throbber
(12) United States Patent
`Cheng et al.
`
`111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US006418130Bl
`US 6,418,130 B1
`Jul. 9, 2002
`
`(10) Patent No.:
`(45) Date of Patent:
`
`(54) REUSE OF SECURITY ASSOCIATIONS FOR
`IMPROVING HAND-OVER PERFORMANCE
`
`(75)
`
`Inventors: Yi Cheng, Solna; Lars Bjiirup,
`Stockholm; Martin Jakob Rinman,
`Taby; Karl Dan Gustav Jerrestam,
`Johanneshov, all of (SE)
`
`(73) Assignee: Telefonaktiebolaget L M Ericsson
`(publ), Stockholm (SE)
`
`wo
`
`5,243,653 A
`5,293,423 A
`5,444,766 A *
`5,546,464 A
`5,778,075 A *
`6,253,321 B1 *
`
`9/1993 Malek et a!.
`3/1994 Dahlin eta!.
`8/1995 Farwell et a!. .............. 455/437
`8/1996 Raith et a!.
`7/1998 Haartsen ..................... 375/138
`6/2001 Nikander et a!.
`........... 713/160
`
`FOREIGN PATENT DOCUMENTS
`wo 0139538
`* 5/2001
`
`H04Q/7/38
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl. No.: 09/234,512
`
`(22) Filed:
`
`Jan.21, 1999
`
`Related U.S. Application Data
`(60) Provisional application No. 60/115,349, filed on Jan. 8,
`1999.
`
`Int. Cl? ................................................. H04M 1/66
`(51)
`(52) U.S. Cl. ....................... 370/331; 455/411; 455/410;
`370/328; 370/338; 380/247
`(58) Field of Search ................................. 370/328, 338,
`370/331; 455/410, 411; 380/247
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,081,679 A
`
`1!1992 Dent
`
`* cited by examiner
`
`Primary Examiner---Hassan Kizou
`Assistant Examiner-Tim Spafford
`(74) Attorney, Agent, or Firm-Burns, Doane, Swecker &
`Mathis, L.L.P.
`
`(57)
`
`ABSTRACT
`
`In a radio telecommunication system, the performance of a
`mobile unit can be significantly improved during a hand(cid:173)
`over procedure by reusing existing security associations that
`correspond to the mobile unit. By reusing existing security
`associations, a mobile unit can begin secure communica(cid:173)
`tions immediately following the hand-over. Otherwise, and
`in accordance with conventional practice, the mobile unit
`will have to undertake the time consuming task of renego(cid:173)
`tiating the required security associations, before it can begin
`transmitting and receiving secure communications.
`
`35 Claims, 5 Drawing Sheets
`
`101
`<
`
`MU
`
`(f)
`
`- - - - - - - - - - - ---
`
`105
`<
`
`suk
`
`(2)
`
`( 3)
`
`suk+1
`
`\
`110
`
`Ex. 1015
`Apple v. MPH Techs. Oy
`IPR2019-00820
`
`0001
`
`

