上海斐讯数据通信技术有限公司 | Realize method and the router of portal certification and locking WIFI signal simultaneously |
CN114726569A (en) * | 2021-12-24 | 2022-07-08 | 深圳云天励飞技术股份有限公司 | Data aggregation method and related equipment for cross-domain environment |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104869045A (en) * | 2014-02-20 | 2015-08-26 | 中兴通讯股份有限公司 | Page pushing method, page pushing device, page pushing server and page pushing system |
US9578007B2 (en) * | 2015-03-31 | 2017-02-21 | Cisco Technology, Inc. | Secure transmission of a session identifier during service authentication |
CN104821940A (en) * | 2015-04-16 | 2015-08-05 | 京信通信技术(广州)有限公司 | Method and equipment for sending portal redirected address |
CN105357214A (en) * | 2015-11-26 | 2016-02-24 | 东莞酷派软件技术有限公司 | Remote control method, remote control device, terminal and remote control system |
CN105516981A (en) * | 2015-12-21 | 2016-04-20 | 深圳维盟科技有限公司 | Intelligent WiFi authentication system |
JP6104439B1 (en) * | 2016-08-08 | 2017-03-29 | 株式会社Isao | Authentication system, method, program, and recording medium recording the program |
CN107809427A (en) * | 2017-10-26 | 2018-03-16 | 迈普通信技术股份有限公司 | Page push method, apparatus, system and information acquisition method, device |
CN108200023A (en) * | 2017-12-25 | 2018-06-22 | 锐捷网络股份有限公司 | Unaware authentication method and device |
CN109145080B (en) * | 2018-07-26 | 2021-01-01 | 新华三信息安全技术有限公司 | Text fingerprint obtaining method and device |
CN112929188B (en) * | 2019-12-05 | 2022-06-14 | 中国电信股份有限公司 | Device connection method, system, apparatus and computer readable storage medium |
CN112235586A (en) * | 2020-04-10 | 2021-01-15 | 洪镒 | Video terminal security verification method based on live video and server |
CN115022068A (en) * | 2022-06-17 | 2022-09-06 | 武汉思普崚技术有限公司 | Authentication method and system based on user nail |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101437048A (en) * | 2008-11-11 | 2009-05-20 | 中国移动通信集团北京有限公司 | Method and system for pushing personalized page |
CN102238543A (en) * | 2010-04-27 | 2011-11-09 | 杭州华三通信技术有限公司 | Wireless Portal authentication method and access controller |
WO2012141494A2 (en) * | 2011-04-12 | 2012-10-18 | 엘지전자 주식회사 | Terminal management system and method for managing a terminal |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7120684B2 (en) * | 1998-10-22 | 2006-10-10 | Electronic Data Systems Corporation | Method and system for central management of a computer network |
US20020107961A1 (en) * | 2001-02-07 | 2002-08-08 | Naoya Kinoshita | Secure internet communication system |
US20040003081A1 (en) * | 2002-06-26 | 2004-01-01 | Microsoft Corporation | System and method for providing program credentials |
US9436820B1 (en) * | 2004-08-02 | 2016-09-06 | Cisco Technology, Inc. | Controlling access to resources in a network |
US7206610B2 (en) | 2004-10-28 | 2007-04-17 | Interdigital Technology Corporation | Method, system and components for facilitating wireless communication in a sectored service area |
US7627123B2 (en) * | 2005-02-07 | 2009-12-01 | Juniper Networks, Inc. | Wireless network having multiple security interfaces |
CN100563158C (en) * | 2005-10-26 | 2009-11-25 | 杭州华三通信技术有限公司 | Access control method and system |
US20090183247A1 (en) | 2008-01-11 | 2009-07-16 | 11I Networks Inc. | System and method for biometric based network security |
CN101378358B (en) | 2008-09-19 | 2010-12-15 | 成都市华为赛门铁克科技有限公司 | Method, system and server for safety access control |
CN101527908B (en) | 2009-04-08 | 2011-04-20 | 中兴通讯股份有限公司 | Method for pre-identifying wireless local area network terminal and wireless local area network system |
CN101656725B (en) | 2009-09-24 | 2012-09-05 | 杭州华三通信技术有限公司 | Method for implementing safety access and access equipment |
CN102204307B (en) * | 2011-06-15 | 2014-04-16 | 华为技术有限公司 | WLAN authentication method based on MAC address and device thereof |
CN102244866B (en) * | 2011-08-18 | 2016-01-20 | 杭州华三通信技术有限公司 | Gate verification method and access controller |
EP2901664B1 (en) * | 2012-09-25 | 2018-02-14 | Thomson Licensing | Reducing core network traffic caused by migrant users |
