Scheme to allow two computers on a network to upgrade from a non-secured to a secured session
First Claim
1. In a computer system having a memory, a processor coupled to said memory, and a network interface coupled to said memory and said processor, said network interface communicating with a target host, a method comprising the steps of:
- initializing an access control list;
creating an access control entry with a time-to-live value for said target host in said access control list, said time-to-live value being automatically renewed when communications are received from said target host;
exchanging security information with said target host;
updating said entry for said target host to include said security information;
communicating with said target host using said security information; and
,maintaining non-secure, clear communication with said target host even in the absence of said security information subsequent to said step of exchanging security information.
3 Assignments
0 Petitions
Accused Products
Abstract
An apparatus for allowing communications to a target host on a network to be upgraded from a non-secured session to a secured session. The apparatus including a processor; a memory coupled to the processor and storing an access control list; and a network interface coupled to the processor, the network interface communicating with a target host; wherein the memory is configured to cause the processor to: (1) create an access control entry for the target host in the access control list; (2) exchange security information with the target host; (3) update the entry for the target host to include the security information; and, (4) communicate with said target host using said security information.
A method for allowing communications to a target host on a network to be upgraded from a non-secured session to a secured session having the steps of: (1) creating an access control entry for the target host in the access control list; (2) exchanging security information with the target host; (3) updating the entry for the target host to include the security information; and, (4) communicating with the target host using the security information.
-
Citations
17 Claims
-
1. In a computer system having a memory, a processor coupled to said memory, and a network interface coupled to said memory and said processor, said network interface communicating with a target host, a method comprising the steps of:
-
initializing an access control list; creating an access control entry with a time-to-live value for said target host in said access control list, said time-to-live value being automatically renewed when communications are received from said target host; exchanging security information with said target host; updating said entry for said target host to include said security information; communicating with said target host using said security information; and
,maintaining non-secure, clear communication with said target host even in the absence of said security information subsequent to said step of exchanging security information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a processor; a memory coupled to said processor; a network interface coupled to said processor and said memory, said network interface communicating with a target host; said memory configured to cause said processor to; initialize an access control list; create an access control entry with a time-to-live value for said target host in said access control list, said time-to-live value being automatically renewed when communications are received from said target host; exchange security information with said target host; update said entry for said target host to include said security information; communicate with said target host using said security information; and
,maintain non-secure clear communication with said target host even in the absence of said security information subsequent to said step of exchanging security information.
-
-
13. A computer program product for upgrading a non-secure communication session across a network into a secure communication session in a computer system having a memory, a processor coupled to said memory, and a network interface coupled to said memory and said processor, said network interface communicating with a target host, said computer program product comprising:
-
computer readable program code device configured to initialize an access control list; computer readable program code device configured to create an access control entry with a time-to-live value for said target host in said access control list, said time-to-live value being renewed automatically when communications are received from said target host; computer readable program code device configured to exchange security information with said target host; computer readable program code device configured to update said entry for said target host to include said security information; computer readable program code device configured to communicate with said target host using said security information; and
,computer readable program code device configured to maintain non-secure clear communication with said target host even in the absence of said security information subsequent to said exchange of said security information. - View Dependent Claims (14, 15, 16, 17)
-
Specification