Secure modem gateway concentrator
First Claim
1. A system comprising:
- an authentication server;
a client; and
an access controller interconnectable for communications therebetween;
said authentication server operable to deliver a first key to said client;
said access controller operable to store a second key complementary to said first key for encrypting at least a portion of communications between said client and said access controller;
said access controller including a plurality of ports each connectable to a computer;
said access controller operable to store at least one third key and to associate each said third key with a corresponding one of said ports;
said access controller further operable to decrypt, using the second key, instructions for a particular computer respective to a particular one of said ports, the instructions having been encrypted by the client using the first key;
said access controller further operable to encrypt the instructions received from said client using a particular third key corresponding to the particular one of said ports and to pass the encrypted instructions to the particular computer respective to the particular one of said ports according to a verification protocol utilizing the particular third key and a fourth key delivered to the particular computer.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.
-
Citations
19 Claims
-
1. A system comprising:
-
an authentication server; a client; and an access controller interconnectable for communications therebetween; said authentication server operable to deliver a first key to said client; said access controller operable to store a second key complementary to said first key for encrypting at least a portion of communications between said client and said access controller; said access controller including a plurality of ports each connectable to a computer; said access controller operable to store at least one third key and to associate each said third key with a corresponding one of said ports; said access controller further operable to decrypt, using the second key, instructions for a particular computer respective to a particular one of said ports, the instructions having been encrypted by the client using the first key; said access controller further operable to encrypt the instructions received from said client using a particular third key corresponding to the particular one of said ports and to pass the encrypted instructions to the particular computer respective to the particular one of said ports according to a verification protocol utilizing the particular third key and a fourth key delivered to the particular computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An access controller for intermediating communications between an interface and a particular port from a plurality of ports;
- the access controller operable to store a second key complementary to a first key;
the access controller further operable to store a plurality of third keys corresponding to respective ones of the ports;
the access controller further operable to communicate with a client via the interface and with a computer via the particular port;
the client operable to store the first key and to receive instructions from a user;
the computer operable to store a particular fourth key that is complementary to the third key that corresponds to the particular port; and
, when a verification protocol utilizing the first and second keys is met, the access controller further operable to encrypt the instructions with the third key that corresponds to the particular port and to send the encrypted instructions to the computer via the particular port. - View Dependent Claims (14, 15, 16, 17, 18, 19)
- the access controller operable to store a second key complementary to a first key;
Specification