1. Field of the Invention
The present invention relates generally to secure communication and/or interaction between points in a network. More particularly, the present invention relates to an enterprise data protection management system and methods for providing dynamic control policies, keys and management of same for a data communications network using a single policy and two secure associations (SAs).
2. Description of the Prior Art
Generally, current security solutions for networks include discrete solutions provided by security software and encryption algorithms and keys generated therefrom, network infrastructure, information technology (IT) infrastructure, and other enabling infrastructure, such as those provided by hardware and software for particular applications, as illustrated in
By way of example, current practice for providing secure group communications is represented by US Patent Application Publication No. 2004/0044891 for “System and method for secure group communications” by Hanzlik et al. published on Mar. 4, 2004 relating to implementation of a virtual private network group having a plurality of group nodes, a policy server, and shared keys for sharing encrypted secure communication information among the group nodes.
Thus, there remains a need for flexible, dynamic software-based security solutions that overlay onto existing network architecture without requiring complex changes to the hardware and network, IT and/or enabling infrastructure and that require a minimum number of policies and secure associations between points on the network to create a full mesh for secure communication, data access, or other secure activity.
The present invention provides flexible, dynamic software-based security solutions that overlay onto existing network architecture without requiring complex changes to the hardware and network, IT and/or enabling infrastructure, and which provide a multiplicity of end point secure associations (SAs) and configuration options with a minimum number of policies and SAs, preferably requiring only one policy and two SAs to provide a full mesh network for secure communication thereon.
A first aspect of the present invention is to provide an enterprise data policy management system for providing secure networks using an automated software overlay that dynamically controls the policy, key, and secure association (SA) management that is adaptable to existing network architectures without requiring changes to the hardware and network, IT and/or enabling architecture, and while simultaneously minimizing the number of policies and SAs require to manage the secure communication. In one embodiment, the EDPM system includes a communication network having a network infrastructure; and an intelligent software overlay operating on a server in connection to the network for providing security for the network; wherein the intelligent software overlay further includes: a management and policy (MAP) server coupled to the network for communication with at least one key authority point (KAP), wherein the MAP includes at least one policy for providing secure association (SA) within the network; wherein the at least one KAP is operable to generate and manage keys provided to a multiplicity of policy end points (PEPs) through an open API; and wherein the intelligent overlay to the network is independent of the network infrastructure and requires a minimum number of policies that is less than N(N−1) and number of SAs is less than 2N(N−1), where N is the number of end points, thereby providing a secure, flexible network security solution.
A second aspect of the present invention is to provide an intelligent overlay software for providing dynamic control policies, keys and management of same for a data and/or communications network that is operable without changing the network infrastructure and is scalable without requiring an increase in the number of policies and corresponding SAs for the same configuration or architecture.
The present invention is further directed to a method for managing a dynamic network security solution including the steps of providing an intelligent overlay having centralized control policies, keys and management; applying the software overlay onto a data and/or communications network; implementing the policies and SAs without requiring any change in the network hardware or infrastructure and without requiring an increase in the number of policies and corresponding SAs required to ensure security for a given configuration between points on the network.
Thus, the present invention provides an intelligent, dynamic security solution for enterprise data management that is applicable to complex networks without affecting existing infrastructure or hardware configurations and that is scalable without requiring an increase in the number of policies and corresponding SAs.
These and other aspects of the present invention will become apparent to those skilled in the art after a reading of the following description of the preferred embodiment when considered with the drawings, as they support the claimed invention.
In the following description, like reference characters designate like or corresponding parts throughout the several views. Also in the following description, it is to be understood that such terms as “forward,” “rearward,” “front,” “back,” “right,” “left,” “upwardly,” “downwardly,” and the like are words of convenience and are not to be construed as limiting terms.
As referred to herein, the term “encryption” includes aspects of authentication, entitlement, data integrity, access control, confidentiality, segmentation, information control, and combinations thereof.
The present invention provides a powerful key and policy management software-based solution that enables secure data access and user interactions, and that enables users to securely access and interact with data they need and are authorized to access on predetermined, regular, and/or transactional bases from any point on the network without requiring changes in the existing infrastructure. The intelligent overlay of the present invention controls and manages the establishment and activity for trusted, secure connections that are created by end point security technologies, such as, by way of example and not limitation, NAC, Virus Scanning, etc. This “soft” or flexible software solution layer or overlay does not require a separate infrastructure to affect changes in network access, key or policy management, and advantageously provides for increasing the number of PEPs without requiring an increase in the number of policies and corresponding SAs, based upon grouping the PEPs under the MAP/KAP administration.
Preferably, the system and methods of the present invention provide a network-independent solution layer or overlay that functions over the existing network infrastructure to control the policies, secure associations (SAs), and keys enabling secure communications and data access to authorized users at any point within the network; more particularly the system and methods of the present invention do so without requiring an increase in the number of policies and corresponding SAs by grouping PEPs under the MAP/KAP intelligent software overlay. Because the present invention establishes an independent solution layer or overlay that enables grouped PEP management, it provides for essentially unlimited scalability without requiring an increase in the number of policies and corresponding SAs and address management that is commercially practical to implement network-wide for all secure communication, data access, applications, and devices. Also, this flexible software overlay functions to provide dynamic modifications in real time without requiring changes to existing infrastructure or hardware. Ideally, for creating and managing a full mesh of PEPs over the secure network, the number of policies required is one, and correspondingly, then number of SAs required is two. Even where the number of PEPs increases, N does not where the MAP/KAP intelligent overlay manages them with groupings to provide N=1 regardless. Therefore, use and implementation of the present invention is not limited to traditional networking or infrastructure, and is fully scalable in a practically manageable policy/SA volume, regardless of network size.
Referring now to the drawings in general, the illustrations are for the purpose of describing a preferred embodiment of the invention and are not intended to limit the invention thereto. As best seen in
The KAPs function as a distribution layer; they are the key authority for the PEPs to generate and distribute security associations (SAs) and keys to PEPs, monitoring PEP operation, supporting tunnel, transport, and network modes, and allow distributed and redundant deployment of keys to PEPS, and combinations thereof. The PEPs are hardware or software-based PEPs, providing support for clients, blades, and appliances. The PEP policy and keys are enforced by the KAPs, while a PEP authenticates KAP. The KAP ensures that keys are sent only to the right places within the network, which provides for manageable scalability regardless of the number of PEPs or SAs required.
Furthermore, in a preferred embodiment of the present invention, the KAP is a universal KAP within the EDPM, and provides universal key generation and distribution services for the PEPs on the network. As such, the universal KAP ensures network infrastructure protection, Ethernet protection, disk protection, server protection, email protection, notebook computer protection, application protection, 802.1AE protection, IPSEC protection, database protection, SLL protection,.other protection and combinations thereof, as shown in the schematic of
The software overlay solution ensures flexibility for multi-vendor support as illustrated in
By sharp contrast to the prior art illustrated in
Thus, the present invention provides a system for providing secure networks including a communication network having a network infrastructure; and an intelligent software overlay operating on a server in connection to the network for providing security for the network; wherein the intelligent software overlay further includes: a management and policy (MAP) server coupled to the network for communication with at least one key authority point (KAP), wherein the MAP includes at least one policy for providing secure association (SA) within the network; wherein the at least one KAP is operable to generate and manage keys provided to a multiplicity of policy end points (PEPs) through an open API; wherein the intelligent overlay to the network independent of the network infrastructure; and wherein the intelligent overlay to the network is independent of the network infrastructure and requires a minimum number of policies and SAs to create a full mesh, wherein the number of policies is less than N(N−1) and number of SAs is less than 2N(N−1), where N is the number of end points, thereby providing a secure, flexible network security solution. This intelligent overlay provides centralized management by software over the hardware and network infrastructure without changing it, and is fully scalable and dynamically modifiable to reconfigure secure PEP interactivity without requiring change to the network infrastructure, without requiring an increase in the number of policies and corresponding SAs.
The present invention also provides a method for providing secure interactivity between points on a network including the steps of:
providing a communication network having a network infrastructure between at least two policy end points (PEPs);
providing an intelligent software overlay that is independent of the network infrastructure, the software overlay operating on a server in connection to the network for providing security for the network; wherein the intelligent software overlay further includes: a management and policy (MAP) server coupled to the network for communication with at least one key authority point (KAP);
the MAP establishing and managing at least one policy for providing secure association (SA) between PEPs within the network;
the KAP generating and managing keys and providing them to the PEPs through an open API;
and the PEPs having secure exchange over the network using the keys provided by the KAP; wherein the intelligent overlay to the network is independent of the network infrastructure and requires a minimum number of policies and SAs to create a full mesh, wherein the number of policies is less than N(N−1) and number of SAs is less than 2N(N−1), where N is the number of end points.
As set forth hereinabove, the system and methods of the present invention provide for functional, dynamic security groups on a given network both inside and outside organizational boundaries and across geographical locations. The result is a flexible security solution that is operable to be responsive to different security requirements for different groups of users and applications as illustrated in
Certain modifications and improvements will occur to those skilled in the art upon a reading of the foregoing description. The above mentioned examples and embodiments are provided to serve the purpose of clarifying the aspects of the invention and it will be apparent to one skilled in the art that they do not serve to limit the scope of the invention. All modifications and improvements have been deleted herein for the sake of conciseness and readability but are properly within the scope of the following claims.
This non-provisional utility patent application claims the benefit of provisional application Ser. No. 60/844,484, filed Sep. 14, 2006, which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
60844484 | Sep 2006 | US |