Information security – Access control or authentication – Network
Reexamination Certificate
2008-06-03
2008-06-03
Zia, Syed A. (Department: 2131)
Information security
Access control or authentication
Network
C726S002000, C726S003000, C726S004000, C726S011000, C726S012000, C726S013000, C726S015000, C713S153000, C713S154000, C709S227000, C709S239000, C709S238000, C709S244000, C705S079000
Reexamination Certificate
active
07383573
ABSTRACT:
Methods and apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network are disclosed. Embodiments include a firewall device operable between an internal user of a private network and an IP-compliant network. The firewall device being configured to assign a proxy agent to process a request by the internal user to form a connection with a public network element through the IP-compliant network. Disclosed embodiments include the proxy agent forming a connection only if the internal user is authorized to access the public requested network element.
REFERENCES:
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4727243 (1988-02-01), Savar
patent: 4799153 (1989-01-01), Hann et al.
patent: 4799156 (1989-01-01), Shavit et al.
patent: 5191611 (1993-03-01), Lang
patent: 5241594 (1993-08-01), Kung
patent: 5416842 (1995-05-01), Aziz
patent: 5448724 (1995-09-01), Hayashi
patent: 5483661 (1996-01-01), Yoshida et al.
patent: 5491752 (1996-02-01), Kaufman et al.
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5548721 (1996-08-01), Denslow
patent: 5550984 (1996-08-01), Gelb
patent: 5577209 (1996-11-01), Boyle et al.
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5602918 (1997-02-01), Chen et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5623011 (1997-04-01), Bernard
patent: 5623600 (1997-04-01), Ji et al.
patent: 5623601 (1997-04-01), Vu
patent: 5636371 (1997-06-01), Yu
patent: 5638448 (1997-06-01), Nguyen
patent: 5657452 (1997-08-01), Kralowetz et al.
patent: 5668876 (1997-09-01), Falk et al.
patent: 5687235 (1997-11-01), Perlman et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5889943 (1999-03-01), Ji et al.
patent: 5903718 (1999-05-01), Marik
patent: 6003084 (1999-12-01), Green et al.
patent: 6061798 (2000-05-01), Coley et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6453419 (2002-09-01), Flint et al.
patent: 6654892 (2003-11-01), Karim
patent: 2005/0235346 (2005-10-01), Coley et al.
patent: 2005/0235347 (2005-10-01), Coley et al.
patent: 2005/0235348 (2005-10-01), Coley et al.
patent: 2005/0235359 (2005-10-01), Coley et al.
patent: 2005/0240992 (2005-10-01), Coley et al.
patent: 2006/0021020 (2006-01-01), Coley et al.
patent: 2006/0112276 (2006-05-01), Coley et al.
patent: 2006/0112424 (2006-05-01), Coley et al.
Cheswick, Bill, “The Design of a Secure Internet Gateway”, Proceedings of the Usenix Summer 1990 Technical Conference, Jun. 1990, pp. 233-238, Usenix Association, Anaheim, California, USA.
Ranum, Marcus J., “A Network Firewall”, Proceedings of the First World Conference on System Administration and Security, Jun. 12, 1992, 10 pages, Sans Institute, Bethesda, MD 20816 USA.
Ranum, Marcus J., “Thinking About Firewalls,” Proceedings of Second International Conference on Systems and Network Security and Management (SANS-II), Apr. 1993, 8 pages, Arlington, VA, USA.
Definition of “daemon”, Computer dictionary, 2nd Ed., Dec. 1994, p. 104, Microsoft Press, USA.
Aicklen, G. H. et al., “Remote Control of Diverse Network Elements Using SNMP,” Military Communications Conference (MILCOM'95), San Diego, CA, pp. 673, 677, Nov. 7, 1995.
Bellovin, Steven M. et al., “Network Firewalls,” pp. 50-57, Sep. 1994.
Goldberg, David S., “The MITRE Security Perimeter,” Tenth Annual Computer Security Applications Conference, Oakland, CA, pp. 212-218, Dec. 5-9, 1994.
Neuman, B.Clifford, “Proxy-Based Authorization and Accounting for Distributed System.” Technical Report 91-02-01 Department of Computer Science and Engineering, University of Washington, pp. 1-14, Mar. 1991.
Stempel, Steffen, “ipAccess—An Internet Service Access System for Firewall,” 1995 Symposium on Network and Distributed System Security (sdss'95), pp. 31-41, 1995.
Aicklen, G. H. et al., “Remote Control of Diverse Network Elements Using SNMP”, Military Communications Conference (MILCOM'95), San Diego, CA, pp. 674, 677, Nov. 7, 1995.
Bellovin, Steven M. et al., “Network Firewalls”, pp. 50-57, Sep. 1994.
Goldberg, David S., “The MITRE Security Perimeter”, Tenth Annual Computer Security Applications Conference, Oakland, CA, pp. 212-218, Dec. 5-9, 1994.
Neuman, B.Clifford, Proxy-Based Authorization and Accounting for Distributed System, Proceedings of the 13thInternational Conference on Distributed Computing Systems, pp. 283-291, May 1993.
Stempel, Steffen, “ipAccess—An Internet Service Access System for Firewall”, 1995 Symposium on Network and Distributed System Security (sdss'95), pp. 31-41, 1995.
Coley Christopher D.
Wesinger, Jr. Ralph E.
GraphOn Corporation
Sierra Patent Group Ltd.
Zia Syed A.
LandOfFree
Method for transparently managing outbound traffic from an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for transparently managing outbound traffic from an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for transparently managing outbound traffic from an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2802797