Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Terminal security legality verification method

A verification method and terminal security technology, applied in the field of ad hoc networks, to achieve the effects of high work efficiency, simple algorithm, and improved compatibility

Pending Publication Date: 2021-11-26
陕西能源职业技术学院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the disadvantages of mutual verification of legitimacy between existing terminals and network equipment, and to provide a system with reasonable design, simple algorithm, high work efficiency, and increased cohesiveness and security for users. terminal security legitimacy verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal security legality verification method
  • Terminal security legality verification method
  • Terminal security legality verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be described in further detail below with reference to the drawings and examples, but the present invention is not limited to the following embodiments.

[0017] exist figure 1 Among them, a method for verifying the validity of terminal security in this embodiment consists of the following steps:

[0018] S1. Verify the status of the software flag switch

[0019] The operation of step S2 is performed in the "on" state, and the operation in "off" state is performed according to the normal process stipulated in the international agreement;

[0020] S2. Define the user name part of the service routing message in the 200 OK signaling that the boundary session controller or proxy call session control entity responds to the user terminal is obtained by encoding the branch parameter in the Via header field through the MD5 algorithm;

[0021] The realization of the content of the user name in the service routing message header in the 200 OK signalin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal security legality verification method. The method comprises the following specific steps: firstly, verifying a software flag bit switch state; defining that a user name part of a service routing message in a 200OK signaling of a boundary session controller or a proxy call session control entity responding to a user terminal is obtained by coding a branch parameter in a Via header field through an MD5 algorithm; and after a user terminal receives the successfully registered 200 OK signaling, coding a branch parameter in the Via header field by an MD5 algorithm and then comparing the same with the user name part of the service routing message by using an encryption mapping algorithm, returning registration success if the coded Branch parameter is consistent with the user name part of the service routing message, or returning network authentication failure if the coded Branch parameter is not consistent with the user name part of the service routing message, and sending a logout message to logout the user. According to the method, the application field of the IMS equipment is expanded, the compatibility of the equipment and the sensing of the service used by the user terminal are improved, the original processing flow of the equipment is not influenced, and the method has the advantages of being simple in algorithm, high in working efficiency and capable of increasing the adhesiveness and the safety of the use of the user.

Description

technical field [0001] The invention belongs to the technical field of ad hoc networks, and in particular relates to a method for verifying the validity of terminal security. Background technique [0002] With the rapid development of the Internet, more and more people pay attention to the information security of terminals and networks, and the requirements for terminal security and network security are getting higher and higher. To better protect the existing investment and subsequent benefits, it is necessary to solve the mutual verification of the legitimacy between the terminal and the network equipment. [0003] At present, the existing encryption process requires special encryption equipment and encryption algorithm to generate the key. The encryption algorithm is complex and the process of generating the key is cumbersome, which requires a lot of resources to complete, and an encryption channel is established during the data encryption transmission process. The key i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/03H04W12/06H04W12/08G06F21/44G06F21/64H04L9/06H04L9/32
CPCH04W12/03H04W12/068H04W12/08G06F21/44G06F21/64H04L9/0643H04L9/3239
Inventor 马维孝杨润柏吕斌张旭华
Owner 陕西能源职业技术学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products