Network equipment identification method

A technology of network equipment and authentication method, applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the threat to MS communication security and other issues, achieve the effect of simple authentication process and solve the threat of user communication

Inactive Publication Date: 2007-11-07
ZTE CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has the following security loopholes: MS may be deceived by a fake VLR, thereby threatening the communication security of MS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network equipment identification method
  • Network equipment identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to facilitate a deep understanding of the technical content of the present invention, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] A network device authentication method provided by the present invention, the method includes:

[0022] Provide a smart card to a network device that needs to be authenticated, and the smart card includes at least a network device identity ID NE , the encryption key K shared with the CA center AC One or more of the information in ;

[0023] The network device generates a random number R and uses the encryption key K AC Encrypt the random number R to obtain the encrypted result E(K, R);

[0024] The network device sends the above encryption result E(K, R), the random number R, and the network device identity ID NE Send to CA center;

[0025] The CA center uses the encryption key K shared with the network equipment AC Decrypt the encrypte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for certifying network device includes providing intelligent card to network device, obtaining enciphered result E by network device, sending enciphered result and relevant data to CA center, distributing a communication cipher key to said network device by CA and informing new switched-in network device information of the other network device passed certification of CA by enciphering information with cipher key and informing relevant information of new switch-in network device to the other network device passed certification by CA center.

Description

technical field [0001] The invention relates to the security field of the telecommunication industry, in particular to the authentication technology of communication network equipment. Background technique [0002] In the telecommunications industry, in order to provide users with a safe and reliable communication environment, it is generally required that network devices that can see the user's security context are trusted. However, in the existing communication environment, there are situations where a network device that can see the user's security context believes that the network device is trusted without being authenticated by a reliable certification authority. For example, some network devices are deployed because they are It is believed to be authentic inside the carrier's computer room without authenticating it. In this way, such network equipment may be counterfeited, so when a user needs to communicate through such network equipment, there is a security risk. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28H04L29/06
Inventor 蒋亮
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products