Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method, equipment and system of P2P (peer-to-peer) network

A technology of P2P network and network equipment, applied in the field of access authentication of P2P network, can solve the problems of heavy workload of PKI certificate management, complex access authentication method and mechanism, complicated key management work, etc., and achieve easy access authentication work. , convenient encryption and decryption, the effect of simplifying the process

Inactive Publication Date: 2013-08-14
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the prior art, the access authentication method of the P2P network has a complex mechanism. With the increasing communication between interconnected devices, the burden of PKI certificate management is becoming heavier and the key management work is becoming more and more serious. complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method, equipment and system of P2P (peer-to-peer) network
  • Access authentication method, equipment and system of P2P (peer-to-peer) network
  • Access authentication method, equipment and system of P2P (peer-to-peer) network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] In order to make the access authentication of the P2P network easier and simpler, the embodiment of the present invention provides an access authentication method of the P2P network. The network equipment in the P2P network adopts the IBC mechanism for access authentication. See figure 1 , the method includes:

[0035] 101: The local network device receives the access request sent by the peer network device. The access request carries the identity information of the peer network device and the first negotiation parameter. The identity information includes the identity of the peer network device and the private key of the peer network device. key level;

[0036] 102: According to the private key level of the local network device and the private key level of the peer network device, select one of the private keys of the local network device as the session private key of the local network device;

[0037] 103: Calculate the local network address based on the session priva...

Embodiment 2

[0041] In order to make the access authentication of the P2P network easier and simpler, the embodiment of the present invention provides an access authentication method of the P2P network, and the network equipment in the P2P network adopts the IBC mechanism to perform the access authentication.

[0042] Take Mesh as an example of a typical P2P network, see figure 2 , the preparations for the access authentication method of the P2P network include:

[0043] 201: Establish an IBC system.

[0044] (1) Generate system parameters by an offline trusted organization KGC (Key Generation Center, key distribution center) params = G 1 , G 2 , q , e ‾ , P , H 1 , H 2 , H > ...

Embodiment 3

[0150] In order to make the access authentication of the P2P network easier and simpler, the embodiment of the present invention provides an access authentication method of the P2P network, and the network equipment in the P2P network adopts the IBC mechanism to perform the access authentication. For the convenience of discussion, it is assumed that the local network device MPb has a private key Pri_Keyb, whose private key level is SN1, and the peer network device MPa has two private keys Pri_Keya0 and Pri_Keya1, whose private key levels are SN0 and SN1 respectively. The access authentication methods include, refer to Figure 4a , Figure 4b :

[0151] 401: Node MPb receives an access request sent by node MPa, where the access request includes: the identity of MPa, all private key levels, and first negotiation parameters corresponding to the private key levels.

[0152] The first negotiation parameter can be: (a×Pub_Keya), wherein, the first random number a is a random numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses access authentication method, equipment and system of a P2P (peer-to-peer) network, belonging to the technical field of network communication. Network equipment in the P2P network is subjected to access authentication by adopting an identity-based public key IBC (Information Bearer Channel) mechanism. The method comprises the following steps of: receiving an access requesttransmitted by opposite terminal network equipment by home terminal network equipment; selecting a private key from the private keys of the home terminal network equipment as a conversation private key of the home terminal network equipment according to the private key level of the home terminal network equipment and the private key level of the opposite terminal network equipment; calculating a conversation main key of the home terminal network equipment according to the conversation private key of the home terminal network equipment, the identity information of the opposite terminal networkequipment corresponding to the conversation private key of the home terminal network equipment, a first negotiation parameter and a second random number determined by the home terminal network equipment; and returning an access response to the opposite terminal network equipment. By utilizing the IBC mechanism, distributed access authentication under the P2P network mode is solved, thus the IBC mechanism is particularly suitable for the P2P network.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a P2P (Peer to Peer, peer-to-peer) network access authentication method, equipment and system. Background technique [0002] P2P network is a network that directly connects people and allows people to interact directly through the Internet. The P2P network gets rid of the traditional C (Client, client) / S (Server, server) mode of service, so that each user in the network can exchange data and make full use of the resources at the edge of the network. A typical P2P network is a wireless Mesh (mesh) network. The wireless Mesh network is composed of a group of MPs (Mesh Points, mesh network nodes) distributed in a mesh shape, and each MP is interconnected through a wireless relay link in a P2P manner. The multi-hop connection of the wireless Mesh network will become the development trend of the next-generation wireless communication network, which can provide users w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 江为强杨亚涛周元樊唱东辛阳李雪莲白媛谷勇浩
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products