Securing applications based on application infrastructure security techniques
First Claim
1. A system for providing secure access via a public network for at least one client computer to a local network having a legacy system, comprising:
- a) a client computer in communication with a public network;
b) an access service zone operating as a touch point for communication with the client computer;
c) a network identity service zone providing network security techniques for securing communications with the client computer;
d) a first firewall between the access service zone and the network identity service zone;
e) a second firewall between the network identity service zone and network application zone;
whereby secure access to the network application zone can be provided to a user at the client computer.
1 Assignment
0 Petitions
Accused Products
Abstract
The preferred embodiments relate to a system for providing secure access via a public network for at least one client computer to a local network having a legacy system. The system preferably includes a client computer in communication with a public network, an access service zone operating as a touch point for communication with the client computer, a network identity service zone providing network security techniques for securing communications with the client computer, a first firewall between the access service zone and the network identity service zone, and a second firewall between the network identity service zone and a network application zone. Whereby, secure access to the network application zone can be provided to a user at the client computer. The preferred embodiments also align application infrastructure with application techniques used.
-
Citations
16 Claims
-
1. A system for providing secure access via a public network for at least one client computer to a local network having a legacy system, comprising:
-
a) a client computer in communication with a public network;
b) an access service zone operating as a touch point for communication with the client computer;
c) a network identity service zone providing network security techniques for securing communications with the client computer;
d) a first firewall between the access service zone and the network identity service zone;
e) a second firewall between the network identity service zone and network application zone;
whereby secure access to the network application zone can be provided to a user at the client computer. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for providing secure access via a public network for at least one client computer to a local system, comprising:
-
a) a first tier system configured for network access services;
b) a second tier system configured for network identity services; and
c) a third tier system configured for network application services. - View Dependent Claims (8)
-
-
9. A computer system for providing secure access via a public network for at least one client computer to a local system, comprising:
-
a) access means for providing network access alone to an external client computer at a first tier system;
b) identity means for providing all network identity services at a second tier system; and
c) services means for providing network application services at a third tier system. - View Dependent Claims (10, 11)
-
-
12. A method for creating a secure system providing services from within a private system to at least one client computer via a public network, comprising:
-
a) establishing a predetermined set of application infrastructure corresponding to application security techniques;
b) selecting application security techniques within said set; and
c) driving corresponding application infrastructure based on said selected application security techniques in accordance with the established set. - View Dependent Claims (13, 14, 15, 16)
-
Specification