TWI300662B - - Google Patents
Download PDFInfo
- Publication number
- TWI300662B TWI300662B TW93123263A TW93123263A TWI300662B TW I300662 B TWI300662 B TW I300662B TW 93123263 A TW93123263 A TW 93123263A TW 93123263 A TW93123263 A TW 93123263A TW I300662 B TWI300662 B TW I300662B
- Authority
- TW
- Taiwan
- Prior art keywords
- local
- external
- agent
- mobile
- network
- Prior art date
Links
- 239000003795 chemical substances by application Substances 0.000 claims description 96
- 238000000034 method Methods 0.000 claims description 24
- 238000013475 authorization Methods 0.000 claims description 17
- 238000012790 confirmation Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 3
- 239000000463 material Substances 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 18
- 238000012546 transfer Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000001105 regulatory effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 241000282994 Cervidae Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 210000002784 stomach Anatomy 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
1300662 【發明所屬之技術領域】 本發明係為一種移動式VPN(Mobile Virtual Private Network)之動態代理器(Home Agent)指派(Assignment)方 法及系統,特別是關於一種在網際網路通訊安全協定 (IPsec)的架構上VPN,可動態指派外部代理器提供移動節 點註冊的方法及系統。 【先前技術】 按,虛擬專用網路(Virtual Private Network,以下 簡稱VPN)是一種可利用廣域網路(如網際網路)將一遠端使 用者電腦與一本地網路的伺服器建立專用的網路通道,進 行數據傳輸’並提供就像在封閉的私人區域網路内部一樣 安全。 VPN為了確認安全性因此具有下列基本要求: 1 ·用戶驗證:VPN必須能夠驗證使用者身份並嚴格控 制只有經註冊授權的使用者才能登入。 2·地址管理:VPN必須能夠為使用者分配專用網路上 的地址,並確保地址安全性。 3 ·數據加密:對於通過網際網路傳輸的數據必須經過 加密,以確保網際網路上的其他未授權使用者無法讀取數 據訊息。 4·密鑰管理:VPN必須能夠產生並更新使用者端電腦 與伺服器的加密金鑰。 5·支援多種協定:VPN必須能夠支援網際網路上普遍 1300662 五、發明說明(2) 使用的基本協定,包括ΙΡ、ΙΡΧ、ρρτρ(點對點通道協定) 、L2TP(第2層通道協定)或ipsec(網際網路通訊安全協定) …等等。 網際網路通訊協定(I p )是一種在電腦網路(如網際網 路)上傳輸資料所使用的通訊協定,然而IP並未定義任何 的安全性機制。因此,網際網路工程任務推動小組 (Internet Engineering Task Force,以下簡稱IETF)在 「Request f〇r Comments (RFC)」240 1 通訊標準中定義一 種IPsec協定,是一種將IP流量加密的方法,可以保護網 路通訊,以防止資料修改、第三者檢視、模擬,以及被擷 取及重播的標準。 4一由於無線網路技術的迅速發展,因此針對無線傳輸 網路如何建立移動式VPN已成為相當重要的研究課題,而 應用無線技術的移動式(M〇biie)vpN,在IETF亦定義了一1300662 [Technical Field] The present invention relates to a Mobile Agent (Mobile Agent) mobile agent (Home Agent) Assignment method and system, and more particularly to an Internet Protocol Security Protocol ( IPsec) On-architecture VPN, a method and system for dynamically assigning external agents to provide mobile node registration. [Prior Art] Virtual Private Network (VPN) is a network that can use a wide area network (such as the Internet) to establish a dedicated network between a remote user's computer and a local network server. Road channels for data transmission 'and provide as secure as inside a closed private area network. In order to confirm security, VPN has the following basic requirements: 1 · User authentication: VPN must be able to verify the identity of the user and strictly control only registered users to log in. 2. Address Management: The VPN must be able to assign addresses to the user on the private network and ensure address security. 3 • Data Encryption: Data transmitted over the Internet must be encrypted to ensure that other unauthorized users on the Internet cannot read the data. 4. Key Management: The VPN must be able to generate and update the encryption key of the client computer and the server. 5. Support for multiple protocols: VPNs must be able to support the basic protocols used on the Internet, including ΙΡ, ΙΡΧ, ρρτρ (point-to-point channel protocol), L2TP (layer 2 channel protocol) or ipsec ( Internet Protocol Security Protocol)...etc. Internet Protocol (Ip) is a protocol used to transmit data over a computer network (such as the Internet). However, IP does not define any security mechanisms. Therefore, the Internet Engineering Task Force (IETF) defines an IPsec protocol in the "Request f〇r Comments (RFC)" 240 1 communication standard, which is a method of encrypting IP traffic. Protect network communications to prevent data modification, third party viewing, simulation, and standards for being captured and replayed. 4 Because of the rapid development of wireless network technology, how to establish a mobile VPN for wireless transmission networks has become a very important research topic, and the mobile (M〇biie) vpN using wireless technology has also been defined in the IETF.
Mobile IPV4(IETF RFC 3344)協定標準,但在該 Mobile IPv4標準仍有一些的問題需要解決。 例如’當一移動節點(Mobile Node,以下簡稱MN)(如 裝設有無線網路設備的行動電腦),在一内部網路 (^Intranet)漫遊時,會由一本地代理器(H〇me Agent,HA) 指派一移動IP(Mobile ip,以下簡稱河1]?)給該.,而當該 MN由該内部網路漫遊至一外部網路(Internet)時,如在家 中或外地分公司’該MN會由當地的一外地代理器(F〇reign Agent,FA)進入一以IPsec為安全基礎的VpN閘道器(νρΝ Gateway)向該本地代理器(HA)進行註冊,使該vpN閘道器The Mobile IPV4 (IETF RFC 3344) protocol standard, but there are still some issues to be resolved in the Mobile IPv4 standard. For example, 'Mobile Node (hereinafter referred to as MN) (such as a mobile computer equipped with a wireless network device), when roaming on an internal network (^Intranet), will be a local agent (H〇me Agent, HA) assigns a Mobile IP (Mobile ip, hereinafter referred to as River 1) to this. When the MN roams from the internal network to an external network (Internet), such as a branch at home or in the field 'The MN will be registered by a local foreign agent (FA) into a VpN gateway (vρN Gateway) based on IPsec to register the local agent (HA) to make the vpN gate Channel
13006621300662
對該外地代理器(FA)建立IPsec通道。 而該MN在所漫遊的外部網路中會得到一個新的轉接址 位(Care of Address,以下簡稱c〇A),並要求該vpN閘道 器為該MN在每次漫遊到一新的子網路時更新lpsec通道。 然而’所有進入該VPN閘道器的數據封包訊息皆會被Ipsec 安全標準加密,而該外地代理器(FA)並無法解密該些加密 過的數據封包’因此該外地代理器(FA)並無法傳輸該1?訊 息。 為了解決上述的問題’ IETF的Mobile IPv4的工作小 組(Working Group,WG)提出一種利用一部固定的機器 (Mechanism)去支援VPN用戶作國際無縫漫遊 (International Seam less Roaming, ISR)的方法 〇 該方法是在將該内部網路中的本地代理器(H A ) 定義 為一内部本地代理器(Internal Home Agent, 以下簡稱 i-HA),而在該外部網路(External Network)中建置一外 部本地代理器(External Home Agent, 以下簡稱χ-ΗΑ), 該i-HA是作為該内部網路管理(Mobi 1 ity Management)該 MN的漫遊狀況之用,而該χ-ΗΑ則是當該MN漫遊至該外部網 路時,作為管理該MN的漫遊狀況之用。 而多出的該X - HA可將已建立的IPsec tunnel包覆在 X - MIP tunnel之下,不需變更到已建立的IPsec tunnel, 因此當該MN由該VPN閘道器獲得一新的CoA後,該VPN閘道 器所建立的I Psec通道則不會被破壞,亦因此該外部代理 器(FA)就可以解密該χ-ΜΙΡ的訊息,故而用此方法可不必Establish an IPsec tunnel for the foreign agent (FA). The MN will get a new Care of Address (c〇A) in the roaming external network, and ask the vpN gateway to roam for a new one for the MN. Update the lpsec channel when the subnet. However, all data packet messages entering the VPN gateway will be encrypted by the IPsec security standard, and the foreign agent (FA) cannot decrypt the encrypted data packets. Therefore, the foreign agent (FA) cannot Transfer the 1? message. In order to solve the above problems, IETF's Mobile IPv4 Working Group (WG) proposed a method to support VPN users for International Seam less Roaming (ISR) by using a fixed mechanism (Mechanism). The method is to define a local agent (HA) in the internal network as an internal home agent (i-HA), and build an external network (External Network). External Home Agent (hereinafter referred to as χ-ΗΑ), the i-HA is used as the roaming status of the MN of the internal network management (Mobi Management), and the χ-ΗΑ is when When the MN roams to the external network, it is used to manage the roaming status of the MN. The extra X-HA can encapsulate the established IPsec tunnel under the X-MIP tunnel without changing to the established IPsec tunnel, so when the MN obtains a new CoA from the VPN gateway After that, the IP channel established by the VPN gateway will not be destroyed, and therefore the external agent (FA) can decrypt the message, so this method does not need to be used.
1300662 五、發明說明(4) 修改Mobile IPv4標準及IPsec標準,只改變一些移動節點 所必需要的轉接位址(CoA)。 如第一圖所示,即為IETF所定義的移動式vpn標準架 構示意圖。在第一圖中有一 MN 1透過一 i—HA 11漫遊在一 内部網路1 0内,而當該Μ N 1由該内部網路1 〇移至一外部網 路20時,該ΜΝ 1必須向一χ-ΗΑ 21進行註冊,以獲得一新 的CoA,而該χ-ΗΑ 21再向一 VPN閘道器22要求建立ipsec通 道連接至該X-HA 21。最後該VPN閘道器22再向該i-HA 11 註冊該ΜΝ 1 的VPN-TIA (VPN Tunnel lnner Address),以 便將所建立該IPsec通道連接該i-HA 11,形成由外部網路 20及内部網路1〇皆可漫遊的虛擬專用網路(vpN)。 該IPsec通道訊息33外再包覆一 道訊息3… 一層外部移動IP(X-MIP)的通1300662 V. INSTRUCTIONS (4) Modify the Mobile IPv4 standard and the IPsec standard to change only the transit address (CoA) that some mobile nodes must have. As shown in the first figure, it is a schematic diagram of the mobile VPN standard architecture defined by the IETF. In the first figure, a MN 1 roams through an i-HA 11 in an internal network 10, and when the Μ N 1 is moved from the internal network 1 to an external network 20, the ΜΝ 1 must Registering with a χ-ΗΑ 21 to obtain a new CoA, the χ-ΗΑ 21 then requests a VPN gateway 22 to establish an ipsec channel connection to the X-HA 21. Finally, the VPN gateway 22 registers the VPN-TIA (VPN Tunnel lnner Address) of the ΜΝ 1 with the i-HA 11 to connect the established IP sec channel to the i-HA 11, and is formed by the external network 20 and A virtual private network (vpN) that can be roamed on the internal network. The IPsec channel message 33 is covered with a message 3... A layer of external mobile IP (X-MIP)
立而第二圖即為該移動式VPN的所建立通道的訊息結構 示意圖,是由該ΜΝ 1由内部網路1〇漫遊到外部網路2〇的通 道訊號數據封包3 0,其中包含一層原始數據封包 (Original Packet)31,在該原始數據封包31前包覆一層 内部移動IP(i-MIP)的通道訊息32(由該卜HA u到該vpN曰間 道器22),而在該内部移動]^通道訊息32外更包覆一層 IPsec通道訊息33(由該VPN閘道器22到該X — HA 21) , ^在 但是在習知IETF的方法中 5亥X - H A 2 1鹿該姑姑番切v , X-HA是安全的? 由於在該習知IETF的方法中是在該外部 網路20中建置The second picture is a schematic diagram of the message structure of the established channel of the mobile VPN, which is a channel signal data packet 30 that is roamed by the internal network 1 to the external network 2, which includes a layer of original The data packet (Original Packet) 31 is wrapped with an internal mobile IP (i-MIP) channel message 32 (from the HA to the vpN inter-channel device 22) before the original data packet 31. Move]^ channel message 32 is further covered with a layer of IPsec channel message 33 (from the VPN gateway 22 to the X-HA 21), ^ but in the conventional IETF method 5 Hai X-HA 2 1 deer Aunt is cut v, X-HA is safe? Since it is built in the external network 20 in the conventional IETF method.
第8頁 1300662 五、發明說明(5) —固定(Static)的x-HA 21,若該外部網路2〇中有包含 數個子網路(Subnet)時,則如何安排該χ_ΗΑ 21的放置地 =,將會影響到漫遊子網路間該外部代理器(FA)與該χ_ΗΑ 21間的轉接傳遞(Handoff)時間延遲,以及漫遊子網路間 的端至端(End-to-End)時間延遲問題。且由於該χ_ΗΑ 21 fVPN閘道器22無法控制的外部網路2〇中,因此是否能相 L該x-HA 21是否真的符合iPsec的安全標準? 職是,本案發明人即為解決上述現^移動式VPN的需 ,以及問題點,乃特潛心研究並配合學理之運用,提出一 ,移動式VPN之動態代理器(X-HA)指派方法及系統,可動一 =指派接近該MN的本地代理器(HA)作為該χ_ΗΑ,因此可 ^遊網路間的轉接傳遞(Handoff)延遲及端至端(End忧, Ejid)延遲降到最小,且可完全結合安全控制, 疋一合理且能有效改善上述缺失之發明。 【發明内容】 时本發明之目的係在於提供一種移動式VPN之動態代理 ,《派=法及系統,可動態派指派在漫遊外部網路中接近 j移動節點的外部本地代理器作為該移動節點的註冊代理 , 使該移動節點在相同的外部網路中漫遊時,(只需向 ^ 1卜°卩本地代理器註冊即可,而不必再至該内部網路之°内 代理器註冊_IETF的方法亦可),如此可將漫遊時的 正裔間轉接傳遞(Handof f)延遲及端至端(End t〇 End) 延遲降到最小,且可完全結合VPN的I Psec安全控制。Page 8 1300662 V. Invention Description (5) - Static x-HA 21, if the external network 2〇 contains several subnets, how to arrange the placement of the χ_ΗΑ 21 =, will affect the Handoff time delay between the external agent (FA) and the χ_ΗΑ 21 between roaming subnets, and the end-to-end between roaming subnets Time delay issue. And because the χ_ΗΑ 21 fVPN gateway 22 cannot control the external network 2, can it be true that the x-HA 21 really meets the iPsec security standard? The job is that the inventor of this case is to solve the above-mentioned needs of the current mobile VPN, as well as the problem, and to study and cooperate with the application of the theory, to propose a mobile VPN dynamic agent (X-HA) assignment method and The system, the mobile the local agent (HA) close to the MN as the χ_ΗΑ, so the Handoff delay and the End-to-End (Ejid) delay between the networks can be minimized. And it can be fully integrated with safety control, which is reasonable and can effectively improve the above-mentioned invention. SUMMARY OF THE INVENTION The object of the present invention is to provide a dynamic proxy for a mobile VPN, "Pat = Method and System, which can dynamically assign an external local agent that is close to the j mobile node in the roaming external network as the mobile node. Registration agent, when the mobile node roams in the same external network, (just need to register with the local agent, and no longer need to register with the internal network. _IETF The method can also be used to minimize the Handof f delay and End t〇 End delay during roaming, and fully integrate with the VPN I Psec security control.
第9頁 1300662 五、發明說明(6) 為達成上述目的,本發明主要提供一種移動式VPN之 動態代理器指派方法,可在至少一外部網路與一内部網路 間建立VPN,該方法首先當一移動節點第一次漫遊於該外 部網路中時,由一DHCP伺服器分配一 IP位址,作為該移動 節點之轉接位址向該外部本地代理器發出註冊請求,該外 部本地代理器則發出一授權確認請求訊息給一外地AAA伺 服器,使該外地AAA伺服器將至少一外部本地代理器之網 路接取標示填入該授權確認請求訊息中,再轉送給一本地 AAA伺服器;接著,該本地AAA伺服器成功認證MN後,建立 該外部本地代理器與該移動節點間之安全聯結,並產生一 本地代理器請求訊息,發送給該外部本地代理器;該外部 本地代理裔為該移動師點指派一外部本地位址,並將該外 部本地位址及本身的位址設定於一本地代理器回答訊息 中’發送給該本地AAA伺服器;然後,該本地aaa伺服器使 用該外部本地位址作為該移動節點的轉接位址,向該内部 本地代理器進行註冊’註冊完畢後,該内部本地代理器授 權該本地AAA伺服器發出一授權確認回答訊息給該外部本 地代理器;最後,該外部本地代理器從該授權確認回答訊 息中獲付包3該外部本地位址及該本地代理器位址之註 冊回覆訊息,轉送給該移動節點,此後該移動節點在該外 部網路漫遊時,即可利用該外部本地位址向該本地代理器 位址之本地代理器進行註冊即可。 本發明更提供一種移動式VPN之動態外部代理器指派 系統,係可在至少一外部網路與一内部網路間建立vpn,Page 9 1300662 V. Description of the Invention (6) In order to achieve the above object, the present invention mainly provides a dynamic proxy assignment method for a mobile VPN, which can establish a VPN between at least one external network and an internal network. When a mobile node roams in the external network for the first time, an IP address is assigned by a DHCP server, and a registration request is sent to the external local agent as a transit address of the mobile node, the external local agent The device sends an authorization confirmation request message to an external AAA server, so that the foreign AAA server fills the network access identifier of at least one external local agent into the authorization confirmation request message, and then forwards the message to a local AAA server. Then, after the local AAA server successfully authenticates the MN, establish a secure connection between the external local agent and the mobile node, and generate a local agent request message to be sent to the external local agent; the external local agent Assign an external local address to the mobile operator, and set the external local address and its own address to a local agent to answer the message. 'Send to the local AAA server; then, the local aaa server uses the external local address as the transfer address of the mobile node to register with the internal local agent' After the registration is completed, the internal local agent Authorizing the local AAA server to send an authorization confirmation response message to the external local agent; finally, the external local agent obtains the package 3 from the authorization confirmation response message and the external local address and the local agent address The registration reply message is forwarded to the mobile node, and then the mobile node can use the external local address to register with the local agent of the local agent address when the external network roams. The present invention further provides a dynamic external proxy assignment system for a mobile VPN, which can establish a VPN between at least one external network and an internal network.
1300662 五、發明說明(7) :安ί地,在該外部網路,該系統包 道器、至少—获理f、至父一外部本地代理器、一 VPN閘 内部本地代理L u指派器及至少一dhcp飼服器’其中該 路中的漫遊鼓:A)係作為管理該移動節點在該内部網 該移動節點在誃’:該外部本地代理器(χ-ΗΑ)係作為管理 建立一網際網網路中的漫遊註冊;該VPN間道器可 與該外部本地代Ϊ = 通道在該内部網路 中体—拉^ 益之間;該代理器指派器係用以動離指 胃:之漫遊Ϊ:移=節點之外部本地代理器來進行該移動節 次漫;器係用以讓該移動節點第- 代理写、兮丄/ 自動分配一1p位址向該外部本地 代里盗该AM伺服器及該内部本地代理器進行漫遊註 :二與該VPN閘道器間之1Ρ·通道後,使該移動節 點=在外部網路内皆僅需向最接近之該外部本地代;; 進仃咗冊即可。 叭埋态 【實施方式】 ^了使貴審查委員能更進一步瞭解本發明為 定目的所採取之技術、手段及功效,料閱以下有關= Ϊί_細,明與附圖,相信本發明之目的、特徵與特點二 當了由此得一深入且具體之瞭解,然而所附圖 考與:明用’並非用來對本發明加以限制者。故供參 一 f參閱第三圖所示,係為本發明移動式νρΝ之系統架 構不意圖。本發明主要是可動態指派一外部網路中最接近1300662 V. Invention Description (7): In the external network, the system tunnel, at least - the f, to the parent an external local agent, a VPN gate internal local agent Lu assigner and At least one dhcp feeding device 'where the roaming drum in the road: A) is used to manage the mobile node in the intranet of the mobile node at the 誃': the external local agent (χ-ΗΑ) is established as a management network Roaming registration in the network; the VPN intercommunicator can be used with the external local code = channel in the internal network; the agent assigner is used to move away from the stomach: Roaming: Move the node's external local agent to perform the mobile session; the device is used to allow the mobile node to write, 兮丄/automatically assign a 1p address to the external local pirate. The server and the internal local agent roaming note: after the channel between the two and the VPN gateway, the mobile node = the external network only needs to be closest to the external local generation; You can register. Buried state [Embodiment] ^ The technical, means and functions adopted by the review committee to further understand the present invention for the purpose, and the following related information = Ϊ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The features and characteristics of the present invention are to be understood as a matter of in-depth and specific understanding. Therefore, referring to the third figure, it is not intended to be a system architecture of the mobile type of the present invention. The invention is mainly capable of dynamically assigning an external network to be the closest
第11頁 1300662Page 11 1300662
:移動節點(MN)80的本地代理器(HA)作為一外部本地代理 = (x-HA)54,以便讓該〇 8〇向該χ-ΗΑ “進行註冊,完成 動式虛擬專用網路(Mobile vpN) IPsec通道的建立。 本發明可利用在外部網路領域内所使用的DHCp伺服 口 AAA(Authentication, Authorization and: The local agent (HA) of the mobile node (MN) 80 acts as an external local agent = (x-HA) 54, so that the 〇8〇 registers with the χ-ΗΑ to complete the dynamic virtual private network ( Mobile vpN) Establishment of IPsec channel. The present invention can utilize the DHCp servo port AAA (Authentication, Authorization and used in the field of external network).
Accounting)伺服器或DNS伺服器…等,都可以用來動態指 派,x-HA,以選擇在外部網路中最接近該M 8〇的本地代 理器(HA)指派成為該x-hA 54,且由於該x-hA 54最接近該 MN 80 ’因此該x-hA 54與該MN 80間的延遲能夠被降到最 低。而在該外部網路中子網(inter-subnet)間的端至端轉 接傳遞(Handof f )也將變的更為快速,另外亦可將在外部 網路中的另一本地代理器(HA)作為負載平衡之用。 雖然如此’但最重要的仍是該X_HA 54的安全機制問 題,因此較佳地可使用AAA伺服器來指派該X-HA 54,例如 我們可以採用Diameter基礎協定(Diameter Base on Protocol) (IETF RFC 3588 )作為該AAA伺服器,不僅能指 派該x-HA,更能夠在漫遊時移動變化的複數代理器 (Agents)之間,建立安全聯結(Security Association,Accounting) Server or DNS server...etc. can be used to dynamically assign, x-HA, to select the local agent (HA) closest to the M 8〇 in the external network to be assigned to the x-hA 54, And since the x-hA 54 is closest to the MN 80 ', the delay between the x-hA 54 and the MN 80 can be minimized. The end-to-end transfer (Handof f) between the inter-subnets in the external network will also become faster, and another local agent in the external network (or another local agent in the external network) HA) is used for load balancing. Nonetheless 'but the most important issue is the security mechanism of the X_HA 54, so it is better to use the AAA server to assign the X-HA. For example, we can use the Diameter Base on Protocol (IETF RFC). 3588) As the AAA server, not only can the x-HA be assigned, but also a security association can be established between mobile agents that move and change during roaming.
以下簡稱SA),並作為金鍮分發中心(Key Distribution Center, KDC) 〇 在第三圖中顯示有一内部網路(Intranet)40及至少一 外部網路(11^61'1161:)50,該内部網路40是一個受保護的私 人網路(Protected Private Network),連接設有一DHCP 伺服器41及一内部路由器(Interior Router)42,該内部Hereinafter referred to as SA), and as a Key Distribution Center (KDC), an internal network (Intranet) 40 and at least one external network (11^61'1161:) 50 are shown in the third figure. The internal network 40 is a protected private network, and has a DHCP server 41 and an internal router 42 connected to the internal network.
第12頁 1300662 、發明說明(9) 路由器42連接一非管制區(DMZ)60,該非管制區(DMZ)6()是 網=網路後面的實體區域,面對防火牆位於保護後端系統 和資料的第二層防火牆前面,而該非管制區(DMZ)6()又連 接有一本地AAA伺服器(以下簡稱AAAH)61、一 VPN閘道器62 及一外部路由器(Exterior Router )51,而該外部路由器 51則連接至該外部網路50(Internet)。 而在該内部網路40中又可能包含了複數的子網路 (Subnet)43,每一子網路43都連接至少一無線基地台 (Wireless Access Point, WAP)44,用以無線連接至少一 該MN 80。而在該内部網路4〇中更設有一丨一HA 45及一内部 外地代理器(Internal Foreign Agent,以下簡稱i—FA) 46,如圖三中顯示該i-HA 45是連接於第一子網路(Subnet 1)上’而該i-FA 46則連接於第二子網路(Subnet 2)上, 而該DHCP伺服器41則連接於第三子網路(Subne1: 3)上。 請一併參閱第四圖及第五圖,係為該MN 80在内部網 路40漫遊的註冊流程圖及時態示意圖。由於該DHCp伺服器 41的功能主要是用以動態分配網路内每一部電腦的丨p位 址,故而該DHCP伺服器41會不斷發出一廣播&查詢訊息 100 ’偵測網路上是否有新電腦連線(^2〇〇)。 因此當該MN 80漫遊至該内部網路4〇之其他子網路時 中漫遊時’如從第二子網路(Subnet 2)漫遊至第三子網路 (Subnet 3)時,此時該DHCP伺服器41會發現該MN 80,而 該MN 80會發出一ip位址的要求訊息1〇5給DHCP伺服41,而 該DHCP伺服器41即會分配一新的動態ip位址11〇給該關Page 12 1300662, invention description (9) The router 42 is connected to a non-regulated area (DMZ) 60, which is a physical area behind the network = network, facing the firewall in the protection back end system and The second layer of the data is in front of the firewall, and the non-regulated area (DMZ) 6 () is connected to a local AAA server (hereinafter referred to as AAAH) 61, a VPN gateway 62 and an external router 51. The external router 51 is connected to the external network 50 (Internet). In the internal network 40, a plurality of subnets 43 may be included, and each subnet 43 is connected to at least one wireless access point ( WAP) 44 for wirelessly connecting at least one. The MN 80. In the internal network, there is a HA 45 and an internal foreign agent (hereinafter referred to as i-FA) 46. As shown in FIG. 3, the i-HA 45 is connected to the first. The subnet (subnet 1) is connected to the second subnet (Subnet 2), and the DHCP server 41 is connected to the third subnet (Subne1: 3). Please refer to the fourth and fifth figures together for the registration flow chart of the MN 80 roaming on the internal network 40. Since the function of the DHCp server 41 is mainly for dynamically allocating the 丨p address of each computer in the network, the DHCP server 41 will continuously send a broadcast & Query message 100 to detect whether there is a network. New computer connection (^2〇〇). Therefore, when the MN 80 roams to other subnets of the internal network 4, when roaming from the second subnet 2 to the third subnet (Subnet 3), The DHCP server 41 will discover the MN 80, and the MN 80 will send an IP address request message 1〇5 to the DHCP server 41, and the DHCP server 41 will assign a new dynamic IP address to the DHCP server 41. The off
第13頁 1300662 五、發明說明(10) (S205) 〇 而該MN 80即可利用新的IP位址作為一轉接位址 (CoA),向該内部本地代理器(i_HA)45發出一註冊請求 (Registration Request,以下簡稱Reg-Req)訊息 115 (S210),由於該i-HA 45原本就認識該MN 80,故而會進行 0主冊’並會回覆該MN 80 —註冊回覆(Registration Reply ,以下簡稱Reg-Reply)訊息120(S215),以完成内部網路 的漫遊註冊程序。 請再參閱第三圖,該外部網路(Internet)50是一個不 受保遵的公眾網路(Unprotected Public Network),其中 可能包含有複數個外部網路所組成,如第三圖顯示有一第 一外部網路及一第二外部網路,而在每一外部網路中又可 能包含有複數個子網路,且可分別連接有一外地AAA伺服 器(Foreign AAA Server,以下簡稱AAAF)53、一x-HA 54 、一外部外地代理器(External Foreign Agent,以下簡 稱x-FA) 55、一DHCP伺服器56及至少一無線基地台(WAP) 57 〇 請一併參閱第六圖及第七圖A、B所示,係為該MN 80 在外部網路50漫遊的註冊流程圖及時態示意圖。當該MN 8 0從該内部網路4 0漫遊至該外部網路5 〇時,同樣地,當地 該DHCP伺服器56自動分配一動態ip位址給該題8〇 (S4〇〇) ,該MN 80利用該IP位址作為一轉接位址(c〇A)3〇〇,並向 該X-HA 54 發出一Reg-Req 訊息305 (S405 )。 而在該Reg-Req 息305中應包含有一本地位址(HomePage 13 1300662 V. Description of Invention (10) (S205) The MN 80 can then use the new IP address as a transit address (CoA) to issue a registration to the internal local agent (i_HA) 45. Request (Registration Request, hereinafter referred to as Reg-Req) message 115 (S210), since the i-HA 45 originally knew the MN 80, it will perform the 0 main volume 'and will reply to the MN 80 - Registration Reply (Registration Reply, Hereinafter referred to as Reg-Reply message 120 (S215), to complete the roaming registration process of the internal network. Please refer to the third figure. The external network (Internet) 50 is an unprotected public network (Unprotected Public Network), which may include a plurality of external networks, as shown in the third figure. An external network and a second external network, and each external network may include a plurality of sub-networks, and may be respectively connected with a foreign AAA server (AAAF) 53, a x-HA 54 , an external foreign agent (x-FA) 55, a DHCP server 56 and at least one wireless base station (WAP) 57 Please refer to the sixth and seventh diagrams together. A and B are schematic diagrams of the registration flow chart of the MN 80 roaming on the external network 50. When the MN 80 roams from the internal network 40 to the external network 5, similarly, the local DHCP server 56 automatically allocates a dynamic ip address to the question 8 (S4〇〇), which The MN 80 uses the IP address as a transit address (c〇A) 3〇〇 and sends a Reg-Req message 305 to the X-HA 54 (S405). And the Reg-Req information 305 should contain a status address (Home
第14頁 1300662 五、發明說明(11)Page 14 1300662 V. Description of invention (11)
Address,以下簡稱HoA)、一HA位址、一需被該AAAH 61授 權的認證資訊以及一MN的網路接取標示(Network Access Identifier, ΝΑΙ)…等等的請求。 且在該χ-ΗΑ 54所收到的該Reg-Req訊息305中,該HoA 與該HA位址皆應被設為〇·〇·〇·〇,表示該關80是想要在該 外部網路中獲得一外部本地位址(E X t e r n a 1 Η 〇 m e Address,以下簡稱χ-HoA),因此該x-HA 54會產生一個特 徵向量(MIP-Feature-Vector)屬性值對(Attribute ValueAddress, hereinafter referred to as HoA), a HA address, a authentication information to be authorized by the AAAH 61, and a request for a MN's Network Access Identifier (ΝΑΙ), etc. And in the Reg-Req message 305 received by the χ-ΗΑ 54, the HoA and the HA address should be set to 〇·〇·〇·〇, indicating that the gateway 80 is intended to be on the external network. An external location address (EX terna 1 Η 〇me Address, hereinafter referred to as χ-HoA) is obtained in the road, so the x-HA 54 generates a MIP-Feature-Vector attribute value pair (Attribute Value
Pair,以下簡稱AVP),其中設定有MN 80的本地位址請求 (以下稱Home-Address-Requested),以及本地代理器請求 (以下稱Home-A gent-Requested和一公同位址請求(以下稱Pair, hereinafter referred to as AVP), which sets the MN 80's local address request (hereinafter referred to as Home-Address-Requested), and the local proxy request (hereinafter referred to as Home-A gent-Requested and a public address request (hereinafter referred to as
Co - Located - Mobile - Node-Re quested)旗標(Flag)為"1" 〇 此時該χ-ΗΑ 45 會將該MIP-Feature-Vector AVP 設定 於一授權確認請求(AA-Mobile-Node-Request,以下簡稱 AMR)訊息31 0中,從Reg-Req訊息中取得必要的資訊加到相 關的AVP中,並將該AMR訊息310發送至當地的該AAAF 53 (S410)。 該AAAF 53 會先檢查在該MIP-Feature-Vector AVP 中 的Home-Agent-Requested旗標位元(Flag bit)是否 為丨丨1丨丨。 若為” Γ時,該AAAF 53會要求該AAAH 61允許指派在 漫遊之外部網路中的一個x-HA 54作為該MN 80的本地代理 器(HA),因此該AAAF 53會在所收到之AMR訊息310中該 MIP-Feature - Vector AVP内設定一外地的本地代理器可用Co - Located - Mobile - Node-Re quested) Flag is "1" 〇 At this time, the IP-ΗΑ 45 will set the MIP-Feature-Vector AVP to an authorization confirmation request (AA-Mobile-Node) In the -Request, hereinafter referred to as AMR message 31, the necessary information is obtained from the Reg-Req message and added to the associated AVP, and the AMR message 310 is sent to the local AAAF 53 (S410). The AAAF 53 first checks if the Home-Agent-Requested Flag bit in the MIP-Feature-Vector AVP is 丨丨1丨丨. If ”, the AAAF 53 will require the AAAH 61 to allow an x-HA 54 in the roaming external network to be assigned as the local agent (HA) of the MN 80, so the AAAF 53 will receive In the AMR message 310, the MIP-Feature - Vector AVP is set to a local agent available in the field.
第15頁 1300662 五、發明說明(12) (以下稱 Foreign-Home-Agent-Available)旗標,並且在一 候選本地代理器主機(以下稱MIP-Candidate-Home-Agent-ost)AVP中填入至少一候選x-HA 54的網路接取標示 (ΝΑΙ),然後該AAAF 53再把該AMR訊息310傳送至該AAAH 61(S415) 〇 當該AAAH 61接收到該AAAF 53所傳來之AMR訊息310 後,必需進行授權該MN 80的Reg-Req訊息30 5,因此該 AAAH 61可透過該AMR訊息310中所設定之一授權工作指標Page 15 1300662 V. Invention Description (12) (hereinafter referred to as the "Foreign-Home-Agent-Available") flag, and filled in a candidate local agent host (hereinafter referred to as MIP-Candidate-Home-Agent-ost) AVP At least one candidate x-HA 54 is received by the network (标示), and then the AAAF 53 transmits the AMR message 310 to the AAAH 61 (S415). When the AAAH 61 receives the AMR from the AAAF 53 After the message 310, it is necessary to authorize the Reg-Req message 30 5 of the MN 80, so the AAAH 61 can authorize the working indicator through one of the settings set in the AMR message 310.
(MN-AAA-SPI,Security Paremeters Index)來確定該MN 8 0是使用那一種的安全性策略,如加密演算法和長期分享 金鍮。 如果該AAAH 61授權成功則會檢查該AMR訊息310之 MIP-Feature-Vector AVP 中的該Home-Agent-Requested 的 旗標位元以及該Foreign-Home-Agent-Avai 1 able的旗標位 元是否皆等於為π 1π ,若是,則表示ΜΝ要求動態指派一 x-HA 54在所漫遊的外部網路區域中,而該AAAH 61亦會在 漫遊之外部網路區域中建立該X-HA 54與〇之間的安全聯 結(SA)(S420 )。 為此該AAAH 61會產生一個至少128位元亂數的金鑰元 件(Key Materials),一般統稱為Nonces,利用該Nonces 可計算產生一通信金鑰(Session Key),以確該安全聯結 (SA)的安全性。 而在該x-HA 54及該AAAF 53所發送之該AMR訊息310中 的MIP-Feature-Vector AVP亦包含有MN 80與本地代理器(MN-AAA-SPI, Security Paremeters Index) to determine which MN 80 is used for security policies, such as encryption algorithms and long-term sharing. If the AAAH 61 authorization is successful, the flag of the Home-Agent-Requested flag in the MIP-Feature-Vector AVP of the AMR message 310 and the flag bit of the Foreign-Home-Agent-Avai 1 able are checked. Both are equal to π 1π , and if so, it means that an x-HA 54 is dynamically assigned in the roamed external network area, and the AAAH 61 also establishes the X-HA 54 in the roaming external network area. Safety Connection (SA) between 〇 (S420). To this end, the AAAH 61 will generate a Key Materials of at least 128-bit random numbers, generally referred to as Nonces, and the Nonces can be used to generate a Communication Key to confirm the secure connection (SA). ) security. The MIP-Feature-Vector AVP in the AMR message 310 sent by the x-HA 54 and the AAAF 53 also includes the MN 80 and the local agent.
第16頁 1300662 五、發明說明(13) (HA)間的金鑰請求(Key-Requested)。而該通信金錄 (Session Key)可透過以Diameter 協定(Diameter Protocol)的AAA伺月艮器被安全地傳輸到x-ha 54上。 這是因為IPsec標準或是運輸層安全(TransportPage 16 1300662 V. Invention Description (13) Key-Requested between (HA). The Session Key can be securely transmitted to the x-ha 54 via the DIA server of the Diameter Protocol. This is because IPsec standard or transport layer security (Transport)
Layer Security,TLS)標準(IETF RFC 2246 )即是強制應 用在保護Diameter節點(包括伺服器、客端與代理器)之間 的通訊數據。但該通信金鑰(Session Key)並不會直接傳 遞到MN 80上’因為如此將會使該通信金鍮(Session Key) 暴露在沒有保護網路協定中,而只給該MN 80該金鑰元件 (Nonces) 〇 因此該AAAH 61會再產生一本地代理器請求(Home-Agent-MIP-Request,以下簡稱HAR)訊息315,把通信金鑰 (Session Key) 及Reg-Req訊息封裝在HAR訊息315之該相 關的AVP中,透過該AAAF 53傳送給該候選的χ-ΗΑ 54 (S425 ),該AAAF 53主要是扮演代理伺服器(pr0Xy)的角 色。因此該χ-ΗΑ 54能夠從該HAR訊息315中之相關AVP中取 得該X-HA 54與MN 80的金鍮元件(Nonces)。 而該χ-ΗΑ 54在所接收到的HAR訊息315中如果沒有包 含該MN80的位址(以下稱MIP-Mobile-Node-Address) AVP,且在該MIP-Feature-Vector AVP 中的Home-Agent-Address-Requested的旗標位元是被設為π 1”時,則該x-HA 54將自動為該MN 80指派一χ-HoA設定在該MIP-Mobile-Node-Address AVP中,並且該χ-ΗΑ 54會自動將它本身的 位址設定到該MIP-Home -Agent-Address AVP 中。The Layer Security (TLS) standard (IETF RFC 2246) is mandatory for the protection of communication data between Diameter nodes (including servers, clients and agents). However, the session key is not directly passed to the MN 80. 'Because this will expose the session key to the unprotected network protocol, only the MN 80 will be given the key. Therefore, the AAAH 61 will generate a Home-Agent-MIP-Request (HAR) message 315 to encapsulate the Session Key and Reg-Req messages in the HAR message. The associated AVP of 315 is transmitted through the AAAF 53 to the candidate χ-ΗΑ 54 (S425), which primarily acts as a proxy server (pr0Xy). Therefore, the χ-ΗΑ 54 can obtain the X-HA 54 and the MN 80's Golden Element (Nonces) from the associated AVP in the HAR message 315. And the χ-ΗΑ 54 does not include the address of the MN80 (hereinafter referred to as MIP-Mobile-Node-Address) AVP in the received HAR message 315, and the Home-Agent in the MIP-Feature-Vector AVP When the flag bit of -Address-Requested is set to π 1", the x-HA 54 will automatically assign a χ-HoA to the MN 80 in the MIP-Mobile-Node-Address AVP, and the χ-ΗΑ 54 will automatically set its own address to the MIP-Home -Agent-Address AVP.
第17頁 1300662 五、發明說明(14) 接著,該x-HA 54會將該MN 80與該X-HA 54間的該通 信金鑰(Session Key)儲存起來,並將該金鑰元件 (Nonces)複製到一註用回覆(Reg-Repiy)上,然後該χ-ΗΑ 54產生一本地代理器回答(Home-Agent-MIP-Answer,以下 簡稱HAA)訊息320透過該AAAF 53再傳送至該AAAH 61 (S430) ’而該HAA訊息320中至少包括了一包含有該金錄元 件(Nonces)的註冊回覆(以下稱MIP-Reg-Reply)AVP、一結 果碼(1^31111:-(:〇(16)人¥?、一包含有該》〇80乂-11(^的肘1?-Mobile-Node-address AVP,以及一包含該 x-HA 54 位址的 MIP-Home-Agent-Address AVP 〇 該AAAH 61在接收到該χ-ΗΑ 54透過該AAAF 53所送出 之該 HAA 訊息 320 後,該AAAH 61 會從該 MIP-Mobile-Node-Address AVP 中 獲得該MN 80 的 X- HoA , 以及從 MIP-Home-Agent-Address AVP 中獲得該χ-ΗΑ 54 的位址。 然後該AAAH 61會建立一新的HAR訊息325,並將該X-HoA 及x-HA 位址分別填入MIP-Mobi le-Node-Address 及 MIP-Home-Agent-Address AVP,接著該AAAH 61 發送該HAR 訊息325向該i-HA 45進行註冊(S435)。 當該i-HA 45接收到該HAR訊息325後,該i-HA 45從該 HAR訊息325中的AVP獲得該X-HoA後,會將所獲得x-HoA 54 的位址註冊為該MN 80的公共CoA,使該i-HA 45認識該HAR 訊息325後建立出一新的HAA訊息33 0傳送至該AAAH 61 (S440)。 然後,該AAAH 61在接收該i-HA 45所發出的該HAA訊Page 17 1300662 V. Description of Invention (14) Next, the x-HA 54 stores the communication key between the MN 80 and the X-HA 54 and the key element (Nonces) Copying to a Reg-Repiy, the --ΗΑ 54 generates a Home-Agent-MIP-Answer (HAA) message 320 through which the AAAF 53 is transmitted to the AAAH. 61 (S430) 'The HAA message 320 includes at least one registration reply (hereinafter referred to as MIP-Reg-Reply) AVP including a nucleus component (Nonces), and a result code (1^31111:-(:〇 (16) Person ¥?, an elbow 1?-Mobile-Node-address AVP containing the 〇80乂-11 (^), and a MIP-Home-Agent-Address AVP containing the x-HA 54 address After receiving the HAA message 320 sent by the AAAF 53 by the AAAH 61, the AAAH 61 obtains the X-HoA of the MN 80 from the MIP-Mobile-Node-Address AVP, and The address of the χ-ΗΑ 54 is obtained from the MIP-Home-Agent-Address AVP. Then the AAAH 61 will create a new HAR message 325 and fill the X-HoA and x-HA addresses into the MIP respectively. - Mobi le-Node-Address and MIP-Home-Agent-Address AVP, then the AAAH 61 sends the HAR message 325 to register with the i-HA 45 (S435). When the i-HA 45 receives the HAR message 325 After the i-HA 45 obtains the X-HoA from the AVP in the HAR message 325, the address of the obtained x-HoA 54 is registered as the public CoA of the MN 80, so that the i-HA 45 recognizes the After the HAR message 325, a new HAA message 33 0 is established and transmitted to the AAAH 61 (S440). Then, the AAAH 61 receives the HAA message sent by the i-HA 45.
第18頁 1300662 五、發明說明(15) 息330後,可由其中之該結果碼(Result - Code)AVP顯示出 已授權成功。因此該AAAH 61會建立一授權確認回答(AA-Mobile-Node-Answer,以下簡稱ΑΜΑ)訊息 335 透過該AAAF 53傳送至該χ-ΗΑ 54 (S445),而在該ΑΜΑ訊息335中包括一 DIAMETER 成功的結果碼(Result-Code)、該 MIP-Home-Agent-Address AVP 、該MIP-Mobile-Node—Address AVP 以 及該MIP-Reg-Reply AVP,而該些AVP可從所接收到的該 HAA訊息330中被複製出來。 當該X-HA 54接收到由該AAAH 61所傳來之該ΑΜΑ訊息 335後,可從該結果碼(Result-Code)AVP中顯示出已授權 成功,則該χ-ΗΑ 54會從該ΑΜΑ訊息335之MIP-Reg-Reply AVP中獲得一 Reg-Reply訊息340,並將該Reg - Reply訊息 340轉送至該MN 80(S450 )。否則該χ-ΗΑ 54會悄悄地將該 ΑΜΑ訊息335丟掉。 一旦該ΜΝ 80接收到該Reg_Reply訊息340,則該ΜΝ 80 即可取得該新的X-HoA、該χ-ΗΑ位址以及該金鑰元件 (Ν ο n c e s ),然後該Μ N 8 0使用所接收到的金鑰元件 (Nonces)和相同於該AAAH 61的散列算法及長期分享金鑰 (Longterm Shared Key)計算出正確的通信金鑰(Sessi〇n Key) 〇 因此,當該MN 80經過該AAAH 61授權,以及經過該 X - HA 54及i-HA 45以Mobile IPv4安全標準註冊後,即可 使用該x_HoA與該VPN閘道器連結’使該MN 80與該vpn間道 器之間建立IPsec通道345 (S455),恢復像在内^網路一Page 18 1300662 V. Invention Description (15) After the interest 330, the Result-Code AVP can be used to indicate that the authorization is successful. Therefore, the AAAH 61 will establish an AA-Mobile-Node-Answer (hereinafter referred to as ΑΜΑ) message 335 to be transmitted to the χ-ΗΑ 54 through the AAAF 53 (S445), and include a DIAMETER in the ΑΜΑ message 335. Successful result code (Result-Code), the MIP-Home-Agent-Address AVP, the MIP-Mobile-Node-Address AVP, and the MIP-Reg-Reply AVP, and the AVPs can receive the HAA from the received The message 330 is copied. After the X-HA 54 receives the ΑΜΑ message 335 sent by the AAAH 61, it can display the authorized success from the Result-Code AVP, then the χ-ΗΑ 54 will be from the ΑΜΑ A Reg-Reply message 340 is obtained in the MIP-Reg-Reply AVP of message 335, and the Reg-Reply message 340 is forwarded to the MN 80 (S450). Otherwise, the χ-ΗΑ 54 will silently discard the ΑΜΑ message 335. Once the ΜΝ 80 receives the Reg_Reply message 340, the ΜΝ 80 can obtain the new X-HoA, the χ-ΗΑ address, and the key element (Ν ο nces ), and then the Μ N 8 0 The received key element (Nonces) and the same hash algorithm and long term shared key as the AAAH 61 calculate the correct communication key (Sessi〇n Key). Therefore, when the MN 80 passes The AAAH 61 is authorized, and after the X-HA 54 and i-HA 45 are registered with the Mobile IPv4 security standard, the x_HoA can be used to connect with the VPN gateway to make the MN 80 and the vpn inter-channel device Establish IPsec channel 345 (S455), restore image like
第19頁 1300662 五、發明說明(16) 樣的安全通訊。 而在完成該X - Η A 5 4的指派後,在該漫遊之外部網路 内各個當地的本地代理器(HA)間的安全聯結(SA)亦將被建 立完成。此後,該MN 80即可直接使用MIPv4標準與該當地 之x-HA 54進行註冊通訊,而不需要再透過該aaa伺服器, 意即,當該MN 80在該外部網路内獲得一個新的轉接位址 (Co A)後,即可如同在内部網路内漫遊般,只需要向被指 派的x-HA 54註冊即可,而不必再向該i-HA 45進行註冊。 而且在相同的該外部網路内並不需再重建IPsec通 道’不過該通信金鍮(Session Key)是有壽命的,如果壽 命終止’則仍需透過該Diameter基礎的AAA伺服器產生一 新通信金鑰(Session Key),另外若該MN 80再移動至另外 一個外部網路時,又必須向當地的一個新的x-HA請求註冊 時,則上述的整個過程將再次被執行,讓該χ — ΗΑ再次被指 派,而IP s e c通道亦將再被重建。 職是,本發明確能藉上述所揭露之技術,提供一種使 用動態指派X-HA替換靜止X-HA的技術,因而漫遊時的本地 代理器(HA)間傳遞轉接(Handoff)延遲以及端至端(End to End)的延遲都將被顯者的降低’而且本發明是以Diameter ΜIP v 4應用在轉接的本地代理器(jj a )之間建立的安全聯結 (SA) ’因此該χ-ΗΑ是可以被相任的,且對該乂―HA及該i-HA 的註冊動作是同時被完成的。故而本發明實現了一個移動 式VPN的系統平台,迥然不同於習知者的設計,堪能提高 整體之使用價值,又其申請前未見於刊物或公開使用,誠Page 19 1300662 V. Invention Description (16) Safe communication. After the assignment of the X-Η A 5 4 is completed, a secure connection (SA) between the local local agents (HAs) in the roaming external network will also be established. Thereafter, the MN 80 can directly register with the local x-HA 54 using the MIPv4 standard without having to pass through the aaa server, that is, when the MN 80 obtains a new one in the external network. After the transfer address (Co A), it is as simple as roaming within the internal network, and only need to register with the assigned x-HA 54 without having to register with the i-HA 45. Moreover, there is no need to re-establish the IPsec channel in the same external network. However, the Session Key has a longevity. If the lifetime is terminated, a new communication needs to be generated through the Diameter-based AAA server. Key (Session Key), if the MN 80 moves to another external network and must request registration from a new local x-HA, the above process will be executed again, let the χ — ΗΑ is assigned again and the IP sec channel will be re-established. However, the present invention can provide a technique for replacing a stationary X-HA using a dynamic assignment X-HA by the above-disclosed technology, and thus the local agent (HA) transfer delay (Handoff) delay and the end when roaming. The delay to End to End will be significantly reduced' and the invention is a secure connection (SA) established between the transited local agents (jj a ) by Diameter Μ IP v 4 'so this χ-ΗΑ can be used, and the registration action for the 乂-HA and the i-HA is completed at the same time. Therefore, the present invention realizes a mobile VPN system platform, which is different from the design of the prior person, can improve the overall use value, and is not seen in the publication or public use before the application, sincerely
第20頁 1300662 五、發明說明(17) 已符合發明專利之要件,爰依法提出發明專利申請。 惟,上述所揭露之圖式、說明,僅為本發明之實施例 而已,凡精于此項技藝者當可依據上述之說明作其他種種 之改良,而這些改變仍屬於本發明之發明精神及以下所界 定之專利範圍中。Page 20 1300662 V. INSTRUCTIONS (17) The requirements of the invention patent have been met, and the invention patent application has been filed according to law. However, the drawings and descriptions disclosed above are only examples of the present invention, and those skilled in the art can make various other modifications according to the above description, and these changes still belong to the inventive spirit of the present invention. The scope of the patents defined below.
第21頁 1300662 圖式簡單說明 【圖示簡單說明】 第一圖係為係為IETF所定義的移動式VPN標準架構示 意圖, 第二圖係為該移動式VPN的所建立通道的訊息結構示 意圖; 第三圖係為本發明移動式VPN之系統架構示意圖; 第四圖係為該MN在内部網路漫遊的註冊流程圖; 第五圖係為該MN在内部網路漫遊的時態示意圖; 第六圖係為該MN在外部網路漫遊的註冊流程圖;及 第七圖A、B係為該MN在外部網路漫遊的時態示意圖。 【主要元件符號說明】 1 移動節點(Μ N ) 11 内部本地代理器(i-HA) 10 内部網路 20 外部網路 21 外部本地代理器(x-HA) 22 VPN閘道器 30 通道訊號數據封包 31 原始數據封包 32 内部移動I P通道訊息 33 IPsec通道訊息 34 外部移動IP通道訊息 80 移動節點(MN)Page 21 1300662 Brief description of the diagram [Simple description of the diagram] The first diagram is a schematic diagram of the mobile VPN standard architecture defined by the IETF, and the second diagram is a schematic diagram of the message structure of the established channel of the mobile VPN; The third diagram is a schematic diagram of the system architecture of the mobile VPN of the present invention; the fourth diagram is a registration flow chart of the MN roaming on the internal network; the fifth diagram is a schematic diagram of the tense of the MN roaming on the internal network; The six diagrams are the registration flowchart of the MN roaming on the external network; and the seventh diagrams A and B are the state diagrams of the MN roaming on the external network. [Main component symbol description] 1 Mobile node (Μ N ) 11 Internal local agent (i-HA) 10 Internal network 20 External network 21 External local agent (x-HA) 22 VPN gateway 30 Channel signal data Packet 31 Raw Data Packet 32 Internal Mobile IP Channel Message 33 IPsec Channel Message 34 External Mobile IP Channel Message 80 Mobile Node (MN)
第22頁 1300662 圖式簡單說明Page 22 1300662 Simple illustration
第23頁 54 外 部 本 地 代理器(X-HA) 40 内 部 網 路 41 DHCP 伺 服 器 42 内 部 路 由 器 43 子 網 路 44 無 線 基 地 台 45 内 部 本 地 代理器(i-HA) 46 内 部 外 地 代理器(i-FA) 50 外部 網 路 51 外 部 路 由 器 53 外 地AAA伺服器(AAAF) 54 外 部 本 地 代理器(x-HA) 55 外 部 外 地 代理器(x-FA) 56 DHCP 伺 服 器 57 無 線 基 地 台 60 非 管 制 區 61 本 地AAA伺服器(AAAH) 62 VPN閘道器Page 23 54 External Local Agent (X-HA) 40 Internal Network 41 DHCP Server 42 Internal Router 43 Subnet 44 Wireless Base Station 45 Internal Local Agent (i-HA) 46 Internal Foreign Agent (i- FA) 50 External network 51 External router 53 Foreign AAA server (AAAF) 54 External local agent (x-HA) 55 External foreign agent (x-FA) 56 DHCP server 57 Wireless base station 60 Non-regulated area 61 Local AAA Server (AAAH) 62 VPN Gateway
Claims (1)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW093123263A TW200607293A (en) | 2004-08-03 | 2004-08-03 | Method and system for dynamically assigning agent of mobile VPN |
| JP2005110465A JP4510682B2 (en) | 2004-08-03 | 2005-04-07 | Method and apparatus for dynamically assigning mobile VPN agents |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW093123263A TW200607293A (en) | 2004-08-03 | 2004-08-03 | Method and system for dynamically assigning agent of mobile VPN |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TW200607293A TW200607293A (en) | 2006-02-16 |
| TWI300662B true TWI300662B (en) | 2008-09-01 |
Family
ID=36539071
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW093123263A TW200607293A (en) | 2004-08-03 | 2004-08-03 | Method and system for dynamically assigning agent of mobile VPN |
Country Status (2)
| Country | Link |
|---|---|
| JP (1) | JP4510682B2 (en) |
| TW (1) | TW200607293A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI395446B (en) * | 2009-09-09 | 2013-05-01 | Univ Nat Chiao Tung | Cross-layer address mapping method for proxy mobile internet protocal |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100667502B1 (en) * | 2005-03-28 | 2007-01-10 | 주식회사 케이티프리텔 | Virtual private network connection method of mobile node using mobile IP |
| KR100763522B1 (en) | 2006-11-15 | 2007-10-04 | 한국전자통신연구원 | Internet Protocol Handoff Processing Method in Network System |
| KR100862192B1 (en) | 2006-12-11 | 2008-10-09 | 한국전자통신연구원 | Mobile network system and method for processing IP handoff thereof |
| US8559321B2 (en) | 2007-06-08 | 2013-10-15 | Qualcomm Incorporated | Mobile IP home agent discovery |
| CN101779482B (en) | 2007-08-13 | 2014-01-22 | 苹果公司 | New diameter signaling for mobile ipv4 |
| CN101527740B (en) * | 2009-05-05 | 2011-08-03 | 杭州华三通信技术有限公司 | Dynamic address allocation method, device and system thereof |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4201466B2 (en) * | 2000-07-26 | 2008-12-24 | 富士通株式会社 | VPN system and VPN setting method in mobile IP network |
| JP4270888B2 (en) * | 2003-01-14 | 2009-06-03 | パナソニック株式会社 | Service and address management method in WLAN interconnection |
-
2004
- 2004-08-03 TW TW093123263A patent/TW200607293A/en not_active IP Right Cessation
-
2005
- 2005-04-07 JP JP2005110465A patent/JP4510682B2/en not_active Expired - Fee Related
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI395446B (en) * | 2009-09-09 | 2013-05-01 | Univ Nat Chiao Tung | Cross-layer address mapping method for proxy mobile internet protocal |
Also Published As
| Publication number | Publication date |
|---|---|
| TW200607293A (en) | 2006-02-16 |
| JP4510682B2 (en) | 2010-07-28 |
| JP2006121647A (en) | 2006-05-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7486951B2 (en) | Apparatus of dynamically assigning external home agent for mobile virtual private networks and method for the same | |
| EP1657877B1 (en) | Methods and apparatus for using VPN gateway acting as Mobile IP Foreign Agent FA for mobile node | |
| EP2245799B1 (en) | Route optimization in mobile ip networks | |
| US7873825B2 (en) | Identification method and apparatus for establishing host identity protocol (HIP) connections between legacy and HIP nodes | |
| JP4755203B2 (en) | Method and apparatus for host identity protocol | |
| EP1782574B1 (en) | Fast network attachment | |
| US20090193253A1 (en) | Method and server for providing a mobile key | |
| JP2009516435A (en) | Secure route optimization for mobile networks using multi-key encryption generated addresses | |
| WO2003015360A2 (en) | System and method for secure network roaming | |
| US7477626B2 (en) | Apparatus of dynamically assigning external home agent for mobile virtual private networks and method for the same | |
| EP1466458B1 (en) | Method and system for ensuring secure forwarding of messages | |
| KR100988186B1 (en) | Dynamic Home Address Allocation Method and Device by Home Agent in Multi-Network Interworking | |
| JP2009528735A (en) | Route optimization to support location privacy | |
| TWI300662B (en) | ||
| CN101110672A (en) | Method and system for establishing ESP security association in communication system | |
| CN102638782A (en) | Method and system for distributing home agent | |
| Laurent-Maknavicius et al. | Inter-domain security for mobile Ipv6 | |
| TWI254546B (en) | Assignment method and system of home agent in mobile VPN | |
| EP2471247B1 (en) | Method and network nodes for generating cryptographically generated addresses in mobile IP networks | |
| CN100496011C (en) | Dynamic agent distribution method and system for mobile VPN | |
| CN100496010C (en) | Dynamic agent distribution method and system for mobile VPN | |
| EP1638287B1 (en) | Apparatus of dynamically assigning external home agent for mobile virtual private networks and method for same | |
| EP1638285B9 (en) | Apparatus of dynamically assigning external home agent for mobile virtual private networks and method for the same | |
| CN101383756A (en) | Routing optimization method, system and proxy mobile IP client | |
| Pulkkis et al. | Mobile virtual private networking |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| MM4A | Annulment or lapse of patent due to non-payment of fees |