×

Method for extranet security

  • US 8,769,128 B2
  • Filed: 08/08/2007
  • Issued: 07/01/2014
  • Est. Priority Date: 08/09/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computing method, comprising:

  • running on a user computer a first operating environment having a first operating system for performing general-purpose operations and a second operating environment having a second operating system, which is configured expressly for interacting with a server in a protected communication session and is isolated from the first operating environment, where the general-purpose operations performed in the first operating environment do not affect operation of the second operating environment, and where the first operating environment does not interact with the server in the protected communication session;

    monitoring the operation of the second operating environment running on the user computer with a central management subsystem, including verifying during the protected communication session that a configuration of the second operating environment matches an expected configuration and generating a monitoring result, the central management subsystem external to the server and to the user computer;

    reporting the monitoring result to the server; and

    controlling the communication session by the server based on trustworthiness of the second operating environment as indicated by the monitoring result reported by the central management system,wherein said central management subsystem to communicate with said user computer via a first secure connection and with said server via a second secure connection and wherein said protected communication session of said user computer with said server is done via a third secured connection, wherein said first, second and third secure connections are separate from each other.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×