×

Securely inspecting electronic messages

  • US 7,574,601 B2
  • Filed: 08/24/2004
  • Issued: 08/11/2009
  • Est. Priority Date: 08/24/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a computer system connected to a network, the computer system including a component of a distributed application, the component of the distributed application at the computer system interoperating with components of the distributed application at other computer systems connected to the network through the exchange of distributed application messages to implement the functionality of the distributed application, a method for securely activating secure distributed application message inspection at the computer system, the method comprising the following:

  • an act of the computer system receiving a message inspection control message from another computer system connected to the network, the message inspection control message including message inspection instructions from an administrator, the message inspection instructions indicating how to configure distributed application message inspection at the computer system for any messages sent to the distributed application component, distributed application message inspection for inspecting the contents of subsequently received distributed application messages sent to the distributed application component;

    an act of passing the received message inspection control message through one or more receiving path components positioned in a message receive path at the computer system situated prior to the distributed application component at the computer system, each of the receiving path components configured to modify electronic messages with at least one modification, the one or more receiving path components including an inspection component;

    an act of passing the received message inspection control message to a security component in the message receive path subsequent to the received message inspection control message being passed through the one or more other receiving path components;

    an act of the security component at the computer system authenticating the administrator and authenticating the contents of the received message inspection control message to determine that distributed application message inspection in accordance with the inspection instructions contained in the message inspection control message is permissible at the computer system, authentication of the administrator indicating an increased confidence that message inspection is to be activated in accordance with instructions from an authorized entity, authentication of the contents of the message inspection control message indicating a decreased likelihood that the inspection instructions contained in the message inspection control message have been altered;

    an act of passing the received message inspection control message to an inspection control component included in the message receive path subsequently and in response to the security component at the computer system authenticating the administrator and authenticating the contents of the received message inspection control message and based on the increased confidence that message inspection is to be activated in accordance with instructions from an authorized entity and based on the decreased likelihood that the inspection instructions have been altered; and

    an act of the inspection control component controlling the message inspection component to activate distributed application message inspection for distributed application messages sent to the distributed application component at the computer system in accordance with the inspection instructions contained in the message inspection control message received from the other computer system connected to the network so as to integrate message inspection activation for the distributed application component into the receive message path for the distributed application component.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×