Method and system for secure communication
First Claim
Patent Images
1. A method for secure communication comprising:
- generating a virtual private proxy based on an agreement between a first entity and a second entity;
associating a first virtual private proxy with the first entity and a second virtual private proxy with the second entity;
monitoring data at the first virtual private proxy associated with the first entity;
determining whether the data violates the agreement; and
disallowing communication of the data from the first virtual private proxy to the second virtual private proxy when the data violates the agreement.
11 Assignments
0 Petitions
Accused Products
Abstract
A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.
62 Citations
55 Claims
-
1. A method for secure communication comprising:
-
generating a virtual private proxy based on an agreement between a first entity and a second entity;
associating a first virtual private proxy with the first entity and a second virtual private proxy with the second entity;
monitoring data at the first virtual private proxy associated with the first entity;
determining whether the data violates the agreement; and
disallowing communication of the data from the first virtual private proxy to the second virtual private proxy when the data violates the agreement. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for secure communication comprising:
-
means for generating a virtual private proxy based on an agreement between a first entity and a second entity;
means for associating a first virtual private proxy with the first entity and a second virtual private proxy with the second entity;
means for monitoring data at the first virtual private proxy associated with the first entity;
means for determining whether the data violates the agreement; and
means for disallowing communication of the data from the first virtual private proxy to the second virtual private proxy when the data violates the agreement.
-
-
14. A system for secure communication comprising:
logic stored on a medium and operable to;
generate a virtual private proxy based on an agreement between a first entity and a second entity;
associate a first virtual private proxy with the first entity and a second virtual private proxy with the second entity;
monitor data at the first virtual private proxy associated with the first entity;
determine whether the data violates the agreement; and
disallow communication of the data from the first virtual private proxy to the second virtual private proxy when the data violates the agreement. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
26. A method for secure communication comprising:
-
generating a first virtual private proxy associated with a first entity;
generating a second virtual private proxy associated with a second entity;
monitoring communications between the first virtual private proxy and the second virtual private proxy based on an agreement for electronic data exchange between the first and second entities; and
responding to violations of the agreement based on the agreement. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A system for secure communication comprising:
-
means for generating a first virtual private proxy associated with a first entity;
means for generating a second virtual private proxy associated with a second entity;
means for monitoring communications between the first virtual private proxy and the second virtual private proxy based on an agreement for electronic data exchange between the first and second entities; and
means for responding to violations of the agreement based on the agreement.
-
-
41. A system for secure communication comprising:
logic stored on storage and operable to;
generate a first virtual private proxy associated with a first entity;
generate a second virtual private proxy associated with a second entity;
monitor communications between the first virtual private proxy and the second virtual private proxy based on an agreement for electronic data exchange between the first and second entities; and
respond to violations of the agreement based on the agreement. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
55. A method for secure communication comprising:
-
generating a virtual private proxy based on an agreement between a first entity and a second entity;
wherein the agreement further comprises a document exchange protocol indication and a process specification document indication;
associating a first virtual private proxy with the first entity and a second virtual private proxy with the second entity;
wherein the first virtual private proxy comprises a logical representation of a logical access point between the first entity and a secure switch;
monitoring data at the first virtual private proxy associated with the first entity;
examining the data with respect to the agreement at the first virtual private proxy;
determining whether the data is allowed by the agreement;
indicating a violation when the data does not conform to the agreement; and
disallowing communication of the data from the first virtual private proxy to the second virtual private proxy when the data violates the agreement.
-
Specification