A method for network security management using an Internet key exchange
mechanism. A user database is established at a server comprising a
plurality of first usernames and a plurality of corresponding first
passwords. A second username and corresponding password are embedded into
a shared key. A client key value is derived according to the shared key
and Internet key exchange mechanism. The first user-names and
corresponding first passwords are calculated and obtained for generating
a plurality of user key values. The client key value is added into a
first message and transferring the first message to the server. The
client key value is compared with the user key values, and, when the
client key value matches one user key value, the second username and
corresponding password are calculated to generate a server key value