CN108702622A - Mobile network's access authentication method, device, storage medium and block chain node - Google Patents

Mobile network's access authentication method, device, storage medium and block chain node Download PDF

Info

Publication number
CN108702622A
CN108702622A CN201780006171.7A CN201780006171A CN108702622A CN 108702622 A CN108702622 A CN 108702622A CN 201780006171 A CN201780006171 A CN 201780006171A CN 108702622 A CN108702622 A CN 108702622A
Authority
CN
China
Prior art keywords
block chain
user equipment
authentication
certificate server
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780006171.7A
Other languages
Chinese (zh)
Inventor
李强
谢辉
王健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Inc
Original Assignee
Cloudminds Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Inc filed Critical Cloudminds Inc
Publication of CN108702622A publication Critical patent/CN108702622A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

A kind of mobile network's access authentication method, device, storage medium and block chain node, to solve the relatively low technical problem of existing mobile network's access authentication technique reliability.The method certificate server, certificate server are the nodes in block chain network, and this method includes:The certification request that user equipment is sent is received, certification request includes the first block chain address and identity information;Block chain is inquired according to the first block chain address, determines whether block chain stores the authentication information being consistent with identity information, wherein the support system of mobile network, will be in the authentication information write-in block chain of user equipment in user equipment registration;When being stored with the authentication information being consistent with identity information in block chain, user equipment is authenticated based on identifying algorithm, wherein if certification success, show that the user equipment is the target UE that the identity information indicates.

Description

Mobile network's access authentication method, device, storage medium and block chain node
Technical field
This disclosure relates to information technology field more particularly to a kind of mobile network's access authentication method, device, storage medium And block chain node.
Background technology
Currently, the access authentication of mobile network is controlled by the operator of mobile network, by taking 4G networks as an example, connect Entering identifying procedure is specially:(Home Subscriber Server, ownership signing are used by operators issue SIM card, SIM card and HSS Family server) in prestore symmetric key, when SIM card user equipment is attached to mobile network, MME (Mobility Management Entity, mobile management entity) to HSS transmission authentication information requests, HSS generates authentication using symmetric key Collection (including random number and desired challenge responses XRES) is simultaneously sent to MME, and MME carries random to the transmission of SIM card user equipment Several authentication requests, and receive user terminal challenge of the SIM card user equipment based on the symmetric key and generating random number to prestore and ring RES is answered, if the user terminal challenge responses RES received is consistent with the expectation challenge responses XRES that authentication is concentrated, access authentication Success.
By above-mentioned flow it is found that the server that HSS is disposed as subregion centralization, if it goes wrong and stops taking Business, will cause user equipment that ownership place is the regions HSS can not access to mobile network, influence mobile network's access authentication can By property.
Invention content
It is a general object of the present disclosure to provide a kind of mobile network's access authentication method and devices, to solve existing mobile network The relatively low technical problem of reliability caused by being disposed due to centralization in network access technology.
To achieve the goals above, disclosure first aspect provides a kind of mobile network's access authentication method, the method Applied to certificate server, the certificate server is the node in block chain network, the method includes:
The certification request that user equipment is sent is received, the certification request includes that the first block chain address and identity are believed Breath;
The block chain is inquired according to the first block chain address, determines whether the block chain stores and the identity The authentication information that information is consistent, wherein the support system of mobile network is in user equipment registration, by the body of user equipment In part verification information write-in block chain, if being stored with the authentication information being consistent with the identity information in the block chain, Then show the target UE of the identity information expression in mobile network register;
When being stored with the authentication information being consistent with the identity information in the block chain, it is based on identifying algorithm pair The user equipment is authenticated, wherein if certification success, shows that the user equipment is the mesh that the identity information indicates Mark user equipment.
Disclosure second aspect provides a kind of mobile network's access authentication method, and the method is applied to user equipment, institute It is the node in block chain network to state user equipment, the method includes:
Certification request is sent to certificate server, the certification request includes the first block chain address and identity information, The first block chain address and the identity information confirm the target that the identity information indicates for the certificate server Whether user equipment is in mobile network register;
Confirming that target UE that the identity information indicates after the mobile network register, calculated based on certification Method completes the authentication to the user equipment with the certificate server, wherein if certification success, shows the user Equipment is the target UE that the identity information indicates.
The disclosure third aspect provides a kind of mobile network's access authentication device, and described device is applied to certificate server, The certificate server is the node in block chain network, and described device includes:First receiving module, for receiving user equipment The certification request of transmission, the certification request include the first block chain address and identity information;Enquiry module, for according to institute It states the first block chain address and inquires the block chain, determine whether the block chain stores the identity being consistent with the identity information Verification information, wherein the authentication information of user equipment is written in user equipment registration for the support system of mobile network In block chain, if being stored with the authentication information being consistent with the identity information in the block chain, show the identity The target UE that information indicates is in mobile network register.
First authentication module, for being stored with the authentication information being consistent with the identity information in the block chain When, the user equipment is authenticated based on identifying algorithm, wherein if certification success, shows the user equipment for institute State the target UE of identity information expression.
Disclosure fourth aspect provides a kind of mobile network's access authentication device, and described device is applied to user equipment, institute It is the node in block chain network to state user equipment, and described device includes:
Second sending module, for sending certification request to certificate server, the certification request includes the first block chain Address and identity information, the first block chain address and the identity information confirm the body for the certificate server Whether the target UE that part information indicates is in mobile network register;
Second authentication module, for confirming the target UE of the identity information expression in the mobile network After registration, the authentication to the user equipment is completed based on identifying algorithm and the certificate server, wherein if certification at Work(then shows that the user equipment is the target UE that the identity information indicates.
The 5th aspect of the disclosure provides a kind of non-transitorycomputer readable storage medium, and the non-transitory computer can It includes one or more programs to read storage medium, and one or more of programs are for executing described in disclosure first aspect Method.
The 6th aspect of the disclosure provides a kind of block chain node, including:
Non-transitorycomputer readable storage medium described in the 5th aspect of the disclosure;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
The 7th aspect of the disclosure provides a kind of non-transitorycomputer readable storage medium, and the non-transitory computer can It includes one or more programs to read storage medium, and one or more of programs are for executing described in disclosure second aspect Method.
Disclosure eighth aspect provides a kind of block chain node, including:
Non-transitorycomputer readable storage medium described in the 7th aspect of the disclosure;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
Using above-mentioned technical proposal, block chain is written in mobile network register by inquiring user equipment for certificate server Authentication information verifying user equipment whether in mobile network register, and confirm user equipment in mobile network register Afterwards, user equipment is authenticated based on identifying algorithm, in this way, what the decentralization of block chain can be disposed to avoid centralization HSS goes wrong and access authentication is caused to be affected, and improves the reliability of mobile network's access authentication.
Other feature and advantage of the disclosure will be described in detail in subsequent specific embodiment part.
Description of the drawings
In order to illustrate more clearly of the embodiment of the present disclosure or technical solution in the prior art, embodiment will be described below Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be the present invention some realities Example is applied, it for those of ordinary skill in the art, without creative efforts, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of stream for mobile network's access authentication method applied to certificate server that the embodiment of the present disclosure provides Cheng Tu;
Fig. 2 is a kind of flow for mobile network's access authentication method applied to user equipment that the embodiment of the present disclosure provides Figure;
Fig. 3 is a kind of flow chart of the certificate server that provides of the embodiment of the present disclosure to the method for user equipment certification;
Fig. 4 is a kind of flow chart of the user equipment that provides of the embodiment of the present disclosure to the method for certificate server certification;
Fig. 5 is a kind of schematic diagram for implementation environment that the embodiment of the present disclosure provides;
Fig. 6 is a kind of flow diagram for mobile network's access authentication method that the embodiment of the present disclosure provides;
Fig. 7 is a kind of knot for mobile network's access authentication device applied to certificate server that the embodiment of the present disclosure provides Structure schematic diagram;
Fig. 8 is mobile network's access authentication device that the another kind that the embodiment of the present disclosure provides is applied to certificate server Structural schematic diagram;
Fig. 9 is a kind of structure for mobile network's access authentication device applied to user equipment that the embodiment of the present disclosure provides Schematic diagram;
Figure 10 is mobile network's access authentication device that the another kind that the embodiment of the present disclosure provides is applied to user equipment Structural schematic diagram;
Figure 11 is a kind of structural schematic diagram for block chain node that the embodiment of the present disclosure provides;
Figure 12 is the structural schematic diagram for another block chain node that the embodiment of the present disclosure provides.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the embodiment of the present disclosure clearer, below in conjunction with the embodiment of the present disclosure In attached drawing, the technical solution in the embodiment of the present disclosure is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In order to make those skilled in the art be easier to understand the technical solution of embodiment of the present disclosure offer, first below to relating to And to the relevant technologies simply introduced.
Block chain is the decentralization distributed data base system for being participated in safeguarding jointly by all nodes in block chain network, It is by a series of data chunks generated based on cryptography method at each data block is a block in block chain. According to the sequencing of generation time, block is linked together in an orderly manner, forms a data chain, is visually known as area Block chain.Block chain is generated by its special block and transaction, indentification protocol can not be forged, can be traced completely with that can not change Security feature.
The related notion explanation arrived involved in block chain technology:
Block chain node:Block chain network is based on P2P (Peer to Peer, peer-to-peer network) network, each participates in business All it is the node in a block chain network with block storage, the P2P network nodes verified, forwarded.
User identity:User identity in block chain is indicated using public key, and public key and private key occur in pairs, In, private key is grasped by user without being published in above-mentioned block chain network, and public key after specific Hash and coding by becoming " address ", " address " represents user, and public key and " address " can arbitrarily issue in block chain network.It is worth mentioning It is that one-to-one relationship is not present in user identity and block chain node, and user can use on any one block chain node The private key of oneself.
Block chain data are written:Block chain node to block chain network publication " transaction " (Transaction) by realizing Data are written to block chain.Signature of oneself private key to transaction is used comprising user in transaction, to prove the identity of user.Transaction The new block of generation is recorded by " miner " (the block chain node for executing PoW block chains common recognition competition mechanism), is then published to Block chain network, and by other block chain node verifications by the way that with after receiving, transaction data is written into block chain.
The embodiment of the present disclosure is based on block chain technology and provides a kind of mobile network's access authentication method, and this method is applied to recognize Server is demonstrate,proved, as shown in Figure 1, this method includes:
In step S101, the certification request that user equipment is sent is received, which includes the first block chain address And identity information.
In step s 102, block chain is inquired according to the first block chain address, determines whether stored in block chain and identity The authentication information that information is consistent.
Wherein, certificate server is the node in block chain network, is stored with the block chain being made of multiple blocks, each Block is for storing information, it is ensured that the certificate server at least has the function of participating in block chain query.
In addition, user equipment can be noted by the support system of mobile network in mobile network before access to mobile network Volume, wherein the support system of mobile network is the node in block chain network, is stored with the block chain being made of multiple blocks, Each block is for storing information, it is ensured that the support system at least has the function of participating in the transaction of block chain.User equipment Registration process is:Its authentication information is sent to support system by user equipment, which may include user Address of the public key and user equipment of equipment in block chain network, support system test the identity of the user equipment received Card information is written in block chain, in this way, the block chain address based on user equipment can inquire the category stored in block chain All information under the user equipment account may further determine whether stored in all information under the account and identity The authentication information that information is consistent.In addition, the system of support can also send the starter node bootnode information of block chain To user equipment, block chain network is accessed so that user equipment is based on block chain agreement according to the bootnode information.
In a kind of possible realization method of the embodiment of the present disclosure, mobile network can be only allowed in the block chain network The authentication information of user equipment is written into block chain for the support system of network or other nodes of the support system authorization, For example, the block chain can be a license chain, Mobile Network Operator can license to node trusty and be carried for user equipment For registration service.
The authentication information of user equipment itself may include the public key of user equipment itself, IMSI The letters such as (International Mobile Subscriber Identity, international mobile subscriber identity), ownership place, state Breath.Then the identity information of user equipment can be the IMSI of user equipment.Illustratively, it is it with the identity information of user equipment IMSI illustrates, and certificate server inquires block chain according to the first block chain address, exists under the first block chain address if inquiring The IMSI of the user equipment and IMSI is effective, then can determine user equipment in mobile network register.
Optionally, if the block chain address in the certification request that certificate server is sent according to user equipment does not inquire area There is the authentication information that is consistent with the identity information in certification request in block chain or inquire present in block chain with When the authentication information that identity information in certification request is consistent is invalid, then show the user equipment not in mobile network register Or it is canceled, thus can be with certification request described in refusal respond.
In step s 103, it when being stored with the authentication information being consistent with identity information in determining block chain, is based on Identifying algorithm is authenticated user equipment, wherein if certification success, shows that the user equipment is the mesh that identity information indicates Mark user equipment.
When being stored with the authentication information being consistent with identity information in determining block chain, certificate server can be based on recognizing Algorithm is demonstrate,proved, interacting completion with user equipment is authenticated user equipment, avoids the user not in mobile network register Equipment puppet emits the identity information access to mobile network of the user equipment in mobile network register.
In this way, the technical solution provided using the embodiment of the present disclosure, due to node (such as existing skill without disposing centralization HSS in art) access authentication is participated in, therefore can be to avoid centralization node stops service and causes user equipment that can not access shifting The problem of dynamic network, occurs, and improves the reliability of access authentication.Meanwhile it can be with the complexity of center of reduction node.
The embodiment of the present disclosure also provides a kind of mobile network's access authentication method, and this method is applied to user equipment, such as Fig. 2 Shown, this method includes:
In step s 201, to certificate server send certification request, certification request include the first block chain address and Identity information, the first block chain address and identity information confirm the target UE that identity information indicates for certificate server Whether in mobile network register.
In step S202, confirming that target UE that identity information indicates after mobile network register, is based on Identifying algorithm completes the authentication to user equipment with certificate server, wherein if certification success, shows the user equipment The target UE indicated for identity information.
Wherein, user equipment can be connected to certificate server according to attachment flow, and according to starter node information, pass through area Block chain link agreement is connected to block chain network for example, by using the mode of light node protocol or RPC.
It is worth noting that in existing mobile network's attachment flow, it is that can not access that user equipment, which does not complete certification, Mobile network's, to also cannot connect in block chain network.It therefore, in order to solve this problem, in the present invention, can be by area Block chain node is deployed in core net, and gives tacit consent to network communication energy of the open user equipment to the block chain node in core net Power.
In addition, user equipment is completed in the registration process of mobile network and based on identifying algorithm and certificate server to it The process of authentication is referred to the description to Fig. 1 mobile network's access authentication methods provided, and details are not described herein again.
In order to avoid the user key for the HSS storages being susceptible in symmetric encipherment algorithm in the prior art is lost and cause The safety problem that user equipment is counterfeited, in the embodiment of the present disclosure, certificate server and user equipment can be based on it is asymmetric plus Close algorithm carries out two-way authentication, i.e., user equipment is authenticated including certificate server and user equipment to certificate server into Row certification.Next, the two certifications are described in detail by specific embodiment.
In one possible implementation, the identity information of user equipment may include the first public key (i.e. user equipment The public key of oneself).Correspondingly, as shown in figure 3, certificate server is authenticated method to user equipment, including:
In step S301, certificate server sends the first authentication challenge to user equipment, and the first authentication challenge includes the One random number.
In step s 302, user equipment is signed according to its first random number of private key pair, obtains the first signing messages.
In step S303, the first authentication challenge response including the first signing messages is sent to certification and taken by user equipment Business device.
In step s 304, certificate server carries out signature verification according to first the first signing messages of public key pair.
Using the above method, user equipment is in mobile network register by the support system of mobile network by its public key (the first public key) is written in block chain, and certificate server is inquired block chain according to the first block chain address of user equipment and can be obtained To first public key.In this way, certificate server after obtaining the first public key, can send user equipment according to first public key The first signing messages carry out signature authentication, can determine that the user equipment of request certification has been grasped and the if signature authentication success Thus the corresponding private key of one public key can be shown that the user equipment is the target UE that identity information indicates.
Since the information being written in block chain has the characteristic that can not be distorted, so that certificate server can be according to true Real believable first public key, whether verifying user equipment is that its identity information indicates target UE, to ensure that user Equipment can not pretend to be.
In alternatively possible embodiment, the certification request that user equipment is sent can also include the second random number, Correspondingly, as shown in figure 4, user equipment includes to the method that certificate server is authenticated:
In step S401, certificate server is signed according to its second random number of private key pair, obtains the second A.L.S. Breath.
In step S402, certificate server is by the second block chain including the second signing messages and certificate server The second authentication challenge response of location is sent to user equipment.
In step S403, user equipment inquires the public key of certificate server according to the second block chain address from block chain And signature verification is carried out to the second signing messages.
Wherein, the public key of certificate server can also be that block chain, example is written by support system in mobile network register As certificate server firstly generates the private key and public key that occur in pairs, and pass through public key is passed through it is raw after specific Hash and coding At the second block chain address.Wherein, private key is grasped by their own without being published in network, and it includes it to be sent to the system of support When support system receives the second certification request block chain is written in the public key of certificate server by the second certification request of public key In, certificate server just completes the registration of block chain network as a result,.
Using the above method, its public key is written to area by certificate server in registration by the support system of mobile network In block chain, user equipment inquires the public affairs that certificate server can be obtained in block chain according to the second block chain address of certificate server Key.In this way, user equipment carries out signature authentication according to the public key of certificate server to the second signing messages of certificate server, if Signature authentication success then can determine that the certificate server of request certification has grasped private key corresponding with the public key, thus can be shown that this Certificate server is legal.
Since the information being written in block chain has the characteristic that can not be distorted, so that user equipment can be according to true Whether the certificate server of the public key of believable certificate server, checking request certification is legal, to ensure that certificate server It can not pretend to be.
For the technical solution for making those skilled in the art more understand that the embodiment of the present disclosure provides, below to combine Fig. 5 Illustrate mobile network's access authentication method that the embodiment of the present disclosure provides.
Fig. 5 is a kind of schematic diagram for implementation environment that the embodiment of the present disclosure provides, as shown in figure 5, the implementation environment includes The support system 503 of user equipment 501, certificate server 502 and mobile network, wherein certificate server 502 can be ENodeB or MME (Mobility Management Entity, mobile management entity), the support system 503 of mobile network Can be OSS (Operation Support System, Operation Support System) or BSS (Business Support System, business support system), and eNodeB, MME, user equipment (UE), OSS/BSS are the node in block chain network.Knot Fig. 5 is closed, a kind of mobile network's access authentication method that the embodiment of the present disclosure provides is as shown in fig. 6, include:
In step s 601, user equipment 501 sends the first registration request to the support system 503 of mobile network, this One registration request includes the authentication information of user equipment 501.
In step S602, block is written in the authentication information of user equipment 501 by the support system 503 of mobile network In chain.
In step S603, the starter node information of block chain is sent to user equipment 501 by support system 503.
In step s 604, certificate server 502 sends the second registration request to the support system 503 of mobile network, should Second registration request includes the public key of certificate server 502.
In step s 605, support system 503 will be in the public key write-in block chain of certificate server 502.
It should be understood that user equipment and certificate server are registered as two independent processes, it is not first by time and step The limitation of sequence afterwards, above method step are intended merely to be briefly described.
In step S606, user equipment 501 is connected to certificate server 502 according to attachment flow.
After user equipment 501 and certificate server 502 complete registration, user equipment 501 may be coupled to certification clothes Certification on business device 502.Wherein, user equipment (UE) may be coupled on eNodeB and be authenticated, and can also be connected on MME and carry out Certification, that is to say, that the certificate server described in the disclosure is specifically as follows eNodeB or MME.It is worth noting that The upper certifications of eNodeB can reduce the information exchange between eNodeB and MME, save resources of core network, and reduce core network protocols Complexity.
In step S607, user equipment 501 sends certification request to certificate server 502.
Wherein, certification request may include the first block chain address ADDRESS (A) of user equipment 501, identity information and Second random parameter RAND (A).In this embodiment, illustrate by the public key PK (A) of user equipment 501 of identity information.
In step S608, certificate server 502 inquires block chain according to the first block chain address, and determining in block chain is It is no to store the authentication information being consistent with identity information.
Certificate server 502 inquires block chain according to ADDRESS (A), obtains the authentication information stored in block chain, If there is PK (A) in the authentication information, show the identity information phase that the authentication information is sent with user equipment 501 Symbol, it may be determined that the target UE of identity information mark is in mobile network register, further, executes step S609; It is stored with the authentication information being consistent with the identity information of user equipment in block chain or is deposited in block chain if not inquiring When the authentication information of storage being consistent with the identity information of user equipment is invalid, then show the user equipment not in mobile network Registration is canceled, then the certification request of refusal respond user equipment 501, terminates the certification to user equipment 501.
In step S609, certificate server 502 is chosen to the first certification that the transmission of user equipment 501 includes the first random number War.
After being stored with the authentication information being consistent with identity information in confirming block chain, certificate server 502 generates First random parameter RAND (B) and to user equipment 501 send include RAND (B) the first authentication challenge.
In step S610, user equipment 501 is signed according to its first random number of private key pair, obtains the first A.L.S. Breath.
In step s 611, the first authentication challenge response including the first signing messages is sent to and recognizes by user equipment 501 Demonstrate,prove server 502.
In step S612, certificate server 502 carries out signature verification according to first the first signing messages of public key pair.
As described above, certificate server 502 inquires block chain according to the first block chain address ADDRESS (A) obtains user The public key PK (A) of equipment 501 verifies the first signing messages SIGN (A) according to public key PK (A), if signature verification success, Then show that user equipment 501 grasps private key corresponding with the public key PK (A), therefore can determine that user equipment 501 is identity information The target UE of expression, thens follow the steps S613;Otherwise, it may be determined that user equipment 402 is spoofed, then terminates to set user Standby 501 certification.
Since the information being written in block chain has the characteristic that can not be distorted, so that certificate server 502 can root According to genuine and believable public key PK (A), verifying user equipment 402 whether be identity information indicate target UE, to protect Having demonstrate,proved user equipment 402 can not pretend to be.
In step S613, certificate server 502 is signed according to its second random number of private key pair, obtains the second signature Information.
In step S614, certificate server 502 will include the second block of the second signing messages and certificate server The second authentication challenge response of chain address is sent to user equipment 501.
In step S615, user equipment 501 inquires certificate server according to the second block chain address from block chain Public key simultaneously carries out signature verification to the second signing messages.
After user equipment 501 is by certification, certificate server 502 is according to the second random parameter RAND of private key pair of oneself (A) it signs, obtain the second signing messages SIGN (B) and carries the second signing messages SIGN to the transmission of user equipment 501 (B) it is responded with the second authentication challenge of the second block chain address ADDRESS (B).
User equipment 501 inquires block chain according to ADDRESS (B), obtains the certificate server stored in block chain 502 Public key PK (B), and the second signing messages SIGN (B) is verified according to public key PK (B).If signature verification success, shows Certificate server 502 grasps private key corresponding with the public key PK (B), therefore can determine that certificate server 502 is legal;Otherwise, may be used Determine that certificate server 502 is spoofed.
Since the information being written in block chain has the characteristic that can not be distorted, so that user equipment 501 can basis Genuine and believable public key PK (B), whether authentication verification server 502 is legal, to ensure that certificate server 502 can not emit It fills.
After the second signing messages is proved to be successful, user equipment 501 just completes the certification to certificate server 502.
It is worth noting that for above method embodiment, for simple description, therefore it is all expressed as a series of dynamic It combines, but those skilled in the art should understand that, the present invention is not limited by the described action sequence.Secondly, originally Field technology personnel should also know that embodiment described in this description belongs to preferred embodiment, and involved action is simultaneously It is not necessarily necessary to the present invention.
In addition, in embodiment of the disclosure, due to the user equipment information and certificate server recorded in block chain Information is the critical data of access authentication, and addition and modification must be controlled by permission, to realize the protection that data are written. Therefore, in one embodiment of the embodiment of the present disclosure, license chain can be used in block chain, i.e., different operators has respective Permit chain, it is node on the license chain respectively to belong to the certificate server of same operator and user equipment.In license chain In permission control, whether limitation different blocks chain account has write-in and the modification authority to certain data.For example, to mobile network Block chain account in the support system of network only configures write-in and modification authority, and to the area on user equipment and certificate server Block chain account, which only configures, reads permission.
In another embodiment, information can be realized by the intelligence contract by writing specific intelligent contract Storage.Intelligent contract provides registration, modification, nullifies, the interfaces such as inquiry, and by the tune of the interfaces such as registration, modification, cancellation, inquiry Be only assigned to the block chain account in the support system of mobile network with permission, and pair on user equipment and certificate server Block chain account only distributes the permission of query interface calling.
Wherein, intelligent contract is one section of executive program, and satisfaction can be executed accurately automatically, the intelligence based on block chain Contract includes the mechanism and a complete state machine of issued transaction and preservation, for receiving and handling various intelligent contracts. If some in automatic state machine or the trigger condition of certain several action meet, contract is selected according to presupposed information by state machine Action is automatic to be executed.
In addition, it is contemplated that certificate server may belong to different operators from user equipment, each operator has each From license chain, when user equipment needs cross operator roaming authentication, need on certain nodes block chain account provide The ability of a plurality of chain is accessed simultaneously.Such as when the user equipment of A operators needs to roam into the mobile network of B operators, A fortune Battalion quotient needs to provide the access ability of the block chain of A operators to B operators, to allow the certificate server of B operators can Access the relevant information in A operators block chain.In this way, its ownership must be arrived in compared with the existing technology when user's set roaming The certification nearby when user's set roaming may be implemented in the generation that authentication collection is carried out on the HSS on ground, improves access authentication efficiency.
In one embodiment, for above-mentioned block chain be privately owned chain the case where, A operators can give B operators correlation Block chain account configures access and digital independent permission, the specific address of the license chain of A operators, can match for B operators Set the full node of required amount of license chain.
It in another embodiment, for above-mentioned intelligent contract the case where, can be by the calling authority configuration of query interface to B The required block chain account of operator.
As a result, compared with the existing technology in user's set roaming when must be to being recognized in the third-party institution of its ownership place The generation for demonstrate,proving information, can improve the efficiency of mobile network's access authentication.
The embodiment of the present disclosure also provides a kind of mobile network's access authentication device 70, which is applied to authentication service Device, wherein certificate server is the node in block chain network, as shown in fig. 7, the device 70 includes:
First receiving module 71, the certification request for receiving user equipment transmission, the certification request include the firstth area Block chain address and identity information.
Enquiry module 72 determines that the block chain is for inquiring the block chain according to the first block chain address It is no to store the authentication information being consistent with the identity information, wherein the support system of mobile network is in user equipment registration When, the authentication information of user equipment is written in block chain, if being stored in the block chain and the identity information phase The authentication information of symbol then shows the target UE of the identity information expression in mobile network register.
First authentication module 73, for being stored with the authentication being consistent with identity information letter in the block chain When breath, the user equipment is authenticated based on identifying algorithm, wherein if certification success, shows that the user equipment is The target UE that the identity information indicates.
Optionally, as shown in figure 8, first authentication module 73 includes:
First authentication sub module 731, for carrying out two-way authentication based on rivest, shamir, adelman and the user equipment.
Optionally, as shown in figure 8, the authentication information includes the first public key, first authentication module includes:
First sending submodule 732, for sending the first authentication challenge, first authentication challenge to the user equipment Including the first random number;
First receiving submodule 733, the first authentication challenge response sent for receiving the user equipment, described first Authentication challenge response includes the first signing messages, wherein first signing messages is the private key signature institute of the user equipment State what the first random number obtained;
First signature verification submodule 734, for being signed to first signing messages according to first public key Verification, wherein show that the user equipment is the target UE that the identity information indicates if signature verification success.
Optionally, as shown in figure 8, the certification request further includes the second random number;
Described device 70 further includes:
First signature blocks 74, for being signed to second random number according to the private key of the certificate server, Obtain the second signing messages;
First sending module 75, for that will include the second block of second signing messages and the certificate server The second authentication challenge response of chain address is sent to the user equipment, and the second block chain address is used for the user equipment It inquires public key from the block chain to verify second signing messages, wherein the public key of the certificate server is The support system is written in the block chain.
Optionally, as shown in figure 8, described device 70 further includes:
Refusal respond module 76, for there is no the identity information phases with the user equipment in confirming the block chain The authentication being consistent with the identity information of the user equipment stored in the authentication information of symbol or the block chain When information is invalid, certification request described in refusal respond.
It is affiliated that it will be apparent to those skilled in the art ground to recognize, for convenience and simplicity of description, the dress of foregoing description The specific work process for each module set can refer to corresponding process in preceding method embodiment, and details are not described herein again.
In addition, the above-mentioned division carried out to device comprising modules, only a kind of division of logic function in actual implementation can be with There is other dividing mode.Also, the physics realization of modules can also there are many modes, the present invention not to limit this.
The embodiment of the present disclosure also provides a kind of mobile network's access authentication device 80, which is applied to user equipment, Wherein, user equipment is the node in block chain network, as shown in figure 9, the device 80 includes:
Second sending module 81, for sending certification request to certificate server, the certification request includes the first block Chain address and identity information, the first block chain address and the identity information are for described in certificate server confirmation Whether the target UE that identity information indicates is in mobile network register;
Second authentication module 82, for confirming the target UE of the identity information expression in the mobile network After network registration, the authentication to the user equipment is completed based on identifying algorithm and the certificate server, wherein if certification Success then shows that the user equipment is the target UE that the identity information indicates.
Optionally, as shown in Figure 10, second authentication module 82 includes:
Second receiving submodule 821, the first authentication challenge sent for receiving the certificate server, described first recognizes Card challenge includes the first random number;
First signature submodule 822, for being signed to first random number according to the private key of the user equipment, Obtain the first signing messages;
Second sending submodule 823, the first authentication challenge response for that will include first signing messages are sent to The certificate server, wherein first signing messages is authenticated the user equipment for the certificate server.
Optionally, as shown in Figure 10, the certification request further includes the second random number;
Described device 80 further includes:
Second receiving module 83, the second authentication challenge response sent for receiving the certificate server, described second Authentication challenge response includes the second block chain address of the second signing messages and the certificate server, wherein described second Signing messages is that the second random number described in the private key signature of the certificate server obtains;
First signature verification module 84, for recognizing described in being inquired from the block chain according to the second block chain address It demonstrate,proves the public key of server and signature verification is carried out to second signing messages, wherein show if signature verification success described Certificate server is legal.
Optionally, as shown in Figure 10, described device 80 further includes:
Third sending module 85, for sending registration request to the support system of mobile network, the registration request includes The authentication information of the user equipment, wherein the support system is the node in block chain network;
Second receiving module 86, the starter node information for receiving the block chain that the support system is sent, institute It states starter node information and is based on block chain agreement access block chain network for the user equipment.
It is affiliated that it will be apparent to those skilled in the art ground to recognize, for convenience and simplicity of description, the dress of foregoing description The specific work process for each module set can refer to corresponding process in preceding method embodiment, and details are not described herein again.
In addition, the above-mentioned division carried out to device comprising modules, only a kind of division of logic function in actual implementation can be with There is other dividing mode.Also, the physics realization of modules can also there are many modes, the present invention not to limit this.
Correspondingly, the embodiment of the present disclosure also provides a kind of non-transitorycomputer readable storage medium, the non-transitory Computer readable storage medium includes one or more program, one or more of programs for right of execution above application in Mobile network's access authentication method of certificate server.
Correspondingly, the embodiment of the present disclosure also provides a kind of block chain node, including above-mentioned non-transitory is computer-readable deposits Storage media;And one or more processor, for executing the program in the non-transitorycomputer readable storage medium.
Correspondingly, the embodiment of the present disclosure also provides a kind of non-transitorycomputer readable storage medium, the non-transitory Computer readable storage medium includes one or more program, one or more of programs for right of execution above application in Mobile network's access authentication method of user equipment.
Correspondingly, the embodiment of the present disclosure also provides a kind of block chain node, including above-mentioned non-transitory is computer-readable deposits Storage media;And one or more processor, for executing the program in the non-transitorycomputer readable storage medium.
The embodiment of the present disclosure also provides a kind of block chain node 90, which can be certification as described above Server, such as eNodeB or MME, as shown in figure 11, the block chain node 90 include processing component 922, are further comprised One or more processors, and by the memory resource representated by memory 932, it can be by processing component 922 for storing The instruction of execution, such as application program.The application program stored in memory 932 may include one or more each A module for corresponding to one group of instruction.In addition, processing component 922 is configured as executing instruction, connect with executing above-mentioned mobile network Enter authentication method.
Block chain node 90 can also include that a power supply module 926 is configured as executing the power supply pipe of block chain node 90 Reason, a wired or wireless network interface 950 are configured as block chain node 90 being connected to network and an input and output (I/O) interface 958.Block chain node 90 can be operated based on the operating system for being stored in memory 932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
The embodiment of the present disclosure also provides a kind of block chain node 100, which can use as described above Family equipment, such as mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, medical treatment Equipment, body-building equipment, personal digital assistant etc..
As shown in figure 12, which may include following one or more components:Processing component 102, storage Device 104, electric power assembly 106, multimedia component 108, audio component 110, the interface 112 of input/output (I/O), sensor group Part 114 and communication component 116.
The integrated operation of the usually control block chain link point 100 of processing component 102, such as with display, call, data are logical Letter, camera operation and record operate associated operation.Processing component 102 may include one or more processors 120 to hold Row instruction, to complete all or part of step of above-mentioned mobile network's access authentication method.In addition, processing component 102 can be with Including one or more modules, convenient for the interaction between processing component 102 and other assemblies.For example, processing component 102 can wrap Multi-media module is included, to facilitate the interaction between multimedia component 108 and processing component 102.
Memory 104 is configured as storing various types of data to support the operation in block chain node 100.These numbers According to example include any application program or method for being operated on block chain node 100 instruction, contact data, electricity Talk about book data, message, picture, video etc..Memory 104 can by any kind of volatibility or non-volatile memory device or Person's combination thereof is realized, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic storage Device, flash memory, disk or CD.
Electric power assembly 106 provides electric power for the various assemblies of block chain node 100.Electric power assembly 106 may include power supply Management system, one or more power supplys and other with for block chain node 100 generate, management and distribution associated group of electric power Part.
Multimedia component 108 is included in the screen of one output interface of offer between the block chain node 100 and user Curtain.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touching Panel, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touches Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning The boundary of action, but also detect duration and pressure associated with the touch or slide operation.In some embodiments In, multimedia component 108 includes a front camera and/or rear camera.When block chain node 100 is in operation mould Formula, when such as screening-mode or video mode, front camera and/or rear camera can receive external multi-medium data. Each front camera and rear camera can be a fixed optical lens system or have focal length and an optical zoom energy Power.
Audio component 110 is configured as output and/or input audio signal.For example, audio component 110 includes a Mike Wind (MIC), when block chain node 100 is in operation mode, when such as call model, logging mode and speech recognition mode, Mike Wind is configured as receiving external audio signal.The received audio signal can be further stored in memory 104 or via Communication component 116 is sent.In some embodiments, audio component 110 further includes a loud speaker, is used for exports audio signal.
I/O interfaces 112 provide interface between processing component 102 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor module 114 includes one or more sensors, the shape for providing various aspects for block chain node 100 State is assessed.For example, sensor module 114 can detect the state that opens/closes of block chain node 100, component it is relatively fixed Position, such as the component are the display and keypad of block chain node 100, and sensor module 114 can also detect block chain The position change of node 100 or block chain 100 1 components of node, the presence or do not deposit that user contacts with block chain node 100 In the temperature change of 100 orientation of block chain node or acceleration/deceleration and block chain node 100.Sensor module 114 can wrap Proximity sensor is included, is configured to detect the presence of nearby objects without any physical contact.Sensor module 114 Can also include optical sensor, such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments, The sensor module 114 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature Sensor.
Communication component 116 is configured to facilitate the logical of wired or wireless way between block chain node 100 and other equipment Letter.Block chain node 100 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or combination thereof. In one exemplary embodiment, communication component 116 receives the broadcast singal from external broadcasting management system via broadcast channel Or broadcast related information.In one exemplary embodiment, the communication component 116 further includes near-field communication (NFC) module, with Promote short range communication.For example, can be based on radio frequency identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology surpasses Broadband (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, block chain node 100 can by one or more application application-specific integrated circuit (ASIC), Digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field-programmable gate array It arranges (FPGA), controller, microcontroller, microprocessor or other electronic components to realize, for executing above-mentioned mobile network's access Authentication method.
In the exemplary embodiment, it includes the non-transitorycomputer readable storage medium instructed, example to additionally provide a kind of Such as include the memory 104 of instruction, above-metioned instruction can be executed by the processor 120 of block chain node 100 to complete above-mentioned movement Network access verifying method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (22)

1. a kind of mobile network's access authentication method, which is characterized in that the method is applied to certificate server, the certification clothes Business device is the node in block chain network, the method includes:
The certification request that user equipment is sent is received, the certification request includes the first block chain address and identity information;
The block chain is inquired according to the first block chain address, determines whether the block chain stores and the identity information The authentication information being consistent, wherein the support system of mobile network tests the identity of user equipment in user equipment registration It demonstrate,proves in information write-in block chain, if being stored with the authentication information being consistent with the identity information, table in the block chain The target UE that the bright identity information indicates is in mobile network register;
When being stored with the authentication information being consistent with the identity information in the block chain, based on identifying algorithm to described User equipment is authenticated, wherein if certification success, shows that the user equipment is that the target that the identity information indicates is used Family equipment.
2. according to the method described in claim 1, it is characterized in that, described recognize the user equipment based on identifying algorithm Card, including:
Two-way authentication is carried out based on rivest, shamir, adelman and the user equipment.
3. according to the method described in claim 1, it is characterized in that, the authentication information include a public key, it is described to be based on Identifying algorithm is authenticated the user equipment, including:
The first authentication challenge is sent to the user equipment, first authentication challenge includes the first random number;
The first authentication challenge response that the user equipment is sent is received, the first authentication challenge response includes the first A.L.S. Breath, wherein first signing messages is that the first random number described in the private key signature of the user equipment obtains;
Signature verification is carried out to first signing messages according to first public key, wherein show if signature verification success The user equipment is the target UE that the identity information indicates.
4. according to the method described in claim 1, it is characterized in that, the certification request further includes the second random number;
The method further includes:
It is signed to second random number according to the private key of the certificate server, obtains the second signing messages;
It will be rung including the second authentication challenge of second signing messages and the second block chain address of the certificate server It should be sent to the user equipment, the second block chain address inquires public key for the user equipment from the block chain Signature verification is carried out to second signing messages, wherein the public key of the certificate server is support system write-in institute It states in block chain.
5. according to the described method of any one of claim 1-4, which is characterized in that the method further includes:
There is no the authentication information being consistent with the identity information of the user equipment or institutes in confirming the block chain State the authentication information being consistent with the identity information of the user equipment stored in block chain it is invalid when, described in refusal respond Certification request.
6. a kind of mobile network's access authentication method, which is characterized in that the method is applied to user equipment, the user equipment It is the node in block chain network, the method includes:
Certification request is sent to certificate server, the certification request includes the first block chain address and identity information, described First block chain address and the identity information confirm the target user that the identity information indicates for the certificate server Whether equipment is in mobile network register;
Confirming target UE that the identity information indicates after the mobile network register, based on identifying algorithm with The certificate server completes the authentication to the user equipment, wherein if certification success, shows the user equipment The target UE indicated for the identity information.
7. according to the method described in claim 6, it is characterized in that, described completed based on identifying algorithm and the certificate server Authentication to the user equipment, including:
The first authentication challenge that the certificate server is sent is received, first authentication challenge includes the first random number;
It is signed to first random number according to the private key of the user equipment, obtains the first signing messages;
It will be responded including the first authentication challenge of first signing messages and be sent to the certificate server, wherein described the One signing messages is authenticated the user equipment for the certificate server.
8. the method according to the description of claim 7 is characterized in that the certification request further includes the second random number;
The method further includes:
The second authentication challenge response that the certificate server is sent is received, the second authentication challenge response includes the second signature Second block chain address of information and the certificate server, wherein second signing messages is the certificate server Private key signature described in second random number obtain;
The public key of the certificate server is inquired from the block chain according to the second block chain address and to described second Signing messages carries out signature verification, wherein shows that the certificate server is legal if signature verification success.
9. according to the method described in any one of claim 6-8, which is characterized in that send certification to certificate server described Before request, the method further includes:
Registration request is sent to the support system of mobile network, the registration request includes the authentication letter of the user equipment Breath, wherein the support system is the node in block chain network;
The starter node information for the block chain that the support system is sent is received, the starter node information is used for the use Family equipment is based on block chain agreement and accesses block chain network.
10. a kind of mobile network's access authentication device, which is characterized in that described device is applied to certificate server, the certification Server is the node in block chain network, and described device includes:First receiving module, for receiving recognizing for user equipment transmission Card request, the certification request include the first block chain address and identity information;Enquiry module, for according to firstth area Block chain address inquires the block chain, determines whether the block chain stores the authentication letter being consistent with the identity information Breath, wherein block chain is written in user equipment registration, by the authentication information of user equipment in the support system of mobile network In, if being stored with the authentication information being consistent with the identity information in the block chain, show the identity information table The target UE shown is in mobile network register;
First authentication module, when for being stored with the authentication information being consistent with the identity information in the block chain, The user equipment is authenticated based on identifying algorithm, wherein if certification success, show that the user equipment is the body The target UE that part information indicates.
11. device according to claim 10, which is characterized in that first authentication module includes:
First authentication sub module, for carrying out two-way authentication based on rivest, shamir, adelman and the user equipment.
12. device according to claim 10, which is characterized in that the authentication information includes the first public key, described First authentication module includes:
First sending submodule, for sending the first authentication challenge to the user equipment, first authentication challenge includes the One random number;
First receiving submodule, the first authentication challenge response sent for receiving the user equipment, first certification are chosen War response includes the first signing messages, wherein first signing messages is first described in the private key signature of the user equipment What random number obtained;
First signature verification submodule, for carrying out signature verification to first signing messages according to first public key, In, show that the user equipment is the target UE that the identity information indicates if signature verification success.
13. device according to claim 10, which is characterized in that the certification request further includes the second random number;
Described device further includes:
First signature blocks obtain for signing to second random number according to the private key of the certificate server Two signing messages;
First sending module, for that will include the second block chain address of second signing messages and the certificate server The response of the second authentication challenge be sent to the user equipment, the second block chain address is for the user equipment from described It inquires public key in block chain to verify second signing messages, wherein the public key of the certificate server is the branch The system of holding is written in the block chain.
14. according to the device described in any one of claim 10-13, which is characterized in that described device further includes:
Refusal respond module, for there is no the bodies being consistent with the identity information of the user equipment in confirming the block chain The authentication information being consistent with the identity information of the user equipment stored in part verification information or the block chain without When effect, certification request described in refusal respond.
15. a kind of mobile network's access authentication device, which is characterized in that described device is applied to user equipment, and the user sets Standby is the node in block chain network, and described device includes:
Second sending module, for sending certification request to certificate server, the certification request includes the first block chain address And identity information, the first block chain address and the identity information confirm the identity letter for the certificate server Whether the target UE indicated is ceased in mobile network register;
Second authentication module, for confirming the target UE of the identity information expression in the mobile network register Afterwards, the authentication to the user equipment is completed based on identifying algorithm and the certificate server, wherein if certification success, Then show that the user equipment is the target UE that the identity information indicates.
16. device according to claim 15, which is characterized in that second authentication module includes:
Second receiving submodule, the first authentication challenge sent for receiving the certificate server, first authentication challenge Including the first random number;
First signature submodule obtains for signing to first random number according to the private key of the user equipment One signing messages;
Second sending submodule, the first authentication challenge response for that will include first signing messages are sent to the certification Server, wherein first signing messages is authenticated the user equipment for the certificate server.
17. device according to claim 16, which is characterized in that the certification request further includes the second random number;
Described device further includes:
Second receiving module, the second authentication challenge response sent for receiving the certificate server, second certification are chosen War response includes the second block chain address of the second signing messages and the certificate server, wherein second A.L.S. Breath is that the second random number described in the private key signature of the certificate server obtains;
First signature verification module, for inquiring the authentication service from the block chain according to the second block chain address The public key of device simultaneously carries out signature verification to second signing messages, wherein shows the certification clothes if signature verification success Business device is legal.
18. according to the device described in any one of claim 15-17, which is characterized in that described device further includes:
Third sending module, for sending registration request to the support system of mobile network, the registration request includes the use The authentication information of family equipment, wherein the support system is the node in block chain network;
Second receiving module, the starter node information for receiving the block chain that the support system is sent, the startup Nodal information is based on block chain agreement for the user equipment and accesses block chain network.
19. a kind of non-transitorycomputer readable storage medium, which is characterized in that the non-transitory computer-readable storage medium Matter includes one or more programs, and one or more of programs require the side described in any one of 1-5 for perform claim Method.
20. a kind of block chain node, which is characterized in that including:
Non-transitorycomputer readable storage medium described in claim 19;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
21. a kind of non-transitorycomputer readable storage medium, which is characterized in that the non-transitory computer-readable storage medium Matter includes one or more programs, and one or more of programs require the side described in any one of 6-9 for perform claim Method.
22. a kind of block chain node, which is characterized in that including:
Non-transitorycomputer readable storage medium described in claim 21;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
CN201780006171.7A 2017-11-30 2017-11-30 Mobile network's access authentication method, device, storage medium and block chain node Pending CN108702622A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/114072 WO2019104690A1 (en) 2017-11-30 2017-11-30 Mobile network access authentication method, device, storage medium and block chain node

