Method and apparatus for initializing security information on a network device
First Claim
1. A method for a network manager to securely configure a network device over a network, comprising:
- coupling to said network device;
creating a temporary account having an encryption key, wherein an unsecured first protocol is used to create said temporary account, wherein said temporary account corresponds to a secured second protocol that supports encryption, and wherein said secured second protocol is capable of transmitting encrypted security information;
transmitting said encryption key unencrypted to said network manager over said network in accordance with said unsecured first protocol;
encrypting said security information using said encryption key;
transmitting encrypted security information over said network to said network device in accordance with said secured second protocol;
initializing said network device with said security information;
deleting said temporary account after said network device has been initialized with said security information; and
clearing said encryption key after said encryption key has been sent to said network manager over said network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for initializing security information for a network device. Two protocols are used. A first protocol, which has no encryption capability, is used to create an initial account. However, the initial account corresponds to a second protocol, and this second protocol does have encryption capability. A security parameter which is used to encrypt data and which corresponds to the initial account is transmitted by the network device to the network management application. The security parameter may be transmitted from the network device to the network management application openly via the first protocol. The network management application then uses this security parameter to encrypt sensitive security information needed for initially configuring the network device. The encrypted security information can now be transmitted securely over the network to the network device by means of the second protocol. Thereby, the network device can be initially configured with the requisite security information in an easy-to-use and relatively secure manner.
-
Citations
16 Claims
-
1. A method for a network manager to securely configure a network device over a network, comprising:
-
coupling to said network device; creating a temporary account having an encryption key, wherein an unsecured first protocol is used to create said temporary account, wherein said temporary account corresponds to a secured second protocol that supports encryption, and wherein said secured second protocol is capable of transmitting encrypted security information; transmitting said encryption key unencrypted to said network manager over said network in accordance with said unsecured first protocol; encrypting said security information using said encryption key; transmitting encrypted security information over said network to said network device in accordance with said secured second protocol; initializing said network device with said security information; deleting said temporary account after said network device has been initialized with said security information; and clearing said encryption key after said encryption key has been sent to said network manager over said network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for a network manager to securely configure a network device, comprising:
-
coupling to said network device; creating a temporary account by using a unsecured first protocol, wherein said temporary account includes an encryption key in accordance with a secured second protocol that supports encryption, and wherein said secured second protocol is capable of transmitting encrypted security information; transmitting said encryption key from said network device over said network to said network manager in plain text; encoding security information corresponding to said encryption key; configuring said network device in an encoded manner with security information, wherein said security information is encoded according to said encryption key and transmitted to said network device in accordance with said secured second protocol; clearing said encryption key; destroying said temporary account after said network device has been configured. - View Dependent Claims (9, 10, 11)
-
-
12. An apparatus for configuring a network device over a network, comprising:
-
means for coupling to said network device; means for creating a temporary account having an encryption key, wherein an unsecured first protocol is used to create said temporary account, wherein said temporary account corresponds to a secured second protocol that supports encryption, and wherein said secured second protocol is capable of transmitting encrypted security information; means for transmitting said encryption key to a network manager over said network in accordance with said unsecured first protocol; means for encrypting transmissions from said network manager to said network device according to said encryption key; means for initializing said network device with said security information by said network manager over said network in an encrypted mode in accordance with said secured second protocol; means for clearing said encryption key; means for destroying said temporary +account after said network device has been configured. - View Dependent Claims (13, 14)
-
-
15. A computer-readable medium having stored thereon instructions for configuring a network device over a network, comprising:
-
coupling to said network device; creating a temporary SNMPv3 account by using SNMPv1, wherein said SNMPv3 accounts includes an encryption key in accordance with said SNMPv3 protocol that supports encryption, and wherein said secured SNMPv3 protocol is capable of transmitting encrypted security information; transmitting an object corresponding to said temporary SNMPv3 account over said network by using SNMPv1; encrypting said encryption key according to said object; transmitting said encryption key to said network device; configuring said network device with said encryption key by using SNMPv3; and destroying said initial SNMPv3 account after said network device has been configured. - View Dependent Claims (16)
-
Specification