Method for binding of access terminal and operators

A technology for access terminals and operators, applied in user identity/authority verification, data exchange through path configuration, digital transmission system, etc., to achieve the effect of simple implementation, avoiding vicious competition, and not changing the networking mode

Inactive Publication Date: 2007-03-07
HUAWEI TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The purpose of the present invention is to provide a method for binding an access terminal to an operator to solve the problem of binding the access terminal to the operator that provides the access terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding of access terminal and operators
  • Method for binding of access terminal and operators

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Embodiment 1: Identifying the access network through private information in routing mode

[0049] In routing mode, PPPoE dialing is initiated by Modem. The Modem adds the custom option to the LCP message, randomly generates the Data string, and the BAS encrypts the Data field and sends it back to the Modem through a response message. The Modem encrypts the Data field with the agreed encryption algorithm, and then the Modem Compare the encrypted Data field with the Data field received from the BAS, and if the two are inconsistent, the link is torn down.

[0050] The following takes the PPP heartbeat message as an example to illustrate this process, and the process is shown in Figure 1.

[0051] 1. After the connection is established, the Modem sends a heartbeat message to the BAS, which carries a custom option, option TYPE=66, and randomly generated Data=123456;

[0052] 2. BAS encrypts 123456 to generate abcdef;

[0053] 3. The BAS returns a heartbeat response messag...

Embodiment 2

[0056] Embodiment 2: Identifying the access network through private information in bridge mode

[0057] In the bridging mode, the PPPoE dialing process is initiated by the PC, and a PPP detection point is added in the bridging process to intercept and analyze PPP packets. If it is uplink data, the Modem inserts extended parameters into the original message and sends it to the BAS for authentication. If it is downlink data, it will be verified by the Modem first, and then the extended parameters will be stripped off and sent to the PC.

[0058] Also take the heartbeat message as an example, the process is shown in Figure 2:

[0059] 1. The PC sends a heartbeat message to the BAS. If the Modem detects that it is a PPP message, it intercepts and analyzes it, inserts a custom option in the heartbeat message, option TYPE=66, randomly generated Data=123456, and then which is forwarded to the BAS;

[0060] 2. BAS encrypts 123456 to generate abcdef;

[0061] 3. The BAS returns a h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses one interface terminal and operator binding method, which comprises the following steps: a, local servo BAS receives message and adopts compact code formula to process private information and then through responding to coded private information to interface terminal; b, the said interface terminal adopts compact codes for private information and comparing the coded information with message coded information and if two is different then stopping dial flow or dismantle linkage.

Description

technical field [0001] The present invention relates to the technical field of xDSL (Digital Subscriber Line), and specifically relates to the binding technology of an access terminal and an operator in ADSL. Background technique [0002] The PPP (Point-to-Point Protocol) protocol provides a complete set of solutions to solve problems such as link establishment, maintenance, removal, upper-layer protocol negotiation, and authentication. The PPP protocol includes several parts: link control protocol LCP (Link Control Protocol), network control protocol NCP (Network Control Protocol) and authentication protocols, the most commonly used ones include password authentication protocol PAP (Password Authentication Protocol) and challenge handshake authentication protocol CHAP (Challenge-Handshake Authentication Protocol). [0003] A typical link establishment process is divided into three phases: establishment phase, authentication phase and network negotiation phase. [0004] LC...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L69/324H04L9/32H04L12/2872H04L63/08H04L12/2859H04L63/0428
Inventor 张科
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products