Use of static Diffie-Hellman key with IPSec for authentication

a static diffie-hellman key and authentication technology, applied in the field of computer systems, can solve the problems of unauthorized user receiving, viewing, and even modifying information transmitted over a network, and the standard ip lacks other features such as authentication of users and network devices

Inactive Publication Date: 2005-07-07
ROVI TECH CORP
View PDF36 Cites 120 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0013] In still another embodiment, a system is provided for establishing a secure communications channel between networked devices comprising a first networked device generating a Diffie-Hellman (DH) key pair, a portable media device storing the DH key pair generated by the first networked device, a second networked device reading the DH key pair from the portab

Problems solved by technology

Often, the information exchanged between computers is of a sensitive or confidential nature.
Similarly, users routinely transmit sensitive and confidential business information over networks.
IP was designed to allow for an open exchange of information; however, standard IP was not des

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use of static Diffie-Hellman key with IPSec for authentication
  • Use of static Diffie-Hellman key with IPSec for authentication
  • Use of static Diffie-Hellman key with IPSec for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The methods and systems supporting the use of a static Diffie-Hellman key pair to authenticate devices during an IPSec protocol will now be described with respect to a number of embodiments; however, the methods and systems of the invention are not limited to the illustrated embodiments. Moreover, the skilled artisan will readily appreciate that the methods and systems described herein are merely exemplary and that variations can be made without departing from the spirit and scope of the invention.

[0023] The invention will be more completely understood through the following detailed description, which should be read in conjunction with the attached drawings. In this description, like numbers refer to similar elements within various embodiments of the present invention. The invention is illustrated as being implemented in a suitable computing environment. Although not required, the invention will be described in the general context of computer-executable instructions, such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention authenticate devices and establish secure connections between devices using static Diffie-Hellman key pairs. A first device obtains in a trusted manner a static DH public key of a second device prior to negotiation. The second device negotiates a secure connection to the first device using a shared secret created from the static DH public key, which serves as both a claim on the second device's identity and an encryption key. The static DH public key can be used to establish subsequent secure, authenticated communications sessions.

Description

CROSS-REFERENCE TO RELATED APPLICATION [0001] The present application claims the benefit of Abraham et al., U.S. Provisional Patent Application No. 60 / 534,795 entitled, “Configuring Network Settings Using Portable Media”, filed on Jan. 7, 2004, which is hereby incorporated by reference in its entirety.FIELD OF THE INVENTION [0002] This invention generally relates to the area of computer systems. More particularly, the present invention concerns methods for facilitating the use of a security protocol to protect network communications, and even more particularly to methods for negotiating security parameters and authenticating users interconnected to a network. BACKGROUND OF THE INVENTION [0003] Computer networks provide an efficient way to exchange information between two or more computers. Various types of computer networks are utilized including private networks, e.g., local area networks (LANs), and public networks, e.g., the Internet. Often, the information exchanged between comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G05B15/00H04L9/00H04L12/24H04L12/28H04L12/56H04L29/06H04L29/08
CPCH04L29/06H04W12/04H04L41/0843H04L41/0879H04L63/0272H04L63/0435H04L63/0442H04L63/061H04L63/062H04L63/0853H04L63/164H04L63/20H04W12/02H04W12/06H04W28/18H04W48/08H04W48/16H04W76/02H04L67/303H04L67/02H04L69/329H04L41/0806H04W76/10H04W12/041H04W12/065H04L9/40
Inventor FREEMAN, TREVOR W.MANCHESTER, SCOTTMAYFIELD, PAUL G.SWANDER, BRIAN D.
Owner ROVI TECH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products