Unlock instant, AI-driven research and patent intelligence for your innovation.

Identification network terminal authentication method and related equipment

A terminal authentication and identification network technology, which is applied in the field of identification network terminal authentication methods and related equipment, can solve problems such as poor security and low authentication efficiency

Active Publication Date: 2022-07-15
PENG CHENG LAB
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The main purpose of the present invention is to provide an identification network terminal authentication method and related equipment, aiming to solve the problems of low authentication efficiency and poor security in the authentication of digital certificates in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification network terminal authentication method and related equipment
  • Identification network terminal authentication method and related equipment
  • Identification network terminal authentication method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to make the objectives, technical solutions and effects of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0080] It will be understood by those skilled in the art that the singular forms "a", "an", "the" and "the" as used herein can include the plural forms as well, unless expressly stated otherwise. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of stated features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components and / or groups thereof. It will be understood that when we ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identification network terminal authentication method and related equipment. The method comprises the following steps: writing a terminal private key and a curve parameter group into all terminals; the sending end constructs the to-be-sent information into a first data packet according to the first access identifier and the second access identifier; the first access switching router constructs a second data packet according to the first routing identifier and the second routing identifier; the core router selects a corresponding forwarding path according to the second data packet; the second access switching router restores the second data packet into the first data packet; the receiving end generates a public key according to the first access identifier, the curve parameter group and a public key generation algorithm; the receiving end verifies the credibility of the first data packet by using the public key so as to determine whether to receive the first data packet. The sending end constructs the first data packet according to the first access identifier, and the receiving end performs verification according to the first access identifier, so that one-to-one encryption and decryption of the to-be-sent information are realized, and the security and efficiency of identification network terminal authentication are effectively improved.

Description

technical field [0001] The invention relates to the field of Internet technologies, and in particular, to a method for identifying network terminals and related equipment. Background technique [0002] The problem of IP address "ambiguity" in traditional networks (the destination external network and internal IP overlap) leads to poor network support for mobility and security protection capabilities. Continuous incremental patching increases the complexity of the network, and the limitations of traditional networks gradually increase. appear. [0003] It is a common solution to use digital certificates to authenticate users. Specifically, before users enter the network, they must first obtain a third-party CA (CA: Certification Authority, the Chinese name is a certificate issuing authority, which is responsible for issuing certificates and certifying certificates). , Manage Issued Certificates), and then use the digital certificate to construct the terminal's access address...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3247H04L63/0442
Inventor 郜帅孙嘉徽席铭辉曾颖罗莎莎
Owner PENG CHENG LAB