×

Interposer with security assistant key escrow

  • US 10,178,181 B2
  • Filed: 07/10/2014
  • Issued: 01/08/2019
  • Est. Priority Date: 04/02/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • at a network device, receiving a set of session initiation messages from a client device, the set of session initiation messages comprising an address for a server to initiate a handshake for a secure session between the client device and the server;

    forwarding the set of session initiation messages to the server at the server address;

    forwarding the set of session initiation messages to a security assistant device, the security assistant device physically located in a secure location apart from the network device;

    receiving a first session authorization, wherein the first session authorization is based on a first key stored on the server;

    determining whether the network device will act as an active interposer or as a transparent interposer;

    responsive to a determination that the network device will act as an active interposer, receiving a second session authorization from the security assistant device and transmitting the second session authorization to the client device, wherein the second session authorization is based on a second key stored on the security assistant device;

    responsive to a determination that the network device will act as a transparent interposer, transmitting to the client device the first session authorization;

    sending a portion of the handshake for the secure session to be processed by the security assistant device using the first key or the second key;

    receiving from the security assistant device, the portion of the handshake that has been processed by the first key or the second keys;

    receiving a plurality of secure messages from the secure session between the client device and the server;

    unwrapping the plurality of secure messages with the second session authorization received from the security assistant device to generate a plurality of unwrapped messages; and

    processing the unwrapped messages according to a network application based on contents of the unwrapped messages.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×