System for providing secure remote command execution network

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000

Reexamination Certificate

active

06198824

ABSTRACT:

BACKGROUND OF THE INVENTION
The present invention relates to improving the security of data transmission between computers using an insecure network, particularly to methods and systems for improving the integrity and security of messages transmitted from a client to a network server and then to a destination server or from the destination server to a network server and then to the client as part of a distributed computer system.
A distributed computer system contains multiple distinct computers, which are interconnected. One simple example of a general-purpose distributed system is a networked system containing several workstations and servers interconnected through a network. Networks are popular because they allow organizations to share information and resources. Furthermore, in a networked system, if one computer breaks, or “crashes,” the others may continue to operate.
The type, cost and reliability of the manner of interconnection can be important considerations in networked systems. Large networks over relatively short distances typically use local area networks (LAN) such as an Ethernet or a Token Ring, which permit communications between a number of different computers on one or more wires. The use of modems allows computer networks to be created over a larger area, because the connections can be made over data links such as telephone lines. Wide area networks (WAN) typically use a combination of fiber optic and copper wire telephone lines as well as microwave links and satellites to connect several smaller LANs. Networks of networks are often referred to as internetworks.
Computer networks, particularly internetworks, can be vulnerable to security breaches. The degree of security of each component in the network differs, in part because each entity may be protected by varying layers of physical and operational security. Furthermore, each component or network in an internetwork may be owned or controlled by different organizations whose security practices differ widely. The interconnections between the computers may be similarly insecure. Since some part of the network may use physically insecure links, such as telephone lines or microwave links, hackers and interlopers may eavesdrop or intercept communications over the telephone line and modify them according to their wishes or copy them for later use. Interlopers who copy login and/or command information have the potential to use that information to gain access to other computers on the network.
Network security is typically based on three general concepts. For every request to do an operation, such as execute a diagnostic routine or perform a remote login, the network 1) authenticates the request; 2) controls access via access control criteria; and, 3) audits every request to detect unauthorized uses.
Authentication is the process of determining that an authorized user initiated the request and that the request was not modified improperly by an interloper on the way to the destination. One common example of authentication is the use of a password at time of login. Upon receiving a username and password from the user, a host computer compares the password to a list of authorized usernames in an access control file, and if the password matches the password associated with that username, the host computer allows access. In the situation just described, however, it is assumed that the user and host are communicating over a secure connection; otherwise, interlopers could intercept the communications from the user to the host and steal the username and password information. The interloper could then illegally access the host at a later time by using the stolen username and password information.
In a networked system comprising multiple interconnected computers, a first computer may request service from a second or destination server through an intermediate server. This first computer is typically called a client. In order to receive service from a destination server, the client must begin by authenticating itself to the destination server. However, because the client may be communicating to the destination server over an insecure line, the client cannot simply send a password in the clear. Instead, the client and the destination server may engage in a multiple query and response exchange, constituting an authentication process, which will convince the destination server that the requesting client is an authorized user.
The prior art includes examples of encryption-based authentication processes that can be used to so authenticate a client to such a server. Such authentication processes can be based either on public-key or secret-key encryption systems. In a typical secret-key authentication scheme, each authorized party possesses a secret key, which is known only by the party and is registered with a trusted third party, or authentication server. The authentication server maintains a list of registered users and secret keys and, therefore, must be physically secure. By contrast, in a public-key authentication system, each user has a public key and a private key. The public key is posted; the private key is known only to the user. Authentication using a public-key authentication system is attractive because it does not require a secure authentication server.
One example of a secret-key based network authentication system is the trusted third-party authentication service called Kerberos. Network services and clients requiring authentication register with Kerberos and receive a secret key, where said key (or a pass phrase from which it can be derived) is known only to the user and a Kerberos host server. Kerberos also generates temporary session keys, which can be used to encrypt messages between two registered Kerberos principals (users or hosts). A typical Kerberos software package is Kerberos Version 5 from Project Athena at the Massachusetts Institute of Technology (MIT). The Kerberos authentication scheme also is discussed in J. Kohl and C. Neuman, The Network Authentication Service (V5), Request for Comments: 1510 (September 1993). Kerberos and other trusted third-party private authentication schemes can allow for speedier, secure access between two principals.
Other prior art systems have been developed to address network security issues. For example, two authentication protocols, Secure Sockets Layer (SSL) and Secure Hyper Text Transfer Protocol (S-HTTP), have been designed specifically to protect the information being transmitted across the Internet by using encryption. Both the client and the destination server must support SSL. SSL is application independent and operates at the Transport layer, meaning that it operates with application protocols such as HTTP, ftp, telnet, gopher, Network News Transport Protocol (NNTP), and Simple Mail Transport Protocol (SMTP). SSL supports several cryptographic algorithms to handle the authentication and encryption routines between the client and the server.
S-HTTP is a secure extension of HTTP, a communications protocol of the World Wide Web. S-HTTP is a publicly available protocol developed by Enterprise Integration Technologies. Unlike SSL, S-HTTP is more closely related to the HTTP protocol. Also, while SSL typically encrypts the communications link between a client and a server, S-HTTP can encrypt each message individually. In a client/server transaction under S-HTTP, the client does not need to possess a public key. Secure transactions may take place at any time, because the sender of an S-HTTP message sends its cryptographic preferences along with the message.
A current trend in distributed system development is the concept of managed hosts. In a managed host system, a client will access a network server and, via the network server, request access to a second server, which may be referred to as the remote host, or the managed host. In larger networks, the network server may be acting as a gateway and proxy for a large number of clients to access a large number of destination servers. In order for the transaction from a client to a destination server to be secure, both th

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for providing secure remote command execution network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for providing secure remote command execution network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for providing secure remote command execution network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2452058

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.