Method and transaction interface for secure data exchange between distinguishable networks
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, the present invention includes a method for secure data exchange between an external network and an internal network (1 and 2) via a transaction interface (3), in which an external user can undertake predetermined data transactions within the internal network (2). An interface server (7) and interface memory (11) may be coupled between an external network and an internal network. The present invention discloses security techniquest that may be used, including encryption, request processing, and checking. In one embodiment, a first firewall is coupled between the external network and the interface server and a second firewall is coupled between the interface server and the internal network.
88 Citations
75 Claims
-
1-29. -29. (canceled)
-
30. A method of secure data exchange comprising:
-
receiving a request from an external network in a first interface server;
comparing the request with a set of permissible requests;
storing the request in an interface memory coupled to the first interface server;
checking the interface memory exclusively from an internal server; and
processing the request in the internal server, wherein the request is processed if the request matches one of the permissible requests and the request is not processed if it does not match one of the permissible requests. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method of secure data exchange comprising:
-
receiving a request in a first interface server;
verifying the request;
storing the request in memory if the request is verified;
querying the memory using an internal server; and
sending the request to the internal server when the request is detected. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
-
58. A method of secure data exchange comprising:
-
receiving a user-ID and a first password in a first computer system;
sending the received user-ID to a second computer system through a first firewall;
accessing a second password in the second computer system using the user-ID;
encrypting the user-ID in the second computer system using the second password to produce an encrypted user-ID;
sending the second encrypted user-ID to the first computer system through the first firewall;
decrypting the encrypted user-ID using the first password to produce a first result; and
comparing the first result to the received user-ID, wherein processing is enabled if the first result matches the received user-ID. - View Dependent Claims (59, 60, 61)
-
-
62. A secure data exchange system comprising:
-
a first interface server;
an interface memory coupled to the first interface server;
a first firewall coupled between the first interface server and an external network;
s second firewall coupled between the first interface server and an internal network. - View Dependent Claims (63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
-
74. A method of secure data exchange comprising:
-
means for receiving a request from an external network in a neutral zone;
means for comparing the request with a set of permissible requests;
means for storing the request in the neutral zone;
means for checking for stored requests exclusively from an internal network; and
means for processing the request in the internal network. - View Dependent Claims (75)
-
Specification