Method and equipment for establishing safe data tunnel

A technology of data tunnel and secure data, applied in the field of mobile communication, can solve the problems of complex process, unsafe data tunnel, low efficiency, etc., and achieve the effect of a simple way

Inactive Publication Date: 2009-09-23
HUAWEI TECH CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The inventor finds in the process of realizing the present invention: for how to protect the data tunnel of mobile IP, there is no relevant mechanism defined in MIPv4 and PMIP, causes the data tunnel of data MIPv4 to be insecure
MIPv6 defines that IPsec SA can be used to protect user data, but the disadvantage of IPsec is that the process of using IKE to establish SA is more complicated and less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for establishing safe data tunnel
  • Method and equipment for establishing safe data tunnel
  • Method and equipment for establishing safe data tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention will be described below with reference to the accompanying drawings. see Figure 4 , is a schematic flowchart of an embodiment of a method for establishing a secure data tunnel in the present invention, wherein the IP network is a mobile IP network or a proxy mobile IP network, and the method includes:

[0036] 401. The first device sends a security parameter to the second device through a Mobile IP signaling request message, where the security parameter includes at least one of a security algorithm, a security mechanism, and a parameter for calculating a key.

[0037] Specifically, the security algorithm may be an integrity algorithm and an encryption algorithm, and the security algorithm may only include the integrity algorithm, or only the encryption algorithm, or include the two algorithms. If the first device and the second device have agreed on the security algorithm to be used in advance, the security algorithm may not be inc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting a data tunnel in an IP network, which comprises the steps of: receiving safety parameters sent by first equipment through a mobile IP signaling message; selecting negotiation safety parameters supported by equipment and the first equipment according to the safety parameters, and generating a first key used for protecting the data tunnel; and sending the negotiation safety parameters to the first equipment through the mobile IP signaling message for the first equipment to generate a second key according to the negotiation safety parameters, wherein the second key is the same as the first key. The invention also discloses mobile communication equipment and home agent communication equipment. The method and the equipment adopted can establish the safe data tunnel in an MIP and a PMIP by adopting a simple mode.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method for establishing a safe data tunnel, a mobile communication device and a home agent communication device. Background technique [0002] Mobile Internet Protocol (Internet Protocol, IP) is a scheme that provides mobile functions on the global Internet, so that mobile user nodes can still maintain ongoing communication when switching links. At present, Mobile IP (Mobile IP, MIP) includes two communication modes of different protocols, MIPv4 and MIPv6. figure 1 It is a schematic diagram of a network architecture of the existing MIPv4 in the FA CoA communication mode; figure 1 As shown, when using MIPv4, after a mobile node (Mobile Node, MN) moves from a home network to a foreign network, it needs to assign a new Care-of Address (CoA) to the MN in the home agent ( Home Agent, HA) for binding, so that HA can send messages sent to MN by other entities (communication partn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/08
Inventor 赵洁刘继兴黄龙贵钟鑫李志明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products