Method for generating and distributing movable IP Key
A key and root key technology, applied in the field of network security, can solve the problems of not being able to obtain MN-FA and FA-HA key information, not being able to update the FA-HA key, and not being able to guarantee prerequisites, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0152] Example 1: When the HA address is allocated by AAA
[0153] 1. Key generation and distribution based on PMIPv4
[0154] The prerequisites for this process are: 1) The HA address is assigned by AAA; 2) The authenticator knows the FA-IP; 3) The anchor authenticator and the PMIP-client are in the same physical entity; 4) AAA retains the root key (MIP-FA-RK, or MIP-RK, or EMSK); 5) Security assurance between MN-FA.
[0155] FIG. 4 is a schematic diagram of the PMIPv4-based key generation and distribution process of the present invention. As shown in Figure 4, the key generation and distribution of PMIPv4 includes the following steps:
[0156] 0. During the authentication process, the anchor authenticator sends the FA-IP address to HAAA (Home AAA) through a RADIUS (Remote Authentication Service for Dial-Up User) message.
[0157] Since the HA address is allocated by HAAA, after obtaining EMSK in the authentication process with MS, HAAA can calculate MIP-RK and MIP-FA-RK, ...
Embodiment 2
[0202] Embodiment 2: For the condition that the premise of AAA distribution HA is not established
[0203] 1. For PMIPv4 mode
[0204] Figure 7 is a flowchart of key generation and distribution when HA is not assigned by HAAA, which is different from the flow of HA address allocation in AAA in PMIPv4 mode in Figure 4:
[0205] (1) There is a dynamic HA discovery process between steps 2 / 3, and the FA notifies the anchor authenticator of the HA's IP. The MN-HA-K and FA-HA-K can be calculated only when the anchor authenticator knows the HA address.
[0206] (2) HA-IP The selected HA notifies AAA when requesting a key from AAA, and then AAA calculates the relevant key according to the HA address.
[0207] 2. For CMIPv4 mode
[0208] Figure 8 is a flow chart of key generation and distribution when HA is not allocated by HAAA in CMIPv4 mode, which is different from the process of HA address allocation in AAA in CMIPv4 mode in Figure 5:
[0209] (1) There is a dynamic HA discover...
Embodiment 3
[0211] Embodiment 3: Do not generate FA-related security keys
[0212] In the foregoing situations, it is considered that the security between MN-FA and FA-HA is guaranteed by MN-FA-K and FA-HA-K. When the security between MN-FA and FA-HA does not need to be considered, or is guaranteed by other means, the pre-appeal process can be simplified accordingly. The simplified process is as follows. At this time, the migration of FA will not affect the process, because there is no need to regenerate FA-related keys.
[0213] (1) Key generation and distribution of PMIPv4
[0214] Fig. 9 is a flow chart of generating and distributing the FA-related security key of PMIPv4, as shown in Fig. 9, the specific process is:
[0215] 1. MIP-RK (or MN-HA-K, or EMSK) and HA-IP are sent to the anchor authenticator (the former in the figure) during the authentication process, and MN-AAA-K may also be included.
[0216] 2. If the anchor authenticator does not have MN-HA-K, it will be calculated b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com