Secured gateway interface
First Claim
1. A method for directing an internal computer system to allow an external computer system to initiate a transaction request using internal resources without violating a security firewall between the internal computer system and the external computer system, comprising the steps of:
- authenticating a connection initiated by the internal computer system between the internal computer system and the external computer system, thereby establishing an authenticated connection;
calling by the external computer system a transaction request received by the external computer system;
in response to calling the transaction request, creating by the external computer system an original process environment containing process environment variables, and creating a string comprising the transaction request and the process environment variables for executing the transaction request;
transmitting by the external computer system the string to the internal computer system through the authenticated connection;
verifying by the internal computer system the transaction request;
recreating by the internal computer system the original process environment; and
executing by the internal computer system the transaction request, thereby generating an output.
2 Assignments
0 Petitions
Accused Products
Abstract
Accordingly, a computer implemented method, uniquely programmed computer system, and article of manufacture embodying computer readable program means all allow a customer on an external network to initiate an authorized business transaction utilizing internal business resources on an internal network without violating security firewalls. Specifically, the method directs an internal computer system to allow an external computer system to initiate a transaction request using internal resources without violating a security firewall between the internal computer system and the external computer system. The method includes a first step of authenticating a connection initiated by the internal computer system between the internal computer system and the external computer system, thereby establishing an authenticated connection. The second step includes calling by the external computer system a transaction request received by the external computer system. In response to calling the transaction request, the third step includes creating by the external computer system a string comprising the transaction request, arguments, and process environment variables for executing the transaction request. The fourth step includes transmitting by the external computer system the string to the internal computer system through the authenticated connection. The fifth step includes verifying by the internal computer system the transaction request. The sixth step includes recreating by the internal computer system the original process environment. The final step includes executing by the internal computer system the transaction request, thereby generating an output.
251 Citations
12 Claims
-
1. A method for directing an internal computer system to allow an external computer system to initiate a transaction request using internal resources without violating a security firewall between the internal computer system and the external computer system, comprising the steps of:
-
authenticating a connection initiated by the internal computer system between the internal computer system and the external computer system, thereby establishing an authenticated connection; calling by the external computer system a transaction request received by the external computer system; in response to calling the transaction request, creating by the external computer system an original process environment containing process environment variables, and creating a string comprising the transaction request and the process environment variables for executing the transaction request; transmitting by the external computer system the string to the internal computer system through the authenticated connection; verifying by the internal computer system the transaction request; recreating by the internal computer system the original process environment; and executing by the internal computer system the transaction request, thereby generating an output. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A uniquely programmed system for directing an internal computer system to allow an external computer system to initiate a transaction request using internal resources without violating a security firewall between the internal computer system and the external computer system, comprising:
-
means for authenticating a connection initiated by the internal computer system between the internal computer system and the external computer system, thereby establishing an authenticated connection; means for calling by the external computer system a transaction request received by the external computer system; in response to calling the transaction request, means for creating by the external computer system an original process environment containing process environment variables, and means for creating a string comprising the transaction request, the arguments, and the process environment variables for executing the transaction request; means for transmitting by the external computer system the string to the internal computer system through the authenticated connection; means for verifying by the internal computer system the transaction request; means for recreating by the internal computer system the original process environment; and means for executing by the internal computer system the transaction request, thereby generating an output.
-
-
12. An article of manufacture, comprising:
-
a computer usable medium having computer readable program code means embodied therein for causing an internal computer system to allow an external computer system to initiate a transaction request using internal resources without violating a security firewall between the internal computer system and the external computer system, the computer readable program code means in said article of manufacture comprising; computer readable program means for authenticating a connection initiated by the internal computer system between the internal computer system and the external computer system, thereby establishing an authenticated connection; computer readable program means for calling by the external computer system a transaction request received by the external computer system; in response to calling the transaction request, computer readable program means for creating by the external computer system an original process environment containing process environment variables, and computer readable program means for creating a string comprising the transaction request and, the process environment variables for executing the transaction request; computer readable program means for transmitting by the external computer system the string to the internal computer system through the authenticated connection; computer readable program means for verifying by the internal computer system the transaction request; computer readable program means for recreating by the internal computer system the original process environment; and computer readable program means for executing by the internal computer system the transaction request, thereby generating an output.
-
Specification