Generation and distribution method and system for mobile IP secret key
A key and sub-key technology, applied in the field of network security, can solve problems such as complexity, non-use, and inconsistent key update methods, and achieve the effect of avoiding complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0111] Embodiment 1: Generation and distribution of PMIPv4 keys
[0112] (1) Generation and distribution of PMIP keys based on random numbers
[0113] Figure 4a For the generation and distribution process of the mobile IP key based on random numbers under the PMIP mode of the present embodiment, as Figure 4a As shown, it specifically includes the following steps:
[0114] Step 1. In the process of access verification or re-authentication authentication, the AAA server calculates MN-AAA-SUB-K based on MN-AAA-K (or pre-configured key), and includes MN-AAA-SUB-K and the key information of the root key are sent to the anchor authenticator (Anchor Authenticator).
[0115] The root key may be the MN-AAA-SUB-K itself, or other root keys, such as MSK, EMSK, or MIP-RK. When the root key is MN-AAA-SUB-K itself, MN-AAA-SUB-K is used both to generate MN-AAA-AE and to calculate the MIP key; the root key of the MIP key In the case of other root keys, MN-AAA-SUB-K can be specially use...
Embodiment 2
[0141] Embodiment 2: Generation and distribution of CMIPv4 keys
[0142] (1) Generation and distribution of CMIPv4 keys based on random numbers
[0143] Figure 5a For the generation and distribution process of the mobile IP key based on random numbers under the CMIP mode of this embodiment, as Figure 5a As shown, it specifically includes the following steps:
[0144] Step 1. MS and AAA server calculate MN-AAA-SUB-K according to MN-AAA-K (or preconfigured key). The AAA server sends the root key including the mobile IP key to the anchor authenticator.
[0145] Wherein, the root key may be MN-AAA-SUB-K itself, or another root key, such as MSK, EMSK, or MIP-RK, etc., to calculate the MIP key.
[0146] Step 2. The foreign agent FA sends an agent advertisement to the mobile node MS.
[0147] Step 3. After the mobile node MS receives the agent broadcast sent by the foreign agent FA, it can use MN-AAA-SUB-K to calculate MN-AAA-AE and trigger the mobile IP registration process a...
Embodiment 3
[0171]Embodiment 3: Key distribution directly carrying MN-FA-AE
[0172] In the case that the outermost layer of the network guarantees security, this embodiment can also provide a solution that satisfies the conditions.
[0173] (1) Generation and distribution of PMIPv4 keys
[0174] Such as Figure 7a shown, including the following steps:
[0175] Step 1. In the process of access verification or re-authentication authentication, the AAA server calculates MN-AAA-SUB-K based on MN-AAA-K (or pre-configured key), and includes MN-AAA-SUB-K and the key information of the root key are sent to the anchor authenticator (Anchor Authenticator).
[0176] The root key may be the MN-AAA-SUB-K itself, or other root keys, such as MSK, EMSK, or MIP-RK. When the root key is MN-AAA-SUB-K itself, MN-AAA-SUB-K is used both to generate MN-AAA-AE and to calculate the MIP key; the root key of the MIP key In the case of other root keys, MN-AAA-SUB-K can be specially used to generate MN-AAA-AE, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 