throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US008037302B2
`
`(12) United States Patent
`Vaarala et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,037,302 B2
`Oct. 11, 2011
`
`(54) METHOD AND SYSTEM FOR ENSURING
`SECURE FORWARDING OF MESSAGES
`
`(75)
`
`Inventors: Sami Vaarala, Helsinki (FI); Antti
`Nuopponen, Espoo (FI); Panu
`Pietikainen, Espoo (FI)
`
`(73) Assignee: Mobility Patent Holding MPH Oy (FI)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 927 days.
`
`(21) Appl. No.:
`
`10/490,933
`
`(22) PCTFiled:
`
`Sep.27,2002
`
`(86) PCT No.:
`
`PCT /FI02/00771
`
`§ 371 (c)(l),
`(2), ( 4) Date: Apr. 18, 2005
`
`(87) PCT Pub. No.: W003/030488
`
`PCT Pub. Date: Apr. 10, 2003
`
`(65)
`
`Prior Publication Data
`
`US 2005/0177722 AI
`
`Aug. 11, 2005
`
`(30)
`
`Foreign Application Priority Data
`
`Sep. 28, 2001
`
`(FI) ...................................... 20011911
`
`(51)
`
`Int. Cl.
`H04L 9100
`H04L29/06
`
`(2006.01)
`(2006.01)
`
`(52) U.S. Cl. ......................... 713/160; 713/162; 713/168
`(58) Field of Classification Search .................. 713/160,
`713/162, 151, 171
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,091,951 A * 7/2000 Sturniolo eta!. .......... 455/432.2
`6,452,915 B1 * 9/2002 Jorgensen ..................... 370/338
`6,587,680 B1 * 7/2003 Ala-Laurila eta!. .......... 455/411
`7,143,282 B2 * 1112006 Takagi eta!. ................. 713/153
`* cited by examiner
`
`Primary Examiner- Gilberta Barron, Jr.
`Assistant Examiner- Devin Almeida
`(74) Attorney, Agent, or Firm- Fasth Law Offices; Rolf
`Fasth
`
`ABSTRACT
`(57)
`The method is for ensuring secure forwarding of a message is
`performed in a telecommunication network that has at least
`one terminal from which the message is sent and at least one
`other terminal to which the message is sent. One or more
`secure connections are established between different
`addresses of the first terminal and address of the other termi(cid:173)
`nal. The connections define at least said addresses of the two
`terminals. When the first terminal moves from one address to
`another address, a secure connection, which endpoints are the
`new address of the first terminal and the address of the other
`terminal, is registered to be at least one of the active connec(cid:173)
`tions.
`
`16 Claims, 2 Drawing Sheets
`
`Mobile
`terminal
`
`Home
`Server
`
`X
`
`2
`."'-..
`lrP I Data I 3
`\
`lrP I Data I
`
`1
`
`l
`lrP lrP I Data I
`
`4
`
`I
`lrP lrP I Data I 5
`\
`6'\. lrP IRREa
`lrP IRREP
`
`I
`I
`
`Ex. 1001
`Apple v. MPH Techs. Oy
`IPR2019-00821
`
`0001
`
`

`

`U.S. Patent
`US. Patent
`
`Oct. 11,2011
`Oct. 11, 2011
`
`Sheet 1 012
`Sheet 1 of2
`
`US 8,037,302 B2
`US 8,037,302 B2
`
`FIG.1
`
`Q. w a: a:
`
`<0
`
`X
`
`'-Q)Q)
`Home
`EC!
`OQ)
`J:CI)
`
`Server
`
`terminal
`
`Mobile
`
`0002
`
`• " -u.
`
`0002
`
`

`

`U.S. Patent
`US. Patent
`
`Oct. 11,2011
`Oct. 11, 2011
`
`Sheet 2 012
`Sheet 2 of2
`
`US 8,037,302 B2
`US 8,037,302 B2
`
`FIG.2
`
`0
`w
`a::
`a::
`
`Q..
`w
`a::
`a:::
`
`N
`•
`
`C) -u.
`
`X
`
`""'"
`(I.)
`(I)
`Home
`E2
`0(1)
`J:(l)
`
`Server
`
`terminal
`
`Mobile
`
`0003
`
`0003
`
`

`

`US 8,037,302 B2
`
`1
`METHOD AND SYSTEM FOR ENSURING
`SECURE FORWARDING OF MESSAGES
`
`PRIOR APPLICATIONS
`
`This is a US national phase patent application that claims
`priority from PCT/FI02/00771, filed 27 Sep. 2002, that
`claims priority from Finnish Patent Application No.
`20011911, filed 28 Sep. 2001.
`
`TECHNICAL FIELD
`
`The method and system of the invention are intended to
`secure connections in telecommunication networks. Espe(cid:173)
`cially, the invention is meant to be used in wireless networks
`as a part of a mobile IP solution or an IPSec solution.
`
`TECHNICAL BACKGROUND
`
`An internetwork is a collection of individual networks 20
`connected with intermediate networking devices that func(cid:173)
`tion as a single large network. Different networks can be
`interconnected by routers and other networking devices to
`create an internetwork.
`A local area network (LAN) is a data network that covers a 25
`relatively small geographic area. It typically connects work(cid:173)
`stations, personal computers, printers and other devices. A
`wide area network (WAN) is a data communication network
`that covers a relatively broad geographic area. Wide area
`networks (WANs) interconnect LANs across telephone net- 30
`works and other media; thereby interconnecting geographi(cid:173)
`cally disposed users.
`In fixed networks, there exist solutions to fill the need to
`protect data and resources from disclosure, to guarantee the
`authenticity of data, and to protect systems from network 35
`based attacks. IPSec is one such technology by means of
`which security is obtained.
`The IP security protocols (IPSec) provides the capability to
`secure communications across a LAN, across private and
`public wide area networks (WANs) and across the internet. 40
`IPSec can be used in different ways, such as for building
`secure virtual private networks, to gain a secure access to a
`company network (as remote access IPSec use), or to secure
`communication with other organisations, ensuring authenti(cid:173)
`cation and confidentiality and providing a key exchange 45
`mechanism. Even if some applications already have built in
`security protocols, the use of IPSec further enhances the
`security.
`IPSec can encrypt and/or authenticate traffic at IP level.
`Traffic going in to a WAN is typically encrypted and/or
`authenticated and traffic coming from a WAN is decrypted
`and/or authenticated. IPSec is defined by certain documents,
`which contain rules for the IPSec architecture.
`Two protocols are used to provide security at the IP layer,
`an authentication protocol designated by the header of the 55
`protocol, Authentication Header (AH), and a combined
`encryption/authentication protocol designated by the format
`of the packet for that protocol, Encapsulating Security Pay(cid:173)
`load (ESP). BothAH and ESP are vehicles for access control
`based on the distribution of cryptographic keys and the man(cid:173)
`agement of traffic flows related to these security protocols.
`Security association (SA) is a key concept in the authenti(cid:173)
`cation and the confidentiality mechanisms for IP. A security
`association is a one-way relationship between a sender and a
`receiver that offers security services to the traffic carried on it
`If a secure two-way relationship is needed, then two security
`associations are required.
`
`2
`The term IPSec connection is used in what follows in place
`of an IPSec bundle of one or more security associations SAs,
`or a pair ofiPSec bundle-one bundle for each direction--of
`one or more security associations. This term thus covers both
`unidirectional and bidirectional traffic protection. There is no
`implication of symmetry of the directions, i.e., the algorithms
`and IPSec transforms used for each direction may be differ(cid:173)
`ent.
`A security association is uniquely identified by three
`10 parameters. The first one, the Security Parameters Index
`(SPI), is a 32-bit string assigned to this SA. The SPI is carried
`in AH and ESP headers to enable the receiving system to
`select the SA under which a received packet will be pro(cid:173)
`cessed. IP destination address is the second parameter, which
`15 is the address of the destination end point of the SA, which
`may be an end user system or a network system such as a
`firewall or a router. The third parameter, the Security Protocol
`Identifier indicates whether the association is an AH or ESP
`security association.
`Both AH and ESP support two modes used, transport and
`tunnel mode.
`Transport mode provides protection primarily for upper
`layer protocols and extends to the payload of an IP packet.
`Typically, transport mode is used for end-to-end communi(cid:173)
`cation between two hosts. Transport mode may be used in
`conjunction with a tunnelling protocol (other than IPSec tun-
`nelling).
`Tunnel mode provides protection to the entire IP packet
`and is used for sending messages through more than two
`components. Tunnel mode is often used when one or both
`ends of a SA is a security gateway, such as a firewall or a
`router that implements IPSec. With tunnel mode, a number of
`hosts on networks behind firewalls may engage in secure
`communications without implementing IPSec. The unpro(cid:173)
`tected packets generated by such hosts are tunnelled through
`external networks by tunnel mode SAs setup by the IPSec
`software in the firewall or secure router at boundary of the
`local network.
`To achieve this, after the AH or ESP fields are added to the
`IP packet, the entire packet plus security fields are treated as
`the payload of a new outer IP packet with a new outer IP
`header. The entire original, or inner, packet travels through a
`tunnel from one point of an IP network to another no routers
`along the way are able to examine the inner IP packet.
`Because the original packet is encapsulated, the new larger
`packet may have totally different source and destination
`addresses, adding to the security. In other words, the first step
`in protecting the packet using tunnel mode is to add a new IP
`header to the packet; thus the "IPipayload" packet becomes
`50 "IPIIPipayload". The next step is to secure the packet using
`ESP and/or AH. In case of ESP, the resulting packet is
`"IPIESPIIPipayload". The whole inner packet is covered by
`the ESP andAH protection. AH also protects parts of the outer
`header, in addition to the whole inner packet.
`The IPSec tunnel mode operates e.g. in such a way that if a
`host on a network generates an IP packet with a destination
`address of another host on another network, the packet is
`routed from the originating host to a security gateway (SGW),
`firewall or other secure router at the boundary of the first
`60 network. The SGW filters all outgoing packets to determine
`the need for IPSec processing. If this packet from the first host
`to another host requires IPSec, the firewall performs IPSec
`processing involving encapsulation of the packet in an outer
`IP header. The source IP address of this outer IP packet is this
`65 firewall and the destination address may be a firewall that
`forms the boundary to the other local network. This packet is
`now routed to the other host's firewall with intermediate
`
`0004
`
`

