首页>
外国专利>
PROTOCOL-BASED, SECURE AUTHENTICATION METHODS USING THE ESTABLISHMENT OF ISAS
PROTOCOL-BASED, SECURE AUTHENTICATION METHODS USING THE ESTABLISHMENT OF ISAS
展开▼
机译:使用ISAS建立基于协议的安全认证方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
PURPOSE: A security authentication method is provided to implement a fast handover by obtaining a high level security without using an RR(Ready Reserve) method. CONSTITUTION: An AAAh(Authentication, Authorization, and Accounting) system generates an ARA(AA Registration Answer) message from an HoA(Home Answer) message. The AAAh system transmits the ARA message to an AAAc system through an AAAv system(210). The AAAc system generates an IRR(Integrated Registration Request) answer message from the ARA message. The AAAc transmits the generated IRR answer message to an MN(Mobile Node)(211). A CN(Correspondent Node) authenticates a first BU(Binding Update) message. The CN generates a BA(Binding Acknowledgement) message. The CN transmits the generated BA message to the MN(212).
展开▼