US20140259105A1 - System and method for securely accessing data through web applications - Google Patents

System and method for securely accessing data through web applications Download PDF

Info

Publication number
US20140259105A1
US20140259105A1 US13/786,723 US201313786723A US2014259105A1 US 20140259105 A1 US20140259105 A1 US 20140259105A1 US 201313786723 A US201313786723 A US 201313786723A US 2014259105 A1 US2014259105 A1 US 2014259105A1
Authority
US
United States
Prior art keywords
server
mediating entity
proprietary
information server
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/786,723
Other versions
US10158618B2 (en
Inventor
Massoud Alibakhsh
Shahram Famorzadeh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuesoft Technologies Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/786,723 priority Critical patent/US10158618B2/en
Publication of US20140259105A1 publication Critical patent/US20140259105A1/en
Assigned to NUESOFT TECHNOLOGIES, INC. reassignment NUESOFT TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALIBAKHSH, MASSOUD, FAMORZADEH, SHAHRAM
Assigned to GOLUB CAPITAL MARKETS LLC, AS COLLATERAL AGENT reassignment GOLUB CAPITAL MARKETS LLC, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NUESOFT TECHNOLOGIES, INC.
Assigned to NUESOFT TECHNOLOGIES, INC. reassignment NUESOFT TECHNOLOGIES, INC. RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL/FRAME NO.: 046284/0882 Assignors: GOLUB CAPITAL MARKETS LLC, AS COLLATERAL AGENT
Publication of US10158618B2 publication Critical patent/US10158618B2/en
Application granted granted Critical
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT NOTICE OF GRANT OF SECURITY INTEREST IN PATENTS Assignors: NUESOFT TECHNOLOGIES INC.
Assigned to TOUCHNET INFORMATION SYSTEMS, INC., DEBITEK, INC., XENIAL, INC. (F/K/A HEARTLAND COMMERCE, INC.), NEXTEP SYSTEMS INC., ACTIVE NETWORK, LLC, GLOBAL PAYMENTS INC., HEARTLAND PAYMENT SYSTEMS, LLC, NUESOFT TECHNOLOGIES INC., ADVANCEDMD, INC., NUEIP, LLC reassignment TOUCHNET INFORMATION SYSTEMS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A.
Assigned to ANTARES CAPITAL LP, AS COLLATERAL AGENT reassignment ANTARES CAPITAL LP, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NUESOFT TECHNOLOGIES, INC.
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Definitions

