SECURE AUTHENTICATION OF REMOTE EQUIPMENT
First Claim
1. A method comprising:
- receiving, by a network device, an encrypted challenge from an authentication server, the challenge comprising a token known by the network device;
sending, from the network device, a response to the authentication server, the response comprising an internet protocol source address; and
exchanging unencrypted data between the network device and a content server affiliated with the authentication server.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication server may use secure messaging with a remote device prior to authorizing non-secure communications between the remote device and a content server, thereby preventing unauthorized access to the content server. The secure messaging uses such security features as encryption, signatures with authentication certificates, a realm, and/or a nonce. Once non-secure communication is authorized, the remote device may act as a proxy between the content server and a user device connected to the remote device. The authentication server sends timeout notices to the remote device containing an interval and a key. To continue non-secure communications with the content server, the remote device must respond prior to the expiration of the interval by sending a keep-alive message containing the key to the authentication server.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a network device, an encrypted challenge from an authentication server, the challenge comprising a token known by the network device; sending, from the network device, a response to the authentication server, the response comprising an internet protocol source address; and exchanging unencrypted data between the network device and a content server affiliated with the authentication server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving, by a network device, an encrypted challenge from an authentication server, the challenge comprising a token known by the network device; sending, from the network device, an encrypted response to the authentication server, the response comprising an internet protocol source address; exchanging unencrypted data between the network device and a content server affiliated with the authentication server; receiving, by the network device, an encrypted timeout notice from the authentication server, the timeout notice comprising an indication of a time interval; sending, from the network device, an encrypted keep-alive message to the authentication server prior to the expiration of the indicated time interval. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method comprising:
-
sending, from an authentication system, an encrypted challenge to a network device, the challenge comprising a token known by the network device; receiving, by the authentication system, an encrypted response from the network device, the response being signed using a device-based authentication, and comprising an internet protocol source address; authorizing, by the authentication system, a content server affiliated with the authentication system to exchange unencrypted data with the network device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification