Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network device and authentication and key management method thereof

A network device and key management technology, applied in the field of heterogeneous network integration, can solve the problems of different authentication and key management methods, waste of computing resources, etc., and achieve the effect of saving computing resources

Active Publication Date: 2014-01-01
ZTE CORP
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the main purpose of the present invention is to provide a network device and its authentication and key management method, to solve the different authentication and key management methods of various MAC layers in the prior art, resulting in the calculation of the authentication process The problem of wasting resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network device and authentication and key management method thereof
  • Network device and authentication and key management method thereof
  • Network device and authentication and key management method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions of the present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0054] Embodiment 1 of the present invention provides a network device authentication and key management method, such as figure 2 as shown,

[0055] mainly includes:

[0056] In step 201, the network device generates a network key (NK).

[0057] The network device can generate NK according to the obtained password key, which specifically includes: the user enters the password from the user interface of the network device, the length of the password cannot exceed the maximum length set by the user interface, and the network device inputs the password entered by the user into the Pseudo-random function is used to calculate and obtain NK with a fixed length.

[0058] In addition to obtaining NK through the user inputting a password, if the network device implements the function of simple security configuration accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network device and an authentication and key management method of the network device. The method includes the steps that the network device generates a network key (NK); authentication protocol interaction is performed on the network device and a communication opposite end device, and a basic session key (BSK) is obtained through calculation according to parameters of the authentication protocol interaction and the NK; according to the BSK calculation, the network device obtains link encryption keys (EK) used for media access control (MAC) layers and physical layers (PHY) of various access technologies, and all the EKs are provided for corresponding MAC layer functional modules and PHY functional modules respectively. Through the authentication and key management method of the network device, one-time authentication process is performed on the heterogeneous network device to verify the validity of the device, and the effect that uniform key management is performed on the various MAC layer technologies is achieved.

Description

technical field [0001] The invention relates to heterogeneous network fusion technology, in particular to a network device and its authentication and key management methods. Background technique [0002] At present, the home network can be accessed through a variety of network technologies, such as: Ethernet IEEE 802.3, power line communication (PLC, Power Line Communication), coaxial cable (MoCA, Multimedia over Coax Alliance) and wireless local area network (WiFi, Wireless Fidelity) technology And so on, each access technology corresponds to the physical (PHY) layer and media access control (MAC, Media Access Control) layer of the network system model. The integration of these heterogeneous network technologies is the basis for realizing home network information sharing and seamless connection. [0003] Such as figure 1 as shown, figure 1 It is a structural schematic diagram of heterogeneous network fusion in the prior art. Device 1 and Device 2 in the figure are home ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/32H04W12/04H04L9/0844H04L63/162H04L9/08H04W12/06H04W12/041H04W12/0431H04L9/0838H04L63/06H04L63/08
Inventor 梁琼文张伟良王琳张俊剑张德智张博山
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products