×

Web access to secure data

  • US 7,452,278 B2
  • Filed: 05/09/2003
  • Issued: 11/18/2008
  • Est. Priority Date: 05/09/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for controlling access to a secure data service within a secure data service environment, said access being requested by a user of a versatile computing device that is not dedicated to communicating with the secure data service environment over a secure private communication network, so that the access is outside of the secure data service environment and is over an insecure public network, wherein the secure data service environment provides online data and services to dedicated devices through the secure private communication network, the method comprising the steps of:

  • (a) linking a user-partner identifier with a user-service identifier, wherein;

    (i) the user-partner identifier is used to authenticate the user with a partner network service that has been previously certified by the secure data service environment and that is in communication with the versatile computing device, the user-partner identifier being used by the versatile computing device and partner network service to authenticate the user with the secure data service environment through the insecure public network; and

    (ii) the user-service identifier is used to authenticate the user with the secure data service environment that provides the online service to the dedicated devices through the secure private communication network without passing through any partner network service, the dedicated devices being distinguished from versatile devices which communicate with the partner network service through the insecure public network in that dedicated devices are dedicated to a primary function;

    (b) determining whether a request for access to the secure data service within the secure data service environment is authentic when the request for access is received from the partner network service on behalf of the user of the versatile computing device; and

    (c) providing the requested access to the secure data service over the insecure public network to the partner network service, and thus to the versatile computing device over the insecure public network, if the request is authentic.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×