throbber
US007174018B1
`
`United States Patent
`US 7,174,018 B1
`(10) Patent No.:
`(12)
`Patil et al.
`(45) Date of Patent:
`Feb. 6, 2007
`
`
`(54) SECURITY FRAMEWORKFORAN IP
`MOBILITY SYSTEM USING
`VARIABLE-BASED SECURITY
`
`RECON ND BROKER
`
`(75)
`
`Inventors: Basavaraj B. Patil, Plano, TX (US);
`Raja P. Narayanan,
`Irving, TX (US);
`2
`3
`3
`Haseeb Akhtar, Garland, TX (US);
`Emad A. Qaddoura, Plano, TX (US)
`
`(73) Assignee: Nortel Networks Limited, St. Laurent
`(CA)
`
`(*) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 789 days.
`
`6,253,326 BL*
`6,487,657 B1L*
`6,507,908 BL*
`
`6/2001 Lincke et al. oe. 713/201
`.. 713/154
`11/2002 Brockmann....
`
`1/2003 Caron«0.0... eee 713/153
`
`OTHER PUBLICATIONS
`
`Pat R. Calhoun, DIAMETER Mobile IP Extensions, Nov. 1998, Sun
`Laboratories, pp. 1-27."
`Pat R. Calhoun, Diameter Framework Document, Feb. 2001, Sun
`.
`*
`Laboratories, pp. 1-26.
`
`(Continued)
`
`Primary Examiner—Kambiz Zand
`Assistant Examiner—Benjamin E. Lanier
`(74) Attorney, Agent, or Firm—Hemingway & Hansen,
`LLP; D. Scott Hemingway; Malcolm W.Pipes
`
`(57)
`
`ABSTRACT
`
`(21) Appl. No.: 09/595,551
`
`(22)
`
`Filed:
`
`Jun. 16, 2000
`
`.
`
`(56)
`
`security
`
`attacks.
`
`In an IP-based mobile communications system, the Mobile
`Node changes its point of attachment to the network while
`maintaining network connectivity. Security concernsarise in
`the mobile system because authorized users are subject to
`the following forms of attack: (1) session stealing where a
`Related U.S. Application Data
`hostile node hijacks session from mobile node byredirecting
`.
`.
`packets, (2) spoofing where the identity of an authorized
`(60) aaal application No. 60/140,704,filed on Jun.
`user is utilized in an unauthorized manner to obtain access

`to the network, and (3) eavesdropping andstealing of data
`(51)
`Int. Cl
`during session with authorized user. No separate secure
`(2006.01)
`HOAK 100
`network exists in the IP-based mobility communications
`(2006.01)
`HOAL 9/00
`system, and therefore, it is necessary to protect information
`:
`.
`,
`.
`(52) U.S. Ch wees 380/258; 380/270; ey transmitted in the mobile system from the above-identified
`(58) Field of Classification Search ................ 380/258,
`y
`.
`380/270, 713/154, 153
`The present invention improves the security of communi-
`See application file for complete search history.
`cations in a IP mobile communications system by creating
`References Cited
`variable-based Security Associations between various nodes
`on the system, a Virtual Private Network supported by an
`U.S. PATENT DOCUMENTS
`Service Level Agreement between various foreign networks
`and a home network, and an SLA Broker to promote
`large-scale roaming among different SLAs supported by the
`SLA Broker or agreements with other SLA Brokers.
`
`5,539,824 A *
`5,793,762 A
`5,883,890 A
`5,905,719 A
`6,170,057 B1*
`
`.......... 380/249
`
`7/1996 Bjorklund et al.
`8/1998 Pennerset al.
`3/1999 Okanoueetal.
`5/1999 Arnoldet al.
`1/2001 Inoue etal. ou... 713/153
`
`37 Claims, 2 Drawing Sheets
`
`
`
`
`
`564
`
`0001
`
`Ex. 1014
`Apple v. MPH Techs. Oy
`IPR2019-00820
`
`Ex. 1014
`Apple v. MPH Techs. Oy
`IPR2019-00820
`
`0001
`
`

`

`US 7,174,018 B1
`Page 2
`
`OTHER PUBLICATIONS
`
`Pat R. Calhoun, Diameter Base Protocol, Feb. 2001, Sun Labora-
`tories, pp. 1-57.*
`La Porta, Thomas F.; Salgarelli, Luca; Foster, Gerald T.; “Mobile IP
`and Wide Area Wireless Data;” 1998, IEEE.
`
`Perkins, Charles E.; “Tutorial: Mobile Networking Through Mobile
`IP;” Jan. 1998; IEEE Internet Computing.
`Perkins, CV; “RFC 2002: IP Mobility Support;” Oct. 1996, Network
`Working Group.
`
`* cited by examiner
`
`0002
`
`0002
`
`

`

`U.S. Patent
`
`Feb.6, 2007
`
`Sheet 1 of2
`
`US 7,174,018 B1
`
`
`
`
`MN
`FA
`AAA-FN
`AAA-HN
`HA
`
`100.
`
`104
`108.
`
`110
`112
`14
`116
`jog
`
`R_REQ
`
`.
`
`R_REQ
`
`
`R_REQ
`
`
`RRSP
`«__RRESP
`
`R_RESP
`<_LKE
`(A MODE)
`
`————_—_______—_—_
`
`R_RESP
`
`FIG. 2
`
`—
`
`122 aS/U)
`
`QUICK MODE
`
`(S/U
`
`0003
`
`0003
`
`

`

`U.S. Patent
`
`Feb.6, 2007
`
`Sheet 2 of2
`
`US 7,174,018 B1
`
`200
`510
`
`340
`
`0004
`
`0004
`
`

`

`US 7,174,018 B1
`
`1
`SECURITY FRAMEWORKFOR AN IP
`MOBILITY SYSTEM USING
`VARIABLE-BASED SECURITY
`ASSOCIATIONS AND BROKER
`REDIRECTION
`
`RELATED APPLICATION DATA
`
`This application is the utility patent application related to
`provisional application Ser. No. 60/140,704 filed Jun. 24,
`1999,
`
`TECHNICAL FIELD OF THE INVENTION
`
`A security framework for an IP-based mobile communi-
`cation system having a home network, foreign network and
`a mobile node.
`
`BACKGROUND OF THE INVENTION
`
`Present-day Internet communications represent the syn-
`thesis of technical developments begun in the 1960s—the
`development of a system to support communications
`between different United States military computer networks,
`and the subsequent development of a system to support the
`communication between research computer networks at
`United States universities. These technological develop-
`ments would subsequently revolutionize the world of com-
`puting.
`The Internet, like so many other high tech developments,
`grew from research originally performed by the United
`States Department of Defense.
`In the 1960s, Defense
`Department officials began to notice that the military was
`accumulating a large collection of computers—-some of
`which were connectedto large open computer networks and
`others that were connected to smaller closed computer
`networks. A network is a collection of computers or com-
`puter-like devices communicating across a commontrans-
`mission medium. Computers on the Defense Department’s
`open computer networks, however, could not communicate
`with the other military computers on the closed systems.
`Defense Departmentofficials requested that a system be
`built to permit communication between these different com-
`puter networks. The Defense Department recognized, how-
`ever, that a single centralized system would be vulnerable to
`missile attacks or sabotage. Accordingly,
`the Defense
`Department mandated that the system to be used for com-
`munication between these military computer networks be
`decentralized and that no critical services be concentrated in
`a few, vulnerable failure points. In order to achieve these
`goals, the Defense Department established a decentralized
`standard protocol for communication between network com-
`puters.
`A few years later, the National Science Foundation (NSF)
`wanted to connect network computers at various research
`institutions across the country. The NSF adopted the
`Defense Department’s protocol for communication, and this
`combination of research computer networks would eventu-
`ally evolve into the Internet.
`Internet Protocols
`
`The Defense Department’s communication protocol gov-
`erning data transmission between computers on different
`networks wascalled the Internet Protocol (IP) standard. The
`IP standard now supports communications between comput-
