Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Real name Authentication Scheme of Wireless WiFi in Public places

2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

According to the XXX Cybersecurity Act,(Articles 10, 21 and 24), the XX Anti-Terrorism Law (Articles 19 and 21), the Measures for the Administration of Security Protection of Computer Information Networks (Articles 10, 11, 12 and 17), and the Provisions on Technical Measures for Internet Security Protection (Articles 7, 8 and 11) provide that public wireless Internet access places shall implement relevant network security protection technical measures. The Regulations on Internet Security Supervision and Inspection of Public Security Organs (Order No.151 of the Ministry of Public Security), which came into force on November 1, 2018, is an in-depth combination of network security law enforcement and inspection work and the Network Security Law. It has detailed provisions on the law enforcement process, so that supervision and inspection work can be inspected and disposed of according to law. To put it simply, there are two things that deserve our attention:

1. Public places that provide WiFi Internet service must implement real-name authentication for Internet access.

2. Public places that provide Internet access must keep at least 60 days of backup records of Internet access.

In this article, I will introduce the real-name authentication scheme and log retention scheme of wireless WiFi in public places in combination with WSG Internet behavior management gateway. With this solution, you do not need to modify the existing wireless deployment and wireless devices, as long as you add a gateway device, you can achieve a comprehensive solution for WiFi real-name authentication and Internet log retention.

1. Wireless WiFi real-name authentication scheme in public places

WiFi real-name authentication, generally speaking, there are the following schemes:

a). User name password authentication. User name and password need to be configured in advance, suitable for fixed places for Internet users.

b). Wechat WiFi. At present, real name authentication cannot be realized, and there are some limitations. Please see: How long can WeChat WiFi go?

c). SMS authentication, which records the mobile phone number by receiving SMS messages, thus realizing real-name authentication. Suitable for public places where people move frequently. According to the requirements of the Ministry of Industry and Information Technology, China has fully realized the real-name authentication of mobile phones. So for now, the most suitable method for wireless WiFi real-name authentication is "SMS authentication."

1.1 Network topology diagram of SMS authentication

As shown above:

a). Only need to deploy a "WSG Internet behavior management gateway" in the network, you can realize the whole network SMS real-name authentication.

b). There is no need to change the existing wireless AP configuration or adjust the wireless device.

c). Calling the interface of the short message platform on the Internet to send short messages does not require setting up a short message sending device.

1.2 SMS authentication process

When the client connects to WiFi, a Web page automatically pops up. As shown below:

After the user inputs the mobile phone number, click Get Captcha to verify the mobile phone number, and record the mobile phone number, IP address, mac address and other information.

1.3 SMS authentication related configuration

In "Web authentication" of WSG, select SMS authentication and enter relevant parameters of SMS platform. Note: API interfaces provided by different SMS platforms are different, so you need to consult manufacturers to obtain relevant parameters.

2. Internet log retention scheme

In the WFilter system, you can query the authentication record of the mobile phone number and the corresponding Internet log information. As shown below:

You can configure the number of days the log is retained according to your requirements.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report