白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Secured authenticated communication between an initiator and a responder

專利號(hào)
US11997078B2
公開日期
2024-05-28
申請(qǐng)人
Telefonaktiebolaget LM Ericsson (publ)(SE Stockholm)
發(fā)明人
Vesa Lehtovirta; Mohit Sethi
IPC分類
H04L9/40
技術(shù)領(lǐng)域
responder,initiator,n3iwf,party,ue,ike_auth,eap,in,message,secure
地域: Stockholm

摘要

Secure, authenticated communication is enabled between an initiator (12) (e.g., a user equipment) and a responder (14) (e.g., an authentication server function, AUSF, or a subscription de-concealing function, SIDF). The initiator (12) transmits a message (20) to the responder (14) over a secure communication channel (16). The message (20) may include information indicating a third party (18) whose signing of data (e.g., bound to the secure communication channel (16)) will authenticate the responder (14) to the initiator (12). The responder (14) correspondingly retrieves from the third party (18) data that is signed by the third party (18) and transmits a response (24) to the initiator (12) that includes the retrieved data. The initiator (12) receives this response (24) and determines whether or not the responder (14) is authenticated by determining whether or not the response (24) includes data that is signed by the third party (18).

說明書

FIG. 2 in this regard shows one example of a message sequence for establishing an IPSec tunnel between the UE and N3IWF via untrusted non-3GPP access (e.g., WLAN), where the message 20 in FIG. 1 is an IKE_AUTH request message and the response 24 in FIG. 1 is an IKE_AUTH response to the IKE_AUTH request message. More particularly, in step 1 of FIG. 2, the UE 30 in its role as IKE initiator first sends an IKE_SA_INIT message to the N3IWF 32 in its role as IKE responder, via an access point 34 of an untrusted WLAN. The IKE_SA_INIT message contains the cryptographic algorithms that the UE 30 supports for the IKE SA (Security Association), its public Diffie-Hellman value and its Nonce. In step 2, the N3IWF 32 responds to this message with an IKE_SA_INIT message containing the chosen cryptographic suite from the UE's offered choices, its public Diffie-Hellman value and its Nonce. This first pair of messages (IKE_SA_INIT) thereby negotiates cryptographic algorithms, exchange nonces, and does a Diffie-Hellman exchange. At this stage, then, both the UE 30 and N3IWF 32 derive a (currently unauthenticated) shared secret called SKEYSEED. The UE 30 and N3IWF 32 derive keys from the SKEYSEED and use those derived keys to establish a secure communication channel in the form of an IKE Security Association (SA) over which to send subsequent messages that are encrypted and integrity protected.

權(quán)利要求

1
微信群二維碼
意見反饋