System, method and article of manufacture for security management in a development architecture framework
First Claim
1. A method for providing security management in a development architecture framework comprising the steps of:
- (a) detecting unauthorized attempts to access a network;
(b) notifying a user upon detection of at least one of the unauthorized attempts to access the network;
(c) restricting access from the network to a separate wide area network;
(d) verifying identities of users of credit cards during transactions carried out over the network;
(e) monitoring content of information transmittal;
(f) preventing transmittal of information if the content does not adhere to standards; and
(g) encrypting electronic mail before transmission utilizing a network.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and article of manufacture are provided for providing security management in a development architecture framework. Unauthorized attempts to access a network are detected and when an unauthorized attempt to access the network is detected, a user is notified. Access from the network is restricted to a separate wide area network. The identities of users of credit cards are verified during transactions carried out over the network. The content of electronic mail communicated over the network is also monitored so that the communication of the electronic mail over the network is prevent when the content thereof being deemed inappropriate. The electronic mail is also encrypted during the communication thereof over the network.
-
Citations
18 Claims
-
1. A method for providing security management in a development architecture framework comprising the steps of:
-
(a) detecting unauthorized attempts to access a network;
(b) notifying a user upon detection of at least one of the unauthorized attempts to access the network;
(c) restricting access from the network to a separate wide area network;
(d) verifying identities of users of credit cards during transactions carried out over the network;
(e) monitoring content of information transmittal;
(f) preventing transmittal of information if the content does not adhere to standards; and
(g) encrypting electronic mail before transmission utilizing a network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program embodied on a computer readable medium for providing security management in a development architecture framework comprising:
-
(a) a code segment that detects unauthorized attempts to access a network;
(b) a code segment that notifies a user upon detection of at least one of the unauthorized attempts to access the network;
(c) a code segment that restricts access from the network to a separate wide area network;
(d) a code segment that verifies identities of users of credit cards during transactions carried out over the network;
(e) a code segment that monitors content of information transmittal;
(f) a code segment that prevents transmittal of information if the content does not adhere to standards; and
(g) a code segment that encrypts electronic mail before transmission utilizing a network. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system for providing security management in a development architecture framework comprising:
-
(a) logic that detects unauthorized attempts to access a network;
(b) logic that notifies a user upon detection of at least one of the unauthorized attempts to access the network;
(c) logic that restricts access from the network to a separate wide area network;
(d) logic that verifies identities of users of credit cards during transactions carried out over the network;
(e) logic that monitors content of information transmittal;
(f) logic that prevents transmittal of information if the content does not adhere to standards; and
(g) logic that encrypts electronic mail before transmission utilizing a network. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification