Scaleable muti-level security method in object oriented open network systems
First Claim
1. A method for securely transferring data between applications over a network comprising:
- selecting a receive site address on a server from a site receive list;
defining a data payload for transmittal including data for transfer;
encrypting the data payload; and
transmitting the encrypted data payload from a send site address selected from a send site list over a network to the receive site address; and
receiving the data payload at the receive site address based upon its transmission from the send site.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for securely transferring data between applications over a network. According to one embodiment, a receive site address on a server is selected based on a first IP address/object filter table and a desired security level. A data payload for transmittal is defined the data payload is encrypted for transfer and the encrypted data payload is transmitted from a send site address over a network to the receive site address. The transmitted encrypted data is only received at the receive site address by decrypting the data payload and accepting the data based upon a second IP filter table and the address of the send site.
11 Citations
23 Claims
-
1. A method for securely transferring data between applications over a network comprising:
-
selecting a receive site address on a server from a site receive list; defining a data payload for transmittal including data for transfer; encrypting the data payload; and transmitting the encrypted data payload from a send site address selected from a send site list over a network to the receive site address; and receiving the data payload at the receive site address based upon its transmission from the send site. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A software product in an object-oriented networked system for secure transfer of data, the software product comprising:
-
a first executable wrapper to wrap a first software application including; a first program code for accepting data at a send site from the first software application; a second program code for selecting a receive site on a network from a first filter table based upon a predetermined level security selected from the first filter table; a third program code for encrypting the accepted data from the first software application; and a fourth program code for transmitting data from the send site to the selected receive sight; and a second executable wrapper to wrap a second software application, the second executable wrapper including; a fifth program code for accepting transmitted data from the network at a selected receive site; a sixth program code for decrypting accepted data from the network; a seventh program code for accepting the decrypted data based upon the send site and a second filter table; and an eighth program code for providing decrypted data to the second software application. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for transmitting data objects across a network of computers comprising:
-
a network of computers, including at least one server and at least one of client computers; a send addressable memory site within the network; a receive addressable memory site within the network; a first set of executable data located at a first addressable memory site within the network including; a first program code for selecting the receive memory site from a first filter table based upon a desired level of security selected from the first filter table; a second program code for encrypting a data payload including data for transmittal; and a third program code for transmitting the data payload from the send memory site to the receive memory site; a second set of executable data located at the receive memory site, the second set of executable data including; a fourth program code for accepting the transmitted data payload; a fifth program code for decrypting the accepted data payload; and a sixth program code for accepting the decrypted data payload based upon the send memory site and a second filter table. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
Specification