Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for exchanging and consulting secret keys between mobile device and safe access gateway

A key exchange and mobile device technology, applied in the field of computer communication and data security, can solve the problems of prolonging the IKE interaction time, difficult for the access server to control the DHCP server, heavy burden on the remote access server, etc., and achieves the realization of intranet IP allocation , Increase the effect of extended authentication

Inactive Publication Date: 2010-06-16
TONGJI UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this solution is that a DHCP SA needs to be established temporarily, which not only prolongs the IKE interaction time, but also brings a large burden to the remote access server, and because it is difficult for the access server to control the DHCP server, different user identities can choose Different address pools allocate internal addresses, causing access control difficulties
Although the solution combining L2TP (Layer Two Tunneling Protocol) with IPSec can realize the dynamic allocation of intranet addresses and extended authentication of user names and passwords, this solution requires additional L2TP negotiation and multiple encapsulations during IPSec data transmission. lead to inefficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for exchanging and consulting secret keys between mobile device and safe access gateway
  • Method for exchanging and consulting secret keys between mobile device and safe access gateway
  • Method for exchanging and consulting secret keys between mobile device and safe access gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will further illustrate the present invention in conjunction with the accompanying drawings and specific embodiments, but are not intended to limit the scope of the present invention.

[0029] Such as figure 1 Shown, the main steps that method of the present invention comprises are as follows:

[0030] The client (mobile device) negotiated by IKE sends the fifth message carrying user identity authentication information to the access gateway, requesting user identity authentication;

[0031] The access gateway receives the fifth message carrying user identity authentication information from the client, acquires the user identity information, and performs user identity authentication. If the authentication is passed, then assign an intranet IP address for the client, and send the sixth message carrying the intranet IP address information to the client;

[0032] The client receives the sixth message carrying the intranet IP address information from the acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for exchanging and consulting secret keys between a mobile device and a safe access gateway. The method comprises the following steps: in the IKE first stage master mode consultation process, the mobile device sends the fifth message carrying user identity identification information to the access gateway; the access gateway performs identity identification on a remote device according to the fifth message; if the identification passes, the access gateway allocates an intranet IP address to the mobile device and sends the sixth message carrying intranet IP address information to the mobile device; and the mobile device receives the sixth message and acquires the intranet IP address. In the method of the invention, standard IKE interactive flow is modified, on the basis of ensuring system safety, the expanding identification of user identity and dynamic intranet IP allocation of client are realized, thus overcoming the defects of low efficiency and poor controllability existing in the prior art and satisfying requirements on user remote safe access under mobile environment.

Description

technical field [0001] The invention belongs to the field of computer communication and data security, and mainly relates to a security key negotiation technology and a remote access technology, in particular to a key exchange negotiation method between a mobile device and a security access gateway. Background technique [0002] The rapid development of smart terminals and wireless network communication makes it easy for people to use smart mobile terminals to access the Internet anytime and anywhere. However, at present, services with high confidentiality requirements are rarely applied on mobile terminals. This is because mobile networks are open networks. In addition to facing the security threats of fixed networks, they also face low bandwidth, Large interference, poor stability, easy packet loss, more vulnerable to eavesdropping and other problems. At the same time, smart mobile terminals also have the characteristics of low computing power, small storage capacity, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W12/08
Inventor 谭成翔汪海航谭博舒明磊
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products