CN109451503A - A kind of offline user authentication state maintaining method and system - Google Patents

A kind of offline user authentication state maintaining method and system Download PDF

Info

Publication number
CN109451503A
CN109451503A CN201811632394.7A CN201811632394A CN109451503A CN 109451503 A CN109451503 A CN 109451503A CN 201811632394 A CN201811632394 A CN 201811632394A CN 109451503 A CN109451503 A CN 109451503A
Authority
CN
China
Prior art keywords
authentication
wireless terminal
equipment
information
list item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811632394.7A
Other languages
Chinese (zh)
Inventor
李昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU SKSPRUCE TECHNOLOGY Inc
Original Assignee
CHENGDU SKSPRUCE TECHNOLOGY Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU SKSPRUCE TECHNOLOGY Inc filed Critical CHENGDU SKSPRUCE TECHNOLOGY Inc
Priority to CN201811632394.7A priority Critical patent/CN109451503A/en
Publication of CN109451503A publication Critical patent/CN109451503A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a kind of offline user authentication state maintaining method and system, the method in practical applications, first pass through the unifying identifier information that AC equipment obtains wireless terminal to be certified, and authentication-exempt list item is searched in AC equipment;If finding unified identification information in authentication-exempt list item, extracting corresponding authentication information;And post-auth is set by the authentication state of wireless terminal, so that wireless terminal is connected internet.Method provided by the present application removes read-write database without radius server, mitigates the burden of radius server in the of short duration offline wlan network of access again of user.And authentication-exempt function is only implemented in AC equipment, configuration is all supported without AC equipment and radius server, increase database server without additional, furthermore, authentication state maintenance process does not increase message interaction in network, network load can be mitigated, improve the authentication efficiency of maintaining method.

Description

A kind of offline user authentication state maintaining method and system
Technical field
This application involves WLAN authentication techniques field more particularly to a kind of offline user authentication state maintaining method and it is System.
Background technique
Wireless terminal is using internet by WLAN (Wireless Local Area Networks, WLAN) When, the certificate server in WLAN can provide authentication service for wireless terminal.The wireless terminal of user has in AC equipment Two kinds of authentication states of pre-auth (before certification) and post-auth (after certification).Generally, wlan network is accessed for the first time in user When, wireless terminal is in pre-auth state, to be certified that post-auth is changed to after.It is used after being changed to post-auth The family accessible internet of.In practical application, after wireless terminal authenticates successfully, list item is usually created in AC equipment, used With authentication storage state.But after in user, offline and corresponding list item is also deleted, the corresponding authentication state of user is then lost. If user accesses WLAN again, need to be authenticated again.Therefore, frequent verification process can make troubles to user, shadow Ring user experience.
In order to enable not needing to be authenticated again to promote user experience, existing skill when user accesses WLAN again In art, the information of wireless terminal can be recorded in (Remote in Radius server after wireless terminal authenticates pass through for the first time Authentication Dial In User Service, remote customer dialing authentication system).It is accessed again in wireless terminal When, it directly uses corresponding information as account number cipher, is authenticated to Radius server, and pass through rear User Status in certification Directly become post-auth.Therefore, when user accesses again, entire verification process, not will pop up portal certification page to Wireless terminal allows user to input account number cipher, and verification process user will not perceive, to promote user experience.
But the authentication mode of above-mentioned offline user is in practical applications, and user needs when accessing wlan network for the first time It just will do it normal Portal certification after unaware authentification failure.Cause the Portal page to authenticate than normal Portal to flow Journey has delay.And above-mentioned authentication mode needs radius server to support that database is written the information of wireless terminal into, and From database from lookup.Also, due to for radius server, MAC Address is as the certification request of account number cipher and common The certification request of account number cipher is not different, therefore Radius server often receives an authentication request packet and requires Correspondence database is inquired, the burden of radius server is increased.In addition, if deploying multiple RADIUS in current WLAN environment Server is completed if the certification for the first time of the same wireless terminal in radius server 1, and online in RADIUS clothes again Business device 2 is completed, then needs to repeat to authenticate or individually dispose a database server and read and write for all radius servers.Cause This, traditional maintaining method will increase the burden of radius server, cause authenticate and safeguard inefficiency the problem of.
Summary of the invention
This application provides a kind of offline user authentication state maintaining method and systems, to solve conventional authentication state-maintenance The problem of method validation low efficiency.
In a first aspect, the application provides a kind of offline user authentication state maintaining method, comprising:
AC equipment obtains the unifying identifier information of wireless terminal to be certified;
According to the unifying identifier information, authentication-exempt list item is searched in the AC equipment;
If finding the corresponding unified identification information of the wireless terminal in the authentication-exempt list item, described in extraction The corresponding authentication information of wireless terminal;
According to the authentication information, the authentication state that the wireless terminal is arranged is post-auth.
Optionally, described after the step of searching authentication-exempt list item in the AC equipment according to the unifying identifier information Method further include:
If the corresponding unified identification information of the wireless terminal is not found, to certification in the authentication-exempt list item Server initiates certification;
Receive the authentication result message that the certificate server returns;
If it is rope using the corresponding unifying identifier information of the wireless terminal successfully that the authentication result message received, which is, Draw, authentication-exempt list item is created in AC equipment.
Optionally, the configuration attribute information issued in the authentication-exempt list item including the certificate server, the method Further include:
The corresponding configuration attribute information of the wireless terminal is obtained from the certificate server;
It is index with the unifying identifier information, the configuration attribute information is stored in the authentication-exempt list item.
Optionally, described after the step of searching authentication-exempt list item in the AC equipment according to the unifying identifier information Method further include:
If not finding the corresponding unified identification information of the wireless terminal, certification clothes in the authentication-exempt list item Business device sends certification page to the wireless terminal;
After the wireless terminal submits authentication information from certification page, the authentication information of submission is verified;
After the authentication information of submission is verified, Xiang Suoshu AC equipment returned content is successful authentication result message.
Optionally, after the authentication information of submission is verified, the method also includes:
The certificate server issues configuration attribute information to the AC equipment;So that the AC equipment, according to the system One identification information is index, by the configuration attribute information preservation in the authentication-exempt list item.
Optionally, the unifying identifier information is the MAC Address of the wireless terminal.
Optionally, the step of state that the wireless terminal is arranged is post-auth, further includes:
The authentication state of the wireless terminal is saved by terminal table entries;
The authentication information saved in the authentication-exempt list item is copied to the terminal table entries.
Optionally, the method also includes:
The presence of the wireless terminal as described in AC device real-time monitoring;
When the wireless terminal is offline, the offline duration is recorded;
After the offline duration of record reaches default ageing time, the terminal table entries are deleted.
On the other hand, the application also provides a kind of offline user authentication state maintenance system, comprising: wireless terminal, AC are set Standby, AP equipment and certificate server, wherein formed between the AC equipment, AP equipment and certificate server by networking The wlan network of internet is connected, the wireless terminal connects the AC equipment by the AP equipment;
The wireless terminal includes or is labeled with unifying identifier information, and the wireless terminal is for showing authentication page Face, and user's interaction is provided, the wireless terminal triggers the certificate server to described after connecting the wlan network Wireless terminal is authenticated;
The AC equipment is further configured to execute following procedure step:
Obtain the unifying identifier information of wireless terminal to be certified;
According to the unifying identifier information, authentication-exempt list item is searched in the AC equipment;
If finding the corresponding unified identification information of the wireless terminal in the authentication-exempt list item, described in extraction The corresponding authentication information of wireless terminal;
According to the authentication information, the authentication state that the wireless terminal is arranged is post-auth.
Optionally, the AC equipment is further configured to execute following procedure step:
If the corresponding unified identification information of the wireless terminal is not found, to certification in the authentication-exempt list item Server initiates certification;
Receive the authentication result message that the certificate server returns;
If it is rope using the corresponding unifying identifier information of the wireless terminal successfully that the authentication result message received, which is, Draw, authentication-exempt list item is created in AC equipment;
The certificate server is further configured to execute following procedure step:
If not finding the corresponding unified identification information of the wireless terminal, certification clothes in the authentication-exempt list item Business device sends certification page to the wireless terminal;
After the wireless terminal submits authentication information from certification page, the authentication information of submission is verified;
After the authentication information of submission is verified, Xiang Suoshu AC equipment returned content is successful authentication result message.
From the above technical scheme, the application provides a kind of offline user authentication state maintaining method and system, described Method in practical applications, first passes through the unifying identifier information that AC equipment obtains wireless terminal to be certified, and in AC equipment Search authentication-exempt list item;If finding unified identification information in authentication-exempt list item, extracting corresponding authentication information;And Post-auth is set by the authentication state of wireless terminal, wireless terminal is made to connect internet.
Method provided by the present application goes to read in the of short duration offline wlan network of access again of user without radius server Database is write, the burden of radius server is mitigated.And authentication-exempt function is only implemented in AC equipment, without AC equipment and Radius server is all supported configuration, increases database server without additional, in addition, authentication state maintenance process does not have Have and increase message interaction in network, network load can be mitigated, improve the authentication efficiency of maintaining method.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, letter will be made to attached drawing needed in the embodiment below Singly introduce, it should be apparent that, for those of ordinary skills, without creative efforts, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is a kind of flow diagram of offline user authentication state maintaining method of the application;
Fig. 2 is maintenance process schematic diagram of the application when wireless terminal accesses wlan network for the first time;
Fig. 3 is the flow diagram of the application storage configuration attribute information in authentication-exempt list item;
Fig. 4 is the application certificate server to the flow diagram that access WLAN wireless terminal is authenticated for the first time;
Fig. 5 is the flow diagram that the application deletes terminal table entries;
A kind of structural schematic diagram of offline user authentication state maintenance system of Fig. 6 the application.
Specific embodiment
Embodiment will be illustrated in detail below, the example is illustrated in the accompanying drawings.In the following description when referring to the accompanying drawings, Unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Implement described in following embodiment Mode does not represent all embodiments consistent with the application.It is only and be described in detail in claims, the application The example of the consistent system and method for some aspects.
In technical solution provided by the present application, the wireless terminal (Station, STA) refers to the online that user uses Equipment, wireless terminal is supported to connect internet by WLAN mode, and has corresponding calculation function and data-handling capacity, Such as mobile phone, personal computer, wireless network card, tablet computer etc..In technical solution provided by the present application, unless otherwise stated, The user being previously mentioned also refers to the wireless terminal.For wireless terminal, in verification process, including before certification (pre-auth) With (post-auth) two states after certification.In general, wireless terminal when just accessing wlan network, is in pre-auth shape State, and after the certification for passing through certificate server, it is in post-auth state.Obviously, when wireless terminal is in post-auth shape When state, can normal use wlan network surf the Internet.
The AP equipment (Access Point, wireless access point) can form wlan network together with AC equipment, In, AC equipment can be connected as wireless controller into multiple AP equipment simultaneously, and the upper layer network as AP equipment is to access AP equipment carry out control management.In practical applications, AP equipment is arranged in specific application scenarios, can cover different Area of space so that the wireless terminal in coverage area is able to detect that the wireless network signal of AP equipment, and passes through AP equipment It is online to arrive wlan network.According to different network sizes, in practical applications, it may include multiple AP equipment and multiple AC set It is standby.
The certificate server, including Portal server and radius server.Wherein, Portal server (portal server) is a kind of web server, therefore http protocol interaction can be carried out with wireless terminal, pushing certification page, Certification information needed such as user name password etc. is obtained from certification page.The radius server (RADIUS Server) is used In the message identifying that reception AC equipment is sent;Authentication verification information and return authentication result give AC equipment.It is right in practical application In large-scale wlan network, wherein may include multiple certificate servers, multiple certificate servers are respectively the net of its subordinate Road provides authentication service.
It is a kind of flow diagram of offline user authentication state maintaining method of the application referring to Fig. 1.As shown in Figure 1, originally The offline user authentication state maintaining method provided is provided, comprising:
S11:AC equipment obtains the unifying identifier information of wireless terminal to be certified.
In technical solution provided by the present application, the unifying identifier information is the mark for referring to the unique identification wireless terminal Know information, such as MAC Address (Media Access Control Address, the media access control of the wireless terminal Location).In practical application, due to wireless terminal MAC Address can the unique identification wireless terminal, can be in wireless terminal After certification passes through for the first time, the MAC Address of wireless terminal is recorded in Radius server.Then it is accessed again in wireless terminal When, it directly uses the MAC Address of wireless terminal as account number cipher, carries out RADIUS authentication in Radius server, certification passes through User Status directly becomes post-auth afterwards.When user accesses again in this way, entire verification process user is not perceived, Bu Huizai It plays Portal certification page and allows user to input account number cipher to STA, to promote user experience.
But due to only Radius server record wireless terminal MAC Address exist occupy Radius server write-in and The problem of controlling calculation resources, therefore in technical solution provided by the present application, the AC equipment is also to the MAC of wireless terminal Location extracts, and the authentication-exempt table for recording Wireless terminal-MAC address and authentication information is additionally created in AC equipment , to implement corresponding lookup from AC equipment.Therefore, for step S11, the wireless terminal of user is in access wlan network Afterwards, it needs to trigger corresponding authentication function, and determines whether wireless terminal to be certified is to access for the first time for the ease of AC equipment Wlan network equally uses the MAC Address of wireless terminal as index in technical solution provided by the present application.By MAC On the one hand location can directly uniquely determine wireless terminal, avoid the occurrence of misjudgment;On the other hand it can be directly compatible with existing Authentication state maintaining method can be copied directly, exchanged and be stored so as to list item information.
S12: according to the unifying identifier information, authentication-exempt list item is searched in the AC equipment.
It, can be according to MAC Address in AC equipment after AC equipment extracts the MAC Address of wireless terminal in practical application It is searched in the authentication-exempt list item of storage.For the authentication-exempt list item stored in AC equipment, it includes within a certain period of time All Wireless terminal-MAC address for having passed through certification, and correspond to what wireless terminal was output and input when carrying out verification process Authentication information.For example, the configuration attribute etc. after certification account, password and certification.
In technical solution provided by the present application, AC equipment all passes through the MAC Address for obtaining wireless terminal, and is exempting to recognize Corresponding MAC Address is searched in card list item, to determine whether contemporary wireless terminals can carry out authentication-exempt.It is saved when from AC equipment Authentication-exempt list item in find the corresponding MAC Address of contemporary wireless terminals, it is determined that contemporary wireless terminals are in current slot It is interior, it authenticates into merits and demerits, it can carry out authentication-exempt.And it is corresponding when not inquiring contemporary wireless terminals in authentication-exempt list item When MAC Address, then it can determine that contemporary wireless terminals are to access wlan network for the first time.For the wireless end of authentication-exempt can be carried out End, the application can complete the authentication-exempt of wireless terminal by executing step S13, it may be assumed that
S13: if in the authentication-exempt list item, the corresponding unified identification information of the wireless terminal is found, is extracted The corresponding authentication information of the wireless terminal.
It is authenticated for example, wireless terminal 1 when accessing wlan network, needs to send message relevant to certification, at this point, The authentication state of wireless terminal 1 is pre-auth.AC equipment, can be in the message received or direct after receiving message From the connection profile of wireless terminal 1, the MAC Address of wireless terminal 1 is extracted are as follows: 00:01:6C:06:A6:29 is being obtained After MAC Address, authentication-exempt list item is searched according to the MAC Address.If searched successfully, it is determined that wireless terminal 1 is in current time In section, authenticates into merits and demerits, therefore, post-auth directly can be set for the authentication state of wireless terminal by AC equipment.
S14: according to the authentication information, the authentication state that the wireless terminal is arranged is post-auth.
In technical solution provided by the present application, after the wireless terminal authentication state in AC equipment becomes post-auth It is normal to connect internet, net operation in implementation.Due in verification process, no longer need to carry out portal identifying procedure without Radius server participates in, therefore in user experience angle, can think that accessing WLAN again does not carry out certification Internet is directly accessed, achievees the effect that authentication-exempt.
Above-mentioned steps show the authentication-exempt effect for how realizing wireless terminal.Due in conventional maintenance method, when wireless When terminal accesses wlan network again, wireless terminal corresponding table item content is searched from database by radius server.And it is real In the application of border, if there are many wireless terminal quantity for connecting in the corresponding network of radius server or once connecting, data The data volume saved in library is also very big, therefore will cause radius server and need to distribute biggish calculation resources and go to complete The lookup of MAC.As it can be seen that being compared with the traditional method, the application can use the authentication-exempt list item of AC equipment preservation to wireless terminal MAC Address searched, relative to certificate server, the wireless terminal quantity that AC equipment is connected to be lacked more, therefore AC The efficiency that equipment implements when searching will be apparently higher than certificate server.Meanwhile AC equipment is searched, and authentication service can be also saved The operational capability of device, to mitigate the burden of certificate server significantly.
Further, as shown in Fig. 2, searching authentication-exempt list item in the AC equipment according to the unifying identifier information After step, the method also includes:
S121: if in the authentication-exempt list item, not finding the corresponding unified identification information of the wireless terminal, to Certificate server initiates certification;
S122: the authentication result message that the certificate server returns is received;
S123: if the authentication result message received is successfully, to be believed using the corresponding unifying identifier of the wireless terminal Breath is index, and authentication-exempt list item is created in AC equipment.
In practical application, when wireless terminal accesses wlan network for the first time, or WLAN is accessed for the first time in current slot Network can not inquire the corresponding unified identification information of wireless terminal then in the authentication-exempt list item that AC equipment saves.Therefore, In this application, if wireless terminal accesses wlan network for the first time, the state of wireless terminal is pre-auth.It is also possible to logical Cross the MAC Address for extracting wireless terminal.Also, corresponding authentication-exempt list item is searched in AC equipment, it is clear that can not be from authentication-exempt Corresponding information is found in list item, i.e., searches failure for the first time.
After searching failure for the first time, then need to carry out wireless terminal authenticating, i.e. portal certification, specific identifying procedure Can be identical as conventional Portal identifying procedure, the application repeats no more.Until certificate server replys Access accept report Text, expression authenticate successfully.AC equipment is after receiving Access accept message in practical application, by the certification shape of wireless terminal State is set as post-auth.Meanwhile the MAC Address that AC equipment passes through wireless terminal is index, creates authentication-exempt list item.
Further, as shown in figure 3, including the configuration attribute letter that the certificate server issues in the authentication-exempt list item Breath, the method also includes:
S124: the corresponding configuration attribute information of the wireless terminal is obtained from the certificate server;
S125: it is index with the unifying identifier information, the configuration attribute information is stored in the authentication-exempt list item In.
As it can be seen that in the present embodiment, certificate server can be wireless for certification in wireless terminal online certification for the first time Terminal issues configuration attribute, such as: upstream and downstream bandwidth etc..Due to when wireless terminal is online again, if searched in AC equipment To the authentication-exempt list item of corresponding MAC, it is therefore not necessary to which certificate server is gone to be authenticated again.In turn, exempt to recognize in the storage of AC equipment It demonstrate,proves in list item, it should the attribute that these certificate servers issue is stored in authentication-exempt list item, so that wireless terminal can lead to It crosses using these configuration attributes, fast implements online.Further, other can also be saved in authentication-exempt list item to tie up for information The information of wireless terminal authentication state is protected, such as: terminal type etc..Specific other information for needing to save can be according to realization feelings Condition specific choice.
Further, in the method, the authentication state of the wireless terminal can also be saved by terminal table entries;By institute It states the authentication information saved in authentication-exempt list item and is copied to the terminal table entries.In the application, terminal table entries save maintenance Wireless terminal authentication state institute relevant information in need.
It should be noted that above-mentioned steps are suitable for AC equipment, i.e., it can be to hold by AC device configuration in practical applications Row procedure above step.And in above-mentioned steps, for authenticating unauthenticated wireless terminal, then Maintenance free its authenticate shape State, therefore also there is no need to create corresponding authentication-exempt list item and terminal table entries.
It is corresponding to need to configure certificate server as follows, i.e., such as in this application with technical solution provided above Shown in Fig. 4, the certificate server needs to be implemented following steps when wireless terminal accesses wlan network for the first time:
S21: if in the authentication-exempt list item, the corresponding unified identification information of the wireless terminal is not found, is recognized It demonstrate,proves server and sends certification page to the wireless terminal;
S22: after the wireless terminal submits authentication information from certification page, the authentication information of submission is verified;
S23: after the authentication information of submission is verified, Xiang Suoshu AC equipment returned content is successful authentication result report Text.
In the application, if not finding the corresponding unified identification letter of the wireless terminal in the authentication-exempt list item Breath then represents contemporary wireless terminals and accesses wlan network for the first time (or within a certain period of time for the first time), then needs certificate server It is authenticated, authentication authorization and accounting server sends certification page to the wireless terminal, and wireless terminal is receiving certification page, inputs Account and password are authenticated, completes to submit authentication information.It is by the URL of AC equipment pushing certification page, then in practical application After wireless terminal accesses URL, the Portal server return authentication page.Certificate server again verifies authentication information, And after certification passes through, AC equipment returned content is successful authentication result message.
Further, after the authentication information of submission is verified, the method also includes: the certificate server issues Configuration attribute information is to the AC equipment;So that the AC equipment, is index according to the unified identification information, by the configuration Attribute information is stored in the authentication-exempt list item.
In the section Example of the application, as shown in figure 5, after completing certification in the certificate server, the side Method further include:
S151: the presence of the wireless terminal as described in AC device real-time monitoring;
S152: when the wireless terminal is offline, the offline duration is recorded;
S153: after the offline duration of record reaches default ageing time, the terminal table entries are deleted.
In the present embodiment, wireless terminal is after completing certification, into post-auth state, it can carries out on normal Net operation.And AC equipment saves relevant authentication information to the wireless terminal creation authentication-exempt list item passed through is authenticated for the first time.To After wireless terminal is offline, the offline duration of terminal can be judged, if user in preset ageing time again It is secondary online, then the authentication-exempt list item saved in AC equipment can be searched by the MAC Address of wireless terminal.In turn, if found Corresponding list item, then wireless terminal is directly authenticated using the authentication information of preservation, and the authentication state of wireless terminal is become For post-auth, go to be authenticated again without STA.It needs to re-start certification if not finding.
If the offline time of wireless terminal is more than default ageing time, i.e., the described wireless terminal is in preset ageing time It is interior, without online again.In order to avoid storing a large amount of garbages in AC equipment, terminal entry aging can be deleted.Due to In the application, the authentication-exempt list item saved in AC equipment is relied on, therefore the list item should survive a long period, also, real It can be determined by being configured on AC when the use of border.
It should be noted that there are two list items, i.e. terminal table entries and authentication-exempt list item for storage in AC equipment.Terminal table entries are seen For safeguarding the off-line state of wireless terminal, but the time-to-live of terminal table entries is shorter, such as 1 hour.And authentication-exempt table Item can be longer with the time-to-live, such as 1 day.What the time-to-live of two list items can configure on AC.But terminal table entries are deposited Live time too long will lead to stores a large amount of useless list items in AC equipment, and wastes memory, and memory required for authentication-exempt list item Can be smaller than terminal table entries it is more, therefore be arranged the time-to-live more long.
From the above technical scheme, offline user authentication state maintaining method provided by the present application and conventional maintenance method It compares, may be implemented without using certificate server, by the authentication-exempt list item in AC equipment, so that user is again Secondary access WLAN is without certification.And by configuring, the flexible time-to-live for defining authentication-exempt list item in AC equipment.And And use the MAC Address of wireless terminal as index come maintenance list item can be to avoid to AC without defining other identifier information Equipment and radius server change configuration simultaneously.
In addition, offline user authentication state maintaining method provided by the present application, it is not necessary to which radius server goes to read and write Database mitigates the burden of radius server.And safeguard that authentication function is only realized in AC equipment, without AC equipment and Radius server will be supported, without increase database server.Also, relative to normal verification process, the application Do not increase message interaction in network, network load can also be mitigated.
Based on above-mentioned offline user authentication state maintaining method, recognize as shown in fig. 6, the application also provides a kind of offline user Demonstrate,prove state-maintenance system, comprising: wireless terminal, AC equipment, AP equipment and radius server, wherein the AC equipment, AP The wlan network of connection internet is formed between equipment and radius server by networking, the wireless terminal passes through described AP equipment connects the AC equipment;
The wireless terminal includes or is labeled with unifying identifier information, and the wireless terminal is for showing authentication page Face, and user's interaction is provided, the wireless terminal triggers the radius server to institute after connecting the wlan network Wireless terminal is stated to be authenticated;
The AC equipment is further configured to execute following procedure step:
Obtain the unifying identifier information of wireless terminal to be certified;
According to the unifying identifier information, authentication-exempt list item is searched in the AC equipment;
If finding the corresponding unified identification information of the wireless terminal in the authentication-exempt list item, described in extraction The corresponding authentication information of wireless terminal;
According to the authentication information, the authentication state that the wireless terminal is arranged is post-auth.
Further, the AC equipment is further configured to execute following procedure step:
If the corresponding unified identification information of the wireless terminal is not found, to certification in the authentication-exempt list item Server initiates certification;
Receive the authentication result message that the certificate server returns;
If it is rope using the corresponding unifying identifier information of the wireless terminal successfully that the authentication result message received, which is, Draw, authentication-exempt list item is created in AC equipment;
The certificate server is further configured to execute following procedure step:
If not finding the corresponding unified identification information of the wireless terminal, certification clothes in the authentication-exempt list item Business device sends certification page to the wireless terminal;
After the wireless terminal submits authentication information from certification page, the authentication information of submission is verified;
After the authentication information of submission is verified, Xiang Suoshu AC equipment returned content is successful authentication result message.
It should be noted that the MAC Address of wireless terminal and its can also be used in technical solution provided by the present application Its information carrys out maintenance list item as index, so that corresponding list item maintenance process is more intelligent.And for being safeguarded in AC equipment List item can also dispose a database server, that is, be arranged in AC equipment the machine or other addressable equipment of AC equipment On, so that AC equipment carries out Card read/write, improve the storage capacity of whole system.
From the above technical scheme, the application provides a kind of offline user authentication state maintaining method and system, described Method in practical applications, first passes through the unifying identifier information that AC equipment obtains wireless terminal to be certified, and in AC equipment Search authentication-exempt list item;If finding unified identification information in authentication-exempt list item, extracting corresponding authentication information;And Post-auth is set by the authentication state of wireless terminal, wireless terminal is made to connect internet.
Method provided by the present application goes to read in the of short duration offline wlan network of access again of user without radius server Database is write, the burden of radius server is mitigated.And authentication-exempt function is only implemented in AC equipment, without AC equipment and Radius server is all supported configuration, increases database server without additional, in addition, authentication state maintenance process does not have Have and increase message interaction in network, network load can be mitigated, improve the authentication efficiency of maintaining method.
Similar portion cross-reference between embodiment provided by the present application, specific embodiment provided above is only It is several examples under the total design of the application, does not constitute the restriction of the application protection scope.For those skilled in the art For member, any other embodiment expanded without creative efforts according to application scheme all belongs to In the protection scope of the application.

Claims (10)

1. a kind of offline user authentication state maintaining method characterized by comprising
AC equipment obtains the unifying identifier information of wireless terminal to be certified;
According to the unifying identifier information, authentication-exempt list item is searched in the AC equipment;
If finding the corresponding unified identification information of the wireless terminal in the authentication-exempt list item, extracting described wireless The corresponding authentication information of terminal;
According to the authentication information, the authentication state that the wireless terminal is arranged is post-auth.
2. maintaining method according to claim 1, which is characterized in that according to the unifying identifier information in the AC equipment After the step of middle lookup authentication-exempt list item, the method also includes:
If the corresponding unified identification information of the wireless terminal is not found, to authentication service in the authentication-exempt list item Device initiates certification;
Receive the authentication result message that the certificate server returns;
If it is index using the corresponding unifying identifier information of the wireless terminal successfully that the authentication result message received, which is, Authentication-exempt list item is created in AC equipment.
3. maintaining method according to claim 2, which is characterized in that include the authentication service in the authentication-exempt list item The configuration attribute information that device issues, the method also includes:
The corresponding configuration attribute information of the wireless terminal is obtained from the certificate server;
It is index with the unifying identifier information, the configuration attribute information is stored in the authentication-exempt list item.
4. maintaining method according to claim 1, which is characterized in that according to the unifying identifier information in the AC equipment After the step of middle lookup authentication-exempt list item, the method also includes:
If not finding the corresponding unified identification information of the wireless terminal, certificate server in the authentication-exempt list item Certification page is sent to the wireless terminal;
After the wireless terminal submits authentication information from certification page, the authentication information of submission is verified;
After the authentication information of submission is verified, Xiang Suoshu AC equipment returned content is successful authentication result message.
5. maintaining method according to claim 4, which is characterized in that described after the authentication information of submission is verified Method further include:
The certificate server issues configuration attribute information to the AC equipment;So that the AC equipment, according to the unified knowledge Other information is index, by the configuration attribute information preservation in the authentication-exempt list item.
6. maintaining method according to claim 1-5, which is characterized in that the unifying identifier information is the nothing The MAC Address of line terminal.
7. maintaining method according to claim 1, which is characterized in that the state that the wireless terminal is arranged is post- The step of auth, further includes:
The authentication state of the wireless terminal is saved by terminal table entries;
The authentication information saved in the authentication-exempt list item is copied to the terminal table entries.
8. maintaining method according to claim 7, which is characterized in that the method also includes:
The presence of the wireless terminal as described in AC device real-time monitoring;
When the wireless terminal is offline, the offline duration is recorded;
After the offline duration of record reaches default ageing time, the terminal table entries are deleted.
9. a kind of offline user authentication state maintenance system characterized by comprising wireless terminal, AC equipment, AP equipment and Certificate server, wherein connection internet is formed by networking between the AC equipment, AP equipment and certificate server Wlan network, the wireless terminal connect the AC equipment by the AP equipment;
The wireless terminal includes or is labeled with unifying identifier information, and the wireless terminal is used to show certification page, with And user's interaction is provided, the wireless terminal triggers the certificate server to described wireless after connecting the wlan network Terminal is authenticated;
The AC equipment is further configured to execute following procedure step:
Obtain the unifying identifier information of wireless terminal to be certified;
According to the unifying identifier information, authentication-exempt list item is searched in the AC equipment;
If finding the corresponding unified identification information of the wireless terminal in the authentication-exempt list item, extracting described wireless The corresponding authentication information of terminal;
According to the authentication information, the authentication state that the wireless terminal is arranged is post-auth.
10. maintenance system according to claim 9, which is characterized in that the AC equipment be further configured to execute with Lower program step:
If the corresponding unified identification information of the wireless terminal is not found, to authentication service in the authentication-exempt list item Device initiates certification;
Receive the authentication result message that the certificate server returns;
If it is index using the corresponding unifying identifier information of the wireless terminal successfully that the authentication result message received, which is, Authentication-exempt list item is created in AC equipment;
The certificate server is further configured to execute following procedure step:
If not finding the corresponding unified identification information of the wireless terminal, certificate server in the authentication-exempt list item Certification page is sent to the wireless terminal;
After the wireless terminal submits authentication information from certification page, the authentication information of submission is verified;
After the authentication information of submission is verified, Xiang Suoshu AC equipment returned content is successful authentication result message.
CN201811632394.7A 2018-12-29 2018-12-29 A kind of offline user authentication state maintaining method and system Pending CN109451503A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811632394.7A CN109451503A (en) 2018-12-29 2018-12-29 A kind of offline user authentication state maintaining method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811632394.7A CN109451503A (en) 2018-12-29 2018-12-29 A kind of offline user authentication state maintaining method and system

Publications (1)

Publication Number Publication Date
CN109451503A true CN109451503A (en) 2019-03-08

Family

ID=65538749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811632394.7A Pending CN109451503A (en) 2018-12-29 2018-12-29 A kind of offline user authentication state maintaining method and system

Country Status (1)

Country Link
CN (1) CN109451503A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112312400A (en) * 2020-10-15 2021-02-02 新华三大数据技术有限公司 Access control method, access controller and storage medium
CN114302393A (en) * 2021-11-17 2022-04-08 锐捷网络股份有限公司 Communication control method, device, equipment and system based on authentication
WO2022179243A1 (en) * 2021-02-27 2022-09-01 华为技术有限公司 Wi-fi access method and related device
CN115567261A (en) * 2022-09-20 2023-01-03 浪潮思科网络科技有限公司 Authentication method, device, equipment and medium for access equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188662A (en) * 2011-12-30 2013-07-03 ***通信集团广西有限公司 Method and device for verifying wireless access point
WO2016004822A1 (en) * 2014-07-10 2016-01-14 华为技术有限公司 Method and apparatus for network switching
CN105744517A (en) * 2014-12-08 2016-07-06 ***通信集团江苏有限公司 Information authentication method and network side device
CN106060006A (en) * 2016-05-09 2016-10-26 杭州华三通信技术有限公司 Access method and device
CN108123950A (en) * 2017-12-22 2018-06-05 成都飞鱼星科技股份有限公司 A kind of unaware authentication method based on network foundation protocal analysis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188662A (en) * 2011-12-30 2013-07-03 ***通信集团广西有限公司 Method and device for verifying wireless access point
WO2016004822A1 (en) * 2014-07-10 2016-01-14 华为技术有限公司 Method and apparatus for network switching
CN105744517A (en) * 2014-12-08 2016-07-06 ***通信集团江苏有限公司 Information authentication method and network side device
CN106060006A (en) * 2016-05-09 2016-10-26 杭州华三通信技术有限公司 Access method and device
CN108123950A (en) * 2017-12-22 2018-06-05 成都飞鱼星科技股份有限公司 A kind of unaware authentication method based on network foundation protocal analysis

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112312400A (en) * 2020-10-15 2021-02-02 新华三大数据技术有限公司 Access control method, access controller and storage medium
CN112312400B (en) * 2020-10-15 2022-03-29 新华三大数据技术有限公司 Access control method, access controller and storage medium
WO2022179243A1 (en) * 2021-02-27 2022-09-01 华为技术有限公司 Wi-fi access method and related device
CN114302393A (en) * 2021-11-17 2022-04-08 锐捷网络股份有限公司 Communication control method, device, equipment and system based on authentication
CN115567261A (en) * 2022-09-20 2023-01-03 浪潮思科网络科技有限公司 Authentication method, device, equipment and medium for access equipment

Similar Documents

Publication Publication Date Title
CN109451503A (en) A kind of offline user authentication state maintaining method and system
CN103023875B (en) A kind of account management system and method
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN105007282A (en) Malicious software network behavior detection method specific to network service provider and system thereof
CN102271133B (en) Authentication method, device and system
CN110311929A (en) A kind of access control method, device and electronic equipment and storage medium
CN108881308A (en) A kind of user terminal and its authentication method, system, medium
CN105187392A (en) Mobile terminal malicious software detection method based on network access point and system thereof
CN106060072B (en) Authentication method and device
CN204376941U (en) Outer net middleware, Intranet middleware and middleware system
CN104144095A (en) Terminal authentication method and interchanger
CN104348895A (en) Method and device for sharing data among programs in mobile terminal
CN109309655A (en) Stateless communication security endorsement method, terminal and server end
CN104468552B (en) A kind of connection control method and device
US8769623B2 (en) Grouping multiple network addresses of a subscriber into a single communication session
CN101986598A (en) Authentication method, server and system
CN106330880A (en) Management method for address book and home gateway
CN105357224B (en) A kind of registration of intelligent domestic gateway, removing method and system
CN105991610B (en) Log in the method and device of application server
CN110034979A (en) A kind of proxy resources monitoring method, device, electronic equipment and storage medium
CN107396363B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN102801728A (en) Management method and system for automatic login of client side
CN105871851B (en) Based on SaaS identity identifying method
CN116719868A (en) Network asset identification method, device and equipment
CN106537962B (en) Wireless network configuration, access and access method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190308

RJ01 Rejection of invention patent application after publication