Information security – Access control or authentication – Network
Reexamination Certificate
2004-02-23
2011-11-15
Abrishamkar, Kaveh (Department: 2431)
Information security
Access control or authentication
Network
C713S153000, C713S154000
Reexamination Certificate
active
08060926
ABSTRACT:
Techniques are provided for securely managing and accelerating the delivery of data associated with remote sites. A client desires to establish secure communications with a remote site. Requests made from the client to the remote site are intercepted or forwarded to a proxy, which locates a local managing service associated with handling the requests. The local managing service acts as an intermediary between the client and the remote site and communicates securely with the client. Data associated with the client's requests is at least partially cached by the local managing service for purposes of accelerating the delivery of that data to the client.
REFERENCES:
patent: 5550984 (1996-08-01), Gelb
patent: 5553239 (1996-09-01), Heath et al.
patent: 5657390 (1997-08-01), Elgamal et al.
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5768271 (1998-06-01), Seld et al.
patent: 5805803 (1998-09-01), Birrell et al.
patent: 5825890 (1998-10-01), Elgalmal et al.
patent: 5889996 (1999-03-01), Adams
patent: 5913025 (1999-06-01), Higley et al.
patent: 5963915 (1999-10-01), Kirsch
patent: 5991810 (1999-11-01), Shapiro et al.
patent: 6003084 (1999-12-01), Green et al.
patent: 6029245 (2000-02-01), Scanlan
patent: 6065120 (2000-05-01), Laursen et al.
patent: 6112228 (2000-08-01), Earl et al.
patent: 6128644 (2000-10-01), Nozaki
patent: 6148405 (2000-11-01), Liao et al.
patent: 6192477 (2001-02-01), Corthell
patent: 6199165 (2001-03-01), Grunner
patent: 6233577 (2001-05-01), Ramasubramani et al.
patent: 6233608 (2001-05-01), Laursen et al.
patent: 6263437 (2001-07-01), Liao et al.
patent: 6434687 (2002-08-01), Huppenthal
patent: 6513061 (2003-01-01), Ebata et al.
patent: 6584567 (2003-06-01), Bellwood et al.
patent: 6640302 (2003-10-01), Subramaniam et al.
patent: 6643701 (2003-11-01), Aziz et al.
patent: 6665721 (2003-12-01), Hind et al.
patent: 6732269 (2004-05-01), Baskey et al.
patent: 6745229 (2004-06-01), Gobin et al.
patent: 6950936 (2005-09-01), Subramaniam et al.
patent: 7093121 (2006-08-01), Barton et al.
patent: 7137143 (2006-11-01), Chawla et al.
patent: 7430757 (2008-09-01), Chari et al.
patent: 7552223 (2009-06-01), Ackaouy et al.
patent: 7904951 (2011-03-01), Ebrahimi et al.
patent: 2002/0056033 (2002-05-01), Huppenthal
patent: 2002/0199098 (2002-12-01), Davis
patent: 2003/0167403 (2003-09-01), Mccurley et al.
patent: 2004/0015725 (2004-01-01), Boneh et al.
patent: WO-02102020 (2002-12-01), None
“A New Management and Security Architechture for Extranets”, http://www.aventail.com/index.phtml/solutions/white—papers/aec—wp.phtml, (1196-1999), 1-14.
“CMS Proxy Server—White Paper”. http://csm.alcyonis.fr/proxies.htm, (1995-1998),1-13.
“CSM Proxy Server, the Ultimate Gateway to the Internetl ”, http://www.csm-usa.com/white/gateway.htm, no later than Aug. 4, 1998,1-5.
“How the Proxy Works”, http://gopher.texshare.utexas.edu/Current/AccessMeet/accessproxy/how.html, (Jul. 22, 1998),1-2.
“Info needed to write proxy”, http://www.netsys.com/firewalls-9604/0406.html, (Apr. 11, 1996), 1.
“Microsoft Proxy Server”, http://www/microsoft.com/proxy/guide/whatsnew.asp?a=2&B=1, no later than Aug. 4, 1998,1-4.
“Microsoft Proxy Server Proxy vs. Border Manager”, http://microsoft.com/proxy.comparisons/bulletin.asp?A=4&B=4, (1998),1-8.
“NetSafteV3.0 The Firewall Solution from Siemens Nixdorf”, http://www.swn.sni.be/NetSafe.htm, (May 31, 1997),1-3.
“Netscpe Proxy Server Administrator's Guide Version 3.5 for Unix”, http://developer.netscape.com/docs/manuals/proxy/adminux//contents.htm, (1997).
“OWF Basics”, http://www.omnigroup.com/MailArchive/OmniWeb-dev/Current/0002.html, (1997),1-2.
“r3 CypherClient”, http://www.r3.ch/products/cypher/cypherclient.html, (1998),1-4.
“Submission: HTTPS v1.0 PAckage for OmniWeb 3x (Rhapsody)”, http://www.plsys.co.uk.MailingLists/uk-next-announce.msg00251.html, (Jan. 24, 1998).
“Virtual Private Networking: An Overview” Microsoft http://www.microsoft.com/workshop/sever/feature/vpnovw.asp, no later than Feb. 25, 1998.
“Webroute 1.3.0”, htto://www-miaif.lip6.fr/willy/pub/webroute/v1.3/untared/CHANGES, (1997),1-2.
“WebSTAR Security Toolkit: Troubleshooting”, http://www.stamine.com/support/qa/webstarssl/ssltroubleshoot.html, 1-2.
Elgamal, Taher , at al., “Securing Communications on the Intranet and Over the Internet”, http://www.netscape.com
ewsref/ref/128bit.html, Jul. 1996),1-12.
Feibel, Werner , “Novell's Complete Encyclopedia of Networking” San Jose, CA : Alameda, CA ;Novell Press ; Sybex, (1995),625-630.
Ferguson, Paul , et al., “What is a VPN?”,Ferguson&Hutson, Revision 1, (Apr. 1998),1-22.
Schneider, Bruce , “Applied Cryptography Protocols, Algorithms, and Source Code in C”, New York ;Wiley, (1994),436-437.
Tanenbaum, Andrew S., “Computer Networks”, Upper Saddle River, N.J. :Prentice Hall PTR, 3rd Edition, (1996),28-29, 396-417, 601-621, and 681-695.
Zhong, Qun , et al., “Security Control for COTS Components”,Computer, 31(6), (Jun. 1998),67-73.
Appeal, S. , “[SSL-Talk List FAQ] Secure Sockets Layer Discussion List FAQ v1.1.1”, http://www.faqs.org/faqs/computer-security/ssl-talk-faq/, (Nov. 16, 1998),22 pgs.
Cohen, E. , et al., “Improving End-to-End Performance of the Web Using Server Volumes and Proxy Filters”,Proceedings of the ACM SIGCOMM, Conference on Applications, Technologies, architectures, and protocols for computer communication,28(4), (1998),12 pgs.
Dierks, T. , “Modifications to the SSL protocol for TLS <draft-ieft-tis-ssl-mods-00.txt>”, http://www3.tools.ietf.org/html/draft-ietf-tls-ssl-mods-00, (Nov. 26, 1996),4 pgs.
Dierks, T. , et al., “RFC2246: The TLS Protocol Version 1.0”,The Internet Society, Network Working Group,(1999),1-80.
Elgamal, T. , “The Secure Sockets Layer Protocol (SSL)”, http://www3.ietf.org/proceedings/95apr/sec/cat.elgamal.slides.html, (Apr. 1995), 4 pgs.
Loutonen, A. , “Tunneling TCP based protocols through Web proxy servers”, http://tools.ietf.org/id/draft-loutonen-web-proxy-tunneling-01.txt, (Aug. 1998),9 pgs.
Rabinovich, M., et al., “Chapter 7 & Chapter 8”, Web Caching and Replication, Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, (2001), 60-92.
Ackerman Mark D.
Ebrahimi Hashem Mohammad
Oyler Mel J
Abrishamkar Kaveh
Novell Inc.
Schwegman Lundberg & Woessner, P.A.
LandOfFree
Techniques for securely managing and accelerating data delivery does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Techniques for securely managing and accelerating data delivery, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for securely managing and accelerating data delivery will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4272045