`

`U.S. Patent
`
`Jul. 9, 2002
`
`Sheet 1 of 5
`
`US 6,418,130 B1
`
`101
`<
`
`MU
`
`( 1 )
`
`FIG. 1
`
`- - - -- - - - - -----
`
`105
`_(
`
`suk
`
`(2)
`
`(3)
`lr
`
`suk+1
`
`~
`110
`
`0002
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jul. 9, 2002
`Jul. 9, 2002
`
`Sheet 2 of 5
`Sheet 2 of 5
`
`US 6,418,130 B1
`US 6,418,130 B1
`
`201
`
`-1'0 -
`
`2 ...
`
`(\J
`
`-v -
`
`1
`
`-
`
`+
`.JI:
`::::>
`(/)
`
`'
`
`C\J
`(.9 -
`LL..
`
`-(\J -
`
`.JI:
`
`::::>
`en
`
`4
`
`I
`I
`I
`I
`I
`I
`I
`I
`
`::::>
`~
`
`I()
`0
`~~
`(\J
`
`205
`
`-0 ~
`
`(\J
`
`a)
`qi
`~
`
`(/)
`(D
`0
`
`-
`-
`-
`
`0003
`
`0003
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jul. 9, 2002
`Jul. 9, 2002
`
`Sheet 3 of 5
`Sheet 3 of 5
`
`US 6,418,130 B1
`US 6,418,130 B1
`
`JWIL3SSINVSdWXVSI
`SOl
`
`SsAdy
`
`
`
`AJ»NOISSSS978y|
`
`
`
`“WIYSLVIONIAQM
`
`>-...J
`W<(
`~-a::
`zw Oti
`~~
`w<!>
`(/)z
`u-w>-
`~~ -
`
`u
`Q)
`u
`
`0 ---,
`Oll
`-+
`
`.X
`::>
`(/)
`
`::>
`::E
`
`w
`~
`I-w
`u. -_J
`
`<(
`(/)
`a_
`~
`~
`<(
`(/) -
`
`U)
`..._.
`0
`1'0
`
`SO
`
`U)
`
`0 -~
`
`::>
`(/)
`
`f"()
`.
`(!) -
`lL
`
`z
`0 -(/)
`(/)
`W(f)
`en>-
`a._W
`~~
`~
`<(
`
`
`
`NOISSSSdWxVS!I
`
`(/) -
`
`'
`
`' ' ' ' ' ' '
`' ' ' ' ' ...
`
`I
`
`/
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`1/
`
`-(\J -
`
`0004
`
`0004
`
`
`

`

`U.S. Patent
`
`Jul. 9, 2002
`
`Sheet 4 of 5
`
`US 6,418,130 B1
`
`_J
`
`-a..
`en w
`........ :r:
`<:( -en
`0 u g
`0
`0:: a..
`rf> -
`
`(.)
`IJJ
`
`<:( en -
`' ' ' ' '
`' ' '
`' ' ' ' ' ' '
`
`w
`~
`I-
`w
`LL
`_J
`
`<:( en
`
`(.)
`IJJ
`
`cf> -
`
`en
`w
`I-
`:::> m
`0::
`I-
`I-
`<:(
`
`<:( en
`a..
`~
`~
`
`10
`
`---
`0 v
`
`10
`0
`~
`
`.X
`
`:::> en
`
`~ .
`(.!) -LL
`
`w
`Cl
`en
`0
`~ >-w
`_J ~
`0 u
`z
`0
`-
`0
`en
`I-
`en
`0
`0:: w
`en
`a..
`frl
`IJJ cf'
`en a..
`-
`-
`
`(.)
`
`u
`CD u
`
`0:: w
`m
`~
`:::> z
`w
`u z
`w
`:::>
`0 w en
`
`/
`
`I
`
`I
`
`I
`
`/
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`I
`
`-C\1 -
`
`0 -\
`-+ .X
`
`:::)
`en
`
`:::>
`~
`
`0005
`
`

`

`US 6,418,130 B1
`
`-<t
`(J) -<(
`(I)
`::.:::
`0 z
`-v
`w
`-
`
`L{)
`.
`(.9
`lL
`
`-<t
`(J) -<(
`(I)
`::.:::
`0 z
`LLJ
`" II
`
`::)
`:IE
`0
`
`(J) m
`0
`
`-+ .¥
`
`::)
`(J)
`
`U.S. Patent
`
`Jul. 9, 2002
`
`Sheet 5 of 5
`
`-0
`
`Q) ._ ._
`0
`0
`m
`c
`~
`:J:
`(J)
`<t
`:J:
`
`::)
`:E
`
`0 --rt) -
`
`(I)
`
`:IE
`
`-~ .. -<t
`(J) -<(
`.. ~ u
`.. z -<(
`LLJ .. ::)
`(J) -<(
`0 --m c
`(I)
`::.:::
`u z
`:J: --
`
`LLJ
`~
`.. :J:
`:::>
`(J)
`:IE
`<(
`0
`
`~
`::)
`en
`
`-
`
`0006
`
`

`

`US 6,418,130 Bl
`
`1
`REUSE OF SECURITY ASSOCIATIONS FOR
`IMPROVING HAND-OVER PERFORMANCE
`
`This application claims priority under 35 U.S.C. §§119
`and/or 365 to U.S. Provisional Application No. 60/115,349
`filed in the United States on Jan. 8, 1999; the entire content
`of which is hereby incorporated by reference.
`
`5
`
`2
`LAN and mobile IP applications where the mobile unit is
`frequently undergoing hand-over from one SU to another
`and where the MU has limited computational power. Under
`such conditions, overall system performance will be excep-
`tionally low since a significant amount of time must be spent
`renegotiating SAs rather than communicating.
`
`SUMMARY OF THE INVENTION
`
`FIELD OF THE INVENTION
`
`The present invention involves wireless telecommunica(cid:173)
`tion systems and/or networks, such as wireless local are a
`networks (LANs) and Mobile Internet Protocol (IP) systems.
`More particularly, the present invention involves the reuse of
`security associations when a mobile unit or mobile terminal
`undergoes handover from one stationary unit in the network
`to another.
`
`BACKGROUND
`
`With the rapid development of wireless and mobile com(cid:173)
`munication technologies, communication security issues,
`such as user authentication, traffic privacy and message
`integrity have become important concerns. In response, a
`number of Internet Engineering Task Force (IETF) security
`protocol standards, such as the Internet Key Exchange (IKE) 25
`protocol, the Internet Security Association and Key Man(cid:173)
`agement Protocol (ISAKMP), and the Internet Protocol
`Security (IP sEc), are now employed in various wireless
`LAN and Mobile IP environments.
`The IKE protocol was designed to provide a mechanism 30
`for two or more communicating parties, such as a mobile
`unit (MU) and a network stationary unit (SU), to negotiate
`various security services and security associations. A secu(cid:173)
`rity service is a method or means for providing protection for
`the communication between the two or more parties,
`whereas, a security association (SA) is a relationship
`between the two or more communicating parties which
`defines how the parties will execute the agreed upon security
`services. A security association is actually defined by a set
`of attributes, such as an authentication algorithm, an authen(cid:173)
`tication key, an encryption algorithm, an encryption key, and
`a SA lifetime, which represents the period of time during
`which the corresponding SA is valid. As one skilled in the
`art will appreciate, the SAs must be negotiated and in place
`before the two or more parties can begin secure communi- 45
`cations the procedure for negotiating security services and
`SAs in accordance with the IKE protocol is accomplished in
`two phases. In a first phase (i.e., phase 1), the communicat(cid:173)
`ing parties negotiate the ISAKMP SA The ISAKMP SA is
`defined by a set of basic security attributes which provide 50
`protection for subsequent ISAKMP exchanges. In a second
`phase (i.e., phase 2), and under the protection of the
`ISAKMP SA, the communicating parties negotiate the IP sEc
`SAs associated with the IP sEc authentication header (AH)
`protocol and/or the IP sEc encapsulating security payload 55
`(ESP) protocol. The IP sEc protocols provide security ser(cid:173)
`vices for communications at the IP layer. As is known in the
`art, a specific IP sEcSA is uniquely defined by a security
`parameter index (SPI), a destination IP address, and an IP sEc
`protocol (i.e., AH or ESP).
`Because the SAs (i.e., the ISAKMP SA and the IP sEc
`SAs) are bound to the negotiating parties, the SAs are
`renegotiated whenever a mobile unit moves from one access
`point to another in a wireless LAN environment, or from one
`foreign agent to another in a mobile IP context. However, the 65
`IKE negotiation process is computationally intensive, par(cid:173)
`ticularly phase 1. This is especially troublesome in wireless
`
`It is an object of the present invention to provide a
`10 technique which improves the performance of a mobile unit
`(MU) in a wireless LAN or mobile IP environment, particu(cid:173)
`larly during hand-over. The present invention accomplishes
`this by reusing rather then renegotiating the security asso(cid:173)
`ciations (SAs) corresponding to the MU once the MU is
`15 handed-over. By reusing the SAs, less time is spent nego(cid:173)
`tiating SAs. Consequently, a MU can begin secure commu(cid:173)
`nications almost immediately upon being handed-over from
`one SU to a another SU.
`Accordingly, it is an objective of the present invention to
`20 provide a more efficient way to utilize SAs during hand-
`over.
`It is another objective of the present invention to reduce
`and/or minimize the latency period between the time a MU
`is handed-over to a stationary unit and the time the MU can
`begin secure communications with that stationary unit.
`It is yet another objective of the present invention to
`generally improve the performance of a MU through seam(cid:173)
`less hand-over.
`It is still another objective of the present invention to
`maintain a required level of performance without sacrificing
`communication security.
`In accordance with one embodiment of the present
`invention, the above-identified and other objectives are
`35 achieved through a method and/or an apparatus for accom(cid:173)
`plishing hand-over of a mobile unit from a first stationary
`unit to a second stationary unit. The method involves
`disconnecting the mobile unit from the first stationary unit,
`and thereafter, connecting the mobile unit to the second
`40 stationary unit. The method also involves reusing an existing
`security association to support the connection between the
`mobile unit and the second stationary unit, wherein the
`existing security association was previously used to support
`the connection between the mobile unit and the first station-
`ary unit.
`In accordance with another embodiment of the present
`invention, the above-identified and other objectives are
`achieved with a method and/or an apparatus for accomplish(cid:173)
`ing hand-over of a mobile unit from a first stationary unit to
`a second stationary unit. More specifically, the method
`involves disconnecting the mobile unit from the first sta-
`tionary unit, and thereafter, connecting the mobile unit to the
`second stationary unit. The method then involves reusing an
`existing security association to support the connection
`between the mobile unit and the second stationary unit,
`wherein the existing security association was previously
`used to ensure secure communications for a connection
`between the mobile unit and a third stationary unit, and
`wherein the third stationary unit and the second stationary
`60 unit are associated with a first administrative domain that
`employs a common security policy.
`In accordance with still another embodiment of the
`present invention, the above-identified and other objectives
`are achieved with a method for reusing security associations
`to facilitate hand-over of a mobile unit between stationary
`units that are associated with a common administrative
`domain, wherein all of the stationary units associated with
`
`0007
`
`

`

`US 6,418,130 Bl
`
`3
`the common administrative domain are subject to the same
`security policy. The method involves negotiating a first
`security association for a connection between the mobile
`unit and a first stationary unit associated with the common
`administrative domain. The mobile unit is then disconnected 5
`from the first stationary unit, and thereafter, connected to a
`second stationary unit associated with the common admin(cid:173)
`istrative domain. A first set of security association attributes,
`corresponding to the first security association, is then trans(cid:173)
`ferred from the first stationary unit to the second stationary 10
`unit. The first security association can then be employed to
`ensure secure communications for the connection between
`the mobile unit and the second stationary unit.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The objects and advantages of the invention will be
`understood by reading the following detailed description in
`conjunction with the drawings in which:
`FIG. 1 illustrates a first exemplary embodiment of the
`present invention;
`FIG. 2 illustrates a second exemplary embodiment of the
`present invention;
`FIG. 3 illustrates a first exemplary set of security asso(cid:173)
`ciation attributes being transferred in accordance with the
`present invention;
`FIG. 4 illustrates a second set of security association
`attributes being transferred in accordance with the present
`invention; and
`FIG. 5 illustrates the transfer of security association
`attribute information, in accordance with the present
`invention, using encryption and authentication techniques.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`For a better understanding of the invention, the following
`detailed description refers to the accompanying drawings,
`wherein preferred exemplary embodiments of the present
`invention are illustrated and described. In addition, the
`reference numbers used to identify key elements of the
`invention in the drawings are consistent throughout this
`description.
`The present invention involves a technique which
`improves the performance of a mobile unit or mobile
`terminal (herein referred to as a "MU") in a radio telecom(cid:173)
`munication system, particularly during hand-over, wherein
`the MU becomes disconnected from a first stationary unit
`(herein referred to as "SUkk") and connected to another
`stationary unit (herein referred to as "SU k+z") and wherein
`SU k and SU k+l belong to a common administrative network
`domain that is under the control of a common security
`policy. The present invention accomplishes this by reusing
`one or more previously established security associations to
`support the newly formed connection between the MU and
`SU k+l" By reusing these previously established security
`associations, the MU and SU k+l need not go through the
`time consuming task of renegotiating the security associa(cid:173)
`tions (herein referred to as "SA"s) each time the MU
`changes it's point of connection (e.g., undergoes hand-over)
`within the administrative domain. The present invention is
`of particularly importance where the communicating entities
`(e.g., the MU and SUk+1 ) exhibit low to medium level
`computational power, and where the MU is especially
`mobile and frequently undergoing hand-over.
`In accordance with the present invention, each of a
`number of stationary units (SUs) associated with the same
`
`4
`administrative domain, and thus under the control of a
`common security policy, are managed in an identical manner
`with respect to the SAs that are employed to protect the
`communication between the MU and the various SUs.
`Accordingly, the set of SAs that are established between the
`MU and any one of the various SUs belonging to that
`administrative domain can be reused by any one of the other
`SUs associated with that administrative domain, if and when
`the MU is handed-over to one of these other SUs. As
`previously stated, reuse of the previously established SAs
`will improve the performance of the MU during hand-over,
`without sacrificing communication security. However,
`depending upon the extent to which MU performance
`improvement is desired, two exemplary embodiments of the
`15 present invention are described herein below.
`In accordance with a first exemplary embodiment of the
`present invention, herein referred to as the partial SA reuse
`embodiment, a previously established Internet Security
`Association and Key Management Protocol (ISAKMP) SA
`20 is reused each time the MU is handed-over to another SU
`(i.e., SUk+1 ) in the administrative domain. More specifically,
`when the MU establishes a connection with a SU in the
`administrative domain for the first time, the Internet Key
`Exchange (IKE) phase 1 negotiation, which is used for
`25 establishing the ISAKMP SA, and the IKE phase 2
`negotiation, which is used for establishing the IP sEc SAs,
`are carried out in accordance with the various standards set
`forth by the Internet Engineering Task Force (IETF).
`However, as the mobile unit moves about, and is handed-
`30 over to another SU (i.e., SUk+l) associated with the same
`administrative domain, the previously established ISAKMP
`SA is reused by the MU and SUk+1 . Nevertheless, the MU
`and SU k+l still must conduct an IKE phase 2 negotiation;
`that is, the MU and SU k+Z must renegotiate the IP sEc SAs.
`35 Because the IKE phase 1 SA negotiation process is far more
`time consuming relative to the IKE phase 2 negotiation
`process, the reuse of the ISAKMP SA greatly improves the
`performance of the MU during hand-over.
`In accordance with a second exemplary embodiment of
`40 the present invention, herein referred to as the full SA reuse
`embodiment, the previously established ISAKMP SA and
`the previously established IP sEc SAs are reused each time
`the MU undergoes hand-over from one SU (i.e., SUk) to
`another su (i.e., suk+l) in the administrative domain. As
`45 stated above, when a MU connects with a SU in the
`administrative domain for the first time, the ISAKMP SA
`and the IP sEc SAs are established in accordance with the
`IKE phase 1 and the IKE phase 2 negotiation processes
`respectively. However, unlike the partial SA reuse embodi-
`50 ment described above, subsequent hand-overs result in the
`reuse of both the previously established ISAKMP SA and
`the previously established IP sEc SAs. Thus, the entire IKE
`SA negotiation process, including phase 1 and phase 2, is
`avoided. Therefore, the MU and SUk+l can begin commu-
`55 nicating with each other almost immediately after the
`ISAKMP SA and the IP sEc SAs are transferred from SU k to
`SUk+l· Consequently, the hand-over procedure is accom(cid:173)
`plished in a seamless or near seamless fashion.
`In general, the full SA reuse embodiment provides greater
`60 MU performance enhancement during hand-over than does
`the partial SA reuse embodiment. That is because the MU
`and SU k+l need not renegotiate any SAs. Why then might a
`network administrator opt to implement the partial SA reuse
`embodiment over the full SA reuse embodiment? One
`65 reason might be that the network administrator does not
`want the various SUs associated with an administrative
`domain to share the same session keys (i.e., encryption and
`
`0008
`
`

`

`US 6,418,130 Bl
`
`5
`
`5
`authentication keys) as specified by the IP sEc SAs. If, for
`example, all the SUs associated with the administrative
`domain share the same session keys and just one of the SUs
`is compromised, an attacker can probably compromise com(cid:173)
`munications between the MU and any of the SUs associated
`with the administrative domain.
`As stated previously, a specific IP sEc SA is uniquely
`identified by a security parameter index (SPI), in combina(cid:173)
`tion with a destination IP address, and a particular security
`protocol (e.g., the authentication header protocol or the
`encapsulating security payload protocol). As such, a com(cid:173)
`mon IP address is needed for all SUs in the administrative
`domain, in order to reuse an IP sEc SA. In accordance with
`the full SA reuse embodiment, this common IP address may
`be assigned to each SU as an alias IP address. However,
`under certain circumstances, a network administrator may
`not want to assign a common IP address to each SU. If this
`is the case, the network administrator is likely to opt the
`partial SA reuse embodiment rather than the full SA reuse
`embodiment.
`When a MU is handed-over from one SU (e.g. SUk) to
`another SU (e.g. SUk+1 ), the SA attributes corresponding to
`the ISAKMP SA and the SA attributes corresponding to the
`IP sEc SAs, depending upon whether the partial SA reuse
`embodiment or the full SA reuse embodiment is being
`employed, must be transferred from SU k to SU k+l· This
`transfer of SA attributes from SUk to SUk+l may be accom(cid:173)
`plished in accordance with any one of a number of exem(cid:173)
`plary techniques.
`FIG. 1 illustrates one such technique herein referred to as
`the direct transfer technique. According to the direct transfer
`technique, a MU 101 undergoes a hand-over from SUk 105
`to suk+l 110, as illustrated by the directional arrow marked
`"1". Next, SUk+l 110 contacts SUk 105 by sending a SA
`request message, as illustrated by the directional arrow
`marked "2". The SA request message specifically requests
`those SAs associated with the MU 101. Accordingly, the SA
`request message must contain an identifier code for the MU
`101. SUk 105 then replies to the SA request message by
`sending the appropriate SA attributes to SU k+l 110, as
`illustrated by the directional arrow marked "3".
`In addition to the procedural steps described above, the
`direct transfer technique illustrated in FIG. 1, might also
`involve the step of verifying that SU k belongs to the same 45
`administrative domain as SU k+l" To accomplish this, each
`SU associated with the administrative domain might main(cid:173)
`tain a list containing all IP addresses associated with the
`administrative domain. suk+lcan then perform the required
`verification by simply checking to see if the IP address
`associated with SU k is on the list. Alternatively, if admin(cid:173)
`istrative domain corresponds with an IP network or subnet,
`suk+l can simply compare the network identification por(cid:173)
`tion of SUk's IP address with the network identification
`portion of it's own IP address. If they match, SUk+l has
`verified that SU k, in fact, belongs to the same administrative
`domain. If SU k+l determines that SU k does not belong to the
`same administrative domain, then the MU and SU k+l may be
`required to renegotiate the ISAKMP SA and the IP sEc SAs,
`unless the attributes associated with the ISAKMP SA and the
`IP sEc SAs were stored, for example, in a database, as
`illustrated in FIG. 2, during a previous connection between
`the MU and any one of the SUs associated with the admin(cid:173)
`istrative domain to which SU k+l belongs.
`FIG. 2 illustrates an alternative technique for transferring
`the appropriate SA attributes. This alternative technique is
`herein referred to as the intermediate storage technique. The
`
`6
`intermediate storage technique may be preferable where the
`network configuration makes it difficult to identify SUk, or
`when direct communication between SU k and SU k+l is
`difficult or undesirable. In accordance with this alternative
`technique, as shown in FIG. 2, a MU 201 undergoes a
`hand-over from SU k 205 to SU k+l 210, as illustrated by the
`directional arrow marked "1". Prior to, simultaneous to, or
`if necessary, subsequent to the hand-over, SU k transfers the
`appropriate SAs associated with the MU 201 to a database
`10 (DES) 215, as indicated by the directional arrow marked
`"2". SUk+l 210 then sends a SA request message to the DES
`215, as illustrated by the directional arrow marked "3". As
`in the direct transfer technique, the SA request message
`contains an identifier code that specifically identifies the MU
`15 201. Thus, the DES 215 can reply to the SA request message
`by sending the appropriate SAs, associated with the MU
`201, to SU k+l 210, as illustrated by the directional arrow
`marked "4".
`As one skilled in the art will readily appropriate, the SAs
`20 contain sensitive information (e.g., session keys).
`Accordingly, the SA information that is transferred from
`SU k to SU k+l' using the direct transfer or the intermediate
`storage technique, should be protected. Therefore, encryp(cid:173)
`tion and authentication mechanisms might be employed to
`25 ensure confidentiality and authenticity for this information.
`FIG. 3 illustrates, more specifically, the SA attributes that
`might be transferred from SUk to SUk+l' if the partial SA
`reuse embodiment is employed. As illustrated, SU k 105,
`upon receiving a SA request message from SUk+1 110, as
`30 indicated by the directional arrow marked "2", sends a reply
`message 305 to SU k+l 110, wherein the reply message 305
`contains the information necessary to define the following
`ISAKMP SA attributes: the ISAKMP SA lifetime; the
`ISAKMP session keys, including the ISAKMP session key
`35 for authentication and the ISAKMP session key for encryp(cid:173)
`tion; keying material, which is required for deriving the
`IP sEc session keys; the last IKE phase 1 CEC (i.e., cipher
`block chaining) output block for generating an initialization
`vector which, in turn, is needed for the encryption of the first
`40 IKE phase 2 message. Although FIG. 3 indicates that the SA
`attributes are being transferred in accordance with the direct
`transfer technique described above, it will be readily appar(cid:173)
`ent to one skilled in the art that the intermediate storage
`technique may be employed in the alternative.
`FIG. 4 illustrates the SA attributes that might be trans-
`ferred from SUk 105 to SUk+l 110, in addition to the SA
`attributes identified in FIG. 3, if the full SA reuse embodi(cid:173)
`ment is employed. As illustrated in FIG. 4, SUk 105, upon
`receiving a SA request message from SUk+l 110, as indi-
`50 cated by the directional arrow marked "2" sends a reply
`message 405 to SU k+l 110, wherein the reply message 405
`contains the information necessary to define the ISAKMP
`SA attributes identified above in FIG. 3, and the information
`necessary to define the following IP sEc SA attributes: the
`55 IP sEc SA lifetime; the IP sEc protocols being used, that is,
`the authentication header and/or encapsulating security pay(cid:173)
`load protocols; the IP sEc protocol mode, that is, the trans(cid:173)
`port mode or the tunnel mode; the security parameter
`index( es ); the IP sEc session keys, including the session keys
`60 for authentication and encryption, as well as their respective
`algorithms; the last CEC output block prior to hand-over,
`which is used as the initialization vector for encryption of
`the first IP packet subsequent to hand-over; and the value of
`the sequence number, in accordance with the authentication
`65 header protocol or the encapsulating security payload
`protocol, just prior to hand-over, as this value plus 1 will be
`the initial value of the sequence number after hand-over for
`
`0009
`
`

`

`US 6,418,130 Bl
`
`7
`anti-relay checking purposes. As was the case in FIG. 3, the
`transfer of SA attributes in FIG. 4 is accomplished in
`accordance with the direct transfer technique described
`above. However, it will be understood that the SA attributes
`may be transferred in accordance with the intermediate
`storage technique, also described above.
`As stated previously, the first time a MU connects to any
`SU in a given administrative domain, an IKE phase 1
`negotiation and an IKE phase 2 negotiation must be
`accomplished, thereby establishing the ISAKMP SA and the 10
`IP sEc SAs respectively. However, in accordance with
`another aspect of the present invention, the SA attributes
`associated with the ISAKMP SA and the IP sEc SAs may be
`stored for a period of time, for example, a period of time
`equivalent to the ISAKMP SA lifetime and the IP sEc SA 15
`lifetime respectively. The SA attributes might be stored in a
`database, such as the database 215 illustrated in FIG. 2. By
`storing the SA attributes, the MU might avoid having to
`renegotiate the ISAKMP SA and the IP sEc SAs if the MU
`becomes disassociated with the administrative domain, for 20
`example, by being handed-over to a SU which is not
`associated with the administrative domain, and then the MU
`becomes reassociated with the administrative domain, for
`example, by being handed back-over to a SU associated with
`the administrative domain, before the aforementioned period 25
`of time expires. In accordance with this aspect of the
`invention, the transfer of SA attributes to SU k+l might be
`accomplished in much the same way as the intermediate
`storage technique illustrated in FIG. 2, but for the fact that
`the MU is handed-over to a SU associated with another 30
`administrative domain during an interim period between the
`time the MU is connected to SU k and the time the MU is
`connected to SU k+l·
`FIG. 5 illustrates a procedure for transferring SA attribute
`control messages, in accordance with an exemplary embodi- 35
`ment of the present invention, using encryption and authen(cid:173)
`tication techniques to protect the SA attributes during trans(cid:173)
`fer. While the procedure illustrated in FIG. 5 involves the
`intermediate storage technique, described above with refer(cid:173)
`ence to FIG. 2, one skilled in the art will readily appreciate 40
`that a similar procedure could be applied to the direct
`transfer technique, described above with reference to FIG. 1.
`The procedure illustrated in FIG. 5 initially begins with
`the MU undergoing a hand-over procedure from the station(cid:173)
`ary unit SUk to the stationary unit SU k+l' as indicated by the 45
`directional arrow marked "1", wherein suk and suk+l are
`associated with the same administrative domain. Therefore,
`SUk and SU k+l are subject to the same security policy. Then,
`at some point during the hand-over procedure, suk transfers
`the SA attribute control message to the DES, as indicated by 50
`the directional arrow marked "2". As shown, the SA attribute
`control message contains a MU identification code (IDMu);
`the SA attributes (ENCKsA), which are encrypted using an
`encryption key KsA; a time stamp (T); and a Hash value
`(HASHKDs)· The purpose of the MU identification code 55
`(IDMu) is to identify the SA attributes (i.e., ENCKSA) as
`being associated with the MU. The purpose of the time
`stamp (T) is inform the DES as to the period of time that has
`elapsed since the SU K sent the SA control message. If a
`significant period of time has elapsed, the DES may be 60
`designed to reject the SA attribute control message to protect
`against unauthorized replay. While the MU identification
`code a (IDMu) and the time stamp (1) are not typically
`encrypted, the SA attributes are encrypted using an encryp(cid:173)
`tion key KSA, which is shared by each of the SUs associated 65
`with the administrative domain. The Hash value
`(HASHKDB) is used for authentication purposes, and it is
`
`8
`derived using an authentication key KDB and as a function
`of the MU identification code (IDMu), the SA attributes
`(ENCKSA) and the time stamp (1). The authentication key
`KDB, like the encryption key KsA, is shared by each of the
`5 SUs associated with the administrative domain. In addition,
`it is shared by the DES.
`As stated, SU k transfers the SA attribute control message,
`containing the MU identification code (IDMu), the encrypted
`SA attributes (ENCKSA), the time stamp (T), and the Hash
`value (HASHKDB), to the DES. Upon receiving the SA
`attribute control message, the DES recalculates the Hash
`value as a function of the received values for the MU
`identification code (IDMu), the SA attributes (ENCKSA), and
`the time stamp (T), and based on the authentication key KDs·
`Then DES then compares the recalculated Hash value with
`the received Hash value. If the two values are equal (i.e., if
`the two values match), the DES authenticates SUk, and
`accepts the SA attribute control message. The DES then
`stores the encrypted SA attributes (ENCsKA) along with the
`MU identification code (IDMu)·
`Further in accordance with the procedure illustrated in
`FIG. 5, SUk+l now issues a SA attribute request message to
`the DES, as indicated by the directional arrow marked "3",
`wherein the SA attribute request message contains the MU
`identification code (IDMu)· In response, the DES transfers to
`SU k+l the encrypted SA attributes (ENCKsA) that correspond
`to the MU identification code (IDMu) contained in the SA
`attribute request message. By applying the encryption key
`KsA to the SA attributes (ENCKSA), suk+l can decipher the
`encrypted SA attributes.
`The present invention has been described with reference
`to a preferred embodiment. However, it

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket