Identification method and apparatus for establishing host identity protocol (hip) connections between legacy and hip nodes

A technology of host identification protocol and identification mark, which is applied in the direction of wireless network protocol, digital transmission system, data exchange network, etc., can solve the problem that the HIP node 14 and the HIP agent 16 cannot initiate HIP negotiation without knowing the HIP node 14 and the HIP agent 16.

Inactive Publication Date: 2007-03-28
TELEFON AB LM ERICSSON (PUBL)
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Also, since legacy host 12 ignores the HIT and uses only the IP address of HIP node 14 when initiating a connection, HIP proxy 16 cannot initiate a HIP negotiation between itself and HIP node 14 because it does not know HIP node 14's HIT

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method and apparatus for establishing host identity protocol (hip) connections between legacy and hip nodes
  • Identification method and apparatus for establishing host identity protocol (hip) connections between legacy and hip nodes
  • Identification method and apparatus for establishing host identity protocol (hip) connections between legacy and hip nodes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] Embodiments of the invention are described within the framework of the GPRS / UMTS network architecture shown in FIG. 6 . The principles underlying one embodiment of the invention apply to UMTS as they do to GPRS.

[0083] As mentioned above, GPRS is designed as an expansion of the existing GSM network infrastructure, and its purpose is to provide connectionless packet data services.

[0084] GPRS introduces a number of new functional units supporting end-to-end transmission of IP-based packet data on top of GSM, which will be described below.

[0085] The communication system 100 shown in FIG. 6 includes a mobile station (MS) 102 in communication with a base transceiver station (BTS) 104 which in turn communicates with a base transceiver station (BSC) 106 . BTS 104 and BSC 106 together form a Base Station Subsystem (BSS). At BSC 106 , a packet control unit (PCU, not shown) distinguishes between circuit switched data destined for telephone network 110 and packet switche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is provided of using the Host Identity Protocol (HIP) to at least partially secure communications between a first host (102) operating in a first network environment and a second, HIP-enabled, host (122) operating in a second network environment, with a gateway node (114) forming a gateway between the two environments. In the method, an identifier is associated with the first host (102), stored at the gateway node (114), and sent to the first host (102). The identifier is then used as a source address in a subsequent session initiation message sent from the first host (102) to the gateway node (114), having an indication that the destination of the message is the second host (122). The stored identifier at the gateway node is then used to negotiate a secure HIP connection to the second host. The first network environment may bc a UMTS or GPRS environment, in which case the gateway node may be a Gateway GPRS Support Node (GGSN).

Description

technical field [0001] The present invention relates to a method of using the Host Identity Protocol (HIP) for at least partially securing communications between two hosts operating in two different respective network environments, at least one of which is HIP enabled. Background technique [0002] When the Internet was originally designed, the location of hosts was fixed and there was implicit trust between users despite the lack of actual security or host identification protocols, and this continued even after the technology became more widely known and used. There is little need to consider techniques for handling host mobility because computers are large and cannot be moved. [0003] With the transformation of the telecommunications and computer industries in the early 1990s, smaller communication devices and computers became more widely available, and the invention of the World Wide Web and all the services that came with it finally made the Internet attractive to the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/08H04L29/06H04L29/12
CPCH04L61/10H04L29/08072H04L29/12066H04L29/12018H04L63/164H04L63/08H04L29/06537H04W80/04H04L61/1511H04W8/04H04L69/329H04L69/24H04L61/4511
Inventor P·A·约克拉P·尼坎德P·M·萨尔梅拉J·阿科J·伊利塔洛
Owner TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products