System and method for secure legacy enclaves in a public key infrastructure
First Claim
1. A system for a secure legacy enclave in a Public Key Infrastructure (PKI) comprising:
- at least one legacy server, the at least one legacy server containing at least one legacy application;
at least one client platform operatively connected to a network, the at least one client platform containing legacy client software employable by at least one user to access the at one legacy application;
a directory operably connected to the network, the directory containing information on the at least one user, the directory further containing information on each at least one user designating whether each at least one user is authorized to access the at least one legacy server; and
a Virtual Private Network (VPN) extranet gateway, the VPN extranet gateway operatively connected between the at least one legacy server and the network, the VPN extranet gateway requesting a signature certificate of the at least one user attempting access to the legacy application to authenticate the at least one user, the VPN extranet gateway querying the directory to confirm the at least one user is allowed access to the legacy server after authenticating the at least one user, the VPN extranet gateway establishing a connection between the legacy client software and the legacy application if the at least one user is allowed access to the legacy server.
4 Assignments
0 Petitions
Accused Products
Abstract
System and method for secure legacy enclaves in a Public Key Infrastructure that includes one or more legacy servers, client platforms, directories, and a Virtual Private Network extranet gateway. The servers contain one or more legacy applications and are connected to a first network. The client plafforms are connected to a second network and contain legacy software employable by users to access the legacy applications. The directories are connected to the second network and contain information on user authorization to access the servers. The gateway is connected between the servers and the second network. The gateway requests a signature certificate of each user attempting access to a legacy application; queries the directory to confirm the user is allowed access to the server after authenticating the user; and establishes a connection between the legacy software and the legacy application if the user is allowed access to the server.
49 Citations
11 Claims
-
1. A system for a secure legacy enclave in a Public Key Infrastructure (PKI) comprising:
-
at least one legacy server, the at least one legacy server containing at least one legacy application;
at least one client platform operatively connected to a network, the at least one client platform containing legacy client software employable by at least one user to access the at one legacy application;
a directory operably connected to the network, the directory containing information on the at least one user, the directory further containing information on each at least one user designating whether each at least one user is authorized to access the at least one legacy server; and
a Virtual Private Network (VPN) extranet gateway, the VPN extranet gateway operatively connected between the at least one legacy server and the network, the VPN extranet gateway requesting a signature certificate of the at least one user attempting access to the legacy application to authenticate the at least one user, the VPN extranet gateway querying the directory to confirm the at least one user is allowed access to the legacy server after authenticating the at least one user, the VPN extranet gateway establishing a connection between the legacy client software and the legacy application if the at least one user is allowed access to the legacy server. - View Dependent Claims (2)
-
-
3. A system for a secure legacy enclave in a Public Key Infrastructure (PKI) comprising:
-
at least one legacy server, the at least one legacy server containing at least one legacy application;
at least one client platform operatively connected to a network, the at least one client platform containing legacy client software employable by at least one user to access the at one legacy application;
a directory operably connected to the network, the directory containing information on the at least one user, the directory further containing information on each at least one user designating whether each at least one user is authorized to access the at least one legacy server;
a Virtual Private Network (VPN) extranet gateway, the VPN extranet gateway operatively connected between the at least one legacy server and the network, the VPN extranet gateway requesting a signature certificate of the at least one user attempting access to the legacy application to authenticate the at least one user, the VPN extranet gateway querying the directory to confirm the at least one user is allowed access to the legacy server after authenticating the at least one user, the VPN extranet gateway establishing a connection between the legacy client software and the legacy application if the at least one user is allowed access to the legacy server; and
a second network, the at least one legacy server operatively connected to the second network, the VPN extranet gateway operatively connected between the second network and the network.
-
-
4. A method for secure legacy enclaves in a Public Key Infrastructure (PKI) comprising:
-
installing a virtual private network (VPN) extranet gateway between at least one legacy server and a legacy client platform;
attempting access to a legacy application on the at least one legacy server by a user employing legacy client software on the legacy client platform;
requesting a signature certificate of the user by the VPN extranet gateway to authenticate the user;
querying a directory by the VPN extranet gateway after authenticating the user to confirm the user is allowed access to the at least one legacy server; and
establishing a connection between the legacy client software and the legacy application if the user is allowed access to the at least one legacy server. - View Dependent Claims (5, 6, 7, 8)
-
-
9. An article comprising a storage medium having instructions stored therein, the instructions when executed causing a processing device to perform:
-
receiving an attempt to access a legacy application on a legacy server by a user employing legacy client software;
requesting a signature certificate of the user to authenticate the user;
querying a directory to confirm the user is allowed access to the legacy server after authenticating the user; and
establishing a connection between the legacy client software and the legacy application if the user is allowed access to the legacy server. - View Dependent Claims (10, 11)
-
Specification