CA2389380A1 - Method and transaction interface for secure data exchange between distinguishable networks - Google Patents
Method and transaction interface for secure data exchange between distinguishable networks Download PDFInfo
- Publication number
- CA2389380A1 CA2389380A1 CA002389380A CA2389380A CA2389380A1 CA 2389380 A1 CA2389380 A1 CA 2389380A1 CA 002389380 A CA002389380 A CA 002389380A CA 2389380 A CA2389380 A CA 2389380A CA 2389380 A1 CA2389380 A1 CA 2389380A1
- Authority
- CA
- Canada
- Prior art keywords
- user
- interface
- server
- internal
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
Abstract
The invention relates to a method and device for ensuring secure data exchange between an internal and an external network, said networks being fully decoupled from each other. This is achieved by means of a transaction interface (3) which creates a waiting list in a neutral area (5) for interrogations which are to be processed. Said interrogations are processed exclusively upon the initiative of and in the region of the secure internal network (2). The waiting list area is secured both externally and internally by corresponding codes and/or an external fire wall (4,6).
Claims (29)
1. A method for secure data exchange between an external network and an internal network (1 and 2) via a transaction interface (3), in which an external user can undertake predetermined data transactions within the internal network (2), wherein the transaction interface (3) comprises - a portal in the external network (1), - therebehind, in access direction, a neutral zone (5) with at least - one interface server (7) and - one interface memory (11), - as well as an internal server (12), which is already located within the internal network (2), characterized in that - inquiries of external users (17), which a data transaction within internal network (2), are conditioned by the interface server (7) and stored temporarily in precisely defined form in the interface memory (11), and - the interface memory (11) is exclusively interrogated by the internal server (12) in defined frequency, as well as - complete processing including authentication of the user takes place within the internal network (2).
2. A method according to claim 1, characterized in that the following steps take place in sequence:
- any user requests received via the portal are read and if necessary acknowledged by the interface server (7), which is located within the neutral zone (5), - if such an acknowledgement is necessary, it is sent to the user, - the interface server (7) checks the permissibility of the request by comparison with a set of predetermined permissible requests and their semantic correctness, the request being rejected in the case of error and otherwise being further processed as follows - in the case of further processing, the interface server (7) places the request in a queue (22, 22'), which is set up within the interface memory (11), - this queue (22, 22') is queried at specified frequency by the internal server (12), - in response to this query the conditioned request is sent into the internal network (2), - complete processing including authentication of the user (17) then takes place in the internal network (2), - the result is returned to the interface server (7) and - checked to determine whether the result and the inquiry match, - if affirmative, a response is output to the user (17).
- any user requests received via the portal are read and if necessary acknowledged by the interface server (7), which is located within the neutral zone (5), - if such an acknowledgement is necessary, it is sent to the user, - the interface server (7) checks the permissibility of the request by comparison with a set of predetermined permissible requests and their semantic correctness, the request being rejected in the case of error and otherwise being further processed as follows - in the case of further processing, the interface server (7) places the request in a queue (22, 22'), which is set up within the interface memory (11), - this queue (22, 22') is queried at specified frequency by the internal server (12), - in response to this query the conditioned request is sent into the internal network (2), - complete processing including authentication of the user (17) then takes place in the internal network (2), - the result is returned to the interface server (7) and - checked to determine whether the result and the inquiry match, - if affirmative, a response is output to the user (17).
3. A method according to claim 1 or 2, characterized in that the user requests from the external network (1) are delivered under scrutiny of an external firewall (4) into the neutral zone (5).
4. A method according to one of the preceding claims, characterized in that the data exchange between the neutral zone (5) and the internal network (2) is processed under scrutiny of an internal firewall (6).
5. A method according to one of the preceding claims, characterized in that an external server (10), preferably a web server, is additionally located in the neutral zone (5), at least part of the user requests being sent via this external server (10) to the interface server (7).
6. A method according to claim 5, characterized in that inquiries once received in the queue (22, 22') of the interface server (11) are stored resistantly until they have been completely handled or until a specified time has elapsed.
7. A method according to claim 6, characterized in that the frequency of querying of the queue is varied as a function of the number and/or of the power of the user inquiries by means of an appropriate frequency-control function.
8. A method according to one of the preceding claims, characterized in that parallel processes are enabled or deactivated within the interface server (7) and/or internal server (12) as a function of the number and/or of the power of the user inquiries.
9. A method according to claim 8, characterized in that, within the neutral zone (5) there is located a plurality of interface servers (7), which are activated or deactivated according to the number and/or power of the user requests, the load control necessary for this purpose being exerted by means of the external server (10) and/or by means of a load-control module of the external firewall (4).
10. A method according to claim 8 and 9, characterized in that, within the internal network (2), there is located a plurality of internal servers (12), which are activated or deactivated according to the number and/or power of the user requests, the load control necessary for this purpose being exerted by means of the interface server (7) and/or by means of a load-control module of the internal firewall (6).
11. A method according to one of the preceding claims, characterized in that the user inquiries are encrypted within the neutral zone (5) before being sent into the internal zone (2).
12. A method according to claim 11, characterized in that the respective keys used for encryption have an individually predeterminable life.
13. A method according to one of the preceding claims, characterized in that authentication of the user (17) takes place independently of the other processing of the user inquiry.
14. A method according to claim 13, characterized in that the following steps for authentication of the user (17) take place in sequence:
- a user ID and a user password are separated from the user inquiry in the neutral zone (5), - upon request of the internal server (12), the user ID is sent to the internal network (2), - the user ID is encrypted in the internal network (2) using the password filed for this user ID in the internal network (2), - and the user ID encrypted in this way is delivered back into the neutral zone (5), - the user ID returned from the internal network (2) is decrypted using the password entered by the user (17) and stored temporarily in the neutral zone (5), - the decrypted user ID and that entered by the user are compared, authenticity of the user being confirmed in the case of a match and denied otherwise, after which the user inquiry is or is not further processed depending on the said comparison.
- a user ID and a user password are separated from the user inquiry in the neutral zone (5), - upon request of the internal server (12), the user ID is sent to the internal network (2), - the user ID is encrypted in the internal network (2) using the password filed for this user ID in the internal network (2), - and the user ID encrypted in this way is delivered back into the neutral zone (5), - the user ID returned from the internal network (2) is decrypted using the password entered by the user (17) and stored temporarily in the neutral zone (5), - the decrypted user ID and that entered by the user are compared, authenticity of the user being confirmed in the case of a match and denied otherwise, after which the user inquiry is or is not further processed depending on the said comparison.
15. A transaction interface for secure data exchange between an external network and an internal network (1 and 2), in which an external user (17) can initiate predetermined data transactions within the internal network (2), for which purpose the transaction interface (3) comprises - a neutral zone (5), which in access direction is located behind a portal in the external network (1) and is provided with at least one interface server (7) as well as with - at least one interface memory (11), - at least one internal server (12), which is located within the internal network (2), characterized in that - a queue (22, 22') for temporary storage of user requests is set up within the interface memory (11), - the said queue can be queried at a specified frequency by the internal server (12) and - in that, after the appropriately conditioned requests have been sent to the internal server (12), complete processing of the requests, including user authentication, is provided within the internal network (2).
16. A transaction interface according to claim 15, characterized in that the neutral zone (5) is insulated from the external network (1) by means of an external firewall (4).
17. A transaction interface according to claim 15 or 16, characterized in that the internal network (2) is insulated from the neutral zone (5) by means of an internal firewall (6).
18. A transaction interface according to one of claims 15 to 17, characterized in that there is additionally provided within the neutral zone (5) an external server (10), which can be addressed from the external network (1) directly or indirectly via the interface server (7) for processing of user inquiries.
19. A transaction interface according to one of claims 15 to 18, characterized in that the configuration of the transaction interface (3) is automatically overwritten from the internal network (2) at predeterminable time intervals.
20. A transaction interface according to one of claims 15 to 19, characterized in that data filed in the neutral zone (5) are automatically overwritten from the internal network (2) at predeterminable time intervals.
21. A transaction interface according to one of claims 15 to 20, characterized in that the interface memory (11) is scalable in such a way that user inquiries received from the external network (1) are sorted into queues (22, 22') of the interface server (7) according to scope and urgency, and if necessary additional processes can be activated.
22. A transaction interface according to claim 21, characterized in that, within the neutral zone (5) there is located a plurality of network computers, on each of which there is located an interface server (7), wherein additional servers (7) can be activated or deactivated according to the number and/or power of the user requests, load control being exerted by the external server (10) and/or by the external firewall (4).
23. A transaction interface according to claim 20 or 2119, characterized in that, in the area of the internal network (2), there is located a plurality of network servers, each of which is equipped with an internal server (12), which can be activated or deactivated according to the scope and power of the user requests, load control being exerted by the internal firewall (6) or by one or more interface servers (7).
24. A transaction interface according to one of the preceding claims 15 to 23, characterized in that the internal server (12) communicates with the internal network (2) via a CORBA bus.
25. A transaction interface according to claim 24, characterized in that the entire transaction interface (3) is in data communication via a continuous CORBA bus system.
26. A transaction interface according to one of the preceding claims 15 to 25, characterized in that the entire internal interface communication takes place with SSL encryption, preferably with encryption according to DES.
27. A transaction interface according to one of the preceding claims 15 to 26, characterized in that the interface server (7) sends a confirmation request to the user (17) before placement of certain user questions, and further processing takes place only after receipt of confirmation.
28. A transaction interface according to one of the preceding claims 15 to 27, characterized in that a log that records all transactions processed via the transaction interface (3) is recorded by means of a logging module.
29. A transaction interface according to one of the preceding claims 15 to 28, characterized in that configuration of the interface server (7) can be performed exclusively from the internal network (2).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19952527A DE19952527C2 (en) | 1999-10-30 | 1999-10-30 | Process and transaction interface for secure data exchange between distinguishable networks |
DE19952527.7 | 1999-10-30 | ||
PCT/EP2000/010568 WO2001033801A2 (en) | 1999-10-30 | 2000-10-26 | Method and transaction interface for secure data exchange between distinguishable networks |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2389380A1 true CA2389380A1 (en) | 2001-05-10 |
CA2389380C CA2389380C (en) | 2010-05-11 |
Family
ID=7927553
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2389380A Expired - Lifetime CA2389380C (en) | 1999-10-30 | 2000-10-26 | Method and transaction interface for secure data exchange between distinguishable networks |
Country Status (10)
Country | Link |
---|---|
US (1) | US7865939B2 (en) |
EP (1) | EP1285514B1 (en) |
JP (1) | JP2003528484A (en) |
KR (1) | KR100667450B1 (en) |
CN (1) | CN100338930C (en) |
AT (1) | ATE292868T1 (en) |
AU (1) | AU784199B2 (en) |
CA (1) | CA2389380C (en) |
DE (2) | DE19952527C2 (en) |
WO (1) | WO2001033801A2 (en) |
Families Citing this family (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7761910B2 (en) | 1994-12-30 | 2010-07-20 | Power Measurement Ltd. | System and method for assigning an identity to an intelligent electronic device |
US7127328B2 (en) | 1994-12-30 | 2006-10-24 | Power Measurement Ltd. | System and method for federated security in an energy management system |
US7188003B2 (en) | 1994-12-30 | 2007-03-06 | Power Measurement Ltd. | System and method for securing energy management systems |
US7836494B2 (en) * | 1999-12-29 | 2010-11-16 | Intel Corporation | System and method for regulating the flow of information to or from an application |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US7380120B1 (en) * | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7562232B2 (en) * | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US20050071657A1 (en) * | 2003-09-30 | 2005-03-31 | Pss Systems, Inc. | Method and system for securing digital assets using time-based security criteria |
US7748045B2 (en) * | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
US7313618B2 (en) | 2002-10-31 | 2007-12-25 | Sap Aktiengesellschaft | Network architecture using firewalls |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US7644290B2 (en) | 2003-03-31 | 2010-01-05 | Power Measurement Ltd. | System and method for seal tamper detection for intelligent electronic devices |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7707427B1 (en) * | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US7764699B2 (en) * | 2005-05-16 | 2010-07-27 | Cisco Technology, Inc. | Method and system using shared configuration information to manage network access for network users |
CN1921377B (en) * | 2005-08-26 | 2010-09-15 | 鸿富锦精密工业(深圳)有限公司 | Data synchronizing system and method |
CN101083607B (en) * | 2006-05-30 | 2010-12-08 | 倪海生 | Internet accessing server for inside and outside network isolation and its processing method |
US7979532B2 (en) * | 2006-09-15 | 2011-07-12 | Oracle America, Inc. | Systems and methods for using an access point for testing multiple devices and using several consoles |
US8850552B2 (en) * | 2007-11-21 | 2014-09-30 | Honeywell International Inc. | Use of data links for aeronautical purposes without compromising safety and security |
TR200708644A1 (en) * | 2007-12-13 | 2009-07-21 | Atti̇la Özgi̇t Dr. | Virtual airbag system. |
US20100058355A1 (en) * | 2008-09-01 | 2010-03-04 | Microsoft Corporation | Firewall data transport broker |
DE102011000876A1 (en) * | 2011-02-22 | 2012-08-23 | Dimensio Informatics Gmbh | Network separation |
WO2012140872A1 (en) | 2011-04-12 | 2012-10-18 | パナソニック株式会社 | Server collaboration system |
KR101315670B1 (en) * | 2011-05-25 | 2013-10-08 | 주식회사 슈프리마 | Method for smart phone registration when accessing security authentication device and method for access authentication of registered smart phone |
US9576046B2 (en) | 2011-11-16 | 2017-02-21 | Ptc Inc. | Methods for integrating semantic search, query, and analysis across heterogeneous data types and devices thereof |
US9098312B2 (en) | 2011-11-16 | 2015-08-04 | Ptc Inc. | Methods for dynamically generating an application interface for a modeled entity and devices thereof |
US8909641B2 (en) | 2011-11-16 | 2014-12-09 | Ptc Inc. | Method for analyzing time series activity streams and devices thereof |
US10079710B2 (en) * | 2012-02-16 | 2018-09-18 | Brightcove, Inc. | System and method for dynamic file availability during encoding |
CN103036903B (en) * | 2012-12-26 | 2016-06-08 | 北京中电普华信息技术有限公司 | Data processing method and Web Service assembly |
EP2973047A4 (en) | 2013-03-15 | 2016-11-02 | Ptc Inc | Methods for managing applications using semantic modeling and tagging and devices thereof |
US9495436B2 (en) | 2013-05-30 | 2016-11-15 | ClearStory Data Inc. | Apparatus and method for ingesting and augmenting data |
US20140359742A1 (en) * | 2013-05-30 | 2014-12-04 | ClearStory Data Inc. | Apparatus and Method for Agent Based Ingestion of Data |
US9350714B2 (en) * | 2013-11-19 | 2016-05-24 | Globalfoundries Inc. | Data encryption at the client and server level |
US10025942B2 (en) | 2014-03-21 | 2018-07-17 | Ptc Inc. | System and method of establishing permission for multi-tenancy storage using organization matrices |
US9462085B2 (en) | 2014-03-21 | 2016-10-04 | Ptc Inc. | Chunk-based communication of binary dynamic rest messages |
US10313410B2 (en) | 2014-03-21 | 2019-06-04 | Ptc Inc. | Systems and methods using binary dynamic rest messages |
US9350812B2 (en) | 2014-03-21 | 2016-05-24 | Ptc Inc. | System and method of message routing using name-based identifier in a distributed computing environment |
US9467533B2 (en) | 2014-03-21 | 2016-10-11 | Ptc Inc. | System and method for developing real-time web-service objects |
US9560170B2 (en) | 2014-03-21 | 2017-01-31 | Ptc Inc. | System and method of abstracting communication protocol using self-describing messages |
WO2015143416A1 (en) | 2014-03-21 | 2015-09-24 | Ptc Inc. | Systems and methods for developing and using real-time data applications |
US9350791B2 (en) | 2014-03-21 | 2016-05-24 | Ptc Inc. | System and method of injecting states into message routing in a distributed computing environment |
US9762637B2 (en) | 2014-03-21 | 2017-09-12 | Ptc Inc. | System and method of using binary dynamic rest messages |
US9961058B2 (en) | 2014-03-21 | 2018-05-01 | Ptc Inc. | System and method of message routing via connection servers in a distributed computing environment |
GB2531317A (en) * | 2014-10-16 | 2016-04-20 | Airbus Group Ltd | Security system |
US10552624B2 (en) * | 2016-06-24 | 2020-02-04 | Xattic, Inc. | Methods and a system for inoculating inter-device communication |
CN109600410B (en) * | 2017-09-30 | 2021-11-09 | 杭州海康威视数字技术股份有限公司 | Data storage system and method |
US20220138884A1 (en) * | 2020-10-29 | 2022-05-05 | Mastercard International Incorporated | Systems and methods for use in neutral zone execution of logic |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5699513A (en) * | 1995-03-31 | 1997-12-16 | Motorola, Inc. | Method for secure network access via message intercept |
US5826029A (en) * | 1995-10-31 | 1998-10-20 | International Business Machines Corporation | Secured gateway interface |
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
CN1075695C (en) * | 1996-09-02 | 2001-11-28 | 北京天融信网络安全技术有限公司 | Fireproof wall system |
US6253188B1 (en) * | 1996-09-20 | 2001-06-26 | Thomson Newspapers, Inc. | Automated interactive classified ad system for the internet |
US6839842B1 (en) * | 1996-12-27 | 2005-01-04 | Intel Corporation | Method and apparatus for authenticating information |
US6766454B1 (en) * | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US6381644B2 (en) * | 1997-09-26 | 2002-04-30 | Mci Worldcom, Inc. | Integrated proxy interface for web based telecommunications network management |
USH1944H1 (en) * | 1998-03-24 | 2001-02-06 | Lucent Technologies Inc. | Firewall security method and apparatus |
US6604143B1 (en) * | 1998-06-19 | 2003-08-05 | Sun Microsystems, Inc. | Scalable proxy servers with plug-in filters |
US6088796A (en) * | 1998-08-06 | 2000-07-11 | Cianfrocca; Francis | Secure middleware and server control system for querying through a network firewall |
US6317837B1 (en) * | 1998-09-01 | 2001-11-13 | Applianceware, Llc | Internal network node with dedicated firewall |
CA2287813C (en) * | 1998-10-22 | 2005-03-29 | At&T Corp. | System and method for network load balancing |
US6944299B1 (en) * | 1998-12-02 | 2005-09-13 | At&T Wireless Services, Inc. | Method for synchronous encryption over a communication medium |
US6510236B1 (en) * | 1998-12-11 | 2003-01-21 | International Business Machines Corporation | Authentication framework for managing authentication requests from multiple authentication devices |
US6701432B1 (en) * | 1999-04-01 | 2004-03-02 | Netscreen Technologies, Inc. | Firewall including local bus |
US6718388B1 (en) * | 1999-05-18 | 2004-04-06 | Jp Morgan Chase Bank | Secured session sequencing proxy system and method therefor |
US7009657B2 (en) * | 1999-06-14 | 2006-03-07 | Medialink Worldwide Incorporated | Method and system for the automatic collection and conditioning of closed caption text originating from multiple geographic locations |
US6202159B1 (en) * | 1999-06-30 | 2001-03-13 | International Business Machines Corporation | Vault controller dispatcher and methods of operation for handling interaction between browser sessions and vault processes in electronic business systems |
US7100195B1 (en) * | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US6697824B1 (en) * | 1999-08-31 | 2004-02-24 | Accenture Llp | Relationship management in an E-commerce application framework |
WO2002007395A1 (en) * | 2000-07-19 | 2002-01-24 | Hitachi, Ltd. | Web information preferential transfer system |
-
1999
- 1999-10-30 DE DE19952527A patent/DE19952527C2/en not_active Expired - Lifetime
-
2000
- 2000-10-26 AU AU10267/01A patent/AU784199B2/en not_active Expired
- 2000-10-26 DE DE50010018T patent/DE50010018D1/en not_active Expired - Fee Related
- 2000-10-26 JP JP2001534832A patent/JP2003528484A/en active Pending
- 2000-10-26 WO PCT/EP2000/010568 patent/WO2001033801A2/en active IP Right Grant
- 2000-10-26 CA CA2389380A patent/CA2389380C/en not_active Expired - Lifetime
- 2000-10-26 EP EP00971398A patent/EP1285514B1/en not_active Expired - Lifetime
- 2000-10-26 AT AT00971398T patent/ATE292868T1/en not_active IP Right Cessation
- 2000-10-26 KR KR1020027005572A patent/KR100667450B1/en active IP Right Grant
- 2000-10-26 CN CNB008197377A patent/CN100338930C/en not_active Expired - Lifetime
-
2006
- 2006-09-15 US US11/522,098 patent/US7865939B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
DE50010018D1 (en) | 2005-05-12 |
WO2001033801A3 (en) | 2002-12-05 |
JP2003528484A (en) | 2003-09-24 |
EP1285514A2 (en) | 2003-02-26 |
DE19952527A1 (en) | 2001-05-10 |
CN1535527A (en) | 2004-10-06 |
KR100667450B1 (en) | 2007-01-10 |
EP1285514B1 (en) | 2005-04-06 |
CN100338930C (en) | 2007-09-19 |
WO2001033801A2 (en) | 2001-05-10 |
AU1026701A (en) | 2001-05-14 |
US7865939B2 (en) | 2011-01-04 |
ATE292868T1 (en) | 2005-04-15 |
AU784199B2 (en) | 2006-02-23 |
CA2389380C (en) | 2010-05-11 |
US20070067837A1 (en) | 2007-03-22 |
DE19952527C2 (en) | 2002-01-17 |
KR20030026919A (en) | 2003-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2389380A1 (en) | Method and transaction interface for secure data exchange between distinguishable networks | |
JP2003528484A5 (en) | ||
US7665127B1 (en) | System and method for providing access to protected services | |
US6199113B1 (en) | Apparatus and method for providing trusted network security | |
US8522331B2 (en) | Computer readable medium, authenticating method, computer data signal, authentication server, and single sign-on authentication system | |
US8312525B2 (en) | Authentication over a network using one-way tokens | |
US7827318B2 (en) | User enrollment in an e-community | |
CN1820481B (en) | System and method for authenticating clients in a client-server environment | |
EP3316544B1 (en) | Token generation and authentication method, and authentication server | |
US20090158392A1 (en) | Dynamic authentication gateway | |
US20100023437A1 (en) | Centralized Electronic Commerce Card Transactions | |
WO2001001656A1 (en) | Universal session sharing | |
US20030236985A1 (en) | Transaction security in electronic commerce | |
JP2003296277A5 (en) | ||
CN114422258A (en) | Single sign-on method, medium and electronic equipment based on multiple authentication protocols | |
US7430756B2 (en) | System and method for generating and authenticating a computer password | |
CN116484326B (en) | Multi-account access authority management method and related device based on NFT | |
CN116415214A (en) | Data access control method and system based on digital signature | |
WO2002043346A1 (en) | Method, device and system relating to transaction security | |
JPH081619B2 (en) | Network security management method | |
WO2002042889A1 (en) | Improvement in and relating to transaction security | |
WO2001055822A1 (en) | Single logon system and method for distributed software applications | |
JPH08263513A (en) | Data management system | |
EP1346539A1 (en) | Improvement in electronical transaction security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20201026 |