WO2013034056A1 - Procédé et système pour traiter des informations de localisation - Google Patents
Procédé et système pour traiter des informations de localisation Download PDFInfo
- Publication number
- WO2013034056A1 WO2013034056A1 PCT/CN2012/080518 CN2012080518W WO2013034056A1 WO 2013034056 A1 WO2013034056 A1 WO 2013034056A1 CN 2012080518 W CN2012080518 W CN 2012080518W WO 2013034056 A1 WO2013034056 A1 WO 2013034056A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- location information
- bng
- aaa server
- radius
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
Definitions
- the present invention relates to the field of communications, and in particular, to a location information processing method and system. Background technique
- the Residential Gateway connects the home network with the external network to provide connectivity, master control and coordination for the home network.
- the International Standards Organization Broadband Forum (BBF) is working on the standardization of home gateway and home terminal equipment certification.
- the scenarios involved include the authentication process of home terminal equipment accessing the BBF network through RG.
- the RG initiates access authentication to the AN (Access Node).
- the AN acts as the 802.1x authenticator and the Remote Authentication Dial In User Service (RADIUS).
- the good end initiates an authentication request to the AAA (Authentication Authorization Accounting, Authentication, Authorization, and Accounting) server.
- AAA Authentication Authorization Accounting, Authentication, Authorization, and Accounting
- the authentication request message sent by the AN to the AAA server does not carry the location information of the RG, and the user equipment (UE) under the RG initiates a dynamic host allocation protocol (DHCP) to the BNG (Broadband Network Gateway).
- DHCP dynamic host allocation protocol
- the BNG local or AAA server does not have the location information of the UE (the location information of the UE accessing the network through the RG is the same as the location information of the RG), but in fact the location information has been authenticated in the RG authentication process.
- the DHCP request initiated by the UE fails the authentication and cannot be accessed. This is obviously not conducive to normal communication of the UE.
- the location information of a user has been authenticated, the user may still need to be authenticated again in the subsequent communication process.
- the UE communication process is complicated. Summary of the invention
- the main object of the present invention is to provide a location information processing method and system to avoid repeated authentication of a UE.
- a location information processing method includes:
- the home gateway RG acts as an 802.1x client and initiates an authentication request.
- the access node AN acts as the 802. lx authenticator and the remote authentication dial-up user service RADIUS client, inserts the location information of the RG into the authentication request received, and sends it to the authentication, authorization, and accounting AAA server.
- the process of inserting the location information of the RG into the received authentication request and sending the information to the AAA server includes:
- the location information of the RG is inserted into the received authentication request, and the authentication request that has been inserted into the RG location information is encapsulated into a RADIUS packet, and the RADIUS packet is sent to the AAA server.
- the method further includes:
- the AAA server authenticates the RG and saves the location information of the RG when the authentication is passed.
- the method further includes:
- the broadband network gateway BNG perceives the RADIUS packet exchanged between the AN and the AAA server, if the RG passes the authentication, the BNG saves the location information of the RG;
- the AAA When the BNG does not perceive the RADIUS protocol of the AN and the AAA server, if the RG passes the authentication, the AAA notifies the location information of the RG to the BNG corresponding to the RG; and/or, when the BNG receives the When the authentication request or the address request of the UE accessed by the RG does not have the authentication information of the UE locally, the AAA server queries the AAA server.
- the location information of the RG is a link identifier.
- a location information processing system including RG, AN; wherein
- the RG is used as an 802.1x client to initiate an authentication request.
- the AN is used as an 802.1x authenticator and a RADIUS client, and inserts the location information of the RG into the received authentication request, and sends the location information to the AAA server.
- the AN inserts the location information of the RG into the received authentication request and sends it to the AAA server for:
- the location information of the RG is inserted into the received authentication request, and the authentication request that has been inserted into the RG location information is encapsulated into a RADIUS packet, and the RADIUS packet is sent to the AAA server for reference for subsequent authentication.
- the AAA server is further configured to:
- the RG is authenticated and the location information of the RG is saved when the authentication is passed.
- system further includes BNG;
- the BNG When the BNG perceives the RADIUS packet exchanged between the AN and the AAA server, the BNG is used to: if the RG passes the authentication, save the location information of the RG;
- the BNG When the BNG does not perceive the RADIUS protocol of the AN interacting with the AAA server, the BNG is used to:
- the BNG corresponding to the RG receives the location information of the RG notified by the AAA; and/or,
- the BNG When the BNG receives the authentication request or the address request from the UE accessed by the RG, if there is no authentication information of the UE locally, the BNG queries the AAA server.
- the location information of the RG is a link identifier.
- the location information processing technology of the present invention enables the UE that has passed the location information to be authenticated without re-authentication in the subsequent communication process, thereby avoiding repeated authentication of the UE and simplifying the communication process.
- the location information of the RG is also associated with the authentication, the security of the authentication can be further enhanced, and problems such as illegal access can be better avoided.
- FIG. 1 is a flowchart of position information processing according to Embodiment 1 of the present invention.
- FIG. 2 is a flow chart of position information processing according to Embodiment 2 of the present invention.
- Embodiment 3 is a flowchart of location information processing according to Embodiment 3 of the present invention.
- Embodiment 4 is a flowchart of location information processing according to Embodiment 4 of the present invention.
- FIG. 5 is a schematic diagram of a process of processing location information according to an embodiment of the present invention. detailed description
- the RG can be used as an 802.1x client to initiate an authentication request.
- the AN as an 802.1x authenticator and a RADIUS client, inserts the location information of the RG into the received authentication request, and inserts the location into the RG.
- the authentication request of the information is encapsulated into a RADIUS packet, and the RADIUS packet is sent to the AAA server for use as a reference for subsequent authentication.
- the location information of the RG may be a link ID.
- the AAA server can authenticate the RG and save the location information of the RG when the authentication is passed.
- the BNG receives the authentication request or the address request of the UE connected to the RG, if there is no authentication information of the UE locally, such as the UE. Location information), then query the AAA server.
- the RADIUS protocol of the AN interacting with the AAA server can pass the BNG, and the BNG has the capability to obtain the location information of the RG. If the RG passes the authentication, the BNG saves the location information of the RG. Specifically, if the RG is authenticated, the AAA server can notify the location information of the RG to the BNG corresponding to the RG.
- Figure 1 depicts the RG as the authentication access process of the 802.1x client.
- the location information of the RG inserted into the RG is sent to the AAA server via the BNG, and the BNG senses the RG authentication process.
- the process shown in Figure 1 includes the following steps:
- RG acts as an 802.1x client, attaches to the Ethernet, and initiates the authentication protocol (EAPoL) Start) to ask for authentication.
- EAPoL authentication protocol
- the AN After receiving the EAPoL Start message sent by the RG, the AN sends an EAP Identity Request message to the RG to notify the RG to report the user name.
- the RG After receiving the EAP Identity Request message sent by the AN, the RG sends an EAP Identity Response message to the AN, which carries the user name.
- the AN encapsulates the received EAP Identity Response message into the RADIUS Access Request message and inserts the location information corresponding to the RG, such as the link ID (Line ID) / line ID (Line ID). For example: the virtual LAN ID (vlan-id) and the Layer 2 port number of the switch port to which the RG is connected. After that, the AN sends a RADIUS Access Request packet to the BNG.
- the BNG acts as the RADIUS proxy (RADIUS proxy) and is aware of the RG authentication process. That is, the BNG can read the RG location information and other parameters. Further, the BNG sends a RADIUS Access Request message to the AAA server.
- RADIUS proxy RADIUS proxy
- the AAA server replies to the authentication access response (RADIUS Access Response) message to the challenge (Challenge d
- the BNG forwards the received RADIUS Access Response packet to the AN.
- the AN unblocks the EAP packet from the received RADIUS Access Response packet and sends the EAP packet to the RG.
- the RG After receiving the EAP packet sent by the AN, the RG replies to the AN, which carries the Challenged Password.
- the AN After receiving the RG reply, the AN encapsulates the EAP packet into a RADIUS Access Request packet and sends it to the BNG.
- the BNG forwards the received RADIUS Access Request message to the AAA server. 12. If the RG passes the authentication, the AAA server replies to the authentication access accept (RADIUS Access Accept) The message is sent to the BNG. If the RG fails to pass the authentication, the AAA server replies to the RADIUS Access Reject message to the BNG.
- the BNG saves the location information of the RG, such as the link identifier/line identifier, for example: the vlan-id and the layer 2 port number of the switch port connected to the RG.
- the BNG sends a RADIUS Access Request message to the AN. If the RG authentication fails, the BNG forwards the RADIUS Access Reject packet to the AN.
- the authentication protocol is successfully sent to the RG. If the RG authentication fails, the authentication protocol failure packet is sent to the RG.
- Figure 2 depicts the RG as the authentication access process of the 802.1x client.
- the location information of the AN inserted into the RG is sent to the AAA server.
- the process shown in Figure 2 includes the following steps:
- the RG attaches to the Ethernet and initiates an authentication protocol start message to request authentication.
- the AN After receiving the EAPoL Start message sent by the RG, the AN sends an authentication protocol ID request message to the RG to notify the RG to report the user name.
- the RG After receiving the EAP Identity Request message sent by the AN, the RG returns the authentication protocol ID response message to the AN, which carries the user name.
- the AN encapsulates the received EAP Identity Response packet into the authentication access request packet, and inserts the location information corresponding to the RG, such as the link identifier/line identifier. For example: vlan of the switch port connected by the RG Id and Layer 2 port number. After that, the AN sends the RADIUS Access Request packet to the AAA server.
- the AAA server replies to the authentication access response packet to the AN, which carries the EAP challenge.
- the AN unblocks the EAP packet from the received RADIUS Access Response packet and sends the EAP packet to the RG.
- the RG After receiving the EAP packet sent by the AN, the RG replies to the AN, which carries the pick Battle password.
- the AN After receiving the RG reply packet, the AN encapsulates the EAP packet into a RADIUS Access Request packet and sends it to the AAA server.
- the AAA server saves the location information of the RG, such as the link identifier/line identifier. For example, the vlan-id and the Layer 2 port number of the switch port connected to the RG.
- the AAA server replies to the authentication access accept message to the AN. If the RG fails to pass the authentication, the AAA server replies to the authentication access reject message to the AN.
- the AN unblocks the EAP packet. If the RG authentication succeeds, the EAP Success packet is sent to the RG. If the RG authentication fails, the EAP-Failure packet is sent to the RG.
- FIG. 3 illustrates a process in which a UE connected to the RG initiates a DHCP request, in which the BNG to the AAA server queries whether the location information of the UE is legal.
- the process shown in Figure 3 includes the following steps:
- the UE sends a broadcast DHCP Discovery (Discover) message on the physical subnet to find an available DHCP server.
- Discover broadcast DHCP Discovery
- the AN receives the DHCP Discover message from the UE and inserts the DHCP option (Option) 82.
- This option contains the location information of the UE, such as the link identifier. For example: vlan-id and Layer 2 of the switch port connected to the RG. The port number is forwarded to the BNG.
- the BNG If there is no authentication information of the UE locally, the BNG queries the AAA server. The BNG sends a RADIUS Access Request packet to the AAA server, where the packet carries the location information of the user. Specifically, the BNG converts the Option 82 option to the network access server port identifier.
- NAS-Port-ID (representing the physical location information of the UE, which is an attribute parameter of the Radius message).
- the AAA server determines that the location information of the UE has been authenticated (refer to the process of FIG. 2: the RG authentication process, and the RG and the UE have the same location information)
- the RADIUS is sent to the BNG. Access Accept message; if the UE is not authenticated, it will reply to the authentication access reject message to the BNG.
- the BNG sends a DHCP Discover message to the DHCP server. If the authentication fails, the BNG sends a reject message to the UE through the AN, and the process ends.
- the DHCP server After the DHCP server receives the DHCP Discover message, it is equivalent to receiving the IP lease request from the BNG for the DHCP server. Therefore, the DHCP server provides an IP lease and reserves the IP address for the UE, and then replies to the BNG with a DHCP response (DHCP). Offer ) A packet carrying an IPv4 address.
- the BNG After receiving the DHCP Offer message replied by the DHCP server, the BNG forwards it to
- the AN replies to the UE with a DHCP Offer message, which carries an IPv4 address.
- the UE sends a DHCP Request message to the AN and all other DHCP servers, where the IP of the DHCP server providing the IP lease is used to inform all other DHCP servers that the UE has accepted the IP lease.
- the AN forwards the DHCP Request message received from the UE to the BNG.
- the BNG sends a DHCP Request message to the DHCP server.
- the DHCP server replies with a DHCP acknowledgment (DHCPAck) message to the BNG.
- DHCPAck DHCP acknowledgment
- the BNG replies to the DHCP Ack packet to the AN.
- the AN replies to the DHCP Ack message to the UE.
- Figure 4 depicts the RG as the authentication access process of the 802.1x client.
- the AN inserts the location information of the RG and sends it to the AAA server. If the RG passes the authentication, the AAA server notifies the BNG of the location information of the RG.
- the process shown in Figure 4 includes the following steps:
- the RG attaches to the Ethernet and initiates an authentication protocol start message to request authentication.
- the AN After receiving the EAPoL Start message sent by the RG, the AN sends an authentication protocol ID request message to the RG to notify the RG to report the user name. 3. After receiving the EAP Identity Request message sent by the AN, the RG returns the authentication protocol ID response message to the AN, which carries the user name.
- the AN encapsulates the received EAP Identity Response packet into the authentication access request packet, and inserts the location information corresponding to the RG, such as the link identifier/line identifier. For example: vlan of the switch port connected by the RG Id and Layer 2 port number.
- the AN RADIUS Access Request packet is sent to the AAA server.
- the AAA server replies to the authentication access response packet to the AN, which carries the EAP challenge.
- the AN unblocks the EAP packet from the received RADIUS Access Response packet and sends the EAP packet to the RG.
- the RG After receiving the EAP packet sent by the AN, the RG replies to the AN, and the packet carries the challenge password.
- the AN After receiving the RG reply packet, the AN encapsulates the EAP packet into a RADIUS Access Request packet and sends it to the AAA server.
- the AAA server sends the location information of the RG (such as the link identifier/line identifier, for example, the vlan-id and the Layer 2 port number of the switch port connected to the RG) to the BNG. Specifically, the AAA server finds the corresponding BNG according to the link information or other static configuration information.
- the AAA server replies to the authentication access accept message to the AN. If the RG fails to pass the authentication, the AAA server replies to the authentication access reject message to the AN.
- the authentication protocol is successfully sent to the RG. If the RG authentication fails, the authentication protocol failure packet is sent to the RG.
- the operation of the present invention for processing location information may represent a process as shown in FIG. 5, and the process includes the following steps:
- Step 510 The RG acts as an 802.1x client and initiates an authentication request.
- the authentication request may be in various forms, such as: at least one of the first three steps shown in FIG. 2, such as the start of the authentication protocol. Messages.
- Step 520 The AN, as the 802.1x authenticator and the RADIUS client, inserts the location information of the RG into the received authentication request, and sends the location information to the AAA server. Specifically, the authentication request that has been inserted into the RG location information is encapsulated into a RADIUS packet, and the RADIUS packet is sent to the AAA server for reference for subsequent authentication.
- the location information of the RG may be a link identifier or the like.
- the system includes the RG and the AN, and the foregoing technical content implemented by the RG and the AN.
- the location information processing technology of the present invention enables the UE whose location information has been authenticated to pass through, and does not need to be used again in the subsequent communication process. Authentication eliminates repeated UE authentication and simplifies the communication process. In addition, since the location information of the RG is also associated with the authentication, the security of the authentication can be further enhanced, and problems such as access to the method can be better avoided.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé et un système pour traiter des informations de localisation. Une passerelle résidentielle (RG), servant de client 802.1x, lance une requête d'authentification (510). Un nœud d'accès (AN), servant de dispositif d'authentification 802.1x et de client RADIUS (Remote Authentication Dial In User Service - service d'authentification distante des utilisateurs entrants), insère les informations de localisation de la RG dans la demande d'authentification reçue et envoie la demande d'authentification à un serveur d'authentification, autorisation et comptabilisation (AAA) (520) auquel on se référera pour les authentifications ultérieures. Au moyen de la technologie de traitement d'informations de localisation de la présente invention, un équipement d'utilisateur dont les informations de localisation ont réussi l'authentification n'a pas besoin d'être à nouveau authentifié lors d'un traitement de communication ultérieur, ce qui évite de répéter l'authentification de l'équipement d'utilisateur et simplifie le processus de communication. De plus, étant donné que les informations de localisation d'une RG sont associées au moment où a lieu l'authentification, la sécurité de l'authentification s'en trouve encore renforcée, ce qui permet de résoudre encore mieux les problèmes tels que ceux des accès illégaux.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110268183.1 | 2011-09-09 | ||
| CN201110268183.1A CN103001927B (zh) | 2011-09-09 | 2011-09-09 | 一种位置信息处理方法和系统 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013034056A1 true WO2013034056A1 (fr) | 2013-03-14 |
Family
ID=47831521
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2012/080518 Ceased WO2013034056A1 (fr) | 2011-09-09 | 2012-08-23 | Procédé et système pour traiter des informations de localisation |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN103001927B (fr) |
| WO (1) | WO2013034056A1 (fr) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20160065575A1 (en) * | 2013-04-28 | 2016-03-03 | Zte Corporation | Communication Managing Method and Communication System |
| WO2020034378A1 (fr) * | 2018-10-12 | 2020-02-20 | Zte Corporation | Signalement d'emplacement pour dispositifs mobiles |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101022460A (zh) * | 2007-03-06 | 2007-08-22 | 华为技术有限公司 | 一种认证方法和系统 |
| CN101350726A (zh) * | 2007-07-20 | 2009-01-21 | 中兴通讯股份有限公司 | 基于dsl绑定的用户管理方法 |
| CN101442800A (zh) * | 2008-12-23 | 2009-05-27 | 深圳华为通信技术有限公司 | 一种终端业务发放的方法、系统和终端 |
| CN101447976A (zh) * | 2007-11-26 | 2009-06-03 | 华为技术有限公司 | 动态ip会话接入的方法、系统及装置 |
| US20100122338A1 (en) * | 2008-11-11 | 2010-05-13 | Hitachi, Ltd. | Network system, dhcp server device, and dhcp client device |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4352728B2 (ja) * | 2003-03-11 | 2009-10-28 | 株式会社日立製作所 | サーバ装置、端末制御装置及び端末認証方法 |
| CN101043331A (zh) * | 2006-06-30 | 2007-09-26 | 华为技术有限公司 | 一种为网络设备分配地址的系统和方法 |
| CN101442516B (zh) * | 2007-11-20 | 2012-04-25 | 华为技术有限公司 | 一种dhcp认证的方法、系统和装置 |
-
2011
- 2011-09-09 CN CN201110268183.1A patent/CN103001927B/zh not_active Expired - Fee Related
-
2012
- 2012-08-23 WO PCT/CN2012/080518 patent/WO2013034056A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101022460A (zh) * | 2007-03-06 | 2007-08-22 | 华为技术有限公司 | 一种认证方法和系统 |
| CN101350726A (zh) * | 2007-07-20 | 2009-01-21 | 中兴通讯股份有限公司 | 基于dsl绑定的用户管理方法 |
| CN101447976A (zh) * | 2007-11-26 | 2009-06-03 | 华为技术有限公司 | 动态ip会话接入的方法、系统及装置 |
| US20100122338A1 (en) * | 2008-11-11 | 2010-05-13 | Hitachi, Ltd. | Network system, dhcp server device, and dhcp client device |
| CN101442800A (zh) * | 2008-12-23 | 2009-05-27 | 深圳华为通信技术有限公司 | 一种终端业务发放的方法、系统和终端 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN103001927B (zh) | 2018-06-12 |
| CN103001927A (zh) | 2013-03-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11395143B2 (en) | Network access method and apparatus and network device | |
| US7624181B2 (en) | Techniques for authenticating a subscriber for an access network using DHCP | |
| CN100366007C (zh) | 用于在无线局域网接入的基于sim的鉴权和加密的系统、设备和方法 | |
| EP1330073B1 (fr) | Méthode et dispositif pour contrôler l'accès d'un terminal sans fil dans un réseau de communication | |
| US20080092213A1 (en) | Method, system and server for realizing secure assignment of dhcp address | |
| CN101977187B (zh) | 防火墙策略分发方法、客户端、接入服务器及系统 | |
| US7861076B2 (en) | Using authentication server accounting to create a common security database | |
| WO2014117525A1 (fr) | Procédé et service de gestion de l'authentification d'un terminal utilisateur statique | |
| CN101471936A (zh) | 建立ip会话的方法、装置及系统 | |
| WO2014101449A1 (fr) | Procédé pour contrôler un point d'accès dans un réseau local sans fil, et système de communication | |
| WO2013056619A1 (fr) | Procédé, idp, sp et système pour la fédération d'identités | |
| WO2014169240A1 (fr) | Enregistrement d'adresse de protocole internet | |
| CN101621433B (zh) | 接入设备的配置方法、装置及系统 | |
| CN100583759C (zh) | 实现不同认证控制设备间同步认证的方法 | |
| JP2001326696A (ja) | アクセス制御方法 | |
| WO2012142867A1 (fr) | Procédé et système d'authentification de notification | |
| CN1658553B (zh) | 一种采用公开密钥密码算法加密模式的强鉴别方法 | |
| WO2009079896A1 (fr) | Procédé d'authenfication d'accès utilisateur fondé sur un protocole de configuration d'hôte dynamique | |
| WO2013034056A1 (fr) | Procédé et système pour traiter des informations de localisation | |
| CN101365238B (zh) | 一种会话转换的方法及装置 | |
| CN102577299B (zh) | 简化的接入网认证信息承载协议 | |
| CN100428667C (zh) | 一种采用公开密钥密码算法数字签名模式的强鉴别方法 | |
| JP2006019934A (ja) | パケット交換網の呼設定方法 | |
| CN100490375C (zh) | 一种基于对称密码算法的强鉴别方法 | |
| CN100546305C (zh) | 一种点到点协议强制认证方法和装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12829550 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12829550 Country of ref document: EP Kind code of ref document: A1 |