International Business Machines Corporation
Secure communication tunnels specific to network resource

Last updated:

Abstract:

An approach is disclosed that receives a request from a first device connected to a first network to connect to a second device connected to a second network. In response to verifying that a connection between the first device and the second device is allowed, the approach operates to establish a secure network communications tunnel between the first device and the second device. The secure network communications tunnel is specific to the first and second devices and the first device is inhibited from accessing other devices that are connected to the second network using the secure network communications tunnel. The secure network communications tunnel is then terminated in response to a detection of a security event.

Status:
Grant
Type:

Utility

Filling date:

24 Jan 2019

Issue date:

21 Dec 2021