Techniques for managing secure communications

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S011000, C726S013000, C726S014000, C726S022000, C726S026000, C027S028000, C713S154000, C713S167000, C709S217000, C709S218000, C709S219000, C709S246000

Reexamination Certificate

active

08065720

ABSTRACT:
Methods and systems for managing secure communications are provided. An external client establishes secure communications with a secure site. During the secure session, the external client attempts to access potentially insecure references. These potentially insecure references are inspected before being made available to the external client. In some instances, the potentially insecure references are translated into secure references, which suppress normally occurring security warning messages that are issued to the external client. In other instances, the potentially insecure references are processed by a proxy on behalf of the external client and appear to the external client to occur within the secure session.

REFERENCES:
patent: 5550984 (1996-08-01), Gelb
patent: 5553239 (1996-09-01), Heath et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5768271 (1998-06-01), Seid et al.
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5825890 (1998-10-01), Elgamal et al.
patent: 5889996 (1999-03-01), Adams
patent: 5913025 (1999-06-01), Higley et al.
patent: 5913825 (1999-06-01), Watanabe et al.
patent: 5963915 (1999-10-01), Kirsch
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6003084 (1999-12-01), Green et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6081900 (2000-06-01), Subramaniam et al.
patent: 6128644 (2000-10-01), Nozaki
patent: 6148405 (2000-11-01), Liao et al.
patent: 6192477 (2001-02-01), Corthell
patent: 6199165 (2001-03-01), Grunner
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6233608 (2001-05-01), Laursen et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6324648 (2001-11-01), Grantges, Jr.
patent: 6434687 (2002-08-01), Huppenthal
patent: 6473800 (2002-10-01), Jerger et al.
patent: 6640302 (2003-10-01), Subramaniam et al.
patent: 6732269 (2004-05-01), Baskey et al.
patent: 6745229 (2004-06-01), Gobin et al.
patent: 6950936 (2005-09-01), Subramaniam et al.
patent: 6961759 (2005-11-01), Brown et al.
patent: 7007299 (2006-02-01), Ioele et al.
patent: 7093121 (2006-08-01), Barton et al.
patent: 7370351 (2008-05-01), Ramachandran et al.
patent: 7430757 (2008-09-01), Chari et al.
patent: 7552223 (2009-06-01), Ackaouy et al.
patent: 7904951 (2011-03-01), Hashem et al.
patent: 2002/0056033 (2002-05-01), Huppenthal
patent: 2002/0068554 (2002-06-01), Dusse
patent: 2003/0061387 (2003-03-01), Brown et al.
patent: 2003/0131259 (2003-07-01), Barton et al.
patent: 2003/0167403 (2003-09-01), McCurley et al.
patent: 2003/0208570 (2003-11-01), Lapidous
patent: 2004/0073629 (2004-04-01), Bazot et al.
Chris Nettleton, “GCC-ERC32 User's Guide C/C++ Compilation System for Spacecraft Microprocessors; 1.6. Options to Request or Suppress Warnings”, 1999, obtained from http://www.xgc.com/manuals/gcc-erc32-ug/p2node8.html.
“A New Management and Security Architechture for Extranets”, http://www.aventail.com/index.phtml/solutions/white—papers/aec—wp.phtml, (1196-1999), 1-14.
“CMS Proxy Server—White Paper”, http://csm.alcyonis.fr/proxies.htm, (1995-1998), 1-13.
“CSM Proxy Server, the Ultimate Gateway to the Internet!”, http://www.csm-usa.com/white/gateway.htm, no later than Aug. 4, 1998, 1-5.
“How the Proxy Works”, http://gopher.texshare.utexas.edu/Current/AccessMeet/accessproxy/how.html, (Jul. 22, 1998), 1-2.
“Info needed to write https proxy”, http://www.netsys.com/firewalls-9604/0406.html, (Apr. 11, 1996), 1.
“Microsoft Proxy Server”, http://www/microsoft.com/proxy/guide/whatsnew.asp?a=2&B=1, no later than Aug. 4, 1998, 1-4.
“Microsoft Proxy Server Proxy vs. Border Manager”, http://microsoft.com/proxy/comparisons/bulletin.asp?A=4&B=4, (1998), 1-8.
“NetSafteV3.0 The Firewall Solution from Siemens Nixdorf”, http://www.swn.sni.be/NetSafe.htm, (May 31, 1997), 1-3.
“Netscpe Proxy Server Administrator's Guide Version 3.5 for Unix”, http://developer.netscape.com/docs/manuals/proxy/adminux//contents.htm, (1997).
“OWF Basics”, http://www.omnigroup.com/MailArchive/OmniWeb-dev/Current/0002.html, (1997),1-2.
“r3 CypherClient”, http://www.r3.ch/products/cypher/cypherclient.html, (1998), 1-4.
“Submission: HTTPS v1.0 PAckage for OmniWeb 3x (Rhapsody)”, http://www.plsys.co.uk.MailingLists/uk-next-announce.msg00251.html, (Jan. 24, 1998).
“Virtual Private Networking: An Overview”,Microsofthttp://www.microsoft.com/workshop/sever/feature/vpnovw.asp, no later than Feb. 25, 1998.
“Webroute 1.3.0”, http://www-miaif.lip6.fr/willy/pub/webroute/v1.3/untared/CHANGES, (1997), 1-2.
“WebSTAR Security Toolkit: Troubleshooting”, http://www.starnine.com/support/qa/webstarssl/ssltroubleshoot.html, 1-2.
Elgamal, Taher , et al., “Securing Communications on the Intranet and Over the Internet”, http://www.netscape.com
ewsref/ref/128bit.html, (Jul. 1996), 1-12.
Feibel, Werner, “Novell's Complete Encyclopedia of Networking”, San Jose, CA : Alameda, CA : Novell Press ; Sybex, (1995),625-630.
Ferguson, Paul , et al., “What is a VPN?”,Ferguson&Hutson, Revision 1, (Apr. 1998), 1-22.
Schneider, Bruce , “Applied Cryptography Protocols, Algorithms, and Source Code in C”,New York : Wiley, (1994),436-437.
Tanenbaum, Andrew S., “Computer Networks”, Upper Saddle River, N.J. :Prentice Hall PTR, 3d Edition, (1996),28-29, 396-417, 601-621, and 681-695.
Zhong, Qun , et al., “Security Control for COTS Components”,Computer, 31(6), (Jun. 1998),67-73.
“U.S. Appl. No. 09/493,506 Advisory Action mailed Oct. 25, 2002”, 3 pgs.
“U.S. Appl. No. 09/493,506 Advisory Action mailed Nov. 30, 2001”, 3 pgs.
“U.S. Appl. No. 09/493,506 Final Office Action mailed Jan. 30, 2001”, 7 pgs.
“U.S. Appl. No. 09/493,506 Final Office Action mailed Mar. 18, 2003”, 7 pgs.
“U.S. Appl. No. 09/493,506 Final Office Action mailed Aug. 12, 2002”, 9 pgs.
“U.S. Appl. No. 09/493,506 Non Final Office Action mailed Mar. 26, 2002”, 8 pgs.
“U.S. Appl. No. 09/493,506 Non Final Office Action mailed Sep. 15, 2000”, 8 pgs.
“U.S. Appl. No. 09/493,506 Non Final Office Action mailed Nov. 26, 2002”, 6 pgs.
“U.S. Appl. No. 09/493,506 Notice of Allowance mailed Jun. 5, 2003”, 8 pgs.
“U.S. Appl. No. 09/493,506, filed Feb. 26, 2003 to Non Final Office Action mailed Nov. 26, 2002”, 4 pgs.
“U.S. Appl. No. 09/493,506, filed Apr. 20, 2001 to Final Office Action mailed Jan. 30, 2001”, 6 pgs.
“U.S. Appl. No. 09/493,506, filed May 16, 2003 to Final Office Action mailed Mar. 18, 2003”, 4 pgs.
“U.S. Appl. No. 09/493,506, filed Jun. 26, 2002 to Non Final Office Action mailed Mar. 26, 2002”, 14 pgs.
“U.S. Appl. No. 09/493,506, filed Oct. 15, 2002 to Final Office Action mailed Aug. 12, 2002”, 5 pgs.
“U.S. Appl. No. 09/493,506, filed Nov. 7, 2000 to Non Final Office Action mailed Sep. 15, 2000”, 7 pgs.
“U.S. Appl. No. 09/493,506, filed Dec. 10, 2001 to Advisory Action mailed Nov. 30, 2001”, 9 pgs.
“U.S. Appl. No. 10/650,211 Non Final Office Action mailed Sep. 8, 2004”, 20 pgs.
“U.S. Appl. No. 10/650,211 Notice of Allowance mailed May 2, 2005”, 11 pgs.
“U.S. Appl. No. 10/650,211, filed Dec. 3, 2004 to Non Final Office Action mailed Sep. 8, 2004”, 9 pgs.
“U.S. Appl. No. 10/814,983 Non Final Office Action mailed Aug. 22, 2007”, OARN,15 pgs.
Cohen, E. , et al., “Improving End-to-End Performance of the Web Using Server Volumes and Proxy Filters”,Proceedings of the ACM SIGCOMM, Conference on Applications, Technologies, architectures, and protocols for computer communication,28(4), (1998).
Dierks, T. , et al., “RFC2246:

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques for managing secure communications does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques for managing secure communications, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for managing secure communications will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4311759

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.