Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network device and its authentication and key management method

A network device and key management technology, applied in the field of heterogeneous network integration, can solve the problems of different authentication and key management methods, waste of computing resources, etc., and achieve the effect of saving computing resources

Active Publication Date: 2017-06-13
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the main purpose of the present invention is to provide a network device and its authentication and key management method, to solve the different authentication and key management methods of various MAC layers in the prior art, resulting in the calculation of the authentication process The problem of wasting resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network device and its authentication and key management method
  • A network device and its authentication and key management method
  • A network device and its authentication and key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions of the present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0054] Embodiment 1 of the present invention provides a network device authentication and key management method, such as figure 2 as shown,

[0055] mainly include:

[0056] In step 201, the network device generates a network key (NK).

[0057] The network device can generate NK according to the obtained password key, which specifically includes: the user enters the password from the user interface of the network device, the length of the password cannot exceed the maximum length set by the user interface, and the network device inputs the password entered by the user into the Pseudo-random function is used to calculate and obtain NK with a fixed length.

[0058] In addition to obtaining NK through the user inputting a password, if the network device implements the function of simple security configuration accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a network equipment and an authentication and key management method for the same. The network equipment generates a Network Key (NK); the network equipment performs authentication protocol interaction with opposite communication equipment, and calculates a Basic Session Key (BSK) according to parameters for the authentication protocol interaction and the NK; and the network equipment calculates link Encryption Keys (EKs) used respectively for Media Access Control (MAC) and Physical (PHY) layers using various access technologies according to the BSK, and provides the EKs for respective MAC and PHY layer function modules. With the disclosure, the legality of the equipment is verified by performing an authentication process on the heterogeneous network equipments in one pass, and keys in various MAC layer technologies are managed in a unified way.

Description

technical field [0001] The invention relates to heterogeneous network fusion technology, in particular to a network device and its authentication and key management methods. Background technique [0002] At present, the home network can be accessed through a variety of network technologies, such as: Ethernet IEEE 802.3, power line communication (PLC, Power Line Communication), coaxial cable (MoCA, Multimedia over Coax Alliance) and wireless local area network (WiFi, Wireless Fidelity) technology And so on, each access technology corresponds to the physical (PHY) layer and media access control (MAC, Media Access Control) layer of the network system model. The integration of these heterogeneous network technologies is the basis for realizing home network information sharing and seamless connection. [0003] like figure 1 as shown, figure 1 It is a structural schematic diagram of heterogeneous network fusion in the prior art. Device 1 and Device 2 in the figure are home net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0844H04L63/162H04W12/06H04W12/041H04W12/0431H04L9/08H04L9/0838H04L63/06H04L63/08
Inventor 梁琼文张伟良王琳张俊剑张德智张博山
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products