Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method, equipment and system of P2P (peer-to-peer) network

A technology of P2P network and network equipment, which is applied in the field of access authentication of P2P network, can solve the problems of complex key management work, heavy burden of certificate management work, complex access authentication method and mechanism, etc., and achieve simplified process and access authentication The effect of easy work and simple key management

Inactive Publication Date: 2010-08-25
HUAWEI TECH CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the access authentication method of the P2P network has a complex mechanism. With the increasing communication between interconnected devices, the burden of PKI certificate management is becoming heavier and the key management work is becoming more and more serious. complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method, equipment and system of P2P (peer-to-peer) network
  • Access authentication method, equipment and system of P2P (peer-to-peer) network
  • Access authentication method, equipment and system of P2P (peer-to-peer) network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

Embodiment 2

Embodiment 3

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses access authentication method, equipment and system of a P2P (peer-to-peer) network, belonging to the technical field of network communication. Network equipment in the P2P network is subjected to access authentication by adopting an identity-based public key IBC (Information Bearer Channel) mechanism. The method comprises the following steps of: receiving an access requesttransmitted by opposite terminal network equipment by home terminal network equipment; selecting a private key from the private keys of the home terminal network equipment as a conversation private key of the home terminal network equipment according to the private key level of the home terminal network equipment and the private key level of the opposite terminal network equipment; calculating a conversation main key of the home terminal network equipment according to the conversation private key of the home terminal network equipment, the identity information of the opposite terminal networkequipment corresponding to the conversation private key of the home terminal network equipment, a first negotiation parameter and a second random number determined by the home terminal network equipment; and returning an access response to the opposite terminal network equipment. By utilizing the IBC mechanism, distributed access authentication under the P2P network mode is solved, thus the IBC mechanism is particularly suitable for the P2P network.

Description

technical field The present invention relates to the field of communication technology, in particular to a P2P (Peer to Peer, peer-to-peer) network access authentication method, equipment and system. Background technique P2P network is a network that directly connects people and allows people to interact directly through the Internet. The P2P network gets rid of the traditional C (Client, client) / S (Server, server) mode of service, so that each user in the network can exchange data and make full use of the resources at the edge of the network. A typical P2P network is a wireless Mesh (mesh) network. The wireless Mesh network is composed of a group of MPs (Mesh Points, mesh network nodes) distributed in a mesh shape, and each MP is interconnected through a wireless relay link in a P2P manner. The multi-hop connection of the wireless Mesh network will become the development trend of the next-generation wireless communication network, which can provide users with truly ubiqui...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06H04L29/06H04L29/08H04W84/18
Inventor 江为强杨亚涛周元樊唱东辛阳李雪莲白媛谷勇浩
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products