System and Method for Distributing Enduring Credentials in an Untrusted Network Environment
First Claim
1. A method for distributing enduring credentials for a secure network in an untrusted network environment, comprising:
- providing temporary credentials to an untrusted user;
communicating the temporary credentials to a computing device connected to a network switch configured to receive the temporary credentials from the untrusted user through the computing device;
relaying the temporary credentials from the network switch to an authentication server within the secure network;
authenticating the computing device connected to the network switch; and
transmitting the enduring credentials to the computing device in an encrypted format to enable the computing device to communicate within the secure network through the network switch without providing access to the enduring credentials to the untrusted user.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for distributing enduring credentials for a secure network in an untrusted network environment is disclosed. The method includes providing temporary credentials to an untrusted user. The temporary credentials can be communicated to a computing device connected to a network switch. The network switch can relay the temporary credentials to an authentication server within the secure network. The computing device can be authenticated to verify it is authorized to be connected to the secure network. Enduring credentials can be transmitted from the secure network to the computing device in an encrypted format to enable the computing device to communicate within the secure network through the network switch without providing access to the enduring credentials to the untrusted user.
44 Citations
20 Claims
-
1. A method for distributing enduring credentials for a secure network in an untrusted network environment, comprising:
-
providing temporary credentials to an untrusted user; communicating the temporary credentials to a computing device connected to a network switch configured to receive the temporary credentials from the untrusted user through the computing device; relaying the temporary credentials from the network switch to an authentication server within the secure network; authenticating the computing device connected to the network switch; and transmitting the enduring credentials to the computing device in an encrypted format to enable the computing device to communicate within the secure network through the network switch without providing access to the enduring credentials to the untrusted user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for distributing enduring credentials to a computing device in an untrusted environment, comprising:
-
a network switch configured to communicate with the computing device and at least one server within a secure network; an authentication server within the secure network configured to receive temporary credentials from the computing device and verify that the computing device is allowed to communicate with the secure network, wherein the temporary credentials are configured to enable an untrusted user temporary access to the secure network using the computing device connected to the secure network through the network switch; and computer readable storage accessible by the authentication server and organized to contain enduring credentials provided by the authentication server to the computing device upon verification of the computing device, wherein the enduring credentials are encrypted such that the untrusted user does not have access to the enduring credentials. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer usable medium having computer readable program code embodied therein for distributing enduring credentials for a secure network in an untrusted network environment, the computer readable program code in a computer program product comprising:
-
providing temporary credentials to an untrusted user; communicating the temporary credentials to a computing device connected to a network switch configured to receive the temporary credentials from the untrusted user through the computing device; relaying the temporary credentials from the network switch to an authentication server within the secure network; authenticating the computing device connected to the network switch; and transmitting the enduring credentials to the computing device in an encrypted format to enable the computing device to communicate within the secure network through the network switch without providing access to the enduring credentials to the untrusted user.
-
Specification