Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication negotiation method and device

A technology of authentication results and initiators, which is applied in the field of network communication and can solve problems such as negotiation shocks

Active Publication Date: 2019-10-11
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an authentication negotiation method and device to solve the negotiation oscillation problem in the existing IKEv2 negotiation scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication negotiation method and device
  • An authentication negotiation method and device
  • An authentication negotiation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings For further detailed explanation.

[0031] See figure 1 , figure 1 A schematic flowchart of an authentication negotiation method provided by an embodiment of the present invention, as shown in figure 1 As shown, the authentication negotiation method may include the following steps:

[0032] It should be noted that the execution subject of steps 101 to 102 may be the initiator device of the authentication negotiation or a processor in the initiator device, such as a CPU (Center Process Unit, central processing unit). For the convenience of description, step 101 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication negotiation method and device. The method comprises the steps that when an Internet key exchange protocol authentication IKE_AUTH exchange message sent by a responder device is received, IKE authentication is carried out according to the IKE_AUTH exchange message; and when the authentication is successful, the responder device sends an authentication success notification message to enable outgoing Internet protocol security IPsec security association SA when the responder device receives the authentication success notification message. According to the invention, the generation of negotiation oscillation can be avoided.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to an authentication negotiation method and device. Background technique [0002] IKEv2 (Internet Key Exchange Version 2, Internet Key Exchange Protocol Version 2) is a protocol for negotiating keys, which can negotiate security protocols, algorithms, keys, etc. for IPsec (Internet Protocol Security, Internet Protocol Security) tunnels parameter. [0003] A complete IKEv2 negotiation requires at least four message exchanges. The first two messages (called IKE_SA (Security Association, Security Association) _INIT (IKE SA initialization) interaction messages) are used for IKE key material exchange, and the last two messages (called IKE_AUTH (IKE authentication) messages) are used to complete IKE Authenticate and negotiate IPsec SAs. [0004] In the existing IKEv2 negotiation process, when the responder device receives the IKE_AUTH message sent by the initiator device,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 梁栋
Owner NEW H3C TECH CO LTD