Key distribution method

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S277000, C380S279000, C380S282000, C713S171000, C713S155000

Reexamination Certificate

active

07813509

ABSTRACT:
A key distribution method for the next generation network (NGN), includes steps of: (a) a terminal sending a registration request message to a soft switch; (b) the soft switch sending an authentication request message to an authentication center; (c) the authentication center authenticating the terminal, then the soft switch distributing the session key to the terminal after the registration authentication being passed. The invention implements the key distribution during the registration authentication, thus the traffic is smaller, and it could be associated with the specialties of the NGN, and improve the efficiency of solving the security problem, the registration authentication of the terminal and the distribution of the key are more suitable specifically for the NGN.

REFERENCES:
patent: 6490358 (2002-12-01), Geer et al.
patent: 6614781 (2003-09-01), Elliott et al.
patent: 6981263 (2005-12-01), Zhang et al.
patent: 7349412 (2008-03-01), Jones et al.
patent: 7466710 (2008-12-01), Clemm et al.
patent: 7506370 (2009-03-01), Aggarwal
patent: 7590843 (2009-09-01), Khalil et al.
patent: 7599352 (2009-10-01), Ruckstuhl
patent: 2002/0120760 (2002-08-01), Kimchi et al.
patent: 2002/0147820 (2002-10-01), Yokote
patent: 2003/0005280 (2003-01-01), Bobde et al.
patent: 2003/0033521 (2003-02-01), Sahlbach
patent: 2003/0088769 (2003-05-01), Quick et al.
patent: 2003/0147519 (2003-08-01), Jain et al.
patent: 2003/0147537 (2003-08-01), Jing et al.
patent: 2004/0105542 (2004-06-01), Takase et al.
patent: 2005/0036482 (2005-02-01), Goroshevsky et al.
patent: 2008/0167034 (2008-07-01), Li et al.
patent: 0 912 026 (1999-04-01), None
patent: WO 01/26322 (2001-04-01), None
patent: 03/053074 (2003-06-01), None
patent: WO 03/053074 (2003-06-01), None
Menezes et al., “Handbook of Applied Cryptography, Simple Key Establishment Models.”Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematices and ITS Applications(1997): 546-550.
Frankel et al., “Security Issues in a CDPD Wireless Network.”IEEE Personal Communications(1995): 16-27.
Jacobs et al., “Security of Current Mobile IP Solutions.”Milcom 97 Proceedings3(1997): 1122-1128.
Jordan et al., “Secure Multicast Communications using a Key Distribution Center.”Proceeding sof the IFIP TC6 International Conference on Information Networks and Data Communication(1994): 367-380.
Smith, Richard E..Internet Cryptography. 4. Reading, MA: Addison-Wesley, 1997.
Harkins et al., “The Internet Key Exchange (IKE).”Network Working Group RFC 2409, Internet Engineering Task Force(IETF)Standards Track(1998): 1-19.
Maughan et al., “Internet Security Association and Key Management Protocol (ISAKMP).”Network Working Group RFC 2408, Standards Track(1998): 1-31.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Key distribution method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Key distribution method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Key distribution method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4232569

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.