`

`US 8,037,302 B2
`
`3
`routers examining only the outer IP header. At the other host
`firewall, the outer IP header is stripped off and the inner
`packet is delivered to the other host.
`ESP in tunnel mode encrypts and optionally authenticates
`the entire inner IP packet, including the inner IP header. AH in
`tunnel mode authenticates the entire inner IP packet and
`selected fields of the outer IP header.
`The key management portion ofiPSec involves the deter(cid:173)
`mination and distribution of secret keys. The default auto(cid:173)
`mated key management protocol for IPSec is referred to as
`ISAKMP/Oakley and consists of the Oakley key determina(cid:173)
`tion protocol and Internet Security Association and Key Man(cid:173)
`agement Protocol (ISAKMP). Internet Key Exchange (IKE)
`is a newer name for the ISAKMP/Oakley. IKE is based on the
`Diffie-Hellman key exchange algorithm, and supports RSA
`signature authentication among other modes. IKE is easily
`extensible for future and vendor-specific features without
`breaking backwards compatibility.
`The IPSec protocol solves the known security problems of
`the Internet Protocol (IP) in a satisfactory manner. However,
`it is designed for a static Internet, where the hosts using IPSec
`are relatively static. Thus, IPSec does not work well with
`mobile devices.
`For instance, if a mobile terminal moves from one network
`to another, an IPSec connection set up is required, typically 25
`using the IKE key exchange protocol. Such a set up is expen(cid:173)
`sive in terms of latency, since IKE may require several sec(cid:173)
`onds to complete. It is also expensive in terms of computation,
`because the Diffie-Hellman and authentication-related calcu(cid:173)
`lations of IKE are extremely time consuming.
`Routing means moving information across an internetwork
`from one source to another. Along the way, usually at least
`one intermediate node is encountered. Routing involves both
`the determination of the optimal routing path and the trans(cid:173)
`port of information packets. To aid the routing of information
`packets, routing algorithms initialise and maintain routing
`tables, which contain route information. Routers communi(cid:173)
`cate with each other and maintain their routing tables through
`the transmission of a variety of messages. The routing update
`message is one such message that generally consists the
`whole or part of a routing table.
`The fundamental problem with IP mobility is the fact that
`IP routing is based on fixed addresses. The address space has
`been divided into subnetworks, that reside in practically fixed
`locations with respect to network topology (the routing can be
`changed, but that is a slow process, possibly in the order of
`minutes). When a mobile host moves away from its home
`network (where its IP address is proper), there is a problem
`with the routing of the packets to the new location if the IP
`network in question does not support such movement.
`In this text, the term mobility and mobile terminal does not
`only mean physical mobility, instead the term mobility is in
`the first hand meant moving from one network to another,
`which can be performed by a physically fixed terminal as
`well.
`Standard Mobile IP for IPv4 utilises e.g. IP-IP and Generic
`Routing Encapsulation (GRE) tunnelling to overcome this
`problem (See more details in FIG. 1 with accompanying text).
`There are also other methods of tunnelling, and hence, IP-IP
`and GRE tunnelling are used only as examples in this text.
`Mobile IPv4 has two modes of operation. In the co-located
`care-of address mode the mobile terminal performs IP-IP
`encapsulation and decapsulation. This mode requires a bor(cid:173)
`rowed address-the co-located care-of address-from the
`visited network. The other mode is the foreign agent mode,
`where the IP-IP or other tunnelling is performed by a special
`host in the visited network, called the Foreign Agent (FA).
`
`4
`The mobile terminal communicates directly with the FA (an
`IP address is not required for this direct communication), and
`does not require a borrowed address in this mode.
`In IP-IP tunnelling, an IP address (the so called co-located
`care-of address) is borrowed from a network being visited.
`This address is topologically correct, i.e. mutable from other
`parts of the network. When a mobile terminal needs to send a
`packet to a given target computer, it first constructs an IP
`packet, whose source address is its home address, i.e. the
`10 address that is not topologically correct in the new network,
`and whose destination address is the target computer.
`Since this packet may not be directly mutable, it is encap(cid:173)
`sulated into another IP packet (by so called IP-IP encapsula-
`15 tion, oriP-IP tunnelling). The source address of this IP packet
`is the care-of address, and the target address is the so called
`home server of the mobile terminal. Upon receiving such an
`encapsulated packet, the home server unwraps the IP-IP tun(cid:173)
`nel, and proceeds to route the packet, which was inside the
`20 encapsulation.
`Reverse packets from the target computer to the mobile
`terminal are handled similarly; the packet is first routed to the
`home server, then encapsulated in IP-IP and delivered to the
`current network the mobile terminal is in. The current mobil-
`ity binding determines which current care-of address matches
`a given home address. (There may also be so-called simulta(cid:173)
`neous bindings, in which case the home address matches a set
`of care-of addresses; the packet is encapsulated and sent to
`each care-of address separately.)
`When the mobile terminal moves to a new network, an
`authenticated signalling message exchange is done between
`the mobile terminal and the home server. A Registration
`Request is sent by the mobile terminal to the home server,
`requesting an update of the current mobility binding. The
`35 server responds using a Registration Reply that may either
`accept or deny the request. When the Foreign Agent mode of
`operation is used, the registration messages go through the
`Foreign Agent.
`IP version 4 (IPv4) is the currently widely deployed Inter-
`40 net Protocol version. Its major disadvantage is the small num(cid:173)
`ber of unique, public IP addresses. IP version 6 (IPv6) has a
`much larger address space, which fixes the most important
`IPv4 problem known today. IPv6 also changes some other
`things in the Internet Protocol, for example, how fragmenta-
`45 tion of packets is done, but these changes are quite small.
`Most protocols have separate definitions on how they are used
`within the IPv4 and the IPv6 context. For instance, there are
`separate versions of IPSec and Mobile IP for use with IPv4
`and IPv6. However, such modifications to protocols are quite
`50 small, and do not usually change the essentials of the proto(cid:173)
`cols significantly.
`The IPSec protocol solves the known security problems of
`the Internet Protocol (IP) in a satisfactory manner. However,
`it is designed for a static Internet, where the hosts using IPSec
`55 are relatively static. Thus, IPSec does not work well with
`mobile devices. For instance, if a mobile terminal moves from
`one network to another, an IPSec connection set up is
`required, typically using the IKE key exchange protocol.
`Such a set up is expensive in terms oflatency, since IKE may
`60 require several seconds to complete. It is also expensive in
`terms of computation, because the Diffie-Hellman and
`authentication-related calculations ofiKE are extremely time
`consuming.
`The above description presents the essential ideas of
`65 Mobile IP.
`The mobile IP approach of prior art has some disadvan(cid:173)
`tages and problems.
`
`30
`
`0005
`
`

`

`US 8,037,302 B2
`
`6
`
`5
`
`5
`The standard Mobile IP protocol provides a mobile termi(cid:173)
`nal with a mobile connection, and defines mechanisms for
`performing efficient handovers from one network to another.
`However, Mobile IP has several disadvantages. The security
`of Mobile IP is very limited. The mobility signalling mes-
`sages are authenticated, but not encrypted, and user data
`traffic is completely unprotected. Also, there is no key
`exchange mechanism for establishing the cryptographic keys
`required for authenticating the mobility signalling. Such keys
`need to be typically distributed manually. In the manual prior 10
`art key management, the signalling authentication mecha(cid:173)
`nism requires the mobile host and the home server to share a
`secret authentication key and the distribution of that key,
`which is carried out manually, is not very practical. Finally, 15
`the current Mobile IP protocol does not define a method for
`working through Network Address Translation (NAT)
`devices.
`Said problem with Network Address Translation (NAT)
`devices, even ifNAT devices are able to translate addresses of 20
`private networks in messages to public IP addresses so that
`the messages can be sent through internet, is, however, that
`currently no standard for making Mobile IP work through
`NAT devices. NAT devices are widely deployed because the
`use of private addresses requires less public IP addresses than 25
`would otherwise be needed.
`
`[RFC3115]
`G. Dommety, and K. Leung, Mobile IP Vendor/Organization-
`specific Extensions, RFC 3115, April 2001.
`ftp:/ /ftp.isi.edu/in-notes/rfc3115 .txt
`[MOBILEIPV6]
`D. B. Johnson, C. Perkins, Mobility Support in IPv6, Work in
`progress (Internet-Draft is available), July 2000.
`[DHCPV6]
`J. Bound, M. Carney, C. Perking, R. Drams, Dynamic Host
`Configuration Protocol for IPv6 (DHCPv6), Work m
`progress (Internet-Draft is available), June 2001.
`IPSec Standards:
`[RFC2401]
`S. Kent, and R. Atkinson, Security Architecture for the Inter(cid:173)
`net Protocol, RFC 2401, November 1998.
`ftp :/ /ftp.isi.edu/in -notes/rfc2401.txt
`[RFC2402]
`S. Kent, and R. Atkinson, IP Authentication Header, RFC
`2402, November 1998.
`ftp :/ /ftp.isi.edu/in -notes/rfc2402 .txt
`[RFC2403]
`C. Madson, R. Glenn, The Use of HMAC-MD5-96 within
`ESP andAH, RFC 2403, November 1998.
`[RFC2404]
`C. Madson, R. Glenn, The Use ofHMAC-SHA-1-96 within
`ESP andAH, RFC 2404, November 1998.
`[RFC2405]
`C. Madson, N. Doraswamy, The ESP DES-CBC Cipher
`The following is a list of useful references for understand(cid:173)
`Algorithm With Explicit IV, RFC 2405, November 1998.
`ing the technology behind the invention.
`[RFC2406]
`IP in general, UDP and TCP:
`S. Kent, and R. Atkinson, IP Encapsulating Security Payload
`[RFC7681]
`(ESP), RFC 2406, November 1998.
`J. Postel, User Datagram Protocol, RFC 768, August 1980.
`ftp :/ /ftp.isi.edu/in -notes/rfc2406 .txt
`ftp :/ /ftp.isi.edu/in-notes/rfc7 68 .txt
`[RFC2407]
`[RFC791]
`D. Piper, The internet IP Security Domain of Interpretation
`J. Postel, Internet Protocol, RFC 791, September 1981.
`for ISAKMP, RFC 2407, November 1998.
`ftp:/ /ftp.isi.edu/in-notes/rfc791.txt
`ftp :/ /ftp.isi.edu/in -notes/rfc407. txt
`[RFC792]
`40 [RFC2408]
`J. Postel, Internet Control Message Protocol, RFC 792, Sep-
`D. Maughan, M. Schneider, M. Schertler, and J. Turner, Inter(cid:173)
`tember 1981.
`net Security Association and Key Management Protocol
`ftp :/ /ftp.isi.edu/in-notes/rfc7 92 .txt
`(ISAKMP), RFC 2408, November 1998.
`[RFC793]
`ftp :/ /ftp.isi.edu/in -notes/rfc2408 .txt
`J. Postel, Transmission Control Protocol, RFC 793, Septem- 45 [RFC2409]
`ber 1981.
`D. Harkins, and D. Carrel, The Internet Key Exchange (IKE),
`ftp :/ /ftp.isi.edu/in-notes/rfc7 93 .txt
`RFC 2409, November 1998.
`[RFC826]
`ftp :/ /ftp.isi.edu/in -notes/rfc2409 .txt
`D. C. Plummer, An Ethernet Address Resolution Protocol,
`[RFC2410]
`RFC 826, November 1982.
`50 R. Glenn, S. Kent, The NULL Encryption Algorithm and Its
`ftp :/ /ftp.isi.edu/in-notes/rfc826 .txt
`Use With IPsec, RFC 2410, November 1998.
`[RFC2460]
`[RFC2411]
`S. Deering, R. Hinden, Internet Protocol, Version 6 (IPv6)
`R. Thayer, N. Doraswamy, R. Glenn, IP Security Document
`Specification, RFC 2460, December 1998.
`Roadmap, RFC 2411, November 1998.
`Mobile IP; IP-IP; DHCP:
`[RFC2412]
`[RFC2002]
`H. Orman, The OAKLEY Key Determination Protocol, RFC
`C. Perkins, IP Mobility Support, RFC 2002, October 1996.
`2412, November 1998.
`ftp :/ /ftp.isi.edu/in-notes/rfc2002. txt
`NAT:
`[RFC2003]
`60 [RFC2694]
`C. Perkins, IP Encapsulation Within IP, RFC 2003, October
`P. Srisuresh, G. Tsirtsis, P. Akkiraju, and A. Heffernan, DNS
`1996.
`extensions to Network Address Translators (DNS_ALG),
`ftp :/ /ftp.isi.edu/in-notes/rfc2003. txt
`RFC 2694, September 1999.
`[RFC2131]
`[RFC3022]
`R. Drams, Dynamic Host Configuration Protocol, RFC 2131, 65 P. Shisuresh, K. Egevang, Traditional IP Network Address
`March 1997.
`Translator (Traditional NAT), RFC 3022, January 2001.
`ftp:/ftp.isi.edu/in-notes/rfc2131.txt
`ftp:/ /ftp.isi.edu/in-notes/rfc3022.txt
`
`REFERENCES
`
`30
`
`35
`
`55
`
`0006
`
`

`

`US 8,037,302 B2
`
`7
`THE OBJECT OF THE INVENTION
`
`The object of the invention is to ensure secure forwarding
`of messages from and to mobile terminals by avoiding the
`problems of prior art described above.
`
`SUMMARY OF THE INVENTION
`
`The method of the invention for ensuring secure forward(cid:173)
`ing of a message is performed in a telecommunication net(cid:173)
`work, comprising at least one terminal from which the mes(cid:173)
`sage is sent and at least one other terminal to which the
`message is sent. In the method, one or more secure connec(cid:173)
`tions are established between different addresses of the first
`terminal and address of the other terminal, the connections
`defining at least said addresses of the two terminals. When the
`first terminal moves from one address to another address, a
`secure connection, whose endpoints are the new address of
`the first terminal and the address of the other terminal, is
`registered to be at least one of the active connections.
`If there does not already exist such a secure connection
`between the new address and the other terminal, a new secure
`connection between the new address and the other terminal
`address has to be formed.
`The terminals might have several active connections. In the
`invention, the terminal might in one embodiment also have
`only one secure active connection at a time, which can be
`changed in according with the invention to be defined to be
`between the address the terminal moves to and the address of
`the other terminal.
`In the invention, the first terminal is movable from one
`network to another. Such a terminal can physically be a
`mobile terminal or a fixed terminal.
`The invention is moreover concerned with a system, which
`is able to perform the method of the invention. The charac(cid:173)
`teristics of the system are defined by the system main claim,
`the subclaim defining the functions that can be performed by
`the system of the invention.
`The secure connections are preferably established by form(cid:173)
`ing Security Associations (SAs) using the IPSec protocols 40
`and the message to be forwarded consists of IP packets. The
`key exchange being a part of the forming of a secure connec(cid:173)
`tion is performed manually or automatically with IKE or
`some other automated key exchange protocol.
`When a new secure connection is formed, it is registered 45
`for immediate and/or later use. The registration for later use is
`made using a connection table, which is maintained by both
`hosts participating in the forming of the secure connection.
`The connection table is also used e.g. when the first terminal
`moves, and needs to determine whether a secure tunnel 50
`already exists for the new address. The table can be e.g. a
`Security Association DataBase (SADB), which is the nomi(cid:173)
`nal place to store IPSec SAs in the IPSec model.
`In the preferred embodiment, IPSec security associations
`are used as secure connections. The table, through which the 55
`existence of a given IPSec SA (in either the first terminal or
`the other terminal) is determined, is then the IPSec Security
`Association DataBase (SADB).
`The actual connection( s) to be used is registered by means
`of a signalling message or signalling message exchange 60
`between the first terminal and the other terminal, for example
`by means of Registration Request and possibly Registration
`Reply messages.
`The request message may update a set of security associa(cid:173)
`tions, for instance, a single security association, a security 65
`association bundle, an IPSec connection, a group of IPSec
`connections, or any combinations of these. In practice, it is
`
`8
`useful to update either a single IPSec connection or a group of
`IPSec connections. The latter may be important if separate
`IPSec connections are used for different kinds of traffic. A
`single request message can then update all (or a certain set) of
`such connections to a new address, instead of requiring sepa(cid:173)
`rate requests for each IPSec connection. In the following, the
`case of updating a single IPSec connection is discussed, with(cid:173)
`out limiting the invention to this behaviour.
`The new address of the first terminal can also be updated
`10 automatically by the other terminal when the first terminal
`sends a message from its new address.
`The active SA is a stored mobility binding that maps a
`given terminal address to one or more IPSec tunnel mode SAs
`15 (or zero such SAs, if the terminal in question is not con(cid:173)
`nected). These mobility bindings are manipulated when Reg(cid:173)
`istration Request and Registration Reply messages are pro(cid:173)
`cessed when sending packets to the first terminal. It is
`possible to restrict traffic from the first terminal to only the
`20 IPSec SAs that are currently registered in the mobility bind(cid:173)
`ing, but allowing traffic from all shared SAs is also reason(cid:173)
`able.
`The mobility binding is necessary, since each of the shared
`IPSec security associations is valid for securing traffic. There
`25 has to be some way for the first terminal to determine which
`security association(s) to actually use when processing pack(cid:173)
`ets. The mobility binding serves this purpose in the invention.
`The first terminal may use any IPSec tunnel SA it shares
`with the other terminal. It is possible to restrict traffic from the
`30 first terminal to only the IPSec SAs that are currently regis(cid:173)
`tered, but this is not an essential feature. Thus, the first termi(cid:173)
`nal may use any IPSec tunnel SA it shares with the other
`terminal when sending packets. The other terminal may
`restrict traffic only to IPSec SAs that are currently active in
`35 the mobility binding, but allowing traffic from all shared SAs
`is also reasonable.
`The invention can be used for direct end-to-end communi-
`cation, in which case the secure turmel is established between
`these end computers. If applied to IPSec, this could corre(cid:173)
`spond to either an IPSec transport mode or tunnel mode SA
`The message might also be sent first to an intermediate com-
`puter, whereby the outer address of the IPSec tunnel is
`unwrapped by the intermediate computer and the message is
`forwarded as plain text to the end destination computer.
`Thus, in the solution of the invention, an IPSec security
`association is used instead of the IP-IP tunnelling. The inven(cid:173)
`tion can also be used for tunnelling with IPSec transport mode
`and an external turmelling mechanism, such as Layer 2 Tun(cid:173)
`nelling Protocol (L2TP).
`The invention provides the following advantages.
`IPSec key management and strong authentication can be
`leveraged for this application involving asymmetric (RSA)
`authentication, the use of the Diffie-Hellman key exchange
`algorithm, the possibility to use certificates etc.
`The IPSec symmetric encryption and authentication meth(cid:173)
`ods can be used to protect both signalling and data traffic. This
`provides confidentiality and integrity and any future devel(cid:173)
`opments of IPSec can be taken advantage of.
`The NAT traversal problem can be solved by using any
`available NAT traversal mechanisms for IPSec. One is cur(cid:173)
`rently being standardised for IPSec, but any other IPSec NAT
`traversal mechanism may be used.
`The invention can be used in different networks, such as
`IPv4 and IPv6.
`In the following the invention is described more in detail by
`means of an advantageous embodiment in an example net(cid:173)
`work but is not restricted to the details thereof.
`
`0007
`
`

`

`US 8,037,302 B2
`
`9
`FIGURES
`
`FIG. 1 describes the mobile IP tunneling of prior art by
`means of a signalling diagram
`FIG. 2 describes the method of the invention by means of a
`signalling diagram
`
`DETAILED DESCRIPTION
`
`10
`Reverse packets from X to the mobile terminal are handled
`similarly; the packet is first routed to the home server in step
`3, then encapsulated in IP-IP and delivered to the current
`network (in step 4) the mobile terminal is in. The mobility
`binding determines which care-of address( es) the packet is
`forwarded to.
`In the method of the invention, an IPSec turmel mode or
`transport mode security association is used instead of the
`IP-IP tunnelling. FIG. 2 describes an example of the method
`10 of the invention for sending messages when a mobile terminal
`moves to a new address.
`A secure connection, preferably an IPSec security associa(cid:173)
`tion (SA) or more specifically one IPsec SA bundle for each
`direction of communication is established between the care(cid:173)
`of-address and the home server address, e.g. the care-of-
`address of the mobile terminal and the home server address.
`The SA can also include additional parameters and attributes,
`possibly relating to standard or non-standard IPSec exten(cid:173)
`sions, such as NAT traversal, which are conventionally used
`in SAs. A message to be sent through this tunnel is marked
`IP/IPSec/IP/Data in FIG. 2, illustrating that the message con(cid:173)
`tains a data part with a destination IP address and can be sent
`through an IPSec tunnel, while encapsulated with an outer IP
`header.
`Reverse packets from X to the mobile terminal are handled
`similarly; the packet is first routed to the home server in step
`3, then IPSec processed using the IPSec tunnel mode SA,
`during which an outer IP header is added to the packet and
`30 delivered to the current network(s) (in step 4) the mobile
`terminal is in.
`When IPSec transport mode is used, the mobile termina

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket