Information security – Access control or authentication – Network
Reexamination Certificate
2006-11-14
2006-11-14
Vu, Kim (Department: 2135)
Information security
Access control or authentication
Network
C713S150000, C713S153000, C709S217000, C709S219000
Reexamination Certificate
active
07137143
ABSTRACT:
A method and system for securing network communications are provided. In a network a Secure Reverse Proxy (“SRP”) is placed among a server and a client where the client and SRP establish a secure connection using TLS protocol. Upon receiving a request from the client for a secure HTTP page, the SRP determines if the secure page is maintained in its cache. If the page is present, the SRP responds to the client by sending the requested secure HTTP page without contacting the server. If the page is not contained within the SRP's cache, the SRP establishes secure TLS connection with the server and forwards the request for the HTTP page. Receiving the HTTP page from the server, the SRP places it in its cache for future use. Having the page in its cache the SRP retrieves the page, encrypts it, and sends it to the requesting client. Subsequent requests for the same page do not involve the server enhancing the efficiency of network operations.
REFERENCES:
patent: 4386416 (1983-05-01), Giltner
patent: 4964164 (1990-10-01), Fiat
patent: 5222133 (1993-06-01), Chou et al.
patent: 5557712 (1996-09-01), Guay
patent: 5734744 (1998-03-01), Wittenstein
patent: 5764235 (1998-06-01), Hunt et al.
patent: 5828832 (1998-10-01), Holden et al.
patent: 5848159 (1998-12-01), Collins et al.
patent: 5923756 (1999-07-01), Shambroom
patent: 6021198 (2000-02-01), Anigbogu
patent: 6061448 (2000-05-01), Smith et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6081598 (2000-06-01), Dai
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6094485 (2000-07-01), Weinstein et al.
patent: 6098096 (2000-08-01), Tsirigotis et al.
patent: 6105012 (2000-08-01), Chang et al.
patent: 6154542 (2000-11-01), Crandall
patent: 6202157 (2001-03-01), Brownlie et al.
patent: 6216212 (2001-04-01), Challenger et al.
patent: 6233565 (2001-05-01), Lewis et al.
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6237033 (2001-05-01), Doeberl et al.
patent: 6396926 (2002-05-01), Takagi et al.
patent: 6397330 (2002-05-01), Elgamal et al.
patent: 6477646 (2002-11-01), Krishna et al.
patent: 6502135 (2002-12-01), Munger et al.
patent: 6578061 (2003-06-01), Aoki et al.
patent: 6584567 (2003-06-01), Bellwood et al.
patent: 6587866 (2003-07-01), Modi et al.
patent: 6598167 (2003-07-01), Devine et al.
patent: 6615276 (2003-09-01), Mastrianni et al.
patent: 6621505 (2003-09-01), Beauchamp et al.
patent: 6678733 (2004-01-01), Brown et al.
patent: 6681327 (2004-01-01), Jardin
patent: 6751677 (2004-06-01), Ilnicki et al.
patent: 6757823 (2004-06-01), Rao et al.
patent: 6763459 (2004-07-01), Corella
patent: 6785810 (2004-08-01), Lirov et al.
patent: 6874089 (2005-03-01), Dick et al.
patent: 6886095 (2005-04-01), Hind et al.
patent: 6941459 (2005-09-01), Hind et al.
patent: 6963980 (2005-11-01), Mattsson
patent: 6990660 (2006-01-01), Moshir et al.
patent: 2002/0012473 (2002-01-01), Kondo et al.
patent: 2002/0015497 (2002-02-01), Maruyama et al.
patent: 2002/0016911 (2002-02-01), Chawla et al.
patent: 2002/0039420 (2002-04-01), Schacham et al.
patent: 2002/0066038 (2002-05-01), Mattsson
patent: 2002/0073232 (2002-06-01), Hong et al.
patent: 2002/0087884 (2002-07-01), Shacham et al.
patent: 2002/0112167 (2002-08-01), Boheh et al.
patent: 2003/0014650 (2003-01-01), Freed et al.
patent: 2003/0065919 (2003-04-01), Albert et al.
patent: 2003/0097428 (2003-05-01), Afkhami
patent: 2003/0101355 (2003-05-01), Mattsson
patent: 2003/0123671 (2003-07-01), He et al.
patent: 2003/0156719 (2003-08-01), Cronce
patent: 2003/0197733 (2003-10-01), Beauchamp
patent: 2003/0204513 (2003-10-01), Bumbulis
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: WO 01/03398 (2001-01-01), None
patent: WO01/03398 (2001-01-01), None
patent: WO0103398 (2001-01-01), None
patent: WO 02/101605 (2002-12-01), None
Netscape Proxy Server Administrator's Guide, Version 3.5 for Unix, Chapter 7, Chapter 9.
Netscape Proxy Server Administrator's Guide. Feb. 25, 1998. Netscape. V3.5 for Unix. Chapter 7 and 9.
Netscape; “Netscape Proxy Server Administrator's Guide, Version 3.5 for Unix”; Feb. 25, 1998; Retrieved from the internet.
Oppliger, R.; “Authorization Methods for E-Commerce Applications”; 1999.
U.S. Appl. No. 10/526,252, filed Feb. 24, 2005, Fountain et al.
U.S. Appl. No. 10/850,827, filed May 20, 2004, Koyfman.
U.S. Appl. No. 11/236,046, filed Sep. 26, 2005, Metzger et al.
U.S. Appl. No. 11/236,294, filed Sep. 26, 2005, Metzger et al.
U.S. Appl. No. 11/236,061, filed Sep. 26, 2005, Metzger et al.
Alteon Web Systems: “The Next Step in Server Loading Balancing” Nov. 1999, Retrieved from the Internet: URL:http:/www.nortelnetworks.com/products/library/collateral/intel—int/webworking—wp.pdf, Retrieved on Mar. 2, 2004; pp. 4-11.
Alteon web Systems: “Networking with the Web in Mind” May 1999, Retrieved from the Internet: URL:http:/www.nortelnetworks.com/products/library/collateral/intel—int/webworking—wp.pdf, Retrieved on Mar. 2, 2004; p. 1, pp. 3-7.
Boneh, D., “Twenty Years of Attacks on the RSA Cyrptosystem,” Notices of the AMS, vol. 46, No. 2, pp. 203-213, 1999.
Boneh, et al., “An Attack on RSA Given a Small Fraction of the Private Key Bits,” ASIACRYPT '98, LNCS 1514, pp. 25-34, 1998.
Boneh, et al., “Cryptanalysis of RSA with Private KeydLess thanN0.292,” (extended abstract), 1999.
Boneh, et al., “Efficient Generation of Shared RSA Keys,” (extended abstract).
Durfee, G., et al., “Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99,” ASIACRYPT 2000, LNCS 1976, pp. 14-29, 2000.
Fiat, A. “Batch RSA, (digital signatures and public key krypto-systems)” Advances in Crytology—Cryto '89 Proceedings Aug. 20-24, 1989, Springer-Verlag.
Groβschädl, J., et al., “The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip,” 2000.
Herda, S., “Non-repudiation: Constituting evidence and proof in digital cooperation,” Computer Standards and Interfaces, Elsevier Sequoia, Lausanne, CH, 17:1 (69-79) 1995.
Immerman, N., “Homework 4 with Extensive Hints,” 2000.
Menezes, A., et al., “Handbook of Applied Cryptography,” 1996 CRC Press, pp. §8.2-8.3 and §14.5.
RSA Laboratories: “PKCS #7: Cryptographic Message Syntax Standard, Version 1.5,” RSA Laboratories Technical Note, pp. 1-30, Nov. 1, 1993.
RSA “PKCS #1 v2.0 Amendment 1: Multi-Prime RSA,” 2000.
Schacham, H., et al., “Improving SSL Handsake Performance via Batching,” Topics in Cryptology, pp. 28-43, 2001.
Shand, M., et al., “Fast Implementations of RSA Cryptography,” 1993.
Sherif, M.H., et al., “SET and SSL: Electronic Payments on the Internet,” IEEE, pp. 353-358 (1998).
Stallings, W., “IP Security,” Network Security Essentials, Applications and Standards, Chapters 6 and 7, pp. 162-223, 2000.
Takagi, T., “Fast RSA-Type Cryptosystem Modulopkq,” 1998.
Takagi, T., “Fast RSA-Type Cryptosystems Using N-Adic Expansion,” Advances in Technology—CRYPTO '97, LNCS 1294, pp. 372-384, 1997.
Wiener, M., “Cryptanalysis of Short RSA Secret Exponents,” 1989.
“Security Protocols Overview (An RSA Data Security Brief)”, RSA Data Security, 1999, http://www.directoryservice.com/WP/RSA/protocols.pdf, pp. 1-4.
Boneh Dan
Chawla Rajeev
Tsirigotis Panagiotis
Ingrian Systems Inc.
Perkins Coie LLP
Pich Ponnoreay
Vu Kim
LandOfFree
Method and system for caching secure web content does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for caching secure web content, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for caching secure web content will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3629457