throbber
MAR. 26. 2004 11: 29AM
`..,. .
`..
`
`RF:nr 3/26/0~ 290.10530SN
`
`FASTH-LAW-OFFICES
`
`10/4 909·33 NO. 395
`P. 1
`OT02 Rec'd PCTJPTO 2 6 MAR 2004
`EXPRESS MAIL LABEL NO. ER625088340US
`Date of Mailing:
`26 March 2004
`
`~RANSMITTAt LETTER TO THE UNITED STATES DESIQNATEO/ELECTED OFFICE
`(DO/EO/US) CONCERNING FILINQ UNDIR 35 U.S.C. 371
`
`Int'l. Application No.:
`Int'l. Filing Date:
`Priority Date Claimed:
`Title of Invention:
`
`Applicant(s) for DO/ES/US:
`
`Attorney Docket No.:
`
`290.1053USN
`
`PCT/FI02/00771
`27 SEPTEMBER 2002
`29 SEPTEMBER 2001
`METHOD AND SYSTEM FOR ENSURING
`SECURE FORWARDING OF MESSAGES
`Sami Vaarala, Antti Nuopponen, Panu
`Pietikainen
`
`2.
`
`Applicant herewith submits to the United States
`Designated/Elected/Office (DO/EO/US) the following items and
`other information:
`1.
`[X] This is a FIRST submission of items concerning a filing
`under 35 U.S.C. 371.
`[ ] This is a SECOND or SUBSEQUENT submission of items
`concerning a filing under 37 U.S.C. 371.
`[X] This is an express request to begin national examination
`procedures (35 u.s.c. 37l(f)) at any time rather than
`delay examination until the expiration of the applicable
`time limit set in 35 u.s.c. 37l(b) and PCT Articles 22
`and 39 ( 1) .
`
`3.
`
`/
`
`4.
`
`5.
`
`7.
`
`9.
`
`11.
`
`a.
`
`b.
`c.
`
`[X]
`
`a.
`b.
`c.
`
`d.
`
`(X] A proper Demand for International Preliminary Examination
`was made by the 19th month from the earliest claimed
`priority date.
`[X] A copy of the International Application as filed
`(35 u.s.c. 371(c) (2)
`[ J is transmitted herewith (required only if not
`transmitted oy the International Bureau).
`[X] has been transmitted by the International Bureau.
`[ ] is not required, as the application ~as filed in the
`United States Receiving Office(RO/US).
`Amenqments to the claims of the International Application
`unde~ PCT Article 19 (35 U.S.C. 371(c) (3))
`[ ] are transmitted herewith (required only if not
`transmitted by the International Bureau) .
`(X] have been transmitted by the International Bureau.
`[ ] have not been made; however, the time limit for
`making such amendments has NOT expired.
`[ J have not been made and will not be made.
`An oath or declaration of the inventor (unsigned)
`(35 U.S.C. 371 (C) (4)).
`An Information Disclosure Statement under 37 C.F.R. 1.97
`and 1.98.
`
`[X]
`
`[
`
`]
`
`TRANSMITTAL LETTER - Page 1 of 2
`
`0001
`
`Ex. 1002
`Apple v. MPH Techs. Oy
`IPR2019-00821
`
`

