×

Secured networks and endpoints applying internet protocol security

  • US 9,794,237 B2
  • Filed: 06/29/2015
  • Issued: 10/17/2017
  • Est. Priority Date: 01/31/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method of managing secure communications states in an endpoint within a secure network, the method comprising:

  • in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token, the authorization token including one or more entries, each entry corresponding to a community of interest associated with a user of the first endpoint and including an encryption key and a validation key associated with the first endpoint and encrypted with a corresponding community of interest key and entering a pending state;

    in the pending state, receiving from the second endpoint a second message including a second authorization token at the first endpoint, the second authorization token including one or more entries, each entry corresponding to a community of interest associated with the second endpoint and including an encryption key and a validation key associated with the second endpoint and encrypted with the corresponding community of interest key;

    based on receipt of the second message, entering an open state and initializing a tunnel between the first and second endpoints using an IPsec-based secured connection; and

    upon termination of the tunnel due to a termination or timeout message issued by at least one of the first and second endpoints, entering a closed state;

    wherein a community of interest includes a plurality of users having common user rights and segregating user groups by way of assignment of different cryptographic keys used for each user group, and any message from by an unauthorized endpoint that is not a member of the community of interested are not responded to in any way.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×