A time check method and a base station are provided. The base station receives an authentication interaction message sent by an authentication interaction device; extracts time information in the authentication interaction message; and uses the time information to check local time. Before an Interne
A time check method and a base station are provided. The base station receives an authentication interaction message sent by an authentication interaction device; extracts time information in the authentication interaction message; and uses the time information to check local time. Before an Internet Key Exchange (IKE) connection is set up between the base station and a security gateway, relatively accurate time is obtained from an external authentication interaction device and is used for aligning the local time. Therefore, the cost of installing a clock component and a battery is saved, the time on the base station is trustworthy, and the security gateway is authenticated securely.
대표청구항▼
1. A time checking method, comprising: receiving, by a base station, a certificate revocation list (CRL) file as a download response sent by a CRL server, the CRL file including an update time, wherein the receiving of the CRL file as the download response takes place independent of an authenticatio
1. A time checking method, comprising: receiving, by a base station, a certificate revocation list (CRL) file as a download response sent by a CRL server, the CRL file including an update time, wherein the receiving of the CRL file as the download response takes place independent of an authentication between the base station and a gateway, which receiving is prior to setting up an Internet key exchange (IKE) security association (SA) between the base station and the security gateway in a subsequent authentication; andaligning, by the base station, current time of the base station to the update time of the CRL file. 2. The method according to claim 1, wherein the aligning step comprises: regarding, by the base station, the update time included in the CRL file as the current time of the base station which is used for determining validity of a digital certificate of the security gateway. 3. The method according to claim 1, further comprising: processing, by the base station, a digital certificate of the security gateway via the update time included in the CRL file to set up the IKE SA between the base station and the security gateway. 4. A time checking method, comprising: receiving, by a base station, a certificate revocation list (CRL) file as a file transfer protocol (FTP) handshake response sent by the CRL server, the CRL file including a server current time, wherein the receiving of the CRL file as the FTP handshake response takes place independent of an authentication between the base station and a gateway, which receiving is prior to setting up an internet key exchange (IKE) security association (SA) between the base station and the security gateway in a subsequent authentication; andaligning, by the base station, current time of the base station to the current time of the CRL server. 5. The method according to claim 4, wherein the aligning step comprises: regarding, by the base station, the current time of the CRL server as the current time of the base station which is used for determining validity of a digital certificate of the security gateway. 6. The method according to claim 4, further comprising: processing, by the base station, a digital certificate of the security gateway via the current time of the CRL server to set up the IKE SA between the base station and the security gateway. 7. A non-transitory computer-readable program product, comprising computer program code, which, when executed by at least a processor in a computer unit of a base station, causes the base station to perform: receiving by the base station, an update time in a certificate revocation list (CRL) file as a download response sent by a CRL server, the CRL including the update time, wherein the receiving of the CRL file as the response takes place independent of an authentication between the base station and a gateway, which receiving is prior to setting up an internet key exchange (IKE) security association (SA) between the base station and the security gateway in a subsequent authentication; andaligning current time of the base station to the update time of the CRL file. 8. The computer program product according to claim 7, wherein the aligning step comprises: regarding the update time of the CRL file as the current time of the base station which is used for determining validity of a digital certificate of the security gateway. 9. The computer program product according to claim 7, wherein the computer program code causes the computer unit to further perform: processing a digital certificate of the security gateway via the update time of the CRL file to set up the IKE SA between the base station and the security gateway. 10. A non-transitory computer-readable program product, comprising computer program code, which, when executed by at least a processor in a computer unit of a base station, causes the base station to perform: receiving by the base station from a certificate revocation list (CRL) server, a CRL file as a file transfer protocol (FTP) handshake response sent by the CRL server, the CRL file including a current time and wherein the receiving of the CRL file as the FTP handshake response takes place independent of an authentication between the base station and a gateway, which receiving is prior to setting up an intranet key exchange (IKE) security association (SA) between the base station and the security gateway in a subsequent authentication: andaligning current time of the base station to the current time of the CRL server. 11. The computer program product according to claim 10, wherein the aligning step comprises: regarding the current time of the CRL server as the current time of the base station which is used for determining validity of a digital certificate of the security gateway. 12. The computer program product according to claim 10, wherein the computer program code will cause the computer unit to further perform: processing a digital certificate of the security gateway via the current time of the CRL server to set up the IKE SA between the base station and the security gateway.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (2)
Quick ; Jr. Roy F. (San Diego CA), Random access communications channel for data services.
Hendrickson, Keith; Maguy, William; Prehn, Paul; Stamos, Nick; Su, Annie, System and method for measuring wireless device and network usage and performance metrics.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.