`

`MAR. 26. 2004 11: 30AM
`
`FASTH-LAW-OFFICES
`
`.....
`
`IU": nr 3/26/04 290 .1053USN
`
`/ L/96 933
`Ni B5
`0111 Rec'd PBT/PTO 2 6 MAR 2004
`EXPRESS MAIL LABEL NO. ER625088340US
`Date of Mailing:
`26 March 2004
`12. [ ] An assignment document for recording. A cover sheet in
`compliance with 37 C.F.R. 3.28 and 3.31 is included.
`[X] A FIRST preliminary amendment.
`
`13.
`
`14.
`
`[XJ Applicant qualifies for Small Entity Status (37 C.F.R.
`1 • 9 (f) and 1. 2 7 (b) ) .
`16. [ ] Other items or information:
`
`(if any)
`
`17. [X] Basic National Filing Fee of $1080.00 is submitted
`(Neither international preliminary examination fee (37
`c.F.R. 1.482) nor international search fee 37 C.F.R.
`l. 4 4 . 5 (a) ( 2) paid to U.S. P. T. 0. ) .
`
`For
`
`CLAIMS AS FILED
`Number Number Easic Fee $1080.00
`Extra
`Filed
`
`Total Claims 17 - 20
`Ind. Claims
`2 - 3
`
`I"" 0
`
`Rate
`X $18.00 """ $0.00
`X $86.00 = $0.00
`
`- 0
`[X] Reduction by 1/2 for filing by small entity, if
`applicable. Applicant qualifies as small entity.
`TOTAL FILING FEE:
`$540.00
`20. [ J Fee for recording the enclosed assignment (37 C.F.R.
`1.21(h)). The assignment must be accompanied by an
`appropriate cover sheet (37 C.F.R. 3.28, 3.31). $40.00
`per property.
`[X] A check in the amount of $540.00 to cover the above fee
`is enclosed.
`[X] The Commissioner is hereby authorized to charge any
`additional fees which may be required, or credit any
`overpayment to Deposit Account No. 06-0243.
`
`19.
`
`21.
`
`23.
`
`Send all correspondence to:
`
`Rolf Fasth, Esq.
`FASTH LAW OFFICES
`629 E. Boca Raton Road
`Phoenix, AZ
`85022
`Telephone: 602-993-9099
`Facsimile: 602-942-8364
`
`Respectfully submitted,
`
`~\tfj~
`
`Registration Number 36,999
`
`TRANSMITTAL LETTER - Page 2 of 2
`
`0002
`
`

`

`wo 03/030488
`
`1
`
`~ec'd PCT/PTO 26 MARZ004
`t;D,Jo~~~~ 0 9 3 ~j
`
`METHOD AND SYSTEM FOR ENSURING SECURE FORWARDING OF MESSAGES
`
`TECHNICAL FIELD
`
`The method and system of the invention are intended to secure connections in
`telecommunication networks. Especially, the invention is meant to be used in wireless
`networks as a part of a mobile IP solution or an IPSec solution.
`
`TECHNICAL BACKGROUND
`
`An internetwork is a collection of individual networks connected with intermediate
`networking devices that function as a single large network. Different networks can be
`interconnected by routers and other networking devices to create an internetwork.
`
`5
`
`10
`
`I 5
`
`A local area network (LAN) is a data network that covers a relatively small geographic
`
`It typically connects workstations, personal computers, printers and other
`area.
`devices. A wide area network (WAN) is a data communication network that covers a
`relatively broad geographic area. Wide area networks (WANs) interconnect LANs
`
`20
`
`across telephone networks and other media; thereby interconnecting geographically
`
`disposed users.
`
`In fixed networks, there exist solutions to fill the need to protect data and resources
`
`25
`
`from disClosure, to guarantee the authenticity of data, and to protect systems from
`network based attacks. IPSec is one such technology by means of \Nhich security is
`obtained.
`
`The IP security protocols (IPSec) provides the capability to secure communications
`across a LAN, across private and public wide area net\vorks (WANs) and across the
`
`30
`
`internet. IPSec can be used in different ways, such as for building secure virtual private
`networks, to gain a secure access to a company network (as remote access IPSec
`
`0003
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`2
`
`use), or to secure communication with other organisations, ensuring authentication and
`confidentiality and providing a key exchange mechanism. Even if some applications
`already have built in security protocols, the use of IPSec further enhances the security.
`
`IPSec can encrypt and/or authenticate traffic at IP level. Traffic going in to a WAN is
`typically encrypted and/or authenticated and traffic coming from a WAN is decrypted
`and/or authenticated. IPSec is defined by certain documents, which contain rules for
`the IPSec architecture.
`
`Two protocols are used to provide security at the IP layer; an authentication protocol
`designated by the header of the protocol, Authentication Header {AH), and a combined
`encryption/authentication protocol designated by the format of the packet for that
`protocol, Encapsulating Security Payload (ESP). Both AH and ESP are vehicles for
`access control based on the distribution of cryptographic keys and the management of
`traffic flows related to these security protocols.
`
`s
`
`10
`
`15
`
`Security association (SA) is a key concept in the authentication and the confidentiality
`mechanisms for IP. A security association is a one-way relationship between a sender
`and a receiver that offers security services to the traffic carried on it If a secure two-
`20 way relationship is needed, then two security associations are required.
`
`The term IPSec connection is used in what follows in place of an IPSec bundle of one
`or more security associations SAs, or a pair of IPSec bundles- one bundle for each
`direction - of one or more security associations. This term thus covers both
`unidirectional and bi-directional traffic protection. There is no implication of symmetry
`of the directions, i.e., the algorithms and IPSec transforms used for each direction may
`be different.
`
`25
`
`A security association is uniquely identified by three parameters. The first one, the
`Security Parameters Index {SPI), is a 32-bit string assigned to this SA. The SPI is
`
`30
`
`carried in AH and ESP headers to enable the receiving system to select the SA under
`which a received packet wilt be processed. I P destination address is the second
`
`0004
`
`

`

`wo 03/030488
`
`PCT/FI02/00771
`
`3
`
`parameter, which is the address of the destination end point of the SA, which may be
`an end user system or a network system such as a firewall or a router. The third
`parameter, the Security Protocol Identifier indicates whether the association is an AH
`or ESP security association.
`
`Both AH and ESP support two modes used, transport and tunnel mode.
`
`Transport mode provides protection primarily for upper layer protocols and extends to
`the payload of an IP packet Typically, transport mode is used for end-to-end
`communication between two hosts. Transport mode may be used in conjunction with a
`tunnelling protocol (other than IPSec tunnelling).
`
`Tunnel mode provides protection to the entire IP packet and is used for sending
`messages through more than two components. Tunnel mode is often used when one
`or both ends of a SA is a security gateway, such as a firewall or a router that
`implements IPSec. With tunnel mode, a number of hosts on networks behind firewalls
`may engage in secure communications without implementing IPSec. The unprotected
`packets generated by such hosts are tunnelled through external networks by tunnel
`mode SAs setup by the IPSec software in the firewall or secure router at boundary of
`the local network.
`
`To achieve this, after the AH or ESP fields are added to the IP packet, the entire
`packet plus security fields are treated as the payload of a new outer IP packet with a
`new outer IP header. The entire original, or inner, packet travels through a tunnel from
`one point of an J P network to another: no routers along the way are able to examine
`the inner IP packet. Because the original packet is encapsulated, the new larger
`packet may have totally different source and destination addresses, adding to the
`security. In other words, the first step in protecting the packet using tunnel mode is to
`thus the "1 P I payload" packet becomes
`add a new I P header to the packet;
`"IP liP I payload". The next step is to secure the packet using ESP and/or AH. In case
`of ESP, the resulting packet is "IP I ESP liP I payload". The whole inner packet is
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0005
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`covered by the ESP and AH protection. AH also protects parts of the outer header, in
`addition to the whole inner packet.
`
`4
`
`The IPSec tunnel mode operates e.g. in such a way that if a host on a network
`generates an IP packet with a destination address of another host on another network,
`the packet is routed from the originating host to a security gateway (SGW), firewall or
`other secure router at the boundary of the first network. The SGW filters all outgoing
`packets to determine the need for IPSec processing. If this packet from the first host to
`another host requires IPSec,
`the firewall performs IPSec processing
`involving
`encapsulation of the packet in an outer IP header. The source IP address of this outer
`I P packet is this firewall and the destination address may be a firewall that forms the
`boundary to the other local network. This packet is now routed to the other host's
`firewall with intermediate routers examining only the outer IP header. At the other host
`firewall, the outer IP header is stripped off and the inner packet is delivered to the other
`host.
`
`ESP in tunnel mode encrypts and optionally authenticates the entire inner IP packet,
`including the inner IP header. AH in tunnel mode authenticates the entire inner IP
`packet and seleded fields of the outer IP header.
`
`The key management portion of IPSec involves the determination and distribution of
`secret keys. The default automated key management protocol for IPSec is referred to
`as ISAKMP/Oakley and consists of the Oakley key determination protocol and Internet
`Security Association and Key Management Protocol (ISAKMP). Internet Key Exchange
`(IKE) is a newer name for the ISAKMP/Oakley. IKE is based on the Diffie-Hellman key
`exchange algorithm, and supports RSA signature authentication among other modes.
`IKE is easily extensible for future and vendor -specific features without breaking
`backwards compatibility.
`
`The IPSec protocol solves the known security problems of the Internet Protocol (IP) in
`a satisfactory manner. However, it is designed for a static Internet, 'Nhere the hosts
