Secure Network Computing
First Claim
1. A host based security system for a computer network having a local computer and a destination site in communication therewith to eliminate substantially detection at the local computer of the input of user credentials which uniquely identify a user of the local computer wherein the destination site has associated therewith a credential authentication policy under which the user credentials when received at the destination site are authenticated with respect to registered credentials stored in association with the destination site, the system comprising:
- a credential host being in communication with the network and having the user credentials of the user of the local computer stored thereat, wherein the credential host intercepts a request transmitted onto the network by the local computer to connect securely to the destination site and further wherein the credential host in response to intercepting the request transmits the user credentials onto the network;
wherein the destination site upon receipt of the user credentials executes the credential authentication policy with the received user credentials and further wherein in the event the received user credentials are authenticated the destination site transmits secure session information onto the network; and
wherein the local computer upon receipt of the session information establishes a secure communication session with the destination site.
2 Assignments
0 Petitions
Accused Products
Abstract
A host based security system for a computer network includes in communication with the network a credential host that is operative in concert with a local computer and a destination site. The destination site has a credential authentication policy under which credentials associated with the local computer upon being authenticated authorizes data to be communicated between each of the destination site and the local computer during a communication session over the network. The credential host stores the credentials to be used by the destination and is operative to transmit the credentials onto the network in response to a request received from the local computer. The destination site upon the credentials being received and authenticated thereat is operative to transmit session information onto the network. In turn, the local computer is then operative to commence the communication session upon receipt of said the information.
10 Citations
46 Claims
-
1. A host based security system for a computer network having a local computer and a destination site in communication therewith to eliminate substantially detection at the local computer of the input of user credentials which uniquely identify a user of the local computer wherein the destination site has associated therewith a credential authentication policy under which the user credentials when received at the destination site are authenticated with respect to registered credentials stored in association with the destination site, the system comprising:
-
a credential host being in communication with the network and having the user credentials of the user of the local computer stored thereat, wherein the credential host intercepts a request transmitted onto the network by the local computer to connect securely to the destination site and further wherein the credential host in response to intercepting the request transmits the user credentials onto the network; wherein the destination site upon receipt of the user credentials executes the credential authentication policy with the received user credentials and further wherein in the event the received user credentials are authenticated the destination site transmits secure session information onto the network; and wherein the local computer upon receipt of the session information establishes a secure communication session with the destination site. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A host based security method for a computer network having a local computer and a destination site in communication therewith to eliminate substantially detection at the local computer of the input of user credentials which uniquely identify a user of the local computer wherein the destination site has associated therewith a credential authentication policy under which the user credentials when received at the destination site are authenticated with respect to registered credentials stored in association with the destination site, the method comprising steps of:
-
storing at a credential host the user credentials of the user of the local computer, the credential host being communication with the network; intercepting at the credential host a request transmitted onto the network by the local computer to connect securely to the destination site; transmitting the user credentials onto the network from the credential host in response to intercepting the request; executing at the destination site upon receipt of the user credentials the credential authentication policy with the received user credentials; transmitting onto the network from the destination site in the event the received user credentials are authenticated secure session information; and establishing a secure communication session at the local computer upon receipt of the session information. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification