Internet key management protocol re-negotiation authentication method and device

A technology of key management protocol and authentication method, which is applied in key distribution and can solve security problems

Active Publication Date: 2016-11-30
HANGZHOU DPTECH TECH
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The authentication method and device for Internet Key Management Protocol (IKE) renegotiation provided by this application, to solve the security problems existing in IKE renegotiation in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet key management protocol re-negotiation authentication method and device
  • Internet key management protocol re-negotiation authentication method and device
  • Internet key management protocol re-negotiation authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0031] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an internet key management protocol (IKE) re-negotiation authentication method and device. The method comprises: in the first negotiation stage of the IKE renegotiation, a device at one end performs encryption of the ID of a local device through the SA obtained by IKE renegotiation between the device at one end and the device at an opposite end at the last time; the encrypted ID is sent to the device at the opposite end; after the ID sent by the device at the opposite end is received, the decryption is performed through the SA obtained by the IKE renegotiation between the device at one end and the device at an opposite end at the last time; it is determined whether the decrypted ID is consistent to the obtained ID at the negotiation at the last time or not; and the authentication passes in the condition that the decrypted ID is consistent to the obtained ID at the negotiation at the last time. According to the embodiment of the invention, the safety can be ensured in the re-negotiation process of the internet key management protocol with no need for performing the EAP authentication.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to an authentication method and device for Internet Key Management Protocol (IKE) renegotiation. Background technique [0002] As the resource requirements of the remote access center increase, remote access technology is introduced accordingly. [0003] Usually, in the process of remote access, the two parties in the communication need to negotiate a key first, so as to ensure the security of the data in the communication process. This process is called a key management protocol (Internet Key Exchange, IKE), and the negotiated result is called a security association (Security Association, SA). [0004] Specifically, the IKE negotiation process can be divided into two negotiation phases: a first negotiation phase and a second negotiation phase. The first negotiation phase is used for negotiating the first key shared by both parties for protecting the second phase, n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L63/06H04L63/083
Inventor 张鹤岭
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products