System for securing inbound and outbound data packet flow in a computer network
DC CAFCFirst Claim
Patent Images
1. A method for providing access control to a web server, the method comprising:
- providing a plurality of machines pre-authorized to access the web server;
associating with each pre-authorized machine an access table storing authorization information;
coupling one of the pre-authorized machines to an access requester;
verifying that said requester is authorized to access a resource on the web server with reference to said access table associated with the pre-authorized machine to which the requester is coupled; and
allowing the requester to assume the identity of said pre-authorized machine to which the requester is coupled after verifying that said requester is authorized, andbased on the requester assuming the identity of said pre-authorized machine, allowing the requester access to the resource.
15 Assignments
Litigations
1 Petition
Accused Products
Abstract
A method provides for control of access to network resources. A virtual identity machine resides in the network and is pre-authorized to access certain network resources. End users desiring access to those network resources attempt to logically connect to the virtual identity machines. If the logical connection attempt is successful, then the end user assumes the virtual identity of the virtual identity machine and has access to all of the same information that was available to the virtual identity machine.
-
Citations
9 Claims
-
1. A method for providing access control to a web server, the method comprising:
-
providing a plurality of machines pre-authorized to access the web server; associating with each pre-authorized machine an access table storing authorization information; coupling one of the pre-authorized machines to an access requester; verifying that said requester is authorized to access a resource on the web server with reference to said access table associated with the pre-authorized machine to which the requester is coupled; and allowing the requester to assume the identity of said pre-authorized machine to which the requester is coupled after verifying that said requester is authorized, and based on the requester assuming the identity of said pre-authorized machine, allowing the requester access to the resource. - View Dependent Claims (2, 3, 4)
-
-
5. A method comprising:
-
arranging a network element in a network, the network element being pre-authorized to access a set of network resources; receiving, at the network element, a request from a user to connect to the network element; determining whether the user is authorized to connect to the network element; if so, allowing the user to assume the identity of the network element; and accessing, by the user, one of the set of network resources that the network element is pre-authorized to access, based on the user'"'"'s assuming the identity of the network element. - View Dependent Claims (6, 7)
-
-
8. A network element, comprising:
-
a processor; an authorization database containing logic for execution by the processor, the processor to determine, based on the logic, whether a user is authorized to assume the identity of the network element to gain access to a network resource that the network element is pre-authorized to access; a port to couple the network element to a user; and a port to couple the network element to a network resource. - View Dependent Claims (9)
-
Specification