Remote secure authorization
First Claim
1. A method of distributing at least one network cryptographic key to a client attempting to access a network via an edge device of said network, the method comprising the steps of:
- receiving first information from a client,encrypting said first information with a network secret cryptographic key to generate a first cipher, said network secret cryptographic key being known to an edge device of a network and an authentication server but not to said client,sending said first cipher and a network identifier associated with said edge device of said network to said authentication server,receiving a second cipher from said authentication server,decrypting said second cipher with said network secret cryptographic key to obtain a client cryptographic key,encrypting at least one network cryptographic key with said client cryptographic key to generate a third cipher, andforwarding said third cipher to said client.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token. This allows the enterprise network token to gain secure access to the temporary key of the client token, thereby allowing the enterprise network token to securely provision the remote client token with the appropriate enterprise Network Keys.
-
Citations
11 Claims
-
1. A method of distributing at least one network cryptographic key to a client attempting to access a network via an edge device of said network, the method comprising the steps of:
-
receiving first information from a client, encrypting said first information with a network secret cryptographic key to generate a first cipher, said network secret cryptographic key being known to an edge device of a network and an authentication server but not to said client, sending said first cipher and a network identifier associated with said edge device of said network to said authentication server, receiving a second cipher from said authentication server, decrypting said second cipher with said network secret cryptographic key to obtain a client cryptographic key, encrypting at least one network cryptographic key with said client cryptographic key to generate a third cipher, and forwarding said third cipher to said client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authenticating a client attempting to access a network via an edge device of said network, said method comprising the steps of:
-
receiving information from an edge device of a network, said information comprising a network identifier associated with said edge device of said network and a first cipher, identifying a network secret cryptographic key associated with said network identifier, the network secret cryptographic key being known to said edge device and an authentication server but not to said client, decrypting said first cipher using said network secret cryptographic key to obtain a second cipher and a client identifier associated with said client, determining whether a match exists between said client identifier and at least one of a number of stored identifiers, and if a match does exist, identifying a cryptographic key known only to said client and said authentication server corresponding to said client identifier, decrypting said second cipher using said cryptographic key known only to said client and said authentication server to obtain a client cryptographic key, encrypting said client cryptographic key using said network secret cryptographic key to generate a third cipher, and forwarding said third cipher to said edge device of said network. - View Dependent Claims (10, 11)
-
Specification