Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Recertification method, system and authentication device

A re-authentication and authentication technology, applied in transmission systems, data exchange through path configuration, electrical components, etc., can solve problems such as increasing the difficulty of implementation, and achieve the effects of reducing implementation complexity, shortening delay, and avoiding impact

Inactive Publication Date: 2009-12-09
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] Although the above method can achieve re-authentication, it needs to rebuild the EAP-initial message and EAP-finish message, which is a conflict with the existing standard framework, and the existing authentication server needs to be upgraded, which increases the difficulty of implementation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recertification method, system and authentication device
  • Recertification method, system and authentication device
  • Recertification method, system and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In the embodiment of the present invention, the mobile node MN that supports re-authentication is authenticated once by the authentication device of the visited network, thereby avoiding the change of the existing network equipment and the existing protocol framework during the re-authentication process, and improving the re-authentication efficiency.

[0035] Such as figure 2 As shown, it is a flow chart of a re-authentication method provided by the embodiment of the present invention. The re-authentication in the embodiment of the present invention refers to the re-authentication performed in the visited network after the mobile node MN moves from the home network to the visited network. In order to realize re-authentication, when the mobile node accesses the home network, it needs to complete the first access authentication with the home AAA, and the re-authentication material for re-authentication is generated between the MN and the home AAA (step 201) . Wherein,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a recertification method, a system and an authentication device. The recertification method comprises the steps: judging whether a mobile node accessed into a local network supports recertification; if the mobile node supports the recertification, obtaining a recertification main session key (rMSK) generated according to recertification materials of the mobile node; generating paired main keys (PMK) according to the rMSK; and carrying out the mutual certification according to the PMK and the mobile mode. The invention can avoid the impaction of the prior standard frame and the large-scale update reconstruction of a network device, in particular to the authentication device, effectively shorten recertification time delay and reduce the realization complexity of the recertification.

Description

technical field [0001] The invention relates to mobile communication technology, in particular to a re-authentication method, system and authentication device. Background technique [0002] With the development of technology, modern communications have higher and higher requirements for mobility. Current mobile communications require terminals to communicate normally in mobile or roaming scenarios. The so-called mobility means that the access point (Attach Point, AP) of the terminal changes along with the movement of the terminal. A series of steps need to be performed for a terminal to move from an old access point to a new access point, including: leaving the original access point, performing new access authentication, and establishing a corresponding configuration relationship at the new access point. During the period when the terminal switches from the old access point to the new access point, the communication will be temporarily interrupted or delayed. For some servi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L29/06
Inventor 潘云波李春强黄志钢
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products