Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for revising terminal configuration, network side management unit, terminal and system

A management unit, network-side technology, applied in the direction of network data management, electrical components, security devices, etc., can solve the problems of non-confidentiality, difficult maintenance, leakage, etc., to facilitate expansion and transformation, simplify configuration and upgrade, prevent The effect of equipment switching

Active Publication Date: 2009-12-16
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users can modify some of their own settings, such as PPP0E passwords, etc., which can restrict users at this level from having the authority to modify configurations and upgrade software; administrator-level accounts are for maintenance personnel. For the same device, the account and The passwords are the same, maintenance personnel can log in to the device for necessary maintenance or upgrade, but because the same device account and password are the same, so there is no confidentiality, other operators can obtain the account if they have the same device and password
Even if the operator customizes the account number and password, there is still the possibility of leakage due to the resignation of the maintenance personnel
However, setting an independent password for each device makes it difficult to maintain and is not feasible
[0008] There is another existing solution: write the operator’s information in the non-modifiable area of ​​FLASH, and the upgraded version cannot be changed, but this method is too rigid, and the equipment cannot be used if some information of the operator is changed, unless it is returned to the factory. Rewriting FLASH, the actual operation is more inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for revising terminal configuration, network side management unit, terminal and system
  • Method for revising terminal configuration, network side management unit, terminal and system
  • Method for revising terminal configuration, network side management unit, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] refer to image 3 , to describe the network side management unit. The network side management unit of the present invention may be a hardware or software function module integrated in the central office system, including: a device management subunit and a password generation subunit. When logging in to the device from the network side management system, the device management subunit of the management unit obtains the identification information of the terminal device, which can be an identifier such as a MAC address or a product number; the password generation subunit of the management system has a built-in encryption algorithm , the encryption algorithm generates a password after calculation according to the identification information, and feeds back the password to the device management subunit, and the password is invisible to the operator. The device management subunit initiates a login request to the terminal device. The login account is generally carried in the lo...

Embodiment 2

[0063] refer to Figure 4 , to describe the terminal device of the present invention. The terminal equipment includes a user management unit and a password verification unit. The user management unit is used to receive a login request and a password from the network side, and verify the password by the password verification unit; if the login request carries a login account, verify the validity of the login account; if the login account is not valid If the login account is legal, the login request is accepted and the login is allowed, and then it is verified whether the login account is an administrator account. If it is not an administrator account, the authority to modify the configuration and upgrade the software is not granted, and if so, the password verification unit is triggered. The password is verified; the password verification unit has a built-in encryption algorithm, which is the same as the encryption algorithm in the corresponding network side management unit, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for restricting configuration modification and software upgrade of terminal equipment, which is applied to a network side management unit and terminal equipment, including: the management unit acquires terminal identification information; the management unit automatically generates a password according to the identification information , the password is calculated and generated according to the encryption algorithm and the identification information; the management unit initiates a login request to the terminal device, and sends the password to the terminal device; the terminal device receives the login request and the password; the terminal device calculates and verifies the correctness of the password, and if the verification is passed, the terminal device grants the login user the authority to modify the configuration and upgrade the software of the terminal device. The invention also discloses a system for realizing the method of the invention. The present invention can effectively restrict configuration modification and software upgrade of terminal equipment, and improve security; it can be used to prevent equipment from switching networks, reduce loss of operator assets, simplify operator terminal configuration and upgrade, and facilitate network expansion and transformation .

Description

technical field [0001] The invention relates to the technology of terminal equipment configuration, in particular to a method and a communication system for restricting configuration modification and software upgrade of terminal equipment. Background technique [0002] At present, many access or application terminals, such as DSL modems, home gateways, set-top boxes, etc., are given away by operators for free when allocating numbers. Operators hope that equipment suppliers can provide a method to prevent users from taking their own donated equipment. to use in other carrier networks. In fact, the network architecture of each operator is different. The equipment used by operator A cannot be directly used in the network of operator B. It is necessary to modify the configuration of the terminal equipment or upgrade the software of the equipment to be used in the new operator. used in the network. [0003] There are two main ways to reset: [0004] 1) If all related configura...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W88/08H04W88/18H04W8/24H04W12/06H04W12/08
Inventor 姚洪杰汪朝阳
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products