×

Subnet box

  • US 7,934,005 B2
  • Filed: 09/08/2004
  • Issued: 04/26/2011
  • Est. Priority Date: 09/08/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of facilitating authentication and security at an edge of a network, the method permitting both secure and non-secure clients to simultaneously connect to the same access point, the method not requiring physical modification of the access point, the method comprising the steps of:

  • interposing an apparatus between a network and the network access point, the network access point not requiring modification, whereby all secure network traffic between a client and the network passes through the apparatus;

    receiving, at the apparatus and from the client, a first random number encrypted using a cryptographic key associated with a token operably coupled to the client;

    decrypting, at the apparatus and using a cryptographic key retrieved from a resource internal to the apparatus, the first random number;

    sending, from the apparatus and to the client, a second random number encrypted using a cryptographic key associated with the apparatus;

    generating, at the apparatus, a session key from at least the first random number and the second random number;

    storing, at the apparatus, the session key in association with a source identifier;

    receiving a data packet at the apparatus;

    determining, at the apparatus, whether a source identifier exists in the data packet; and

    if the source identifier exists,retrieving the session key from the local storage using the source identifier,decrypting a portion of the data packet using the session key, anddirecting the data packet toward its recipient;

    wherein the generating, at the apparatus, the session key from at least the first random number and the second random number comprises computing a session key from the cryptographic key associated with the token operably coupled to the client using the first random number and the second random number, wherein one of the first random number and the second random number is used to select a first bit of the session key from the cryptographic key associated with the token operably coupled to the client, and wherein the other of the first random number and the second random number is used to select subsequent bits of the session key from the cryptographic key associated with the token operably coupled to the client.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×