Method and system for network security management
First Claim
1. A method for network security management, comprising:
- establishing a user database at a server, wherein the user database comprises a plurality of first usernames and a plurality of corresponding first passwords;
embedding a second username and a corresponding second password into a shared key;
deriving a client key value from the shared key and a secret key algorithm;
adding the client key value into a first message and transferring the first message to the server; and
the server comparing the client key value with key values corresponding to the first user names and the corresponding first passwords, when the client key value matches one key value, calculating the second username and corresponding password according to a hash function algorithm to generate a server key value, and when none is matched, the connection of the second user and the server is denied.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for network security management using an Internet key exchange mechanism. A user database is established at a server comprising a plurality of first usernames and a plurality of corresponding first passwords. A second username and corresponding password are embedded into a shared key. A client key value is derived according to the shared key and Internet key exchange mechanism. The first user-names and corresponding first passwords are calculated and obtained for generating a plurality of user key values. The client key value is added into a first message and transferring the first message to the server. The client key value is compared with the user key values, and, when the client key value matches one user key value, the second username and corresponding password are calculated to generate a server key value
-
Citations
15 Claims
-
1. A method for network security management, comprising:
-
establishing a user database at a server, wherein the user database comprises a plurality of first usernames and a plurality of corresponding first passwords;
embedding a second username and a corresponding second password into a shared key;
deriving a client key value from the shared key and a secret key algorithm;
adding the client key value into a first message and transferring the first message to the server; and
the server comparing the client key value with key values corresponding to the first user names and the corresponding first passwords, when the client key value matches one key value, calculating the second username and corresponding password according to a hash function algorithm to generate a server key value, and when none is matched, the connection of the second user and the server is denied. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for network security management using an Internet key exchange mechanism, comprising steps:
-
establishing a user database at a server comprising a plurality of first usernames and a plurality of corresponding first passwords;
embedding a second username and corresponding password into a shared key;
deriving a client key value according to the shared key and Internet key exchange mechanism;
the server calculating and obtaining the first user-names and corresponding first passwords for generating a plurality of user key values;
the server adding the client key value into a first message and transferring the first message to the server; and
the server comparing the client key value with the user key values, and, when the client key value matches one user key value, calculating the second username and corresponding password to generate a server key value. - View Dependent Claims (9, 10, 11)
-
-
12. A system for network security management, comprising:
-
an analysis unit, embedding a verified name and corresponding verified password into a shared key, deriving a client key value corresponding to the verified name and verified password according to the shared key and a secret key algorithm, and adding the client key value to a first message; and
a server, coupled to the analysis unit, receiving the first message, wherein a user database located at the server comprises a plurality of verification names and corresponding verification passwords, the server comprising;
a calculation unit, coupled to the user database, calculating the verification names and corresponding verification passwords by using a hash function algorithm to generate a plurality of user key values; and
a comparison unit, coupled to the user database and the calculation unit, comparing the client key value with the user key values, and, when the client key value matches one user key value, calculating the verified name and corresponding verified password by using the hash function algorithm to generate a server key value, adding the server key value to a second message by the server, and returning the second message to the analysis unit. - View Dependent Claims (13, 14, 15)
-
Specification