Secure configuration of authentication servers
First Claim
Patent Images
1. A device comprising:
- a processor operable for assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node; and
a data structure comprising the plurality of assigned secrets and the node identifiers to which the respective secrets are associated;
wherein the device is operable to send the data structure to an authentication server, the authentication server being operable for obtaining an assigned secret of the plurality of assigned secrets from the data structure and to use the assigned secret to perform authentication for a node of the plurality of nodes.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to automatically populating a database of names and secrets in an authentication server by sending one or more lists of one or more names and secrets by a network management software to an authentication server. Furthermore, some embodiments provide that the lists being sent are encrypted and/or embedded in otherwise inconspicuous files.
85 Citations
20 Claims
-
1. A device comprising:
-
a processor operable for assigning a plurality of secrets to a plurality of nodes of a network, so that each respective secret is assigned to a respective node and associated with a node identifier of the respective node; and a data structure comprising the plurality of assigned secrets and the node identifiers to which the respective secrets are associated; wherein the device is operable to send the data structure to an authentication server, the authentication server being operable for obtaining an assigned secret of the plurality of assigned secrets from the data structure and to use the assigned secret to perform authentication for a node of the plurality of nodes. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
memory in a data structure comprising a plurality of assigned secrets and a plurality of node identifiers to which the respective secrets are associated; and an authentication processor in an authentication server operable for obtaining an assigned secret of the plurality of assigned secrets from the data structure and to use the assigned secret to perform authentication for a node of the plurality of nodes. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for configuring an authentication processor in an authentication server comprising:
-
generating a plurality of secrets; assigning the plurality of secrets to a plurality of nodes of a network, each secret being assigned to a node and each secret being associated with a node identifier of the respective node, thereby generating a plurality of secret assignments; securing the plurality of secret assignments; and communicating the secured plurality of secret assignments with an the authentication server. - View Dependent Claims (18, 19, 20)
-
Specification