Information security – Access control or authentication – Network
Reexamination Certificate
2006-10-24
2006-10-24
Smithers, Matthew (Department: 2137)
Information security
Access control or authentication
Network
C726S012000, C726S014000, C713S150000, C713S152000, C713S154000, C713S160000, C713S163000, C380S255000, C380S256000, C380S270000, C380S272000, C380S274000, C709S250000, C709S227000, C709S228000, C709S229000
Reexamination Certificate
active
07127742
ABSTRACT:
An external client securely accesses a private corporate network using a communications device, but without the communications device being required to communicate through the private corporate network when communicating with resources external to the private corporate network. The external client establishes a connection with the private corporate network over the public network such as the Internet using, for example, Transmission Control Protocol (TCP). The external client then provides security to the connection by running, for example, the Secure Socket Layer (SSL) protocol over the TCP protocol. During the ensuing session with the private corporate network, the communications device establishes a subsequent connection(s) with the external resource.
REFERENCES:
patent: 5944823 (1999-08-01), Jade et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6151628 (2000-11-01), Xu et al.
patent: 6317831 (2001-11-01), King
patent: 6324648 (2001-11-01), Grantges, Jr.
patent: 0999673 (2000-05-01), None
patent: WO 98/57465 (1998-12-01), None
patent: WO 01/02935 (2001-01-01), None
En, Laurence Lee Min, “Wireless Application Protocol Wireless Transport Layer Security” (WAP WTLS), Wireless Application Forum, Apr. 30, 1998.
Dr. James H. Scharen-Guivel, “Wireless Virtual Private Networks in the Mobile Enterprise”, The 2002 Telecommunications Review, Mitretek Systems, pp. 43-52.
Chris Johnson, “Understanding and Implementing Microsoft Terminal Services and Citrix MetaFrame”, SANS Institute, Aug. 13, 2001, pp. 1-8.
En, Laurence Lee Min, “Wireless Application Protocol Wireless Transport Layer Security” (WAP WTLS), Wireless Application Forum, Apr. 30, 1998.
Anderson, John,IN Controls for Broadband Networks, 1998 IEEE, pp. 361-371.
Apostolopoulos, George; Aubespin, David; Peris, Vinod; Pradhan, Prashant; and Saha, Debanjan,Design, Implementation and Performance of a Content-Based Switch, IEEE INFOCOM 2000, pp. 1117-1126.
Hunt, Ray,Internet-Intranet firewall security—policy, architecture and transaction services, 1998 Elsevier Science B.V., pp. 1107-1123.
Luotonen, Ari,Web Proxy Servers, 1998 Netscape Communications Corporation, pp. 228-229, 338-341.
Przygienda, Tony; Droz, Patrick; and West, Colin,Proxy PNNI Augmented Routing(Proxy PAR), 1998 IEEE, pp. 371-377.
Fishman Neil S.
Kadyk Donald J.
Kramer Michael
Fields Courtney D.
Smithers Matthew
Workman Nydegger
LandOfFree
Establishing a secure connection with a private corporate... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Establishing a secure connection with a private corporate..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Establishing a secure connection with a private corporate... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3664356