  • the present invention relates generally to information server security and secure network architecture. Specifically, it provides a system and method of securely accessing databases through web applications.
  • SSH Secure Shell Protocol
  • IPs secure Internet Protocols
  • SSH server interpreting the cipher text as a legitimate SSH packet block of data.
  • Users can periodically send blocks until the SSH server concludes the message has been sent and utilize this information to disable the server, which causes the message's content to be revealed.
  • Another security protocol provides interoperability among client requests and corresponding servers without compromising transport layer security. Communication between distinct objects is secured by providing requestors with a trusted pseudo identity. This enables servers to securely communicate with requestors via an authorized. Unfortunately, the protocol is compromised as detailed information concerning its architecture, functionality, and configuration options is readily available through the Internet.
  • Yet another method of securing web services involves authenticating requests from application servers with usernames and passwords. After initial authentication, application servers forward only usernames to the Security Service server (SS). The SS server then performs secondary authentication by matching given usernames with passwords. Security would be compromised if an attacker were to gain access to credential repositories. This access would be possible because the credentials and IP addresses to their location are often available in lower security areas.
  • SS Security Service server
  • a further method authorizes access to application servers by comparing request attributes and security privileges to rules stored in the information server.
  • security privileges information servers remain vulnerable to direct attacks by circumventing authentication and the application server as described above.
  • request attributes passed to information servers for authentication could be an avenue for SQL injection.
  • the present invention overcomes the above-mentioned disadvantages and meets the recognized need for such a device by providing a system and method of providing information server security by injecting a proprietary mediating entity between the application server and the information server.
  • Increased security in web service transactions is achieved by injecting a mediating entity between the application and information server, which enforces proprietary security protocols. Requests to the information server are mediated by the mediating entity. Thus, the vulnerabilities of web servers and application servers are separated from information servers.
  • Standard web service protocols allow direct communication between application and information servers. If the web server and/or application server are compromised in a standard web services model then the information server is left defenseless.
  • the present invention intercepts service requests from application servers and forwards them to the mediating entity server(s), thereby protecting information servers from direct attacks.
  • application and information servers can communicate securely.
  • the mediating entity containing proprietary protocols, would force an attacker to learn the system's workings before attempting information server attacks.
  • the mediating entity comprises a proprietary client and server security system.
  • the mediating entity client exists on its own machine or alternatively is stored on the application server and communicates with the mediating entity server; both the client and server are placed between the application server and the information server.
  • only privileged administrators know the mediating entity's security protocols. Without direct access to the mediating entity or information servers' security protocols an attempt to breach by one of the aforementioned methods yields significantly less or even no access to the contents of the information server.
  • web applications initiate data requests from information servers. Requests travel through the web server where they are verified by security protocols. Next, requests proceed to the application server for processing which creates subsequent requests based on the initial request to the mediating entity. Finally, the mediating entity authenticates the request by querying the information server for the requested information.
  • One benefit of the present invention is secure mobile transactions. Disseminating confidential information is increasingly employed by mobile web applications, an example of which is a mobile bank application that transmits account numbers, transactions, and other sensitive data through web services.
  • Another benefit of the present invention is proprietary security protocols protecting the information server.
  • An extra security layer that requires authentication between the application and information servers keeps data safe even if the web server and application server are compromised. This improves upon previous systems by preventing attackers from accessing information servers through well-known web services security flaws.
  • an attacker compromises web servers and/or application servers through well-known security protocols.
  • attackers have free reign to submit various queries in order to discern the information server structure and the location of valuable data.
  • the mediating entity would reject all requests sent by Powerful Adversaries (i.e., Hackers) as they are not authenticated.
  • Powerful Adversaries i.e., Hackers
  • the only way to gain access to the information server would be to learn requestor credentials that would satisfy the proprietary security protocols in place (e.g. user name and password for secure program and database).
  • API Application Programming Interface
  • the primary goal of this system and method is to provide for the means to deploy web applications while keeping data secure.
  • Current web server and application server security is supplemented by security protocols (e.g., Secure Shell Protocol (SSH), Secure Socket Layer (SSL), Transport Layer Security (TLS), etc.) within the mediating entity.
  • security protocols e.g., Secure Shell Protocol (SSH), Secure Socket Layer (SSL), Transport Layer Security (TLS), etc.
  • SSL Secure Shell Protocol
  • TLS Transport Layer Security
  • Security is further strengthened by adding a second level of authentication via proprietary security protocols and limiting the knowledge of the mediating entity's security protocols.
  • the secondary goal of this system and method is to enhance mobile web application adoptability by emphasizing the importance of data security. Skeptical consumers can confidently use mobile web applications knowing their valuable data is stored on highly secured information servers that are not vulnerable to typical security concerns.
  • the tertiary goal of this system and method is to reduce the cost of hosting.
  • High security server space is very expensive.
  • the present invention only requires high security server space for the mediating entity and information servers.
  • the web and application servers can be hosted on standard security server space.
  • the quaternary goal of this invention is to reduce latency.
  • Many proposed solutions encrypt the entire information server. Each data request requires that the data be decoded and/or encoded, thus increasing processing time.
  • the present invention removes the requirement for total encryption of the information server without sacrificing security.
  • FIG. 1 is a schematic overview according to a preferred embodiment of a secure network depicting use of at least one Mediating Entity
  • FIG. 2 is a block diagram depicting a preferred embodiment of a secure network with attempt of intrusion
  • FIG. 3 illustrates high-level use of a Mediating Entity in the solicitation of service request process
  • FIG. 4A is a flowchart depicting the solicitation of service requests with standard Internet security
  • FIG. 4B is a flowchart depicting the solicitation of service requests with a Mediating Entity included in addition to standard Internet security
  • FIG. 5 is a flowchart depicting an attempt of intrusion, and how an attempt could bypass standard Internet security but get caught by a Mediating Entity;
  • FIG. 6A is a flowchart illustration depicting one embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process, according to the high-level embodiment of FIG. 3 ;
  • FIG. 6B is the return-path of FIG. 6 A's flowchart illustration depicting one embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process, according to the high-level embodiment of FIG. 3 ;
  • FIG. 6C is a flowchart illustration depicting another embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process as well as at least one of the various locations the service requests could actually be processed, according to the high-level embodiment of FIG. 3 ;
  • FIG. 6D is a flowchart illustration depicting another embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process as well another of the at least one of the various locations the service requests could actually be processed, according to the high-level embodiment of FIG. 3 ;
  • FIG. 6E is the return-path of FIGS. 6 C and 6 D's flowchart illustration depicting another embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process as well as several of the at least one various locations the service requests could actually be processed, according to the high-level embodiment of FIG. 3 .
  • system 10 for securely accessing data through web applications
  • system 10 comprises computer apparatus 100 , mediating entity 310 , solicitation for service request 308 , and response to solicitation for service request 309 .
  • Computer apparatus 100 comprises distributed computing environment 104 , servers 105 , service requestor device 101 , and secure communication links through the public data network (Internet) 208 , wherein servers 105 comprise web server 106 , application server(s) 303 and 304 , mediating entity server 107 and information server 108 (best shown in FIGS. 1-2 ).
  • Internet public data network
  • Mediating entity 310 comprises application server 303 hosting proprietary mediating entity client 311 stored in non-transient computer-readable medium 312 , and a second application server 304 hosting mediating entity server 107 (best shown in FIGS. 1 and 3 ).
  • Information server 108 comprises database server 209 and database 210 (best shown in FIG. 2 ), wherein database 210 comprises data that is extracted or stored 511 , the execution of which represents a response to (a.k.a. a satisfaction thereof) to a solicitation for service request 309 provided to the service requestor device 101 (best shown in FIGS. 1 and 3 ).
  • distributed computing environment 104 may be a LAN, WAN, VPN, cloud, combination thereof or any network configuration of electronic devices. It will further be recognized that web server 106 and application server 106 , may function on separate computers (best shown in FIGS. 1-2 ), or alternatively may function on the same computer (not shown). Similarly, it will further be recognized that mediating entity server 107 , database server 209 and database 210 may function on separate computers (best shown in FIG. 2 ), or alternatively may function on the same computer (collectively labeled ‘information server’) (best shown in FIGS. 1 and 3 ).
  • application server 303 may comprise a single computer that comprises both application server 303 and mediating entity client software 311 stored in non-transient computer readable medium 312 (best shown in FIG. 3 ), or alternatively may function on separate computers (best shown in FIG. 1 ).
  • service requestor begins session 600 at step 601 , wherein service requestor uses a service requestor device 102 (for non-limiting example purposes only) to solicit and process a service request— 102 is an exemplary device in a category of devices that are capable of processing the request at this point, instead of merely forwarding it on for later processing.
  • a service requestor device 102 for non-limiting example purposes only
  • the request is transmitted via the web browser to the web server.
  • the web server applies standard Internet authentication (if configured). If the service requestor has been authenticated at step 604 , then session proceeds to step 605 ; if not, session 600 proceeds back to step 601 .
  • the authenticated request is transmitted to the web server. Once at step 605 , the request is then sent to the application server at step 606 .
  • the request is forwarded from the application server to the mediating entity proprietary client for authentication.
  • the service requestor provides credentials, at which point the mediating entity proprietary client contacts the mediating entity server at step 611 and forwards the provided credentials to the mediating entity server at step 612 .
  • the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 614 , then session proceeds to step 615 ; if not, session 600 proceeds back to step 601 .
  • industry recognized authentication protocols e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only
  • the mediating entity server forwards the service request to the information server.
  • the information server then extracts or stores the data associated with the request from the information server in step 616 .
  • confirmation of this satisfaction i.e. data extraction or storage from the information server
  • session 700 shares many similarities with session 600 with some important differences.
  • service requestor begins session 700 at step 617 , wherein service requestor uses a service requestor device 103 (for non-limiting example purposes only) to solicit a service request— 103 is an exemplary device in a category of devices that are incapable of processing the request at this point, they can only forward it.
  • the request is transmitted via HTTP to the web server.
  • the web server applies standard Internet authentication (if configured). If the service requestor has been authenticated at step 604 , then session proceeds to step 605 ; if not, session 700 proceeds back to step 617 .
  • the authenticated request is transmitted to the web server at step 605 .
  • the request is then sent to the application server for processing at step 619 .
  • the processed data request is forwarded to the mediating entity proprietary client for authentication.
  • the service requestor provides credentials, at which point the mediating entity proprietary client contacts the mediating entity server at step 611 and forwards the provided credentials to the mediating entity server at step 612 .
  • the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 614 , then session proceeds to step 621 ; if not, session 700 proceeds back to step 617 .
  • industry recognized authentication protocols e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only
  • the mediating entity server forwards the data request to the information server.
  • the information server then extracts or stores the data associated with the request from the information server in step 616 .
  • confirmation of this satisfaction i.e. data extraction or storage
  • session 800 shares many similarities with sessions 600 and 700 with some important differences.
  • service requestor begins session 800 , at step 617 , wherein service requestor uses a service requestor device 103 (for non-limiting example purposes only) to solicit a service request— 103 is an exemplary device in a category of devices that are incapable of processing the request at this point, they can only forward it.
  • the request is transmitted via HTTP to the web server.
  • the web server applies standard Internet authentication (if configured). If the service requestor has been authenticated at step 604 , then session proceeds to step 605 ; if not, session 800 proceeds back to step 617 .
  • the authenticated request is transmitted to the web server at step 605 . Once at step 605 , the request is then sent to the application server at step 606 .
  • the request is forwarded from the application server to the mediating entity proprietary client for authentication.
  • the service requestor provides credentials, at which point the mediating entity proprietary client contacts the mediating entity server at step 611 and forwards the provided credentials to the mediating entity server at step 612 .
  • the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 614 , then session proceeds to step 622 ; if not, session 800 proceeds back to step 617 .
  • industry recognized authentication protocols e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only
  • the mediating entity server processes and then forwards the data request to the information server.
  • the information server then extracts or stores the data associated with the request from the information server in step 616 .
  • confirmation of this satisfaction i.e. data extraction or storage from the information server
  • FIG. 4A generically depicts a traditional web services model (some steps may differ).
  • the service requestor sends the solicitation for service request via a service requestor device 101 .
  • the request is then transmitted via web browser at step 402 to the web server at step 403 .
  • Traditional web services models would apply standard Internet authentication here (if configured), via step 404 . If the requestor is authenticated, the request is then transmitted to the application server at step 405 ; if not, the requestor is sent back to step 402 to try again. Once at step 405 , the request is then further authenticated by the application server at step 406 .
  • the requestor is authenticated by the application server, the request is then satisfied by data stored or extracted from the information server at step 407 ; if not, the requestor is sent back to step 405 to try again.
  • confirmation of satisfaction is sent to requestor (i.e. data extraction to or storage from the information server).
  • the service requestor sends the solicitation for service request via a service requestor device 101 .
  • the request receives standard Internet authentication (if configured) at step 409 , and if authenticated, the request reaches the web server via step 410 .
  • the request is then sent to the application server at step 405 .
  • the network mediating entity of the present disclosure is injected, adding an additional layer of secure authentication beyond standard Internet authentication.
  • Step 411 determines if a network mediating entity is being used, and if so, forwards the request to the mediating entity proprietary client for authentication at step 412 ; if not, the request is sent directly to the information server at step 416 .
  • the information server at step 416 then satisfies the request by data stored to or extracted from the information server at step 407 .
  • confirmation of satisfaction is sent back to requestor at step 401 .
  • step 411 determines that a network mediating entity is being used and forwards the request to the mediating entity proprietary client for authentication at step 412
  • the request is then sent to the mediating entity server at step 413 .
  • the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor.
  • the service requestor's credentials are successfully authenticated at step 415
  • the request is then sent to the information server at step 416 ; if not, the request is sent back to step 401 to try again.
  • the information server satisfies the request by storing in or extracting data from the information server at step 407 .
  • confirmation of satisfaction is sent back to requestor at step 401 .
  • FIG. 5 the importance of the difference between traditional web services models and the present disclosure is highlighted by example, showing generally the result of a malicious attack on each of the models.
  • a malicious attack is initiated at step 501 .
  • a malicious attack by its nature is typically designed to be capable of bypassing standard Internet security at step 502 and thus reaches the application server directly at step 503 .
  • the malicious attack is forwarded directly on to the information server at step 505 .
  • the malicious attack is granted full, or unrestricted access to the information server's content at step 506 .
  • the malicious attack is forwarded to the mediating entity proprietary client for authentication at step 507 .
  • the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor.
  • a plurality of industry recognized authentication protocols e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A system for providing information server security in a distributed computing environment achieved by injecting a proprietary mediating entity into the solicitation of service request process via web server between application servers and information servers. The system comprises a computer apparatus, a mediating entity, solicitation for service requests and responses to the solicitations for service requests. The mediating entity is comprised of an application server hosting a proprietary mediating entity client and a mediating entity server, where the proprietary mediating entity client comprises industry-recognized business organization selected security protocols. The information server comprises a database server and a database, the database comprises data that is extracted or stored based on the service request.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • None
  • FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
  • None
  • PARTIES TO A JOINT RESEARCH AGREEMENT
  • None
  • REFERENCE TO A SEQUENCE LISTING
  • None
  • BACKGROUND OF THE INVENTION
  • 1. Technical Field of the Invention
  • The present invention relates generally to information server security and secure network architecture. Specifically, it provides a system and method of securely accessing databases through web applications.
  • 2. Description of Related Art
  • Generally speaking, mobile web applications rely on web services to connect to information servers. Current web services (e.g., Internet Application Server, Apache, and Tomcat) provide inadequate protection against constantly evolving malicious attacks, therefore leaving web applications and their data vulnerable. As a result, businesses are forced to trade security for mobile functionality when developing browser-based applications.
  • The most prominent security vulnerability stems from the wide spread use of a few open source and proprietary web service solutions. Information concerning the inner workings and security protocols of these services are widely available on forums, blogs, and release notes. Therefore, malicious users can easily circumvent security measures with a little Internet research. As a result, the cost of development is exceedingly high since developers must constantly create new security patches.
  • Proponents of open source software claim that public disclosure provides immense scrutiny of security vulnerabilities, thereby increasing security. However, there is significant time between implementing security patches after identifying system vulnerabilities. Malicious attackers have an abundance of time to exploit publicly disclosed security vulnerabilities.
  • Even stringent security measures like Secure Shell Protocol (SSH) are vulnerable while in wide-spread use. By analyzing public documentation, SSH vulnerabilities such as Plain Text Attacks are obvious to those skilled in the art. Plain Text attacks enable a user to intercept and retrieve encrypted data traveling via secure Internet Protocols (IPs) by sending cipher text blocks as the initial blocks in the protocol's packet. This results in the SSH server interpreting the cipher text as a legitimate SSH packet block of data. Users can periodically send blocks until the SSH server concludes the message has been sent and utilize this information to disable the server, which causes the message's content to be revealed. Thus, when implemented in open software vulnerabilities are common. In fact, even after the bug is discovered, the exploit remains during patch development.
  • One attempt to shield information servers from attack through web services involves replacing legitimate data object source files with fake ones once a server is infiltrated. If attackers attempt to use the address and credentials in the fake data object source file, they will be redirected to a security control server that alerts the system administrator. Although this method attempts to hide the legitimate data object source file, intruders can still access it.
  • Another security protocol provides interoperability among client requests and corresponding servers without compromising transport layer security. Communication between distinct objects is secured by providing requestors with a trusted pseudo identity. This enables servers to securely communicate with requestors via an authorized. Unfortunately, the protocol is compromised as detailed information concerning its architecture, functionality, and configuration options is readily available through the Internet.
  • Yet another method of securing web services involves authenticating requests from application servers with usernames and passwords. After initial authentication, application servers forward only usernames to the Security Service server (SS). The SS server then performs secondary authentication by matching given usernames with passwords. Security would be compromised if an attacker were to gain access to credential repositories. This access would be possible because the credentials and IP addresses to their location are often available in lower security areas.
