System and method for transaction access control
First Claim
1. For use with an internal transaction area and an internal application running in the internal transaction area on a host computer connected to a network, for use with an external security manager configured to receive and authenticate a first plurality of pairs of usernames and passwords to permit or deny access to the internal transaction area, and for use with a first plurality of end-user computers communicatively linked to the host computer via the network, the end-user computers each having at least one of a first plurality of network protocol addresses and a requester application, a transaction access control system comprising:
- a requester database configured to contain for each of the first plurality of network protocol addresses of the first plurality of end-user computers, an associated one of the first plurality of pairs of usernames and passwords;
a controller configured to receive the first plurality of network protocol addresses sent from the first plurality of the end-user computers via the network and received by the host computer; and
a validator configured to retrieve from the requester database each of the first plurality of username and password pairs associated with each of the first plurality of network protocol addresses based upon at least each of the first plurality of network protocol addresses, the controller being configured to transmit each of the retrieved username and password pairs to be authenticated by the external security manager to permit access to the internal transaction area to each of the requester applications of the end-user computers having the first plurality of network protocol addresses which are associated with the retrieved username and password pairs.
22 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented system controls transaction access of requester applications running on end-user computers having network protocol addresses, to internal applications and their associated transactions running in internal transaction areas of host computer systems. Related to each network protocol address, a requester database contains information related to each network protocol address including end-user identification, possible usename and password and instructions, possible priority levels of select transactions, and authorized transactions. A listener listens for a connect request from one of the end-user computers. A validator, using the requester database, determines whether the end-user computer has a valid network protocol address. An external communication module receives subsequent transaction requests from validated end-user computers and a validator in conjunction with a requester database determines among other things whether the transactions requested are authorized for particular end-user computers. Usernames and passwords are sent to an external security manager for authorized transactions.
13 Citations
67 Claims
-
1. For use with an internal transaction area and an internal application running in the internal transaction area on a host computer connected to a network, for use with an external security manager configured to receive and authenticate a first plurality of pairs of usernames and passwords to permit or deny access to the internal transaction area, and for use with a first plurality of end-user computers communicatively linked to the host computer via the network, the end-user computers each having at least one of a first plurality of network protocol addresses and a requester application, a transaction access control system comprising:
-
a requester database configured to contain for each of the first plurality of network protocol addresses of the first plurality of end-user computers, an associated one of the first plurality of pairs of usernames and passwords;
a controller configured to receive the first plurality of network protocol addresses sent from the first plurality of the end-user computers via the network and received by the host computer; and
a validator configured to retrieve from the requester database each of the first plurality of username and password pairs associated with each of the first plurality of network protocol addresses based upon at least each of the first plurality of network protocol addresses, the controller being configured to transmit each of the retrieved username and password pairs to be authenticated by the external security manager to permit access to the internal transaction area to each of the requester applications of the end-user computers having the first plurality of network protocol addresses which are associated with the retrieved username and password pairs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. For use with an internal transaction area and an internal application running in the internal transaction area on a host computer connected to a network, for use with an external security manager configured to receive and authenticate a first plurality of pairs of usernames and passwords to permit or deny access to the internal transaction area, and for use with a first plurality of end-user computers communicatively linked to the host computer via the network, the end-user computers each having at least one of a first plurality of network protocol addresses and a requester application, a method comprising:
-
containing for each of the first plurality of network protocol addresses of the first plurality of end-user computers, an associated one of the first plurality of pairs of usernames and passwords;
receiving the first plurality of network protocol addresses sent from the first plurality of the end-user computers via the network and received by the host computer;
retrieving from the requester database each of the first plurality of username and password pairs associated with each of the first plurality of network protocol addresses based upon at least each of the first plurality of network protocol addresses; and
transmitting each of the retrieved username and password pairs to be authenticated by the external security manager to permit access to the internal transaction area to each of the requester applications of the end-user computers having the first plurality of network protocol addresses which are associated with the retrieved username and password pairs. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. For use with an internal transaction area and an internal application running in the internal transaction area on a host computer connected to a network, for use with an external security manager configured to receive and authenticate a first plurality of pairs of usernames and passwords to permit or deny access to the internal transaction area, and for use with a first plurality of end-user computers communicatively linked to the host computer via the network, the end-user computers each having at least one of a first plurality of network protocol addresses and a requester application, a computer-readable medium whose contents cause a computer to perform by:
-
containing for each of the first plurality of network protocol addresses of the first plurality of end-user computers, an associated one of the first plurality of pairs of usernames and passwords;
receiving the first plurality of network protocol addresses sent from the first plurality of the end-user computers via the network and received by the host computer;
retrieving from the requester database each of the first plurality of username and password pairs associated with each of the first plurality of network protocol addresses based upon at least each of the first plurality of network protocol addresses; and
transmitting each of the retrieved username and password pairs to be authenticated by the external security manager to permit access to the internal transaction area to each of the requester applications of the end-user computers having the first plurality of network protocol addresses which are associated with the retrieved username and password pairs. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. For use with an internal transaction area and an internal application running in the internal transaction area on a host computer connected to a network, for use with an external security manager configured to receive and authenticate a first plurality of pairs of usernames and passwords to permit or deny access to the internal transaction area, and for use with a first plurality of end-user computers communicatively linked to the host computer via the network, the end-user computers each having at least one of a first plurality of network protocol addresses and a requester application, a transaction control system comprising:
-
means for containing for each of the first plurality of network protocol addresses of the first plurality of end-user computers, an associated one of the first plurality of pairs of usernames and passwords;
means for receiving the first plurality of network protocol addresses sent from the first plurality of the end-user computers via the network and received by the host computer;
means for retrieving from the requester database each of the first plurality of username and password pairs associated with each of the first plurality of network protocol addresses based upon at least each of the first plurality of network protocol addresses; and
means for transmitting each of the retrieved username and password pairs to be authenticated by the external security manager to permit access to the internal transaction area to each of the requester applications of the end-user computers having the first plurality of network protocol addresses which are associated with the retrieved username and password pairs. - View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
Specification