Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for authentication between CPE and ACS based on MD5 algorithm

An algorithm and equipment technology, applied in the field of authentication between CPE and ACS based on the MD5 algorithm, it can solve the problems of non-universal applicability, security and increase equipment cost, and achieve the effect of saving process and labor, reducing cost and improving service life.

Pending Publication Date: 2022-03-04
SHENZHEN C-DATA TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies in the prior art, the present invention discloses a method for authentication between CPE and ACS based on the MD5 algorithm, to solve the problem of using the SSL / TLS layer to enhance the security of communication in the above-mentioned background technology to increase the cost of equipment, and at the same time because it is not universally applicable sexual problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authentication between CPE and ACS based on MD5 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The embodiment of the present invention provides an intelligent network diagnosis method based on the HGU home gateway, such as figure 1 Shown, below in conjunction with accompanying drawing, the present invention is described in further detail, comprises the following steps:

[0024] Step S1: The network terminal equipment (CPE) obtains the IP through the TR069 WAN connection; (after the TCP protocol interaction is completed);

[0025] Step S2: the server (ACS) authenticates the CPE; (matching the special node of the inform message, and generating a key after MD5 calculation of a default meaningful string of characters);

[0026] Step S3: if the authentication in step S2 is passed, enter the next step, otherwise return to step S7; (ACS replies to the InformResponse message Message node: whether the CPE is authenticated, and a string of default characters generates a key after MD5 calculation);

[0027] Step S4: The CPE authenticates the ACS (matching the Message key c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authentication between CPE and ACS based on an MD5 algorithm, and relates to the field of authentication methods. According to the method for authentication between the CPE and the ACS based on the MD5 algorithm, network terminal equipment (CPE) obtains an IP through TR069 WAN connection, and a server (ACS) authenticates the CPE; (matching an inform message special node, and generating a secret key through MD5 calculation of a set meaningful string of characters), if the authentication in the step S2 is passed, entering the next step, otherwise, returning to the step S7; (the ACS replies an InformResponse message Message node: whether the CPE passes the authentication or not, and a set string of characters are calculated by MD5 to generate a key). According to the authentication method between the CPE and the ACS based on the MD5 algorithm and the authentication method between the CPE and the ACS based on the MD5 algorithm, while the cost is relatively low and the method has general applicability, the problem that the security is insufficient when a server based on a TR069 protocol communicates with network terminal equipment is solved, and the risks that the server is easy to crack and communication contents are tampered or intercepted are avoided.

Description

technical field [0001] The invention relates to the technical field of authentication methods, in particular to an authentication method between a CPE and an ACS based on an MD5 algorithm. Background technique [0002] TR069 (CPE WAN management protocol) provides a general framework and protocol for managing and configuring home network devices in next-generation networks. Its protocol stack includes standard protocols such as SOAP, HTTP, SSL / TLS, and TCP / IP. When automatic configuration When establishing a connection between the server (ACS) and the network terminal equipment (CPE), you can choose to use the SSLTLS layer to enhance the security of the communication. [0003] At present, in the PON system communication network, as the mainstream network terminal equipment (ONU) in the market, it has developed to a relatively mature stage. For standard protocols such as SOAP, HTTP, SSL / TLS, and TCP / IP, the SSL / TLS layer is used to enhance communication. Security increases th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0869H04L63/0876
Inventor 陈凯
Owner SHENZHEN C-DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products