Main-mode IKE negotiation method
A main mode, negotiating message technology, applied in the field of network communication, can solve the problem of uncertain ip address, unable to confirm the negotiation key of user identity, etc.
Inactive Publication Date: 2012-09-26
OPZOON TECH
5 Cites 2 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention discloses a main-mode IKE (Internet Key Exchange) negotiation method, which belongs to the field of network communication technology. The method comprises the following steps: embedding respective user identity information in a sending message at a first stage of the main-mode IKE negotiation initiated by the current end to the opposite end, when the current end and the opposite end are in first interaction negotiation; sending DH encryption information to the opposite end when the current end and the opposite end are in second interaction negotiation; and selecting corresponding secret key according to the user identity information of the opposite party and the DH encryption information when the current end and the opposite end are in third interaction negotiation. According to the invention, the respective user identity information is embedded in the sending message, when the current end and the opposite end are in first interaction negotiation, so that the method provided by the invention can be also realized when the ip address is uncertain.
Application Domain
Transmission
Technology Topic
Ip addressEncryption +3
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.