Multipoint server for providing secure, scaleable connections between a plurality of network devices
First Claim
Patent Images
1. A method for implementing secure communications between a plurality of devices, the method comprising:
- providing at least one common encryption parameter to each of the plurality of devices;
identifying the plurality of devices to one another; and
establishing a secure, point-to-point connection between at least two of the plurality of devices.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and system for implementing secure communications between a plurality of devices are provided. The method and system generally include the provision of at least one common encryption parameter to each of the plurality of devices, as well as an identification of the plurality of devices to one another. This information can be maintained and shared by interaction of the plurality of devices with a designated server device. In this way, a secure, point-to-point connection between at least two of the plurality of devices can be established.
168 Citations
27 Claims
-
1. A method for implementing secure communications between a plurality of devices, the method comprising:
-
providing at least one common encryption parameter to each of the plurality of devices;
identifying the plurality of devices to one another; and
establishing a secure, point-to-point connection between at least two of the plurality of devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A server device for implementing a secure network connection between a plurality of devices, the server device comprising:
-
means for securely distributing connection information to each of the plurality of devices; and
means for enabling secure, point-to-point communication between any pair of the plurality of devices based on the connection information. - View Dependent Claims (11, 12, 13, 14)
-
-
15. An article of manufacture, which comprises a computer readable medium having stored therein a computer program carrying out a method for implementing a virtual private network, the computer program comprising:
-
a first code segment for authenticating member devices of the virtual private network;
a second code segment for providing a secret encryption parameter to each of the authenticated member devices seeking to conduct active communications within the virtual private network; and
a third code segment for distributing a list of each of the authenticated member devices to the other member devices. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method of utilizing a virtual private network, comprising:
-
contacting a server device administering the virtual private network;
receiving information authenticating the server device and each of a plurality of members of the virtual private network;
receiving an encryption parameter from the server device that is commonly obtainable by all members of the virtual private network; and
receiving a list of all members of the virtual private network. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A method of activating a first and second device within a virtual private network (VPN) managed by a server, comprising:
-
negotiating a first security association between the server and the first device;
determining an encryption secret key with the first device as part of the first security association;
negotiating a second security association between the server and the second device;
communicating the encryption secret key to the second device as part of the second security association; and
establishing an IPsec session between the first and second devices based on the encryption secret key. - View Dependent Claims (26, 27)
-
Specification