Roaming access method of mobile node in radio IP system

A mobile node and wireless technology, applied in transmission systems, wireless communications, wireless network protocols, etc., can solve problems such as password leaks, simultaneous satisfaction, and security cannot be reduced, and achieve high efficiency

Active Publication Date: 2005-11-02
CHINA IWNCOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, its security cannot be reduced, and the user's password cannot be leaked to the visited domain.
It can be seen from the above that neither the existing authentication methods Web redirection nor PEAP can meet these requirements at the same time.
In addition, they are not compatible with the wireless local area network national standard GB 15629.11

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Roaming access method of mobile node in radio IP system
  • Roaming access method of mobile node in radio IP system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] exist figure 1The MN is the mobile node, the AP is the access node, the F-AS and the H-AS are the foreign and home authentication servers respectively, and the mobile node MN and the access node AP are required to have public key certificates and corresponding certificates issued by their respective authentication servers. private key. The dotted lines in the figure represent the logical security connections, and the solid lines represent the actual physical connections. The mobile node MN and its home authentication server H-AS share a security association K_. The access node AP and the foreign authentication server F-AS have a secure channel A_, and the access node AP and the foreign authentication server F-AS trust each other; the foreign authentication server F-AS and the home authentication server H-AS There is also a secure channel A_, and the foreign authentication server F-AS is trusted by the home authentication server H-AS.

[0042] figure 2 The process f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is a roaming access method of a wireless IP network mobile node. The present invention is based on the national standard GB 15629.11 of the wireless local area network, and the messages between the mobile node MN, the access node AP and the foreign authentication server F-AS are consistent with those stipulated in the national standard GB 15629.11 of the wireless local area network. In the present invention, one round of messages is exchanged between the foreign authentication server and the home authentication server, so that the time delay of the authentication process is minimized. At the same time, the signature in the certificate authentication response message is generated by the home authentication server H-AS of the mobile node MN, and the authentication server F-AS of the access node AP completes the authentication of the identity of the mobile node MN on behalf of the access node AP. Compatibility with the national standard GB 15629.11 for wireless LAN is ensured without loss of security.

Description

technical field [0001] The invention belongs to the field of wireless IP systems, in particular to a roaming access method for mobile nodes in the wireless IP system. Background technique [0002] With the development of wireless IP technology, wireless IP networks are becoming more and more common in practical applications. Builders of wireless IP systems have built wireless IP networks in many places, and these networks may belong to different builders or managers. After a user registers with a certain network builder, he can use network resources in the area (home domain) to which the builder belongs. When the user arrives at a region (visited domain) where he has no registered builder, if the visited domain has a corresponding contract with the user's home domain, the user can use the network resources of the visited domain, which is called roaming. [0003] When users use the network resources of the wireless IP network, they need to confirm their identities with the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/069H04W12/08H04W80/04
Inventor 黄振海赖晓龙颜湘郭宏张变玲曹军
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products