Encryption security in a network system
First Claim
1. A method for enhancing the security of a network having one or more network devices including one or more network infrastructure devices capable of exchanging messages, the method comprising the steps of:
- a. generating a plurality of encryption keys;
b. encrypting some or all of the messages exchanged between two or more of the network infrastructure devices, or exchanged within one or more of the network infrastructure devices, with one or more of the plurality of encryption keys; and
c. in the course of the message exchanges, replacing one or more of the one or more encryption keys with one or more replacement encryption keys.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for enhancing the security of signal exchanges in a network system. The system and method include a process and means for generating one or more replacement encryption key sets based on information and events. The information that may cause the generation of a replacement encryption key set includes, but is not limited to, a specified period of time, the level and/or type of signal traffic, and the signal transmission protocol and the amount of data sent. A key manager function initiates the replacement encryption key process based on the information. The replacement encryption key set may be randomly or pseudo-randomly generated. Functions attached to the network system required to employ encryption key sets may have encryption key sets unique to them or shared with one or more other attached functions. The system and method may be employed in a wireless, wired, or mixed transmission medium environment.
-
Citations
28 Claims
-
1. A method for enhancing the security of a network having one or more network devices including one or more network infrastructure devices capable of exchanging messages, the method comprising the steps of:
-
a. generating a plurality of encryption keys;
b. encrypting some or all of the messages exchanged between two or more of the network infrastructure devices, or exchanged within one or more of the network infrastructure devices, with one or more of the plurality of encryption keys; and
c. in the course of the message exchanges, replacing one or more of the one or more encryption keys with one or more replacement encryption keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for enhancing the security of a network including one or more network devices capable of providing access to the network for one or more attached functions, the method comprising the steps of:
-
a. generating a plurality of encryption keys for use in encrypting message exchanges between the one or more attached functions and the network;
b. using the plurality of encryption keys in the message exchanges between the one or more network access devices and the one or more attached functions;
c. generating one or more replacement encryption keys; and
d. during the session, replacing one or more of the plurality of encryption keys with the one or more replacement encryption keys at non-regular intervals. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for enhancing the security of a network including one or more network devices capable of providing access to the network, the method comprising the steps of:
-
a. generating a plurality of encryption keys for use in encrypting messages between the one or more network access devices and one or more attached functions;
b. encrypting some or all of the messages with one or more of the plurality of encryption keys; and
c. in the course of exchanging messages with the one or more attached functions, without authenticating, transmitting to the one or more attached functions one or more replacement encryption keys to replace one or more of the one or more encryption keys. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification