Identity authentication method and device

An identity authentication device and identity authentication technology, applied in the field of identity authentication methods and devices in network function virtualization systems, can solve problems such as low efficiency and inability to adapt to VNF, and achieve high efficiency

Active Publication Date: 2015-04-29
HUAWEI TECH CO LTD
View PDF5 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the VNF in the NFV system is dynamically changing, and the manual configuration of trusted identity credentials is inefficient and cannot adapt to the dynamically changing VNF

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] In Embodiment 1 of the present invention, the establishment of the VNF is initiated by the VNFM, such as figure 2 As shown, the VNFM generates all the configuration information required to establish the VNF, the configuration information includes the public key and private key of the OMU-VNFC, and the public key and private key of the SER-VNFC.

[0064] The public key and the private key are a key pair obtained by an algorithm. Among the two keys of the key pair, the non-secret key is called the public key, and the secret key is called the private key. When using this key pair, if the data is encrypted with the public key, it must be decrypted with the private key, and if the data is encrypted with the private key, it must be decrypted with the public key, otherwise the decryption will not succeed.

[0065] VNFM puts the identification information and private key of OMU-VNFC, the identification information and public key of SER-VNFC into OMU-VNFC, and puts the identifi...

Embodiment 2

[0072] In Embodiment 2 of the present invention, the establishment of the VNF is initiated by the EMS, such as image 3 shown.

[0073] When EMS initiates the establishment of VNF, EMS does not need to participate in the generation of public key and private key, and VNFM still generates the public key and private key of OMU-VNFC, and the public key and private key of SER-VNFC. The subsequent insertion steps can be Refer to the above-mentioned embodiment 1; at this time, the execution body of the identity authentication method provided by the embodiment of the present invention is VNFM.

[0074] Or, EMS can also participate in the generation of public key and private key, that is, the public key and private key of OMU-VNFC and the public key and private key of SER-VNFC are generated by EMS, and the public key and private key of OMU-VNFC generated by EMS will be The private key, and the public key and private key of the SER-VNFC are sent to the VNFM, and the VNFM is instructed ...

Embodiment 3

[0076] In Embodiment 3 of the present invention, the establishment of VNF is initiated by NFVO, such as Figure 4 As shown, NFVO may not participate in the generation of public key and private key, and VNFM still generates the public key and private key of OMU-VNFC, and the public key and private key of SER-VNFC. The subsequent insertion steps can refer to the above-mentioned embodiment 1 .

[0077] That is, in Embodiment 3, the execution body of the identity authentication method provided by the embodiment of the present invention is VNFM.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and device which are applied to an NFV system and can adapt to the dynamic change of the system. The NFV system comprises a VNF which comprises a first VNFC and a second VNFC. The identity authentication method comprises the steps that a public key and a private key of the first VNFC and a public key and a private key of the second VNFC are generated; the private key of the first VNFC and the public key of the second VNFC are written into or sent to the first VNFC; the public key of the first VNFC and the private key of the second VNFC are written into or sent to the second VNFC; the public key and the private key of the first VNFC and the public key and the private key of the second VNFC are used for identity authentication of the first VNFC and the second VNFC.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity authentication method and device applied to a Network Function Virtualization (Network Function Virtualization, NFV) system. Background technique [0002] The virtual network function (Virtual Network Function, VNF) is the core part of the NFV system, and each VNF includes multiple VNF components (VNF Component, VNFC), and the communication between each VNFC is realized through the internal virtual network. Since the communication between each VNFC in the VNF passes through the virtual network, in order to avoid security risks such as information leakage, fake communication, and tampering of communication content, identity authentication is required when initially establishing communication between two VNFCs. [0003] In the prior art, trusted identity credentials are usually configured on each VNFC in a manual configuration manner, and identity authent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08G06F9/45558H04L63/0869G06F2009/45587G06F2009/45595H04L9/40H04L9/3226H04L63/0442H04L63/061
Inventor 王江胜林青春
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products