KEY MANAGEMENT FOR COMMUNICATION NETWORKS
First Claim
Patent Images
1. A method for key management in a communications network, comprising:
- carrying out a public key authentication scheme between a security controller and a plurality of nodes to establish a plurality of node-to-security-controller (NSC) keys, the NSC keys respectively associated with the plurality of nodes and used for secure communication between the security controller and the respective nodes.
12 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention relates to a method for key management in a communications network. In this method, a public key authentication scheme is carried out between a security controller and a plurality of nodes to establish a plurality of node-to-security-controller (NSC) keys. The NSC keys are respectively associated with the plurality of nodes and are used for secure communication between the security controller and the respective nodes. Other methods and devices are also disclosed.
33 Citations
28 Claims
-
1. A method for key management in a communications network, comprising:
carrying out a public key authentication scheme between a security controller and a plurality of nodes to establish a plurality of node-to-security-controller (NSC) keys, the NSC keys respectively associated with the plurality of nodes and used for secure communication between the security controller and the respective nodes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
14. A method for key management in a communications network, comprising:
-
using a public key authentication scheme to individually authenticate a plurality of nodes and facilitate establishment of a different node-to-security-controller (NSC) key for each node; receiving a communication request from a first of the plurality of nodes, where the communication request specifies at least a second node with which the first node desires to communicate; and generating a session secret to enable secure communication between the first and second nodes. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
- 24. A security controller that is adapted to use a public key authentication scheme to authenticate a plurality of nodes and establish a different node-to-security-controller (NSC) key for each node.
Specification