发明名称 MECHANISM FOR CO-ORDINATED AUTHENTICATION KEY TRANSITION FOR IS-IS PROTOCOL
摘要 An automated key transition method is executed by a node in a network. The network includes a set of nodes utilizing a current key identifier. A key identifier specifies an authentication protocol and an authentication key for use in the authentication of intermediate-system to intermediate-system (IS-IS) protocol data units. The method includes a set of steps including receiving a message at the node, where, the message includes a most recent key identifier to replace the current key identifier, verifying whether all reachable nodes in the set of nodes have advertised the most recent key identifier, continuing authentication using the current key identifier until all reachable nodes in the set of nodes have been verified to advertise the most recent key identifier, and switching authentication at the node to use the most recent key identifier upon verification that all reachable nodes in the set of nodes have advertised the most recent key identifier.
申请公布号 US2015172256(A1) 申请公布日期 2015.06.18
申请号 US201514626829 申请日期 2015.02.19
申请人 Telefonaktiebolaget L M Ericsson (publ) 发明人 Chunduri Uma S.;Lu Wenhu;Lindem, III Alfred C.
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. An automated key transition method executed by a node in a network, the network including a set of nodes that are interconnected and utilizing a current key identifier, a key identifier specifies an authentication protocol and an authentication key for use in the authentication of intermediate-system to intermediate-system (IS-IS) protocol data units within an IS-IS network, area or domain, the method including a set of steps comprising: receiving a message at the node, the message having a most recent key field to hold a most recent key identifier, the message indicating to replace the current key identifier with the most recent key identifier; verifying whether all reachable nodes in the set of nodes have advertised the most recent key identifier; continuing authentication using the current key identifier until all reachable nodes in the set of nodes have been verified to advertise the most recent key identifier; and switching authentication at the node to use the most recent key identifier upon verification that all reachable nodes in the set of nodes have advertised the most recent key identifier.
地址 Stockholm SE