Cryptographically secure network
First Claim
Patent Images
1. A computer-implemented method for creating a cryptographically secure network between at least two access systems, the method comprising a switch system performing the steps of:
- associating each of a plurality of access systems with a public key from a private-public key pair associated with said access system;
in response to a request from a first access system to transmit data to a second access system;
authenticating the first access system using the public key associated with the first access system;
forming a first cryptographically secure network connection between the authenticated first access system and the switch system;
accepting data from the authenticated first access system via the first cryptographically secure network connection;
authenticating the second access system using the public key associated with the second access system;
forming a second cryptographically secure network connection between the authenticated second access system and the switch system; and
transmitting the data to the authenticated second access system via the second cryptographically secure network connection.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer-readable medium for securely transmitting data (400) between at least two access systems (300, 320) via a switch system (310). Through the use encryption keys and the switch system (310) acting a central switch, any two access systems are able to securely transmit data (400) between them. The present invention can be implemented by means of an application proxy (1000), a secure connection enabled application, or application program interfaces.
144 Citations
53 Claims
-
1. A computer-implemented method for creating a cryptographically secure network between at least two access systems, the method comprising a switch system performing the steps of:
-
associating each of a plurality of access systems with a public key from a private-public key pair associated with said access system;
in response to a request from a first access system to transmit data to a second access system;
authenticating the first access system using the public key associated with the first access system;
forming a first cryptographically secure network connection between the authenticated first access system and the switch system;
accepting data from the authenticated first access system via the first cryptographically secure network connection;
authenticating the second access system using the public key associated with the second access system;
forming a second cryptographically secure network connection between the authenticated second access system and the switch system; and
transmitting the data to the authenticated second access system via the second cryptographically secure network connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
16. A switch system for establishing a secure network connection between at least two access systems, the switch system comprising:
at least one node comprising;
a key module for associating each access system with a public key from a private-public key pair associated with said access system;
an authentication module, coupled to the key manager module, for using an access system'"'"'s public key, in conjunction with the access system using its private key, to authenticate the access system; and
a secure network module, coupled to the authentication module, for establishing a cryptographically secure network connection between the switch system and an authenticated access system, whereby data is received from a first access system via a first secure connection and transmitted to a second access system via a second secure connection.
-
27. An access system for establishing a cryptographically secure connection to a switch system, the access system comprising:
-
a key module for accessing a private-public key pair of a user of the access system;
an authentication module, coupled to the key module, for authenticating to the switch system using the private-public key pair; and
a secure network connection module, coupled to the authentication module, for establishing a cryptographically secure connection between the switch system and the access system, wherein data is transmitted to and received data from the switch system via the cryptographically secure connection.
-
-
39. In a computer-readable medium, a computer program product for creating a cryptographically secure network between at least two access systems, the computer-readable medium comprising program code adapted to perform the steps of:
-
associating each of a plurality of access systems with a public key from a private-public key pair associated with said access system;
in response to a request from a first access system to transmit data to a second access system;
authenticating the first access system using the public key associated with the first access system;
forming a first cryptographically secure network connection between the authenticated first access system and the switch system;
accepting data from the authenticated first access system via the first cryptographically secure network connection;
authenticating the second access system using the public key associated with the second access system;
forming a second cryptographically secure network connection between the authenticated second access system and the switch system; and
transmitting the data to the authenticated second access system via the second cryptographically secure network connection.
-
Specification