Background technology
Present WLAN (wireless local area network) (Wireless Local Area Network, in web authentication mechanism WLAN), a kind of important authentication mode is the Portal authentication, is also referred to as web authentication usually, generally the website with the Portal authentication is called portal website.During the unauthenticated user online, the equipment force users signs in to particular station, and the user can free access service wherein.Access control schemes such as traditional 802.1x and PPPoE all need the cooperation of client, and can only control user's visit at Access Layer.The Portal authentication techniques provide a kind of access control scheme flexibly, do not need to install client, just can implement access control at Access Layer and the critical data that needs protection porch.
When the user needs out of Memory in the internet usage, must authenticate in portal website, just can the internet usage resource after having only authentication to pass through.Verification process during the wireless network user access network is by access controller (Access Controller, AC), Portal certificate server and remote authentication dialing user server (Remote Access Dial in User Service Server, Radius Server) are finished jointly.The user inserts after the WLAN (wireless local area network), and when visit Internet, the propelling movement page that needs to keep confirming authentication success is in open mode; When the propelling movement page of confirming authentication success is closed, then going up network process will interrupt, and this moment, the user need carry out the authentication that WLAN inserts again, visited the authority of Internet with acquisition.
The realization framework of existing WLAN authentication mechanism based on the Web mode as shown in Figure 1, after the user is first by authentication, in AC, can keep a session status table, be used to write down the user conversation by authenticating, the corresponding relation of maintenance customer IP address and Mobile Subscriber International ISDN Number in the state table.
Based on the authentication mechanism framework shown in the accompanying drawing 1, the network access authentication flow process of wireless local network user comprises as shown in Figure 2:
After S101, terminal and access point AP set up physical connection, AC equipment was terminal distribution IP address by the DHCP agreement;
S102, terminal are initiated the HTTP service request;
S103, AC intercept and capture user's HTTP request, if the user did not authenticate, just be forced to Portal server, and add relevant parameter in forced portal/compulsory portal URL;
S104, Portal server push the WEB certification page to the WLAN user terminal;
S105, user insert information such as user name, password on certification page, be submitted to Portal server;
S106, employing CHAP flow process are carried out authentification of user between the Portal/AC/Radius Server; Specifically comprise: Portal sends REQ_CHALLENGE[IP to AC] message, request obtains user's IP address, AC feeds back an ACK[IP, challenge, reqID] feedback message to Portal, Portal carries out encryption according to encryption rule to username and password, and encrypted result sent to AC, AC is forwarded to the RADIUS authentication server with encrypted result, the RADIUS authentication server is used identical encryption rule the same user's that preserves username and password is carried out encryption, relatively encrypted result of Sheng Chenging and the encrypted result that receives, the authentication success if the two is identical, otherwise authentification failure, the RADIUS authentication server sends to AC with authentication result Access-Accept/Access-Refuse;
S107, AC maintenance customer IP address and Mobile Subscriber International ISDN Number mapping table, and return authentication result (carrying subscriber phone number) and related service attribute are given Portal server;
S108, Portal server are according to authentication result, and the pushing certification results page is if success pushes the door Website page and gives the user; If authentification failure returns error message;
S109, Portal server are responded AC and are received the authentication result message, and the beginning charging flow.
The shortcoming of prior art mainly shows: after the user inserts wlan network, when visit Internet, need to keep " authentication success " to push the page and be in open mode; After the propelling movement page is closed, last network process interrupts, when need re-entering username and password during access internet once more, the user authenticates login, owing to login interface may occur frequently pushing, and need the user to repeat to import the situation of username and password, make that the actual authentification of user efficient of central WLAN (wireless local area network) of using is lower.
