Network equipment identification method

A technology of network equipment and authentication method, which is applied in the directions of digital transmission systems, security communication devices, electrical components, etc., can solve problems such as threats to MS communication security, and achieve the effect of simple authentication process and solving user communication threats.

Inactive Publication Date: 2012-04-11
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has the following security loopholes: MS may be deceived by a fake VLR, thereby threatening the communication security of MS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network equipment identification method
  • Network equipment identification method
  • Network equipment identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to facilitate a deep understanding of the technical content of the present invention, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] A network device authentication method provided by the present invention, the method includes:

[0022] Provide a smart card to a network device that needs to be authenticated, and the smart card includes at least a network device identity ID NE , the encryption key K shared with the CA center AC One or more of the information in ;

[0023] The network device generates a random number R and uses the encryption key K AC Encrypt the random number R to obtain the encrypted result E(K, R);

[0024] The network device sends the above encryption result E(K, R), the random number R, and the network device identity ID NE Send to CA center;

[0025] The CA center uses the encryption key K shared with the network equipment AC Decrypt the encrypte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method for a network device, including: providing intelligent cards for the network device; generating a random number R by the network device, encrypting the R by using an enciphered key KAC and obtaining an enciphered result E; sending one or more of the enciphered result, the random number R and a network device identification IDNE to a CA center by the network device; the CA center decrypting the enciphered result E by using the enciphered key KAC, and allotting one communication key KCC to said network device and informing a new access network device of the communication key KCC and the other network device identification IDNE which is identified in the center and the corresponding communication key by using the enciphered key KAC; informing the other network devices which are identified in the center of the new network device IDNE and the communication key KCC by the CA center.

Description

technical field [0001] The invention relates to the security field of the telecommunication industry, in particular to the authentication technology of communication network equipment. Background technique [0002] In the telecommunications industry, in order to provide users with a safe and reliable communication environment, it is generally required that network devices that can see the user's security context are trusted. However, in the existing communication environment, there are situations where a network device that can see the user's security context believes that the network device is trusted without being authenticated by a reliable certification authority. For example, some network devices are deployed because they are It is believed to be authentic inside the carrier's computer room without authenticating it. In this way, such network equipment may be counterfeited, so when a user needs to communicate through such network equipment, there is a security risk. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28H04L29/06
Inventor 蒋亮
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products