×

Method for creating and managing secure service communities

  • US 7,627,532 B2
  • Filed: 02/16/2006
  • Issued: 12/01/2009
  • Est. Priority Date: 10/25/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing a virtual secure service network comprising:

  • (a) providing a plurality of network connectible digital devices;

    (b) creating private secure service communities by extending a private invitation from an existing participant in the network to another potential participant, wherein the invitation correlates to network enrollment through one or more unique artifacts associated with one or more of the invitation and the relationship between the parties to the invitation;

    (c) mutually authenticating network service activity between participants;

    (d) providing a virtual connection to a service for network participants;

    (e) associating each network participant with a network connectible device;

    (f) controlling authorization specific to a service and service relationship to a participant by the provider of the service;

    (g) using an authenticated secure sockets layer to provide transport encryption for the participant to the network where the participant to the network connection is authenticated prior to the delivery of the service;

    (h) using a unique service identification for each activity that links authentication, authorization, usage, and encryption for the participant to the network specific to the instance of a network activity;

    (i) providing end to end reporting of each instance of network activity;

    (j) providing privacy to each instance of network activity on the service to the participant;

    (k) digitally encrypting the payload or service content specific to the recipient of the service invocation by a network participant;

    (l) providing the secure service network and an administration layer as a virtual network overlay to network connections above a pre-existing physical network configuration; and

    (m) administering the applications layer by the secure service network layer in accordance with predetermined criteria limiting access by a network participant only to applications allowed to the participant by the secure service network layer.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×