Remote secure authorization
First Claim
1. A method of distributing at least one enterprise network cryptographic key to a client attempting to access an enterprise network via an edge device of said enterprise network, the method comprising the steps of:
- receiving first information from a client, encrypting said first information with a predefined enterprise network cryptographic key to generate a first cipher, sending said first cipher and a predefined unique identifier of said edge device of said enterprise network to an authentication server, receiving a second cipher from said authentication server, decrypting said second cipher with a predefined enterprise network cryptographic key to obtain a client cryptographic key, encrypting at least one predefined enterprise network cryptographic key with said client cryptographic key to generate a third cipher, and forwarding said third cipher to said client.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token. This allows the enterprise network token to gain secure access to the temporary key of the client token, thereby allowing the enterprise network token to securely provision the remote client token with the appropriate enterprise Network Keys.
-
Citations
13 Claims
-
1. A method of distributing at least one enterprise network cryptographic key to a client attempting to access an enterprise network via an edge device of said enterprise network, the method comprising the steps of:
-
receiving first information from a client, encrypting said first information with a predefined enterprise network cryptographic key to generate a first cipher, sending said first cipher and a predefined unique identifier of said edge device of said enterprise network to an authentication server, receiving a second cipher from said authentication server, decrypting said second cipher with a predefined enterprise network cryptographic key to obtain a client cryptographic key, encrypting at least one predefined enterprise network cryptographic key with said client cryptographic key to generate a third cipher, and forwarding said third cipher to said client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authenticating a client attempting to access an enterprise network via an edge device of said enterprise network, said method comprising the steps of:
-
receiving information from an edge device of an enterprise network, said information comprising a predefined unique identifier of said edge device of said enterprise network and a first cipher, identifying a predefined enterprise network cryptographic key associated with said predefined unique identifier of said edge device of said enterprise network, decrypting said first cipher using said identified, predefined enterprise network cryptographic key to obtain a second cipher and a unique identifier of said client, determining whether a match exists between said unique identifier of said client and at least one of a number of stored client identifiers, and if a match does exist, identifying a cryptographic key known only to said client and said authentication server corresponding to said unique identifier of said client, decrypting said second cipher using said cryptographic key known only to said client and said authentication server to obtain a client cryptographic key, encrypting said client cryptographic key using a predefined enterprise network cryptographic key to generate a third cipher, and forwarding said third cipher to said edge device of said enterprise network. - View Dependent Claims (10, 11)
-
-
12. A method of obtaining at least one enterprise network cryptographic key from an edge device of an enterprise network, the method comprising the steps of:
-
generating a temporary cryptographic key, encrypting said temporary cryptographic key using a predefined enterprise network cryptographic key to generate a first cipher, encrypting said first cipher with a predefined client cryptographic key to generate a second cipher, forwarding said second cipher along with a unique identifier to an edge device of an enterprise network, receiving a response from said edge device of said enterprise network, decrypting said response using said temporary cryptographic key to obtain at least one enterprise network cryptographic key. - View Dependent Claims (13)
-
Specification