Publications (1)

Publication Number Publication Date
CN108702622A true CN108702622A (en) 2018-10-23

Family

ID=63844103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780006171.7A Pending CN108702622A (en) 2017-11-30 2017-11-30 Mobile network's access authentication method, device, storage medium and block chain node

Country Status (2)

Country Link
CN (1) CN108702622A (en)
WO (1) WO2019104690A1 (en)

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109168156A (en) * 2018-11-01 2019-01-08 中国联合网络通信集团有限公司 A kind of implementation method and server of virtual SIM card
CN109492380A (en) * 2019-01-11 2019-03-19 四川虹微技术有限公司 A kind of equipment authentication method, device and block chain node
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN109886036A (en) * 2019-01-02 2019-06-14 广州大学 Domain name distributed authentication method, device and block chain network based on block chain
CN109981680A (en) * 2019-04-08 2019-07-05 上海人行道网络信息技术有限公司 A kind of access control implementation method, device, computer equipment and storage medium
CN109981675A (en) * 2019-04-04 2019-07-05 西安电子科技大学 A kind of identity information guard method of digital identification authentication and encryption attribute
CN109981305A (en) * 2019-03-19 2019-07-05 全链通有限公司 Group communication method, equipment and computer readable storage medium
CN109995791A (en) * 2019-04-11 2019-07-09 清华大学 A kind of data grant method and system
CN110048843A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key transmission method, equipment and computer readable storage medium
CN110048842A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key processing method, equipment and computer readable storage medium
CN110138558A (en) * 2019-05-30 2019-08-16 全链通有限公司 Transmission method, equipment and the computer readable storage medium of session key
CN110176994A (en) * 2019-05-30 2019-08-27 全链通有限公司 Session cipher key distributing method, equipment and storage medium based on alliance's block chain
CN110225011A (en) * 2019-05-30 2019-09-10 全链通有限公司 Authentication method, equipment and the computer readable storage medium of user node
CN110351364A (en) * 2019-07-12 2019-10-18 全链通有限公司 Date storage method, equipment and computer readable storage medium
CN110445627A (en) * 2019-08-12 2019-11-12 腾讯科技(深圳)有限公司 Group updating method, apparatus, computer equipment and computer storage medium
CN110572819A (en) * 2019-07-27 2019-12-13 中国人民解放军战略支援部队信息工程大学 Block chain-based multi-domain wireless Mesh network cross-domain authentication method and system
CN110602150A (en) * 2019-10-16 2019-12-20 山东超越数控电子股份有限公司 Trusted authentication method between SDN nodes
CN110599653A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN110611679A (en) * 2019-09-25 2019-12-24 杭州港盛软件科技有限公司 Data transmission method, device, equipment and system
CN110661812A (en) * 2019-10-10 2020-01-07 国网山东省电力公司信息通信公司 Block chain-based cascade authentication system
CN110730450A (en) * 2019-10-18 2020-01-24 中国联合网络通信集团有限公司 Mobile communication method and system
CN111163466A (en) * 2019-12-30 2020-05-15 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
CN111224804A (en) * 2018-11-26 2020-06-02 中国移动通信集团辽宁有限公司 Internet of things equipment initialization method and device, Internet of things equipment and storage medium
CN111294323A (en) * 2018-12-10 2020-06-16 成都高新信息技术研究院 Decentralized mobile subscriber identification method and system
CN111385755A (en) * 2020-03-18 2020-07-07 成都西加云杉科技有限公司 Bandwidth resource sharing method, device, equipment and readable storage medium
CN111405607A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Network switching method, equipment and block chain system
CN111526154A (en) * 2020-04-30 2020-08-11 余伟霞 Service data sharing system based on block chain network
CN111586686A (en) * 2020-05-14 2020-08-25 中国联合网络通信集团有限公司 Method and system for network access authentication
CN111914230A (en) * 2020-07-17 2020-11-10 中国联合网络通信集团有限公司 Block chain-based identity authentication method, system, terminal device and storage medium
CN111935075A (en) * 2020-06-23 2020-11-13 浪潮云信息技术股份公司 Block chain-based digital identity signing and issuing method, equipment and medium
CN111970691A (en) * 2020-08-28 2020-11-20 北京邮电大学 Equipment authentication access method, device, equipment and computer readable storage medium
CN112183781A (en) * 2020-09-28 2021-01-05 日立楼宇技术(广州)有限公司 Authentication method and device for elevator maintenance personnel, computer equipment and storage medium
CN112291064A (en) * 2020-10-10 2021-01-29 达闼机器人有限公司 Authentication system, registration and authentication method, device, storage medium and electronic equipment
CN112333131A (en) * 2019-08-05 2021-02-05 北京京东振世信息技术有限公司 Service providing method, block chain network service system and storage medium
CN112506267A (en) * 2020-12-01 2021-03-16 上海银基信息安全技术股份有限公司 RTC calibration method, vehicle-mounted terminal, user side and storage medium
WO2021174927A1 (en) * 2020-03-03 2021-09-10 支付宝实验室(新加坡)有限公司 Blockchain-based identity verification method and apparatus, device, and storage medium
CN113572717A (en) * 2020-04-29 2021-10-29 青岛海尔滚筒洗衣机有限公司 Communication connection establishing method, washing and protecting equipment and server
CN113904774A (en) * 2021-08-27 2022-01-07 重庆小雨点小额贷款有限公司 Block chain address authentication method and device and computer equipment
CN114024692A (en) * 2020-07-15 2022-02-08 华为技术有限公司 Signing method, device and system
CN114040143A (en) * 2021-11-15 2022-02-11 百视通网络电视技术发展有限责任公司 Method, system and equipment for IPTV service management
CN114124418A (en) * 2020-08-27 2022-03-01 中国移动通信集团河南有限公司 Data processing method, device and system based on block chain and electronic equipment
CN114286342A (en) * 2021-12-20 2022-04-05 中国电信股份有限公司 Authentication method, system, electronic device, and computer-readable storage medium
WO2022111016A1 (en) * 2020-11-27 2022-06-02 达闼机器人股份有限公司 Mobile network access system and method, and storage medium, and electronic device
CN114697061A (en) * 2020-12-29 2022-07-01 中国移动通信有限公司研究院 Access control method and device, network side equipment, terminal and block link point
CN115225428A (en) * 2021-06-29 2022-10-21 达闼机器人股份有限公司 Robot authentication system and method
CN115242418A (en) * 2021-06-29 2022-10-25 达闼机器人股份有限公司 Robot authentication system and method
CN115250192A (en) * 2021-06-29 2022-10-28 达闼机器人股份有限公司 Robot network authentication system and method
CN115361390A (en) * 2022-10-21 2022-11-18 中国信息通信研究院 Method for joining a blockchain network, computer storage medium and electronic device
CN112506267B (en) * 2020-12-01 2024-04-19 上海银基信息安全技术股份有限公司 RTC calibration method, vehicle-mounted terminal, user and storage medium

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110347750B (en) * 2019-06-28 2023-06-13 创新先进技术有限公司 Block chain-based data processing method and device
CN112446784A (en) * 2019-09-03 2021-03-05 上海唯链信息科技有限公司 Block chain transaction verification method and related device
CN111132149B (en) * 2019-12-30 2023-11-21 全链通有限公司 Registration method of 5G user terminal, user terminal equipment and medium
CN111225001B (en) * 2020-03-12 2023-04-07 北京跨联元焕网络科技有限公司 Block chain decentralized communication method, electronic equipment and system
CN111461752A (en) * 2020-04-04 2020-07-28 上海健康医学院 Pelvic floor medical consumable verification method based on block chain and pelvic floor rehabilitation equipment
CN111818087B (en) * 2020-07-27 2023-01-24 深圳壹账通智能科技有限公司 Block chain node access method, device, equipment and readable storage medium
CN112162984A (en) * 2020-09-28 2021-01-01 彩讯科技股份有限公司 Real name authentication method, system, equipment and storage medium based on block chain
CN112188494B (en) * 2020-10-22 2023-06-27 中国联合网络通信集团有限公司 Terminal access method and device based on block chain network and micro base station
CN112822687B (en) * 2020-12-31 2023-03-24 山西特信环宇信息技术有限公司 Cone block chain mobile terminal authentication method
CN114765551B (en) * 2021-01-04 2023-10-27 中国移动通信有限公司研究院 SDP access control method and device based on blockchain
CN112968893B (en) * 2021-02-20 2023-05-02 中国联合网络通信集团有限公司 Access control method and device for terminal equipment
CN113271294A (en) * 2021-04-25 2021-08-17 深圳前海华兆新能源有限公司 Edge computing gateway identity authentication method based on block chain technology
CN114979193B (en) * 2021-05-06 2023-07-21 中移互联网有限公司 Data processing method and device of Internet of vehicles, electronic equipment and computer readable storage medium
CN114710317A (en) * 2022-03-02 2022-07-05 北京邮电大学 Identity authentication method and device based on block chain and storage medium
CN116644401B (en) * 2023-07-21 2023-10-20 山东知临信息技术有限责任公司 Identity verification method, device, equipment and medium based on blockchain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357640A (en) * 2016-09-18 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN107079037A (en) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 Identity identifying method, device, node and system based on block chain
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
CN107147489A (en) * 2017-05-02 2017-09-08 南京理工大学 Distributed access authentication management method in a kind of LEO satellite network
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10496989B2 (en) * 2016-02-22 2019-12-03 Bank Of America Corporation System to enable contactless access to a transaction terminal using a process data network
CN106453271B (en) * 2016-09-21 2019-05-03 江苏通付盾科技有限公司 Identity registration method and system, identity identifying method and system
CN106533696B (en) * 2016-11-18 2019-10-01 江苏通付盾科技有限公司 Identity identifying method, certificate server and user terminal based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357640A (en) * 2016-09-18 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN107079037A (en) * 2016-09-18 2017-08-18 深圳前海达闼云端智能科技有限公司 Identity identifying method, device, node and system based on block chain
CN107079036A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Registration and authorization method, apparatus and system
CN107147489A (en) * 2017-05-02 2017-09-08 南京理工大学 Distributed access authentication management method in a kind of LEO satellite network
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ROGER PIQUERAS JOVER 等: "dHSS-Distributed Peer-to-Peer implementation of the LTE HSS based on the Bitcoin/Namecoin architecture", 《2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC)》 *

Cited By (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109168156B (en) * 2018-11-01 2021-06-29 中国联合网络通信集团有限公司 Method, system, medium, computer program product and server for implementing virtual SIM card
CN109168156A (en) * 2018-11-01 2019-01-08 中国联合网络通信集团有限公司 A kind of implementation method and server of virtual SIM card
CN111224804A (en) * 2018-11-26 2020-06-02 中国移动通信集团辽宁有限公司 Internet of things equipment initialization method and device, Internet of things equipment and storage medium
CN111294323B (en) * 2018-12-10 2022-01-18 成都高新信息技术研究院 Decentralized mobile subscriber identification method and system
CN111294323A (en) * 2018-12-10 2020-06-16 成都高新信息技术研究院 Decentralized mobile subscriber identification method and system
CN111405607B (en) * 2019-01-02 2023-05-09 中国移动通信有限公司研究院 Network switching method, device and block chain system
CN109886036A (en) * 2019-01-02 2019-06-14 广州大学 Domain name distributed authentication method, device and block chain network based on block chain
CN111405607A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Network switching method, equipment and block chain system
CN109492380A (en) * 2019-01-11 2019-03-19 四川虹微技术有限公司 A kind of equipment authentication method, device and block chain node
CN109862006A (en) * 2019-01-29 2019-06-07 济南浪潮高新科技投资发展有限公司 A kind of block catenary system cut-in method, apparatus and system
CN109981305A (en) * 2019-03-19 2019-07-05 全链通有限公司 Group communication method, equipment and computer readable storage medium
CN109981675A (en) * 2019-04-04 2019-07-05 西安电子科技大学 A kind of identity information guard method of digital identification authentication and encryption attribute
CN109981675B (en) * 2019-04-04 2021-10-26 西安电子科技大学 Identity information protection method for digital identity authentication and attribute encryption
CN109981680A (en) * 2019-04-08 2019-07-05 上海人行道网络信息技术有限公司 A kind of access control implementation method, device, computer equipment and storage medium
CN109981680B (en) * 2019-04-08 2021-08-24 上海人行道网络信息技术有限公司 Access control implementation method and device, computer equipment and storage medium
CN109995791A (en) * 2019-04-11 2019-07-09 清华大学 A kind of data grant method and system
CN110225011B (en) * 2019-05-30 2021-07-13 全链通有限公司 Authentication method and device for user node and computer readable storage medium
CN110138558B (en) * 2019-05-30 2021-09-10 全链通有限公司 Transmission method and device of session key and computer-readable storage medium
CN110048843B (en) * 2019-05-30 2021-09-10 全链通有限公司 Session key transmission method, device and computer readable storage medium
CN110225011A (en) * 2019-05-30 2019-09-10 全链通有限公司 Authentication method, equipment and the computer readable storage medium of user node
CN110048842B (en) * 2019-05-30 2021-09-10 全链通有限公司 Session key processing method, device and computer readable storage medium
CN110176994A (en) * 2019-05-30 2019-08-27 全链通有限公司 Session cipher key distributing method, equipment and storage medium based on alliance's block chain
CN110138558A (en) * 2019-05-30 2019-08-16 全链通有限公司 Transmission method, equipment and the computer readable storage medium of session key
CN110048842A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key processing method, equipment and computer readable storage medium
CN110048843A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key transmission method, equipment and computer readable storage medium
CN110351364A (en) * 2019-07-12 2019-10-18 全链通有限公司 Date storage method, equipment and computer readable storage medium
CN110572819A (en) * 2019-07-27 2019-12-13 中国人民解放军战略支援部队信息工程大学 Block chain-based multi-domain wireless Mesh network cross-domain authentication method and system
CN112333131B (en) * 2019-08-05 2023-04-18 北京京东振世信息技术有限公司 Service providing method, block chain network service system and storage medium
CN112333131A (en) * 2019-08-05 2021-02-05 北京京东振世信息技术有限公司 Service providing method, block chain network service system and storage medium
CN110445627B (en) * 2019-08-12 2021-10-26 腾讯科技(深圳)有限公司 Group updating method and device, computer equipment and computer storage medium
CN110445627A (en) * 2019-08-12 2019-11-12 腾讯科技(深圳)有限公司 Group updating method, apparatus, computer equipment and computer storage medium
CN110599653B (en) * 2019-09-11 2022-02-11 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN110599653A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN110611679A (en) * 2019-09-25 2019-12-24 杭州港盛软件科技有限公司 Data transmission method, device, equipment and system
CN110661812A (en) * 2019-10-10 2020-01-07 国网山东省电力公司信息通信公司 Block chain-based cascade authentication system
WO2021073147A1 (en) * 2019-10-16 2021-04-22 山东超越数控电子股份有限公司 Credibility authentication method for sdn nodes
CN110602150A (en) * 2019-10-16 2019-12-20 山东超越数控电子股份有限公司 Trusted authentication method between SDN nodes
CN110730450A (en) * 2019-10-18 2020-01-24 中国联合网络通信集团有限公司 Mobile communication method and system
CN110730450B (en) * 2019-10-18 2023-03-24 中国联合网络通信集团有限公司 Mobile communication method and system
CN111163466B (en) * 2019-12-30 2022-12-16 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
CN111163466A (en) * 2019-12-30 2020-05-15 全链通有限公司 Method for 5G user terminal to access block chain, user terminal equipment and medium
WO2021174927A1 (en) * 2020-03-03 2021-09-10 支付宝实验室(新加坡)有限公司 Blockchain-based identity verification method and apparatus, device, and storage medium
CN111385755A (en) * 2020-03-18 2020-07-07 成都西加云杉科技有限公司 Bandwidth resource sharing method, device, equipment and readable storage medium
CN113572717A (en) * 2020-04-29 2021-10-29 青岛海尔滚筒洗衣机有限公司 Communication connection establishing method, washing and protecting equipment and server
CN113572717B (en) * 2020-04-29 2024-02-20 青岛海尔洗涤电器有限公司 Communication connection establishment method, washing and protecting equipment and server
CN111526154A (en) * 2020-04-30 2020-08-11 余伟霞 Service data sharing system based on block chain network
CN111586686A (en) * 2020-05-14 2020-08-25 中国联合网络通信集团有限公司 Method and system for network access authentication
CN111935075A (en) * 2020-06-23 2020-11-13 浪潮云信息技术股份公司 Block chain-based digital identity signing and issuing method, equipment and medium
CN114024692A (en) * 2020-07-15 2022-02-08 华为技术有限公司 Signing method, device and system
CN114024692B (en) * 2020-07-15 2023-06-20 华为技术有限公司 Signing method, device and system
CN111914230A (en) * 2020-07-17 2020-11-10 中国联合网络通信集团有限公司 Block chain-based identity authentication method, system, terminal device and storage medium
CN111914230B (en) * 2020-07-17 2023-06-23 中国联合网络通信集团有限公司 Identity verification method, system, terminal equipment and storage medium based on block chain
CN114124418B (en) * 2020-08-27 2023-11-21 中国移动通信集团河南有限公司 Block chain-based data processing method, device and system and electronic equipment
CN114124418A (en) * 2020-08-27 2022-03-01 中国移动通信集团河南有限公司 Data processing method, device and system based on block chain and electronic equipment
CN111970691A (en) * 2020-08-28 2020-11-20 北京邮电大学 Equipment authentication access method, device, equipment and computer readable storage medium
CN112183781A (en) * 2020-09-28 2021-01-05 日立楼宇技术(广州)有限公司 Authentication method and device for elevator maintenance personnel, computer equipment and storage medium
WO2022073420A1 (en) * 2020-10-10 2022-04-14 达闼机器人有限公司 Authentication system, registration and authentication method, apparatus, storage medium, and electronic device
CN112291064A (en) * 2020-10-10 2021-01-29 达闼机器人有限公司 Authentication system, registration and authentication method, device, storage medium and electronic equipment
WO2022111016A1 (en) * 2020-11-27 2022-06-02 达闼机器人股份有限公司 Mobile network access system and method, and storage medium, and electronic device
CN112506267B (en) * 2020-12-01 2024-04-19 上海银基信息安全技术股份有限公司 RTC calibration method, vehicle-mounted terminal, user and storage medium
CN112506267A (en) * 2020-12-01 2021-03-16 上海银基信息安全技术股份有限公司 RTC calibration method, vehicle-mounted terminal, user side and storage medium
WO2022143498A1 (en) * 2020-12-29 2022-07-07 中国移动通信有限公司研究院 Access control method and apparatus, and network-side device, terminal and blockchain node
CN114697061A (en) * 2020-12-29 2022-07-01 中国移动通信有限公司研究院 Access control method and device, network side equipment, terminal and block link point
CN115242418A (en) * 2021-06-29 2022-10-25 达闼机器人股份有限公司 Robot authentication system and method
WO2023273277A1 (en) * 2021-06-29 2023-01-05 达闼机器人股份有限公司 Robot authentication system and method
CN115250192A (en) * 2021-06-29 2022-10-28 达闼机器人股份有限公司 Robot network authentication system and method
WO2023273279A1 (en) * 2021-06-29 2023-01-05 达闼机器人股份有限公司 Network authentication system and method for robot
WO2023273269A1 (en) * 2021-06-29 2023-01-05 达闼机器人股份有限公司 Robot authentication system and method
CN115225428A (en) * 2021-06-29 2022-10-21 达闼机器人股份有限公司 Robot authentication system and method
CN115225428B (en) * 2021-06-29 2023-10-13 达闼机器人股份有限公司 Robot authentication system and method
CN113904774A (en) * 2021-08-27 2022-01-07 重庆小雨点小额贷款有限公司 Block chain address authentication method and device and computer equipment
CN114040143A (en) * 2021-11-15 2022-02-11 百视通网络电视技术发展有限责任公司 Method, system and equipment for IPTV service management
CN114040143B (en) * 2021-11-15 2024-04-05 百视通网络电视技术发展有限责任公司 Method, system and equipment for IPTV service management
CN114286342A (en) * 2021-12-20 2022-04-05 中国电信股份有限公司 Authentication method, system, electronic device, and computer-readable storage medium
CN114286342B (en) * 2021-12-20 2024-01-02 中国电信股份有限公司 Authentication method, authentication system, electronic device, and computer-readable storage medium
WO2023115913A1 (en) * 2021-12-20 2023-06-29 中国电信股份有限公司 Authentication method and system, and electronic device and computer-readable storage medium
CN115361390A (en) * 2022-10-21 2022-11-18 中国信息通信研究院 Method for joining a blockchain network, computer storage medium and electronic device

Also Published As

Publication number Publication date
WO2019104690A1 (en) 2019-06-06

Similar Documents

Publication Publication Date Title
CN108702622A (en) Mobile network's access authentication method, device, storage medium and block chain node
Braeken et al. Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks
CN104363631B (en) The connection method of wireless router, device and system
Buttyan et al. Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
RU2549521C2 (en) Indirect communication between devices
KR101793443B1 (en) Method, apparatus, program and recording medium for setting smart device management account
WO2020103284A1 (en) Smart card authentication method, smart lock, smart card, system and device
CN105357262B (en) Apparatus control method and device
CN105007575B (en) Method of calling and system
CN105744595B (en) Access method, apparatus, system and the storage medium of WLAN
CN105282158A (en) Intelligent equipment networking method, routing equipment, intelligent equipment and system
CN105491250B (en) Recognition methods, device and the equipment of the incoming number true and false
CN104933351A (en) Information security processing method and information security processing device
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN107205208B (en) Authentication method, terminal and server
CN109407528A (en) Safety access method, device, server and storage medium
CN110049062A (en) Verify code check method, device, electronic equipment and storage medium
CN106488450B (en) Connect the method and device of wireless network
CN104980919B (en) The acquisition methods and equipment of information of network service
CN105120452B (en) Transmit the method, apparatus and system of information
CN104951678B (en) Unlocking method and a device
CN104618987B (en) Access the method and device of network
CN106062762A (en) Application encryption method and device
CN105340353B (en) Device-to-device communication security
CN108989142A (en) Network test method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181023

RJ01 Rejection of invention patent application after publication