Unlock instant, AI-driven research and patent intelligence for your innovation.

DSN network authentication information request and storage method, SN-C nodes and system

A technology of authentication information and SN-C, applied in the network field, can solve problems such as user authentication failure and inapplicability to distributed network environments, achieve the effect of reducing authentication failures, reducing the risk of failure to authenticate and run, and improving user experience

Active Publication Date: 2011-03-30
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main defect of the AKA authentication scheme in the prior art is: the user can only be generated and sent by a specific HLR / HSS during authentication, and when the HLR / HSS fails, the user authentication will fail
In addition, the existing AKA mechanism is not suitable for P2P distributed network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DSN network authentication information request and storage method, SN-C nodes and system
  • DSN network authentication information request and storage method, SN-C nodes and system
  • DSN network authentication information request and storage method, SN-C nodes and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Such as figure 2 As shown, Embodiment 1 of the method for requesting DSN network authentication information of the present invention specifically includes the following steps:

[0030] (1) UE makes an access request when accessing the network, and sends the home server network information to the connected SN-C A ;

[0031] (2) SN-C A Determine whether the user's authentication information is saved locally, if yes, perform step (3); if not, perform step (4);

[0032] (3) SN-C A Directly initiate the authentication process to authenticate the UE;

[0033] (4) To the SN-C node SN-C that stores the user authentication information with the closest routing distance to the local node B request authentication information;

[0034] (5) SN-C B Return authentication information to SN-C A ;

[0035] (6) SN-C A Initiate an authentication request to the UE according to the authentication information;

[0036] (7) UE performs authentication according to the authentication ...

Embodiment 2

[0039] Such as image 3 As shown, Embodiment 2 of the method for requesting DSN network authentication information of the present invention specifically includes the following steps:

[0040] (1)-(3) are the same as the first embodiment of the request method, and will not be repeated here;

[0041] (4) SN-C A Determine whether other SN-C nodes storing the user authentication information closest to the local node routing distance are online, for example, in this embodiment, the node storing the user authentication information closest to the local node routing distance is SN-C B , to determine whether the SN-CB is online, if online, perform step (5); if not online, perform step (6);

[0042] (5) To SN-C B request authentication information;

[0043] (6) SN-C A Judging whether other SN-C nodes storing the user authentication information next closest to the local node routing distance are online, such as the SN-C in this embodiment H , if not online, then continue to search fo...

Embodiment 3

[0066] Such as Figure 5 As shown, the third embodiment of the SN-C node of the present invention also includes:

[0067] A timing module 314, configured to time the entire authentication process;

[0068] Comparison module 316, used to compare the time spent of the entire authentication process with the maximum time delay allowed by the DSN network;

[0069] The authentication module 308 returns authentication failure information when the duration of the entire authentication process exceeds the maximum time delay allowed by the DSN network.

[0070] In this embodiment, by limiting the time of the authentication process, it is possible to avoid the impact of too long authentication time on network operation and user experience.

[0071] System embodiment

[0072] Such as Image 6 As shown, the embodiment of the DSN network authentication system of the present invention includes

[0073] A number of SN-C nodes set in the loop, the SN-C node judges whether the local SN-C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a DSN (defense switched network) network authentication information request and storage method, SN-C (super node-core) nodes and a DSN network authentication system. The DSN network authentication information request method comprises the following steps of: judging whether the local SN-C node stores authentication information of a user according to the received user access request; when the local SN-C node stores authentication information of the user, directly initiating an authentication process; and when the local SN-C node does not store the authentication information of the user, requesting the authentication information for the other SN-C node which is closest to the local node routing distance and stores the user authentication information. In the DSN network authentication information request and storage method, the SN-C nodes and the DSN network authentication system, by distributed storage and authentication of the authentication information of the user, when one SN-C node fails, the authentication information can be acquired from the other SN-C nodes, and authentication failure and running risk caused by failure of a single authentication server are reduced.

Description

technical field [0001] The invention relates to a (Defense Switched Network, DSN for short) network technology, in particular to a DSN network authentication information request and storage method, an SN-C node and a DSN network authentication system. Background technique [0002] In the prior art, the single-key authentication mechanism scheme in the communication network is mainly based on the authentication and key agreement (authentication and key agreement, referred to as AKA) authentication scheme, and the user and the corresponding home server HLR / HSS store the pre-shared key key K; the user accesses the network through VLR / MME; VLR / MME applies for an authentication vector to HLR / HSS when detecting user access; HLR / HSS generates an authentication vector and feeds it back to VLR / MME; VLR / MME uses the authentication vector to authenticate the user Authenticate. [0003] The main defect of the AKA authentication scheme in the prior art is that the authentication vector ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/56H04L12/26
CPCH04W12/06H04L45/12
Inventor 齐旻鹏朱红儒吴琦
Owner CHINA MOBILE COMM GRP CO LTD