Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and equipment for implementing authentication mode smooth transition

An authentication method and a smooth transition technology. Applied in the field of communication, it can solve the problems of disconnection of network links, occupying network bandwidth, and advertising routing information in large quantities, so as to achieve the effect of solving network bandwidth.

Active Publication Date: 2009-06-24
ZTE CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] It can be seen from the above that in the process of modifying the authentication key, due to the different authentication methods between the BGP network devices in a short period of time, the authentication of the two network devices will fail and the network link will be disconnected. Establish a link, which will cause a large amount of routing information to be advertised, occupying a large amount of network bandwidth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for implementing authentication mode smooth transition
  • Method and equipment for implementing authentication mode smooth transition
  • Method and equipment for implementing authentication mode smooth transition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] A device that realizes smooth transition of authentication methods, such as figure 2 As shown, it includes a configuration unit, a judgment analysis unit and a sending unit connected in sequence. The functions of each unit are described in detail below.

[0034] The configuration unit is used to store the first authentication method configured for the device, the second authentication method to be modified and the delay of the second authentication method, wherein the delay is used to determine the effective time of the second authentication method;

[0035] A judging and parsing unit for judging the effective authentication mode in the current device, and sending the effective authentication mode to the sending unit;

[0036] Specifically, the judgment analysis unit reads the delay of the second authentication method in the configuration unit, and judges whether the delay has arrived, and if it arrives, it considers that the authentication method currently in effect ...

Embodiment 2

[0040] On the basis of Embodiment 1, it is assumed that there are two first network devices and second network devices establishing a BGP neighbor relationship, wherein authentication mode A is configured between the first network device and the second network device, and the first network device The device has received the newly configured authentication method B, and the delay of authentication method B is 10S. The following two network devices are taken as an example to illustrate the authentication process to achieve a smooth transition between the two network devices. image 3 shown, including the following steps:

[0041] Step 301: At time S20, the authentication mode configured by the first network device and the second network device is both A;

[0042] At this time, since the authentication methods are the same, normal communication between the two network devices can be realized;

[0043]Step 302: At time S21, for some reason, authentication method B is newly config...

Embodiment 3

[0053] Introduce two network equipments that set up BGP neighbor again below, these two network equipments have all used MD5 authentication, and authentication key is all " Red ", according to the technical scheme of the present invention, the authentication key of these two network equipments is changed from " Red" to "Red". "Modified to "Green" process, such as Figure 4 shown, including the following steps:

[0054] Step 401: At time S30, when the network device router_01 sends a message to the network device router_02, the message uses the key "Red", and the network device router_02 uses the key "Red" to perform an authentication check after receiving the message, and the authentication is successful ;

[0055] Step 402: At time S31, when the network device router_02 sends a message to the network device router_01, the message uses the key "Red", and the network device router_01 uses the key "Red" to perform an authentication check after receiving the message, and the aut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and equipment for realizing smooth transition of authentication mode, which relate to communication field. The method includes that when the message authentication mode in network equipment needs to be modified to a second authentication mode from a first authentication mode, the second authentication mode is respectively configured on each network equipment, and a time delay is configured for the second authentication mode for determining the valid time of the second authentication mode; when the time delay of the second authentication mode is up, or the network equipment receives message sent by counterpart network equipment in second authentication mode, the message authentication mode in the network equipment is modified to the second authentication mode; now, the messages sent by network equipments all adopt the second authentication mode. During the message authentication mode modification process, the technical proposal in the invention is adopted to effectively avoid connected network equipment from disconnection due to failure authentication.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and equipment for realizing smooth transition of authentication modes. Background technique [0002] Two network devices are interconnected. In order to enhance network security, the devices usually use text, md5 and other authentication methods. Only packets that pass the authentication are considered legal. [0003] At present, when two network devices establishing BGP (Border Gateway Protocol, Border Gateway Protocol) neighbor relationship are configured with the same authentication method (both authentication keys are "Red"), BGP neighbors can communicate normally. , the specific process is as figure 1 as shown in: [0004] Step 101: At time S10, when the network device router_01 sends a message to router_02, it will use the key "Red", and router_02 will use the key "Red" to perform an authentication check after receiving the message, and the authentication is successful;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L12/56H04L9/32
Inventor 周广腾吴道揆
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products