×

Context-sensitive confidentiality within federated environments

  • US 8,200,979 B2
  • Filed: 02/27/2010
  • Issued: 06/12/2012
  • Est. Priority Date: 03/31/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method of achieving context-sensitive confidentiality within a federated environment, the method comprising:

  • determining a network route to be taken by a message to be transmitted in the federated environment, wherein the network route crosses a plurality of security domains in the federated environment;

    determining, prior to transmitting the message over the network route, a plurality of nodes to be encountered on the determined route;

    at least one portion of the message that is security-sensitive; and

    , for each of the nodes and each of the security-sensitive portions, whether the node is entitled to access the security-sensitive portion;

    selectively protecting, in the message prior to transmitting the message over the network route, each of the at least one security-sensitive portion of the message for each distinct one of the nodes which is entitled to access the security-sensitive portion;

    creating a message receiver element for each of the selectively-protected at least one portion of the message and each distinct one of the nodes which is entitled to access the selectively-protected portion, the message receiver element identifying the node and providing a node-specific keyword corresponding to the node; and

    transmitting the message on the determined network route, the message receiver elements enabling each of the nodes to locate and access each security-sensitive portion which the node is entitled to access and preventing the node from accessing any security-sensitive portion which the node is not entitled to access, wherein;

    the transmitted message contains information identifying an authentication authority from a first of the security domains and an identification of a sender of the message and indicates that the identified authentication authority has already authenticated the sender using security credentials thereof; and

    the information identifying the authentication authority enables each of the plurality of nodes which receives the message in other ones of the security domains to bypass authentication of the sender for the other security domain, upon verifying authenticity of the identified authentication authority and establishing that the identified authentication authority vouches for the message.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×