System, method and computer program product for secure communications using a security service provider manager
First Claim
Patent Images
1. A method for managing the use of a plurality of security service providers during network communication, comprising the steps of:
- (a) utilizing a first security service provider for affording secure communication between applications using a network;
(b) detecting an event relating to the secure communication between the applications; and
(c) selecting a second security service provider for affording secure communication between the applications using the network in response to the detection of the event;
wherein the second security service provider is executed on a host different from that of the first security service provider;
wherein use of the first security service provider is discontinued in response to the detection of the event;
wherein the second security service provider provides a first type of encryption that is different from that of the first security service provider.
5 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for managing the use of a plurality of security service providers during network communication. A first security service provider is utilized for affording secure communication between applications using a network. During operation, the system is monitored for events relating to the secure communication between the applications. Upon the detection of an event, a second security service provider is utilized for affording secure communication between the applications using the network.
116 Citations
30 Claims
-
1. A method for managing the use of a plurality of security service providers during network communication, comprising the steps of:
-
(a) utilizing a first security service provider for affording secure communication between applications using a network;
(b) detecting an event relating to the secure communication between the applications; and
(c) selecting a second security service provider for affording secure communication between the applications using the network in response to the detection of the event;
wherein the second security service provider is executed on a host different from that of the first security service provider;
wherein use of the first security service provider is discontinued in response to the detection of the event;
wherein the second security service provider provides a first type of encryption that is different from that of the first security service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 30)
-
-
9. A computer program product for managing the use of a plurality of security service providers during network communication, comprising:
-
(a) computer code for utilizing a first security service provider for affording secure communication between applications using a network;
(b) computer code for detecting an event relating to the secure communication between the applications; and
(c) computer code for selecting a second security service provider for affording secure communication between the applications using the network in response to the detection of the event;
wherein the second security service provider is executed on a host different from that of the first security service provider wherein use of the first security service provider is discontinued in response to the detection of the event;
wherein the second security service provider provides a first type of encryption that is different from that of the first security service provider. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A security provider management system for managing the use of a plurality of security service providers during network communication, comprising:
-
(a) logic for utilizing a first security service provider for affording secure communication between applications using a network;
(b) logic for detecting an event relating to the secure communication between the applications; and
(c) logic for selecting a second security service provider for affording secure communication between the applications using the network in response to the detection of the event;
wherein the second security service provider is executed on a host different from that of the first security service provider;
wherein use of the first security service provider is discontinued in response to the detection of the event;
wherein the second security service provider provides a first type of encryption that is different from that of the first security service provider.
-
-
18. A method for establishing secure communication over a network using a plurality of security service providers, comprising the steps of:
-
(a) receiving an indication that communication is to be established on a network between a first application and a second application;
(b) choosing at least one of a plurality of security service providers for affording secure communication between the first application and the second application utilizing the network; and
(c) utilizing the chosen security service provider for affording secure communication between the first application and the second application utilizing the network;
wherein a first security service provider is executed on a host different from that of a second security service provider;
wherein use of the first security service provider is discontinued in response to the detection of an event;
wherein the second security service provider provides a first type of encryption that is different from that of the first security service provider. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
24. A computer program product for establishing secure communication over a network using a plurality of security service providers, comprising:
-
(a) computer code for receiving an indication that communication is to be established on a network between a first application and a second application;
(b) computer code for choosing at least one of a plurality of security service providers for affording secure communication between the first application and the second application utilizing the network; and
(c) computer code for utilizing the chosen security service provider for affording secure communication between the first application and the second application utilizing the network;
wherein a first security service provider is executed on a host different from that of a second security service provider;
wherein use of the first security service provider is discontinued in response to the detection of an event;
wherein the second security service provider provides a first type of encryption that is different from that of the first security service provider. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification