Method, node and system of network access

A network access and node technology, applied in the field of communication, can solve the problems of complex authentication process and failure to provide operator control information, etc., and achieve the effect of simple authentication process

Active Publication Date: 2010-03-17
CHINA MOBILE COMM GRP CO LTD
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to propose a network access method for the defects in the prior art that the authentication process of the network access mode based on ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, node and system of network access
  • Method, node and system of network access
  • Method, node and system of network access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 2 It is a flow chart of Embodiment 1 of the network access method of the present invention. Such as figure 2 As shown, this embodiment includes:

[0039] Step S101: the terminal generates a first domain number summary according to the information including the terminal domain number;

[0040] Step S102: Embedding the first domain number abstract into the routing request message;

[0041] Step S103: sending a routing request message;

[0042] Step S105: the transit node receives the routing request message, and extracts the first domain number abstract;

[0043] Step S107: Generate a second domain number summary according to the information including the domain number of the transit node;

[0044] Step S109: Determine whether the first domain number digest is consistent with the second domain number digest, if they are consistent, execute step S111, otherwise, execute step S113;

[0045] Step S111: forward the routing request message, and execute step S115; ...

Embodiment 2

[0052] Figure 4 It is a flow chart of Embodiment 2 of the network access method of the present invention. This implementation is similar to Embodiment 1, but further includes: setting a function pool including multiple hash functions in advance on the terminal. Such as Figure 4 As shown, this embodiment also includes:

[0053] Step S201: the terminal sends an authentication request;

[0054] Step S203: the gateway node authenticates the terminal, if the authentication is successful, go to step S207, otherwise, go to step S205;

[0055] Step S205: Send a message of authentication failure to the terminal, and the process ends;

[0056] Step S207: the gateway node issues the current function code;

[0057] Step S209: the terminal receives the current function code.

[0058] After step S209, the terminal selects a hash function from the function pool according to the current function code, and executes the subsequent generation of the first information digest from the sele...

Embodiment 3

[0063] In this embodiment, the transit node is a user authenticated by the gateway node, and the terminal may be a user of the Ad hoc network, and the terminal has obtained the domain number and the current function code. In addition, terminal and transit nodes are preset with function pools containing multiple hash (Hash) functions.

[0064] Figure 5 It is a flow chart of Embodiment 3 of the network access method of the present invention. Such as Figure 5 As shown, this embodiment includes:

[0065] Step S301: the terminal selects a function from the Hash function pool according to the current function code in itself, and generates a first domain number summary according to the domain number and the identification information of the terminal;

[0066] Step S303: Embedding the first domain number abstract into the reserved bit of the routing request message;

[0067] Step S305: sending a routing request message;

[0068] Step S307: the transit node receives the routing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses method, node and system of network access. The method comprises the following steps: a terminal generates a first domain number abstract according to the information includinga terminal domain number, carries the first domain number abstract in the route request message, and sends the route request message; a relay node receives the route request message, extracts the first domain number abstract, and generates a second domain number abstract according to the information including the relay node domain number; and when the first domain number abstract and the second domain number abstract are consistent, the relay node executes the forwarding of the route request message. By adding the domain information in the route request message and adding the judgment of the domain information in the route process, the invention prevents a non-signed user from using the network resource, and enables the node which relates to an AODV route protocol to become the node whichcan be managed and controlled by operators.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a network access method, node and system. Background technique [0002] Wireless self-organizing network (hereinafter referred to as Ad hoc network) is a new type of network, which can be dynamically configured in almost any environment without requiring other infrastructure. Compared with traditional networks, Ad hoc network has self-organizing, Features such as multi-hop routing and dynamic topology. The establishment of an Ad hoc network is automatically realized between terminals with the Ad hoc function. In the wireless broadband environment, Ad hoc application is also an important means for operators to realize the desire of "everywhere network". Through the Ad hoc network, users can extend access to parts that the base station cannot reach. Ad hoc network application is not common yet, but it will become an important part in the next generation network. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L12/56H04L12/721
Inventor 张云飞邓辉刘大鹏陈刚
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products