Hardware security agent for network communications
First Claim
Patent Images
1. A hardware security agent including instructions recorded on a nontransitory computer-readable medium, and executable by at least one processor, the hardware security agent comprising:
- a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer;
a mapper configured to map the alias to corresponding protected data stored within the hardware security agent; and
a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site.
2 Assignments
0 Petitions
Accused Products
Abstract
A hardware security agent may include a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer, and a mapper configured to map the alias to corresponding protected data stored within the hardware security agent. The hardware security agent may further include a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site.
-
Citations
20 Claims
-
1. A hardware security agent including instructions recorded on a nontransitory computer-readable medium, and executable by at least one processor, the hardware security agent comprising:
-
a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer; a mapper configured to map the alias to corresponding protected data stored within the hardware security agent; and a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for executing instructions stored on a non-transitory computer readable storage medium, the method comprising:
-
receiving an alias at a hardware security agent by way of a network interface of an untrusted computer; mapping the alias to corresponding protected data stored within the hardware security agent; and providing the corresponding protected data from the hardware security agent over a network to a target network site. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer program product, the computer program product being tangibly embodied on a non-transitory computer-readable storage medium and comprising instructions that, when executed, by at least one processor, cause the at least one processor to:
-
receive an alias at a hardware security agent by way of a network interface of an untrusted computer; map the alias to corresponding protected data stored within the hardware security agent; and provide the corresponding protected data from the hardware security agent over a network to a target network site. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification