Method and Apparatus for Securing Communication Between a Mobile Node and a Network
0 Assignments
0 Petitions
Accused Products
Abstract
In accordance with the teachings of the present invention, a method and apparatus is presented for securely negotiating a session key between a mobile node and a network node, such as a first hop IP router. A session key is encoded using asymmetric encryption. The encrypted session key is then communicated to the first hop IP router for later use. In accordance with another teaching of the present invention, the session key is then used by the mobile node and a first hop IP router to authenticate a message. Lastly, in accordance with the third teaching of the present invention, a standardized protocol is used to securely negotiate the session key between the mobile node and the first hop IP router.
-
Citations
49 Claims
-
1-26. -26. (canceled)
-
27. A method of authenticating a message comprising the steps of:
-
a device receiving a message; the device receiving an authentication code; the device generating a first checksum of the message; the device accessing a session key; the device generating a second checksum of the message in response to the authentication code and in response to accessing the session key; and the device comparing the first checksum of the message with the second checksum of the message. - View Dependent Claims (28, 29, 32, 33, 34, 35)
-
-
30. (canceled)
-
31. A network device comprising:
-
means for receiving message; means for receiving an authentication code; means for generating a first checksum of the message; means for accessing a session key; means for generating a second checksum of the message in response to the authentication code and in response to accessing the session key; and means for comparing the first checksum of the message with the second checksum of the message.
-
-
36. A network device, comprising:
-
wireless communication circuitry for performing wireless communication; processing hardware coupled to the wireless communication circuitry, wherein the processing hardware is configured to; receive a message; receive an authentication code; generate a first checksum of the message; access a session key; generate a second checksum of the message in response to the authentication code and in response to accessing the session key; and compare the first checksum of the message with the second checksum of the message. - View Dependent Claims (37, 38, 39, 40, 41, 42)
-
-
43. A non-transitory, computer accessible memory medium comprising program instructions, wherein the program instructions are executable by a network device to:
-
receive a message; receive an authentication code; generate a first checksum of the message; access a session key; generate a second checksum of the message in response to the authentication code and in response to accessing the session key; and compare the first checksum of the message with the second checksum of the message. - View Dependent Claims (44, 45, 46, 47, 48, 49)
-
Specification