Identification based integrated network terminal united access control method

A network terminal and access control technology, applied in data exchange networks, transmission systems, digital transmission systems, etc., can solve the problems of tracking and positioning operation problems, debugging and troubleshooting difficulties, etc., to overcome cloning threats and authentication processes. Simple, easy to achieve effects

Inactive Publication Date: 2008-02-06
BEIJING JIAOTONG UNIV
View PDF1 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The change of the source address in the communication process also brings difficulties to tracking and locating problems in operation, and brings difficulties to debugging and troubleshooting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification based integrated network terminal united access control method
  • Identification based integrated network terminal united access control method
  • Identification based integrated network terminal united access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] The complete technical solution proposed in this embodiment consists of five parts: the definition of the unified identity of the terminal, the registration process of the unified identity of the terminal, the unified access control authentication process of the terminal, the fast authentication process of the mobile handover of the terminal, and the encrypted communication process between the terminal and the ASR. .

[0029] The hardware involved in this embodiment includes: three network entities: terminal, access switching router, and authentication center.

[0030] The terminal generally refers to various electronic devices that can be connected to the network, such as computers, telephones, mobile phones, sensor nodes, and the like.

[0031] The access switching router is responsible for the access of various fixed terminals and mobile terminals, fixed networks such as WLAN, and mobile networks such as mobile subnets and ad hoc networks, and is responsible for acce...

Embodiment 2

[0042] This embodiment is a refinement of the steps of defining the unified identity of the terminal described in the first embodiment. The definition of terminal unified identity is based on the commonality of heterogeneous network terminals, abstracting the category, manufacturer and terminal serial number of heterogeneous network terminals to form a user-readable terminal privacy identity, and the unreadable identity after encryption transformation is used as The public identity of the terminal is used for authentication transmission between network nodes.

[0043] The above narrative can be described as the following steps:

[0044] Find the commonality of heterogeneous network terminals, and abstract the category, manufacturer, and terminal serial number of heterogeneous network terminals to form a user-readable terminal privacy identity.

[0045] The user-readable terminal privacy identity is encrypted and transformed into an unreadable identity, which is used as the te...

Embodiment 3

[0047] This embodiment is a refinement of the steps of the registration process of the terminal unified identity described in the first embodiment. Before connecting to the network, the terminal must register its type, manufacturer and product serial number in the certification center, and obtain the legal access identifier for accessing the network, otherwise the terminal will never be able to pass the network-to-terminal unified access control certification process without being able to enjoy network services.

[0048] The registration process of the unified identity information of the terminal refers to the process that the user registers with the authentication center server in the network after purchasing the terminal, and the process is shown in FIG. 3 . The authentication center server saves the identity information entry for each terminal, as shown in Figure 4, for authentication query when the terminal accesses the network. The specific registration process is as fol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an all-in-one network terminal unifying accessing and controlling method based on the marks and is an electric figure communication processing method by utilizing the network. The present invention comprises a network which consists of a resting net and a movable net, a terminal, an accessing router and an authenticating center. The steps are as follows: the terminal unifies the define of the identity marks, the terminal unifies the registering process of the identity marks, the terminal unifies the accessing and controlling authentication process, the terminal movably switches the quick authentication processing process, the encrypting communication is between the terminal and the accessing exchanging router ASR. The method unifies the identity marks of heterogenous network terminals and provides a good premise to the accessing of the heterogenous network terminals. The effective authenticating method effectively solves the problem that the illegal users are unable to use the network by the accessing control of the network to the terminal. The simple authenticating process brings little time delay to the moving of the terminal and simultaneously processes the authentication and confirmation of the terminal. The communication between the terminal and the accessing exchanging router adopts an encrypting method so as to conquer the menace of the clone.

Description

technical field [0001] The invention relates to an identification-based integrated network terminal unified access control method, which is an electrical digital communication processing method utilizing a network. Background technique [0002] The existing Internet is established based on the connectionless network technology of the IP protocol, and this connectionless transmission mechanism has inherent deficiencies in security. In the process of transmitting data packets from the source to the destination, it needs to pass through many intermediate networks, including intermediate routers that are not owned or controlled by the sender or receiver, and transmission channels that are relatively visible to third parties. Some Sniff tools (such as netxray, snoop, sniffit, tcpdump, ethereal) can capture data packets flowing on the Internet, and analyze the content information of the data packets. These tools make the data transmitted on the network visible to a certain extent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/56H04L12/28
Inventor 罗洪斌王洪超张宏科秦雅娟董平杨水根苏伟
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products