Information security – Access control or authentication – Network
Reexamination Certificate
2006-07-28
2010-11-16
Truong, Thanhnga B (Department: 2438)
Information security
Access control or authentication
Network
C726S011000, C726S013000, C726S014000
Reexamination Certificate
active
07836495
ABSTRACT:
A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
REFERENCES:
patent: 5822539 (1998-10-01), Van Hoff
patent: 5826014 (1998-10-01), Coley et al.
patent: 5915087 (1999-06-01), Hammond et al.
patent: 5983350 (1999-11-01), Minear et al.
patent: 6098172 (2000-08-01), Coss et al.
patent: 6104716 (2000-08-01), Crichton et al.
patent: 6643778 (2003-11-01), Nakazawa
patent: 6684329 (2004-01-01), Epstein et al.
patent: 6832256 (2004-12-01), Toga
patent: 6868144 (2005-03-01), Skladman et al.
patent: 7028336 (2006-04-01), Wesinger, Jr. et al.
patent: 2003/0079146 (2003-04-01), Burstein
patent: 2004/0255156 (2004-12-01), Chan et al.
patent: 2005/0149747 (2005-07-01), Wesinger et al.
patent: 2006/0045068 (2006-03-01), Wu et al.
patent: 2006/0122941 (2006-06-01), Coley et al.
patent: 2006/0224749 (2006-10-01), Bansal et al.
patent: 2007/0101421 (2007-05-01), Wesinger et al.
patent: 2007/0124814 (2007-05-01), Logigan et al.
CISCO PIX Firewall and VPN Cofiguration Guide version 6.3 Date: 2003.
Steven, Anthony, “Applying the Principle of Leasts Privilege to User Accounts on Windows XP”, http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/luawinxp.mspx, 2006, 26 pages.
“Adaptive Proxy Firewalls: The Next Generation Firewall Architecture eliminating the Speed-vs-Security Compromise”, http://cncenter.future.cokr/resource/rsc-center/vendor-wp
ai/gauntlet—adaptiveproxy.doc, 10 pages.
“Raptor Firewall Raptor PowerVPN VelociRaptor”, Reference Guide, Nov. 2000, Version 6.5, http://www.sun.com/hardware/serverappliances/pdfs/discontinued/manual.velociraptor.pdf, i thru xx, 1-1 thru I-9.
Abzarian David
Diaz-Cuellar Gerardo
Yariv Eran
Microsoft Corporation
Truong Thanhnga B
Woodcock & Washburn LLP
LandOfFree
Remote configuration of software component using proxy does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Remote configuration of software component using proxy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Remote configuration of software component using proxy will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4159677