Processing

Please wait...

PATENTSCOPE will be unavailable a few hours for maintenance reason on Saturday 31.10.2020 at 7:00 AM CET
Settings

Settings

Goto Application

1. WO2012055794 - METHOD FOR MANAGING KEYS IN A MANIPULATION-PROOF MANNER

Publication Number WO/2012/055794
Publication Date 03.05.2012
International Application No. PCT/EP2011/068491
International Filing Date 24.10.2011
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04L 12/22 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12Data switching networks
02Details
22Arrangements for preventing the taking of data from a data transmission channel without authorisation
CPC
H04L 63/0272
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
02for separating internal from external traffic, e.g. firewalls
0272Virtual private networks
H04L 63/0428
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
04for providing a confidential data exchange among entities communicating through data packet networks
0428wherein the data content is protected, e.g. by encrypting or encapsulating the payload
H04L 63/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
H04L 63/061
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
06for supporting key management in a packet data network
061for key exchange, e.g. in peer-to-peer networks
H04L 63/0884
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0884by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Applicants
  • SIEMENS AKTIENGESELLSCHAFT [DE]/[DE] (AllExceptUS)
  • FALK, Rainer [DE]/[DE] (UsOnly)
  • SATTLER, Carsten [DE]/[DE] (UsOnly)
  • SEIFERT, Matthias [DE]/[DE] (UsOnly)
Inventors
  • FALK, Rainer
  • SATTLER, Carsten
  • SEIFERT, Matthias
Common Representative
  • SIEMENS AKTIENGESELLSCHAFT
Priority Data
10 2010 043 102.829.10.2010DE
Publication Language German (DE)
Filing Language German (DE)
Designated States
Title
(DE) VERFAHREN ZUR MANIPULATIONSGESICHERTEN SCHLÜSSELVERWALTUNG
(EN) METHOD FOR MANAGING KEYS IN A MANIPULATION-PROOF MANNER
(FR) PROCÉDÉ DE GESTION DE CLÉS PROTÉGÉ CONTRE LES MANIPULATIONS
Abstract
(DE)
Die Erfindung betrifft ein Verfahren zur manipulationsgesicherten Schlüsselverwaltung für ein virtuelles privates Netzwerk (15a), umfassend das Authentisieren eines Kommunikationsendgerätes (13) an einem Authentifizierungsserver (18) mit Hilfe eines ersten Schlüssels über ein öffentliches Netzwerk (15), das Bereitstellen eines Kommunikationsschlüssels, der für die Kommunikation über ein virtuelles privates Netzwerk (15a) in dem öffentlichen Netzwerk (15) geeignet ist, für das authentifizierte Kommunikationsendgerät (13) über das öffentliche Netzwerk (15), und das Verschlüsseln des Kommunikationsschlüssels in dem Kommunikationsendgerät (13) mit Hilfe eines zweiten Schlüssels, der durch eine manipulationsgeschützte Überwachungseinrichtung (14) bereitgestellt wird.
(EN)
The invention relates to a method for managing keys in a manipulation-proof manner for a virtual private network (15a), comprising the following steps: authenticating a communication terminal (13) on an authentication server (18) by means of a first key over a public network (15), providing a communication key, which is suitable for the communication over a virtual private network (15a) in the public network (15), for the authenticated communication terminal (13) over the public network (15), and encrypting the communication key in the communication terminal (13) by means of a second key, which is provided by a manipulation-protected monitoring device (14).
(FR)
L'invention concerne un procédé de gestion de clés protégé contre les manipulations pour un réseau privé virtuel (15a), comprenant l'authentification d'un terminal de communication (13) sur un serveur d'authentification (18) à l'aide d'une première clé par l'intermédiaire d'un réseau public (15), la production d'une clé de communication qui convient pour la communication par l'intermédiaire d'un réseau privé virtuel (15a) dans le réseau public (15) pour le terminal de communication (13) authentifié par l'intermédiaire du réseau public (15), et l'encodage de la clé de communication dans le terminal de communication à l'aide d'une deuxième clé qui est produite par un dispositif de surveillance (14) protégé contre les manipulations.
Latest bibliographic data on file with the International Bureau