Securing organizational computing assets over a network using virtual domains
First Claim
1. A method for securing communication over a network, comprising:
- at a server system having one or more processors and memory storing one or more programs for execution by the one or more processors;
storing encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session;
creating a plurality of virtual domains within the server system memory, each virtual domain representing a respective set of applications and information distinct from sets of applications and information of the other virtual domains;
for each client system in the plurality of client-systems, storing permissions for the client system, the permissions for the client system indicating a role of the client system, wherein the permissions for the client system are distinct from respective permissions for users of the client system;
receiving a request from a first client system of the plurality of client systems for access to a first virtual domain of the plurality of virtual domains, the request including encrypted identification information for the first client system;
retrieving the stored permissions of the first client system based on the encrypted identification information; and
based on the role of the first client system indicated by the stored permissions of the first client system, determining whether the first client system is permitted to access the requested first virtual domain.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session. The electronic device creates a plurality of virtual domains; each virtual domain representing a set of services and information distinct from the other virtual domains. The electronic device stores permissions associated with each respective client system in the plurality of client system. The electronic device receives a request from a first client system, including encrypted identifying information associated with the first client system, for information associated with a first virtual domain and then retrieves stored permissions of the first client system based on the encrypted identifying information. The electronic device determines whether the first client system is permitted to access the requested first virtual domain.
121 Citations
15 Claims
-
1. A method for securing communication over a network, comprising:
at a server system having one or more processors and memory storing one or more programs for execution by the one or more processors; storing encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session; creating a plurality of virtual domains within the server system memory, each virtual domain representing a respective set of applications and information distinct from sets of applications and information of the other virtual domains; for each client system in the plurality of client-systems, storing permissions for the client system, the permissions for the client system indicating a role of the client system, wherein the permissions for the client system are distinct from respective permissions for users of the client system; receiving a request from a first client system of the plurality of client systems for access to a first virtual domain of the plurality of virtual domains, the request including encrypted identification information for the first client system; retrieving the stored permissions of the first client system based on the encrypted identification information; and based on the role of the first client system indicated by the stored permissions of the first client system, determining whether the first client system is permitted to access the requested first virtual domain. - View Dependent Claims (2, 3, 4, 5)
-
6. An electronic device for securing communication over a network, comprising:
-
one or more processors; memory storing one or more programs to be executed by the one or more processors; the one or more programs comprising instructions for; storing encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session; creating a plurality of virtual domains within the server system memory, each virtual domain representing a respective set of applications and information distinct from sets of applications and information of the other virtual domains; for each client system in the plurality of client-systems, storing permissions for the client system, the permissions for the client system indicating a role of the client system, wherein the permissions for the client system are distinct from respective permissions for users of the client system; receiving a request from a first client system of the plurality of client systems for access to a first virtual domain of the plurality of virtual domains, the request including encrypted identification information for the first client system; retrieving the stored permissions of the first client system based on the encrypted identification information; and based on the role of the first client system indicated by the stored permissions of the first client system, determining whether the first client system is permitted to access the requested first virtual domain. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium storing one or more programs configured for execution by a server system having one or more processors, the one or more programs comprising instructions for:
-
storing encrypted identifying information for a plurality of client systems authorized to interact with the server system, wherein the encrypted identifying information is changed per client system per session; creating a plurality of virtual domains within the server system memory, each virtual domain representing a respective set of applications and information distinct from sets of applications and information of the other virtual domains; for each client system in the plurality of client-systems, storing permissions for the client system, the permissions for the client system indicating a role of the client system, wherein the permissions for the client system are distinct from respective permissions for users of the client system; receiving a request from a first client system of the plurality of client systems for access to a first virtual domain of the plurality of virtual domains, the request including encrypted identification information for the first client system; retrieving the stored permissions of the first client system based on the encrypted identification information; and based on the role of the first client system indicated by the stored permissions of the first client system, determining whether the first client system is permitted to access the requested first virtual domain. - View Dependent Claims (12, 13, 14, 15)
-
Specification