Self-contained and secured access to remote servers

Electrical computers and digital processing systems: support – Digital data processing system initialization or configuration – Loading initialization program

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S001000, C713S152000

Reexamination Certificate

active

06351810

ABSTRACT:

BACKGROUND OF THE INVENTION
Portions of the disclosure of this patent document contain material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office file or records, but otherwise reserves all copyright rights whatsoever. Sun, Sun Microsystems, the Sun logo, Solaris, SPARC, “Write Once, Run Anywhere”, Java, JavaOS, JavaStation and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries.
A. FIELD OF INVENTION
This invention relates to the field of computer systems, and more specifically, to a method and apparatus for remote access to a server, using a secured and self-contained environment.
With the advancement of the Internet technology, it is now common to access various electronic accounts or data banks from almost any location in the world, where a telephone line and a computer equipped with the appropriated connectivity software are available. Unfortunately, along with technological advancements there are also technological pitfalls that can create opportunities for security breaches in seemingly secure systems.
For example, certain airports and other facilities are equipped with public computer terminals that allow an individual to access the Internet, also known as the world wide web (WWW). Typically, all that is required to access the Internet via one of these terminals or any other computer system is an established Internet account and the required access information (i.e., account number, password, etc.). A persisting problem with such terminals is that they are susceptible to attack by information technology intruders (hackers). A computer program called a “browser” is typically installed on a terminal to provide access to various Internet sites. By manipulating certain default values in the browser's configuration, a hacker can acquire access to highly sensitive information entered by a victim user. Once the information is obtained a hacker can further use that information for illegitimate purposes.
Currently, there are no effective methods available to eliminate the danger of such intrusive activities. A method and/or apparatus is needed that can provide a secure environment for Internet access, especially in circumstances where covert manipulation or capture of electronic data is an undesirable possibility. The security issues associated with accessing remote computer networks can be better understood from a discussion of general networking principals and the Internet environment, set forth below.
B. BACKGROUND ART
Networks
In modem computing environments, multiple computers or workstations are linked together in a network to communicate between, and share data with, network users. A network also may include resources, such as printers, modems, file servers, etc., and may also include services, such as electronic mail, information transfer services, etc.
A network can be a small system that is physically connected by cables or via wireless communication (a local area network or “LAN”), or several separate networks can be connected together to form a larger network (a wide area network or “WAN”). Other types of networks include the Internet, tel-com networks, intranets, extranets, wireless networks, and other networks over which electronic, digital, and/or analog data may be communicated. An Intranet is an internal corporate or organizational network that uses many of the same communication protocols as the Internet. The terms Internet, World Wide Web (WWW), and Web as used herein include the Intranet as well as the Internet.
Internet
The Internet is a client/server system. A “client” is the computer that one uses to access the Internet. When a user logs onto the Internet using a client computer, the user may view “web pages” that are stored on a remote “server” computer. Information including data, files, and the web pages to be viewed are often transferred between the client and the server. One method for transferring the data may be more secure than another method depending on the operating software. This in part is related to the configuration of hardware and software components that form the operating environment for data communication. Some background on the various Internet components helps provide an understanding of these problems.
Browsing Software
The components of the WWW include browsing software, network links, and servers. The browsing software, or browser, is a user-friendly interface that simplifies access to the Internet. A browser allows a client to communicate a request without having to learn a complicated command syntax, for example. A browser typically provides a graphical user interface (GUI) for displaying information and receiving input. For example, a browser displays information to a client or user as pages or documents.
A language called Hypertext Markup Language (HTML) is used to define the format for a page to be displayed in the browser. A Web page is transmitted to a client as an HTML document. The browser executing at the client parses the document and produces and displays a Web Page based on the information in the HTML document. Consequently, the HTML document defines the Web Page that is rendered at runtime on the browser. Examples of browsers currently available include Netscape Navigator and Internet Explorer.
Network Communication/Data Transfer
A server may act as a repository of information on the WWW and is capable of processing a client request for the information. To enable the computers on a network including the WWW to communicate with each other, a set of standardized rules for exchanging the information between the computers, referred to as a “protocol”, is utilized. Transfer protocols generally specify the data format, timing, sequencing, and error checking of data transmissions. Numerous transfer protocols are used in the networking environment. For example, one example of a transfer protocol is the transmission control protocol/Internet protocol (“TCP/IP”). The TCP/IP transfer protocol is used on the Internet and on many multiplatform networks.
TCP/IP is sometimes used to refer to a suite of protocols that includes TCP/IP as well as other protocols such as the file transfer protocol (“FTP”), hypertext transfer protocol (“HTTP”), simple mail transport protocol (“SMPT”) and network terminal protocol (“TELNET”)).
The TCP transfer protocol is often utilized to transmit large amounts of information. The TCP protocol is responsible for breaking up a message to be transmitted into datagrams of manageable size, reassembling the datagrams at the receiving end, resending any datagrams that get lost (or are not transferred), and reordering the data (from the datagrams) in the appropriate order. A datagram is a unit of data or information (also referred to as a packet) that is transferred or passed across the Internet. A datagram contains a source and destination address along with the data.
The TCP/IP protocol interfaces with the lower-layer network infrastructure. Protocols such as HTTP, FTP, etc., provide an interface to the application layer and are referred to as application protocols. An application protocol defines a set of rules for communication between network applications. Hyper Text Transfer Protocol (HTTP) is an application protocol that is used for communication between an information server and a client browser on the WWW. HTTP has communication methods that identify operations to be performed by a network application (e.g. commands that allow clients to request data from a server and send information to the server).
Secured Data Transmission
A transfer protocol may also include security measures that ensure the uninterrupted and secure transfer of data from one network port to another by implementing encryption/decryption mechanisms on the sending and the receiving ends. For example, HTTPS is a secured information transfer protocol having a Secure Socket Layer

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Self-contained and secured access to remote servers does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Self-contained and secured access to remote servers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Self-contained and secured access to remote servers will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2973383

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.