Information security – Access control or authentication – Network
Reexamination Certificate
2004-08-17
2008-09-23
Zand, Kambiz (Department: 2134)
Information security
Access control or authentication
Network
C380S280000
Reexamination Certificate
active
07428754
ABSTRACT:
A secure computing system is provided which utilizes a unique combination of Public Key Infrastructure (PKI), Virtual Private Networking (VPN), and server-based computing on thin client devices. The combination of technology and components provide secure computing through Defense-in-Depth using commercial off-the-shelf components.
REFERENCES:
patent: 5201049 (1993-04-01), Shorter
patent: 5850449 (1998-12-01), McManis
patent: 6032172 (2000-02-01), Kutcher
patent: 6263437 (2001-07-01), Liao et al.
patent: 6353891 (2002-03-01), Borella et al.
patent: 6374286 (2002-04-01), Gee et al.
patent: 6438690 (2002-08-01), Patel et al.
patent: 6446204 (2002-09-01), Pang et al.
patent: 6453352 (2002-09-01), Wagner et al.
patent: 6463460 (2002-10-01), Simonoff
patent: 6463534 (2002-10-01), Geiger et al.
patent: 6484258 (2002-11-01), Haverty
patent: 6499109 (2002-12-01), Balasubramaniam et al.
patent: 6499110 (2002-12-01), Moses et al.
patent: 6510513 (2003-01-01), Danieli
patent: 6523027 (2003-02-01), Underwood
patent: 6535227 (2003-03-01), Fox et al.
patent: 6539093 (2003-03-01), Asad et al.
patent: 6539480 (2003-03-01), Drews
patent: 6550012 (2003-04-01), Villa et al.
patent: 6553492 (2003-04-01), Hosoe
patent: 6567920 (2003-05-01), Cromer et al.
patent: 6571339 (2003-05-01), Danneels et al.
patent: 6594763 (2003-07-01), Madoukh
patent: 6922774 (2005-07-01), Meushaw et al.
patent: 7103783 (2006-09-01), Friedman et al.
patent: 7134123 (2006-11-01), Berry et al.
patent: 2002/0023214 (2002-02-01), Shear et al.
patent: 2002/0040434 (2002-04-01), Elliston et al.
patent: 2002/0069114 (2002-06-01), Charette et al.
patent: 2002/0095568 (2002-07-01), Norris et al.
patent: 2002/0135611 (2002-09-01), Deosaran et al.
patent: 2002/0169987 (2002-11-01), Meushaw et al.
patent: 2002/0174342 (2002-11-01), Freeman et al.
patent: 2003/0088780 (2003-05-01), Kuo et al.
patent: 2003/0200447 (2003-10-01), Sjoblom
patent: 2006/0171402 (2006-08-01), Moore et al.
Microsoft Windows 2000 Server, “Virtual Private Networking with Windows 2000: Deploying Remote Access VPNs,” Publication date: Jul. 2002.
“Administrator's Guide: Citrix ICA Win32 Clients, Version 7.0”, Citrix Systems, Inc., 2003.
Simpson, W., “The Point-to-Point Protocol (PPP)”, Network Working Group, RFC 1661, Jul. 1994.
Blunk, L., et al., “PPP Extensible Authentication Protocol (EAP)”, Network Working Group, RFC 2284, Mar. 1998.
Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, RFC 2401, Nov. 1998.
Harkins, D., et al., “The Internet Key Exchange (IKE)”, Network Working Group, RFC 2409, Nov. 1998.
Housley, R., et al., “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, Network Working Group, RFC 2459, Jan. 1999.
Townsley, W., et al., “Layer Two Tunneling Protocol “L2TP””, Network Working Group, RFC 2661, Aug. 1999.
Aboba, B., et al., “PPP EAP TLS Authentication Protocol”, Network Working Group, RFC 2716, Oct. 1999.
Rigney, C., et al., “Remote Authentication Dial In User Services (RADIUS)”, Network Working Group, RFC 2865, Jun. 2000.
Rigney, C., et al., “RADIUS Extensions”, Network Working Group, RFC 2869, Jun. 2000.
Srisuresh, P., “Secure Remote Access with L2TP”, Network Working Group, RFC 2888, Aug. 2000.
de Laat, C., et al., “Generic AAA Architecture”, Network Working Group, RFC 2903, Aug. 2000.
Vollbrecht, J., et al., “AAA Authorization Application Examples”, Network Working Group, RFC 2905, Aug. 2000.
Thomas, M., “Requirements for Kerberized Internet Negotiation of Keys”, Network Working Group, RFC 3129, Jun. 2001.
Patel, B., et al., “Securing L2TP using IPsec”, Network Working Group, RFC 3193, Nov. 2001.
“Microsoft Windows 2000 Server: Active Directory in Networks Segmented by Firewalls”, Microsoft Windows 2000 White Paper, Microsoft Corporation, Jul. 2002, Updated May 2003.
“Microsoft Windows 2000 Server: Distributed File System: A Logical View of Physical Storage”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: IP Security for Microsoft Windows 2000 Server”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: Internet Authentication Service for Windows 2000”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 2000.
“Microsoft Windows 2000 Server: Windows 2000 Kerberos Authentication”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: Smart Card Logon”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: Administrator's Guide to Microsoft L2TP/IPSec VPN Client”, Microsoft Windows 2000 Server Technical Article, Microsoft Corporation, 2002.
“Microsoft Windows 2000 Server: Virtual Private Networking with Windows 2000: Deploying Remote Access VPNs”, Microsoft Windows 2000 White Paper, Microsoft Corporation, Jul. 2002.
“Administrator's Guide: Citrix MetaFrame XP Server for Windows, With Feature Release 3”, Citrix Systmes, Inc., 2003.
“Connecting Remote Users Across the Internet Using L2TP”, Virtual Private Networking Technical Articles, Microsoft Corporation, http://www.microsoft.com/windows2000/techinfo/reskit/deploymentscenarios/scenarios/ras04—connectingremoteusersacrossinternetusingl21p.asp.
“Active Directory Overview”, Part of the Microsoft Active Directory Management Pack Technical Reference guide. Microsoft Corporation, http://www.microsoft.com/technet/prodtechnol/mom/maintain/admptech//admptr03.mspx.
Cross, D., et al., “Windows Server 2003 PKI Operations Guide”, Microsoft Corporation, http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/ws03pkog.mspx.
De Clercq, J., et al., “Windows 2000 Authentication”, Digital Press, Mar. 2001, pp. http://www.windowsitlibrary.com/Content/617/06/1.html through 7.html.
Corby Thomas E.
Epps Gerald Allen
Neumann William C.
Harriman Dant B Shaifer
Rosenberg , Klein & Lee
The Mitre Corporation
Zand Kambiz
LandOfFree
System for secure computing using defense-in-depth architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System for secure computing using defense-in-depth architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for secure computing using defense-in-depth architecture will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3982158