×

Method of conducting secure operations on an uncontrolled network

  • US 5,548,721 A
  • Filed: 04/28/1994
  • Issued: 08/20/1996
  • Est. Priority Date: 04/28/1994
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of conducting secure operations on an uncontrolled network of computer workstations that has a network manager for authorizing conduct of secure operations on the network and plural secure computer workstations, each for communicating with the network manager and with other workstations in the network, the method comprising the steps of:

  • establishing a personal identifier for a first authorized network user;

    providing the first authorized user with a cryptographic ignition key (CIK) card that contains an electronically readable, randomly selected portion of an authorization record, wherein the authorization record is a combination of the personal identifier and a system key created by a first workstation;

    providing each of the secure workstations with a secure network access port (SNAP) that includes,a reader for reading the CIK card, andmeans for storing the portion of the system key not stored on the CIK card and for storing a workstation-unique initialization key for enabling encrypted communication with the network manager but not with other secure workstations in the network;

    storing the complete authorization record and system key for the first authorized user in the network manager;

    requesting access to the network from the first workstation by providing the first authorized user'"'"'s personal identifier to the SNAP of the first workstation and reading the first authorized user'"'"'s CIK card at the reader of the first workstation;

    evaluating at the SNAP of the first workstation whether the received personal identifier and portions of the system key from the CIK card and from the SNAP identify the first authorized user, and if the first authorized user is identified,providing the authorization record and system key of the first authorized user to the network manager in an encrypted communication from the first workstation using the first workstation'"'"'s initialization key for validation that the first authorized user is to be given access to the network; and

    in the event the first authorized user is validated by the network manager, providing an operational key from the network manager to the SNAP of the first workstation using the first workstation'"'"'s initialization key, wherein the operational key enables secure operations from the first workstation on the network.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×