CN105722086A - Access authentication page locking method, and user terminal - Google Patents
Access authentication page locking method, and user terminal Download PDFInfo
- Publication number
- CN105722086A CN105722086A CN201610185896.4A CN201610185896A CN105722086A CN 105722086 A CN105722086 A CN 105722086A CN 201610185896 A CN201610185896 A CN 201610185896A CN 105722086 A CN105722086 A CN 105722086A
- Authority
- CN
- China
- Prior art keywords
- access authentication
- local browser
- user
- user terminal
- browser
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004519 manufacturing process Methods 0.000 claims description 12
- 238000012790 confirmation Methods 0.000 claims description 5
- 230000009191 jumping Effects 0.000 abstract 1
- 238000012795 verification Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 241001484259 Lacuna Species 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
- G06F16/972—Access to data in other repository systems, e.g. legacy data or dynamic Web page generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides an access authentication page locking method. The method comprises the steps that a user terminal sets local browser access authentication jump, wherein the local browser access authentication jump refers to an operation of jumping out of an access authentication page in a local browser; and when it is determined that logging needs to be cancelled, the user terminal forces a current interface to be switched to the local browser, and locks the access authentication page jumped out of in the local browser. Therefore, after the access authentication page disappears, when the user needs to log off the internet, the user only needs to switch the current page to the local browser, and clicks a local browser access authentication jump indication, so as to jump out of the access authentication page in the local browser, so that the user can log out in time, internet charge spent in searching the access authentication page by the user is saved, and the method is simple and fast.
Description
Technical field
The present invention relates to access authentication page locking technical field, more particularly, to a kind of access authentication page locking method and user terminal.
Background technology
Current wireless covers more and more, uses the mobile terminal devices such as mobile phone also to get more and more.Portal (access) certification is one of popular technique of wireless network access authentication, and when user accesses a certain wireless network, meeting automatic spring Portal (access) certification page, prompting user inputs account information, completes access authentication.
Some mobile terminal existing is when accessing a certain wireless network, and operating system meeting automatic spring Portal certification page, after completing certification, user is switched to other APP (application program), and this certification page just disappears, it is impossible to be again turned on.Although this kind of certification mode improves user's experience, but there is an important familiar lacunas.Such as i Phone accesses wireless network, CaptivePortal (captive portals) function makes at wicket automatic spring Portal certification page, after user completes certification, clicking Home key and be switched to other APP when being continuing with, wicket Portal certification page disappears immediately.When after user access network a period of time, it is desirable to nullify and log in, both stopped charging, but can not find Portal page during certification originally.
Solve wireless Portal certification at present and mainly have three kinds of implementations:
Scheme one, by Portal certification success page point out user keep this Portal certification page in system background, do not close this page, in order to avoid function of actively logging off cannot be completed.When user needs " cancellation " to log in, search and be switched to original Portal certification page, complete to log off after clicking " cancellation " button.
Scheme two, by arranging the wireless terminal browser behavior of user, locking browser homepage is Portal certification page, when namely user opens blank page by browser every time, first jumps to Portal certification page.As long as now user opens a blank page, so that it may automatic jump to Portal certification page, then complete to log off after clicking " cancellation " button.
Scheme three, Portal certification page is added in the collection of wireless terminal browser, when user needs to log off, open browser, click the Portal authentication url address in collection, jump to Portal certification page, then complete to log off after clicking " cancellation " button.
Three of the above implementation has its shortcoming, when user uses, it is easy to producing dislike, experience is very poor.
Implementation one user's possible operation is slipped up, it is easy to close Portal certification page, thus causing disabler.User toggles the some pages in lookup backstage on the other hand, and efficiency is very low, and Consumer's Experience is very poor, and especially when the page that user opens is a lot, this function is almost without value.
Actually principle is similar with three for implementation two, but no matter is any situation, is required for user and coordinates to arrange and revise the behavior of browser, and Consumer's Experience is very poor.On the other hand, some terminal unit does not support that this type of is arranged, or some fail-safe softwares APP (application program) refuse this generic operation, and needs manager just can complete the configuration of browser, thus causing disabler.
Summary of the invention
In view of this, the present invention proposes a kind of access authentication page locking method, and described method includes:
User terminal arranges local browser access authentication and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;
When confirming to need to nullify online, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser.
Further, described user terminal arranges local browser access authentication and redirects, and specifically includes:
The described local network address of browser is bound together with the network address of the described access authentication page;
And after arranging and opening described local browser, and when the instruction that the described local browser access authentication receiving user's input redirects, jump to the described access authentication page.
Further, after the described access authentication page redirected out in the described local browser of locking, described method also includes: whether successfully described user terminal sends to described access server and be used for confirming access authentication user account information.
Further, after receiving the described subscriber terminal access authentication success message that described access server sends, described method also includes: the message that user actively rolled off the production line is sent to described access server, in order to described access server stops the charging of described user.
Further, current interface is forced to be switched to described local browser by described user terminal, specifically includes:
After described user terminal receives the instruction of the changing interface of user's input, force current interface to be switched to described local browser.
The present invention also proposes a kind of user terminal, and described user terminal includes:
Module is set, being used for, local browser access authentication is set and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;
Confirm module, be used for being confirmed whether to need to nullify online;
Force handover module, when described confirmation module confirms to need to nullify online, for current interface forces to be switched to described local browser, and lock the described access authentication page redirected out in described local browser.
Further, the described module that arranges includes:
Binding submodule, for binding together the described local network address of browser with the network address of the described access authentication page;
Setting redirects submodule, after opening described local browser for setting, and when the instruction that the described local browser access authentication receiving user's input redirects, jumps to the described access authentication page.
Further, described user terminal also includes:
Whether successfully first sending module, after being used for the described access authentication page redirected out in the described local browser of locking, send to described access server and be used for confirming access authentication user account information.
Further, described user terminal also includes:
Second sending module, for after receiving the described subscriber terminal access authentication success message that described access server sends, the message that user actively rolled off the production line is sent to described access server, in order to described access server stops the charging of described user.
Further, described pressure handover module includes:
Receive submodule, for receiving the instruction of the changing interface of user's input;
Force switching submodule, be used for after described reception submodule receives the instruction of changing interface of user's input, force current interface to be switched to described local browser.
The present invention arranges local browser access authentication by user terminal and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;When confirming to nullify online, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser.
So, after the access authentication page disappears, when user needs to nullify online, have only to current page is switched to local browser, and click local browser access authentication and redirect instruction, the access authentication page can be redirected out, in order to user nullifies in time, the expenses of surfing in Internet that saving user searches the access authentication page and wastes in local browser;And this implementation is simple and efficient.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of embodiment of access authentication page locking method of the present invention;
Fig. 2 is the flow chart of a kind of embodiment arranging local browser access authentication jump method in access authentication page locking method of the present invention;
Fig. 3 is the flow chart of the another kind of embodiment of access authentication page locking method of the present invention;
Fig. 4 is the flow chart of the another kind of embodiment of access authentication page locking method of the present invention;
Fig. 5 is the flow chart that current interface forces in access authentication page locking method of the present invention to be switched to a kind of embodiment of local browser;
Fig. 6 is the structure chart of a kind of embodiment of user terminal of the present invention;
Fig. 7 is the structure chart of a kind of embodiment arranging module in user terminal of the present invention;
Fig. 8 is the structure chart of the another kind of embodiment of user terminal of the present invention;
Fig. 9 is the structure chart of the another kind of embodiment of user terminal of the present invention;
Figure 10 is the structure chart of a kind of embodiment forcing handover module in user terminal of the present invention;
Figure 11 is the structure chart of the user terminal of the present invention a kind of embodiment in system is applied.
Detailed description of the invention
Technical solution of the present invention is: user terminal arranges local browser access authentication and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;When confirming to need to nullify online, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser.
For making the object, technical solutions and advantages of the present invention clearly understand, by the following examples also with reference to accompanying drawing, the present invention is described in more detail.
Fig. 1 is the flow chart of a kind of embodiment of access authentication page locking method of the present invention, and idiographic flow is as follows:
Step S101, user terminal arranges local browser access authentication and redirects;
Specifically, described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser.
Step S102, confirms to need to nullify online;
Specifically, when user clicks " cancellation " button at the access authentication page, then user terminal is it is confirmed that need to nullify online.
Step S103, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser.
Specifically, when current interface is forced to be switched to local browser by user terminal, click " local browser access authentication " button local browser interface user, then redirect out the access authentication page at local browser interface.
Wherein, step S101 user terminal arranges local browser access authentication jump method as in figure 2 it is shown, specifically comprise the following steps that
Step S201, binds together the described local network address of browser with the network address of the described access authentication page;
Specifically, it is possible to by binding the mode of script, the described local network address of browser is bound together with the network address of the described access authentication page.
Step S202, is arranged after opening described local browser, and when the instruction that the described local browser access authentication receiving user's input redirects, jumps to the described access authentication page.
Specifically, at local browser interface, when user clicks " local browser access authentication " button, then user terminal is received by the instruction that the local browser access authentication of user's input redirects.
Fig. 3 is the flow chart of the another kind of embodiment of access authentication page locking method of the present invention, it is, the further process after the access authentication page redirected out in the local browser of locking in the step S103 of Fig. 1, specifically comprises the following steps that
Step S301, user terminal arranges local browser access authentication and redirects;
Specifically, step S301 is with step S101.
Step S302, confirms to need to nullify online;
Specifically, step S302 is with step S102.
Step S303, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser;
Specifically, step S303 is with step S103.
Step S304, whether successfully described user terminal sends to described access server and is used for confirming access authentication user account information.
Specifically, user account information can be username and password.After opening the access authentication page, user terminal the access authentication page input username and password, to access server initiate access authentication request, access server examination & verification username and password, audit by time, represent access authentication success;Otherwise, access authentication failure is represented;
After examination & verification, the online duration of auditing result and user terminal is sent to user terminal by access server;Access result for examination & verification by time, then by user terminal displays remind allow user's logging in network;Pass through for not auditing accessing result, then point out user to re-enter user name and/or password by user terminal.
User needs exist for it is emphasized that when after user terminal logging in network, can switch other APP (application program) and continue online.Only when user wishes to nullify online, just can seek local browser access authentication, specifically in Fig. 1 shown in step S102 and step S103.
Fig. 4 is the flow chart of the another kind of embodiment of access authentication page locking method of the present invention, namely, the further process after receiving the described subscriber terminal access authentication success message that described access server sends of the step S304 in figure 3, idiographic flow is as follows:
Step S401, user terminal arranges local browser access authentication and redirects;
Specifically, step S101 is with step S301.
Step S402, confirms to need to nullify online;
Specifically, step S402 is with step S302.
Step S403, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser;
Specifically, step S403 is with step S303.
Step S404, whether successfully described user terminal sends to described access server and is used for confirming access authentication user account information;
Specifically, step S404 is with step S304;
Step S405, the message that user actively rolled off the production line is sent to described access server, in order to described access server stops the charging of described user.
Specifically, when user clicks " cancellation " at the access authentication page, user terminal is received by user to be needed to nullify online, then the message that user actively rolled off the production line is sent to access server, actively roll off the production line after message when access server receives described user, can stop immediately this user's charging.
Fig. 5 is the flow chart that current interface forces in access authentication page locking method of the present invention to be switched to a kind of embodiment of local browser, and idiographic flow is as follows:
Step S501, described user terminal receives the instruction of the changing interface of user's input;
Specifically, it is possible to automatically add local browser button on the lower task hurdle of user interface, when user needs to carry out local browser access authentication, it is only necessary to click this button, mean that user have input the instruction of changing interface.
Step S502, forces current interface to be switched to described local browser.
Specifically, after user have input the instruction of changing interface, current interface is just forced to be switched to local browser by user terminal.
Fig. 6 is the structure chart of a kind of embodiment of user terminal of the present invention, and user terminal 600 includes arranging module 601, confirming module 602 and force handover module 603,
Module 601 is set, being used for, local browser access authentication is set and redirects;
Specifically, described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser.
Confirm module 602, be used for being confirmed whether to need to nullify online;
Specifically, when user clicks " cancellation " button at the access authentication page, then user terminal is it is confirmed that need to nullify online.
Force handover module 603, when described confirmation module confirms to need to nullify online, for current interface forces to be switched to described local browser, and lock the described access authentication page redirected out in described local browser.
Specifically, when current interface is forced to be switched to local browser by user terminal, click " local browser access authentication " button local browser interface user, then redirect out the access authentication page at local browser interface.
Fig. 7 is the structure chart of a kind of embodiment arranging module in user terminal of the present invention, arrange module 601 include binding submodule 6011 and setting redirect submodule 6012,
Binding submodule 6011, for binding together the described local network address of browser with the network address of the described access authentication page;
Specifically, it is possible to by binding the mode of script, the described local network address of browser is bound together with the network address of the described access authentication page.
Setting redirects submodule 6012, after opening described local browser for setting, and when the instruction that the described local browser access authentication receiving user's input redirects, jumps to the described access authentication page.
Specifically, at local browser interface, when user clicks " local browser access authentication " button, then user terminal is received by the instruction that the local browser access authentication of user's input redirects.
Fig. 8 is the structure chart of the another kind of embodiment of user terminal of the present invention, user terminal 600 includes arranging module 601, confirms module 602, forces handover module 603 and the first sending module 604, is provided with module 601, confirms module 602 and forces handover module 603 concrete as shown in Figure 6;
Whether successfully first sending module 604, after being used for the described access authentication page redirected out in the described local browser of locking, send to described access server and be used for confirming access authentication user account information.
Specifically, user account information can be username and password.After opening the access authentication page, user terminal the access authentication page input username and password, to access server initiate access authentication request, access server examination & verification username and password, audit by time, represent access authentication success;Otherwise, access authentication failure is represented;
After examination & verification, the online duration of auditing result and user terminal is sent to user terminal by access server;Access result for examination & verification by time, then by user terminal displays remind allow user's logging in network;Pass through for not auditing accessing result, then point out user to re-enter user name and/or password by user terminal.
Fig. 9 is the structure chart of the another kind of embodiment of user terminal of the present invention, user terminal 600 includes arranging module 601, confirms module 602, forces handover module the 603, first sending module 604 and the second sending module 605, is provided with module 601, confirms module 602, forces handover module 603 and the first sending module 604 concrete as shown in Figure 8;
Second sending module 605, for after receiving the described subscriber terminal access authentication success message that described access server sends, the message that user actively rolled off the production line is sent to described access server, in order to described access server stops the charging of described user.
Specifically, when user clicks " cancellation " at the access authentication page, user terminal is received by user to be needed to nullify online, then the message that user actively rolled off the production line is sent to access server, actively roll off the production line after message when access server receives described user, can stop immediately this user's charging.
Wherein, the concrete structure of the pressure handover module 603 in Fig. 6 as shown in Figure 10, forces handover module 603 to include receiving submodule 6031 and forcing switching submodule 6032,
Receive submodule 6031, for receiving the instruction of the changing interface of user's input;
Specifically, specifically, it is possible to automatically add local browser button on the lower task hurdle of user interface, when user needs to carry out local browser access authentication, it is only necessary to click this button, mean that user have input the instruction of changing interface.
Force switching submodule 6032, be used for after described reception submodule receives the instruction of changing interface of user's input, force current interface to be switched to described local browser.
Specifically, after user have input the instruction of changing interface, current interface is just forced to be switched to local browser by user terminal.
Figure 11 is the structure chart of the user terminal of the present invention a kind of embodiment in system is applied, and access authentication page locking system 1100 includes user terminal 600, WAP 1101 and access server 1102,
User terminal 600, is used for arranging local browser access authentication and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;It is additionally operable to be confirmed whether to need to nullify online;And for when confirming to need to nullify online, current interface forcing to be switched to described local browser, and locks the described access authentication page redirected out in described local browser.
Whether successfully user terminal 600, after being additionally operable to the described access authentication page redirected out in the described local browser of locking, send to access server 1102 and be used for confirming access authentication user account information.
User terminal 600, is additionally operable to after receiving the access authentication success message that access server 1102 sends, and the message that user actively rolled off the production line is sent to access server 1102, in order to access server 1102 stops user's charging.
User terminal 600, at WAP 1101 before misfortune obtains access authentication request, it is additionally operable to some SSID (service set) of association WAP 1101, one WLAN is divided into several sub-network (each subnet has a SSID) needing different identity to verify, each sub-network is required for independent authentication, only just can enter corresponding sub-network by the user of authentication, it is prevented that unauthorized user enters present networks.
User terminal 600, it is possible to for being capable of any type terminals of above-mentioned functions, for instance, for Fructus Mali pumilae terminal, in realizing process, the confirmation method of Fructus Mali pumilae terminal: WAP 1101 misfortune obtains the access authentication request of user terminal 600;And resolve the user agent's field in the request of described access authentication;Judge whether described user agent's field comprises " Safari " character string, if it is, confirm that user terminal is Fructus Mali pumilae terminal 600.Other types terminal can also be identified by the confirmation method of Fructus Mali pumilae terminal, and can be realized by the identification string that access server 1102 Remote configuration is different.
Wherein, described access authentication is asked, and refers to that described user terminal 600 passes through to send for confirming whether access authentication successfully asks to access server 1102 at the described access authentication page.
Access server 1102, access authentication for receiving user terminal 600 is asked, and confirm that whether access authentication is successful according to the request of described access authentication, when confirming access authentication success, send access authentication success message to WAP 1101, and access authority is handed down to WAP 1102.
Access server 1102, is additionally operable to, when receiving the information that user terminal 600 actively rolls off the production line, stop charging, and send disassociation message to WAP 1101.
WAP 1101, after receiving the disassociation message that access server 1102 sends, removes user terminal 600, releases the wireless association of described user terminal.Here it is possible to released by IEEE802.11 agreement.
Additionally, WAP 1101, it is additionally operable to rob the access authentication request (first HTTPRequest online request) obtaining user terminal 600, and the request of described access authentication is redirected to the network address of the described access authentication page, and the network address of the described access authentication page is sent to user terminal 600, in order to user terminal 600 opens the described access authentication page according to the network address of the described access authentication page;After being additionally operable to the access authentication success message that reception access server 1102 sends, it is determined that the network address of the described access authentication page is the network address of the successful access authentication page of access authentication.
Wherein, redirect (Redirect) be through various method various network requests again fixed direction are forwarded to other position (as: webpage redirections, the redirection of domain name, Route Selection change be also that data message is redirected via a kind of of path).
It addition, WAP 1101, it is additionally operable to after receiving the access authentication success message that access server 1102 sends, the access authority of authorized user's terminal 600.
Wherein, access authority, specifically refer to user terminal 600 and have access to a certain subnet SSID (service set) of WAP 1101 and the online duration etc. of user terminal 600.
Should be appreciated that the functional module of the user terminal 600 that the present embodiment provides can be the functional module of software module or software and hardware combining, it can be performed by processor and realize function as above.Further, user terminal 600 can also have other functional modules and realize redirecting out each concrete steps of the access authentication page in local browser, specifically can consult the corresponding description of above method embodiment.
Additionally, person of ordinary skill in the field is understood that all or part of step realizing said method embodiment can be completed by the hardware that programmed instruction is relevant, aforesaid program can be stored in computer read/write memory medium, and the processor within communication performs, aforesaid program processor when executed can perform to include all or part of step of said method embodiment.Wherein, described processor can be implemented as one or more processor chips, or can be a part of one or more special IC (ApplicationSpecificIntegratedCircuit, ASIC);And aforesaid storage medium can include but not limited to following kind of storage medium: flash memory (FlashMemory), memorizer (Read-OnlyMemory, ROM), the various media that can store program code such as random access memory (RandomAccessMemory, RAM), portable hard drive, magnetic disc or CD.
Last it is noted that above example is only in order to illustrate the technical scheme of the application, it is not intended to limit;Although with reference to previous embodiment to present application has been detailed description, it will be understood by those within the art that: the technical scheme described in foregoing embodiments still can be modified by it, or wherein portion of techniques feature is carried out equivalent replacement;And these amendments or replacement, do not make the essence of appropriate technical solution depart from the scope of each embodiment technical scheme of the application.
Claims (10)
1. an access authentication page locking method, it is characterised in that described method includes:
User terminal arranges local browser access authentication and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;
When confirming to need to nullify online, current interface is forced to be switched to described local browser by described user terminal, and locks the described access authentication page redirected out in described local browser.
2. the method for claim 1, it is characterised in that
Described user terminal arranges local browser access authentication and redirects, and specifically includes:
The described local network address of browser is bound together with the network address of the described access authentication page;
After described local browser is opened in setting, and when the instruction that the described local browser access authentication receiving user's input redirects, jump to the described access authentication page.
3. the method for claim 1, it is characterized in that, after the described access authentication page redirected out in the described local browser of locking, described method also includes: whether successfully described user terminal sends to described access server and be used for confirming access authentication user account information.
4. method as claimed in claim 3, it is characterized in that, after receiving the described subscriber terminal access authentication success message that described access server sends, described method also includes: the message that user actively rolled off the production line is sent to described access server, in order to described access server stops the charging of described user.
5. the method for claim 1, it is characterised in that current interface is forced to be switched to described local browser by described user terminal, specifically includes:
After described user terminal receives the instruction of the changing interface of user's input, force current interface to be switched to described local browser.
6. a user terminal, it is characterised in that described user terminal includes:
Module is set, being used for, local browser access authentication is set and redirects;Described local browser access authentication redirects and refers to: redirect out the access authentication page in described local browser;
Confirm module, be used for being confirmed whether to need to nullify online;
Force handover module, when described confirmation module confirms to need to nullify online, for current interface forces to be switched to described local browser, and lock the described access authentication page redirected out in described local browser.
7. user terminal as claimed in claim 6, it is characterised in that the described module that arranges includes:
Binding submodule, for binding together the described local network address of browser with the network address of the described access authentication page;
Setting redirects submodule, after opening described local browser for setting, and when the instruction that the described local browser access authentication receiving user's input redirects, jumps to the described access authentication page.
8. user terminal as claimed in claim 6, it is characterised in that described user terminal also includes:
Whether successfully first sending module, after being used for the described access authentication page redirected out in the described local browser of locking, send to described access server and be used for confirming access authentication user account information.
9. user terminal as claimed in claim 8, it is characterised in that described user terminal also includes:
Second sending module, for after receiving the described subscriber terminal access authentication success message that described access server sends, the message that user actively rolled off the production line is sent to described access server, in order to described access server stops the charging of described user.