`ers and networks on the Internet. The IP standard identifies
`
`the types of services to be provided to users, and specifies
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`the mechanisms needed to support these services. The IP
`standard also describes the upper and lower system inter-
`faces, defines the services to be provided on these interfaces,
`and outlines the execution environment for services needed
`in the system.
`A transmission protocol, called the Transmission Control
`Protocol (TCP), was also developed to provide connection-
`oriented, end-to-end data transmission between packet-
`switched computer networks. The combination of TCP with
`IP (TCP/IP) forms a system or suite of protocols for data
`transfer and communication between computers on the
`Internet. The TCP/IP standard has become mandatory for
`use in all packet switching networks that connect or have the
`potential for utilizing connectivity across network or sub-
`network boundaries.
`
`The TCP/IP Protocol
`
`In a typical Internet-based communication scenario, data
`is transmitted from an applications program in a first com-
`puter, through the first computer’s network hardware, and
`across the transmission medium to the intended destination
`on the Internet. After receipt at a destination computer
`network,
`the data is transmitted through the destination
`network to a second computer. The second computer then
`interprets the communication using the identical protocols
`on a similar application program. Because of the standard
`protocols used in Internet communications,
`the TCP/IP
`protocol on the second computer decodes the transmitted
`information into the original information transmitted by the
`first computer.
`One of the rules in TCP/IP communications is that a
`
`computer user does not need to get involved with details of
`data communication. In order to accomplish this goal, the
`TCP/IP standard imposes a layered communications system
`structure. All the layers are located on each computer in the
`network, and each module or layer is a separate component
`that theoretically functions independentof the other layers.
`TCP/IP and its related protocols form a standardized
`system for defining how data should be processed, trans-
`mitted and received on the Internet. TCP/IP defines the
`
`network communication process, and more importantly,
`defines how a unit of data should look and what information
`the message should contain so that the receiving computer
`can interpret the message correctly. Because the standard-
`ized layer design of TCP/IP, a consistent conversion of base
`data is ensured regardless of the version or vendor of the
`TCP/IP conversion software.
`
`TCP/IP Addressing and Routing
`A computer operating on a network is assigned a unique
`physical address. On a Local Area Network (“LAN”), the
`physical address of the computer is a number given to
`computer’s network adapter card. Hardware LANprotocols
`use this physical address to deliver packets of data to
`computers on the LAN.
`On the Internet, the TCP/IP protocol routes information
`packets using logical addressing. The network software in
`the Network Layer generates logical addresses. Specifically,
`a logical address in the TCP/IP network is translated into a
`corresponding physical address using the ARP (Address
`Resolution Protocol) and RARP (Reverse Address Resolu-
`tion Protocol) protocols in the Network Layer.
`The TCP/TP’s logical address is also called an IP address.
`The IP address can include:
`(1) a network ID number
`identifying a network, (2) a sub-network ID number iden-
`tifying a sub-network on the network, and, (3) a host ID
`numberidentifying a particular computer on the sub-net-
`work. The header data in the information packet will include
`
`0005
`
`0005
`
`

