Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for use in a communications network

A technology of communication network and encryption, applied in the field of communication network, can solve the problem of computing burden imposed by MN

Inactive Publication Date: 2010-10-13
TELEFON AB LM ERICSSON (PUBL)
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, this approach imposes a computational burden on the MN due to the need to perform electronic signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for use in a communications network
  • Method and apparatus for use in a communications network
  • Method and apparatus for use in a communications network

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0039] In the CGA approach described in RFC 3972, the MA derives a random 128-bit parameter called a modifier (MD). Among other parameters such as the network prefix and the MN's CGA public key (Kp), the MD is used to generate the 64-bit ID. figure 2 The CGA parameters are shown in . According to a first embodiment of the invention, HKp is used when generating MD by concatenating it with a random 128-bit value (such as the value of MD in prior art CGA) and then hashing the result , to generate MD. The first 128 bits of the resulting hash value are used as the new MD. This can be represented as follows:

[0040] New MD = First[128, Hash(HKp|RAN(128))]

[0041] Where "RAN(128)" is a random 128-bit parameter.

[0042] Although there can be many (HKp, RAN(128)) values ​​that yield the same "new MD"; if a cryptographic (collision-resistant) hash function is used, it can be assumed to find another (HKp, RAN(128) that gives the same MD ) pair is computationally infeasible (for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for establishing a cryptographic relationship between a first node (102) and a second node (101) in a communications network. The first node receives at least part of a cryptographic attribute of the second node, uses the received at least part of the cryptographic attribute to generate an identifier for the first node. The cryptographic attribute may a public key belongingto the second node, and the identifier may be a Cryptographically Generated IP address. The cryptographic relationship allows the second node to establish with a third node that is entitled to act onbehalf of the first node.

Description

technical field [0001] The present invention relates to the field of communication networks, in particular to establishing a cryptographic relationship between two nodes in the communication network. Background technique [0002] Mobile IPv6 (MIPv6), described in D. Johnson, C. Perkins and J. Arkko, "Mobility Support in IPv6", RFC 3775, June 2004, allows users of mobile communication devices to move from one network to another while maintaining A permanent IP address, regardless of which network it is on. This allows users to stay connected while on the move. For example, if a user is participating in a Voice over IP (VoIP) session, and the user moves from one network to another during the session, without MIPv6 support, the user's IP address may change. This will cause problems with VoIP sessions. [0003] A mobile node (MN) is assigned two IP addresses: a permanent home address and a care-of address (CoA). The CoA is associated with the access network (the IP subnet th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W80/04H04W88/02
CPCH04L63/0823H04W12/04H04L2463/081H04W8/082H04W80/04H04W88/182H04W88/02H04W12/06H04L9/3239H04L2209/80H04W12/041H04W12/0433H04L9/0643H04L9/3236H04W8/02H04W8/26H04W88/16H04L63/0281H04L61/59H04L67/56
Inventor 瓦西姆·哈达德马茨·内斯隆德
Owner TELEFON AB LM ERICSSON (PUBL)
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More