Secure network computing
First Claim
1. A host based security system for a computer network comprising:
- a local computer in communication with said network;
a destination server in communication with said network, said destination server having a credential authentication policy;
a credential host in communication with said network, said credential host being operative to transmit credentials associated with a user of said local computer onto said network in response to a request initiated at said local computer to connect to said destination server, said destination server upon said credentials being received and authenticated in accordance with said authentication policy being operative to transmit session information onto said network for receipt at said credential host which upon receipt thereof is further operative to retransmit said session information to said local computer;
said local computer upon receipt of said session information having a communication session operatively established with said destination server such that during said communication session said local computer is authenticated to communicate data bi-directionally with said destination server in accordance with said session information; and
an auxiliary device associated with said user of said local computer, said credential host having a credential authentication policy under which credentials associated with said user of said local computer, wherein said credentials associated with said user includes a user ID and a password, upon being authenticated authorizes said credential host to be responsive to said request initiated by said local computer, said auxiliary device being in communication with said credential host, said credentials being transmitted to said credential host upon user ID being entered at said local computer and said password being entered at said auxiliary device.
2 Assignments
0 Petitions
Accused Products
Abstract
A host based security system for a computer network includes in communication with the network a credential host that is operative in concert with a local computer and a destination site. The destination site has a credential authentication policy under which credentials associated with the local computer upon being authenticated authorizes data to be communicated between each of the destination site and the local computer during a communication session over the network. The credential host stores the credentials to be used by the destination and is operative to transmit the credentials onto the network in response to a request received from the local computer. The destination site upon the credentials being received and authenticated thereat is operative to transmit session information onto the network. In turn, the local computer is then operative to commence the communication session upon receipt of said the information.
-
Citations
72 Claims
-
1. A host based security system for a computer network comprising:
-
a local computer in communication with said network; a destination server in communication with said network, said destination server having a credential authentication policy; a credential host in communication with said network, said credential host being operative to transmit credentials associated with a user of said local computer onto said network in response to a request initiated at said local computer to connect to said destination server, said destination server upon said credentials being received and authenticated in accordance with said authentication policy being operative to transmit session information onto said network for receipt at said credential host which upon receipt thereof is further operative to retransmit said session information to said local computer;
said local computer upon receipt of said session information having a communication session operatively established with said destination server such that during said communication session said local computer is authenticated to communicate data bi-directionally with said destination server in accordance with said session information; andan auxiliary device associated with said user of said local computer, said credential host having a credential authentication policy under which credentials associated with said user of said local computer, wherein said credentials associated with said user includes a user ID and a password, upon being authenticated authorizes said credential host to be responsive to said request initiated by said local computer, said auxiliary device being in communication with said credential host, said credentials being transmitted to said credential host upon user ID being entered at said local computer and said password being entered at said auxiliary device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A host based security method for a computer network wherein a local computer initiates a request to connect to a destination server in which the destination server has a credential authorization policy under which credentials of a user of said local computer are authenticated at said destination sever, said user credentials including a user ID and a password, said method comprising steps of:
-
entering at said user computer said user ID and at an auxiliary device said password and transmitting said user ID and said password to a credential host, said credential host upon said user credentials being authenticated thereat authorizes said credential host to be responsive to said request initiated by said local computer; transmitting said user credentials from said credential host to said destination server; transmitting session information onto said network from said destination server for receipt at said credential host upon said credentials being received and authenticated at said destination server in accordance with said authentication policy; and retransmitting said session information from said credential host onto said network for receipt at said local computer, said local computer upon receipt of said session information having a communication session operatively established with said destination server such that during said communication session said local computer is authenticated to communicate data bi-directionally with said destination server in accordance with said session information. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72)
-
Specification