System and method for secure access
First Claim
1. A method, performed by an authorization server, of securing access between a client having temporary connection to a computer via an access controller, said access controller for selectively passing instructions received from said client to said computer if a verification protocol utilizing a set of keys is met, said method comprising:
- receiving a request from said access controller for an updated first key;
authenticating said request;
determining said updated first key and a second key corresponding to said updated first key;
delivering said updated first key to said access controller; and
wherein said verification protocol includes a generation of a random number by said client, an encryption of said random number by said client using said second key, a delivery of said random number and said encrypted random number from said client to said access controller, a decryption of said encrypted number using said updated first key by said access controller, a comparison of said random number and said decrypted number, and a decision to pass at least a portion of said instructions if said comparison finds a match of said random number with said decrypted number, and a decision not to pass said at least a portion of said instructions if no match is found.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded.
-
Citations
12 Claims
-
1. A method, performed by an authorization server, of securing access between a client having temporary connection to a computer via an access controller, said access controller for selectively passing instructions received from said client to said computer if a verification protocol utilizing a set of keys is met, said method comprising:
-
receiving a request from said access controller for an updated first key; authenticating said request; determining said updated first key and a second key corresponding to said updated first key; delivering said updated first key to said access controller; and wherein said verification protocol includes a generation of a random number by said client, an encryption of said random number by said client using said second key, a delivery of said random number and said encrypted random number from said client to said access controller, a decryption of said encrypted number using said updated first key by said access controller, a comparison of said random number and said decrypted number, and a decision to pass at least a portion of said instructions if said comparison finds a match of said random number with said decrypted number, and a decision not to pass said at least a portion of said instructions if no match is found. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An authentication server for securing access between a client having temporary connection to a computer via an access controller, said access controller for selectively passing instructions received from said client to said computer if a verification protocol utilizing a set of keys is met, said authentication server comprising:
-
means for receiving a request from said access controller for an updated first key; means for authenticating said request; means for determining said updated first key and a second key corresponding to said updated first key; means for delivering said updated first key to said access controller; and wherein said verification protocol includes a generation of a random number by said client, an encryption of said random number by said client using said second key, a delivery of said random number and said encrypted random number from said client to said access controller, a decryption of said encrypted number using said updated first key by said access controller, a comparison of said random number and said decrypted number, and a decision to pass at least a portion of said instructions if said comparison finds a match of said random number with said decrypted number, and a decision not to pass said at least a portion of said instructions if no match is found. - View Dependent Claims (12)
-
Specification