Claims
- 1. A communications method for use in a communications network including a mobile node, a first security device and a second security device, said mobile node being identified in a home region of said communications network by a first identifier, said second security device being in a foreign region of said communications network, the method comprising:
operating the second security device to:
transmit a signal including said first identifier to the first security device receive a first secret in response to said transmitted signal including said first identifier; and associate a second identifier with said first secret, said second identifier being used to identify said mobile node in said foreign region.
- 2. The communications method of claim 1, wherein associating the second identifier with said first secret includes storing said second identifier in a database with said first secret.
- 3. The method of claim 2, further comprising:
operating the second security device to store user profile information associated with said second identifier.
- 4. The method of claim 3, further comprising:
operating the second security device to store said first identifier in association with said second identifier and said user profile information.
- 5. The method of claim 4, wherein said first and second identifiers are network access identifiers (NAI) and wherein said first and second security devices are servers which perform authentication operations.
- 6. The method of claim 3 wherein the first security device is located in said home region, the method further comprising operating the first security device to:
access a second secret associated with said first identifier; and generate said first secret from said second secret.
- 7. The method of claim 6, wherein said generation of said first secret from said second secret is part of a mutual authentication operation between said mobile node and said first security device.
- 8. The method of claim 6, further comprising:
operating the first security device to transmit said first secret along with at least some of said user profile information to said second security device.
- 9. The method of claim 8, further comprising:
operating the first security device to transmit first secret lifetime information along with said first secret.
- 10. The method of claim 9, further comprising operating the second security device, prior to expiration of the first secret lifetime indicated by said first secret lifetime information, to:
transmit another signal including said first identifier to the first security device; receive a third secret in response to said transmitted another signal; and associate said second identifier with said third secret.
- 11. The method of claim 2, further comprising:
operating said second security device to generate said second identifier prior to associating said second identifier With said first secret.
- 12. The method of claim 11, further comprising:
operating said second security device to communicate said second identifier to said mobile node.
- 13. The method of claim 12, further comprising:
operating said second security device to communicate lifetime information associated with said second identifier to said mobile node.
- 14. The method of claim 11, further comprising:
operating said mobile node to generate said second identifier.
- 15. The method of claim 14, further comprising the generation of second identifier out of an operation that involves the said first secret and a random number information sent by second security device to the mobile node.
- 16. The method of claim 15, wherein said operation is a keyed one-way hash function.
- 17. The method of claim 1, wherein said first secret is a key, the method further comprising:
operating said second security device to transmit information specifying the format of at least a portion of said key to said first security device.
- 18. The method of claim 17, wherein said information specifying the format also specifies the length of said key.
- 19. The method of claim 17, further comprising:
operating the second security device to transmit information to said first security device, said information specifying the manner in which said key is to be generated.
- 20. The method of claim 2, further comprising:
operating said mobile node, while located in said foreign region, to transmit a first signal including said first identifier, said second security device transmitting said first identifier to said first security device in response to the transmission of said first signal by said mobile node.
- 21. The method of claim 20, further comprising:
operating said mobile node to transmit a second signal, the second signal including said second identifier; and operating the second security device to perform an authentication operation using said first secret in response to said second signal.
- 22. The method of claim 21, further comprising, as part of said authentication operation, operating the second security device to generate at least one additional secret from said first secret; and
subsequently using said additional secret to authorize a communications service provided to said mobile node.
- 23. A communications network comprising:
a mobile node; a home region including a first security system, said mobile node being associated With said home region and being identified in said home region by a first identifier, said first security system storing said first identifier and a first secret known to both said mobile node and said first security system; and a foreign region including a second security system, said mobile node being located in said foreign region for a period of time, the second security system being coupled to said first security system, said second security system including said first identifier and a second secret generated from said first secret by said first security system and supplied to said second security system.
- 24. The communications network of claim 23, wherein said second security system further includes:
a second identifier associated with said mobile node, the second identifier being used to identify said mobile node to said second security system.
- 25. The communications network of claim 24, wherein said first and second identifiers are network access identifiers.
- 26. The communications network of claim 23, wherein said first security system includes means for generating said second secret in response to a message from said second security system including said first network access identifier.
- 27. The communications network of claim 26, wherein said second security system includes:
means for communicating said second network access identifier to said mobile node.
- 28. The communications network of claim 27, wherein said mobile node includes:
means for initiating an access request using said second network access identifier in said foreign domain following receipt of said second network access identifier.
- 29. A mobile node, said mobile node comprising:
a transmitter for receiving and transmitting information; and a memory including:
a first network access identifier corresponding to a first network domain; a first secret which is also stored in a first security system included in said first network domain; a second secret, said second secret having been generated by said mobile node from said first secret; and a second network access identifier, said second network access identifier being associated with said second secret and being used for authenticating said mobile node to a second security system included in a second network.
RELATED APPLICATIONS
[0001] The present application claims the benefit of U.S. Provisional Patent Application S. No. 60/418,526 filed Oct. 15, 2002 titled “METHODS AND APPARATUS TO SECURE A COMMUNICATIONS ACCESS LINK AND MOBILITY SESSION IN A FOREIGN NETWORK” which is hereby expressly incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60418526 |
Oct 2002 |
US |