Remote configuration of software component using proxy

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S011000, C726S013000, C726S014000

Reexamination Certificate

active

07836495

ABSTRACT:
A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).

REFERENCES:
patent: 5822539 (1998-10-01), Van Hoff
patent: 5826014 (1998-10-01), Coley et al.
patent: 5915087 (1999-06-01), Hammond et al.
patent: 5983350 (1999-11-01), Minear et al.
patent: 6098172 (2000-08-01), Coss et al.
patent: 6104716 (2000-08-01), Crichton et al.
patent: 6643778 (2003-11-01), Nakazawa
patent: 6684329 (2004-01-01), Epstein et al.
patent: 6832256 (2004-12-01), Toga
patent: 6868144 (2005-03-01), Skladman et al.
patent: 7028336 (2006-04-01), Wesinger, Jr. et al.
patent: 2003/0079146 (2003-04-01), Burstein
patent: 2004/0255156 (2004-12-01), Chan et al.
patent: 2005/0149747 (2005-07-01), Wesinger et al.
patent: 2006/0045068 (2006-03-01), Wu et al.
patent: 2006/0122941 (2006-06-01), Coley et al.
patent: 2006/0224749 (2006-10-01), Bansal et al.
patent: 2007/0101421 (2007-05-01), Wesinger et al.
patent: 2007/0124814 (2007-05-01), Logigan et al.
CISCO PIX Firewall and VPN Cofiguration Guide version 6.3 Date: 2003.
Steven, Anthony, “Applying the Principle of Leasts Privilege to User Accounts on Windows XP”, http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/luawinxp.mspx, 2006, 26 pages.
“Adaptive Proxy Firewalls: The Next Generation Firewall Architecture eliminating the Speed-vs-Security Compromise”, http://cncenter.future.cokr/resource/rsc-center/vendor-wp
ai/gauntlet—adaptiveproxy.doc, 10 pages.
“Raptor Firewall Raptor PowerVPN VelociRaptor”, Reference Guide, Nov. 2000, Version 6.5, http://www.sun.com/hardware/serverappliances/pdfs/discontinued/manual.velociraptor.pdf, i thru xx, 1-1 thru I-9.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Remote configuration of software component using proxy does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Remote configuration of software component using proxy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Remote configuration of software component using proxy will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4159677

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.