IKE authentication method, IKE initiating terminal, IKE response terminal and IKE authentication system

An authentication method and technology of an authentication system, applied in the field of IKE response terminal and IKE authentication system, can solve problems such as authentication failure and unsupported IKE response terminal authentication type, and achieve the effect of avoiding authentication failure

Inactive Publication Date: 2016-03-30
ZTE CORP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main technical problem to be solved by the present invention is to provide an IKE authentication method, an IKE initiating terminal, an IKE responding terminal and an IKE authentication system to solve the problem of the authentication type adopted by the IKE initiating terminal in the existing IKE authentication process because the IKE initiating terminal does not support the IKE responding terminal. Problems that cause authentication to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IKE authentication method, IKE initiating terminal, IKE response terminal and IKE authentication system
  • IKE authentication method, IKE initiating terminal, IKE response terminal and IKE authentication system
  • IKE authentication method, IKE initiating terminal, IKE response terminal and IKE authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Please refer to figure 2 As shown, the IKE authentication methods provided in this embodiment include:

[0049] Step 201: The IKE responding terminal receives the first authentication request sent by the IKE initiating terminal, and the first authentication request includes the authentication type used by the IKE initiating terminal;

[0050] Step 202: The IKE responding terminal acquires the authentication type used by the IKE initiating terminal from the first authentication request, and generates a second authentication request according to the acquired authentication type; that is, uses the acquired authentication type to generate a second authentication request to ensure that the IKE initiating terminal Can support the identification of the authentication type;

[0051] Step 203: The IKE responding terminal sends the generated second authentication request to the IKE initiating terminal for authentication.

[0052] In this embodiment, after receiving the first a...

Embodiment 2

[0060] Please refer to image 3 As shown, the IKE authentication methods provided in this embodiment include:

[0061] Step 301: The IKE initiating terminal generates a first authentication request, and the generated first authentication request includes the authentication type used by the IKE initiating terminal;

[0062] Step 302: the IKE initiating terminal sends a first authentication request to the IKE responding terminal;

[0063] Step 303: The IKE initiating terminal receives the second authentication request sent by the IKE responding terminal; the second authentication request is generated by the IKE responding terminal according to the authentication type included in the first authentication request.

[0064] In this embodiment, the process of generating the first authentication request by the IKE initiating terminal is: the calculation result data obtained by the IKE initiating terminal calculating the first original authentication data according to the locally con...

Embodiment 3

[0070] See Figure 4 As shown, the IKE authentication methods provided in this embodiment include:

[0071] Step 401: The IKE initiating terminal generates a first authentication request, and sends the first authentication request to the IKE responding terminal, where the first authentication request includes the authentication type used by the IKE initiating terminal;

[0072] Step 402: The IKE responding terminal receives the first authentication request sent by the IKE initiating terminal, and obtains the authentication type used by the IKE initiating terminal from the first authentication request;

[0073] Step 403: The IKE responding terminal generates a second authentication request according to the obtained authentication type, and sends the second authentication request to the IKE initiating terminal;

[0074] Step 404: The IKE initiating terminal receives the second authentication request sent by the IKE responding terminal.

[0075] In this embodiment, the IKE init...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IKE authentication method, an IKE initiating terminal, an IKE response terminal and an IKE authentication system. The IKE initiating terminal generates a first authentication request containing an authentication type currently used by the IKE initiating terminal, and sends the first authentication request to the IKE response terminal; and the IKE response terminal obtains the authentication type used by the IKE initiating terminal after receiving the first authentication request, then generates a second authentication request according to the authentication type and sends the second authentication request to the IKE initiating terminal. It is obvious that, in the invention, the authentication type adopted by the IKE response terminal when generating the second authentication request is obtained from the first authentication request, that is, the authentication type adopted by the IKE response terminal is consistent with the authentication type adopted by the IKE initiating terminal, and the IKE initiating terminal certainly supports the authentication type. Therefore, by adopting the scheme provided by the invention, the IKE response terminal can adapt to authentication types in an intelligent manner for different IKE initiating terminals, thereby avoiding the problem that the authentication fails because the IKE initiating terminal does not support the authentication type adopted by the IKE response terminal.

Description

technical field [0001] The invention relates to the field of communication network security, in particular to an IKE (Internet Key Exchange, Internet Key Exchange Protocol) authentication method, an IKE initiating terminal, an IKE responding terminal and an IKE authentication system. Background technique [0002] With the rapid development of the Internet, the IP network has gradually become an indispensable tool in people's daily work and life, and the demand for security assurance of data transmission on the IP network is becoming increasingly strong. As we all know, IP network is an open network, and there is no security at all to use IP network for data communication without taking any measures. In order to meet the needs of obtaining secure communication on the IP network, the IPSec (IPSec, IP Security) working group of the Internet Engineering Task Force has developed a set of open network security protocols based on cryptography, collectively called the IPSec architec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/32
Inventor 唐大圆
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products