Method and system for binary data firewall delivery

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

06502191

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Technical Field
The invention relates to communication on an electronic network. More particularly, the invention relates to a method and system for sending documents through a firewall and/or proxy server to a recipient on the Internet.
2. Description of the Prior Art
The Internet is increasingly being used for communications. It is now possible on the Internet for a sender to direct a document to a specific recipient, regardless of platform, operating system, or email system. Such communication is possible even when the recipient is not a computer but, rather, a fax machine or printer connected to the Internet.
In many instances, the sender of a document will reside on a local area network, referred to as an intranet. The sender's computer may be connected to the Internet directly, or through the intranet's server. An intranet is frequently protected and insulated from the Internet by a firewall or proxy server. A firewall is software and/or hardware which limits access to an intranet or a desktop computer. A proxy server is dedicated software and/or hardware which intercepts requests between machines running inside an intranet and machines outside the intranet.
Such firewall provides one or more of a few basic services. First, a firewall prevents intranet users from accessing specific information on the Internet. Thus, an office worker is restricted from accessing non-work-related Internet sites. Second, a firewall restricts outside access to the information available on the intranet. Third, a firewall prevents intranet users from sending confidential information from the intranet to the Internet. Typically, blocking unsolicited outside access to the intranet also blocks information transfer from intranet to Internet.
Various methods have been used to transfer data on the Internet between intranets protected by firewalls. One such method is the key management scheme described in Aziz, Method and Apparatus for Key-Management Scheme for Use With Internet Protocols at Site Firewalls, U.S. Pat. No. 5,416,842 (May 16, 1995). In this method, intersite traffic is encrypted at the Internet Protocol (IP) layer by using a Skip scheme to prevent detection of a source and destination address of a communicating node.
IP packets are encrypted only from site firewall to site firewall, such that only firewall servers need to participate in the Skip scheme. When a firewall receives from an interior site node an IP packet intended for a remote firewall, it encrypts the IP packet and sends it encapsulated in another IP packet destined for the remote firewall. The remote firewall decrypts the encapsulated packet and sends it in the clear to the destination node on the interior side of the remote firewall.
Such method, however, requires the encrypted IP packet to be received by a remote firewall server that is configured to decrypt the packet. The encrypted information cannot be directly sent to a computer or intranet system that does not use such firewall server, or to a device such as a fax machine or printer.
A security system for connecting computer networks is described in Gelb, Security System for Preventing Unauthorized Communications Between Networks by Translating Communications Received in IP Protocol to Non-IP Protocol to Remove Address and Routing Services Information, U.S. Pat. No. 5,550,984 (Aug. 27, 1996). However, Gelb does not address how documents may be sent through a firewall or proxy server.
It would therefore be an advantage to provide a method and system for sending documents through a series of firewalls and/or proxy servers. It would be a further advantage if such method and system permitted the documents to be transmitted to a device such as a fax machine or a printer. It would be yet another advantage if such method and system did not require the receiving computer of device to be served by a decrypting firewall.
SUMMARY OF THE INUENTION
The invention provides a method and system for sending documents from a desktop computer inside an intranet through a series of firewalls and/or proxy servers to a server residing on the Internet. Firewalls presume that HTTP for textual data is a valid operation that allows users to fill in HTML forms. Thus, firewalls do not block HTTP for textual data. The invention circumvents the security provided by firewalls by using this feature of HTTP to move a document through the firewall.
A computer in an intranet system protected by a firewall or proxy server uses a software application to access the Internet. The software also encodes binary data to be sent as text. This binary data may be subdivided into smaller text packets. The text packets are sent, using HTTP, to a server outside the firewall, which has been configured to accept such text packets. The server converts the text packets back to the original binary data representation. The binary data, once resident on the internet server, can then be forwarded directly to other internet servers, internet desktop computers, printers, or fax machines.


REFERENCES:
patent: 4532588 (1985-07-01), Foster
patent: 4713780 (1987-12-01), Schultz et al.
patent: 4754428 (1988-06-01), Schultz et al.
patent: 4837798 (1989-06-01), Cohen et al.
patent: 4951196 (1990-08-01), Jackson
patent: 5008814 (1991-04-01), Mathur
patent: 5054096 (1991-10-01), Beizer
patent: 5119465 (1992-06-01), Jack et al.
patent: 5210824 (1993-05-01), Putz et al.
patent: 5293250 (1994-03-01), Okumura et al.
patent: 5404231 (1995-04-01), Bloomfiled
patent: 5406557 (1995-04-01), Baudoin
patent: 5416842 (1995-05-01), Aziz
patent: 5424724 (1995-06-01), Williams et al.
patent: 5495610 (1996-02-01), Shing et al.
patent: 5513126 (1996-04-01), Harkins et al.
patent: 5550984 (1996-08-01), Gelb
patent: 5550994 (1996-08-01), Tashiro et al.
patent: 5608819 (1997-03-01), Ikeuchi
patent: 5608874 (1997-03-01), Ogawa et al.
patent: 5675507 (1997-10-01), Bobo, II
patent: 5677955 (1997-10-01), Doggett et al.
patent: 5706442 (1998-01-01), Anderson et al.
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5708826 (1998-01-01), Ikeda et al.
patent: 5710883 (1998-01-01), Hong et al.
patent: 5727156 (1998-03-01), Herr-Hoyman et al.
patent: 5751956 (1998-05-01), Kirsch
patent: 5758343 (1998-05-01), Vigil et al.
patent: 5764906 (1998-06-01), Edelstein et al.
patent: 5778372 (1998-07-01), Cordell et al.
patent: 5781901 (1998-07-01), Kuzma
patent: 5790793 (1998-08-01), Higley
patent: 5793972 (1998-08-01), Shane
patent: 5805719 (1998-09-01), Pare, Jr. et al.
patent: 5812398 (1998-09-01), Nielsen
patent: 5812776 (1998-09-01), Gifford
patent: 5845084 (1998-12-01), Cordell et al.
patent: 5850442 (1998-12-01), Muftic
patent: 5855020 (1998-12-01), Kirsch
patent: 5860068 (1999-01-01), Cook
patent: 5892825 (1999-04-01), Mages et al.
patent: 5903723 (1999-05-01), Beck et al.
patent: 5911776 (1999-06-01), Guck
patent: 5937164 (1999-08-01), Mages et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for binary data firewall delivery does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for binary data firewall delivery, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for binary data firewall delivery will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2922160

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.