Cryptography – Key management – Key distribution
Reexamination Certificate
2005-01-31
2010-10-12
Zia, Syed A. (Department: 2431)
Cryptography
Key management
Key distribution
C380S277000, C380S279000, C380S282000, C713S171000, C713S155000
Reexamination Certificate
active
07813509
ABSTRACT:
A key distribution method for the next generation network (NGN), includes steps of: (a) a terminal sending a registration request message to a soft switch; (b) the soft switch sending an authentication request message to an authentication center; (c) the authentication center authenticating the terminal, then the soft switch distributing the session key to the terminal after the registration authentication being passed. The invention implements the key distribution during the registration authentication, thus the traffic is smaller, and it could be associated with the specialties of the NGN, and improve the efficiency of solving the security problem, the registration authentication of the terminal and the distribution of the key are more suitable specifically for the NGN.
REFERENCES:
patent: 6490358 (2002-12-01), Geer et al.
patent: 6614781 (2003-09-01), Elliott et al.
patent: 6981263 (2005-12-01), Zhang et al.
patent: 7349412 (2008-03-01), Jones et al.
patent: 7466710 (2008-12-01), Clemm et al.
patent: 7506370 (2009-03-01), Aggarwal
patent: 7590843 (2009-09-01), Khalil et al.
patent: 7599352 (2009-10-01), Ruckstuhl
patent: 2002/0120760 (2002-08-01), Kimchi et al.
patent: 2002/0147820 (2002-10-01), Yokote
patent: 2003/0005280 (2003-01-01), Bobde et al.
patent: 2003/0033521 (2003-02-01), Sahlbach
patent: 2003/0088769 (2003-05-01), Quick et al.
patent: 2003/0147519 (2003-08-01), Jain et al.
patent: 2003/0147537 (2003-08-01), Jing et al.
patent: 2004/0105542 (2004-06-01), Takase et al.
patent: 2005/0036482 (2005-02-01), Goroshevsky et al.
patent: 2008/0167034 (2008-07-01), Li et al.
patent: 0 912 026 (1999-04-01), None
patent: WO 01/26322 (2001-04-01), None
patent: 03/053074 (2003-06-01), None
patent: WO 03/053074 (2003-06-01), None
Menezes et al., “Handbook of Applied Cryptography, Simple Key Establishment Models.”Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematices and ITS Applications(1997): 546-550.
Frankel et al., “Security Issues in a CDPD Wireless Network.”IEEE Personal Communications(1995): 16-27.
Jacobs et al., “Security of Current Mobile IP Solutions.”Milcom 97 Proceedings3(1997): 1122-1128.
Jordan et al., “Secure Multicast Communications using a Key Distribution Center.”Proceeding sof the IFIP TC6 International Conference on Information Networks and Data Communication(1994): 367-380.
Smith, Richard E..Internet Cryptography. 4. Reading, MA: Addison-Wesley, 1997.
Harkins et al., “The Internet Key Exchange (IKE).”Network Working Group RFC 2409, Internet Engineering Task Force(IETF)Standards Track(1998): 1-19.
Maughan et al., “Internet Security Association and Key Management Protocol (ISAKMP).”Network Working Group RFC 2408, Standards Track(1998): 1-31.
Wu Dongjun
Yan Jun
Conley & Rose, P.C.
Huawei Technologies Co. Ltd.
Rodolph Grant
Zia Syed A.
LandOfFree
Key distribution method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Key distribution method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key distribution method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4232569