Techniques for securely managing and accelerating data delivery

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000, C713S154000

Reexamination Certificate

active

08060926

ABSTRACT:
Techniques are provided for securely managing and accelerating the delivery of data associated with remote sites. A client desires to establish secure communications with a remote site. Requests made from the client to the remote site are intercepted or forwarded to a proxy, which locates a local managing service associated with handling the requests. The local managing service acts as an intermediary between the client and the remote site and communicates securely with the client. Data associated with the client's requests is at least partially cached by the local managing service for purposes of accelerating the delivery of that data to the client.

REFERENCES:
patent: 5550984 (1996-08-01), Gelb
patent: 5553239 (1996-09-01), Heath et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5768271 (1998-06-01), Seld et al.
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5825890 (1998-10-01), Elgalmal et al.
patent: 5889996 (1999-03-01), Adams
patent: 5913025 (1999-06-01), Higley et al.
patent: 5963915 (1999-10-01), Kirsch
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6003084 (1999-12-01), Green et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6112228 (2000-08-01), Earl et al.
patent: 6128644 (2000-10-01), Nozaki
patent: 6148405 (2000-11-01), Liao et al.
patent: 6192477 (2001-02-01), Corthell
patent: 6199165 (2001-03-01), Grunner
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6233608 (2001-05-01), Laursen et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6434687 (2002-08-01), Huppenthal
patent: 6513061 (2003-01-01), Ebata et al.
patent: 6584567 (2003-06-01), Bellwood et al.
patent: 6640302 (2003-10-01), Subramaniam et al.
patent: 6643701 (2003-11-01), Aziz et al.
patent: 6665721 (2003-12-01), Hind et al.
patent: 6732269 (2004-05-01), Baskey et al.
patent: 6745229 (2004-06-01), Gobin et al.
patent: 6950936 (2005-09-01), Subramaniam et al.
patent: 7093121 (2006-08-01), Barton et al.
patent: 7137143 (2006-11-01), Chawla et al.
patent: 7430757 (2008-09-01), Chari et al.
patent: 7552223 (2009-06-01), Ackaouy et al.
patent: 7904951 (2011-03-01), Ebrahimi et al.
patent: 2002/0056033 (2002-05-01), Huppenthal
patent: 2002/0199098 (2002-12-01), Davis
patent: 2003/0167403 (2003-09-01), Mccurley et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: WO-02102020 (2002-12-01), None
“A New Management and Security Architechture for Extranets”, http://www.aventail.com/index.phtml/solutions/white—papers/aec—wp.phtml, (1196-1999), 1-14.
“CMS Proxy Server—White Paper”. http://csm.alcyonis.fr/proxies.htm, (1995-1998),1-13.
“CSM Proxy Server, the Ultimate Gateway to the Internetl ”, http://www.csm-usa.com/white/gateway.htm, no later than Aug. 4, 1998,1-5.
“How the Proxy Works”, http://gopher.texshare.utexas.edu/Current/AccessMeet/accessproxy/how.html, (Jul. 22, 1998),1-2.
“Info needed to write proxy”, http://www.netsys.com/firewalls-9604/0406.html, (Apr. 11, 1996), 1.
“Microsoft Proxy Server”, http://www/microsoft.com/proxy/guide/whatsnew.asp?a=2&B=1, no later than Aug. 4, 1998,1-4.
“Microsoft Proxy Server Proxy vs. Border Manager”, http://microsoft.com/proxy.comparisons/bulletin.asp?A=4&B=4, (1998),1-8.
“NetSafteV3.0 The Firewall Solution from Siemens Nixdorf”, http://www.swn.sni.be/NetSafe.htm, (May 31, 1997),1-3.
“Netscpe Proxy Server Administrator's Guide Version 3.5 for Unix”, http://developer.netscape.com/docs/manuals/proxy/adminux//contents.htm, (1997).
“OWF Basics”, http://www.omnigroup.com/MailArchive/OmniWeb-dev/Current/0002.html, (1997),1-2.
“r3 CypherClient”, http://www.r3.ch/products/cypher/cypherclient.html, (1998),1-4.
“Submission: HTTPS v1.0 PAckage for OmniWeb 3x (Rhapsody)”, http://www.plsys.co.uk.MailingLists/uk-next-announce.msg00251.html, (Jan. 24, 1998).
“Virtual Private Networking: An Overview” Microsoft http://www.microsoft.com/workshop/sever/feature/vpnovw.asp, no later than Feb. 25, 1998.
“Webroute 1.3.0”, htto://www-miaif.lip6.fr/willy/pub/webroute/v1.3/untared/CHANGES, (1997),1-2.
“WebSTAR Security Toolkit: Troubleshooting”, http://www.stamine.com/support/qa/webstarssl/ssltroubleshoot.html, 1-2.
Elgamal, Taher , at al., “Securing Communications on the Intranet and Over the Internet”, http://www.netscape.com
ewsref/ref/128bit.html, Jul. 1996),1-12.
Feibel, Werner , “Novell's Complete Encyclopedia of Networking” San Jose, CA : Alameda, CA ;Novell Press ; Sybex, (1995),625-630.
Ferguson, Paul , et al., “What is a VPN?”,Ferguson&Hutson, Revision 1, (Apr. 1998),1-22.
Schneider, Bruce , “Applied Cryptography Protocols, Algorithms, and Source Code in C”, New York ;Wiley, (1994),436-437.
Tanenbaum, Andrew S., “Computer Networks”, Upper Saddle River, N.J. :Prentice Hall PTR, 3rd Edition, (1996),28-29, 396-417, 601-621, and 681-695.
Zhong, Qun , et al., “Security Control for COTS Components”,Computer, 31(6), (Jun. 1998),67-73.
Appeal, S. , “[SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1”, http://www.faqs.org/faqs/computer-security/ssl-talk-faq/, (Nov. 16, 1998),22 pgs.
Cohen, E. , et al., “Improving End-to-End Performance of the Web Using Server Volumes and Proxy Filters”,Proceedings of the ACM SIGCOMM, Conference on Applications, Technologies, architectures, and protocols for computer communication,28(4), (1998),12 pgs.
Dierks, T. , “Modifications to the SSL protocol for TLS <draft-ieft-tis-ssl-mods-00.txt>”, http://www3.tools.ietf.org/html/draft-ietf-tls-ssl-mods-00, (Nov. 26, 1996),4 pgs.
Dierks, T. , et al., “RFC2246: The TLS Protocol Version 1.0”,The Internet Society, Network Working Group,(1999),1-80.
Elgamal, T. , “The Secure Sockets Layer Protocol (SSL)”, http://www3.ietf.org/proceedings/95apr/sec/cat.elgamal.slides.html, (Apr. 1995), 4 pgs.
Loutonen, A. , “Tunneling TCP based protocols through Web proxy servers”, http://tools.ietf.org/id/draft-loutonen-web-proxy-tunneling-01.txt, (Aug. 1998),9 pgs.
Rabinovich, M., et al., “Chapter 7 & Chapter 8”, Web Caching and Replication, Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, (2001), 60-92.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques for securely managing and accelerating data delivery does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques for securely managing and accelerating data delivery, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for securely managing and accelerating data delivery will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4272045

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.