Calibration method and device

A verification method and message technology, applied in the field of communication, can solve problems such as ease of use and business security, failure, undiscovered solutions, etc., to improve practicability and user experience, reduce difficulty, and reduce engineering failures The effect of the probability

Active Publication Date: 2021-11-02
ZTE CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the business of various operators has been promoted on a large scale, and the frequency of using network management to open services in engineering is also increasing. In order to ensure the security of network management configuration business data and reduce business data security risks caused by insufficient design and misoperation, There is no complete security verification process for network management services in related technologies
[0003] Many single-NE configuration checks in related technologies are deployed on network management clients. This mode is only applicable to single-point configuration scenarios, but in northbound access or end-to-end management scenarios, these checks on the client If the verification rules are invalid, the command will be sent to the device to report an error, and the ease of use and business security are not easy to guarantee.
[0004] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Calibration method and device
  • Calibration method and device
  • Calibration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] In this embodiment, a verification method is provided, figure 1 is a flow chart of a verification method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:

[0029] Step S102, receiving a verification message;

[0030] Step S104, determine the verification type of the verification message, wherein the verification type includes one of the following: network element level verification, network level verification;

[0031] Step S106, verifying the verification message by using the verification type.

[0032] Through the above steps, by selecting two levels of service security verification at the network element level and the network level, the technical problem of low usability and service security in related technologies that can only be verified by the client is solved, and the improvement is improved. It not only improves the practicability and user experience, but also greatly reduces the probab...

Embodiment 2

[0050] In this embodiment, a verification device is also provided, which is used to implement the above embodiments and preferred implementation modes, and those that have been explained will not be repeated here. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0051] figure 2 is a structural block diagram of a verification device according to an embodiment of the present invention, such as figure 2 As shown, the device includes:

[0052] The receiving module 20 is used to receive the verification message;

[0053] The determination module 22 is used to determine the verification type of the verification message, wherein the verification type includes one of the following: network element level v...

Embodiment 3

[0058] This embodiment is an optional embodiment according to the present invention, and is used to describe the application in detail and supplementary in conjunction with specific examples:

[0059] This embodiment provides a service security verification mechanism and method. It is divided into single network element setting command verification and network level function verification. The client check sink adapter is only applicable to single-point setting commands. For client verification of network-level functions, it will sink to the server for verification.

[0060] The method of this embodiment includes:

[0061] Method 1: NE-level function verification (NE-level verification)

[0062] Many single-point configuration checks in related technologies are deployed on network management clients. This mode is not a big problem in normal single-point configuration scenarios, but in northbound access or end-to-end management scenarios, these The verification rules will fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a verification method and device, wherein the method includes: receiving a verification message; determining a verification type of the verification packet, wherein the verification type includes one of the following: a network element Level check, network level check; use the check type to check the check message. The invention solves the technical problem of low ease of use and low business security in the related art that only the client can be used for verification.

Description

technical field [0001] The present invention relates to the communication field, in particular to a verification method and device. Background technique [0002] At present, the business of various operators has been promoted on a large scale, and the frequency of using network management to open services in engineering is also increasing. In order to ensure the security of network management configuration business data and reduce business data security risks caused by insufficient design and misoperation, In the related art, there is no complete set of security verification process for the network management service. [0003] Many single-NE configuration checks in related technologies are deployed on network management clients. This mode is only applicable to single-point configuration scenarios, but in northbound access or end-to-end management scenarios, these checks on the client If the verification rules are not used, the error will be reported only after the command i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L41/28H04L43/50
Inventor 戚芳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products