System for secure computing using defense-in-depth architecture

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S280000

Reexamination Certificate

active

07428754

ABSTRACT:
A secure computing system is provided which utilizes a unique combination of Public Key Infrastructure (PKI), Virtual Private Networking (VPN), and server-based computing on thin client devices. The combination of technology and components provide secure computing through Defense-in-Depth using commercial off-the-shelf components.

REFERENCES:
patent: 5201049 (1993-04-01), Shorter
patent: 5850449 (1998-12-01), McManis
patent: 6032172 (2000-02-01), Kutcher
patent: 6263437 (2001-07-01), Liao et al.
patent: 6353891 (2002-03-01), Borella et al.
patent: 6374286 (2002-04-01), Gee et al.
patent: 6438690 (2002-08-01), Patel et al.
patent: 6446204 (2002-09-01), Pang et al.
patent: 6453352 (2002-09-01), Wagner et al.
patent: 6463460 (2002-10-01), Simonoff
patent: 6463534 (2002-10-01), Geiger et al.
patent: 6484258 (2002-11-01), Haverty
patent: 6499109 (2002-12-01), Balasubramaniam et al.
patent: 6499110 (2002-12-01), Moses et al.
patent: 6510513 (2003-01-01), Danieli
patent: 6523027 (2003-02-01), Underwood
patent: 6535227 (2003-03-01), Fox et al.
patent: 6539093 (2003-03-01), Asad et al.
patent: 6539480 (2003-03-01), Drews
patent: 6550012 (2003-04-01), Villa et al.
patent: 6553492 (2003-04-01), Hosoe
patent: 6567920 (2003-05-01), Cromer et al.
patent: 6571339 (2003-05-01), Danneels et al.
patent: 6594763 (2003-07-01), Madoukh
patent: 6922774 (2005-07-01), Meushaw et al.
patent: 7103783 (2006-09-01), Friedman et al.
patent: 7134123 (2006-11-01), Berry et al.
patent: 2002/0023214 (2002-02-01), Shear et al.
patent: 2002/0040434 (2002-04-01), Elliston et al.
patent: 2002/0069114 (2002-06-01), Charette et al.
patent: 2002/0095568 (2002-07-01), Norris et al.
patent: 2002/0135611 (2002-09-01), Deosaran et al.
patent: 2002/0169987 (2002-11-01), Meushaw et al.
patent: 2002/0174342 (2002-11-01), Freeman et al.
patent: 2003/0088780 (2003-05-01), Kuo et al.
patent: 2003/0200447 (2003-10-01), Sjoblom
patent: 2006/0171402 (2006-08-01), Moore et al.
Microsoft Windows 2000 Server, “Virtual Private Networking with Windows 2000: Deploying Remote Access VPNs,” Publication date: Jul. 2002.
“Administrator's Guide: Citrix ICA Win32 Clients, Version 7.0”, Citrix Systems, Inc., 2003.
Simpson, W., “The Point-to-Point Protocol (PPP)”, Network Working Group, RFC 1661, Jul. 1994.
Blunk, L., et al., “PPP Extensible Authentication Protocol (EAP)”, Network Working Group, RFC 2284, Mar. 1998.
Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, RFC 2401, Nov. 1998.
Harkins, D., et al., “The Internet Key Exchange (IKE)”, Network Working Group, RFC 2409, Nov. 1998.
Housley, R., et al., “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, Network Working Group, RFC 2459, Jan. 1999.
Townsley, W., et al., “Layer Two Tunneling Protocol “L2TP””, Network Working Group, RFC 2661, Aug. 1999.
Aboba, B., et al., “PPP EAP TLS Authentication Protocol”, Network Working Group, RFC 2716, Oct. 1999.
Rigney, C., et al., “Remote Authentication Dial In User Services (RADIUS)”, Network Working Group, RFC 2865, Jun. 2000.
Rigney, C., et al., “RADIUS Extensions”, Network Working Group, RFC 2869, Jun. 2000.
Srisuresh, P., “Secure Remote Access with L2TP”, Network Working Group, RFC 2888, Aug. 2000.
de Laat, C., et al., “Generic AAA Architecture”, Network Working Group, RFC 2903, Aug. 2000.
Vollbrecht, J., et al., “AAA Authorization Application Examples”, Network Working Group, RFC 2905, Aug. 2000.
Thomas, M., “Requirements for Kerberized Internet Negotiation of Keys”, Network Working Group, RFC 3129, Jun. 2001.
Patel, B., et al., “Securing L2TP using IPsec”, Network Working Group, RFC 3193, Nov. 2001.
“Microsoft Windows 2000 Server: Active Directory in Networks Segmented by Firewalls”, Microsoft Windows 2000 White Paper, Microsoft Corporation, Jul. 2002, Updated May 2003.
“Microsoft Windows 2000 Server: Distributed File System: A Logical View of Physical Storage”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: IP Security for Microsoft Windows 2000 Server”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: Internet Authentication Service for Windows 2000”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 2000.
“Microsoft Windows 2000 Server: Windows 2000 Kerberos Authentication”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: Smart Card Logon”, Microsoft Windows 2000 White Paper, Microsoft Corporation, 1999.
“Microsoft Windows 2000 Server: Administrator's Guide to Microsoft L2TP/IPSec VPN Client”, Microsoft Windows 2000 Server Technical Article, Microsoft Corporation, 2002.
“Microsoft Windows 2000 Server: Virtual Private Networking with Windows 2000: Deploying Remote Access VPNs”, Microsoft Windows 2000 White Paper, Microsoft Corporation, Jul. 2002.
“Administrator's Guide: Citrix MetaFrame XP Server for Windows, With Feature Release 3”, Citrix Systmes, Inc., 2003.
“Connecting Remote Users Across the Internet Using L2TP”, Virtual Private Networking Technical Articles, Microsoft Corporation, http://www.microsoft.com/windows2000/techinfo/reskit/deploymentscenarios/scenarios/ras04—connectingremoteusersacrossinternetusingl21p.asp.
“Active Directory Overview”, Part of the Microsoft Active Directory Management Pack Technical Reference guide. Microsoft Corporation, http://www.microsoft.com/technet/prodtechnol/mom/maintain/admptech//admptr03.mspx.
Cross, D., et al., “Windows Server 2003 PKI Operations Guide”, Microsoft Corporation, http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/ws03pkog.mspx.
De Clercq, J., et al., “Windows 2000 Authentication”, Digital Press, Mar. 2001, pp. http://www.windowsitlibrary.com/Content/617/06/1.html through 7.html.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System for secure computing using defense-in-depth architecture does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System for secure computing using defense-in-depth architecture, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for secure computing using defense-in-depth architecture will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3982158

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.