Securing binding update using address based keys
First Claim
1. A method of securing binding updates in a wireless telecommunications system, the method comprising:
- generating a public key using a publicly known identifier;
generating a private key using the public key; and
utilizing the public key and the private key to secure binding updates.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for securing binding updates in a wireless telecommunications system. A public key is generating using a home address value of the mobile host. Thereafter, a home agent, such as a router, generates a private key using public cryptographic parameters, that corresponds to the mobile host and the public key. The correspondent node uses the public key to encrypt a shared key and sends the shared key to the mobile host. The mobile host decrypts the shared key using the private key and uses the shared key to sign the binding update. Thereafter, the correspondent node utilizes the shared key to verify the authenticity of the binding update.
-
Citations
26 Claims
-
1. A method of securing binding updates in a wireless telecommunications system, the method comprising:
-
generating a public key using a publicly known identifier;
generating a private key using the public key; and
utilizing the public key and the private key to secure binding updates. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for securing binding updates in a wireless telecommunications system, comprising:
-
a mobile host connectable to the telecommunications system;
a correspondent node connectable with the mobile host, wherein a public key and a private key are used to secure binding updates between the mobile host and the correspondent node. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A mobile node for use in a wireless telecommunications system, comprising:
an interface capable of connecting the mobile node to a home agent and a corresponding node, wherein a public key and a private key are used to secure binding updates between the mobile node and the correspondent node. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
Specification