Secure network computing
First Claim
1. A host based security system for a computer network comprising:
- a local computer in communication with said network;
a destination site in communication with said network, said destination site having a credential authentication policy under which credentials associated with said local computer upon being authenticated authorizes data to be communicated between each of said destination site and said local computer during a communication session over said network; and
a credential host in communication with said network and at which said credentials are stored, said credential host being operative to transmit said credentials onto said network in response to a request received from said local computer, said destination site upon said credentials being received and authenticated thereat being operative to transmit session information onto said network;
said local computer being in communication with said destination site during said communication session in accordance with said session information.
2 Assignments
0 Petitions
Accused Products
Abstract
A host based security system for a computer network includes in communication with the network a credential host that is operative in concert with a local computer and a destination site. The destination site has a credential authentication policy under which credentials associated with the local computer upon being authenticated authorizes data to be communicated between each of the destination site and the local computer during a communication session over the network. The credential host stores the credentials to be used by the destination and is operative to transmit the credentials onto the network in response to a request received from the local computer. The destination site upon the credentials being received and authenticated thereat is operative to transmit session information onto the network. In turn, the local computer is then operative to commence the communication session upon receipt of said the information.
46 Citations
116 Claims
-
1. A host based security system for a computer network comprising:
-
a local computer in communication with said network; a destination site in communication with said network, said destination site having a credential authentication policy under which credentials associated with said local computer upon being authenticated authorizes data to be communicated between each of said destination site and said local computer during a communication session over said network; and a credential host in communication with said network and at which said credentials are stored, said credential host being operative to transmit said credentials onto said network in response to a request received from said local computer, said destination site upon said credentials being received and authenticated thereat being operative to transmit session information onto said network;
said local computer being in communication with said destination site during said communication session in accordance with said session information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58)
-
-
59. A host based security method for a computer network comprising steps of:
-
transmitting credentials onto said network from a credential host at which said credentials are stored in response to a request received from a local computer in communication with said network; receiving said credentials at a destination site in communication with said network, said destination site having a credential authentication policy under which credentials associated with said local computer upon being authenticated authorizes data to be communicated between each of said destination site and said local computer during a communication session over said network; and transmitting session information onto said network from said destination site upon said credentials being received and authenticated thereat;
said local computer being in communication with said destination site during said communication session in accordance with said session information. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116)
-
Specification