`

`US 7,174,018 B1
`
`3
`source and destination addresses. The IP addressing scheme
`imposes a sensible addressing scheme that reflects the
`internal organization of the network or sub-network.
`A computer network is often subdivided into smaller
`sub-networks. The computer network is divided in this
`manner to increase data transmission efficiency and reduce
`overall network traffic. Routers are used to regulate the flow
`of data into and out of designated sub-networks of the
`computer network.
`A router interprets the logical address information of a
`data packet, such as an IP address, and directs the data
`packet across the network to its intended destination. Data
`addressed between computers on the sub-network does not
`pass through the router to the greater network, and therefore
`does notclutter the transmission lines of the greater network.
`If data is addressed to a computer outside the sub-network,
`however, the router forwards the data onto the larger net-
`work.
`
`The TCP/IP network includes protocols that define how
`routers will determine the path for data through the network.
`Routing decisions are based upon information in the IP
`packet header and entries in each router’s routing table. A
`routing table possesses sufficient information for a router to
`make a determination on whether to accept the communi-
`cated information on behalf of a destination computer, or
`pass the information onto anotherrouter in the network. The
`routing table also permits the router to determine where the
`information should be forwarded within the network or
`sub-network.
`
`The routing table can be configured manually with routing
`table entries or a dynamic routing protocol that can accom-
`modate changing network topologies—network architecture
`or network layouts, routers, and interconnections between
`hosts and routers. In a dynamic routing protocol, a router
`advertises reachability when it sends updated routing infor-
`mation to a second router claiming that the first router is
`capable of reaching one or more destination addresses.
`Advertising accessibility is important
`to the process of
`receiving, directing and re-directing data packets on the
`Internet.
`
`Confidential Communications Over a Public Network
`
`Because information packets are routed over the public
`networks that make up the Internet, cryptographic security
`systems are used to send communications in a confidential
`manner. These security systems maintain the confidentiality
`of the information packet by encoding, or encrypting, the
`information in the information packet. The encryption pro-
`cess can only be reversed, or decoded, by an authorized
`person. Other activities performed by the security system
`include authentication (you are who you say you are),
`integrity checking (the information packet was sent in the
`decoded form) and non-repudiation (identification of person
`sending the information packet).
`A cryptographic security system consists of two funda-
`mental components—a complicated mathematical algorithm
`for encrypting the information, and one or more values,
`called keys, known to parties authorized to transmit or
`receive the information packet. The greater the complexity
`of the algorithm, the stronger the cryptographic level of
`security in the cryptographic system. Because of its com-
`plexity, the algorithm can be kept secret or publicly dis-
`closed without undermining the strength of the security
`system.
`As an example of the encryption process, let’s examine
`the situation where Party A intends to communicate confi-
`dentially with Party B using the cryptographic security
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`system. First, Party A uses the algorithm and a key to
`transform the information in the transmitted information
`
`packet into encrypted information. In order to maintain the
`confidentiality of the transmitted information, the encrypted
`information does not resemble the information in the infor-
`
`mation packet, and the encrypted information cannot be
`easily decodedinto its original form without the use of the
`algorithm and a key.
`Assuch,the encrypted information is transmitted over the
`public networkson the Internet to Party B without disclosing
`the content of the original information packet. After receiv-
`ing the encrypted information packet, Party B decodes the
`encrypted information using the algorithm and a key. When
`the encrypted information is decoded, the original informa-
`tion should be disclosed in the decoded information packet.
`
`Key-Based Cryptographic Systems
`It is preferable that the key be known only to the appro-
`priate or authorized parties to the communication. This type
`of key is known as a “secret key”, and the sender and
`receiver of the information packet use the samesecret key to
`encrypt and decode information packets with the algorithm.
`Public key encryption is also supported by cryptographic
`security systems where the sender has a public key and a
`private key, and the receiver has a public key and a private
`key. Messages may be encoded by the sender using the
`receiver’s public key, and decoded bythe receiver using the
`receiver’s private key. Hybrid security systemsare also used
`to encrypt and decode information in information packets.
`Accordingly, key-based security systems rely on the use of
`some type of secret key to support confidential communi-
`cations.
`
`SUMMARY OF THE INVENTION
`
`Internet protocols were originally developed with an
`assumption that Internet users, which are assigned a unique
`IP address, would be connectedto a single, fixed network—
`that
`is, one physical fixed location. With the advent of
`portable computers and cellular wireless communication
`systems, however, the movementof Internet users within a
`network and across network boundaries has become quite
`common. Because of this highly mobile Internet usage, the
`implicit design assumptions for the Internet protocols have
`been violated.
`
`The IP-Based Mobile System
`The IP-based mobile system includes at least one Mobile
`Node in a wireless communication system. The term
`“Mobile Node” includes a mobile communication unit, and,
`in addition to the Mobile Node, the communication system
`has a home network and a foreign network. The Mobile
`Node may change its point of attachment to the Internet
`through these other networks, but the Mobile Node will
`always be associated with a single Mobile Node home
`network for IP addressing purposes.
`The home network has a Home Agent and the foreign
`network has a Foreign Agent—both of which control the
`routing of information packets into and out of their network.
`The terms Home Agent and Foreign Agent may be defined
`in the Mobile IP Protocol (RFC 2002), but these agents are
`notrestricted to a single protocol or system.In fact, the term
`Home Agent, as used in this application, can refer to a Home
`Mobility Manager, Home Location Register, Home Serving
`Entity, or any other agent at a home network having the
`responsibility to manage mobility-related functionality for a
`Mobile Node on a home network. Likewise,
`the term
`Foreign Agent, as used in this application, can refer to a
`
`0006
`
`0006
`
`

`

`US 7,174,018 B1
`
`5
`Serving Mobility Manager, Visited Location Register, Vis-
`iting Serving Entity, or any other agent on a foreign network
`having the responsibility to manage mobility-related func-
`tionality for a Mobile Node on a foreign network.
`
`Security System for the IP-Based Mobile System
`the
`In an IP-based mobile communications
`system,
`Mobile Node changesits point of attachment to the network
`while maintaining network connectivity. Security concerns
`arise in the mobile system because authorized users are
`subject to the following formsofattack: (1) session stealing
`where a hostile node hijacks the network session from
`mobile node by redirecting information packets, (2) spoof-
`ing where the identity of an authorized useris utilized in an
`unauthorized mannerto obtain access to the network, and (3)
`eavesdropping and stealing of information during a session
`with an authorized user. No separate secure network exists
`in the IP-based mobility communications system, and there-
`fore, it is necessary to protect information transmitted in the
`mobile system from the above-identified security attacks.
`The present invention improves the security of commu-
`nications in a IP-based mobile communications system by
`creating
`variable-based
`Security Associations
`(SAs)
`between various nodes on the system, a Virtual Private
`Network supported by a Service Level Agreement (SLA)
`between various foreign networks and a homenetwork, and
`an SLA Broker to promote large-scale roaming among
`different SLAs supported by the SLA Broker or agreements
`with other SLA Brokers. Any one of these aspects will
`improve the security of the system, and each aspect
`is
`independently covered by the present invention.
`
`Variable-Based Security Associations
`Security Associations, called SAs, are relationships
`between secure nodes, or routers, of the Internet. The present
`invention establishes SAs between various nodes and agents
`on the system to comprehensively, and flexibly, cover con-
`nections in the network.
`
`Service Level Agreements (SLAs) and Virtual Private Net-
`works (VPNs)
`Aservice level agreement (SLA) may be created between
`networks on the Internet to establish Security Associations
`between Authentication, Authorization, and Accounting
`(“AAA”) servers on various administrative domains or
`networks. The AAA servers on the SLAs can assist in the
`
`management of SAs and the uniform transfer of encrypted
`information packets between AAA servers using a well-
`defined security protocol.
`An SLA can be formed between the AAA servers on
`several foreign networks and a home network. By working
`cooperatively, the AAA servers form a secure network for
`communications. Essentially, this system forms a Virtual
`Private Network (or “VPN”?) between the foreign networks
`and the home network thereby supporting secure tunneling
`of information packets among the networks on the VPN.
`SLA Brokers
`To eliminate the need for each network to establish
`
`individual SLA’s with every other service provider and
`network on the Internet, SLA brokers can be assigned the
`responsibility of establishing and maintaining SLAs found
`on different networks (and reciprocal agreements with other
`SLAs and SLA Brokers). Accordingly,
`the SLA Broker
`becomes a consortium of agreements between various net-
`works and service providers.
`A homenetwork need only establish one relationship with
`the SLA Broker in order to gain access to the other SLAs
`supported by the SLA Broker. With the support of such an
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`SLA Broker, a mobile node from the home network can
`roam about any other network supported by the home
`network’s SLA Broker.
`
`While the present invention can operate under the Mobile
`IP (RFC 2002), IPSec, and/or Internet Key Exchange (IKE)
`protocols, the invention is not limited to these protocols and
`can be used with any IP-based mobile system and associated
`security protocols.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The objects and features of the invention will become
`more readily understood from the following detailed
`description and appended claims when read in conjunction
`with the accompanying drawings in which like numerals
`represent like elements and in which:
`FIG. 1 is a schematic diagram of the various SAs sup-
`ported in the security framework;
`FIG.2 is a message flow sequencefor establishing an SA;
`FIG. 3 is a schematic diagram of the Virtual Private
`Network created by a common Service Level Agreeement;
`and,
`FIG.4 is a schematic diagram showing the SLA Brokerin
`the network configuration.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`Mobile IP protocols support the routing of data commu-
`nications to Mobile Nodes on the Internet. For the mostpart,
`each Mobile Node in a mobile IP system is identified by a
`permanent IP address associated with a home network.
`While the Mobile Node is coupled to its home network, the
`Mobile Node functions as any other fixed node on that
`network. When the Mobile Node moves from its home
`network to a foreign network, however, the home network
`sends data communications to the Mobile Node through the
`foreign network. This transmission of the information
`packet from the home network to the foreign network is
`called “tunneling” the information packet to the foreign
`network and/or mobile foreign network where the mobile
`user is located.
`
`Variable-Based Security Associations
`In order to reduce the security concerns during the “tun-
`neling” of information packets to Mobile Nodes, different
`security associations can be formed between home and
`foreign networks. Security Associations, called SAs, are
`relationships between secure nodes, or routers, in the secu-
`rity framework of the Internet. The SA establishes the
`agreement between the two secure nodes on how the sender
`will cryptographically transform data before transmission.
`The SA agreement requires the sending node to share
`information with the receiving node about
`the type of
`cryptographic method, the algorithm, and the keys used in
`the encryption process. The agreement is formed and the
`information is shared prior to the transmission of an infor-
`mation packet on the secure connection. When the sending
`node transmits an encrypted information packet, the sending
`node will identify the pertinent information regarding the
`encryption methodto the receiving node. After receiving the
`encrypted information packet, the receiving node will use
`the shared information from the SA to decode the informa-
`
`tion packet.
`Authentication is the process of proving someone’s
`claimed identity, and security systems will often require
`authentication of the system user’s identity before authoriz-
`
`0007
`
`0007
`
`

