Method for creating a virtual private network through a public network
First Claim
1. Method to create and use a virtual private network (VPN) having a plurality of units connected to a public network, each unit having security means which have at least a unique number UA, this method is characterized by the following steps:
- to generate a right Dn associated to the unique number UAn, by the security means of a unit Un, to transfer this right Dn to the security means of at least one unit Um, to encrypt the data sent by unit Un and the description of the Dn right by a encryption data key KS, to receive the data encrypted by the second unit Um, present these data to the security means of the unit Um, verify if the Dn right is present and if this is the case, decrypt the data by the encryption data key KS.
1 Assignment
0 Petitions
Accused Products
Abstract
The aim of this invention involves exchanging data between several computers or multimedia units through a public network guaranteeing at the same time the confidentiality of these data.
This aim is achieved by a creation and use method of a virtual private network (VPN) which has a plurality of units connected to a public network, each unit having security means which has a unique number UA1, this method is characterized by the following steps:
to generate a right Dn associated to the unique number UAn, by the security means of a unit Un,
to transfer this right Dn to the security means of at least one unit Um,
to encrypt the data sent by unit Un and the description of the Dn right by a encryption data key KS,
to receive the data encrypted by the second unit Um, present these data to the security means of the unit Um, verify if the Dn right is present and if this is the case, decrypt the data by the encryption data key KS.
8 Citations
19 Claims
-
1. Method to create and use a virtual private network (VPN) having a plurality of units connected to a public network, each unit having security means which have at least a unique number UA, this method is characterized by the following steps:
-
to generate a right Dn associated to the unique number UAn, by the security means of a unit Un, to transfer this right Dn to the security means of at least one unit Um, to encrypt the data sent by unit Un and the description of the Dn right by a encryption data key KS, to receive the data encrypted by the second unit Um, present these data to the security means of the unit Um, verify if the Dn right is present and if this is the case, decrypt the data by the encryption data key KS. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Method of creation and use of a virtual private network (VPN) which comprises a plurality of units connected to a managing centre (MC) through a public network, each unit having security means which has at least a unique number UA, this method is characterized by the following steps:
-
to request the creation of a network Rn through a unit Un at the managing centre (MC), to send a right Dn and a key Kn representing an network Rn to unit Un by the managing centre (MC), to request the registration of unit Um as part of the network Rn, at the managing center (MC), to transmit the right Dn and the key Kn to unit Um, to encrypt the data sent by unit Un and the description of the right Dn by a encryption data key KS, to receive the data encrypted by the second unit Um, to present these data to the security means of unit Um, to verify if the right Dn is present and if this is the case, to decrypt the data with the encryption data key Ks. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification