Unlock instant, AI-driven research and patent intelligence for your innovation.

A device verification method and device

A verification method and equipment technology, applied in the network field, can solve problems such as damage to interests, and achieve the effect of avoiding counterfeit network equipment

Active Publication Date: 2020-09-18
NEW H3C TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, by using this verification method, unscrupulous merchants can make counterfeit network devices pass the verification by modifying the electronic labels stored in the flash chips of network devices, which damages the interests of other merchants.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device verification method and device
  • A device verification method and device
  • A device verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0036] In order to solve the above technical problems, embodiments of the present invention provide a device verification method and device applied to a registration server, and a device verification method and device applied to network devices. The network devices mentioned in the embodiments of the present invention may include: computers (personal computers or servers), hubs, switches, bridges, routers, gateways and the like. The device verification method appli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an equipment verification method and device. The method comprises the following steps: network equipment sends a certificate of its own to a register server, after verifying that the certificate is legal, the register server sends a public key to the network equipment, the network equipment uses the public key to encrypt unique identification information of its own, and sends the encrypted unique identification information to the register server; the register server uses a private key corresponding to the public key to decrypt the unique identification information, and matches the decrypted unique identification information with locally stored identification information, and the verification is passed if the matching is successful. Therefore, the register server can eliminate the illegal network equipment through three-layer protection: the certificate, the unique identification information and the public key / private key, and the condition of counterfeiting the network equipment can be effectively avoided.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a device verification method and device. Background technique [0002] With the continuous development of science and technology, network technology has been widely used, and the types and quantities of network equipment emerge in endlessly. Subsequently, counterfeiting of network equipment is becoming more and more serious. [0003] In order to avoid counterfeit network equipment, at present, the network equipment is generally verified through the electronic label stored in the flash chip of the network equipment. If the verification fails, it is a counterfeit equipment, and it is not allowed to realize various functions. But using this verification method, unscrupulous merchants can pass the verification of counterfeit network devices by modifying the electronic tags stored in the flash chips of the network devices, which damages the interests of other merchants. Contents o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0869H04L63/0876
Inventor 肖冰
Owner NEW H3C TECH CO LTD