Method for creating and managing secure service communities
First Claim
Patent Images
1. A method for managing a virtual secure service network comprising:
- (a) providing a plurality of network connectible digital devices;
(b) creating private secure service communities by extending a private invitation from an existing participant in the network to another potential participant, wherein the invitation correlates to network enrollment through one or more unique artifacts associated with one or more of the invitation and the relationship between the parties to the invitation;
(c) mutually authenticating network service activity between participants;
(d) providing a virtual connection to a service for network participants;
(e) associating each network participant with a network connectible device;
(f) controlling authorization specific to a service and service relationship to a participant by the provider of the service;
(g) using an authenticated secure sockets layer to provide transport encryption for the participant to the network where the participant to the network connection is authenticated prior to the delivery of the service;
(h) using a unique service identification for each activity that links authentication, authorization, usage, and encryption for the participant to the network specific to the instance of a network activity;
(i) providing end to end reporting of each instance of network activity;
(j) providing privacy to each instance of network activity on the service to the participant;
(k) digitally encrypting the payload or service content specific to the recipient of the service invocation by a network participant;
(l) providing the secure service network and an administration layer as a virtual network overlay to network connections above a pre-existing physical network configuration; and
(m) administering the applications layer by the secure service network layer in accordance with predetermined criteria limiting access by a network participant only to applications allowed to the participant by the secure service network layer.
0 Assignments
0 Petitions
Accused Products
Abstract
A virtual secure service oriented network and process model for the creation and management of secure service communities including a private secure digital courier means for the secure and auditable movement of digital information over any network connection wherein end to end security is provided.
12 Citations
23 Claims
-
1. A method for managing a virtual secure service network comprising:
-
(a) providing a plurality of network connectible digital devices; (b) creating private secure service communities by extending a private invitation from an existing participant in the network to another potential participant, wherein the invitation correlates to network enrollment through one or more unique artifacts associated with one or more of the invitation and the relationship between the parties to the invitation; (c) mutually authenticating network service activity between participants; (d) providing a virtual connection to a service for network participants; (e) associating each network participant with a network connectible device; (f) controlling authorization specific to a service and service relationship to a participant by the provider of the service; (g) using an authenticated secure sockets layer to provide transport encryption for the participant to the network where the participant to the network connection is authenticated prior to the delivery of the service; (h) using a unique service identification for each activity that links authentication, authorization, usage, and encryption for the participant to the network specific to the instance of a network activity; (i) providing end to end reporting of each instance of network activity; (j) providing privacy to each instance of network activity on the service to the participant; (k) digitally encrypting the payload or service content specific to the recipient of the service invocation by a network participant; (l) providing the secure service network and an administration layer as a virtual network overlay to network connections above a pre-existing physical network configuration; and (m) administering the applications layer by the secure service network layer in accordance with predetermined criteria limiting access by a network participant only to applications allowed to the participant by the secure service network layer. - View Dependent Claims (2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
3. A method of 1 claim wherein the payload encryption protects the payload while at rest within any fixed or mobile storage device such that only a predesignated network participant to a service invocation can decrypt the contents.
Specification