CA2349880A1 - System and method for installing an auditable secure network - Google Patents

System and method for installing an auditable secure network

Info

Publication number
CA2349880A1
CA2349880A1 CA002349880A CA2349880A CA2349880A1 CA 2349880 A1 CA2349880 A1 CA 2349880A1 CA 002349880 A CA002349880 A CA 002349880A CA 2349880 A CA2349880 A CA 2349880A CA 2349880 A1 CA2349880 A1 CA 2349880A1
Authority
CA
Canada
Prior art keywords
node
nodes
network
remote computer
installation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002349880A
Other languages
French (fr)
Other versions
CA2349880C (en
Inventor
Benjamin H. Smith
Fred H. Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Angel Secure Networks Inc
Original Assignee
Angel Secure Networks, Inc.
Benjamin H. Smith
Fred H. Smith
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Angel Secure Networks, Inc., Benjamin H. Smith, Fred H. Smith filed Critical Angel Secure Networks, Inc.
Publication of CA2349880A1 publication Critical patent/CA2349880A1/en
Application granted granted Critical
Publication of CA2349880C publication Critical patent/CA2349880C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Alarm Systems (AREA)

Abstract

A system and method for generating and remotely installing a private secure and auditable network is provided. Node identification, link, and applicatio n information is input into a template (610). A generator (620) generates components (642, 648, 652, 658, 662, 668) using the information in the template (610) and the components are remotely installed using an installati on server (630). The components include agent modules (642, 652, 662) which are each installed at predetermined target site (640, 650, 660, 670) and establi sh communication with the installation server (630) to facilitate the download of other components, including application software and configuration files. Ea ch node can only be installed once and is specific to a predetermined target si te (640, 650, 660, 670). For each link, a unique pair of keys is generated in a form which is not human readable, each key corresponds to a different direction of communication over the link. Data transmitted between nodes is encrypted using the public-private key pairs. At least one monitor node (772 ) manages the security of the network, strobes keys, and may take nodes out of the network in the event of a security violation.

Claims (59)

1. A system for generating, installing to a plurality of linked remote computers, and monitoring a secure network of nodes, said system comprising:
A. at least one software application;
B. an installation server, configured to facilitate installation of said at least one software application;
C. a generator, configured to generate a plurality of software components from a network definition, including a plurality of agent modules, wherein each agent module is executable on a corresponding remote computer to initiate communication with said installation server and subsequent installation of a corresponding software application on said remote computer to form a node, wherein each of said nodes is capable of automatically establishing communication with others of said nodes according to said network definition; and D. a monitor node configured to monitor security of said network.
2. A system according to claim 1, wherein the remote computers are linked substantially by the Internet.
3. A system according to claim 1, wherein the remote computers are linked substantially by an intranet.
4. A system according to claim 1, wherein said network definition includes a plurality of node definitions, each node definition including:
C. (i) an identification of one of said plurality of remote computers;
(ii) an identification of at least one software application to be installed on said remote computer to form a node; and (iii) an identification of each other node to which said node is to be linked.
5. A system according to claim 4, wherein said identification of each of said plurality remote computers includes:
C. (i) (a) an IP address; and (b) a node name.
6. A system according to claim 1, wherein said plurality of software components further includes:
C. (i) a plurality of node configuration files, wherein a different one of said node configuration files corresponds to a different node and includes information for facilitating selective communication with others of said nodes according to said network definition; and (ii) at least one network information file, having information corresponding to substantially all links between nodes and accessible by said monitor node to facilitate the selective linking of said nodes.
7. A system according to claim 1, wherein said installation server is configured to facilitate said installation of said corresponding software application as a function of a verification that said agent module is executing on said corresponding remote computer, according to said network definition.
8. A system according to claim 1, wherein said installation server is configured to facilitate said installation of said corresponding software application as a function of a verification that said agent module has not been previously installed.
9. A system according to claim 1, further including a second monitor node configured to determine the presence of an interposed, unintended node.
10. A system according to claim 1, wherein said monitor node is further configured to selectively terminate operation and connection of one or more tainted nodes in response to a detected security violation.
11. A system according to claim 10, wherein said installation server is further configured to initiate a regeneration of a set of said software components, reinstallation of said at least one software application, and selective relinking to other nodes for each of said selectively terminated one or more tainted nodes and according to said network definition.
12. A system according to claim 1, wherein said monitor node and each of said nodes communicate using secure data transfer.
13. A system according to claim 12, wherein said secure data transfer is accomplished using data encryption, and wherein data transferred in each direction between two linked nodes is encrypted differently.
14. A system according to claim 13, wherein each of two linked nodes uses a unique pair of encryption keys to accomplish said data encryption, and each pair of encryption keys includes a substantially hidden private key and a public key.
15. A system according to claim 14, wherein said monitor node is further configured to selectively initiate a coordinated strobing of each pair encryption keys between two linked nodes.
16. A system according to claim 1, further including:
E. an account server, configured to generate billing information as a function of the selective linking of said node to said other nodes.
17. A system according to claim 1, wherein said installation server is configured to communicate with each of said plurality of remote computers using data encryption.
18. A system according to claim 17, wherein said installation uses a randomly generated private key and public key pair for data encryption, wherein data to be transferred to said installation server is encrypted using said public key and is decrypted by said installation server using said private key.
19. A system according to claim 18, further including:
E. a second monitor node, configured to compare the installation server public key with the encryption key used by one of said plurality of remote computers to encrypt data sent to said installation server, a negative comparison being indicative of a security violation.
20. A system for generating, installing to a plurality of linked remote computers, and monitoring a secure network of nodes, said system comprising:
A. at least one software application;
B. an installation server, configured to facilitate installation of said at least one software application;
C. a generator, configured to generate a plurality of software components from a network definition, including a plurality of agent modules, wherein each agent module is executable on a corresponding remote computer to initiate communication with said installation server and subsequent installation of a corresponding software application on said remote computer to form a node, wherein each of said nodes is capable of automatically establishing communications with others of said nodes according to said network definition; and D. a monitor node configured to monitor security of said network, wherein said monitor node and each of said nodes communicate using secure data transfer.
21. A system according to claim 20, wherein said secure data transfer is data encryption and each of two linked nodes uses a unique set of encryption keys to accomplish said data encryption.
22. A system according to claim 21, wherein said encryption keys are substantially randomly generated.
23. A system according to claim 21, wherein each set of said encryption keys includes a hidden private key and a public key, and said public key is used by a first node in a link to encrypt data transmitted to a second node in the link, and said private key is used to decrypt said data by said second node.
24. A system according to claim 21 wherein said monitor node is further configured to selectively initiate a coordinated strobing of each set of encryption keys between two linked nodes.
25. A system according to claim 21, wherein said monitor node is further configured to effectuate persistence of said encryption keys, and wherein when a first set of encryption keys used by two linked nodes is strobed, a second set of encryption keys is randomly generated, and said first and said second sets are stored in a memory, such that when one or both of said two linked nodes loses its connection with the other of said two linked nodes, said two linked nodes attempt to reestablish said connection alternatively using said first and said second set of encryption keys.
26. A system according to claim 21, wherein said installation server is configured to communicate with each of said plurality of remote computers using data encryption.
27. A system according to claim 26, wherein said installation uses a randomly generated private key and public key pair for data encryption, wherein data to be transferred to said installation server is encrypted using said public key and is decrypted by said installation server using said private key.
28. A system according to claim 27, further including:
E. a second monitor node, configured to compare the installation server public key with the encryption key used by one of said plurality of remote computers to encrypt data sent to said installation server, a negative comparison being indicative of a security violation.
29. A system for generating, installing to a plurality of linked remote computers, and monitoring an auditible secure network of nodes, said system comprising an secure network:
A. at least one software application;
B. an installation server, configured to facilitate installation of said at least one software application;
C. a generator, configured to generate a plurality of software components from a network definition, including a plurality of agent modules, wherein each agent module is executable on a predetermined corresponding remote computer to initiate communication with said installation server and subsequent installation of a predetermined corresponding software application on said remote computer to form a node, wherein each of said nodes is capable of automatically establishing communication with others of said nodes according to said network definition, and wherein said subsequent installation is contingent upon a first verification that said agent module is installed on its corresponding remote computer and wherein said installation is further contingent upon a second verification that said software application is installed on its predetermined corresponding remote computer; and D. a monitor node configured to monitor security of said network.
30. A system according to claim 29, wherein said installation server is configured to terminate said installation of said at least one software application on said corresponding remote computer if said agent module has been previously installed.
31. A system according to claim 29, wherein said installation server is configured to terminate said installation of said at least one software application on said corresponding remote computer if said agent module is not installed on said corresponding computer.
32. A system according to claim 29 wherein said installation server is configured to perform said subsequent installation in response to receipt of a password entered at said remote computer, as said first verification.
33. A system according to claim 29, wherein said installation server is configured to complete said installation in response to receipt of a password entered at said remote computer, as said second verification.
34. A system according to claim 29, further including:
E. a software component analyzer, configured to analyze said software components and determine the presence of trap doors.
35. A system according to claim 29, wherein said installation server is configured to communicate with each of said plurality of remote computers using data encryption.
36. A system according to claim 35, wherein said installation uses a randomly generated private key and public key pair for data encryption, wherein data to be transferred to said installation server is encrypted using said public key and is decrypted by said installation server using said private key.
37. A system according to claim 36, further including:
E. a second monitor node, configured to compare the installation server public key with the encryption key used by one of said plurality of remote computers to encrypt data sent to said installation server, a negative comparison being indicative of a security violation.
38. A method for generating, installing to a plurality of remote computers, and monitoring a secure network having a plurality of nodes, a generator, an installation server, and a monitor node, the method comprising the steps:
A. creating a network definition, including information that describes each remote computer, at least one software application to be installed on each remote computer, and each link between nodes;
B. generating with said generator a plurality of software components, as a function of said network definition, including a plurality of agent modules, wherein each agent module is executable on a preselected one of said remote computers and includes functionality to communicate with said installation server;
C. executing an agent module on its corresponding remote computer, wherein said agent module automatically establishes communication with said installation server;
D. downloading, using said installation server, to said remote computer a corresponding at least one software application;
E. executing said at least one software application on said remote computer to form a node and automatically establishing a connection with said monitor node;

F. selectively linking said node to others of said plurality of nodes, under control of said monitor node and according to said network definition; and G. repeating steps C through F for each agent module and corresponding remote computer.
39. The method of claim 38, wherein step A includes identifying each remote computer by an IP address and a node name.
40. The method of claim 38 wherein step B further includes generating:
(i) a plurality of node configuration files, wherein each node configuration files corresponds to one of said nodes; and (ii) a set of network information files, including information corresponding to a plurality of links required to form said network.
41. The method of claim 38 wherein step D further includes verifying that said agent module is executing on a corresponding remote computer, according to said network definition, as a prerequisite to downloading said at least one software application.
42. The method of claim 41 wherein step B includes generating a unique local password for each node and said verifying in step D includes:
(i) entering said local password at said remote computer; and (ii) verifying said local password at said installation server.
43. The method of claim 38 wherein step D further includes verifying that said agent module has not been previously installed, as a prerequisite to downloading said at least one software application.
44. The method of claim 38 wherein step F further includes verifying that said software application is executing on its corresponding remote computer according to said network definition, as a prerequisite of selectively linking said node to others of said plurality of nodes.
45. The method of claim 44 wherein step B includes generating a unique audit password for each node and said verification in step F includes:
(i) entering said audit password at said remote computer; and (ii) verifying said audit password.
46. The method of claim 38, further including a step:
H. terminating operation and connection of one or more tainted nodes, under control of said monitor node, in response to detection of a security violation related to said tainted node.
47. The method of claim 46, further including a step:
I. repeating steps B-G for each of said one or more tainted nodes.
48. The method of claim 38, wherein step B further includes generating for each node in a pair of linked nodes, a set of encryption keys, including a private key and a public key, to facilitate secure communication between said linked nodes.
49. The method of claim 48, further including step:
H. (i) selecting said pair of linked nodes; and (ii) strobing each set of encryption keys for said linked nodes.
50. The method of claim 49, wherein said two linked nodes are a first node and a second node and said strobing includes the steps:
(a) ceasing data transfer between said first and second nodes;
(b) randomly generating a new first private key for said first node;
(c) deriving a new first public key from said new first private key and storing said new first private and public keys;
(d) encrypting said new first public key with a current second public key of said second node and transmitting said new first public key to said second node;
(e) decrypting with a current second private key said new first public key and storing said new first public key at said second node and randomly generating a new second private key;
(f) deriving a new second public key from said new second private key and storing said new second private and public keys;
(h) encrypting said new second public key with a current first public key of said first node and transmitting said new second public key to said first node;
(i) decrypting with a current first private key said new second public key and storing said new second public key at said first node;
(j) exchanging confirmations between said first and second nodes to use said new first and second private and public keys; and (k) resuming data transfer between said two linked nodes.
51. The method of claim 50, wherein each pair of linked nodes also uses at least one session key to encrypt data transferred between said linked nodes and said strobing further includes:
randomly generating, exchanging and storing at least one new session key for said linked nodes, between steps H(ii)(a) and H(ii)(k).
52. The method of claim 50 wherein said strobing is strobing with persistence and said step H(ii) further includes saving said current first and second public and private keys.
53. The method of claim 38, wherein said network further includes an account server, said method further comprising the step of:
H. (i) communicating to said account server said linking of said node, in step F; and (ii) generating billing information related to said linking of said node.
54. The method of claim 38, wherein step B includes generating a unique set of encryption keys for each node and said monitor node.
55. The method of claim 54, wherein step E includes the steps of:
(i) logging into said monitor node by said node using a unique encryption key from a corresponding set of node encryption keys generated by said generator; and (ii) logging into said node using a unique monitor node encryption key from a corresponding set of monitor node encryption keys generated by said generator.
56. The method of claim 38, wherein said secure network further includes a second monitor node and said installation server communicates with each of said plurality of remote computers using a private and public encryption key pair, the method further including the step of:
H. (i) comparing the public key of said installation server with a key used by one of said plurality of remote computers to encrypt data sent to said installation server; and (ii) issuing a security violation message, in the event of a negative comparison.
57. A method for generating, installing to a plurality of remote computers, and monitoring a secure network having a plurality of nodes, a generator, an installation server, and a monitor node, said network used for conducting financially related transactions between a custody system of a bank and a trading system of a financial client, the method comprising the steps of:
A. creating, by a bank sales department, a network definition embodying the network required by the financial client and to be generated, installed and monitored by the bank;
B. modeling and testing said network definition, by a bank development group;
C. obtaining authorization from a bank network administration group and installing said network definition on said generator, by said bank development group;
D. obtaining by said bank sales group a sales password and authorization to install network from said network administration group;
E. auditing on said generator a generated network definition by comparing said generated network definition to said network definition and inputting said sales password as an indication of a favorable comparison, by said bank sales group;
F. obtaining by a bank audit group, an audit password and authorization to install network from said network administration group;

G. auditing on said generator a generated network definition by comparing said generated network definition to said network definition and inputting said audit password as an indication of a favorable comparison, by said bank audit group;
H. generating with said generator a plurality of software components to be installed on said plurality of remote computers to form said plurality of nodes of said network, said components including:
(i) a plurality of agent modules, each agent module having the capability to establish communications with said installation server;
(ii) a local sales password, for each agent module;
(iii) a local audit password for each agent module;
I. registering said agent modules with said installation server, wherein said installation server has access to at least one or more bank custody software applications to be stored on each of said plurality of remote computers to form said nodes, according to said network definition;
J. communicating to each remote computer a corresponding one of said local sales passwords to a sales department representative;
K. communicating to each remote computer a corresponding one of said local audit passwords to an audit department representative;
L. executing each agent module on its corresponding remote computer, entering said local sales password to verify that said agent module is installed on its corresponding remote computer according to said network definition, and downloading said corresponding at least one bank custody software application;
M. executing each of said at least one software applications on its corresponding remote computer, establishing communication with said monitor node, entering said local audit password to verify that said at least one software application is installed on its corresponding remote computer according to said network definition; and N. selectively linking said nodes into said network.
58. A method for generating, installing to a plurality of remote computers, and monitoring a secure network having a plurality of nodes, a generator, an installation server, and a monitor node, wherein the secure network is used for the exchange of confidential data between a first system of a first group and a second system of a second group, the method comprising the steps:
A. creating a network definition, including information that describes each remote computer, at least one first group software application to be installed on each remote computer, and each link between nodes;
B. generating with said generator a plurality of software components, as a function of said network definition, including a plurality of agent modules, wherein each agent module is executable on a preselected one of said remote computers and includes functionality to communicate with said installation server;
C. executing an agent module on its corresponding remote computer, wherein said agent module automatically establishes communication with said installation server;
D. (i) human auditing and verifying that said agent module is installed on its corresponding remote computer according to said network definition by a third group; and (ii) downloading, using said installation server, to said remote computer a corresponding at least one first group software application;
E. (i) executing said at least one first group software application on said remote computer to form a node and automatically establishing a connection with said monitor node; and (ii) human auditing and verifying that said at least one first group software application is installed on its corresponding remote computer according to said network definition by a fourth group, independent from said third group;
F. communicating with others of said plurality of nodes according to said network definition; and G. repeating steps C through F for each agent module and corresponding remote computer.
59. The method of claim 58 wherein said confidential data is financial data and said first system of said first group is a custody system of a bank and said second system of said second group is a trading system of a financial services group.
CA2349880A 1998-11-16 1999-11-16 System and method for installing an auditable secure network Expired - Lifetime CA2349880C (en)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US10856698P 1998-11-16 1998-11-16
US60/108,566 1998-11-16
US10886898P 1998-11-18 1998-11-18
US60/108,868 1998-11-18
US12195999P 1999-02-25 1999-02-25
US60/121,959 1999-02-25
PCT/US1999/027138 WO2000029962A1 (en) 1998-11-16 1999-11-16 System and method for installing an auditable secure network

Publications (2)

Publication Number Publication Date
CA2349880A1 true CA2349880A1 (en) 2000-05-25
CA2349880C CA2349880C (en) 2012-01-17

Family

ID=27380504

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2349880A Expired - Lifetime CA2349880C (en) 1998-11-16 1999-11-16 System and method for installing an auditable secure network

Country Status (5)

Country Link
EP (1) EP1131727A4 (en)
AU (1) AU776222B2 (en)
CA (1) CA2349880C (en)
HK (1) HK1043408A1 (en)
WO (1) WO2000029962A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2448932A1 (en) * 2001-07-02 2003-01-16 British Telecommunications Public Limited Company Program installation process
JP4091908B2 (en) * 2003-12-18 2008-05-28 株式会社エヌ・ティ・ティ・ドコモ COMMUNICATION SYSTEM, COMMUNICATION TERMINAL DEVICE AND INFORMATION STORAGE MODULE
US8156489B2 (en) 2004-05-21 2012-04-10 Computer Associates Think, Inc. Distributed installation configuration system and method
DE102020204023A1 (en) * 2020-03-27 2021-09-30 Siemens Mobility GmbH Data transmission method and communication system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4408203A (en) * 1978-01-09 1983-10-04 Mastercard International, Inc. Security system for electronic funds transfer system
US5974236A (en) * 1992-03-25 1999-10-26 Aes Corporation Dynamically reconfigurable communications network and method
CA2091851A1 (en) * 1992-03-25 1993-09-26 Michael J. Sherman Link layered communications network and method
US5452415A (en) * 1992-03-26 1995-09-19 Alcatel Network Systems, Inc. Method and system for automatically displaying and configuring a network monitoring system
US5301247A (en) * 1992-07-23 1994-04-05 Crest Industries, Inc. Method for ensuring secure communications
US5421009A (en) * 1993-12-22 1995-05-30 Hewlett-Packard Company Method of remotely installing software directly from a central computer
US5416842A (en) * 1994-06-10 1995-05-16 Sun Microsystems, Inc. Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5548649A (en) * 1995-03-28 1996-08-20 Iowa State University Research Foundation Network security bridge and associated method
US5748896A (en) * 1995-12-27 1998-05-05 Apple Computer, Inc. Remote network administration methods and apparatus
US6067582A (en) * 1996-08-13 2000-05-23 Angel Secure Networks, Inc. System for installing information related to a software application to a remote computer over a network

Also Published As

Publication number Publication date
WO2000029962A8 (en) 2000-10-12
AU1626600A (en) 2000-06-05
AU776222B2 (en) 2004-09-02
EP1131727A4 (en) 2005-02-09
HK1043408A1 (en) 2002-09-13
WO2000029962A1 (en) 2000-05-25
EP1131727A1 (en) 2001-09-12
CA2349880C (en) 2012-01-17

Similar Documents

Publication Publication Date Title
US5530758A (en) Operational methods for a secure node in a computer network
CA2233441C (en) Secured gateway interface
US6918038B1 (en) System and method for installing an auditable secure network
JP4016019B2 (en) Apparatus, system, and method for providing authorized remote access to a target system
CN100583871C (en) A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US6912653B2 (en) Authenticating communications
US6532543B1 (en) System and method for installing an auditable secure network
CN110032545A (en) File memory method, system and electronic equipment based on block chain
KR100994937B1 (en) Secure proximity verification of a node on a network
US7590844B1 (en) Decryption system and method for network analyzers and security programs
US20080022085A1 (en) Server-client computer network system for carrying out cryptographic operations, and method of carrying out cryptographic operations in such a computer network system
CA2547154A1 (en) Secure file transfer for web service
JP5602165B2 (en) Method and apparatus for protecting network communications
NO336212B1 (en) Locking system and a method for configuring a locking system
CN100581098C (en) Method and system for establishing affirmance evidence
CN102025748B (en) Method, device and system for acquiring user name of Kerberos authentication mode
CA2349880A1 (en) System and method for installing an auditable secure network
CN113987561A (en) Trusted execution environment-based private data classification method, system and terminal
KR20020083551A (en) Development and Operation Method of Multiagent Based Multipass User Authentication Systems
US7890751B1 (en) Method and system for increasing data access in a secure socket layer network environment
CN116506104B (en) Method and system for information security interaction of different departments based on cross-chain blockchain
Hatefi et al. A new framework for secure network management
Guan et al. A collaborative intrusion detection system using log server and neural networks
KR100216076B1 (en) Device and method for securing the file transfer protocol login in accounting data on-line transfer system
Wang et al. A Framework for TLS Implementation Vulnerability Testing in 5G

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20191118