×

Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same

  • US 20010001876A1
  • Filed: 01/12/2001
  • Published: 05/24/2001
  • Est. Priority Date: 12/11/1997
  • Status: Active Grant
First Claim
Patent Images

1. A login method to enhance security in a network computer system having at least one server computer coupled over a communication network to a plurality of client computers, wherein each client computer is coupled to directly access a persistent storage device and wherein each client computer is operated by a control program after login, the method comprising the steps of:

  • receiving a login ID and password PW from a user at a first one of said client computers;

    computing, at said first client computer, a hash value H1PW of the password PW;

    transmitting a first-stage login request including ID from said first client computer to a first one of said server computers;

    receiving said first-stage login request at said first server computer;

    providing, at said first server computer, a key-exchange key KEK;

    encrypting KEK at said first server computer;

    transmitting a first-stage login response, including the encrypted KEK, from said first server computer to said first client computer;

    receiving said first-stage login response at said first client computer;

    decrypting, at said first client computer, the encrypted KEK, to yield KEK;

    providing, at said first client computer, a first split key SK1;

    encrypting, it said first client computer, key SK1, using KEK as an encryption key, to yield ESK1;

    transmitting a second-stage login request, including ESK1, from said first client computer to said first server computer;

    receiving said second-stage login request at said first server computer;

    decrypting, at said first server computer, ESK1, using KEK as a decryption key, to yield SK1;

    providing, at said first server computer, a second split key SK2;

    combining, at said first server computer, the first and second split keys SK1 and SK2, to yield session key SK;

    encrypting, at said first server computer, the second split key SK2, using KEK as an encryption key, to yield ESK2;

    transmitting a second-stage login response, including ESK2, from said first server computer to said first client computer;

    receiving the second-stage login response at said first client computer;

    decrypting, at said first client computer, ESK2 received with the second-stage login response, using KEK as a decryption key, to yield SK2;

    combining, at said first client computer, the first and second split keys SK1 and SK2, to yield sessions key SK;

    encrypting further transmissions between said first client computer and said first server computer, using sessions key SK as an encryption key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×