Generation and distribution method and system of mobile IP secret key after second authentication
A key and authentication technology, applied in the field of network security, can solve problems such as rejection of mobile IP registration requests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0088] This embodiment corresponds to the re-authentication process of the mobile node, where the AAA server (the AAA server may be the home AAA server or the visited AAA server) actively issues a new key to the home agent.
[0089] In Embodiment 1, after the re-authentication of the mobile node occurs, both the mobile node and the AAA server regenerate a new EMSK. During the re-authentication process, the authentication, authorization and accounting AAA server sends the newly generated relevant key to the anchor authenticator, and at the same time notifies the home agent of the new mobile IP key.
[0090] The new Mobile IP-related keys sent by the AAA server to the Anchor Authenticator and Home Agent include one of the following:
[0091] 1) EMSK;
[0092] 2) MIP-RK;
[0093] 3) MIP-FA-RK and MN-HA-K;
[0094] 4) One of the first three keys and MN-HA-K and FA-HA-K.
[0095] Among them, there are two ways of generating FA-HA-K as follows:
[0096] Method 1: directly deriv...
Embodiment 2
[0118] This embodiment corresponds to a method for generating and distributing a mobile IP key when the AAA does not actively deliver the key to the home agent during the re-authentication process.
[0119] After re-authentication of the mobile node, the EMSK is regenerated. During the re-authentication process, the AAA server sends the newly generated related key to the anchor authenticator, and the mobile node also obtains the related key independently at the same time.
[0120] The related keys include: EMSK or MIP-RK or MIP-FA-RK, and other MIP keys.
[0121] Fig. 5 is a flow chart of key generation and distribution when AAA does not actively deliver mobile IP keys in CMIPv4 mode. As shown in Figure 5, the generation and distribution of the mobile IP key after re-authentication includes the following steps:
[0122] 1. During the re-authentication process, AAA sends a new related key to the anchor authenticator.
[0123] All mobile IP keys are distributed before re-auth...
Embodiment 3
[0141] Embodiment 3: Do not generate FA-related security keys
[0142] In the foregoing embodiments, it is considered that the security between the MN-FA and the FA-HA is guaranteed by the MN-FA-K and the FA-HA-K. In the case that the security between the MN-FA and the FA-HA does not need to be considered, or is guaranteed by other means, the aforementioned process can be simplified accordingly.
[0143] 1. In PMIP mode, the generation and delivery of mobile IP keys after re-authentication includes the following steps:
[0144] 1. The AAA server and the MS independently calculate and generate a new EMSK at the same time during the EAP (Extensible Authentication Protocol) process of re-authentication authentication;
[0145] 2. The AAA server sends the EMSK or MIP-RK or MN-HA-K and context information to the anchor authenticator during the EAP process of re-authentication authentication;
[0146] 3. The AAA server actively sends the EMSK or MIP-RK or MN-HA-K to the home agent...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com