Method and system for exchanging data over networks using public key encryption
First Claim
Patent Images
1. A method of exchanging private data over a network using public key encryption comprising:
- generating a public/private key pair of a network peripheral;
exposing the public key of the network peripheral in a network management protocol;
receiving encrypted configuration data from a remote network management protocol tool;
decrypting configuration data with the private key of the network peripheral; and
applying decrypted network configuration data to the configuration of the network peripheral.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for exchanging private data over an insecure network using public key encryption is disclosed. The method and system provides for generating a public/private key pair of a network peripheral, exposing the public key of the network peripheral in a network management protocol, receiving encrypted configuration data from a remote network configuration protocol tool, decrypting configuration data with the private key of the network peripheral and applying decrypted network configuration data to the configuration of the network peripheral.
38 Citations
27 Claims
-
1. A method of exchanging private data over a network using public key encryption comprising:
-
generating a public/private key pair of a network peripheral;
exposing the public key of the network peripheral in a network management protocol;
receiving encrypted configuration data from a remote network management protocol tool;
decrypting configuration data with the private key of the network peripheral; and
applying decrypted network configuration data to the configuration of the network peripheral. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer useable medium having computer useable code embodied therein for causing a computer to perform operations comprising:
-
generating a public/private key pair of a network peripheral;
exposing the public key of the network peripheral in a network management protocol;
accessing encrypted configuration data from a remote network protocol tool;
decrypting configuration data with the private key of the network peripheral; and
applying decrypted network configuration data to the configuration of the network peripheral;
wherein the configuration data is received in cipher text by the network peripheral. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system comprising:
-
a bus;
a computer readable memory unit connected to said bus;
a processor coupled to said bus said processor for executing a method for implementing an application comprising the steps of;
creating a public/private key pair of a network peripheral;
transmitting the public key of the network peripheral in a network management protocol;
receiving encrypted configuration data from a remote network management protocol tool;
decrypting configuration data with the private key of the network peripheral; and
applying decrypted network configuration data to the configuration of the network peripheral, wherein the public key is exposed in plain text and the configuration data is received in cipher text. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification