Secure modem gateway concentrator
First Claim
1. A system comprising:
- an authentication server, a client and an access controller interconnectable for communications therebetween;
said authentication server operable to deliver a first key to said client;
said access controller operable to store a second key complementary to said first key for encrypting at least a portion of communications between said client and said controller; and
, said access controller including a plurality of ports each connectable to a computer;
said access controller operable to associate said second key with one of said ports;
said access controller further operable to pass instructions received from said client to the computer respective to said one of said ports according to a verification protocol utilizing said keys.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.
35 Citations
34 Claims
-
1. A system comprising:
-
an authentication server, a client and an access controller interconnectable for communications therebetween;
said authentication server operable to deliver a first key to said client;
said access controller operable to store a second key complementary to said first key for encrypting at least a portion of communications between said client and said controller; and
,said access controller including a plurality of ports each connectable to a computer;
said access controller operable to associate said second key with one of said ports;
said access controller further operable to pass instructions received from said client to the computer respective to said one of said ports according to a verification protocol utilizing said keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An access controller for intermediating communications between an interface and a port;
- said access controller operable to store a second key complementary to a first key;
said access controller operable to communicate with a client via said interface and with a computer via said port;
said client operable to store said first key and to receive instructions from a user;
said access controller operable to selectively pass said instructions to said computer via said port if a verification protocol utilizing said keys is met. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
- said access controller operable to store a second key complementary to a first key;
-
24. In an authentication server, a method of delivering a first key for securing access between a client having temporary connection to a computer via an access controller having a plurality of ports;
- said access controller having a second key complementary to said first key;
said access controller connected to said computer via one of said ports;
said access controller for selectively passing instructions received from said client to said computer via said one of said ports if a verification protocol utilizing said keys is met;
said method comprising;
receiving a request from said client for said first key;
authenticating said request; and
,sending said first key to said client if said request is authenticated. - View Dependent Claims (25)
- said access controller having a second key complementary to said first key;
-
26. In an authentication server, a method of generating a set of keys for securing access between a client having temporary connection to a computer via an access controller having a plurality of ports, said access controller connected to said computer via one of said ports, said access controller for selectively passing instructions received from said client to said computer via said one of said ports if a verification protocol utilizing said keys is met, said method comprising:
-
receiving a request from said access controller for an updated first key;
authenticating said request;
generating said updated first key and a second key corresponding to said updated first key; and
,delivering said updated first key to said access controller. - View Dependent Claims (27, 28)
-
-
29. A method of securing access between a client connected to a computer via an access controller having a plurality of ports;
- said access controller connected to said computer via one of said ports;
said method comprising;
receiving an instruction at said client destined for said computer;
generating a random number by said client;
encrypting said random number by said client using a first key;
delivering said random number, said encrypted random number and said instruction to said access controller;
decrypting of said encrypted number using a second key by said access controller, said second key complementary to said first key;
comparing said random number and said decrypted number;
passing at least a portion of said instruction to said computer via said port if said comparison finds a match of said random number with said decrypted number; and
,discarding said at least a portion of said instruction if no match is found.
- said access controller connected to said computer via one of said ports;
-
30. An authentication server comprising:
-
an interface for communicating with a client via a communication medium; and
a processing unit connected to said interface;
said processor operable to deliver a first key to said client;
said first key usable by said client for communication with an access controller having a second key complementary to said first key;
said controller operable to selectively pass instructions from said client to a computer attached to said controller if a verification protocol utilizing said keys is met. - View Dependent Claims (31, 32)
-
-
33. An authentication server comprising:
-
an interface for communicating with an access controller via a communication medium; and
a processing unit connected to said interface;
said processor operable to deliver a first key to said access controller;
said first key usable by said access controller for communication with a computer having a second key complementary to said first key;
said computer operable to selectively accept instructions from said access controller if a verification protocol utilizing said keys is met. - View Dependent Claims (34)
-
Specification