Secure network access
First Claim
1. A system for facilitating access by a user to a secure network site, the system including an active agent arranged to access the network site on behalf of the user, the active agent being arranged, in response to a user query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information from the secure network site.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An active software agent is utilised to fetch passwords and user identifiers from a user computing system and to use the passwords and identifiers to extract required information from the secure site. The password sites and identifiers are encrypted and an encryption key is stored at a network mode remote from the user'"'"'s computer and is fetched in order to enable the passwords and identifiers to be decrypted so that the active agent can use them to obtain the required information.
62 Citations
23 Claims
- 1. A system for facilitating access by a user to a secure network site, the system including an active agent arranged to access the network site on behalf of the user, the active agent being arranged, in response to a user query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information from the secure network site.
-
12. A method of facilitating access to secure network sites, comprising the steps of utilising an active agent to obtain user access means and utilising the secure access means to obtain content from the secure network access site.
-
13. A security authorisation means arranged to authorise an active agent for access to a secure network site, the active agent being arranged to access the network site on behalf of the user, and being arranged, in response to a user query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information from the secure work sites.
-
14. A system for facilitating access by a user to a secure network site, the system comprising a decryption key repository which is accessible by a user system via the network to enable the user system to obtain a decryption key associated with the user, the decryption key being able to decrypt encrypted user access means so that they can be used to access secure sites.
-
15. A registration system for facilitating registration to a system for facilitating access by a user to a secure network site, the system for facilitating access by a user to a secure network site including an active agent arranged to access the network site on behalf of the user, the active agent being arranged, in response to a user query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information from the secure network site, the registration system including a directory listing active agents that a user may obtain access to
-
16. An agent provider site for providing an active agent arranged to access a secure network site on behalf of a user, the active agent being arranged, in response to a user query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information from the secure site, the provider site including an active agent repository storing an active agent for access by the user system.
-
17. A user system for facilitating access to secure network sites, the user system including an active agent engine, arranged to execute an active agent on behalf of the user, the active agent being arranged to access the network site on behalf of the user and, in response to a user query, to obtain access means for enabling access to extract private information from the secure network site.
-
18. A method of operating a system facilitating access by a user to a secure network site, the system including an active agent arranged to access the network site on behalf of the user, the active agent being arranged, in response to a user query, to obtain access means for enabling access to a secure site and to utilise the access means to extract private information from the secure network site, the method comprising the steps of making the active agent available to the first network node remote from a user system, and providing the active agent to the user system in response to a user request.
- 19. A computer program arranged, when loaded into a computing system, to control the computing system to provide an active agent arranged to access network sites on behalf of the user, the active agent being arranged, in response to a suer query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information form the secure network site.
-
20. A computer program arranged, when loaded into a computing system, to control the computing system to provide a security authorisation means arranged to authorise an active agent for access to a particular network site, the active agent being arranged to access a network site on behalf of a user, and being arranged, in response to a user query, to obtain access means for enabling access to the secure site, and to utilise the access means to extract private information from the secure network site.
-
21. A computer program arranged, when loaded into a computing system, to control the computing system to provide a decryption key, the decryption key being able to decrypt encrypted user access means so that they can be used to access secure sites.
-
22. A computer program arranged, when loaded into a computing system, to control the computing system to provide an active agent engine, the active agent engine being arranged to execute an active agent on behalf of a user, the active agent arranged to access a network site on behalf of the user and, in response to a user query, to obtain access means for enabling access to the secure site and to utilise the access means to extract private information form the secure network site.
Specification