Information security – Access control or authentication – Network
Reexamination Certificate
2011-06-07
2011-06-07
Poltorak, Peter (Department: 2434)
Information security
Access control or authentication
Network
Reexamination Certificate
active
07958550
ABSTRACT:
A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.
REFERENCES:
patent: 6052788 (2000-04-01), Wesinger, Jr. et al.
patent: 6058379 (2000-05-01), Odom et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6148290 (2000-11-01), Dan et al.
patent: 6266704 (2001-07-01), Reed et al.
patent: 6308276 (2001-10-01), Ashdown et al.
patent: 6684329 (2004-01-01), Epstein et al.
patent: 2002/0178103 (2002-11-01), Dan et al.
patent: 0 442 838 (1991-08-01), None
patent: WO 98/21683 (1998-05-01), None
Marshall et al., “ALPINE-Application Level Programmable Inter-Network Environment”, http://www.cs.kent.ac.uk/people/staff/iwm2/personal/bttjalpine.pdf.
Sun Microsystem, “Introduction to Portal Server Secure Remote Access”, http://docs.sun.com/source/817-7693/1-overview.html.
Pfleeger (Charles P. Pfleeger, “Security in computing”, 2nd edition, 1996, ISBN: 0133374866), p. 270-272.
Collaboration-Protocol Profile and Agreement Specification Version 1.0, ebXML Trading-Partners Team, May 10, 2001, UN/CEFACT and OASIS, 2001, pp. 1-90.
ebXML Business Process Specification Schema Version 1.01, Business Process Project Team, May 11, 2001, UN/CEFACT and OASIS, 2001, pp. i-136.
Security Research and the Future, Dr. Dobb's Special Report, Dec. 2000, Bruce Schneier, pp. 1-6, http://www.ddj.com/articles/2000/0013/0013f/0013f.htm.
Code and Other Laws of Cyberspace, Lessig, Lawrence, ISBN 0-465-03913-8, Basic Books 1999, pp. i-297.
Marshall, I.W. and Roadknight, C., “Adaptive Management of an Active Service Network”, BT Technol J, vol. 18, No. 4, pp. 78-84, Oct. 2000.
Brooks, Charles, et al, “Application-Specific Proxy Servers as HTTP Stream Transducers”, Internet Citation http://www.w3.org/Conferences/WWW4/Papers/56/, 9 pages, Dec. 1, 1995.
PCT International Search Report for PCT US02/34834, 7 pages, Apr. 18, 2003.
Fenton Charles S.
Shafer Keith E.
Jackson Walker L.L.P.
Poltorak Peter
Sterling Commerce Inc.
LandOfFree
Method and system for secure communication does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for secure communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for secure communication will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2730932