`

`US 7,174,018 B1
`
`7
`ing a requested activity. The authentication and authoriza-
`tion processes are often performed by an AAA server. The
`AAA serverauthenticates the identity of an authorized user,
`and authorizes the requested activity. Additionally, the AAA
`server will provide the accounting function including track-
`ing usage and charges for use of secure transmissionslinks.
`Lookingat FIG.1, the overall architecture of the IP-based
`mobile system is shown with Mobile Node 64, homenet-
`work 10 and foreign network 40. The home network 10 has
`a central buss line 20 coupled to the home agent 28 via
`communication link 24, and the buss line 20 is coupled to the
`secure messaging gateway 15 via communication link 22.
`The secure messaging gateway 15 includes the AAA server
`17 andfirewall 19 for the home network. The home network
`
`10 is coupled to the public Internet 35 via communication
`link 30. A communications link is any connection between
`two or more nodes on a network or users on networks or
`administrative domains.
`The foreign network 40 has a central buss line 50 coupled
`to the foreign agent 58 via communication link 54, and the
`buss line 50 is coupled to the secure messaging gateway 45
`via communication link 52. The secure messaging gateway
`45 includes the AAA server 49 and firewall 47 for the
`
`foreign network. The foreign network 40 is coupled to the
`public Internet 35 via communication link 37.
`A Mobile Node 64 is shownelectronically coupled to the
`foreign network 40 via the communication link 66 of
`transceiver 60. Transceiver 60 is coupled to the foreign
`network via communication link 62. The Mobile Node 64
`can communicate with any transceiver or Access Network
`coupledto the foreign network 40. The system also includes
`a correspondent node CN 70, which is a node wishing to
`communicate with the Mobile Node 64. The correspondent
`node CN 70 is coupled to the public Internet 35 via com-
`munication link 72.
`
`The present invention includes the capability of forming
`five different SAs securely connecting various nodes and
`routers on the Internet. The following security associations
`will connect the following nodes androuters:
`(1) SA1—the SA1 80 securely connects the secure mes-
`saging gateway 15 in the home network 10 to the secure
`messaging gateway 45 in the foreign network 40,
`(2) SA2—the SA2 85 securely connects the Mobile Node
`64 to the Foreign Agent 58 in the foreign network 40,
`(3) SA3—the SA3 87 securely connects the Mobile Node
`64 to the Home Agent 28 in the home network 10,
`(4) SA4—the SA490 securely connects the Mobile Node
`64 to the correspondent node 70, and
`(5) SA5—the SA5 92 securely connects the correspon-
`dent node 70 to the Home Agent 28 in the home network.
`The security scheme in the present invention covers one
`or more portions of the public network as mandated by the
`needs of the user and the level of security desired. At the
`very least, SA1 80 is needed to traverse the public networks
`in the Internet. If SA1 80 and SA2 85 (or an equivalent) are
`available and the foreign network 40 can be trusted, SA3
`would be optional because it would cover redundant rela-
`tionships already covered by SA1 and SA2. Further, SA4is
`only neededif the policies at the Mobile Node 64 require its
`use. If SA1 80 is not available, the system should secure
`transmission of information packets by using SA3 87 and
`SA4 90 between the Mobile Node 64 and the Home Agent
`28 or correspondent node 70, respectively. SA2 connection
`may be unnecessary if the Mobile Node 64 communicates
`with the Foreign Agent 58 using a code-based communica-
`tion scheme,
`such as a CDMA-based communication
`scheme. Further,
`the security of the system could be
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`8
`enhanced by SA5 92 between the correspondent node 70 and
`the Home Agent 28 if the correspondent node 70 is not
`associated with the home network.
`
`Many combinations of the SAs could be established to
`provide a comprehensive security framework. Of course,
`redundant SAs can be eliminated, such as the SA3 connec-
`tion where there is already SA1 and SA2 connections
`available for use. As a flexible solution, the SAs available in
`the present invention could be configured by the user or the
`networks to provide the desired level of security.
`
`Registration and AAA Redirection
`Foreign Agents and Home Agents periodically broadcast
