Key management for network communication
DCFirst Claim
1. A method for enabling computers to communicate using encrypted network packets, comprising:
- sending a configuration request over a network from a first computer to a second computer;
providing a temporary configuration password to the first computer;
encrypting, in accordance with the temporary configuration password, tunnel record information that includes a secret tunnel encryption key assigned to a tunnel between the first computer and the second computer; and
sending the tunnel record information over the network from the second computer to the first computer.
11 Assignments
Litigations
4 Petitions
Accused Products
Abstract
The invention features a method for enabling computers to communicate using encrypted network packets. A configuration request is sent over a network from a first computer to a second computer, and tunnel record information is sent over the network from the second computer to the first computer. The tunnel record information is encrypted in accordance with a temporary configuration password.
The invention also features a method for updating a tunnel record. A connection request is sent from a first computer to a second computer, and the first computer is authorized. A tunnel record corresponding to the connection request with the first computer'"'"'s network address is then updated.
119 Citations
9 Claims
-
1. A method for enabling computers to communicate using encrypted network packets, comprising:
-
sending a configuration request over a network from a first computer to a second computer; providing a temporary configuration password to the first computer; encrypting, in accordance with the temporary configuration password, tunnel record information that includes a secret tunnel encryption key assigned to a tunnel between the first computer and the second computer; and sending the tunnel record information over the network from the second computer to the first computer. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for updating a tunnel record, comprising:
-
sending a connection request from a first computer to a second computer; authenticating the first computer; and updating a tunnel record corresponding to the connection request with the first computer'"'"'s network address. - View Dependent Claims (7, 8)
-
-
9. A method for enabling computers to communicate using encrypted network packets, comprising:
-
generating a temporary configuration password on a firewall computer; sending a configuration request over a public network from a second computer to the firewall computer; sending tunnel record information that includes a tunnel encryption key over the public network from the firewall computer to the second computer, the tunnel record information being encrypted in accordance with the temporary configuration password; and deleting the temporary configuration password on the firewall computer.
-
Specification