Authentication method, apparatus and system

An authentication method and authentication request technology, applied in the field of communication, can solve problems such as cumbersome process, lower system performance, and increase system burden, and achieve the effect of increasing performance and reducing burden

Active Publication Date: 2013-07-24
HUAWEI TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide an authentication method, device, and system, which solve the problem that when a terminal is replaced, the physical identification information of the replaced terminal may change accordingly, and the authentication device needs to authenticate the replaced terminal, and the process is relatively simple. It is cumbersome, increases the burden on the system, and then reduces the performance of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, apparatus and system
  • Authentication method, apparatus and system
  • Authentication method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0053] This embodiment provides an authentication method that can be applied to a P2MP point-to-multipoint system, such as figure 1 As shown, it may include: a central office device, an intermediate device, and at least one terminal device; the central office device is connected to at least one terminal device through an intermediate device, the central office device is connected to the intermediate device through a backbone physical line, and the intermediate devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides an authentication method, an apparatus and a system. The invention relates to the field of communication technology. The invention solves the problem that when the terminal is replaced, the physical identification information after replacing changes accordingly, the authentication apparatus carries out authentication of the terminal after replacing, and the process is very tedious, which increases the burden of the system and reduces the performance of the system. The concrete steps comprises: the terminal equipment sends an authentication request from intermediate equipment to central office terminal equipment; the terminal equipment receives the authentication response sent by the central office terminal equipment by the intermediate equipment, and the authentication response is carried out by the central office terminal equipment for the terminal equipment according to the authentication request and is returned after authentication. The invention can be applied to the authentication process of the terminal.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method, device and system. Background technique [0002] In the P2MP system, the authentication device needs to authenticate at least two terminals, and the terminal devices can communicate only after the authentication is passed. [0003] The method for the authentication device to authenticate the terminal device may include: [0004] 1. The terminal device sends the physical identification information of its own device to the authentication device. The physical identification information can be but not limited to: (Serial Number, serial number) or MAC (Media Access Controller, media access control layer) address, etc.; wherein, SN is used in GPON (Gigabit-capable Passive Optical Networks, G bit passive optical network), and MAC address is used in EPON (Ethernet Passive Optical Network, Ethernet passive optical network); [0005] 2. The authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04Q11/00
CPCH04L63/08
Inventor 张群
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products