Authority authentication method and authority information processing method and device

A technology of authority authentication and communication device, which is applied in the field of communication and can solve problems such as network equipment being unable to connect to authority control servers

Pending Publication Date: 2022-06-24
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In some scenarios, such as when the device is deployed and the network is not connected, the network device cannot connect to the authority control server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority authentication method and authority information processing method and device
  • Authority authentication method and authority information processing method and device
  • Authority authentication method and authority information processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The embodiments of the present application provide a rights authentication method, rights information processing method and device, which can determine whether a peer communication device supports a certain network function.

[0104] For ease of understanding, possible application scenarios of the embodiments of the present application are first introduced.

[0105] see Figure 1a , which is a schematic diagram of an exemplary application scenario. like Figure 1a As shown, communication between the communication device 101 and the communication device 102 is possible. Before the communication device 101 and the communication device 102 need to cooperate to implement the network function a, the communication device 101 can determine whether the communication device 102 supports the network function a, and correspondingly, the communication device 102 can determine whether the communication device 101 supports the network function a. If the communication device 101 dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a permission authentication method, which can send own service permission information to an opposite-end communication device before two communication devices establish a service connection, and the two communication devices respectively verify whether the opposite-end communication device has the permission of establishing the service connection based on the received permission information. By adopting the scheme, whether the opposite-end communication device has the authority of establishing the service connection or not can be effectively and efficiently determined.

Description

technical field [0001] The present application relates to the field of communications, and in particular, to a rights authentication method, a method and device for processing rights information. Background technique [0002] At present, when two communication devices establish a service connection, such as establishing an Internet Protocol Security (IPSec) tunnel, establishing a Border Gateway Protocol (Border Gateway Protocol, BGP) session, it is necessary to verify the legitimacy of the identity of the communication device at the opposite end and whether there is a Authority to establish related business. In the existing solution, the network administrator can separately configure the two communication devices for establishing a service link, and confirm the identity and authority of the communication devices in an artificial manner. But the way of human configuration is unreliable, low security and inefficient. Another existing solution uses the local identity certific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/0823H04L63/0435
Inventor 吴迪张轶炯潘伟
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products