System and method for controlling network access
First Claim
1. A system for controlling network access, comprising:
- a security appliance connected to a product under operational control of a first entity;
a product connection platform and a user terminal under operational control of a second entity, the product connection platform being accessed by the user terminal;
a trust relationship established between the first entity and the second entity based on predetermined criteria between the first entity and the second entity, the trust relationship being represented by a certificate or public/private key exchange,wherein authentication of access by a user of the user terminal of the second entity to the product of the first entity is deferred to the product connection platform of the second entity based on the predetermined criteria of the trust relationship, whereupon if authentication is granted, the user is provided access to the product.
24 Assignments
0 Petitions
Accused Products
Abstract
A system for controlling network access to products. The system includes a security appliance connected to a product under operational control of a first entity, a product connection platform and a user terminal under operational control of a second entity, the product connection platform being accessed by the user terminal, and a trust relationship established between the first entity and the second entity based on predetermined criteria between the first entity and the second entity, the trust relationship being represented by a certificate or public/private key exchange. Authentication of access by a user of the user terminal of the second entity to the product of the first entity is deferred to the product connection platform of the second entity based on the predetermined criteria of the trust relationship, whereupon if authentication is granted, the user is provided access to the product.
-
Citations
21 Claims
-
1. A system for controlling network access, comprising:
-
a security appliance connected to a product under operational control of a first entity; a product connection platform and a user terminal under operational control of a second entity, the product connection platform being accessed by the user terminal; a trust relationship established between the first entity and the second entity based on predetermined criteria between the first entity and the second entity, the trust relationship being represented by a certificate or public/private key exchange, wherein authentication of access by a user of the user terminal of the second entity to the product of the first entity is deferred to the product connection platform of the second entity based on the predetermined criteria of the trust relationship, whereupon if authentication is granted, the user is provided access to the product. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling network access, comprising:
-
a security appliance connected to a product under operational control of a first entity; a user terminal under operational control of a second entity; a trust relationship established between the first entity and the second entity based on predetermined criteria between the first entity and the second entity, the trust relationship being represented by a certificate or public/private key exchange, wherein authentication of access by a user of the user terminal of the second entity to the product of the first entity is deferred to the user terminal of the second entity based on the predetermined criteria of the trust relationship, whereupon if authentication is granted, the user is provided access to the product. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for controlling network access, comprising the steps of:
-
establishing a trust relationship between a first and a second entity that is represented by a certificate or public/private key exchange; a user of the second entity requesting access to a product of the first entity; deferring to the second entity authentication of the user requesting access to the first entity; providing access by the user of the second entity to the product of the first entity if authentication is granted, wherein authentication of the access is granted based on predetermined criteria of the trust relationship. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method of controlling access by agents of a first entity to a product located on a network of a second entity comprising:
-
providing a product connection platform controlled by the first entity; providing a security appliance controlled by the second entity and connected to the product; establishing a connection between the product connection platform and the security appliance; establishing a trust relationship between the product connection platform and the security appliance; authenticating agents of the first entity to the product connection platform; and providing access to the product by agents of the first entity via the product connection platform and the security appliance the based on the establishment of the trust relationship. - View Dependent Claims (21)
-
Specification