Secure network access
First Claim
Patent Images
1. A system for providing a user access to a secure network site comprising:
- a computer-based system including at least one processor and further including;
an active agent engine;
an active agent located remotely to a user computer system, the active agent executable by the active agent engine on the user computing system;
a user access repository accessible by the user computer system and storing user access data for the secure network site in an encrypted form;
a private decryption key repository located remotely from the user system and storing a user'"'"'s private decryption key;
the active agent configured to retrieve a user'"'"'s private decryption key in response to a user request, the user'"'"'s private decryption key including information for decrypting the user access data;
the active agent engine further configured to decrypt the user access data with the user'"'"'s private decryption key; and
the active agent engine configured to decrypt the user access data, access the secure network using the decrypted user access data to obtain content information from the secure network site and provide the content information to the user computing system; and
a presentation manager configured to present the content information from the secure network site in an aggregated manner on the user computing system.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a system and method for facilitating access to secure network sites, such as sites providing secure financial information. An active software agent is utilized to fetch passwords and user identifiers from a user computing system and to use the passwords and identifiers to extract required information from the secure site. The password sites and identifiers are encrypted and an encryption key is stored at a network mode remote from the user'"'"'s computer and is fetched in order to enable the passwords and identifiers to be decrypted so that the active agent can use them to obtain the required information.
78 Citations
35 Claims
-
1. A system for providing a user access to a secure network site comprising:
a computer-based system including at least one processor and further including; an active agent engine; an active agent located remotely to a user computer system, the active agent executable by the active agent engine on the user computing system; a user access repository accessible by the user computer system and storing user access data for the secure network site in an encrypted form; a private decryption key repository located remotely from the user system and storing a user'"'"'s private decryption key; the active agent configured to retrieve a user'"'"'s private decryption key in response to a user request, the user'"'"'s private decryption key including information for decrypting the user access data; the active agent engine further configured to decrypt the user access data with the user'"'"'s private decryption key; and the active agent engine configured to decrypt the user access data, access the secure network using the decrypted user access data to obtain content information from the secure network site and provide the content information to the user computing system; and a presentation manager configured to present the content information from the secure network site in an aggregated manner on the user computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
22. A method of facilitating access to a secure network site for a user computing system comprising the steps of:
-
providing, to the user computing system, a decryption key stored remotely from the user computing system; causing the decryption of user access data stored on the user computing system with the decryption key; receiving the decrypted user access data by an active agent, the active agent located remotely to the user computing system and executable locally on the user computing system by an active agent engine; causing the utilization of the decrypted user access data to obtain content from the secure network site and provide the content to the user computing system; and providing a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computing system. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. A method of facilitating access to a secure network site, the method including the steps of:
-
transmitting a decryption key stored remotely to a user; causing the decryption of user access data stored on a user computing system; receiving the decrypted user access data by an active agent, the active agent located remotely from the user computing system and executable locally on the user computing system by an active agent engine; authorizing the active agent to access the secure network site, the active agent configured to access the secure network site on behalf of the user, and configured to utilize the decrypted user access data to automatically obtain content from the secure network site in response to a user query from the user computing system; and providing a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computing system. - View Dependent Claims (29)
-
-
30. A system configured to facilitate access by a user to a secure network site comprising:
a computer-based system including at least one processor and further including; encrypted access data for accessing the secure network site and accessible on a user computer system; and an active agent configured to access the secure network site on behalf of the user, the active agent located remotely from the user computing system on the secure network site and executable locally on the user computing system by an active agent engine, the active agent configured to, in response to a user query, obtain a decrypted access key for enabling access to the secure network site, and to utilize the access key to obtain content from the secure network site; a registration system including a directory listing active agents that the user has access to and a private key repository storing information for decrypting the encrypted access data; and a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computer system.
-
31. A remote agent provider system comprising:
a computer-based system including at least one processor and further including; encrypted access data for accessing a secure network site and being provided on a user computing system; an active agent located remotely from the user computing system on the secure network site but executed locally on the user computing system by an active agent engine, the active agent configured to obtain decrypted access data for enabling access to the secure network site in response to a user query from the user computing system, and to utilize the access data to obtain content from the secure system; an active agent repository storing the active agent and accessible by the user computing system, and a private key repository storing information for decrypting the encrypted access data; and a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computer system.
-
32. A user computing system to facilitate access to a secure network site comprising:
a computer-based system including at least one processor and further including; encrypted access data for accessing the secure network site; and an active agent engine configured to retrieve the access data from a remote private key repository to decrypt the access data, an active agent located remotely from the user computing system on the secure network site, and executable on behalf of the user, the active agent configured to access the secure network site on behalf of the user and use the decrypted access data to obtain content from the secure network site in response to a user query; and a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computer system.
-
33. A non-transitory computer readable storage medium embedded with a computer program configured to cause a user computing system to:
-
provide an active agent engine configured to receive a private decryption key from a remote private key repository and decrypt encrypted access data stored on the user computing system; and an active agent executable by the active agent engine on behalf of a user and configured to automatically access a secure network site on behalf of the user and obtain the decrypted access data for enabling access to the secure network site and to utilize the decrypted access data to obtain content from the secure network site and provide the content to the user computing system, the active agent located remotely to the user computer system and executable by the active agent engine on the user computing system; provide a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computing system.
-
-
34. A method of automating access to a secure network site comprising:
-
receiving registration information from a user including user access data for the secure network site; encrypting the user access data by generating a unique private encryption/decryption key; providing the encrypted user access data to a user computing system for storage in a digital safe; causing the user computing system to store the private encryption/decryption key for the user in a private key depository, the private key depository located remotely from the user computing system via a network gateway, the private encryption/decryption key including information for decrypting the user access data; storing an active agent for the secure network site, the active agent located remotely to the user computing system and being locally executable by the user computing system, the active agent accessible by the user computing system via the network gateway and configured to automatically retrieve content from the secure network site using the decrypted user access data; and providing a presentation manager configured to present the content from the secure network site in an aggregated manner on the user computing system. - View Dependent Claims (35)
-
Specification