System, method and article of manufacture for security...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C709S223000

Reexamination Certificate

active

06324647

ABSTRACT:

FIELD OF INVENTION
The present invention relates to development architecture frameworks, and more particularly to security management in a development framework.
BACKGROUND OF INVENTION
An important use of computers is the transfer of information over a network. Currently, the largest computer network in existence is the Internet. The Internet is a worldwide interconnection of computer networks that communicate using a common protocol. Millions of computers, from low end personal computers to high-end super computers are coupled to the Internet.
The Internet grew out of work funded in the 1960s by the U.S. Defense Department's Advanced Research Projects Agency. For a long time, Internet was used by researchers in universities and national laboratories to share information. As the existence of the Internet became more widely known, many users outside of the academic/research community (e.g., employees of large corporations) started to use Internet to carry electronic mail.
In 1989, a new type of information system known as the World-Wide-Web (“the Web”) was introduced to the Internet. Early development of the Web took place at CERN, the European Particle Physics Laboratory. The Web is a wide-area hypermedia information retrieval system aimed to give wide access to a large universe of documents. At that time, the Web was known to and used by the academic/research community only. There was no easily available tool which allows a technically untrained person to access the Web.
In 1993, researchers at the National Center for Supercomputing Applications (NCSA) released a Web browser called “Mosaic” that implemented a graphical user interface (GUI). Mosaic's graphical user interface was simple to learn yet powerful. The Mosaic browser allows a user to retrieve documents from the World-Wide-Web using simple point-and-click commands. Because the user does not have to be technically trained and the browser is pleasant to use, it has the potential of opening up the Internet to the masses. The architecture of the Web follows a conventional client-server model. The terms “client” and “server” are used to refer to a computer's general role as a requester of data (the client) or provider of data (the server). Under the Web environment, Web browsers reside in clients and Web documents reside in servers. Web clients and Web servers communicate using a protocol called “HyperText Transfer Protocol” (HTTP). A browser opens a connection to a server and initiates a request for a document. The server delivers the requested document, typically in the form of a text document coded in a standard Hypertext Markup Language (HTML) format, and when the connection is closed in the above interaction, the server serves a passive role, i.e., it accepts commands from the client and cannot request the client to perform any action.
The communication model under the conventional Web environment provides a very limited level of interaction between clients and servers. In many systems, increasing the level of interaction between components in the systems often makes the systems more robust, but increasing the interaction increases the complexity of the interaction and typically slows the rate of the interaction. Thus, the conventional Web environment provides less complex, faster interactions because of the Web's level of interaction between clients and servers.
SUMMARY OF INVENTION
A system, method, and article of manufacture are provided for providing security management in a development architecture framework by first detecting unauthorized attempts to access a network. When an unauthorized attempt to access the network is detected, a user is notified. Access from the network is restricted to a separate wide area network. The identities of users of credit cards are verified during transactions carried out over the network. The content of electronic mail communicated over the network is also monitored so that the communication of the electronic mail over the network is prevented when the content thereof being deemed inappropriate. The electronic mail is also encrypted during the communication thereof over the network.
In one embodiment of the present invention, a system administration may be provided which carries out several duties including: maintaining user access to the network, implementing tools on the network, analyzing security logs, investigating security violations over the network, and configuring a security system on a plurality of technology platforms. In another embodiment of the present invention, a security project and planning component may be provided which carries out various duties including assessing threats and risks over the network, implementing security polices and procedures over the network, implementing a disaster recovery plan over the network, and providing security training for the users of the network.
In an embodiment of the present invention, a business process security component may be provided to carry out the duties of defining functional requirements over the network and monitoring security performance indicators for business processes carried out over the network. In a further embodiment of the present invention, a cryptography engine may be employed for integrating security features over the network. In yet another embodiment, a firewall may be provided for enforcing security over the network.


REFERENCES:
patent: 5163098 (1992-11-01), Dahbura
patent: 5301320 (1994-04-01), McAttee et al.
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5721908 (1998-02-01), Lagarde et al.
patent: 5835722 (1998-11-01), Bradshaw et al.
patent: 5890133 (1999-03-01), Ernst
patent: 5907704 (1999-05-01), Gudmundson et al.
patent: 5953707 (1999-09-01), Huang et al.
patent: 5961594 (1999-10-01), Bouvier et al.
patent: 5987611 (1999-11-01), Freund
patent: WO 99/08208 (1999-02-01), None
Microsoft Corporation, Microsoft Solutions Framework Overview A Quick Tour of the MSF Models, URL: http://channels.microsoft.com/enterprise/support/support/consult, Viewed Oct. 9, 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System, method and article of manufacture for security... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System, method and article of manufacture for security..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System, method and article of manufacture for security... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2575882

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.