`using IPSsec are relatively static. Thus, IPSec does not work well with mobile devices.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0006
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`5
`
`For instance, if a mobile terminal moves from one netWork to another, an IPSec
`connection set up is required, typically using the JKE key exchange protocol. Such a
`set up is expensive in terms of latency, since IKE may require several seconds to
`complete.
`It is also expensive in terms of computation, because the Diffie-Hellman
`and authentication-related calculations of IKE are extremely time consuming.
`
`5
`
`Routing means moving information across an internetwork from one source to another.
`Along the way, usually at least one intermediate node is encountered. Routing involves
`both the determination of the optimal routing path and the transport of information
`1 o packets. To aid the routing of information packets, routing algorithms initialise and
`maintain routing tables, which contain route information. Routers communicate with
`each other and maintain their routing tables through the transmission of a variety of
`messages. The routing update message is one such message that generally consists
`the whole or part of a routing table.
`
`15
`
`20
`
`25
`
`30
`
`The fundamental problem with IP mobility is the fact that IP routing is based on fixed
`addresses. The address space has been divided into subnetworks, that reside in
`practically fixed locations with respect to network topology (the routing can be
`changed, but that is a slow process, possibly in the order of minutes). When a mobile
`host moves away from its home netwOrk (where its IP address is proper), there is a
`problem with the routing of the packets to the new location if the IP network in question
`does not support such movement
`
`In this text, the term mobility and mobile terminal does not only mean physical mobility,
`instead the term mobility is in the first hand meant moving from one network to
`another, which can be performed by a physically fixed terminal as well.
`
`Standard Mobile IP for 1Pv4 utilises e.g. IP-lP and Generic Routing Encapsulation
`(GRE) tunnelling to overcome this problem (See more details in figure 1 with
`accompanying text). There are also other methods of tunnelling, and hence, JP-IP and
`GRE tunnelling are used only as examples in this text. Mobile 1Pv4 has two modes of
`operation. In the co-located care-of address mode the mobile terminal performs IP-IP
`
`0007
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`6
`
`encapsulation and decapsulation. Ttlis mode requires a borrowed address - the co(cid:173)
`located care-of address - from the visited network. The other mode is the foreign agent
`mode, where the IP-IP or other tunnelling is performed by a special host in the visited
`network, called the Foreign Agent (FA). The mobile terminal communicates directly
`5 with the FA {an JP address is not required for this direct communication), and does not
`require a borrowed address in this mode.
`
`I o
`
`In IP-IP tunnelling, an IP address (the so called co-located care-of address) is
`borrowed from a network being visited. This address is topologically correct, i.e.
`routable from other parts of the network. When a mobile terminal needs to send a
`packet to a given target computer, it first constructs an IP packet, whose source
`address is its home address, i.e. the address that is not topologically correct in the new
`network, and whose destination address is the target computer.
`
`15 Since this packet may not be directly routabfe, it is encapsulated into another IP packet
`(by so called IP-IP encapsulation, or IP-IP tunnelling). The source address of this IP
`packet is the care-of address, and the target address is the so called home server of
`the mobile terminal. Upon receiving such an encapsulated packet, the home server
`unwraps the JP-JP tunnel, and proceeds to route the packet, which was inside the
`encapsulation.
`
`20
`
`25
`
`Reverse packets from the target computer to the mobile terminal are handled similarly;
`the packet is first routed to the home server, then encapsulated in IP-IP and delivered
`to the current network the mobile terminal is in. The current mobility binding
`determin.es which current care-of address matches a given home address. (There may
`also be so-called simultaneous bindings, in which case the home address matches a
`set of care-of addresses; the packet is encapsulated and sent to each care-of address
`separately.}
`
`30 When the mobile terminal moves to a new network, an authenticated signalling
`message exchange is done between the mobile terminal and the home server. A
`Registration Request is sent by the mobile terminal to the home server, requesting an
`
`0008
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`7
`
`update of the current mobility binding. The server responds using a Registration Reply
`that may either accept or deny the request. When the Foreign Agent mode of operation
`is used, the registration messages go through the Foreign Agent.
`
`5
`
`10
`
`IP version 4 (1Pv4) is the currently widely deployed Internet Protocol version. Its major
`disadvantage is the small number of unique, public IP addresses. IP version 6 (1Pv6)
`has a much larger address space, which fixes the most important 1Pv4 problem known
`today. JPv6 also changes some other things in the Internet Protocol, for example, how
`fragmentation of packets is done, but these changes are quite small. Most protocols
`have separate definitions on how they are used within the 1Pv4 and the 1Pv6 context.
`For instance, there are separate versions of IPSec and Mobile IP for use with 1Pv4 and
`I Pv6. However, such modifications to protocols are quite small, and do not usually
`change the essentials of the protocols significantly.
`
`I 5
`
`The IPSec protocol solves the known security problems of the Internet Protocol (IP) in
`a satisfactory manner. However, it is designed for a static Internet, where the hosts
`
`using IPSec are relatively static. Thus, IPSec does not work well with mobile devices.
`For instance, if a mobile terminal moves from one nel\wrk to another, an IPSec
`connection set up is required, typically using the IKE key exchange protocol. Such a
`set up is expensive in terms of latency, since IKE may require several seconds to
`complete. It is also expensive in terms of computation, because the Diffie-Hellman and
`authentication-related calculations of IKE are extremely time consuming.
`
`The above description presents the essential ideas of Mobile IP.
`
`The mobile IP approach of prior art has some disadvantages and problems.
`
`20
`
`25
`
`The standard Mobile IP protocol provides a mobile terminal with a mobile connection,
`
`and defines mechanisms for performing efficient handovers from one network to
`another. However, Mobile IP has several disadvantages. The security of Mobile IP is
`
`30
`
`very limited. The mobility signalling messages are authenticated, but not encrypted,
`and user data traffic is· completely unprotected. Also, there is no key exchange
`
`0009
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`8
`
`mechanism for establishing the ayptographic keys required for authenticating the
`mobility signaUing. Such keys need to be typically distributed manually. In the manual
`prior art key management, the signalling authentication mechanism requires the mobile
`host and the home server to share a secret authentication key and the distribution of
`that key, which is carried out manually, is not very practical. Finally, the current Mobile
`IP protocol does not define a method for working through Network Address Translation
`{NAT) devices.
`
`5
`
`Said problem With Network Address Translation (NAn devices, even if NAT devices
`I o are ab(e to translate addresses of private networks in messages to public I P addresses
`so that the messages can be sent through internet, is, however, that currently no
`standard for making Mobile IP work through NAT devices. NAT devices are widely
`deployed because the use of private addresses requires less public IP addresses than
`would otherwise be needed.
`
`15
`
`REFERENCES
`
`The following is a Jist of useful references for understanding the technology behind the
`invention.
`
`20
`
`IP in general, UDP and TCP:
`
`[RFC768]
`J. Postel, User Datagram Protocol, RFC 768, August 1980.
`ftp://flp.isi.edu/in-notes/rfc768.txt
`
`[RFC791]
`J. Postel, Internet Protocol, RFC 791, September 1981.
`ftp:l/flp.isi.edu/in-notes/rfc791.txt
`
`25
`
`30
`
`[RFC792]
`
`J. Postel, Internet Control Message Protocol, RFC 792, September 1981.
`
`0010
`
`

`

`WO 03/030488
`
`PCTIFI02/00771
`
`ftp:/lftp.isi.edulin-notes/rfc792.txt
`
`9
`
`[RFC793]
`J. Postel, Transmission Control Protocol, RFC 793, September 1981.
`ftp://ftp.isi .edu/in-notes/rfc 793. txt
`
`[RFC826]
`D.C. Plummer, An Ethernet Address Resolution Protocol, RFC 826, November
`1982.
`ftp://ftp.isi.edu/in-notes/rfc826. txt
`
`[RFC2460]
`S. Deering, R. Hinden, Internet Protocol, Version 6 (/Pv6) Specification, RFC
`2460, December 1998.
`
`Mobile IP; IP-IP; DHCP:
`
`[RFC2002)
`C. Perkins, IP Mobility Support, RFC 2002, October 1996.
`ftp:llftp.isi.edu/in-noteslrfc2002.txt
`
`[RFC2003]
`C. Perkins, IP Encapsulation Within IP, RFC 2003, October 1996.
`ftp://ftp.isi.edu/in-noteslrfc2003.txt
`
`[RFC213.1]
`
`R. Drams, Dynamic Host Configuration Protocol, RFC 2131, March 1997.
`ftp://ftp.isi.edu/in-notes/rfc2131.txt
`
`[RFC3115)
`G. Dommety, and K Leung, Mobile IP Vendor/Organization-specific Extensions,
`RFC 3115, April 2001.
`ftp://ftp.isi.edulin-notes/rfc3115.txt
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0011
`
`

`

`WO 03/030488
`
`PCTIFI02/00711
`
`1.0
`
`[MOBILEIPV6]
`D. B. Johnson, C. Perkins, Mobility Support in 1Pv6, Work in progress (Internet(cid:173)
`Draft is available), July 2000.
`
`[DHCPV6]
`J. Bound, M. Carney, C. Perking, R Droms, Dynamic Host Configuration
`Protocol for /Pv6 (DHCPv6), Work in progress (Internet-Draft is available), June
`2001.
`
`I P Sec standards:
`
`[RFC2401]
`S. Kent, and R. Atkinson, Security Architecture for the Internet Protocol, RFC
`2401, November 1998.
`ftp:/lftpJsi.edulin-notes/rfc2401.txt
`
`[RFC2402]
`S. Kent, and R. Atkinson, IP Authentication Header, RFC 2402, November
`1998.
`ftp://ftp. isf. edulin-notes/rfc2402. txt
`
`[RFC2403]
`C. Madson, R. Glenn, The Use of HMAC-MDS-96 within ESP and AH, RFC
`2403, November 1998.
`
`[RFC2404]
`C. Madson, R. Glenn, The Use of HMAC-SHA-1-96 within ESP and AH, RFC
`2404, November 1998.
`
`[RFC2405]
`
`C. Madson, N. Doraswamy, The ESP DES-CBC Cipher Algorithm With Explicit
`IV, RFC 2405, November 1998. ·
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`0012
`
`

`

`WO 03/030488
`
`PCT/FI02/00771
`
`11
`
`[RFC2406]
`S. Kent, and R. Atkinson, /P Encapsulating Security Payload (ESP), RFC 2406,
`November 1998.
`ftp://ftp.isi.edu/in-notes/rfc2406.txt
`
`[RFC2407]
`D. Piper, The internet IP Security Domain of Interpretation for ISAKMP, RFC
`2407, November 1998.
`np:Jiftp.isi. edulin-notes/rfc2407. txt
`
`[RFC2408]
`D. Maughan, M. Schneider, M. Schertler, and J. Turner, Internet Security
`Assodation and Key Management Protocol (ISAKMP), RFC 2408, November
`1998.
`ftp://ftp.isi.edu/in-notes/rfc2408.txt
`
`[RFC2409]
`D. Harkins, and D. Carrel, The Internet Key Exchange (IKE), RFC 2409,
`November 1998.
`ftp://ftp.isi.edu/in-notes/rfc2409.txt
`
`[RFC2410]
`R. Glenn, S. Kent, The NULL Encryption Algorithm and Its Use W1th IPsec, RFC
`2410, November 1998.
`
`[RFC2411]
`R. Thayer, N. Doraswamy, R. Glenn. IP Security Document Roadmap, RFC
`2411, November 1998.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`[RFC2412]
`H. Orman, The OAKLEY Key Determination Protocol, RFC 2412, November
`1998.
`
`0013
`
`

`

`wo 03/030488
`
`NAT:
`
`PCT /FI02/00771
`
`12
`
`[RFC2694]
`P. Srisuresh, G. Tsirtsis, P. Akkiraju, and A. Heffernan, DNS extensions to
`Network Address Translators (DNS_ALG), RFC 2694, September 1999.
`
`5
`
`[RFC3022]
`P. Shisuresh, K Egevang, Traditiona/IP Network Address Translator
`(Traditional NAT), RFC 3022, January 2001.
`ftp://ftp.isi.edulin-notes/rfc3022.txt
`
`THE OBJECT OF THE INVENTION
`
`The object of the invention is to ensure secure forwarding of messages from and to
`mobile terminals by avoiding the problems of prior art described above.
`
`I 0
`
`15
`
`20 SUMMARY OF THE. INVENTION
`
`The method of the invention for ensuring secure forwarding of a message is performed
`in a telecommunication network, comprising at least one terminal from which the
`
`message is sent and at least one other terminal to which the message is sent. In the
`25 method,·one or more secure connections are established between different addresses
`of the first terminal and address of the other terminal, the connections defining at least
`said addresses of the two terminals. When the first terminal moves from one address
`to another address, a secure connection, whose endpoints are the new address of the
`first terminal and the address of the other terminal, is registered to be at least one of
`
`30
`
`the active connections.
`
`0014
`
`

`

`WO 03/030488
`
`PCTIFI02/00771
`
`13
`
`If there does not already exist such a secure connection between the new address and
`the other terminal. a new secure connection between the new address and the other
`terminal address has to be formed.
`
`5
`
`The terminals might have several active connections. In the invention, the terminal
`might in one embodiment also have only one secure active connection at a time, which
`can be changed in according with the invention to be defined to be between the
`address the terminal moves to and the address of the other terminal.
`
`10
`
`In the invention, the first terminal is movable from one netv.lork to another. Such a
`terminal can physically be a mobile terminal or a fixed terminal.
`
`The invention is moreover concerned with a system. which is able to perform the
`method of the invention. The characteristics of the system are defined by the system
`15 main claim, the subclaim defining the functions that can be performed by the system of
`the invention.
`
`20
`
`25
`
`The secure connections are preferably established by forming Security Associations
`{SAs) using the IPSec protocols and the message to be forwarded consists of IP
`packets. The key exchange being a part of the forming of a secure connection is
`performed manually or automatically with IKE or some other automated key exchange
`protocol.
`
`When a new secure connection is formed, it is registered for immediate and/or later
`use. The registration for later use is made using a connection table, which is
`maintained by both hosts participating in the forming of the secure connection. The
`connection table is also used e.g. when the first terminal moves, and needs to
`determine whether a secure tunnel already exists for the new address. The table can
`
`be e.g. a Security Association DataBase (SADB), which is the nominal place to store
`IPSec .SAs in the IPSec model.
`
`30
`
`0015
`
`

`

`wo 03/030488
`
`PCT/FI02/00771
`
`14
`
`fPSec security associations are used as secure
`In the preferred embodiment.
`connections. The table, through which the existence of a given IPSec SA {in either the
`first terminal or the other terminal) is determined,
`is then the IPSec Security
`Association DataBase (SADB).
`
`The actual connection(s) to be used is registered by means of a signalling message or
`signalling message exchange between the first terminal and the other terminal, for
`example by means of Registration Request and possibly Registration Reply
`messages.
`
`The request message may update a set of security associations, for instance, a single
`security association, a security association bundle, an IPSec connection, a group of
`IPSec connections, or any combinations of these. In practice, it is useful to update
`either a single IPSec connection or a group of IPSec connections. The latter may be
`important if separate IPSec connections are used for different kinds of traffic. A single
`request message can then update all (or a certain set) of such connections to a new
`address, instead of requiring separate requests for each IPSec connection. In the
`following, the case of updating a single IPSec connection is discussed, without limiting
`the invention to this behaviour.
`
`The new address of the first terminal can also be updated automatically by the other
`terminal when the first terminal sends a message from its new address.
`
`5
`
`10
`
`15
`
`20
`
`The active SA is a stored mobility binding that maps a given terminal address to one or
`25 more IP.Sec tunnel mode SAs (or zero such SAs, if the terminal in question is not
`connected). These mobility bindings are manipulated when Registration Request and
`Registration Reply messages are processed when sending packets to the first
`terminal. It is possible to restrict traffic from the first terminal to only the IPSec SAs that
`are currently registered in the mobility binding, but allowing traffic from all shared SAs
`is also reasonable.
`
`30
`
`The mobility binding is necessary, since each of the shared IPSec security
`associations is valid for securing traffic. There has to be some way for the first terminal
`
`0016
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`to determine. which security association(s) to actually use when processing packets.
`The mobility binding serves this purpose in the invention.
`
`15
`
`5
`
`10
`
`15
`
`The first terminal may use any IPSec tunnel SA it shares with the other terminal. It is
`possible to restrid traffic from the first terminal to only the IPSec SAs that are currently
`registered, but this is not an essential feature. Thus, the first terminal may use any
`IPSec tunnel SA it shares with the other terminal when sending packets. The other
`terminal may restrid traffic only to IPSec SAs that are currently adive in the mobility
`binding, but allowing traffic from all shared SAs is also reasonable.
`
`The invention can be used for direct end-to-end communication, in which case the
`secure tunnel is established between these end computers. If applied to IPSec, this
`could correspond to either an IPSec transport mode or tunnel mode SA The message
`might also be sent first to an intermediate computer, whereby the outer address of the
`IPSec tunnel is unwrapped by the intermediate computer and the message is
`forwarded as plain text to the end destination computer.
`
`Thus, in the solution of the invention, an IPSec security association is used instead of
`the IP-tP tunnelling. The invention can also be used for tunnelling with IPSec transport
`20 mode and an external tunnelling mechanism, such as Layer 2 Tunnelling Protocol
`{L2TP).
`
`The invention provides the following advantages.
`
`25
`
`30
`
`IPSec key management and strong authentication can be leveraged for this application
`involving asymmetric {RSA) authentication, the use of the Diffie-Hellman key exchange
`algorithm, the possibility to use certificates etc.
`
`The IPSec symmetric encryption and authentication methods can be used to protect
`both signalling and data traffic. This provides confidentiality and integrity and any
`future developments of IPSec can be taken advantage of.
`
`0017
`
`

`

`wo 03/030488
`
`PCTIFI02/00771
`
`16
`
`The NAT traversal problem can be solved by using any available NAT traversal
`mechanisms for IPSec. One is currently being standardised for JPSec, but any other
`IPSec NAT traversal mechanism may be used.
`
`5
`
`The invention can be used in different networks, such as 1Pv4 and 1Pv6.
`
`In the following the invention is described more in detail by means of an advantageous
`embodiment in an example network but is not restricted to the details thereof.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`FIGURES
`
`Figure 1 describes the mobile IP tunnelling of prior art by means of a signalling
`diagram
`
`Figure 2 describes the method of the invention by means of a signalling diagram
`
`DETAILED DESCRIPTION
`
`The data communication in figure 1 takes place from a mobile terminal to a target host
`X via an intermediate computer, which YIOrks as a home server for host X.
`
`Packets sent from the home address of the mobile terminal can be directly routed to
`the target address X by the intermediate computer, since the home address is
`registered in routing tables by means of which the routing takes place.
`
`Figure 1 describes a method of prior art, 'Nherein IP-IP tunnelling is used for routing
`data packets when the mobile host moves from one address to another, i.e. from the
`home address to

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket