Verificating method and device

An implementation method and authentication information technology, which is applied in the direction of selection device, user identity/authority verification, radio/inductive link selection arrangement, etc., can solve the problems of poor authentication security, etc.

Inactive Publication Date: 2006-11-01
HUAWEI TECH CO LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Therefore, the existing authentication methods mainly rely on the confiden...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verificating method and device
  • Verificating method and device
  • Verificating method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The core of the method of the present invention is: acquiring the location information of the user terminal, and authenticating the user terminal according to the location information and the predetermined location information corresponding to the user terminal.

[0046] The technical solution provided by the present invention will be further described below based on the core idea of ​​the present invention.

[0047] Since the PON technology uses TDMA (Time Division Multiple Access) technology in the uplink, in order to make full use of the bandwidth, various PON technologies have applied the measurement distance technology to compensate for the distance difference between each PON user terminal and the central office OLT equipment. The realization principle of the distance measurement function in PON is attached figure 2 shown.

[0048] exist figure 2 Among them, the difference between T1 and T2 is the RTT (turnback time) value of the user terminal, and the RTT value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The key-ideal of the invention is: getting the location information about user end; in term of the obtained location information and predetermined location information corresponding to the user end, making authentication for the use end. The invention uses parameters currently existed in PON technology such as RTT value used in the authentication process for user end in order to provide security protection for legal user end and avoid the usage of network resource by illegal user end.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method and device for realizing authentication. Background technique [0002] In the broadband access network, the bandwidth capacity of SONET / SDH / GE (Synchronous Optical Network / Synchronous Digital Hierarchy / Gigabit) of the metropolitan core network and the metropolitan edge network is very sufficient, while the access network part has serious bandwidth Bottleneck problem. [0003] Compared with cable transmission, optical fiber transmission has the advantages of large capacity, low loss, and strong anti-electromagnetic interference. With the gradual decline in the cost of optical fiber transmission, the fiberization of the access network part is an inevitable trend in the development of the access network. [0004] The access network segment representing the "last mile" needs to have the characteristics of ultra-low cost, simple structure, and easy implementati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04Q7/38
Inventor 高海
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products