  • A further method authorizes access to application servers by comparing request attributes and security privileges to rules stored in the information server. Despite security privileges, information servers remain vulnerable to direct attacks by circumventing authentication and the application server as described above. Moreover, request attributes passed to information servers for authentication could be an avenue for SQL injection.
  • Current web-service security measures do not provide adequate protection against today's sophisticated malicious attacks. Architectural information and security flaws for most web and application servers are widely published. Unfortunately, these systems are necessary for interoperability. Therefore, it is readily apparent that there is a need for a system and method of providing information server security by injecting a proprietary mediating entity between the application server and the information server.
  • BRIEF SUMMARY OF THE INVENTION
  • Briefly described, in a preferred embodiment, the present invention overcomes the above-mentioned disadvantages and meets the recognized need for such a device by providing a system and method of providing information server security by injecting a proprietary mediating entity between the application server and the information server.
  • Increased security in web service transactions is achieved by injecting a mediating entity between the application and information server, which enforces proprietary security protocols. Requests to the information server are mediated by the mediating entity. Thus, the vulnerabilities of web servers and application servers are separated from information servers.
  • Standard web service protocols allow direct communication between application and information servers. If the web server and/or application server are compromised in a standard web services model then the information server is left defenseless.
  • The present invention intercepts service requests from application servers and forwards them to the mediating entity server(s), thereby protecting information servers from direct attacks. As a result of this mediation, application and information servers can communicate securely. The mediating entity, containing proprietary protocols, would force an attacker to learn the system's workings before attempting information server attacks.
  • In the preferred embodiment, the mediating entity comprises a proprietary client and server security system. The mediating entity client exists on its own machine or alternatively is stored on the application server and communicates with the mediating entity server; both the client and server are placed between the application server and the information server. For optimum security, only privileged administrators know the mediating entity's security protocols. Without direct access to the mediating entity or information servers' security protocols an attempt to breach by one of the aforementioned methods yields significantly less or even no access to the contents of the information server.
  • In one example, web applications initiate data requests from information servers. Requests travel through the web server where they are verified by security protocols. Next, requests proceed to the application server for processing which creates subsequent requests based on the initial request to the mediating entity. Finally, the mediating entity authenticates the request by querying the information server for the requested information.
  • One benefit of the present invention is secure mobile transactions. Disseminating confidential information is increasingly employed by mobile web applications, an example of which is a mobile bank application that transmits account numbers, transactions, and other sensitive data through web services.
  • Another benefit of the present invention is proprietary security protocols protecting the information server. An extra security layer that requires authentication between the application and information servers keeps data safe even if the web server and application server are compromised. This improves upon previous systems by preventing attackers from accessing information servers through well-known web services security flaws.
  • For example, an attacker compromises web servers and/or application servers through well-known security protocols. In a standard system, attackers have free reign to submit various queries in order to discern the information server structure and the location of valuable data. In the present invention, the mediating entity would reject all requests sent by Powerful Adversaries (i.e., Hackers) as they are not authenticated. Because of the multi-layered security protection, the only way to gain access to the information server would be to learn requestor credentials that would satisfy the proprietary security protocols in place (e.g. user name and password for secure program and database).
  • Even if attackers were to steal legitimate credentials, they would only have limited access to data. Unlike the vulnerabilities current security systems present, attackers would not have free reign to view, alter, or delete all data contained in the information server. Infiltration of the mediating entity would only provide one isolated account's data without the ability to create super-user accounts. Thus, this limited breach would maintain the security of the information servers' content by eliminating malicious use of administrative privileges. Further, the mediating entity would be extremely difficult to hack because all commands are only known by trusted developers.
  • Yet another benefit of the present invention is interoperability. Many systems disclose Application Programming Interface (API) information in order to increase interoperability. Publicly disclosing API information enables malicious attackers to circumvent security measures. The present invention overcomes the aforementioned disadvantage by using standard web service components to interface with devices while securing data with proprietary protocols.
  • The primary goal of this system and method is to provide for the means to deploy web applications while keeping data secure. Current web server and application server security is supplemented by security protocols (e.g., Secure Shell Protocol (SSH), Secure Socket Layer (SSL), Transport Layer Security (TLS), etc.) within the mediating entity. Security is further strengthened by adding a second level of authentication via proprietary security protocols and limiting the knowledge of the mediating entity's security protocols.
  • The secondary goal of this system and method is to enhance mobile web application adoptability by emphasizing the importance of data security. Skeptical consumers can confidently use mobile web applications knowing their valuable data is stored on highly secured information servers that are not vulnerable to typical security concerns.
  • The tertiary goal of this system and method is to reduce the cost of hosting. High security server space is very expensive. The present invention only requires high security server space for the mediating entity and information servers. The web and application servers can be hosted on standard security server space.
  • The quaternary goal of this invention is to reduce latency. Many proposed solutions encrypt the entire information server. Each data request requires that the data be decoded and/or encoded, thus increasing processing time. The present invention removes the requirement for total encryption of the information server without sacrificing security.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • The present disclosure will be better understood by reading the Detailed Description of the Preferred and Selected Alternate Embodiments with reference to the accompanying drawing figures, which are not necessarily drawn to scale, and in which like reference numerals denote similar structure and refer to like elements throughout, and in which:
  • FIG. 1 is a schematic overview according to a preferred embodiment of a secure network depicting use of at least one Mediating Entity;
  • FIG. 2 is a block diagram depicting a preferred embodiment of a secure network with attempt of intrusion;
  • FIG. 3 illustrates high-level use of a Mediating Entity in the solicitation of service request process;
  • FIG. 4A is a flowchart depicting the solicitation of service requests with standard Internet security;
  • FIG. 4B is a flowchart depicting the solicitation of service requests with a Mediating Entity included in addition to standard Internet security;
  • FIG. 5 is a flowchart depicting an attempt of intrusion, and how an attempt could bypass standard Internet security but get caught by a Mediating Entity;
  • FIG. 6A is a flowchart illustration depicting one embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process, according to the high-level embodiment of FIG. 3;
  • FIG. 6B is the return-path of FIG. 6A's flowchart illustration depicting one embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process, according to the high-level embodiment of FIG. 3;
  • FIG. 6C is a flowchart illustration depicting another embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process as well as at least one of the various locations the service requests could actually be processed, according to the high-level embodiment of FIG. 3;
  • FIG. 6D is a flowchart illustration depicting another embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process as well another of the at least one of the various locations the service requests could actually be processed, according to the high-level embodiment of FIG. 3; and
  • FIG. 6E is the return-path of FIGS. 6C and 6D's flowchart illustration depicting another embodiment of the solicitation of service requests with a Mediating Entity, highlighting the secure, multi-point process as well as several of the at least one various locations the service requests could actually be processed, according to the high-level embodiment of FIG. 3.
  • It is to be noted that the drawings presented are intended solely for the purpose of illustration and that they are, therefore, neither desired nor intended to limit the disclosure to any or all of the exact details of the construction shown, except insofar as they may be deemed essential to the claimed disclosure.
  • DETAILED DESCRIPTION OF THE PREFERRED AND SELECTED ALTERNATE EMBODIMENTS OF THE INVENTION
  • In describing the preferred and selected alternate embodiments of the present invention, as illustrated in FIGS. 1-6E, specific terminology is employed for the sake of clarity. The present disclosure, however, is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents that operate in a similar manner to accomplish similar functions. Embodiments of the claims may, however, be embodied in many different forms and should not be construed to be limited to the embodiments set forth herein. The examples set forth herein are non-limiting examples, and are merely examples among other possible examples.
  • Referring now to FIGS. 1-6E, by way of example, and not limitation, there is illustrated an example embodiment of system 10 for securely accessing data through web applications, wherein system 10 comprises computer apparatus 100, mediating entity 310, solicitation for service request 308, and response to solicitation for service request 309. Computer apparatus 100 comprises distributed computing environment 104, servers 105, service requestor device 101, and secure communication links through the public data network (Internet) 208, wherein servers 105 comprise web server 106, application server(s) 303 and 304, mediating entity server 107 and information server 108 (best shown in FIGS. 1-2). Mediating entity 310 comprises application server 303 hosting proprietary mediating entity client 311 stored in non-transient computer-readable medium 312, and a second application server 304 hosting mediating entity server 107 (best shown in FIGS. 1 and 3). Information server 108 comprises database server 209 and database 210 (best shown in FIG. 2), wherein database 210 comprises data that is extracted or stored 511, the execution of which represents a response to (a.k.a. a satisfaction thereof) to a solicitation for service request 309 provided to the service requestor device 101 (best shown in FIGS. 1 and 3).
  • It will be recognized by those skilled in the art that distributed computing environment 104 may be a LAN, WAN, VPN, cloud, combination thereof or any network configuration of electronic devices. It will further be recognized that web server 106 and application server 106, may function on separate computers (best shown in FIGS. 1-2), or alternatively may function on the same computer (not shown). Similarly, it will further be recognized that mediating entity server 107, database server 209 and database 210 may function on separate computers (best shown in FIG. 2), or alternatively may function on the same computer (collectively labeled ‘information server’) (best shown in FIGS. 1 and 3). It will further be recognized that application server 303 may comprise a single computer that comprises both application server 303 and mediating entity client software 311 stored in non-transient computer readable medium 312 (best shown in FIG. 3), or alternatively may function on separate computers (best shown in FIG. 1).
