Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2005-09-27
2005-09-27
Zand, Kambiz (Department: 2132)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S168000, C713S170000, C713S152000, C713S152000, C705S064000
Reexamination Certificate
active
06950936
ABSTRACT:
Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external client carries user authentication information. After the user is authenticated to the network, requests may be redirected back to the original target server. Web pages sent from the target server to the external client are scanned for non-secure URLs such as those containing “http://” and modified to make them secure. The target server and the border server utilize various combinations of secure and non-secure caches. Although tunneling, may be used, the extensive configuration management burdens imposed by virtual private networks are not required.
REFERENCES:
patent: 5553239 (1996-09-01), Heath et al.
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5768271 (1998-06-01), Seid et al.
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5825890 (1998-10-01), Elgalmal et al.
patent: 5913025 (1999-06-01), Higley et al.
patent: 5963915 (1999-10-01), Kirsch
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6148405 (2000-11-01), Liao et al.
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6233608 (2001-05-01), Laursen et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6745229 (2004-06-01), Gobin et al.
“A New Management and Security Architechture for Extranets”, http://www.aventail.com/index.phtml/solutions/white_papers/aec_wp.phtml, (1196-1999), 1-14.
“CMS Proxy Server—White Paper”, http://csm.alcyonis.fr/proxies.htm, (1995-1998), 1-13.
“CSM Proxy Server, the Ultimate Gateway to the Internet!”, http://www.csm-usa.com/white/gateway.htm, no later than Aug. 4, 1998, 1-5.
“How the Proxy works”, http://gopher.texshare.utexas.edu/Current/AccessMeet/accessproxy/how.html, (Jul. 22, 1998), 1-2.
“Info needed to write https proxy”, http://www.netsys.com/firewalls-9604/0406.html, (Apr. 11, 1996), 1.
“Microsoft Proxy Server”, http://www/microsoft.com/proxy/guide/whatsnew.asp?a=2&B=1, no later than Aug. 4, 1998, 1-4.
“Microsoft Proxy Server Proxy vs. Border Manager”, http://microsoft.com/proxy/comparisons/bulletin.asp?A=4&B=4, (1998), 1-8.
“NetSafteV3.0 The Firewall Solution from Siemens Nixdorf”, http://www.swn.sni.be/NetSafe.htm, (May 31, 1997), 1-3.
“Netscpe Proxy Server Administrator's Guide Version 3.5 for Unix”, http://developer.netscape.com/docs/manuals/proxy/adminux//contents.htm, (1997).
“OWF Basics”, http://www.omnigroup.com/MailArchive/OmniWeb-dev/Current/0002.html, (1997), 1-2.
“r3 CypherClient”, http://www.r3.ch/products/cypher/cypherclient.html, (1998), 1-4.
“Submission: HTTPS v1.0 PAckage for OmniWeb 3x (Rhapsody)”, http://www.plsys.co.uk.MailingLists/uk-next-announce.msg00251.html, (Jan. 24, 1998).
“Virtual Private Networking: An Overview”,Microsofthttp://www.microsoft.com/workshop/sever/feature/vpnovw.asp, no later than Feb. 25, 1998.
“Webroute 1.3.0”, http://www-miaif.lip6.fr/willy/pub/webroute/v1.3/untared/CHANGES, (1997), 1-2.
“WedSTAR Security Toolkit: Troubleshooting”, http://www.starnine.com/support/ga/webstarssl/ssltroubleshoot.html, 1-2.
Elgamal, Taher, et al., “Securing Communications on the Intranet and Over the Internet”, http://www.netscape.com
ewsref/ref/128bit.html, (Jul. 1996),1-2.
Feibel, Werner, “Novell's Complete Encyclopedia of Networking”, (1995),625-630.
Ferguson, Paul , et al., “Waht is a VPN?”,Ferguson&Hutson, Revision 1,(Apr., 1998), 1-22.
Schneider, Bruce , “Applied Cryptography Protocols, Algorithms, and Source Code in C”, (1994),436-437.
Tannebaum, Andrew S., “Computer Networks”,3d Ed.,(1996),28-29, 396-417, 601-621, and 681-695.
Zhong, Qun , et al., “Security Control for COTS Components”,IEEE Computer,(Jun., 1998),67-73.
Ebrahimi Hashem M
Subramaniam Anand
Novell Inc.
Schwegman Lundberg Woessner & Kluth P.A.
Zand Kambiz
LandOfFree
Secure intranet access does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure intranet access, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure intranet access will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3385781