Method and device for portal authentication

A portal authentication and user identity authentication technology, applied in the field of portal authentication methods and devices, can solve the problems of users failing to go online, administrators cannot manage users centrally, Portal users cannot pass authentication, etc., so as to meet the needs of centralized management. Effect

Active Publication Date: 2017-03-15
NEW H3C TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, both of the above two solutions have flaws: Solution 1 cannot solve the fundamental problem, and only achieves the purpose of subsequent user online by switching to the standby authentication server, and this solution sacrifices user experience. When users go online through Portal authentication, When the active and standby authentication servers are switched, the Portal user will fail to go online because the authentication request times out, and the user has to re-authenticate the Portal
[0006] The performance of the main server is generally better than that of the backup server. If there are still large users who perform Portal authentication at the same time, the backup server will appear to be blocked even faster, causing the switch to the next backup server to continue, and so on. If continuous large users perform Portal authentication, all active and standby servers will eventually be blocked, and subsequent Portal users will not be able to pass the authentication.
[0007] Solution 2 distributes the access users to different authentication servers through the method of load sharing, because in this way the administrator does not know which authentication server the specific user is authenticated on, which violates the original intention, and the administrator cannot Achieve centralized management of users, including statistics and query of user billing information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for portal authentication
  • Method and device for portal authentication
  • Method and device for portal authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0067]Method Embodiment 1 Taking the networking of a single AAA authentication server as an example, the technical solution of the present invention is described. In practical applications, operators will also form AAA authentication servers into server groups, that is, one master and multiple backups. When the master server is down , the standby AAA authentication server performs authentication and billing for subsequent users. In this embodiment, a master and a backup AAA authentication server dynamically create a user cache and a scheduling mechanism as an example to further illustrate the technical solution of this embodiment. The preset threshold corresponding to the number of access users processed by the primary AAA authentication server is 64 per second, the preset threshold corresponding to the number of access users processed by the standby AAA authentication server is 32 per second, and the BAS waits for a fixed period of time for authentication responses If the valu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a portal authentication method and portal authentication equipment. A broadband access server (BAS) receives user identity authentication requests, and if the number of user requests is more than a preset threshold corresponding to the number of access users processed by an authentication server, the user identity authentication requests are transmitted to the authentication server and are processed by the authentication server, wherein the number of the transmitted user identity authentication requests is less than or equal to the preset threshold of the access users processed by the authentication server; a cache queue for the user identity authentication requests is created, the user identity authentication requests exceeding the preset threshold corresponding to the number of the access users processed by the authentication server are cached in the cache queue for the user identity authentication requests, the user identity authentication requests are subsequently transmitted to the authentication server, and the number of users transmitted in each time is less than or equal to the preset threshold of the access users processed by the authentication server; if the number of the user identity authentication requests is less than or equal to the preset threshold corresponding to the number of the access users processed by the authentication server, all the user identity authentication requests are transmitted to the authentication server and are processed by the authentication server.

Description

technical field [0001] The invention relates to network communication technology, in particular to a portal authentication method and equipment. Background technique [0002] figure 1 It is a typical network of portal authentication (Portal authentication). The basic principle is: when the user fails to pass the Portal authentication, the Http request for accessing the external network of the user will be redirected by the router device, and the authentication page will be pushed to the user through the Portal Server server. After the user enters the correct account and password information, the Broadband Access Server (BAS, BroadbandAccess Server) first interacts with the Portal Server server for Portal authentication, and then performs identity authentication with the authentication server. After passing the authentication, the user can normally access the external network resource. [0003] When it is applied in the live network, it is found that because a large number ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 杜鑫高平利
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products