Network security and integration method and system
First Claim
1. A method for providing a first computer with secure access to a destination computer, comprising the steps of:
- receiving a first message from the first computer at a gateway requesting a function to be executed by the destination computer;
directing the first message from the gateway to a security server;
determining whether the requested function is permitted;
if the requested function is permitted, transmitting a second message from the security server to the destination computer authorizing execution of the function;
initiating execution of the function at the destination computer; and
while the function executes, asynchronously transmitting a third message from the destination computer to the security server confirming initiation of the execution of the function.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of the present invention includes a network security system that has a single point of access control to a source computer system. The network security system provides various mechanisms for securing access to a source computer systems that includes generating single-use encryption keys, generating random port assignments for communication between devices, an asynchronous message protocol used in the security system and utilizing various levels of transaction tables to help secure and manage security parameters of the system. More particularly, the present invention provides a method for securing access to a plurality of computers connected via a network. An indication is received that a first user of a first computer program module desires to communicate with a destination computer system. When this indication is received, a message is directed to a security computer system. The security computer system determines whether the first user is authorized to access the destination computer program module of the destination computer system. If the security computer system determines that the first user is authorized to access the destination computer system, the security computer system sets up a communication protocol between the first computer program module and the second computer program module.
419 Citations
20 Claims
-
1. A method for providing a first computer with secure access to a destination computer, comprising the steps of:
-
receiving a first message from the first computer at a gateway requesting a function to be executed by the destination computer; directing the first message from the gateway to a security server; determining whether the requested function is permitted; if the requested function is permitted, transmitting a second message from the security server to the destination computer authorizing execution of the function; initiating execution of the function at the destination computer; and while the function executes, asynchronously transmitting a third message from the destination computer to the security server confirming initiation of the execution of the function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for providing a first computer with secure access to a destination computer, comprising the steps of:
-
receiving a first message from the first computer at a gateway requesting a function to be executed by the destination computer; directing the first message from the gateway to a security server; determining whether the requested function is permitted; if the requested function is permitted, transmitting a second message from the security server to the destination computer authorizing execution of the function; initiating execution of the function at the destination computer; allotting a predetermined function execution time; including a value representing the predetermined function execution time in the second message transmitted from the security server to the destination computer; terminating execution of the function if the time to execute the function exceeds the predetermined function with execution of time while the function executes, asynchronously transmitting a third message from the destination computer to the security server confirming initiation of the execution of the function. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method for providing a first computer with secure access to a destination computer, comprising the steps of:
-
receiving a first message from the first computer at a gateway requesting a function to be executed by the destination computer; directing the first message from the gateway to a security server; determining whether the requested function is permitted; if the requested function is permitted; dynamically creating a single-use encryption key, transmitting a second message from the security server to the destination computer authorizing execution of the function, and including the single-use encryption key in the second message; initiating execution of the function at the destination computer; while the function executes; asynchronously transmitting a third message from the destination computer to the security server confirming initiation of the execution of the function, asynchronously transmitting a fourth message from the security server to the gateway, and including the single-use encryption key in the fourth message; and after the function has finished executing; encrypting a fifth message with the single-use encryption key at the destination computer, the fifth message including a response associated with the executed function, transmitting the fifth message from the destination computer to the selected communications port of the gateway, the fifth message including a response associated with the executed function, and decrypting the fifth message at the gateway using the single-use encryption key. - View Dependent Claims (19, 20)
-
Specification