Object-based security system

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C713S165000, C709S200000, C709S223000

Reexamination Certificate

active

06829712

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention is related to the field of security systems, and in particular, to an object-based security system for computing and communications systems.
2. Statement of the Problem
Computer and communication system security has become of paramount importance with the increase in the use of such systems across all aspects of industry. Numerous security tools are available for these systems, but unfortunately, the current tools exhibit numerous shortcomings.
Current security products are designed to work as a single integrated package with their own feature set. If an improved security feature is made available in a different product, then the user must wait for their product to include the new feature or buy the other product. There is a need for security products to be abstracted behind a client interface so security features can be upgraded without replacing the security system.
Current security products are also difficult for application programmers to design to. For example, the programmer designing communications software for a personal computer must understand all of the messaging and interaction required to interface with the security product. There is a need for security products that offer simple interfaces to application software developers.
Current security products typically apply security at a single communications layer. There is a need for security tools that apply security at multiple layers of interprocessor communications.
SUMMARY OF THE SOLUTION
The invention solves the above problems with methods and software products that authenticate processes and inter-process messaging in computer or communications systems. Some examples of the invention operate as follows in an environment comprised of a first computer system, a second computer system, and a security system. In the first computer system, a process transfers a log-in request to a security object. The security object transfers a request to authenticate the process to the security system. The security system authenticates the process and generates a security association. In some versions of the invention, the security association is a random number. The security system stores the security association and transfers the security association to the security object in the first computer system.
In the first computer system, the security object transfers the security association to the middleware. The middleware subsequently receives a message from the process for transfer to the second computer system. The middleware inserts the security association into the message and transfers the message to the middleware in the second computer system.
In some examples of the invention, the security object in the first computer system transfers the security association to a transport layer in the first computer system. The transport layer receives the message from the middleware in the first computer system for transfer to the second computer system. The transport layer inserts the security association into the message and transfers the message to the transport layer in the second computer system. In the second computer system, the transport layer extracts the security association from the message and transfers the security association to the security system. The security system checks the security association extracted from the message with the stored security association to authenticate the message.
Some examples of the invention include software products. One software product comprises security software and middleware software stored on a software storage medium. The security software directs a processor to receive a log-in request for a process, generate a request to authenticate the process, transfer the request to authenticate the process, receive a security association for the process, and transfer the security association. The middleware software directs the processor to receive the security association from the security software, receive a message from the process, insert the security association into the message, and transfer the message.
Another software product comprises security software stored on a software storage medium. The security software directs a processor to receive a request to authenticate a process, authenticate the process, generate a security association for the process, store the security association, transfer the security association, receive the security association extracted from a message, and check the security association extracted from the message with the stored security association to authenticate the message.
The invention authenticates processes and inter-process messaging. The processes could be in an end-user's computer to provide access to a network. The processes could also be in a network system without any end-user. In some examples of the invention, security is performed in three layers—the application layer, the middleware layer, and the transport layer. The three layers of security provide a highly secure environment.
One advantage of the security system is the ease with which processes can be developed and installed for use within a highly secured environment. The programmer need only design their process to provide a password to a local security object. The use of middleware provides an easy message interface to the programmer for this purpose. The security objects and middleware then handle the authentication of both the process and messages sent and received by the process. System users and devices only need the relatively thin client security objects, middleware, and transport software to operate in a highly secured environment.
The local security objects also provide a thin client interface to a robust security toolkit. The security features are abstracted behind the client interface and can be conveniently updated for a user without changing out the user's security system. Thus, the user is provided a true choice of advanced in security technologies.


REFERENCES:
patent: 5872847 (1999-02-01), Boyle et al.
patent: 6009177 (1999-12-01), Sudia
patent: 6026293 (2000-02-01), Osborn
patent: 6067620 (2000-05-01), Holden et al.
patent: 6128391 (2000-10-01), Denno et al.
patent: 6212636 (2001-04-01), Boyle et al.
patent: 6266413 (2001-07-01), Shefi
patent: 6373946 (2002-04-01), Johnston
patent: 6430170 (2002-08-01), Saints et al.
patent: 6499108 (2002-12-01), Johnson
patent: 6751729 (2004-06-01), Giniger et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Object-based security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Object-based security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Object-based security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3275282

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.