CA2389380A1 - Method and transaction interface for secure data exchange between distinguishable networks - Google Patents

Method and transaction interface for secure data exchange between distinguishable networks Download PDF

Info

Publication number
CA2389380A1
CA2389380A1 CA002389380A CA2389380A CA2389380A1 CA 2389380 A1 CA2389380 A1 CA 2389380A1 CA 002389380 A CA002389380 A CA 002389380A CA 2389380 A CA2389380 A CA 2389380A CA 2389380 A1 CA2389380 A1 CA 2389380A1
Authority
CA
Canada
Prior art keywords
user
interface
server
internal
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002389380A
Other languages
French (fr)
Other versions
CA2389380C (en
Inventor
Wolfgang Schuster
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SAP SE
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2389380A1 publication Critical patent/CA2389380A1/en
Application granted granted Critical
Publication of CA2389380C publication Critical patent/CA2389380C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Abstract

The invention relates to a method and device for ensuring secure data exchange between an internal and an external network, said networks being fully decoupled from each other. This is achieved by means of a transaction interface (3) which creates a waiting list in a neutral area (5) for interrogations which are to be processed. Said interrogations are processed exclusively upon the initiative of and in the region of the secure internal network (2). The waiting list area is secured both externally and internally by corresponding codes and/or an external fire wall (4,6).

Claims (29)

1. A method for secure data exchange between an external network and an internal network (1 and 2) via a transaction interface (3), in which an external user can undertake predetermined data transactions within the internal network (2), wherein the transaction interface (3) comprises - a portal in the external network (1), - therebehind, in access direction, a neutral zone (5) with at least - one interface server (7) and - one interface memory (11), - as well as an internal server (12), which is already located within the internal network (2), characterized in that - inquiries of external users (17), which a data transaction within internal network (2), are conditioned by the interface server (7) and stored temporarily in precisely defined form in the interface memory (11), and - the interface memory (11) is exclusively interrogated by the internal server (12) in defined frequency, as well as - complete processing including authentication of the user takes place within the internal network (2).
2. A method according to claim 1, characterized in that the following steps take place in sequence:
- any user requests received via the portal are read and if necessary acknowledged by the interface server (7), which is located within the neutral zone (5), - if such an acknowledgement is necessary, it is sent to the user, - the interface server (7) checks the permissibility of the request by comparison with a set of predetermined permissible requests and their semantic correctness, the request being rejected in the case of error and otherwise being further processed as follows - in the case of further processing, the interface server (7) places the request in a queue (22, 22'), which is set up within the interface memory (11), - this queue (22, 22') is queried at specified frequency by the internal server (12), - in response to this query the conditioned request is sent into the internal network (2), - complete processing including authentication of the user (17) then takes place in the internal network (2), - the result is returned to the interface server (7) and - checked to determine whether the result and the inquiry match, - if affirmative, a response is output to the user (17).
3. A method according to claim 1 or 2, characterized in that the user requests from the external network (1) are delivered under scrutiny of an external firewall (4) into the neutral zone (5).
4. A method according to one of the preceding claims, characterized in that the data exchange between the neutral zone (5) and the internal network (2) is processed under scrutiny of an internal firewall (6).
5. A method according to one of the preceding claims, characterized in that an external server (10), preferably a web server, is additionally located in the neutral zone (5), at least part of the user requests being sent via this external server (10) to the interface server (7).
6. A method according to claim 5, characterized in that inquiries once received in the queue (22, 22') of the interface server (11) are stored resistantly until they have been completely handled or until a specified time has elapsed.
7. A method according to claim 6, characterized in that the frequency of querying of the queue is varied as a function of the number and/or of the power of the user inquiries by means of an appropriate frequency-control function.
8. A method according to one of the preceding claims, characterized in that parallel processes are enabled or deactivated within the interface server (7) and/or internal server (12) as a function of the number and/or of the power of the user inquiries.
9. A method according to claim 8, characterized in that, within the neutral zone (5) there is located a plurality of interface servers (7), which are activated or deactivated according to the number and/or power of the user requests, the load control necessary for this purpose being exerted by means of the external server (10) and/or by means of a load-control module of the external firewall (4).
10. A method according to claim 8 and 9, characterized in that, within the internal network (2), there is located a plurality of internal servers (12), which are activated or deactivated according to the number and/or power of the user requests, the load control necessary for this purpose being exerted by means of the interface server (7) and/or by means of a load-control module of the internal firewall (6).
11. A method according to one of the preceding claims, characterized in that the user inquiries are encrypted within the neutral zone (5) before being sent into the internal zone (2).
12. A method according to claim 11, characterized in that the respective keys used for encryption have an individually predeterminable life.
13. A method according to one of the preceding claims, characterized in that authentication of the user (17) takes place independently of the other processing of the user inquiry.
14. A method according to claim 13, characterized in that the following steps for authentication of the user (17) take place in sequence:
- a user ID and a user password are separated from the user inquiry in the neutral zone (5), - upon request of the internal server (12), the user ID is sent to the internal network (2), - the user ID is encrypted in the internal network (2) using the password filed for this user ID in the internal network (2), - and the user ID encrypted in this way is delivered back into the neutral zone (5), - the user ID returned from the internal network (2) is decrypted using the password entered by the user (17) and stored temporarily in the neutral zone (5), - the decrypted user ID and that entered by the user are compared, authenticity of the user being confirmed in the case of a match and denied otherwise, after which the user inquiry is or is not further processed depending on the said comparison.
15. A transaction interface for secure data exchange between an external network and an internal network (1 and 2), in which an external user (17) can initiate predetermined data transactions within the internal network (2), for which purpose the transaction interface (3) comprises - a neutral zone (5), which in access direction is located behind a portal in the external network (1) and is provided with at least one interface server (7) as well as with - at least one interface memory (11), - at least one internal server (12), which is located within the internal network (2), characterized in that - a queue (22, 22') for temporary storage of user requests is set up within the interface memory (11), - the said queue can be queried at a specified frequency by the internal server (12) and - in that, after the appropriately conditioned requests have been sent to the internal server (12), complete processing of the requests, including user authentication, is provided within the internal network (2).
16. A transaction interface according to claim 15, characterized in that the neutral zone (5) is insulated from the external network (1) by means of an external firewall (4).
17. A transaction interface according to claim 15 or 16, characterized in that the internal network (2) is insulated from the neutral zone (5) by means of an internal firewall (6).
18. A transaction interface according to one of claims 15 to 17, characterized in that there is additionally provided within the neutral zone (5) an external server (10), which can be addressed from the external network (1) directly or indirectly via the interface server (7) for processing of user inquiries.
19. A transaction interface according to one of claims 15 to 18, characterized in that the configuration of the transaction interface (3) is automatically overwritten from the internal network (2) at predeterminable time intervals.
20. A transaction interface according to one of claims 15 to 19, characterized in that data filed in the neutral zone (5) are automatically overwritten from the internal network (2) at predeterminable time intervals.
21. A transaction interface according to one of claims 15 to 20, characterized in that the interface memory (11) is scalable in such a way that user inquiries received from the external network (1) are sorted into queues (22, 22') of the interface server (7) according to scope and urgency, and if necessary additional processes can be activated.
22. A transaction interface according to claim 21, characterized in that, within the neutral zone (5) there is located a plurality of network computers, on each of which there is located an interface server (7), wherein additional servers (7) can be activated or deactivated according to the number and/or power of the user requests, load control being exerted by the external server (10) and/or by the external firewall (4).
23. A transaction interface according to claim 20 or 2119, characterized in that, in the area of the internal network (2), there is located a plurality of network servers, each of which is equipped with an internal server (12), which can be activated or deactivated according to the scope and power of the user requests, load control being exerted by the internal firewall (6) or by one or more interface servers (7).
24. A transaction interface according to one of the preceding claims 15 to 23, characterized in that the internal server (12) communicates with the internal network (2) via a CORBA bus.
25. A transaction interface according to claim 24, characterized in that the entire transaction interface (3) is in data communication via a continuous CORBA bus system.
26. A transaction interface according to one of the preceding claims 15 to 25, characterized in that the entire internal interface communication takes place with SSL encryption, preferably with encryption according to DES.
27. A transaction interface according to one of the preceding claims 15 to 26, characterized in that the interface server (7) sends a confirmation request to the user (17) before placement of certain user questions, and further processing takes place only after receipt of confirmation.
28. A transaction interface according to one of the preceding claims 15 to 27, characterized in that a log that records all transactions processed via the transaction interface (3) is recorded by means of a logging module.
29. A transaction interface according to one of the preceding claims 15 to 28, characterized in that configuration of the interface server (7) can be performed exclusively from the internal network (2).
CA2389380A 1999-10-30 2000-10-26 Method and transaction interface for secure data exchange between distinguishable networks Expired - Lifetime CA2389380C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19952527A DE19952527C2 (en) 1999-10-30 1999-10-30 Process and transaction interface for secure data exchange between distinguishable networks
DE19952527.7 1999-10-30
PCT/EP2000/010568 WO2001033801A2 (en) 1999-10-30 2000-10-26 Method and transaction interface for secure data exchange between distinguishable networks

Publications (2)

Publication Number Publication Date
CA2389380A1 true CA2389380A1 (en) 2001-05-10
CA2389380C CA2389380C (en) 2010-05-11

Family

ID=7927553

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2389380A Expired - Lifetime CA2389380C (en) 1999-10-30 2000-10-26 Method and transaction interface for secure data exchange between distinguishable networks

Country Status (10)

Country Link
US (1) US7865939B2 (en)
EP (1) EP1285514B1 (en)
JP (1) JP2003528484A (en)
KR (1) KR100667450B1 (en)
CN (1) CN100338930C (en)
AT (1) ATE292868T1 (en)
AU (1) AU784199B2 (en)
CA (1) CA2389380C (en)
DE (2) DE19952527C2 (en)
WO (1) WO2001033801A2 (en)

Families Citing this family (66)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7761910B2 (en) 1994-12-30 2010-07-20 Power Measurement Ltd. System and method for assigning an identity to an intelligent electronic device
US7127328B2 (en) 1994-12-30 2006-10-24 Power Measurement Ltd. System and method for federated security in an energy management system
US7188003B2 (en) 1994-12-30 2007-03-06 Power Measurement Ltd. System and method for securing energy management systems
US7836494B2 (en) * 1999-12-29 2010-11-16 Intel Corporation System and method for regulating the flow of information to or from an application
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US7380120B1 (en) * 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7562232B2 (en) * 2001-12-12 2009-07-14 Patrick Zuili System and method for providing manageability to security information for secured items
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7783765B2 (en) * 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US20050071657A1 (en) * 2003-09-30 2005-03-31 Pss Systems, Inc. Method and system for securing digital assets using time-based security criteria
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US7313618B2 (en) 2002-10-31 2007-12-25 Sap Aktiengesellschaft Network architecture using firewalls
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US7644290B2 (en) 2003-03-31 2010-01-05 Power Measurement Ltd. System and method for seal tamper detection for intelligent electronic devices
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US7730543B1 (en) 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7707427B1 (en) * 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US7764699B2 (en) * 2005-05-16 2010-07-27 Cisco Technology, Inc. Method and system using shared configuration information to manage network access for network users
CN1921377B (en) * 2005-08-26 2010-09-15 鸿富锦精密工业(深圳)有限公司 Data synchronizing system and method
CN101083607B (en) * 2006-05-30 2010-12-08 倪海生 Internet accessing server for inside and outside network isolation and its processing method
US7979532B2 (en) * 2006-09-15 2011-07-12 Oracle America, Inc. Systems and methods for using an access point for testing multiple devices and using several consoles
US8850552B2 (en) * 2007-11-21 2014-09-30 Honeywell International Inc. Use of data links for aeronautical purposes without compromising safety and security
TR200708644A1 (en) * 2007-12-13 2009-07-21 Atti̇la Özgi̇t Dr. Virtual airbag system.
US20100058355A1 (en) * 2008-09-01 2010-03-04 Microsoft Corporation Firewall data transport broker
DE102011000876A1 (en) * 2011-02-22 2012-08-23 Dimensio Informatics Gmbh Network separation
WO2012140872A1 (en) 2011-04-12 2012-10-18 パナソニック株式会社 Server collaboration system
KR101315670B1 (en) * 2011-05-25 2013-10-08 주식회사 슈프리마 Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone
US9576046B2 (en) 2011-11-16 2017-02-21 Ptc Inc. Methods for integrating semantic search, query, and analysis across heterogeneous data types and devices thereof
US9098312B2 (en) 2011-11-16 2015-08-04 Ptc Inc. Methods for dynamically generating an application interface for a modeled entity and devices thereof
US8909641B2 (en) 2011-11-16 2014-12-09 Ptc Inc. Method for analyzing time series activity streams and devices thereof
US10079710B2 (en) * 2012-02-16 2018-09-18 Brightcove, Inc. System and method for dynamic file availability during encoding
CN103036903B (en) * 2012-12-26 2016-06-08 北京中电普华信息技术有限公司 Data processing method and Web Service assembly
EP2973047A4 (en) 2013-03-15 2016-11-02 Ptc Inc Methods for managing applications using semantic modeling and tagging and devices thereof
US9495436B2 (en) 2013-05-30 2016-11-15 ClearStory Data Inc. Apparatus and method for ingesting and augmenting data
US20140359742A1 (en) * 2013-05-30 2014-12-04 ClearStory Data Inc. Apparatus and Method for Agent Based Ingestion of Data
US9350714B2 (en) * 2013-11-19 2016-05-24 Globalfoundries Inc. Data encryption at the client and server level
US10025942B2 (en) 2014-03-21 2018-07-17 Ptc Inc. System and method of establishing permission for multi-tenancy storage using organization matrices
US9462085B2 (en) 2014-03-21 2016-10-04 Ptc Inc. Chunk-based communication of binary dynamic rest messages
US10313410B2 (en) 2014-03-21 2019-06-04 Ptc Inc. Systems and methods using binary dynamic rest messages
US9350812B2 (en) 2014-03-21 2016-05-24 Ptc Inc. System and method of message routing using name-based identifier in a distributed computing environment
US9467533B2 (en) 2014-03-21 2016-10-11 Ptc Inc. System and method for developing real-time web-service objects
US9560170B2 (en) 2014-03-21 2017-01-31 Ptc Inc. System and method of abstracting communication protocol using self-describing messages
WO2015143416A1 (en) 2014-03-21 2015-09-24 Ptc Inc. Systems and methods for developing and using real-time data applications
US9350791B2 (en) 2014-03-21 2016-05-24 Ptc Inc. System and method of injecting states into message routing in a distributed computing environment
US9762637B2 (en) 2014-03-21 2017-09-12 Ptc Inc. System and method of using binary dynamic rest messages
US9961058B2 (en) 2014-03-21 2018-05-01 Ptc Inc. System and method of message routing via connection servers in a distributed computing environment
GB2531317A (en) * 2014-10-16 2016-04-20 Airbus Group Ltd Security system
US10552624B2 (en) * 2016-06-24 2020-02-04 Xattic, Inc. Methods and a system for inoculating inter-device communication
CN109600410B (en) * 2017-09-30 2021-11-09 杭州海康威视数字技术股份有限公司 Data storage system and method
US20220138884A1 (en) * 2020-10-29 2022-05-05 Mastercard International Incorporated Systems and methods for use in neutral zone execution of logic

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5699513A (en) * 1995-03-31 1997-12-16 Motorola, Inc. Method for secure network access via message intercept
US5826029A (en) * 1995-10-31 1998-10-20 International Business Machines Corporation Secured gateway interface
US5826014A (en) * 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
CN1075695C (en) * 1996-09-02 2001-11-28 北京天融信网络安全技术有限公司 Fireproof wall system
US6253188B1 (en) * 1996-09-20 2001-06-26 Thomson Newspapers, Inc. Automated interactive classified ad system for the internet
US6839842B1 (en) * 1996-12-27 2005-01-04 Intel Corporation Method and apparatus for authenticating information
US6766454B1 (en) * 1997-04-08 2004-07-20 Visto Corporation System and method for using an authentication applet to identify and authenticate a user in a computer network
US6381644B2 (en) * 1997-09-26 2002-04-30 Mci Worldcom, Inc. Integrated proxy interface for web based telecommunications network management
USH1944H1 (en) * 1998-03-24 2001-02-06 Lucent Technologies Inc. Firewall security method and apparatus
US6604143B1 (en) * 1998-06-19 2003-08-05 Sun Microsystems, Inc. Scalable proxy servers with plug-in filters
US6088796A (en) * 1998-08-06 2000-07-11 Cianfrocca; Francis Secure middleware and server control system for querying through a network firewall
US6317837B1 (en) * 1998-09-01 2001-11-13 Applianceware, Llc Internal network node with dedicated firewall
CA2287813C (en) * 1998-10-22 2005-03-29 At&T Corp. System and method for network load balancing
US6944299B1 (en) * 1998-12-02 2005-09-13 At&T Wireless Services, Inc. Method for synchronous encryption over a communication medium
US6510236B1 (en) * 1998-12-11 2003-01-21 International Business Machines Corporation Authentication framework for managing authentication requests from multiple authentication devices
US6701432B1 (en) * 1999-04-01 2004-03-02 Netscreen Technologies, Inc. Firewall including local bus
US6718388B1 (en) * 1999-05-18 2004-04-06 Jp Morgan Chase Bank Secured session sequencing proxy system and method therefor
US7009657B2 (en) * 1999-06-14 2006-03-07 Medialink Worldwide Incorporated Method and system for the automatic collection and conditioning of closed caption text originating from multiple geographic locations
US6202159B1 (en) * 1999-06-30 2001-03-13 International Business Machines Corporation Vault controller dispatcher and methods of operation for handling interaction between browser sessions and vault processes in electronic business systems
US7100195B1 (en) * 1999-07-30 2006-08-29 Accenture Llp Managing user information on an e-commerce system
US6697824B1 (en) * 1999-08-31 2004-02-24 Accenture Llp Relationship management in an E-commerce application framework
WO2002007395A1 (en) * 2000-07-19 2002-01-24 Hitachi, Ltd. Web information preferential transfer system

Also Published As

Publication number Publication date
DE50010018D1 (en) 2005-05-12
WO2001033801A3 (en) 2002-12-05
JP2003528484A (en) 2003-09-24
EP1285514A2 (en) 2003-02-26
DE19952527A1 (en) 2001-05-10
CN1535527A (en) 2004-10-06
KR100667450B1 (en) 2007-01-10
EP1285514B1 (en) 2005-04-06
CN100338930C (en) 2007-09-19
WO2001033801A2 (en) 2001-05-10
AU1026701A (en) 2001-05-14
US7865939B2 (en) 2011-01-04
ATE292868T1 (en) 2005-04-15
AU784199B2 (en) 2006-02-23
CA2389380C (en) 2010-05-11
US20070067837A1 (en) 2007-03-22
DE19952527C2 (en) 2002-01-17
KR20030026919A (en) 2003-04-03

Similar Documents

Publication Publication Date Title
CA2389380A1 (en) Method and transaction interface for secure data exchange between distinguishable networks
JP2003528484A5 (en)
US7665127B1 (en) System and method for providing access to protected services
US6199113B1 (en) Apparatus and method for providing trusted network security
US8522331B2 (en) Computer readable medium, authenticating method, computer data signal, authentication server, and single sign-on authentication system
US8312525B2 (en) Authentication over a network using one-way tokens
US7827318B2 (en) User enrollment in an e-community
CN1820481B (en) System and method for authenticating clients in a client-server environment
EP3316544B1 (en) Token generation and authentication method, and authentication server
US20090158392A1 (en) Dynamic authentication gateway
US20100023437A1 (en) Centralized Electronic Commerce Card Transactions
WO2001001656A1 (en) Universal session sharing
US20030236985A1 (en) Transaction security in electronic commerce
JP2003296277A5 (en)
CN114422258A (en) Single sign-on method, medium and electronic equipment based on multiple authentication protocols
US7430756B2 (en) System and method for generating and authenticating a computer password
CN116484326B (en) Multi-account access authority management method and related device based on NFT
CN116415214A (en) Data access control method and system based on digital signature
WO2002043346A1 (en) Method, device and system relating to transaction security
JPH081619B2 (en) Network security management method
WO2002042889A1 (en) Improvement in and relating to transaction security
WO2001055822A1 (en) Single logon system and method for distributed software applications
JPH08263513A (en) Data management system
EP1346539A1 (en) Improvement in electronical transaction security

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20201026