Method and device for setting operation, administration and maintenance (OAM) security authentication

A technology of security authentication and identity authentication, which is applied in the field of OAM security authentication, can solve problems such as lack of security, protocol attacks, and failure to consider security, and achieve the effect of ensuring communication security and improving stability

Inactive Publication Date: 2013-01-02
SUZHOU CENTEC COMM CO LTD
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, the Y.1731 protocol itself does not consider security
And in real carrier networks, protocols that lack security can easily become targets of network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for setting operation, administration and maintenance (OAM) security authentication
  • Method and device for setting operation, administration and maintenance (OAM) security authentication
  • Method and device for setting operation, administration and maintenance (OAM) security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings of the present invention.

[0032] like figure 1 As shown, the method for setting OAM security authentication proposed by the present invention pre-defines a key for the network devices at both ends of the ME, and the key will not be transmitted in the network, but stored inside the device. Set an identity authentication TLV (Type Length Value) field in the OAM message sent by the network device at the ME end. The identity authentication TLV field includes an MD5 (Message-Digest Algorithm 5, information digest algorithm fifth edition ) value and sequenceID, the MD5 value is the MD5 value of the sender, which is the result of the "logical AND" operation between the sequenceID and the key in the OAM message.

[0033] When the network device at the other end of the ME receives the OAM message, it performs a "logic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for setting operation, administration and maintenance (OAM) security authentication. The method comprises the following steps of: pre-setting keys on network equipment at two ends of a maintenance entity, and when the network equipment at one end sends an OAM message, adding an identity checking threshold limit value (TLV) field into the sent OAM message, wherein the field comprises a sending end MD5 value, and the sending end MD5 value consists of a sequenceID field and key logic operation; when the network equipment at the other end of the ME, performing corresponding logic operation on the sequenceID field in the message and a locally preset key to obtain a receiving end MD5 value; and comparing the two MD5 values, and if the two MD5 values are the same, determining that the OAM message passes through the authentication, otherwise, abandoning the message. Therefore, the OAM communication security is guaranteed, and equipment for running a continuity fault management (CFM) protocol difficultly suffers from hostile attack of the Internet.

Description

technical field [0001] The invention relates to the technical field of computer communication, in particular to a method and a device for setting OAM security authentication in the CFM protocol of the computer network communication technology. Background technique [0002] According to the actual needs of the operator's network operation, the network management work is usually divided into three categories: operation (Operation), management (Administration), maintenance (Maintenance), referred to as OAM (Operation Administration and Maintenance). Operation mainly completes the analysis, prediction, planning and configuration of the daily network and services; maintenance mainly refers to the daily operation activities such as testing and fault management of the network and its services. [0003] CFM (Continuity Fault Management, connection fault management) based on Y.1731 has been widely used in carrier networks. According to the functional distinction of CFM, it can be di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 刘敬一
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products