SA (security association) negotiation method, device and system

A technology for security association and communication equipment, applied in the field of digital information transmission, can solve the problems of complex SA negotiation implementation process, heavy communication load, etc., and achieve the effects of security supervision and legal monitoring, low communication load, and simple process.

Active Publication Date: 2014-12-17
CHINA MOBILE COMM GRP CO LTD
View PDF9 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] In view of this, the main purpose of the present invention is to provide a SA negotiation method, device and system, which can solve the problems of complex SA negotiation implem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SA (security association) negotiation method, device and system
  • SA (security association) negotiation method, device and system
  • SA (security association) negotiation method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0066] The embodiment of the present invention records an SA negotiation method, figure 2 It is a schematic diagram of the implementation flow of the SA negotiation method in the embodiment of the present invention, such as figure 2 shown, including:

[0067] Step 201: The key server generates a private key corresponding to the communication initiator and a private key corresponding to the communication responder for the communication initiator and the communication responder respectively;

[0068] The key server is configured for key management.

[0069] Preferably, the key server generates a master key, and determines the private key corresponding to the communication initiator according to the master key and the identity (ID, Identity) of the communication initiator, and, according to the The master key and the ID of the commu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SA (security association) negotiation method, device and system. The method includes the steps: a key server generates a private key for a communication initiator and a private key for a communication responder; the communication initiator and the communication responder encrypt digital digests of respective messages, to be transmitted, into signatures through the respective private keys, respectively; the signatures are packaged in the messages, to be transmitted, and transmitted to the other parity; the communication initiator and the communication responder determine each other's public keys and use the public keys and the received signatures in the messages to authenticate each other. Through the use of the SA negotiation method, device and system, the problems that an SA negotiation implementation process is complex and communication load is high can be solved; security supervision and lawful interception can be performed on deployment of communication of an IPSec (internet protocol security) protocol network.

Description

technical field [0001] The present invention relates to digital information transmission technology, in particular to a security association (SA, Security Association) negotiation method, device and system. Background technique [0002] At present, the limited address space defined by Internet Protocol version 4 (IPv4, Internet Protocol version 4) will be exhausted, and the lack of address space will hinder the further development of the Internet. Therefore, in order to expand the address space, based on Internet Protocol version 6 (IPv6, The network deployment of Internet Protocol version6) has been gradually put on the agenda. [0003] Compared with IPv4, IPv6 has been improved in many aspects, such as: in terms of security, it supports Internet Protocol Security (IPSec, Internet Protocol Security) protocol, so that IPv6 network can realize end-to-end and gateway-to-gateway encrypted communication and authentication Authentication, thus ensuring the communication security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/06
Inventor 王静左敏任兰芳
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products