METHOD FOR OPERATING A NETWORK, A SYSTEM MANAGEMENT DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR
First Claim
1. A method for operating a network (1), comprising a node (D1, N) and a system management device (3, SMD), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of α
- , and the node being provided with a node keying material share of degree of complexity derived from the root keying material, the method comprising the following steps, upon receipt at the system management device of a request (Rqst) for an external user (U) to gain access to the node (D1, N);
a) the system management device generating an external user keying material share of degree of complexity α
from the root keying material and an access identifier,b) the system management device generating an access keying material of degree of complexity less than α
, from the external user keying material share and an identifier of the node,c) the system management device providing the external user with the access keying material share and the access identifier,d) the external user deriving a key from the access keying material share, and transmitting this key and the access certificate to the node,e) the node computing a key from the access identifier and the node keying material share, andf) the node comparing the key transmitted by the external user and the key computed by the node, so as to authenticate the external user.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method for operating a network comprising communicating devices representing nodes of the network. More precisely, the invention relates to a method for operating a network (1), comprising a node (D1) and a system management device (3), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of, and the node being provided with a node keying material share of degree of complexity α derived from the root keying material. The method comprises the following steps, upon receipt at the system management device of a request for an external user (4) to gain access to the node (D1): the system management device generates an external user keying material share of degree of complexity α from the root keying material and an access identifier, the system management device generates an access keying material of degree of complexity less than α, from the external user keying material share and an identifier of the node, the system management device provides the external user with the access keying material share and the access identifier, the external user derives a key from the access keying material share, and transmitting this key and the access certificate to the node, the node computes a key from the access identifier and the node keying material share, and the node compares the key transmitted by the external user and the key computed by the node, so as to authenticate the external user.
68 Citations
14 Claims
-
1. A method for operating a network (1), comprising a node (D1, N) and a system management device (3, SMD), the system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of α
- , and the node being provided with a node keying material share of degree of complexity derived from the root keying material, the method comprising the following steps, upon receipt at the system management device of a request (Rqst) for an external user (U) to gain access to the node (D1, N);
a) the system management device generating an external user keying material share of degree of complexity α
from the root keying material and an access identifier,b) the system management device generating an access keying material of degree of complexity less than α
, from the external user keying material share and an identifier of the node,c) the system management device providing the external user with the access keying material share and the access identifier, d) the external user deriving a key from the access keying material share, and transmitting this key and the access certificate to the node, e) the node computing a key from the access identifier and the node keying material share, and f) the node comparing the key transmitted by the external user and the key computed by the node, so as to authenticate the external user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 13, 14)
- , and the node being provided with a node keying material share of degree of complexity derived from the root keying material, the method comprising the following steps, upon receipt at the system management device of a request (Rqst) for an external user (U) to gain access to the node (D1, N);
-
11. A system management device comprising a root keying material being a set of alpha-secure functions having a degree of complexity of α
- +1 in each variable, the system management device being included in a network also comprising a node, and the system management device comprising;
means for, upon receipt of a request for an external user to gain access to the node generating an external user keying material share of degree of complexity α
+1 from the root keying material and an access identifier,means for generating an access keying material of degree of complexity less than α
+1, from the external user keying material share and an identifier of the node, andthe system management device providing the external user with the access keying material share and the access identifier. - View Dependent Claims (12)
- +1 in each variable, the system management device being included in a network also comprising a node, and the system management device comprising;
Specification