Identification distribution and separate-storage method, identification replacing transmission method and system

A technology of separate storage and identification distribution, which is applied in the field of network security, can solve problems such as increased terminal switching delay, redundant identification functions, and affecting seamless roaming effects, and achieves the effect of improving security protection capabilities

Inactive Publication Date: 2010-06-23
THE PLA INFORMATION ENG UNIV
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current access authentication and communication process of heterogeneous wireless networks, the problem of terminal identification redundancy is relatively serious: for the case where the terminal identification and address identification are combined, for example, the IP address simultaneously identifies the identity and address of the terminal, Will cause redundancy in the identification function
In order to solve the redundancy of the identification function, the identity identification and address identification functions of the terminal can be separated. For example, the IP address is only used as the address identification of the terminal, and the identity of the terminal is identified by IMSI, terminal name, etc., but in the live network is usually The identity and address of the terminal, the real identity and the ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification distribution and separate-storage method, identification replacing transmission method and system
  • Identification distribution and separate-storage method, identification replacing transmission method and system
  • Identification distribution and separate-storage method, identification replacing transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] see figure 1 , the embodiment of the present invention provides a method for identification allocation and separate storage.

[0090] S101: Divide the heterogeneous wireless network into a user domain, an access domain, a service domain, and a home domain according to service functions, wherein the service domain includes at least one access domain, and the access domain includes at least one user domain, and when serving locally , the home domain and the service domain are the same network.

[0091] in:

[0092] User domain: mainly intelligent terminals (including identity mapping service modules), which can access different access networks, such as 3G, WLAN, WiMAX, etc. The terminal identifier RID of the terminal in this domain is its real identity.

[0093] Access domain: mainly base stations, wireless access points, access servers, identity mapping servers and other entities that access the network. This domain assigns an access domain identifier (AID) to each t...

Embodiment 2

[0103] see figure 2 , the embodiment of the present invention provides a method for identification allocation and separate storage.

[0104] S201: Divide the heterogeneous wireless network into a user domain, an access domain, a service domain, and a home domain according to service functions, wherein the service domain includes at least one access domain, and the access domain includes at least one user domain, and when serving locally , the home domain and the service domain are the same network.

[0105] Usually, the heterogeneous wireless network is pre-divided, and there is no need to re-divide the heterogeneous wireless network every time identity allocation is performed.

[0106] S202: The terminal initiates an authentication request, where the authentication request includes the terminal real identity identifier RID and initial HID.

[0107] The initial HID is assigned to the terminal by the home domain when the terminal subscribes to the home domain.

[0108] Prefer...

Embodiment 3

[0156] see Figure 8 , the embodiment of the present invention also provides a method for implementing identifier replacement transmission based on the above identifier allocation and separate storage method, including:

[0157] S801: When a data packet needs to be sent, send a data packet including a known domain identifier of the destination domain to the destination domain;

[0158] S802: When the data packet is received, analyze the domain identifier in the data packet to verify its authenticity; if the data packet needs to be forwarded, after the verification is successful, use the pre-stored domain identifier mapping relationship to obtain the known target domain Domain ID, replace the current domain ID in the data packet with the known domain ID of the target domain, and forward it.

[0159] In practical applications, the data packet may be sent from the terminal to the home domain, or between any two domains, which is not limited in the embodiment of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identification distribution and separate-storage method, an identification replacing transmission method and system, relating to the field of network safety. The identification distribution and separate-storage method comprises the following steps of: dividing a heterogeneous wireless network by function into a user domain, an access domain, a service domain and an attribution domain, wherein the service domain comprises at least one access domain, the access domain comprises at least one user domain, and the attribution domain and the service domain are the same network when in local service; and after the successful authentication of a terminal, allocating the attribution domain, the service domain and the access domain with domain identifications domain by domain. Based on the access authentication of the heterogeneous wireless network, the invention provides a mechanism of the identification distribution, the separate storage and the replacing transmission of the identification. In the transmission process of the domain identification in the user domain, the access domain, the service domain and the attribution domain, the real identity and the location information of a terminal can be effectively concealed through the retrieval and the replacement among domains and the dynamic update at different identification mapping servers, thereby enhancing the credible access of the heterogeneous wireless network and the safety protection capacity on mobility problems.

Description

technical field [0001] The present invention relates to the field of network security, in particular to an identifier distribution and separate storage method, an identifier replacement transmission method and a system. Background technique [0002] With the rapid development of mobile communication technology, many wireless networks have been standardized and commercialized, such as 3G, WLAN, WiMAX and so on. However, these networks are basically a mode in which the network supports a major service. They have different coverage areas and bandwidths, and have their own network architecture and access authentication technology, and it is difficult to replace each other for a while. Therefore, under the general use and high-quality service requirements, the integration between heterogeneous networks is quite important. On the basis of the existing wireless communication facilities, general intelligent terminals can be used to access various network platforms to meet different...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08H04W12/0431H04W12/069
Inventor 赵华黄开枝王玉红张晨杨红杰李桥龙许明艳郭淑明张汝云彭建华杨梅樾
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products