  • Turning now to FIGS. 6A-6D, in use, service requestor begins session 600 at step 601, wherein service requestor uses a service requestor device 102 (for non-limiting example purposes only) to solicit and process a service request—102 is an exemplary device in a category of devices that are capable of processing the request at this point, instead of merely forwarding it on for later processing.
  • Via step 602, which takes place within a secured network space 609 (e.g. a cloud, for non-limiting example purposes only), the request is transmitted via the web browser to the web server. At step 603, the web server applies standard Internet authentication (if configured). If the service requestor has been authenticated at step 604, then session proceeds to step 605; if not, session 600 proceeds back to step 601. At step 605, the authenticated request is transmitted to the web server. Once at step 605, the request is then sent to the application server at step 606. At step 607, the request is forwarded from the application server to the mediating entity proprietary client for authentication. At step 608, the service requestor provides credentials, at which point the mediating entity proprietary client contacts the mediating entity server at step 611 and forwards the provided credentials to the mediating entity server at step 612.
  • Subsequently at step 613, which takes place in a separate secured network space 610 (e.g. a second cloud, for non-limiting example purposes only), the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 614, then session proceeds to step 615; if not, session 600 proceeds back to step 601.
  • At step 615, the mediating entity server forwards the service request to the information server. The information server then extracts or stores the data associated with the request from the information server in step 616. At this point, the service request has been satisfied and confirmation of this satisfaction (i.e. data extraction or storage from the information server) is returned to the requestor via the same steps traveled to satisfy the request in session 600 (confirmation path best shown in FIG. 6B).
  • Turning now particularly to FIG. 6C, in an alternate embodiment, session 700 shares many similarities with session 600 with some important differences. In use, service requestor begins session 700 at step 617, wherein service requestor uses a service requestor device 103 (for non-limiting example purposes only) to solicit a service request—103 is an exemplary device in a category of devices that are incapable of processing the request at this point, they can only forward it.
  • Via step 618, which takes place within a secured network space 609 (e.g. a cloud, for non-limiting example purposes only), the request is transmitted via HTTP to the web server. At step 603, the web server applies standard Internet authentication (if configured). If the service requestor has been authenticated at step 604, then session proceeds to step 605; if not, session 700 proceeds back to step 617. The authenticated request is transmitted to the web server at step 605. Once at step 605, the request is then sent to the application server for processing at step 619. At step 620, the processed data request is forwarded to the mediating entity proprietary client for authentication. At step 608, the service requestor provides credentials, at which point the mediating entity proprietary client contacts the mediating entity server at step 611 and forwards the provided credentials to the mediating entity server at step 612.
  • Subsequently at step 613, which takes place in a separate secured network space 610 (e.g. a second cloud, for non-limiting example purposes only), the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 614, then session proceeds to step 621; if not, session 700 proceeds back to step 617.
  • At step 621, the mediating entity server forwards the data request to the information server. The information server then extracts or stores the data associated with the request from the information server in step 616. At this point, the data request has been satisfied and confirmation of this satisfaction (i.e. data extraction or storage) is returned to the requestor via the same steps traveled to satisfy the request in session 700 (confirmation path best shown in FIG. 6E).
  • Turning now more particularly to FIG. 6D, in an alternate embodiment, session 800 shares many similarities with sessions 600 and 700 with some important differences. In use, service requestor begins session 800, at step 617, wherein service requestor uses a service requestor device 103 (for non-limiting example purposes only) to solicit a service request—103 is an exemplary device in a category of devices that are incapable of processing the request at this point, they can only forward it.
  • Via step 618, which takes place within a secured network space 609 (e.g. a cloud, for non-limiting example purposes only), the request is transmitted via HTTP to the web server. At step 603, the web server applies standard Internet authentication (if configured). If the service requestor has been authenticated at step 604, then session proceeds to step 605; if not, session 800 proceeds back to step 617. The authenticated request is transmitted to the web server at step 605. Once at step 605, the request is then sent to the application server at step 606. At step 607, the request is forwarded from the application server to the mediating entity proprietary client for authentication. At step 608, the service requestor provides credentials, at which point the mediating entity proprietary client contacts the mediating entity server at step 611 and forwards the provided credentials to the mediating entity server at step 612.
  • Subsequently at step 613, which takes place in a separate secured network space 610 (e.g. a second cloud, for non-limiting example purposes only), the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 614, then session proceeds to step 622; if not, session 800 proceeds back to step 617.
  • At step 622, the mediating entity server processes and then forwards the data request to the information server. The information server then extracts or stores the data associated with the request from the information server in step 616. At this point, the service request has been satisfied and confirmation of this satisfaction (i.e. data extraction or storage from the information server) is returned to the requestor via the same steps traveled to satisfy the request in session 800 (confirmation path best shown in FIG. 6E).
  • Turning now to FIGS. 4A and 4B, system 10 is different from traditional web services models in several significant ways. FIG. 4A generically depicts a traditional web services model (some steps may differ). At step 401 the service requestor sends the solicitation for service request via a service requestor device 101. The request is then transmitted via web browser at step 402 to the web server at step 403. Traditional web services models would apply standard Internet authentication here (if configured), via step 404. If the requestor is authenticated, the request is then transmitted to the application server at step 405; if not, the requestor is sent back to step 402 to try again. Once at step 405, the request is then further authenticated by the application server at step 406. If the requestor is authenticated by the application server, the request is then satisfied by data stored or extracted from the information server at step 407; if not, the requestor is sent back to step 405 to try again. At step 408, confirmation of satisfaction is sent to requestor (i.e. data extraction to or storage from the information server).
  • Turning now particularly to FIG. 4B, system 10's critical differences are highlighted in comparison to FIG. 4A's traditional web services model. At step 401 the service requestor sends the solicitation for service request via a service requestor device 101. The request then receives standard Internet authentication (if configured) at step 409, and if authenticated, the request reaches the web server via step 410. From step 410, the request is then sent to the application server at step 405. Here, the network mediating entity of the present disclosure is injected, adding an additional layer of secure authentication beyond standard Internet authentication. Step 411 determines if a network mediating entity is being used, and if so, forwards the request to the mediating entity proprietary client for authentication at step 412; if not, the request is sent directly to the information server at step 416. Referencing the process from FIG. 4A, the information server at step 416 then satisfies the request by data stored to or extracted from the information server at step 407. At step 408, confirmation of satisfaction is sent back to requestor at step 401.
  • However, if step 411 determines that a network mediating entity is being used and forwards the request to the mediating entity proprietary client for authentication at step 412, the request is then sent to the mediating entity server at step 413. The mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If the service requestor's credentials are successfully authenticated at step 415, the request is then sent to the information server at step 416; if not, the request is sent back to step 401 to try again. Once at step 416 the information server satisfies the request by storing in or extracting data from the information server at step 407. At step 408, confirmation of satisfaction is sent back to requestor at step 401.
  • Turning now to FIG. 5, the importance of the difference between traditional web services models and the present disclosure is highlighted by example, showing generally the result of a malicious attack on each of the models.
  • A malicious attack is initiated at step 501. A malicious attack, by its nature is typically designed to be capable of bypassing standard Internet security at step 502 and thus reaches the application server directly at step 503. Here, if a network mediating entity is not being used, via step 504, the malicious attack is forwarded directly on to the information server at step 505. Once at the information server, the malicious attack is granted full, or unrestricted access to the information server's content at step 506.
  • However, if a network mediating entity is being used, via step 504, the malicious attack is forwarded to the mediating entity proprietary client for authentication at step 507. At step 508, the mediating entity server then applies business organization-selected proprietary security protocols comprised of at least one of a plurality of industry recognized authentication protocols (e.g. user names and corresponding alphanumeric passwords, biometric readers, certificates, graphical authentications, smart cards, and/or extensions thereof, for non-limiting example purposes only) to authenticate the requestor. If authentication is successful, even if malicious, at step 509, the malicious attack is granted only nominal, restricted access to the information server content at step 510; if not, the requestor is sent back to step 501 to try again.
  • It will be recognized by those skilled in the art that it is nearly impossible to prevent all malicious attacks via learned requestor credentials. It will further be recognized that using a strengthened authentication process such as the present disclosure effectively minimizes the number of successful malicious attacks and the quantity and type of data that can be accessed thereof in ways the current art do not suggest.
  • The foregoing description and drawings comprise an illustrative embodiment of the present disclosure. Having thus described exemplary embodiments of the present disclosure, it should be noted by those skilled in the art that the within disclosures are exemplary only, and that various other alternatives, adaptations, and modifications may be made within the scope of the present disclosure. Merely listing or numbering the steps of a method in a certain order does not constitute any limitation on the order of the steps of that method. Many modifications and other embodiments of the disclosure will come to mind to one skilled in the art to which this disclosure pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation. Accordingly, the present disclosure is not limited to the specific embodiments illustrated herewith, but is limited only by the following claims.

Claims (7)

What is claimed is:
1. A system of providing information server security by injecting a proprietary mediating entity stored in a non-transitory computer readable medium into the solicitation of service request process via web server between application servers and information servers, the system comprising:
at least one computer apparatus, wherein the at least one computer apparatus transmits at least one solicitation of requests for service by at least one requestor via web browser;
a server network infrastructure, wherein the server network infrastructure is comprised of:
at least one mediating entity;
at least one application server;
at least one web server; and
at least one information server,
wherein the infrastructure, the plurality of servers, and the at least one mediating entity comprise a secure server network model wherein the secure server network model utilizes the at least one mediating entity as a secure communication intercessor amid the at least one application server and the at least one information server, thereby enabling secure communication initiated by the at least one solicitation for service request received by the at least one web server from the web browser by the at least one requestor between the at least one application server and the at least one information server;
a mediating entity, wherein the mediating entity strengthens standard information server security by adding at least one authentication layer comprised of:
proprietary software implemented in a non-transitory computer readable medium; and proprietary security protocols.
2. The system of claim 1, wherein the at least one information server comprises a software platform implemented in a computer readable medium, and wherein the at least one information server integrates and extracts data responsive to the at least one solicitation for service request from the at least one requestors.
3. The system of claim 2, wherein the proprietary security protocols comprise at least one of a plurality of industry recognized authentication protocols selected by an organization.
4. A method of providing information server security by injecting a proprietary mediating entity stored in a non-transitory computer readable medium into the solicitation of service request process via web server between application servers and information servers, comprising the steps of:
configuring a secure network infrastructure, wherein the secure network infrastructure comprises:
a secure server network model, wherein the secure server network model comprises:
a server network infrastructure that comprises a configuration of:
at least one mediating entity;
at least one application server; at
least one web server; and
at least one information server;
programming at least one of a plurality of industry recognized proprietary security protocols selected by at least one business organization into the mediating entity;
soliciting at least one service request by at least one requestor from at least one application server, via a web browser stored on a computer apparatus, wherein the at least one application server stores and extracts data for the at least one requestor from the at least one information server;
authenticating the at least one service request solicitation via the at least one of a plurality of business organization-selected proprietary security protocols programmed into the at least one mediating entity, wherein the at least one mediating entity comprises proprietary software implemented in a non-transitory computer readable medium, and proprietary security protocols, wherein the mediating entity is located amid the at least one application server and the at least one information server and strengthens standard information server security; and
obtaining the at least one solicited service from the at least one application server following authentication, wherein the at least one service requires storing and extracting data to and from the at least one information server.
5. The method of claim 4, wherein the at least one of a plurality of business organization-selected proprietary security protocols further perform the step of:
providing means of authentication and authorization for at least one of a plurality of requestors, wherein the at least one of a plurality of business organization-selected proprietary security protocols comprise at least one of a plurality of industry recognized authentication protocols.
6. The method of claim 5, wherein the at least one mediating entity further performs the step of:
providing a layer of security for the at least one information server against malicious attacks;
housing and implementing a plurality of industry recognized business organization-selected proprietary security protocols;
authenticating at least one of a plurality of requestors, wherein the authentication adheres to the industry recognized business organization-selected proprietary security protocols.
7. The method of claim 6, wherein the at least one information server further performs the step of:
integrating at least one of a plurality of the requestors' data into a computer readable medium; and
extracting the at least one of a plurality of requestors' data for the business organizations' services.
US13/786,723 2013-03-06 2013-03-06 System and method for securely accessing data through web applications Active US10158618B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/786,723 US10158618B2 (en) 2013-03-06 2013-03-06 System and method for securely accessing data through web applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/786,723 US10158618B2 (en) 2013-03-06 2013-03-06 System and method for securely accessing data through web applications

Publications (2)

Publication Number Publication Date
US20140259105A1 true US20140259105A1 (en) 2014-09-11
US10158618B2 US10158618B2 (en) 2018-12-18

Family

ID=51489610

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/786,723 Active US10158618B2 (en) 2013-03-06 2013-03-06 System and method for securely accessing data through web applications

Country Status (1)

Country Link
US (1) US10158618B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372965A1 (en) * 2013-06-12 2014-12-18 Nuesoft Technologies, Inc. System and method for collaborative programming of data entry workflows between system developers, end users, and third party developers
CN110138727A (en) * 2019-03-28 2019-08-16 江苏通付盾信息安全技术有限公司 The information searching method and device that the shell that rebounds is connected to the network
US10659452B2 (en) * 2016-01-29 2020-05-19 Dalian Magic Image Technology Co., Ltd. Dynamic graphical password-based network registration method and system
US20210243174A1 (en) * 2018-04-26 2021-08-05 Google Llc Auto-Form Fill Based Website Authentication

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040054933A1 (en) * 1999-06-29 2004-03-18 Oracle International Corporation Method and apparatus for enabling database privileges
US20060168259A1 (en) * 2005-01-27 2006-07-27 Iknowware, Lp System and method for accessing data via Internet, wireless PDA, smartphone, text to voice and voice to text
US20100180029A1 (en) * 2007-04-06 2010-07-15 Clive Fourman Content delivery system and method of delivering content
US20100205657A1 (en) * 2009-02-11 2010-08-12 Manring Bradley A C Protected access control method for shared computer resources
US20120166483A1 (en) * 2010-12-28 2012-06-28 Akshat Choudhary Systems and Methods for Database Proxy Request Switching
US20120297189A1 (en) * 2011-05-18 2012-11-22 Citrix Systems, Inc. Systems and Methods for Secure Handling of Data
US8429162B1 (en) * 2011-09-27 2013-04-23 Amazon Technologies, Inc. Facilitating data redistribution in database sharding
US20130254254A1 (en) * 2012-03-20 2013-09-26 Massachusetts Mutual Life Insurance Company Service mediation model
US20140123228A1 (en) * 2012-10-25 2014-05-01 Jacob Andrew Brill Event Reporting and Handling
US20140208394A1 (en) * 2011-09-22 2014-07-24 Russell Stuart GOODWIN Network user identification and authentication
US20140281918A1 (en) * 2013-03-15 2014-09-18 Yottaa Inc. Systems and methods for configuration-based optimization by an intermediary
US20140351204A1 (en) * 2013-05-21 2014-11-27 Facebook, Inc. Database Sharding with Incorporated Updates
US20140372702A1 (en) * 2013-06-12 2014-12-18 Oracle International Corporation Handling memory pressure in an in-database sharded queue

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6804333B1 (en) * 1999-01-28 2004-10-12 International Business Machines Corporation Dynamically reconfigurable distributed interactive voice response system
US7281252B1 (en) * 2003-03-12 2007-10-09 Microsoft Corporation Method, system, and apparatus for implementing object interfaces at runtime
US20050138380A1 (en) 2003-12-22 2005-06-23 Fedronic Dominique L.J. Entry control system
US7392060B2 (en) 2004-07-28 2008-06-24 Sap Aktiengesellschaft Mobile exchange infrastructure
US8560713B2 (en) 2008-07-31 2013-10-15 Sap Ag Method and system for mediating enterprise service access for smart devices
US20100131650A1 (en) * 2008-11-26 2010-05-27 Chou Lan Pok Methods and Apparatus to Support Network Policy Managers
US9237311B2 (en) * 2009-02-06 2016-01-12 At&T Intellectual Property I, Lp Network architecture and method for application deployment

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040054933A1 (en) * 1999-06-29 2004-03-18 Oracle International Corporation Method and apparatus for enabling database privileges
US20060168259A1 (en) * 2005-01-27 2006-07-27 Iknowware, Lp System and method for accessing data via Internet, wireless PDA, smartphone, text to voice and voice to text
US20130097715A1 (en) * 2007-04-06 2013-04-18 Gaiasoft Ip Limited Content delivery system and method of delivering
US20100180029A1 (en) * 2007-04-06 2010-07-15 Clive Fourman Content delivery system and method of delivering content
US20100205657A1 (en) * 2009-02-11 2010-08-12 Manring Bradley A C Protected access control method for shared computer resources
US20120166483A1 (en) * 2010-12-28 2012-06-28 Akshat Choudhary Systems and Methods for Database Proxy Request Switching
US20120297189A1 (en) * 2011-05-18 2012-11-22 Citrix Systems, Inc. Systems and Methods for Secure Handling of Data
US20140208394A1 (en) * 2011-09-22 2014-07-24 Russell Stuart GOODWIN Network user identification and authentication
US8429162B1 (en) * 2011-09-27 2013-04-23 Amazon Technologies, Inc. Facilitating data redistribution in database sharding
US20130254254A1 (en) * 2012-03-20 2013-09-26 Massachusetts Mutual Life Insurance Company Service mediation model
US20140123228A1 (en) * 2012-10-25 2014-05-01 Jacob Andrew Brill Event Reporting and Handling
US20140281918A1 (en) * 2013-03-15 2014-09-18 Yottaa Inc. Systems and methods for configuration-based optimization by an intermediary
US20140351204A1 (en) * 2013-05-21 2014-11-27 Facebook, Inc. Database Sharding with Incorporated Updates
US20140372702A1 (en) * 2013-06-12 2014-12-18 Oracle International Corporation Handling memory pressure in an in-database sharded queue

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140372965A1 (en) * 2013-06-12 2014-12-18 Nuesoft Technologies, Inc. System and method for collaborative programming of data entry workflows between system developers, end users, and third party developers
US9304761B2 (en) * 2013-06-12 2016-04-05 Nuesoft Technologies, Inc. System and method for collaborative programming of data entry workflows between system developers, end users, and third party developers
US10659452B2 (en) * 2016-01-29 2020-05-19 Dalian Magic Image Technology Co., Ltd. Dynamic graphical password-based network registration method and system
US20210243174A1 (en) * 2018-04-26 2021-08-05 Google Llc Auto-Form Fill Based Website Authentication
US11909729B2 (en) * 2018-04-26 2024-02-20 Google Llc Auto-form fill based website authentication
CN110138727A (en) * 2019-03-28 2019-08-16 江苏通付盾信息安全技术有限公司 The information searching method and device that the shell that rebounds is connected to the network

Also Published As

Publication number Publication date
US10158618B2 (en) 2018-12-18

Similar Documents

Publication Publication Date Title
US20230085027A1 (en) System, method and computer program product for credential provisioning in a mobile device platform
US20240121211A1 (en) Systems and methods for continuous fingerprinting to detect session hijacking inside zero trust private networks
US9686080B2 (en) System and method to provide secure credential
US9027086B2 (en) Securing organizational computing assets over a network using virtual domains
US10445487B2 (en) Methods and apparatus for authentication of joint account login
US9379895B2 (en) HTTP authentication and authorization management
JP2022533193A (en) Mitigating ransomware damage in integrated and isolated applications
US11032270B1 (en) Secure provisioning and validation of access tokens in network environments
US8583911B1 (en) Network application encryption with server-side key management
US9003186B2 (en) HTTP authentication and authorization management
US12143411B2 (en) On-demand and proactive detection of application misconfiguration security threats
US11595372B1 (en) Data source driven expected network policy control
EP3687139A2 (en) Secure provisioning and validation of access tokens in network environments
WO2016188335A1 (en) Access control method, apparatus and system for user data
US10826901B2 (en) Systems and method for cross-channel device binding
US10305914B1 (en) Secure transfer of secrets for computing devices to access network resources
US8656462B2 (en) HTTP authentication and authorization management
US10158618B2 (en) System and method for securely accessing data through web applications
CN111382422A (en) System and method for changing password of account record under threat of illegal access to user data
Kim et al. Security analysis and bypass user authentication bound to device of windows hello in the wild
CN106576050B (en) Three-tier security and computing architecture
Dunkerley et al. Mastering Windows Security and Hardening
CN114039748B (en) Authentication method, system, computer device and storage medium
Sagar et al. Information security: safeguarding resources and building trust
US10389719B2 (en) Parameter based data access on a security information sharing platform

Legal Events

Date Code Title Description
AS Assignment

Owner name: NUESOFT TECHNOLOGIES, INC., GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ALIBAKHSH, MASSOUD;FAMORZADEH, SHAHRAM;REEL/FRAME:042928/0841

Effective date: 20170601

AS Assignment

Owner name: GOLUB CAPITAL MARKETS LLC, AS COLLATERAL AGENT, NE

Free format text: SECURITY INTEREST;ASSIGNOR:NUESOFT TECHNOLOGIES, INC.;REEL/FRAME:046284/0882

Effective date: 20180706

AS Assignment

Owner name: NUESOFT TECHNOLOGIES, INC., UTAH

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS RECORDED AT REEL/FRAME NO.: 046284/0882;ASSIGNOR:GOLUB CAPITAL MARKETS LLC, AS COLLATERAL AGENT;REEL/FRAME:047015/0069

Effective date: 20180904

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NO

Free format text: NOTICE OF GRANT OF SECURITY INTEREST IN PATENTS;ASSIGNOR:NUESOFT TECHNOLOGIES INC.;REEL/FRAME:048764/0820

Effective date: 20160422

AS Assignment

Owner name: HEARTLAND PAYMENT SYSTEMS, LLC, GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: NUEIP, LLC, UTAH

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: NUESOFT TECHNOLOGIES INC., UTAH

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: ADVANCEDMD, INC., UTAH

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: NEXTEP SYSTEMS INC., MICHIGAN

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: ACTIVE NETWORK, LLC, TEXAS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: XENIAL, INC. (F/K/A HEARTLAND COMMERCE, INC.), GEO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: DEBITEK, INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: TOUCHNET INFORMATION SYSTEMS, INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: GLOBAL PAYMENTS INC., GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

Owner name: XENIAL, INC. (F/K/A HEARTLAND COMMERCE, INC.), GEORGIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:050406/0851

Effective date: 20190917

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: ANTARES CAPITAL LP, AS COLLATERAL AGENT, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:NUESOFT TECHNOLOGIES, INC.;REEL/FRAME:069591/0237

Effective date: 20241216