Safety key managing method of flexible IP network technology system

An IP network technology and secure key management technology, which is applied to the usage of multiple keys/algorithms, user identity/authority verification, etc., can solve problems such as key leakage, difficulty in distribution and maintenance, key generation, etc., to achieve Key management is simplified, the possibility of illegal use and theft of the legal identity of the mobile node is eliminated, and the effect of simplifying the difficulty

Inactive Publication Date: 2005-03-02
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The invention solves the technical problems that key generation, distribution and maintenance in the traditional mobile IP system are difficult to manage in a unified manner, and keys are easy to leak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The concrete steps of the present invention are as follows:

[0030] 1) Generate a key

[0031] 1.1) The network administrator logs in to the basic domain management entity as a super user, and the basic domain management entity adds corresponding users according to the IP address information of the mobile node applying for roaming;

[0032] 1.2) Through a series of negotiation between the mobile node and the basic domain management entity, the mobile node generates an identity ID and an initial state mark, and saves them; the identity ID contains the information of the authentication key and the encryption key. Since the network administrator establishes a connection between the basic domain management entity and the basic domain management entity in the identity of the super user and the password corresponding to the super user, illegal key negotiation between the ordinary user and the basic domain management entity is prevented. The data exchange in the negotiation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a safety cryptographic key management method between mobile nodes and basic domain management entity in a flexible IP network system including the following steps: 1) generating a cryptographic key, 2) A mobile node registers and certificates to the basic domain management entity on the basic network domain, 3) The mobile node registers and certificates to the basic domain management entity on the expanded network domain, solving the problem of difficult uniform management to the generation, distribution and maintenance of cryptographic keys in the traditional IP system.

Description

1. Technical field [0001] The invention relates to an IP network technology, in particular to a security key management method between a mobile node and a basic domain management entity in a flexible IP network technology system. The flexible IP network technology system refers to the basic domain management entity, the extended domain management entity, the access management entity, and the mobile node. Implement interactive access. 2. Background technology [0002] In the traditional mobile IP system, the key management generally adopts a decentralized way, and the generation and maintenance of the key are completed by each mobile user. The mobile user needs to maintain two keys: an authentication key, which is used to authenticate the identity of the home agent entity; and an encryption key, which is used to encrypt the data actually transmitted by the user after the registration is successful. After the user confirms the above two keys, he informs the network administr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/32
Inventor 万晓辉张宁章忠威李金成
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products