Method for transparently managing outbound traffic from an...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S004000, C726S011000, C726S012000, C726S013000, C726S015000, C713S153000, C713S154000, C709S227000, C709S239000, C709S238000, C709S244000, C705S079000

Reexamination Certificate

active

07383573

ABSTRACT:
Methods and apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network are disclosed. Embodiments include a firewall device operable between an internal user of a private network and an IP-compliant network. The firewall device being configured to assign a proxy agent to process a request by the internal user to form a connection with a public network element through the IP-compliant network. Disclosed embodiments include the proxy agent forming a connection only if the internal user is authorized to access the public requested network element.

REFERENCES:
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4727243 (1988-02-01), Savar
patent: 4799153 (1989-01-01), Hann et al.
patent: 4799156 (1989-01-01), Shavit et al.
patent: 5191611 (1993-03-01), Lang
patent: 5241594 (1993-08-01), Kung
patent: 5416842 (1995-05-01), Aziz
patent: 5448724 (1995-09-01), Hayashi
patent: 5483661 (1996-01-01), Yoshida et al.
patent: 5491752 (1996-02-01), Kaufman et al.
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5548721 (1996-08-01), Denslow
patent: 5550984 (1996-08-01), Gelb
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5602918 (1997-02-01), Chen et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5623011 (1997-04-01), Bernard
patent: 5623600 (1997-04-01), Ji et al.
patent: 5623601 (1997-04-01), Vu
patent: 5636371 (1997-06-01), Yu
patent: 5638448 (1997-06-01), Nguyen
patent: 5657452 (1997-08-01), Kralowetz et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5889943 (1999-03-01), Ji et al.
patent: 5903718 (1999-05-01), Marik
patent: 6003084 (1999-12-01), Green et al.
patent: 6061798 (2000-05-01), Coley et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6453419 (2002-09-01), Flint et al.
patent: 6654892 (2003-11-01), Karim
patent: 2005/0235346 (2005-10-01), Coley et al.
patent: 2005/0235347 (2005-10-01), Coley et al.
patent: 2005/0235348 (2005-10-01), Coley et al.
patent: 2005/0235359 (2005-10-01), Coley et al.
patent: 2005/0240992 (2005-10-01), Coley et al.
patent: 2006/0021020 (2006-01-01), Coley et al.
patent: 2006/0112276 (2006-05-01), Coley et al.
patent: 2006/0112424 (2006-05-01), Coley et al.
Cheswick, Bill, “The Design of a Secure Internet Gateway”, Proceedings of the Usenix Summer 1990 Technical Conference, Jun. 1990, pp. 233-238, Usenix Association, Anaheim, California, USA.
Ranum, Marcus J., “A Network Firewall”, Proceedings of the First World Conference on System Administration and Security, Jun. 12, 1992, 10 pages, Sans Institute, Bethesda, MD 20816 USA.
Ranum, Marcus J., “Thinking About Firewalls,” Proceedings of Second International Conference on Systems and Network Security and Management (SANS-II), Apr. 1993, 8 pages, Arlington, VA, USA.
Definition of “daemon”, Computer dictionary, 2nd Ed., Dec. 1994, p. 104, Microsoft Press, USA.
Aicklen, G. H. et al., “Remote Control of Diverse Network Elements Using SNMP,” Military Communications Conference (MILCOM'95), San Diego, CA, pp. 673, 677, Nov. 7, 1995.
Bellovin, Steven M. et al., “Network Firewalls,” pp. 50-57, Sep. 1994.
Goldberg, David S., “The MITRE Security Perimeter,” Tenth Annual Computer Security Applications Conference, Oakland, CA, pp. 212-218, Dec. 5-9, 1994.
Neuman, B.Clifford, “Proxy-Based Authorization and Accounting for Distributed System.” Technical Report 91-02-01 Department of Computer Science and Engineering, University of Washington, pp. 1-14, Mar. 1991.
Stempel, Steffen, “ipAccess—An Internet Service Access System for Firewall,” 1995 Symposium on Network and Distributed System Security (sdss'95), pp. 31-41, 1995.
Aicklen, G. H. et al., “Remote Control of Diverse Network Elements Using SNMP”, Military Communications Conference (MILCOM'95), San Diego, CA, pp. 674, 677, Nov. 7, 1995.
Bellovin, Steven M. et al., “Network Firewalls”, pp. 50-57, Sep. 1994.
Goldberg, David S., “The MITRE Security Perimeter”, Tenth Annual Computer Security Applications Conference, Oakland, CA, pp. 212-218, Dec. 5-9, 1994.
Neuman, B.Clifford, Proxy-Based Authorization and Accounting for Distributed System, Proceedings of the 13thInternational Conference on Distributed Computing Systems, pp. 283-291, May 1993.
Stempel, Steffen, “ipAccess—An Internet Service Access System for Firewall”, 1995 Symposium on Network and Distributed System Security (sdss'95), pp. 31-41, 1995.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for transparently managing outbound traffic from an... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for transparently managing outbound traffic from an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for transparently managing outbound traffic from an... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2802797

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.