Method and apparatus for encrypted communications to a...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Having particular address related cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S150000, C713S153000, C713S155000, C713S160000, C713S169000, C705S074000, C705S078000

Reexamination Certificate

active

08065520

ABSTRACT:
An embodiment of the invention includes a secure server. A user at a terminal, communicatively coupled to the secure server by a secure link, can obtain web pages from web sites in a network, in encrypted form, via the secure link. Addresses associated with the web pages are altered to make it appear as if the web pages come from the secure server rather than from the web sites. Spoofing units may be used as alternative access points to the secure server, with the secure server sending the requested web pages directly to the terminal. In general, address rewriting and other manipulation can be performed on the requested web pages, such that the true sources of the web pages are disguised and such that subsequent communications from the terminal are directed to the secure server and/or spoofing unit, rather than to the true source of the web pages. Components of the user's privacy may be sold, or advertisements may be provided, in exchange for protection of the user's identity.

REFERENCES:
patent: 5528503 (1996-06-01), Moore et al.
patent: 5621796 (1997-04-01), Davis et al.
patent: 5623601 (1997-04-01), Vu
patent: 5935212 (1999-08-01), Kalajan et al.
patent: 5946674 (1999-08-01), Nordin et al.
patent: 5961593 (1999-10-01), Gabber et al.
patent: 5987480 (1999-11-01), Donohue et al.
patent: 6002767 (1999-12-01), Kramer
patent: 6003084 (1999-12-01), Green et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6032260 (2000-02-01), Sasmazel et al.
patent: 6047268 (2000-04-01), Bartoli et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6137884 (2000-10-01), Micali
patent: 6144638 (2000-11-01), Obenhuber et al.
patent: 6182095 (2001-01-01), Leymaster et al.
patent: 6199113 (2001-03-01), Alegre et al.
patent: 6256739 (2001-07-01), Skopp et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6345303 (2002-02-01), Knauerhase et al.
patent: 6389462 (2002-05-01), Cohen et al.
patent: 6401125 (2002-06-01), Makarios et al.
patent: 6442687 (2002-08-01), Savage
patent: 6460076 (2002-10-01), Srinivasan
patent: 6463533 (2002-10-01), Calamera et al.
patent: 6502106 (2002-12-01), Gampper et al.
patent: 6502135 (2002-12-01), Munger et al.
patent: 6704873 (2004-03-01), Underwood
patent: 6708200 (2004-03-01), Ura et al.
patent: 6721424 (2004-04-01), Radatti
patent: 6779111 (2004-08-01), Gehrmann et al.
patent: 2002/0083178 (2002-06-01), Brothers
patent: 2002/0184527 (2002-12-01), Chun et al.
patent: 2004/0230820 (2004-11-01), Hui Hsu et al.
Office Action of Feb. 21, 2006, in U.S. Appl. No. 09/972,226, 21 pages.
Office Action of Aug. 3, 2006, in U.S. Appl. No. 09/972,226, 20 pages.
Office Action of Feb. 2, 2007, in U.S. Appl. No. 09/972,226, 15 pages.
Office Action of Jun. 11, 2007, in U.S. Appl. No. 09/972,226, 17 pages.
Office Action of Nov. 23, 2007, in U.S. Appl. No. 09/972,226, 12 pages.
Farah, “Encrypted Hypertext Transfer Protocol” filename:“I-D ActION: draft-farah-uggc-protocol-oo.txt”, web address: http://www.ietf.org/internet-drafts-farah-uggc-protocol-oo.txt. Mar. 6, 2000.
Wu, et al., “Virtual Proxy Servers for WWW and Intelligent Agents on the Internet,” IEEE, 1997, pp. 200-209.
Newton, “Newton's Telecom Dictionary,” Telecom Books, 14th Edition, Oct. 1998, p. 260.
Kim, et al. “A Proxy Server Structure and its Cache Consistency Mechanism at the Network Bottleneck,” IEEE, 1999. pp. 278-283.
Greene “Access Control Software on tap from Neoteris,” Network World, vol. 18, No. 45, Nov. 5, 2001, pp. 23-24.
PCT Search Report, PCT/US01/40812, Apr. 9, 2002.
PCT Search Report, PCT/US02/16866, Sep. 26, 2002.
Aventail Corporation, “Proxy Architecture Versus Direct Connect,” Aventail Corporation Tech Brief, Apr. 2001.
Office Action mailed Oct. 1, 2004 for U.S. Appl. No. 09/792,226, filed Feb. 22, 2001.
Office Action mailed Apr. 21, 2005 for U.S. Appl. No. 09/792,226, filed Feb. 22, 2001.
Office Action mailed Jun. 30, 2005 for U.S. Appl. No. 09/792,226, filed Feb. 22, 2001.
Office Action mailed Aug. 26, 2005 for U.S. Appl. No. 09/792,226, filed Feb. 22, 2001.
Demuth, et al. “Securing the anonymity of content providers in the World Wide Web”, Jan. 1999, Proceedings of the SPIE., vol. 3657, p. 494-502. Dialog File 2, access No. 07404824.
Liebamann, “To have and have NAT: managing through the firewall”, Jul. 1999, Business Communications Review, vol. 29, No. 7, p. 48-50. Dialog File 2 access No. 07561832.
Jackson, “Anonymous address and confidentiality of location”, 1996, Information Hiding. First International Workshop Proceedings., p. 115-20, Dialog File 2, access No. 06490562.
Anonymizer, Inc., “Anonymizer URL Encryption”, http://www.anonymizer.com, Nov. 27, 1999.
Anonymizer, Inc., “How to Use Anonymizer Surfing”, http://www.anonymizer.com, May 2, 2000.
“EZproxy: A Remote User Authentication Tool for Libraries”, May 2000, Status Line, Nylink, No. 142, pp. 9-10.
“Spotlight on the George Harvey Resource Center” MC, McConnell Columns, Radford University, vol. 7, No. 4, Apr. 2000, p. 3.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for encrypted communications to a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for encrypted communications to a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for encrypted communications to a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4271882

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.