Embodiment
The method of the WLAN terminal authentication that the embodiment of the invention provides and device, in the Portal verification process that solves WLAN (wireless local area network), the user need repeat to import that username and password is logined and the problem of the authentication inefficiency that produces.The present invention is mainly based on following thinking: when wireless local network user is logined first, input usemame/password and authentication-exempt cycle authenticate on the authentication interface that Portal server pushes, behind authentication success, Portal server records the user log-in authentication information of generation with authentication-related information such as usemame/password, login time, authentication-exempt cycles, and with cipher mode user log-in authentication information is write user terminal; At authentication-exempt in the cycle, not when the user terminal of logging status is asked access internet once more, the broadband access controller is redirected to Portal server with the request of user terminal access the Internet, carries user log-in authentication information in the request of the access internet of user terminal at this moment.Portal server according to the user profile of carrying in the user log-in authentication information can safety the authenticated user terminal, come the requirement user terminal to login again and need not once more the pushing certification interface.User log-in authentication information stores form is an example with the Cookie form in the embodiments of the invention, still should not think only to be confined to this kind file layout.
The embodiment of the invention 1 provides a kind of method of WLAN terminal authentication, and wherein the flow process of the first login of user terminal comprises step as shown in Figure 3:
After S301, terminal and access point AP set up physical connection, access controller AC equipment was terminal distribution IP address by the DHCP agreement;
S302, terminal are initiated the HTTP service request of access internet;
S303, AC intercept and capture user's HTTP request, because not process authentication (current terminal is not to be in logging status) of user, then AC forces this HTTP to ask Portal server, opens the HTTPs escape way between Portal server and the terminal;
S304, Portal server check in the HTTP request whether carry cookie information (user log-in authentication information), this cookie information normally passes through encryption, owing to do not carry cookie information in this Http request, so push the Portal authentication interface to the WLAN user terminal;
S305, user insert information such as user name, password on authentication interface, be submitted to Portal server; Message transmission between user terminal UE and the Portal is to adopt HTTPs escape way agreement to realize, thereby has effectively protected the safety of user profile;
S306, employing CHAP flow process are carried out authentification of user between the Portal/AC/Radius Server;
S307, AC return authentication result and related service attribute are given Portal server;
S308, Portal server send authentication result message according to authentication result, and the pushing certification results page is if success pushes portal page and gives the user.Simultaneously, Portal generates and to comprise the encryption cookie information in user profile and authentication-exempt cycle and to be written to user terminal, is connected to the HTTPs escape way between this moment Portal and the client, the safety that writes with protection Cookie; If authentification failure then returns error message;
S309, AC transmit the propelling movement page of Portal server to user terminal; Portal replys authenticate-acknowledge message to AC, and AC begins charging flow.
When the user attempts carrying out the login authentication of local area network (LAN) for the first time, need Portal server to its pushing certification interface, the user fills in usemame/password on authentication interface, Portal server carries out aforesaid chap authentication flow process to it, after authentication is passed through, Portal server also will be according to user name, and information such as landing time and authentication-exempt cycle generate cookie information (user log-in authentication information) and send to the user terminal preservation.So that when the user terminal that follow-up authentication-exempt was logged off in the cycle proposed the HTTP request, Portal server can directly utilize the user profile that comprises among the Cookie to carry out user's login authentication.
For the WLAN terminal authentication method that the embodiment of the invention 1 provides, the information such as user name that the user is submitted to and authentication-exempt cycle that focus on simultaneously record in the cookie information, promptly record in the user log-in authentication information.Corresponding after the user is rolled off the production line (being the current logging status that is not in), when applying for the HTTP access request once more, its login process comprises step as shown in Figure 4:
After S401, terminal and AP set up physical connection, AC equipment was terminal distribution IP address by the DHCP agreement;
S402, terminal are initiated the HTTP service request;
S403, AC intercept and capture the HTTP request of user terminal, because the user is not through authentication (current terminal is not to be in logging status), just be forced to Portal server, carry in user's the access request at this moment by the encryption cookie information that is written to terminal before the Portal server, adopt the safety of HTTPs escape way protection Cookie message in transmittance process between Portal and the client;
Whether carry the cookie information of encryption in the HTTP request that S404, Portal server inspection user terminal are sent, if the result is for being, then obtain user profile in the Portal server deciphering cookie information, comprise the user name that the user logins herein, then according to the CHAP flow process, to AC request challenge code Challenge;
S405, AC return corresponding information and give Portal server, comprise challenge code sequence number Challenge ID and Challenge;
S406, Portal server use a predefined fixed password, for example " 9999 ", after doing the MD5 algorithm with Challenge ID and Challenge, obtain password Challenge-Password through challenge code and processing, be submitted to AC together with the user name of extracting among the Cookie, initiate authentication.
The predetermined process mode is handled password and challenge code and challenge code sequence number for utilizing the MD5 algorithm herein, is not limited to this kind mode in the practical operation, also can be the processing method of other kinds.
S407, AC deliver to subscriber authentication server RADIUS together with Challenge ID, Challenge, Challenge-Password and user name, RADIUS calculates Challenge-Password with user's original code earlier, if the value of submitting to AC is different, the password that replaces the user again with predefined fixed password " 9999 ", recomputate Challenge-Password, and by compare the authenticated user identity with the AC value of being submitted to;
S408, RADIUS Server judge according to the corresponding user profile of self storage whether the user is legal, respond authentication success/failure message then to AC.If (consultation parameter is carried in success, and user's related service attribute is given subscriber authorisation.)
S409, AC return authentication result and related service attribute are given Portal server;
S410, Portal server send authentication success/failed message to terminal according to authentication result, and the pushing certification results page is if authentication success pushes portal page and gives the user; If authentification failure returns error message and gives user terminal;
S411, AC transmit the propelling movement page of Portal server to user terminal;
S412, Portal server are replied authenticate-acknowledge message to AC, and AC begins charging flow.
The WLAN terminal authentication method that the embodiment of the invention 1 provides makes the user at authentication-exempt in the cycle, the username and password of the submission login that can repeat, thus saved login time greatly, improved the efficient of login.Owing in embodiment 1 when user terminal is current when not being in logging status and requiring access internet, adopted fixed password to carry out authentification of user, so when as long as Portal server has determined that the user is in the authentication-exempt cycle, authentication always can be passed through.Therefore the embodiment of the invention 2 provides a kind of authentification of user login method of more simplifying, and can improve the efficient of network side authentication effectively, has further reduced login time, improves login efficient.
The WLAN terminal authentication method that the embodiment of the invention 2 provides, in full accord with the first login process of embodiment 1 when user terminal is logined for the first time, recording user name in the Cookie that generates, information such as authentication-exempt cycle.Behind user offline, promptly close the authentication interface that Portal pushes after, when asking the access internet resource once more, its handling process comprises step as shown in Figure 5:
After S501, terminal and AP set up physical connection, AC equipment was terminal distribution IP address by the DHCP agreement;
S502, terminal are initiated the HTTP service request of access internet;
S503, AC intercept and capture user's HTTP request, because the user is not through authentication (current terminal is not to be in logging status), so be forced to Portal server; Can carry encryption cookie information in the redirect request this moment; Adopt the safety of HTTPs escape way protection cookie information in transmittance process between Portal server and the user terminal;
Whether carry in S504, the Portal server inspection request and encrypt Cookie, if carrying then, Portal server deciphering Cookie obtains subscriber identity information, the trust identification result no longer initiates the chap authentication flow process, directly the authentication state of informing this user of AC by the REQ_AUTH request;
[IP, username] parameter recognition that S505, AC transmit by Portal goes out this user and has finished authentication, only carries the username parameter in the Access-Request that initiates to portal, request user's related service attribute information;
S506, Radius Server go out this user by parameter recognition and need not to carry out authentication calculations, directly return user's business attribute information.
S507, AC return to Portal server with the customer service attribute information.
S508, Portal server push portal page and give the user.
S509, AC transmit the portal page that Portal server pushes to user terminal;
S510, Portal reply authenticate-acknowledge message to AC, and AC begins charging flow.
In the WLAN terminal authentication login method that the foregoing description 1 and embodiment 2 provide, the login password that in the user log-in authentication information that keeps, does not comprise the user, thereby make and when Radius Server authenticates, can't carry out authentification of user according to the user cipher of preserving in advance, make its fail safe decrease, so in the entire process flow process, the user log-in authentication information (cookie information) of preserving is encryption all the time, and when transmitting user login information, use the HTTPs safe lane between Portal server and the user terminal, thereby guarantee the fail safe of user login information in transmission course.
Yet said method is bigger to the change of the certificate server of network side and Portal server, increased the cost of technology upgrading accordingly, so the embodiment of the invention 3 provides a kind of WLAN terminal authentication method, make and only equipment is carried out simple modification at network side, promptly realize corresponding function, make the user in the cycle, needn't repeat to import username and password and login, and improve login efficient at authentication-exempt.
The WLAN terminal authentication method that the embodiment of the invention 3 provides, flow process and embodiment 1 described flow process basically identical when its user terminal is logined for the first time, difference only is, also will comprise the corresponding password of user name in the cookie information that Portal server generates.And when the user was not in logging status and asks the access internet resource, its flow process comprised step as shown in Figure 6:
S601~S603 is identical with S401~S403 step;
Whether carry the cookie information of encryption in the HTTP request that S604, Portal server inspection user terminal are sent, if the result is for being, then obtain user profile in the Portal server deciphering cookie information, comprise user name and user cipher that the user logins herein, then according to the CHAP flow process, to AC request Challenge;
S605, AC return Challenge and give Portal server, comprise Challenge ID and Challenge;
S606, Portal still use user cipher, Challenge ID and Challenge to do the MD5 algorithm, and the user name that obtains extracting among Challenge-Password and the Cookie is submitted to AC together, initiate authentication.
S607, AC deliver to radius server together with Challenge ID, Challenge, Challenge-Password and user name, the radius server subscriber authentication server uses user cipher, Challenge ID and Challenge to do the MD5 algorithm, obtain Challenge-Password, and by compare the authenticated user identity with the AC value of being submitted to.
The predetermined process mode is handled password and challenge code and challenge code sequence number for utilizing the MD5 algorithm herein, is not limited to this kind mode in the practical operation, also can be the processing method of other kinds.
S608~S612 step is identical with S408~S412 among the embodiment one.
All be to set up the HTTPs escape way between Portal server and the user terminal in the foregoing description 1~3, it sets up flow process, has provided signal and specifically comprise Step1~Step5 in Fig. 6:
Step1, wireless local network user terminal WLAN UE send Client Hello message to Portal server, comprise protocol version, random number, session identifier session_ID, the security algorithm tabulation of self supporting and compression algorithm tabulation;
Step2, Portal server are selected security algorithm and compression algorithm, send Server Hello message to WLAN UE; Portal server sends the certificate (chain) of oneself and gives WLAN UE; Provide shared key to generate data to WLAN UE; Finish the Hello process, wait for that WLAN UE responds;
Step3, WLAN UE produce pre_master_secret at random, and use the PKI of Portal server that it is carried out encryption, transmit encrypted result then and give Portal server;
WLAN UE utilize information calculations master key: master_secret=PRF such as pre_master_secret, random number (pre_master_secret, " master secret ", ClientHello.random+ServerHello.random),
Use master_secret to calculate then: Verify_data=PRF (master_secret, " clientfinished ", MD5 (Message)+SHA-1 (Message2-9) is used for proving that to Portal server it has correct session key master_secret;
The Step4.Portal server is deciphered pre_master_secret with private key; Same method is calculated mastersecret and verify_data, proves that to WLAN UE it has correct session key.
Finish HTTPs (SSL) escape way between Step5.WLAN UE and the Portal server and consult, WLAN UE, carries in the request and encrypts Cookie to the request that Portal initiates access internet by the HTTPs passage.
Accordingly, Portal server when generating Cookie, enciphering/deciphering Cookie mechanism, can but be not limited to and adopt the symmetric key encryption mode to realize.Portal configuration store key K a is used for the encryption and decryption of Cookie.Wherein encrypt the Cookie formal definition and can be but be not limited to following form commonly used:
Eka[username,password,login-time,…]@Realm
The foregoing description has provided three kinds of identifying procedures that situation lower network side apparatus authenticates terminal respectively.The corresponding embodiment of the invention provides the WLAN terminal authentication of realizing above-mentioned identifying procedure system.
The embodiment of the invention 4 provides a kind of system of WLAN terminal authentication, as shown in Figure 7, comprising:
Terminal 41 is used to send the access internet request that comprises user log-in authentication information and arrives network equipment; Described user log-in authentication information is last time logining when successful in terminal of preserving of described terminal, and by network equipment production and send to described terminal, described user log-in authentication information comprises user profile and authentication-exempt cycle;
Network equipment 42, be used for the access internet request that receiving terminal 41 sends, and judge the current authentication-exempt that is in of described terminal in the cycle time according to the authentication-exempt cycle in the described user log-in authentication information, user profile in the described user log-in authentication information that application receives authenticates described terminal, and behind authentication success, send authentication success message to terminal.
The network equipment 42 that the embodiment of the invention 4 provides can also be used for judging the current authentication-exempt that exceeded of described terminal during the cycle according to the authentication-exempt cycle of the described user log-in authentication information that receives, and the pushing certification interface is to terminal; Receive described terminal by the request log-on message that described authentication interface sends, comprise user profile and authentication-exempt cycle in the described request log-on message; And receive described terminal by the request log-on message that described authentication interface sends, comprise user profile and authentication-exempt cycle in the described request log-on message; And the user profile of using in the described request log-on message authenticates described terminal; Behind authentication success, send authentication success message to terminal; And, send to terminal and preserve according to user profile and the new user log-in authentication information of authentication-exempt cycle generation that described request log-on message Shen comprises.
Set up the hypertext transfer protocol secure passage between described terminal 41 in the embodiment of the invention 4 and the described network equipment 42; The described user log-in authentication information that described network equipment 42 generates and the access internet request message of described terminal access the Internet are by described hypertext transfer protocol secure channel transfer.
The embodiment of the invention 5 has provided the concrete structure signal of the network equipment 42 among a kind of embodiment 4, as shown in Figure 8, comprising:
Portal server 51 is used for extracting the user name of user profile, preset password is carried out predetermined process, and result and the described user name that obtains sent to access controller;
Access controller 52, the described result and the described user name that are used for receiving from Portal server 51 send to remote authentication dialing user server;
Remote authentication dialing user server 53, after being used to receive the described result and described user name that access controller 52 sends, determine self store described user name after, described preset password is carried out predetermined process, and the result that obtains and the described result that receives compared, if the two unanimity, then authentication success.
The embodiment of the invention 6 has provided the concrete structure signal of the network equipment 42 among a kind of embodiment 4, as shown in Figure 9, comprising:
Portal server 61 is used for extracting the user name of described user profile, and described user name is sent to access controller;
Access controller 62, the described user name that is used for receiving from Portal server 61 sends to remote authentication dialing user server;
Remote authentication dialing user server 63, be used to receive the described user name that access controller 62 sends after, determine self store described user name after, authentication success then.
The embodiment of the invention 7 has provided the concrete structure signal of the network equipment 42 among a kind of embodiment 4, as shown in figure 10, comprising:
Portal server 71 is used for extracting the username and password of described user profile, and described password is carried out predetermined process, and result and the described user name that obtains sent to access controller;
Access controller 72, the described result and the described user name that are used for receiving from Portal server 71 send to remote authentication dialing user server;
Remote authentication dialing user server 73, after being used to receive the described result and described user name that access controller 72 sends, determine self store described user name after, the password of described user name correspondence to self storage carries out predetermined process, result that generates and the described result that receives are compared, if the two unanimity, then authentication success.
The embodiment of the invention 8 discloses a kind of WLAN terminal accordingly, as shown in figure 11, comprising:
Message pick-up is preserved unit 81, is used for after logining successfully, receives and preserve the user log-in authentication information that network equipment sends;
Request transmitting unit 82, be used for terminal withdraw from land after, when message pick-up is preserved unit 81 and is preserved described user log-in authentication information, send comprise described user log-in authentication information the access internet request to network equipment.
Obviously, those skilled in the art can carry out various changes and modification to the utility model and not break away from spirit and scope of the present utility model.Like this, if of the present utility model these are revised and modification belongs within the scope of the utility model claim and equivalent technologies thereof, then the utility model also is intended to comprise these changes and modification interior.