10. user terminal as claimed in claim 6, it is characterised in that described pressure handover module includes:
Receive submodule, for receiving the instruction of the changing interface of user's input;
Force switching submodule, be used for after described reception submodule receives the instruction of changing interface of user's input, force current interface to be switched to described local browser.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610185896.4A CN105722086A (en) | 2016-03-29 | 2016-03-29 | Access authentication page locking method, and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610185896.4A CN105722086A (en) | 2016-03-29 | 2016-03-29 | Access authentication page locking method, and user terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105722086A true CN105722086A (en) | 2016-06-29 |
Family
ID=56158325
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610185896.4A Pending CN105722086A (en) | 2016-03-29 | 2016-03-29 | Access authentication page locking method, and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105722086A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259187A (en) * | 2016-12-28 | 2018-07-06 | 腾讯科技(深圳)有限公司 | The monitoring method and device of charging network |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1501636A (en) * | 2002-11-19 | 2004-06-02 | 华为技术有限公司 | A method for detecting whether or not WEB authentication user is on line |
CN101882162A (en) * | 2010-06-29 | 2010-11-10 | 北京搜狗科技发展有限公司 | Method and system for transmitting network information |
CN103634304A (en) * | 2013-11-18 | 2014-03-12 | 四川长虹电器股份有限公司 | Method for realizing quick WEB authentication on smart television |
US20140344890A1 (en) * | 2013-05-16 | 2014-11-20 | Guest Tek Interactive Entertainment Ltd. | Dns-based captive portal with integrated transparent proxy to protect against user device caching incorrect ip address |
-
2016
- 2016-03-29 CN CN201610185896.4A patent/CN105722086A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1501636A (en) * | 2002-11-19 | 2004-06-02 | 华为技术有限公司 | A method for detecting whether or not WEB authentication user is on line |
CN101882162A (en) * | 2010-06-29 | 2010-11-10 | 北京搜狗科技发展有限公司 | Method and system for transmitting network information |
US20140344890A1 (en) * | 2013-05-16 | 2014-11-20 | Guest Tek Interactive Entertainment Ltd. | Dns-based captive portal with integrated transparent proxy to protect against user device caching incorrect ip address |
CN103634304A (en) * | 2013-11-18 | 2014-03-12 | 四川长虹电器股份有限公司 | Method for realizing quick WEB authentication on smart television |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108259187A (en) * | 2016-12-28 | 2018-07-06 | 腾讯科技(深圳)有限公司 | The monitoring method and device of charging network |
CN108259187B (en) * | 2016-12-28 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Method and device for monitoring charging network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5081818B2 (en) | Multi-mode mobile device that automatically selects the radio access network interface during a service session | |
CN102204307B (en) | WLAN authentication method based on MAC address and device thereof | |
JP6515207B2 (en) | Internet access authentication method and client, and computer storage medium | |
CN110300117A (en) | Authentication method, equipment and the medium of IOT equipment and user's binding | |
CN102457514B (en) | Mobile terminal-oriented short message authentication method of wireless network | |
US10779201B1 (en) | Mobile phone authentication in WiFi coverage | |
CN101702837A (en) | Message book sharing method and device | |
US9420459B2 (en) | Method and system for redirecting a request for IP session from a mobile device | |
CN103746812A (en) | Access authentication method and system | |
CN105868351B (en) | Access authentication page skipping method based on browser and user terminal | |
CN101860534A (en) | Method and system for switching network, access equipment and authentication server | |
CN104320781A (en) | Verifying method and system for mobile terminal | |
CN105657710A (en) | Wireless network authentication method and system | |
CN106789937A (en) | Application authentication method and its system in captive portals environment, wireless aps | |
CN110830516B (en) | Network access method, device, network control equipment and storage medium | |
CN106304033A (en) | A kind of cellphone information defence method based on binding machine and card and system | |
CN105991680A (en) | Internet of things smart device software automatic upgrading method and system | |
CN110856145B (en) | IOT (Internet of things) equipment and user binding method, equipment and medium based on near field authentication | |
CN104348895A (en) | Method and device for sharing data among programs in mobile terminal | |
CN101867912A (en) | Authentication method of access network and terminal | |
EP2037712A2 (en) | Method, apparatus and system for obtaining MIH (Media Independent Handover) service information | |
CN105873053A (en) | Method and system for embedding webpage on access authentication page, and wireless access point | |
CN105635148B (en) | Portal authentication method and device | |
CN102448063A (en) | Method and equipment for determining reason of authentication failure | |
CN115022857A (en) | Terminal system supporting rapid distribution network and setting NFC label function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160629 |
|
WD01 | Invention patent application deemed withdrawn after publication |