Apparatus and methods for transmission security in a computer network
First Claim
1. A method for validating a message packet communicated from a source node to a destination node in a computer network, the source node and destination node having access to a clock mechanism synchronized with a common time frame, the method comprising:
- (a) generating a first security key using a time reference obtained from said clock mechanism and a password known by said source node and said destination node;
(b) communicating said first security key with a message packet from said source node to said destination node;
(c) when said first security key and said message packet are received by said destination node, generating a second security key using said password and said time reference and comparing said second security key with said first security key; and
(d) discarding said message packet if said second security key does not correspond with said first security key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for validating a message packet communicated from a source node to a destination node in a computer network is disclosed. The source node and destination node have access to a clock mechanism synchronized with a common time frame. The method comprises generating a first security key using a time reference obtained from the clock mechanism and a password known by the source node and destination node, communicating the first security key with a message packet from the source node to the destination node, and when the first security key and message packet are received by the destination node, generating a second security key using the password and the time reference and comparing the second security key with the first security key. The message packet is discarded if the second security key does not correspond with the first security key.
In another aspect of the invention, the method further comprises communicating a first time reference obtained from the clock mechanism with a message packet, and when the first time reference and message packet are received by the destination node, comparing the first time reference with a second time reference obtained from the clock mechanism. The message packet is discarded if the time difference between the first time reference and the second time reference is greater than a predetermined amount of time. The predetermined amount of time may be based on a calculated normal packet transmission delay.
-
Citations
14 Claims
-
1. A method for validating a message packet communicated from a source node to a destination node in a computer network, the source node and destination node having access to a clock mechanism synchronized with a common time frame, the method comprising:
-
(a) generating a first security key using a time reference obtained from said clock mechanism and a password known by said source node and said destination node; (b) communicating said first security key with a message packet from said source node to said destination node; (c) when said first security key and said message packet are received by said destination node, generating a second security key using said password and said time reference and comparing said second security key with said first security key; and (d) discarding said message packet if said second security key does not correspond with said first security key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 12, 13, 14)
-
- 9. A computer network comprising a plurality of communicatively interconnected components represented by nodes, wherein a message packet communicated from a source node to a destination node includes a first security key generated using a password and a time reference, and wherein said destination node generates a second security key using said password and said time reference and compares said second security key with said first security key, said destination node discarding the message packet if said second security key does not correspond with said first security key.
Specification