`an agent advertisement to all nodes on the local network
`associated with that agent. An agent advertisement
`is a
`message from the agent on a network that may be issued
`under the Mobile IP protocol (RFC 2002) or any other type
`of communications protocol. This advertisement should
`include information that is required to uniquely identify a
`mobility agent (e.g. a Home Agent, a Foreign Agent,etc.) to
`a mobile node. Mobile nodes examine the agent advertise-
`ment and determine whether the mobile node is connected to
`
`its home network or a foreign network.
`If the mobile node is located on its home network, no
`additional actions need to be taken because information
`
`packets will be routed to the node according to the standard
`addressing and routing scheme. If the mobile node1s visiting
`a foreign network, however,
`the mobile node obtains a
`care-of address from the agent advertisement, and registers
`this care-of address with its Home Agent. The care-of
`address identifies the foreign network where the mobile
`node is located. The Home Agentuses this care-of address
`to tunnel data packets to the foreign network for subsequent
`transfer to the mobile node.
`
`To enhancesecurity using the present invention, mobility
`related messages, sometimes called control or control plane
`messages, transmitted between the foreign and home agents
`should be directed through the local AAA servers on the
`respective networks. This includes the AAA server 17 on the
`home network 10 and the AAA server 49 on the foreign
`network 48. Every time the Mobile Node 64 movesinto a
`new foreign network or powers up in the foreign network,
`the Mobile Node 64 must negotiate a new secure SA2 85
`connection with the Foreign Agent 58. While the control
`plane messages should be redirected through the AAA
`servers in the home and foreign networks,
`the SA2 85
`connection will only be initiated after the registration
`request and registration response have been initially sent
`outside a secure connection, also called “in the clear.” That
`is, the Mobile Node 64 will first successfully register with
`the Foreign Agent 58 and the Home Agent 28 without the
`use of a secure connection. In order to establish the SA2 85
`secure connection between the Mobile Node 64 and the
`Foreign Agent 58 thereafter, the registration request and
`response mustbe resent using the secure connection through
`the AAA servers on the home and foreign networks. Any
`subsequent registrations, after the initial registration, are
`done using the SAs established during the initial registra-
`tion.
`The establishment of the SA2 secure connection with the
`redirection of the registration request and response through
`the AAA servers can be seen in FIG. 2 in steps 100 to 106
`where the registration request from the Mobile Node 64 to
`the Foreign Agent 58 is shown in step 100, the registration
`request from the Foreign Agent 58 to the AAA server 49 at
`the foreign network 40 is shown in step 102, the registration
`request from the AAA server 49 at the foreign network 40 to
`
`0008
`
`0008
`
`

`

`US 7,174,018 B1
`
`9
`the AAA server 17 at the home network 10 in step 104, and
`the registration request from the AAAserver 17 on the home
`network 10 to the Home Agent 28 in step 106.
`The redirection of the registration response through the
`AAA servers is shown in steps 110 to 116 where the
`registration response from Home Agent 28 to AAA server 17
`on the home network 10 is shown in step 110, registration
`response from AAA server 17 on the home network 10 to
`AAA server 49 on the foreign network 40 is shown in step
`112, registration response from the AAA server 49 on the
`foreign network 40 to the Foreign Agent 58 is shownin step
`114, and registration response from the Foreign Agent 58 to
`the Mobile Node 64 is shown in step 116.
`If the Foreign Agent 58 is capable of establishing an SA
`relationship,
`then the agent advertisement issued by the
`Foreign Agent 58 should be expanded to indicate this
`capability to the Mobile Node 64. The Mobile Node 64 can
`then initiate establishment of the secure connection, andit is
`recommendedthat the Aggressive Modeofthe Internet Key
`Exchange protocol (IKE) can be used as shown in step 120
`of FIG. 2. The Quick Mode in step 122 can also be used to
`speed the SA set-up operation as shown in FIG.2. Lastly,

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket