Infrastructure Architecture for Secure Network Management with Peer to Peer Functionality
First Claim
1. A secure virtual network providing community nodes (2 or more participants) where the architecture of the network'"'"'s security and business management reporting is a result of the network architecture and where participants can maintain absolute security and control over their services independent of any other participant.
0 Assignments
0 Petitions
Accused Products
Abstract
Architecture defining a secure virtual network of communities of two or more participants where security and business management reporting is a result of a network architecture and where participants can maintain absolute security and control over their services independent of any other participant according to implemented selection rules of the network architecture administration.
99 Citations
37 Claims
- 1. A secure virtual network providing community nodes (2 or more participants) where the architecture of the network'"'"'s security and business management reporting is a result of the network architecture and where participants can maintain absolute security and control over their services independent of any other participant.
-
19. A network wherein authentication is accomplished via a digital certificate infrastructure including PKI where a Certificate Revocation service is used to remove a participant and/or gateway from the network.
-
20. A network where authorization is accomplished via an Access Control List (ACL) service used to confirm authorization of a service specific to the identities of all participants and the provisioning of a service to those identities by the service provider.
-
21. A network where authorization is accomplished via an Access Control List (ACL) service used to confirm authorization of a service specific to the identities of all participants and the provisioning of a service to those identities by the service provider and where a 2 stage ACL process is implemented in a manner where participants can further restrict access to their services through an ACL they administer but can not grant access not included in the 3rd party ACL.
-
22. A network wherein of mutual authentication and authorization where a service specific SSL tunnel is created as a result of a request for a service that has been provisioned to one or more participants where the SSL tunnel is created specific to that request and disposed of when the request is completed and where the identity of and access rights of the participants is validate prior to the execution of a service provisioned to the network by a service provider participant.
-
25. A network for the creation of an encrypted virtual network connection where prerequisite to a connection is the validation of the identity of all participants in the activity and authorization validation specific to the provisioning of an activity to one or more requesters a service has been provisioned to.
Specification