×

Computer security system

  • US 7,644,434 B2
  • Filed: 04/25/2003
  • Issued: 01/05/2010
  • Est. Priority Date: 04/25/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method of providing individual access to each of a plurality of protected physical resources on a network, said method comprising the steps of:

  • establishing a security system physically intermediate to a user access point and the plurality of protected physical resources on the network;

    determining, by the security system, whether a user is authenticated to connect to an individual one or individual ones of the plurality of protected physical resources on the network to establish physical access by the user to the individual one or individual ones of the plurality of protected resources on the network;

    establishing, by the security system, a client identifier and a session identifier, transparent to the user access point and the security system, to enable a session for establishing a connection between the user access point and the individual one or individual ones of the plurality of protected physical resources, if the user is authenticated by the security system for physical access to the individual one or individual ones of the plurality of protected physical resources;

    changing the session identifier each time the user completes an interaction during the session, each changed session identifier being derived from a user identifier corresponding to the authenticated user;

    determining, by the security system, whether the session identifier received with the interaction is derived from the user identifier and whether the received session identifier and the user identifier correlate to data included in a data source accessible by the security system, as the session identifier is changed;

    providing, by the security system, the user physical access to the individual one or individual ones of the protected physical resources by establishing the connection therebetween if the received session identifier is associated with the user identifier and the received session identifier and the associated user identifier correlate to the data included in the data source; and

    terminating the connection between the user and the individual one or individual ones of the protected physical resources by disabling the connection therebetween, if the received session identifier is not derived from the user identifier or the received session identifier and the associated user identifier do not correlate to the data included in the data source.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×