Method, system and apparatus for protecting proxy mobile internet protocol signalling

A protection proxy and signaling technology, applied in wireless network protocols, secure communication devices, security devices, etc., can solve the problem of not providing a random number transmission method for calculating the shared key, low efficiency in the search process, and PMIP signaling does not support random numbers issues such as transmission

Active Publication Date: 2008-12-17
HUAWEI TECH CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, after the shared key between the mobile IP agent and the HA is determined, that is, after the security association between the two is determined, the HA receives the PMIP signaling from the mobile IP agent, and performs integrity verification on the PMIP signaling. Before testing, it is necessary to search for the security association corresponding to the PMIP signaling according to the IP address of the mobile IP a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and apparatus for protecting proxy mobile internet protocol signalling
  • Method, system and apparatus for protecting proxy mobile internet protocol signalling
  • Method, system and apparatus for protecting proxy mobile internet protocol signalling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purpose, technical solutions and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings.

[0066] The first method for protecting PMIP signaling provided in the embodiments of the present invention includes:

[0067] The centralized control point calculates the shared key of the mobile IP agent and the HA; generates the SPI that uniquely identifies the shared key; the mobile IP agent sends the PMIP signaling to the HA, and uses the shared key to protect the integrity of the PMIP signaling, Carry the SPI in the PMIP signaling and send it to the HA; the HA receives the PMIP signaling from the mobile IP agent, uses the same method as the centralized control point to calculate the shared key, and uses the calculated shared key to verify the received The integrity of the PMIP signaling, when the verification is successful, save t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses two methods for protecting PMIP signaling. In one method, a centralized control point or a mobile IP agent generates SPI of a unique identification sharing cipher key; while in the other method, a mobile IP agent triggers a home agent HA to generate SPI of a unique identification sharing cipher key. The embodiment of the invention also discloses three systems for protecting PMIP signaling, the three systems realize the method of generating SPI of a unique identification sharing cipher key respectively by the centralized control point, the mobile IP agent and the HA. The embodiment of the invention further discloses a centralized control point, a mobile IP agent and a HA, which can generate SPI of a unique identification sharing cipher key. The embodiment of the invention further discloses another mobile IP agent, for triggering HA to generate SPI of a unique identification sharing cipher key. The method, system and device disclosed by the embodiment of the invention can perfect PMIP signalling protection mechanism.

Description

technical field [0001] The invention relates to mobile Internet protocol (IP) technology, in particular to a method, system and device for protecting proxy mobile IP (PMIP) signaling. Background technique [0002] Proxy Mobile IP technology is proposed on the basis of Mobile IP. Its purpose is to provide mobility management services for terminals that do not support Mobile IP, and it can also reduce the transmission of air interface signaling. figure 1 It is a structural diagram of the prior art protection PMIP signaling system, the system mainly includes: mobile IP agent, home agent (HA, Home Agent) and centralized control point, HA can also be called local mobility anchor point (LMA, Local Mobility Anchor), the following uses HA to replace the home agent for the convenience of description. [0003] Among them, the mobile IP agent is usually located on the access entity of the wireless network where the mobile terminal is located, and replaces the mobile terminal within it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
CPCH04W80/04H04W12/069
Inventor 赵洁刘继兴李志明黄龙贵钟鑫
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products