The present invention relates generally to the field of computer networks and more particularly to a network security system and method.
Security for Local Area Networks (LAN) and Wide Area Networks (WAN) is major concern for organizations. This problem has become worse with the spread of Wireless Networks and Wireless Hotspots where hacker can grab the wireless data or intrude in the Network to steal the important information. A Code called Wireless Equivalency Protocol (WEP) used by most individuals and organizations has been broken and its cracking code is openly available. Virtual Private Network (VPN) is hard to configure and difficult to use. One problem with the security of networks is unauthorized users access a network. One solution has been to require user IDs and passwords to access a network. Since these are commonly sent in the clear, they can be intercepted by hackers. Even if the password and ID are encrypted this may be stolen and copied and used to gain access to the network. Digital certificates can also be stole and cloned. Another security problem that occurs in networks is that once a terminal, which may be computer, personal digital assistant (PDA), cell phone or other networked device, has been granted access to the network there is no way of verifying that the authenticated terminal is actually transmitting the associated frames.
Thus there exists a need for a network security system that has an access authentication system that cannot be spoofed by coping passwords and IDs and that verifies that the authenticated terminal is actually transmitting the associated frames. This Network authentication system works in addition to the other network security products and systems and provides an extra layer of security for mutual authentication and packets security and integrity.
A network security system that overcomes these and other problems has a terminal access authentication system with a physical key for authenticating a terminal. A frame authentication system is coupled to the terminal and authenticates each frame sent from the terminal and key exchange protocol. The terminal access authentication system may have an authentication server. The authentication server may have an authorization database containing a copy of the physical key. The terminal may have a dynamic key. The terminal and the authentication server may perform a mutual authentication. The frame authentication system may include an authenticator that is separate from the terminal or a receiver. The authenticator may convert a signed frame into an unsigned standard frame. The authenticator may forward the unsigned standard frame to a destination. The frame authentication system may include a signature algorithm operating on the terminal. The signature algorithm may calculate a partial cyclical redundancy code of a frame.
In one embodiment, a network security method includes the steps of encrypting a physical key at a station with a dynamic encryption key to form an encrypted physical key. The encrypted physical key is transmitted to an access authentication server. The encrypted physical key is decrypted to form a decrypted key. When the decrypted key matches a stored key, a new dynamic key may be transmitted to the station. When the decrypted key matches a stored key at the access authentication server, a server physical key is encrypted using a server dynamic key to form an encrypted server physical key. The encrypted server physical key is transmitted to the station. The encrypted server physical key is decrypted to form a decrypted server physical key. The decrypted server physical key is compared to a stored server key. When the decrypted server physical key matches the stored server key, a signature algorithm is used to form a signed frame. The signed frame is encrypted to form an encrypted signed frame. The encrypted signed frame may be transmitted to a frame authenticator. The encrypted signed frame is decrypted to recover a decrypted signature. The decrypted signature is compared to a stored signature. When the decrypted signature is the same as the stored signature, an unsigned standard frame is transmitted to a destination.
In one embodiment, a network security method includes the steps of creating a signed frame at a transmitting station. The signed frame is received at a frame authenticator. When a signature of the signed frame is authentic, an unsigned standard frame is transmitted to a receiving station. A partial cyclical redundancy code is calculated for a frame to form a signature. The frame and the signature are encrypted to form the signed frame. When the signature of the signed frame is not authentic, the signed frame may be discarded. The transmitting station's identity may be authenticated before receiving access to a network. A physical key at the transmitting station may be encrypted with a dynamic encryption key to form an encrypted physical key. The encrypted physical key is transmitted to an access authentication server. The encrypted physical key is decrypted to form a decrypted key.
The network security system and method described herein authenticates any terminal requesting access to the network and then authenticates every frame of data sent from the terminal. In this way the terminal's right to access the network is constantly verified. This system cannot be spoofed by coping passwords and IDs and verifies that the authenticated terminal is actually transmitting the associated frames.
In one embodiment, once the terminal has been authenticated it authenticates the server 50. The server 34 encrypts a server physical key 42 to form an encrypted server physical key. The encrypted server physical key is transmitted to the terminal 32. The terminal 32 decrypts the encrypted server physical key using the stored dynamic key 38. If the decrypted server physical key matches a stored server physical key 52, the server has been authenticated and normal communication can proceed. When the terminal 32 also authenticates the server 34, this is called mutual authentication. Once the authentication process is complete the server 34 sends the terminal a new dynamic key. As a result, the authentication message 48 is never the same. This makes it virtually impossible to detect the dynamic code and, in turn, the key code or physical key. In one embodiment the physical key is not directly encrypted, it is first scrambled by an algorithm known to both the server 34 and the terminal 32.
The system and method for network security are easy to use. The terminal authentication software and the frame authentication software may be downloaded onto the computer and server from a website in one embodiment. The key exchange protocol can be downloaded from a secured website. To start using the software, the only other step necessary is to procure a physical key. No other configuration of the systems is necessary. As a result, the easy of use of the security system significantly enhances its chance of being used over other more complicated solutions.
Thus there has been described a network security system and method that cannot be spoofed by coping passwords and IDs and that verifies that the authenticated terminal is actually transmitting the associated frames.
The methods described herein can be implemented as computer-readable instructions stored on a computer-readable storage medium that when executed by a computer will perform the methods described herein.
While the invention has been described in conjunction with specific embodiments thereof, it is evident that many alterations, modifications, and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended to embrace all such alterations, modifications, and variations in the appended claims.
The present invention claims priority on provisional patent application Ser. No. 60/529,471, filed on Dec. 15, 2003, entitled “Secure Ethernet” and on provisional patent application Ser. No. 60/529,653, filed on Dec. 15, 2003, entitled “Network Security System”.
| Number | Date | Country | |
|---|---|---|---|
| 60529471 | Dec 2003 | US | |
| 60529653 | Dec 2003 | US |