Legal neighbor authentication method and device in group key management
A group key and key technology, applied in the field of group key management, can solve problems such as difficulty in deployment and dependence on PKI, and achieve good flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0048] In this preferred embodiment, taking the OSPFv3IPsec application scenario and using legal neighbor authentication in Delegate dynamic election as an example, the group shared key reuses the authentication / integrity key (authentication / integrity key) in the GSA, and the group The sharing algorithm adopts the same algorithm as GSA, and the self-authentication information of the authenticated group members is election information (Delegate message), and the group members on the local network that need automatic group key service are routers. For the convenience of description, it is assumed that the local network in this preferred embodiment includes two routers, which need to mutually authenticate each other as legal neighbors. These two routers are called the first router and the second router respectively. When the network is initially started, manually Configure the initial GSA for the first router and the second router. The network structure of this preferred embodime...
Embodiment approach 2
[0059]In this preferred implementation mode, the application scenario of OSPFv3IPsec is still taken, and legal neighbor authentication is used in Delegate dynamic election as an example, but GSA is not used, but a new SA is defined in the GKM protocol, which is called group authentication SA (Group Authentication SA, GASA). The above-mentioned newly defined GASA includes a group authentication policy and an authentication key, wherein the group authentication policy includes at least a group sharing algorithm, a key length, and a key lifetime. For the convenience of description, it is assumed that the local network in this preferred embodiment includes two routers, which need to mutually authenticate each other as legal neighbors. These two routers are called the third router and the fourth router respectively. When the network is initially started, manually The third router and the fourth router configure initial GASA. The network structure of this preferred embodiment can b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com