Transporting keys between security protocols
First Claim
1. A method for providing network security comprising:
- configuring a remote network to engage network security negotiation with a local network;
configuring a first security policy of a security component within the local network to pass through a network security negotiating communication between the local network and the remote network; and
establishing a network security negotiation between the remote network and a security parameter generator via the security component, the security parameter generator located within the local network and configured to provide secure communication with the remote network.
12 Assignments
0 Petitions
Accused Products
Abstract
A method for providing network security comprising a step of configuring a remote network to engage network security negotiation with a local network. The method includes a step of configuring a first security policy of a security component within the local network to pass through a network security negotiating communication between the local network and the remote network, and a step of establishing a network security negotiation between the remote network and a security parameter generator via the security component. The security parameter generator can be located within the local network and configured to provide secure communication with the remote network.
-
Citations
26 Claims
-
1. A method for providing network security comprising:
-
configuring a remote network to engage network security negotiation with a local network; configuring a first security policy of a security component within the local network to pass through a network security negotiating communication between the local network and the remote network; and establishing a network security negotiation between the remote network and a security parameter generator via the security component, the security parameter generator located within the local network and configured to provide secure communication with the remote network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A apparatus for providing network security comprising:
-
a remote network configured to engage network security negotiation with a local network; a security component within the local network with a security policy that can pass through a network security negotiating communication from the remote network, the security component located within the local network, and a security parameter generator configured to provide a secure communication with the remote network via the security component. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification