×

Method and apparatus for providing security in a star network connection using public key cryptography

  • US 6,311,218 B1
  • Filed: 10/28/1997
  • Issued: 10/30/2001
  • Est. Priority Date: 10/17/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. In a packet switched network wherein a user can physically connect and disconnect at an arbitrary port of said network, a method for limiting transmission or reception of data from an unauthenticated user, said method not including user identification or port identification information in data packets which are ultimately transmitted in said packet switched network, said method comprising the steps of:

  • storing in a network intermediate system an indication for each port indicating whether said port is authenticated or unauthenticated;

    prior to freely transmitting or receiving network data on any said port, authenticating each said user at the port to which said user is connected, said authenticating of said user by said network intermediate system comprising;

    requesting via said network intermediate system an identification from said user connected at said specific port;

    receiving at said network intermediate system said identification from said user;

    using from said network intermediate system said identification to determine a public encryption key for said user;

    generating a challenge by said network for said user;

    presenting said challenge from said network intermediate system to said user;

    receiving from said user at said network intermediate system a response to said challenge, said response generated at said user by operating on said challenge using a private key supplied by said user;

    verifying via said network intermediate system said response by performing a processing operation on said response and said challenge using said public key associated with said user;

    authenticating said user via said network intermediate system only if said verifying indicates that said private key corresponds to said public key;

    computing a response at a physically identified end system from said challenge, said response requiring a user to supply a private key at said end system said step of computing requiring a human user to supply at said end system a private key that is stored on a physical device that must be present at said end system, and once said user is authenticated, allowing data packets to be transmitted or received by said user without including user identification or port identification information in said data packets and without requiring said network intermediate system to create and maintain an association between said user and a corresponding port of said packet switched network.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×