Safety management method of network comprehensive switch on equipment

A technology for access equipment and security management, applied in data exchange networks, user identity/authority verification, digital transmission systems, etc., can solve problems such as cost accounting, soft switch equipment attacks, and inability to manage IAD uniformly, and achieve management efficiency High, security assurance, the effect of preventing illegal and counterfeit equipment from accessing the network

Inactive Publication Date: 2004-05-05
HUAWEI TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large number of IAD devices, it is impossible to use the network management station to directly manage the IAD in a unified manner, and can only conduct indirect management through the IAD management system (IADMS)
The current management is usually realized through the media gateway control protocol (MGCP protocol or H248 protocol), which is specifically reflected in the business registration. Since the MGCP protocol has no security authentication mechanism in the application layer, and the H248 protocol has security authentication in the application layer mechanism, but this mechanism needs to add a security header to each H248 protocol transaction request, and return the security authentication result in its transaction ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety management method of network comprehensive switch on equipment
  • Safety management method of network comprehensive switch on equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In the current network structure, the management of the IAD is implemented by the IADMS, and the SoffSwitch completes the security authentication and service control of the IAD. The IAD can manage the IAD only after completing the management registration with the IADMS and the service registration with the SoftSwitch respectively.

[0018] An example of a specific IAD security management method provided by the present invention includes the following processes:

[0019] 1. Account opening process: Before using the IAD, the user must open an account with the operator, and write the necessary information such as the device identification code in the IAD as the basis for realizing security management;

[0020] 2. Service registration process: After IAD completes the management registration, it registers the service with SoftSwitch, and the service can be used after the verification is passed;

[0021] 3. Periodic authentication process: During the normal use of services b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Based on H.248 and MGCP protocols, the method realizes authentication of safety service between networked integrated access device (IAD) and soft exchange equipment. When IAD opens an account, device id code, authorized cipher key, IP address of IADMS or domain name of IAD are configured on IAD. Meanwhile, an authorized cipher key is setup to the soft equipment. In registering procedure, based on IP address of the soft equipment, IAD sends registering information including transaction ID, and device id code to the soft equipment. With registering information sent from IAD being received, the soft equipment determines whether the IAD is a legal IAD based on the registering information. If not, the registration is refjected; otherwise, based on registering information, procedure of validating authority is carried out. MOde of extended packet of standard protocol is adopted in the scheme so that it is compatible to current mode, providing good safety and high efficiency.

Description

technical field [0001] The invention relates to a security management method for network equipment. Background technique [0002] In NGN (Next Generation Network), there are many integrated access devices (IADs), these devices are distributed in enterprises or users' homes, and have the characteristics of wide area, large quantity and dynamic IP-based. Due to the large number of IAD devices, the unified management of the IAD cannot be directly managed by the network management station, and can only be managed indirectly through the IAD management system (IADMS). The current management is usually realized through the media gateway control protocol (MGCP protocol or H248 protocol), which is embodied in the aspect of service registration. Since the MGCP protocol has no security authentication mechanism in the application layer, the H248 protocol has security authentication in the application layer. However, this mechanism needs to add a security header to each H248 protocol tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/24H04L12/26H04L29/06
Inventor 罗兵张忠唐建刚马剑飞魏强
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products