US9203689B2 (en) * | 2012-10-26 | 2015-12-01 | International Business Machines Corporation | Differential dynamic host configuration protocol lease allocation |
-
2013
- 2013-07-03 CN CN201310278636.8A patent/CN104283848B/en active Active
-
2014
- 2014-04-03 EP EP14819738.7A patent/EP3017584A4/en not_active Withdrawn
- 2014-04-03 US US14/892,907 patent/US10237271B2/en not_active Expired - Fee Related
- 2014-04-03 WO PCT/CN2014/074683 patent/WO2015000313A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101437048A (en) * | 2008-11-11 | 2009-05-20 | 中国移动通信集团北京有限公司 | Method and system for pushing personalized page |
CN102238543A (en) * | 2010-04-27 | 2011-11-09 | 杭州华三通信技术有限公司 | Wireless Portal authentication method and access controller |
WO2012141494A2 (en) * | 2011-04-12 | 2012-10-18 | 엘지전자 주식회사 | Terminal management system and method for managing a terminal |
Non-Patent Citations (1)
Title |
---|
See also references of EP3017584A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227576A (en) * | 2015-10-27 | 2016-01-06 | 上海斐讯数据通信技术有限公司 | Realize method and the router of portal certification and locking WIFI signal simultaneously |
CN114726569A (en) * | 2021-12-24 | 2022-07-08 | 深圳云天励飞技术股份有限公司 | Data aggregation method and related equipment for cross-domain environment |
CN114726569B (en) * | 2021-12-24 | 2024-06-07 | 深圳云天励飞技术股份有限公司 | Data aggregation method of cross-network environment and related equipment |
Also Published As
Publication number | Publication date |
---|---|
EP3017584A1 (en) | 2016-05-11 |
CN104283848B (en) | 2018-02-09 |
EP3017584A4 (en) | 2017-03-08 |
US10237271B2 (en) | 2019-03-19 |
CN104283848A (en) | 2015-01-14 |
US20160308864A1 (en) | 2016-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10237271B2 (en) | Access terminal | |
US10721320B2 (en) | Redirection method, apparatus, and system | |
US10616217B2 (en) | Website authentication using an internet-connected device | |
US10050971B2 (en) | Portal authentication method and access controller | |
CN104980412B (en) | A kind of applications client, server-side and corresponding portal authentication method | |
WO2015101125A1 (en) | Network access control method and device | |
CN107770226B (en) | Control method and device for smart home, home gateway and mobile terminal | |
EP2963884A1 (en) | Bidirectional authorization system, client and method | |
US8244212B2 (en) | Communication method, communication apparatus, cell phone terminal, and communication system for performing connection via a network | |
DK2924944T3 (en) | Presence authentication | |
CN104144163A (en) | Identity verification method, device and system | |
CN105873055B (en) | Wireless network access authentication method and device | |
CN103905399A (en) | Account registration management method and apparatus | |
CN106686592B (en) | Network access method and system with authentication | |
JP7135206B2 (en) | access authentication | |
CN110932944A (en) | Method and system for controlling intelligent household equipment by visitor terminal | |
CN105991640B (en) | Handle the method and device of HTTP request | |
WO2018045798A1 (en) | Network authentication method and related device | |
CN106572112A (en) | Access control method and device | |
CN105744517A (en) | Information authentication method and network side device | |
CN103024040A (en) | Method and system for processing repeated log in of webpage authentication user | |
JP2023515146A (en) | Password recovery methods, systems, cloud servers and electronic devices | |
CN106330948A (en) | Message control method and message control device | |
GB2578999A (en) | Mobile number verification for mobile network-based authentication | |
CN105635060B (en) | It is a kind of to obtain method, authentication server and the gateway for applying data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14819738 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014819738 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14892907 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |