Information security – Access control or authentication – Network
Reexamination Certificate
2007-02-06
2007-02-06
Vu, Kim (Department: 2135)
Information security
Access control or authentication
Network
C726S003000, C726S005000, C713S150000, C713S156000
Reexamination Certificate
active
11305600
ABSTRACT:
Methods, systems, and computer program products for negotiating a secure end-to-end connection using a proxy server as an intermediary. The client first negotiates a secure connection between the client and the proxy so that any credentials exchanged will be encrypted. After the exchange of authentication credentials, the secure client-proxy connection is altered so that no further encryption takes place. The client and server then negotiate a secure end-to-end connection through the proxy, with the secure end-to-end connection being encapsulated within the insecure client-proxy connection. In this way, the overhead of creating a separate client-proxy connection for the secure end-to-end connection may be avoided, but the insecure client-proxy connection introduces only minimal overhead because it no longer encrypts any data that it carries.
Fishman Neil S.
Kadyk Donald J.
Kramer Michael
Seinfeld Marc E.
Klimach Paula
Vu Kim
Workman Nydegger
LandOfFree
Negotiating secure connections through a proxy server does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Negotiating secure connections through a proxy server, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Negotiating secure connections through a proxy server will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3894571