Browse Prior Art Database

EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK) (RFC6630)

IP.com Disclosure Number: IPCOM000218327D
Publication Date: 2012-Jun-02
Document File: 40 page(s) / 41K

Publishing Venue

The IP.com Prior Art Database

Related People

Z. Cao: AUTHOR [+5]

Abstract

The Extensible Authentication Protocol (EAP) [RFC3748] is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable not to repeat the entire EAP exchange with another authenticator. The EAP Re-authentication Protocol (ERP) [RFC5296] specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the EAP re-authentication peer and an EAP re-authentication server through any authenticator. The re-authentication server may be in the home network or in the local network to which the mobile host (i.e., the EAP re-authentication peer) is connecting.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 6% of the total text.

Internet Engineering Task Force (IETF)                            Z. Cao Request for Comments: 6630                                       H. Deng Category: Standards Track                                   China Mobile ISSN: 2070-1721                                                    Q. Wu                                                                   Huawei                                                             G. Zorn, Ed.                                                              Network Zen                                                                June 2012

                EAP Re-authentication Protocol Extensions             for Authenticated Anticipatory Keying (ERP/AAK)

Abstract

   The Extensible Authentication Protocol (EAP) is a generic framework    supporting multiple types of authentication methods.

   The EAP Re-authentication Protocol (ERP) specifies extensions to EAP    and the EAP keying hierarchy to support an EAP method-independent    protocol for efficient re-authentication between the peer and an EAP    re-authentication server through any authenticator.

   Authenticated Anticipatory Keying (AAK) is a method by which    cryptographic keying material may be established upon one or more    Candidate Attachment Points (CAPs) prior to handover.  AAK uses the    AAA infrastructure for key transport.

   This document specifies the extensions necessary to enable AAK    support in ERP.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc6630.

Cao, et al.                  Standards Track                    [Page 1]
 RFC 6630                         ERP/AAK                       June 2012

 Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://tr...