Secure intranet access

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S170000, C713S152000, C713S152000, C705S064000

Reexamination Certificate

active

06950936

ABSTRACT:
Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external client carries user authentication information. After the user is authenticated to the network, requests may be redirected back to the original target server. Web pages sent from the target server to the external client are scanned for non-secure URLs such as those containing “http://” and modified to make them secure. The target server and the border server utilize various combinations of secure and non-secure caches. Although tunneling, may be used, the extensive configuration management burdens imposed by virtual private networks are not required.

REFERENCES:
patent: 5553239 (1996-09-01), Heath et al.
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5768271 (1998-06-01), Seid et al.
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5825890 (1998-10-01), Elgalmal et al.
patent: 5913025 (1999-06-01), Higley et al.
patent: 5963915 (1999-10-01), Kirsch
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6148405 (2000-11-01), Liao et al.
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6233608 (2001-05-01), Laursen et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6745229 (2004-06-01), Gobin et al.
“A New Management and Security Architechture for Extranets”, http://www.aventail.com/index.phtml/solutions/white_papers/aec_wp.phtml, (1196-1999), 1-14.
“CMS Proxy Server—White Paper”, http://csm.alcyonis.fr/proxies.htm, (1995-1998), 1-13.
“CSM Proxy Server, the Ultimate Gateway to the Internet!”, http://www.csm-usa.com/white/gateway.htm, no later than Aug. 4, 1998, 1-5.
“How the Proxy works”, http://gopher.texshare.utexas.edu/Current/AccessMeet/accessproxy/how.html, (Jul. 22, 1998), 1-2.
“Info needed to write https proxy”, http://www.netsys.com/firewalls-9604/0406.html, (Apr. 11, 1996), 1.
“Microsoft Proxy Server”, http://www/microsoft.com/proxy/guide/whatsnew.asp?a=2&B=1, no later than Aug. 4, 1998, 1-4.
“Microsoft Proxy Server Proxy vs. Border Manager”, http://microsoft.com/proxy/comparisons/bulletin.asp?A=4&B=4, (1998), 1-8.
“NetSafteV3.0 The Firewall Solution from Siemens Nixdorf”, http://www.swn.sni.be/NetSafe.htm, (May 31, 1997), 1-3.
“Netscpe Proxy Server Administrator's Guide Version 3.5 for Unix”, http://developer.netscape.com/docs/manuals/proxy/adminux//contents.htm, (1997).
“OWF Basics”, http://www.omnigroup.com/MailArchive/OmniWeb-dev/Current/0002.html, (1997), 1-2.
“r3 CypherClient”, http://www.r3.ch/products/cypher/cypherclient.html, (1998), 1-4.
“Submission: HTTPS v1.0 PAckage for OmniWeb 3x (Rhapsody)”, http://www.plsys.co.uk.MailingLists/uk-next-announce.msg00251.html, (Jan. 24, 1998).
“Virtual Private Networking: An Overview”,Microsofthttp://www.microsoft.com/workshop/sever/feature/vpnovw.asp, no later than Feb. 25, 1998.
“Webroute 1.3.0”, http://www-miaif.lip6.fr/willy/pub/webroute/v1.3/untared/CHANGES, (1997), 1-2.
“WedSTAR Security Toolkit: Troubleshooting”, http://www.starnine.com/support/ga/webstarssl/ssltroubleshoot.html, 1-2.
Elgamal, Taher, et al., “Securing Communications on the Intranet and Over the Internet”, http://www.netscape.com
ewsref/ref/128bit.html, (Jul. 1996),1-2.
Feibel, Werner, “Novell's Complete Encyclopedia of Networking”, (1995),625-630.
Ferguson, Paul , et al., “Waht is a VPN?”,Ferguson&Hutson, Revision 1,(Apr., 1998), 1-22.
Schneider, Bruce , “Applied Cryptography Protocols, Algorithms, and Source Code in C”, (1994),436-437.
Tannebaum, Andrew S., “Computer Networks”,3d Ed.,(1996),28-29, 396-417, 601-621, and 681-695.
Zhong, Qun , et al., “Security Control for COTS Components”,IEEE Computer,(Jun., 1998),67-73.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Secure intranet access does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Secure intranet access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure intranet access will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3385781

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.