US 11,811,916 B2
Method for securing data flows between a communication equipment and a remote terminal, equipment implementing the method
Nicolas Korber, Rueil Malmaison (FR); and Michaël Thien Bao Nguyen Dinh Hien, Rueil Malmaison (FR)
Assigned to SAGEMCOM BROADBAND SAS, Rueil Malmaison (FR)
Filed by SAGEMCOM BROADBAND SAS, Rueil Malmaison (FR)
Filed on Nov. 12, 2020, as Appl. No. 17/096,412.
Claims priority of application No. 1913458 (FR), filed on Nov. 29, 2019.
Prior Publication US 2021/0167951 A1, Jun. 3, 2021
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 29/06 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/0825 (2013.01) [H04L 9/14 (2013.01); H04L 9/3268 (2013.01); H04L 63/0428 (2013.01)] 11 Claims
OG exemplary drawing
 
1. A method for securing a data flow between a communication device and a remote terminal, said communication device comprising a first communication interface for a connection to a first local network of the LAN type, and a second communication interface for a connection to a second network, said device being configurable from the remote terminal, wherein the method comprises:
recording, by said communication device, a first key in a memory of said device,
generating and recording, by said device, a second encryption key, referred to as a private key, and a third encryption key, referred to as a public key, the public key being inserted in an authenticity certificate signed by the first key, the public key being able to be used for the encryption of a data flow that can be deciphered by means of the private key,
receiving, from the remote terminal, a request with a view to securing data flows between said communication device and the remote terminal,
checking that said request is received via said first interface for a connection to a first local network of the LAN type, and
if said request is received via said first interface for a connection to a first local network of the LAN type, sending, by said communication device, the public key to the remote terminal, in response to the request, and enabling remote configuration of said communication device via at least said second interface from the data flow encrypted by means of said public key.