Movatterモバイル変換


[0]ホーム

URL:


US20050050317A1 - A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel - Google Patents

A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
Download PDF

Info

Publication number
US20050050317A1
US20050050317A1US10/709,806US70980604AUS2005050317A1US 20050050317 A1US20050050317 A1US 20050050317A1US 70980604 AUS70980604 AUS 70980604AUS 2005050317 A1US2005050317 A1US 2005050317A1
Authority
US
United States
Prior art keywords
client
application
ticket
server
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/709,806
Inventor
Andre Kramer
William Harwood
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US10/709,806priorityCriticalpatent/US20050050317A1/en
Publication of US20050050317A1publicationCriticalpatent/US20050050317A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention features a system and method for establishing a secure communication channel between a client and an application server. In one embodiment, a ticket service generates a ticket having an identifier and a session key. A communications device obtains the ticket from the ticket service and transmits the ticket to a client over a secure communication channel. The client transmits the identifier of the ticket to an application server over an application communication channel. The application server then obtains a copy of the session key of the ticket from the ticket service. Communications exchanged between the client and the application server over the application communication channel are then encrypted using the session key to establish the application communication channel as a secure communication channel.

Description

Claims (90)

1. A method for establishing a secure communication channel between a client and an application server, the method comprising the steps of:
(a) obtaining, by a web server, a MIME type document and a ticket associated with a client, the MIME type document comprising a client application program, the ticket having an identifier and a session key;
(b) receiving, by a web browser, the MIME type document and the ticket from the web server;
(c) invoking, by the web browser, the received client application program;
(d) establishing an application communication channel between the client and the application server;
(e) transmitting, by the client application program, the identifier from the ticket to the application server over the application communication channel;
(f) obtaining, by the application server, a copy of the session key from the web server using the identifier; and
(g) encrypting communications between the client application program and the application server over the application communication channel using the session key.
17. A client system for establishing a secure communication channel with an application server, the client system comprising:
a web browser associated with a client;
a web server in communication with the web browser over a web communication channel, the web server obtaining a MIME type document and a ticket associated with the client, the MIME type document comprising a client application program, the ticket having an identifier and a session key;
the web browser receiving, from the web server, the ticket and the MIME type document,
the web browser invoking the received client application program;
an application server, in communication with the client over an application communication channel, receiving the identifier from the client application program, and the application server, in communication with the web server, obtaining a copy of the session key by using the identifier; and
the application server and the client application program encrypting communications over the application communication channel using the session key.
48. A client system for establishing a secure communication channel with a client, the client system comprising:
a web browser in communication with a web server over a web communication channel, the web browser receiving, from the web server, a MIME type document and a ticket, the MIME type document comprising a client application program, the ticket having an identifier and a session key;
a client application program invoked by the web browser; and
the client application program establishing an application communication channel with the application server, the client application program transmitting the identifier over the application communication channel, and the client application program encrypting communications to the application server over the application communication channel using the session key.
61. A method for establishing a secure communication channel with a client, the method comprising the steps of:
(a) obtaining, by a web server, a MIME type document and a ticket associated with a client, the MIME type document comprising a client application program, the ticket having an identifier and a session key;
(b) transmitting, by the web server, the MIME type document and the ticket to a web browser over a web communication channel;
(c) invoking, by the web browser, the received client application program;
(d) establishing an application communication channel with the client;
(e) receiving, from the client application program, the identifier from the ticket over the application communication channel;
(f) obtaining a copy of the session key from the web server using the identifier; and
(g) encrypting communications to the client application program over the application communication channel using the session key.
US10/709,8062000-11-032004-05-28A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channelAbandonedUS20050050317A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/709,806US20050050317A1 (en)2000-11-032004-05-28A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US09/706,117US6986040B1 (en)2000-11-032000-11-03System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US10/709,806US20050050317A1 (en)2000-11-032004-05-28A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/706,117ContinuationUS6986040B1 (en)2000-11-032000-11-03System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Publications (1)

Publication NumberPublication Date
US20050050317A1true US20050050317A1 (en)2005-03-03

Family

ID=24836276

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US09/706,117Expired - LifetimeUS6986040B1 (en)2000-11-032000-11-03System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US10/709,806AbandonedUS20050050317A1 (en)2000-11-032004-05-28A system and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/706,117Expired - LifetimeUS6986040B1 (en)2000-11-032000-11-03System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Country Status (10)

CountryLink
US (2)US6986040B1 (en)
EP (1)EP1332599B1 (en)
JP (1)JP2004531914A (en)
KR (1)KR100783208B1 (en)
CN (1)CN100583871C (en)
AU (2)AU3514902A (en)
CA (1)CA2427699C (en)
IL (2)IL155698A0 (en)
RU (1)RU2279186C2 (en)
WO (1)WO2002044858A2 (en)

Cited By (55)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040199761A1 (en)*2003-04-012004-10-07Philips Andrew B.Method and apparatus for digitally signing electronic mail that originates from a browser
US20050120214A1 (en)*2003-12-022005-06-02Microsoft CorporationSystems and methods for enhancing security of communication over a public network
US20060029063A1 (en)*2004-07-232006-02-09Citrix Systems, Inc.A method and systems for routing packets from a gateway to an endpoint
US20060037072A1 (en)*2004-07-232006-02-16Citrix Systems, Inc.Systems and methods for network disruption shielding techniques
US20060195547A1 (en)*2004-12-302006-08-31Prabakar SundarrajanSystems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US20060288120A1 (en)*2005-05-112006-12-21Kazuyoshi HoshinoService network system and server device
US7314169B1 (en)*2004-09-292008-01-01Rockwell Automation Technologies, Inc.Device that issues authority for automation systems by issuing an encrypted time pass
US20090158418A1 (en)*2003-11-242009-06-18Rao Goutham PSystems and methods for providing a vpn solution
US20090235347A1 (en)*2008-03-122009-09-17Yahoo! Inc.Method and system for securely streaming content
US20120179749A1 (en)*2009-09-242012-07-12Sony CorporationCommunication method, communication system, server and program
CN102647462A (en)*2012-03-292012-08-22奇智软件(北京)有限公司 App acquisition and delivery method and device
US8255456B2 (en)2005-12-302012-08-28Citrix Systems, Inc.System and method for performing flash caching of dynamically generated objects in a data communication network
US8261057B2 (en)2004-06-302012-09-04Citrix Systems, Inc.System and method for establishing a virtual private network
US8301839B2 (en)2005-12-302012-10-30Citrix Systems, Inc.System and method for performing granular invalidation of cached dynamically generated objects in a data communication network
US20130080636A1 (en)*2011-09-282013-03-28Robert U. FriedmanConveyance of configuration information in a network
US8495305B2 (en)2004-06-302013-07-23Citrix Systems, Inc.Method and device for performing caching of dynamically generated objects in a data communication network
US8499057B2 (en)2005-12-302013-07-30Citrix Systems, IncSystem and method for performing flash crowd caching of dynamically generated objects in a data communication network
US8677466B1 (en)*2009-03-102014-03-18Trend Micro IncorporatedVerification of digital certificates used for encrypted computer communications
US8706877B2 (en)2004-12-302014-04-22Citrix Systems, Inc.Systems and methods for providing client-side dynamic redirection to bypass an intermediary
US8739274B2 (en)2004-06-302014-05-27Citrix Systems, Inc.Method and device for performing integrated caching in a data communication network
US20140215572A1 (en)*2013-01-302014-07-31Hewlett-Packard Development Company, L.P.Authenticating Applications to a Network Service
US20140229739A1 (en)2013-02-122014-08-14Amazon Technologies, Inc.Delayed data access
US20140229732A1 (en)*2013-02-122014-08-14Amazon Technologies, Inc.Data security service
US8856777B2 (en)2004-12-302014-10-07Citrix Systems, Inc.Systems and methods for automatic installation and execution of a client-side acceleration program
US8954595B2 (en)2004-12-302015-02-10Citrix Systems, Inc.Systems and methods for providing client-side accelerated access to remote applications via TCP buffering
US9049025B1 (en)*2011-06-202015-06-02Cellco PartnershipMethod of decrypting encrypted information for unsecure phone
US9306934B2 (en)2012-04-172016-04-05Intel CorporationTrusted service interaction
US20160330220A1 (en)*2015-05-072016-11-10Cyber-Ark Software Ltd.Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
US9547771B2 (en)2013-02-122017-01-17Amazon Technologies, Inc.Policy enforcement with associated data
US9590959B2 (en)2013-02-122017-03-07Amazon Technologies, Inc.Data security service
US9608813B1 (en)2013-06-132017-03-28Amazon Technologies, Inc.Key rotation techniques
US9705674B2 (en)2013-02-122017-07-11Amazon Technologies, Inc.Federated key management
US20170201510A1 (en)*2014-07-282017-07-13Encryptier Co., Ltd.User information management system; user information management method; program, and recording medium on which it is recorded, for management server; program, and recording medium on which it is recorded, for user terminal; and program, and recording medium on which it is recorded, for service server
US9866392B1 (en)2014-09-152018-01-09Amazon Technologies, Inc.Distributed system web of trust provisioning
US9942036B2 (en)2014-06-272018-04-10Amazon Technologies, Inc.Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US20180121633A1 (en)*2000-11-102018-05-03Oath Inc.Digital content distribution and subscription sysem
US20180176203A1 (en)*2016-12-212018-06-21Apple Inc.Techniques for providing authentication information to external and embedded web browsers
US10055594B2 (en)2012-06-072018-08-21Amazon Technologies, Inc.Virtual service provider zones
US10075471B2 (en)2012-06-072018-09-11Amazon Technologies, Inc.Data loss prevention techniques
US10075295B2 (en)2013-02-122018-09-11Amazon Technologies, Inc.Probabilistic key rotation
US10084818B1 (en)2012-06-072018-09-25Amazon Technologies, Inc.Flexibly configurable data modification services
US10211977B1 (en)2013-02-122019-02-19Amazon Technologies, Inc.Secure management of information using a security module
US10262146B2 (en)*2016-12-152019-04-16Vmware, Inc.Application-to-application messaging over an insecure application programming interface
US20190260719A1 (en)*2016-06-242019-08-22Sony CorporationData communications
US10469477B2 (en)2015-03-312019-11-05Amazon Technologies, Inc.Key export techniques
US10467422B1 (en)2013-02-122019-11-05Amazon Technologies, Inc.Automatic key rotation
US10721075B2 (en)2014-05-212020-07-21Amazon Technologies, Inc.Web of trust management in a distributed system
US11036869B2 (en)2013-02-122021-06-15Amazon Technologies, Inc.Data security with a security module
US11288381B2 (en)2019-07-192022-03-29Eaglys Inc.Calculation device, calculation method, calculation program and calculation system
US20240314191A1 (en)*2009-10-082024-09-19Bright Data Ltd.System providing faster and more efficient data communication
US12250089B2 (en)2017-08-282025-03-11Bright Data Ltd.System and method for improving content fetching by selecting tunnel devices
US12278878B2 (en)2013-08-282025-04-15Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12309123B2 (en)2019-04-022025-05-20Bright Data Ltd.System and method for managing non-direct URL fetching service
US12332960B2 (en)2019-02-252025-06-17Bright Data Ltd.System and method for URL fetching retry mechanism
US12445511B2 (en)2023-01-222025-10-14Bright Data Ltd.System and method for streaming content from multiple servers

Families Citing this family (138)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6928469B1 (en)*1998-12-292005-08-09Citrix Systems, Inc.Apparatus and method for determining a program neighborhood for a client node in a client-server network using markup language techniques
US7343413B2 (en)2000-03-212008-03-11F5 Networks, Inc.Method and system for optimizing a network by independently scaling control segments and data flow
US7117239B1 (en)2000-07-282006-10-03Axeda CorporationReporting the state of an apparatus to a remote computer
US8225414B2 (en)*2000-08-282012-07-17Contentguard Holdings, Inc.Method and apparatus for identifying installed software and regulating access to content
US7185014B1 (en)2000-09-222007-02-27Axeda CorporationRetrieving data from a server
US8108543B2 (en)2000-09-222012-01-31Axeda CorporationRetrieving data from a server
US20030021417A1 (en)*2000-10-202003-01-30Ognjen VasicHidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
US6986040B1 (en)*2000-11-032006-01-10Citrix Systems, Inc.System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US7237257B1 (en)*2001-04-112007-06-26Aol LlcLeveraging a persistent connection to access a secured service
US7493651B2 (en)*2001-05-172009-02-17Nokia CorporationRemotely granting access to a smart environment
CA2404552C (en)*2001-09-212008-12-09Corel CorporationSystem and method for secure communication
US7254601B2 (en)2001-12-202007-08-07Questra CorporationMethod and apparatus for managing intelligent assets in a distributed environment
US7707416B2 (en)2002-02-012010-04-27Novell, Inc.Authentication cache and authentication on demand in a distributed network environment
US8135843B2 (en)*2002-03-222012-03-13Citrix Systems, Inc.Methods and systems for providing access to an application
US7178149B2 (en)2002-04-172007-02-13Axeda CorporationXML scripting of soap commands
WO2004006499A1 (en)*2002-07-022004-01-15America Online IncorporatedSeamless cross-site user authentication status detection and automatic login
GB0215911D0 (en)*2002-07-102002-08-21Hewlett Packard CoMethod and apparatus for encrypting data
US9621538B2 (en)*2002-07-102017-04-11Hewlett-Packard Development Company, L.P.Secure resource access in a distributed environment
CA2394451C (en)*2002-07-232007-11-27E-Witness Inc.System, method and computer product for delivery and receipt of s/mime-encrypted data
US7360096B2 (en)*2002-11-202008-04-15Microsoft CorporationSecurely processing client credentials used for Web-based access to resources
US7865931B1 (en)*2002-11-252011-01-04Accenture Global Services LimitedUniversal authorization and access control security measure for applications
US7461260B2 (en)*2002-12-312008-12-02Intel CorporationMethods and apparatus for finding a shared secret without compromising non-shared secrets
US7966418B2 (en)2003-02-212011-06-21Axeda CorporationEstablishing a virtual tunnel between two computer programs
US20050021976A1 (en)*2003-06-232005-01-27Nokia CorporationSystems and methods for controlling access to an event
US7660845B2 (en)2003-08-012010-02-09Sentillion, Inc.Methods and apparatus for verifying context participants in a context management system in a networked environment
JP4587158B2 (en)*2004-01-302010-11-24キヤノン株式会社 Secure communication method, terminal device, authentication service device, computer program, and computer-readable recording medium
US7281068B2 (en)*2004-07-152007-10-09International Business Machines CorporationWireless-boot diskless mobile computing
EP1805929B1 (en)*2004-10-292010-08-11Thomson LicensingSecure authenticated channel
US8166174B2 (en)*2005-10-272012-04-24Microsoft CorporationMethods and systems for providing proprietary access to a server
KR100722265B1 (en)*2005-11-142007-05-28엘지전자 주식회사 Plasma display panel
US7581244B2 (en)*2006-01-252009-08-25Seiko Epson CorporationIMX session control and authentication
US8087075B2 (en)*2006-02-132011-12-27Quest Software, Inc.Disconnected credential validation using pre-fetched service tickets
CN101479984B (en)*2006-04-252011-06-08斯蒂芬·L.·博伦Dynamic distributed key system and method for identity management, authentication server, data security and protection against man-in-the-middle attacks
US7992203B2 (en)2006-05-242011-08-02Red Hat, Inc.Methods and systems for secure shared smartcard access
US8180741B2 (en)2006-06-062012-05-15Red Hat, Inc.Methods and systems for providing data objects on a token
US8495380B2 (en)2006-06-062013-07-23Red Hat, Inc.Methods and systems for server-side key generation
US8098829B2 (en)*2006-06-062012-01-17Red Hat, Inc.Methods and systems for secure key delivery
US7822209B2 (en)2006-06-062010-10-26Red Hat, Inc.Methods and systems for key recovery for a token
US8332637B2 (en)*2006-06-062012-12-11Red Hat, Inc.Methods and systems for nonce generation in a token
US8364952B2 (en)*2006-06-062013-01-29Red Hat, Inc.Methods and system for a key recovery plan
US8099765B2 (en)2006-06-072012-01-17Red Hat, Inc.Methods and systems for remote password reset using an authentication credential managed by a third party
US8707024B2 (en)*2006-06-072014-04-22Red Hat, Inc.Methods and systems for managing identity management security domains
US8589695B2 (en)*2006-06-072013-11-19Red Hat, Inc.Methods and systems for entropy collection for server-side key generation
US8412927B2 (en)2006-06-072013-04-02Red Hat, Inc.Profile framework for token processing system
US9769158B2 (en)*2006-06-072017-09-19Red Hat, Inc.Guided enrollment and login for token users
US8806219B2 (en)2006-08-232014-08-12Red Hat, Inc.Time-based function back-off
US8787566B2 (en)*2006-08-232014-07-22Red Hat, Inc.Strong encryption
US8074265B2 (en)*2006-08-312011-12-06Red Hat, Inc.Methods and systems for verifying a location factor associated with a token
US8356342B2 (en)*2006-08-312013-01-15Red Hat, Inc.Method and system for issuing a kill sequence for a token
US8977844B2 (en)*2006-08-312015-03-10Red Hat, Inc.Smartcard formation with authentication keys
US9038154B2 (en)*2006-08-312015-05-19Red Hat, Inc.Token Registration
US8370479B2 (en)2006-10-032013-02-05Axeda Acquisition CorporationSystem and method for dynamically grouping devices based on present device conditions
US7996376B2 (en)*2006-10-272011-08-09Verizon Patent And Licensing Inc.Method and apparatus for managing session data across multiple applications
JP2007043750A (en)*2006-11-022007-02-15Nomura Research Institute Ltd Method for performing encrypted communication with authentication, authentication system and method
WO2008068976A1 (en)*2006-12-042008-06-12Nec CorporationNetwork system, server, client, and communication method in network system
US8693690B2 (en)*2006-12-042014-04-08Red Hat, Inc.Organizing an extensible table for storing cryptographic objects
US8065397B2 (en)2006-12-262011-11-22Axeda Acquisition CorporationManaging configurations of distributed devices
US8588420B2 (en)*2007-01-182013-11-19Panasonic CorporationSystems and methods for determining a time delay for sending a key update request
US8813243B2 (en)*2007-02-022014-08-19Red Hat, Inc.Reducing a size of a security-related data object stored on a token
US8639940B2 (en)*2007-02-282014-01-28Red Hat, Inc.Methods and systems for assigning roles on a token
US8832453B2 (en)2007-02-282014-09-09Red Hat, Inc.Token recycling
US9081948B2 (en)*2007-03-132015-07-14Red Hat, Inc.Configurable smartcard
CA2587239A1 (en)*2007-05-022008-11-02Kryptiva Inc.System and method for ad-hoc processing of cryptographically-encoded data
NL2000632C2 (en)*2007-05-072008-11-10Spectator Intellectual Propert System and method for exchanging data between a first data processing system and a second data processing system via, at least partially public communication network.
KR100914771B1 (en)2007-05-092009-09-01주식회사 웰비아닷컴System and method for security using one-time execution code
US7841523B2 (en)*2007-05-172010-11-30Shift4 CorporationSecure payment card transactions
US7891563B2 (en)2007-05-172011-02-22Shift4 CorporationSecure payment card transactions
US8621573B2 (en)*2007-08-282013-12-31Cisco Technology, Inc.Highly scalable application network appliances with virtualized services
US8761402B2 (en)2007-09-282014-06-24Sandisk Technologies Inc.System and methods for digital content distribution
CN101159639B (en)*2007-11-082010-05-12西安西电捷通无线网络通信有限公司One-way access authentication method
CN101436933B (en)*2007-11-162012-02-01成都市华为赛门铁克科技有限公司HTTPS encipher access method, system and apparatus
GB2459529A (en)*2008-04-282009-11-04Ice OrganisationOnline transaction authentication using two servers
US20090288104A1 (en)*2008-05-192009-11-19Rohati Systems, Inc.Extensibility framework of a network element
US8677453B2 (en)*2008-05-192014-03-18Cisco Technology, Inc.Highly parallel evaluation of XACML policies
US8667556B2 (en)*2008-05-192014-03-04Cisco Technology, Inc.Method and apparatus for building and managing policies
US8094560B2 (en)*2008-05-192012-01-10Cisco Technology, Inc.Multi-stage multi-core processing of network packets
US8943560B2 (en)*2008-05-282015-01-27Microsoft CorporationTechniques to provision and manage a digital telephone to authenticate with a network
US20100070471A1 (en)*2008-09-172010-03-18Rohati Systems, Inc.Transactional application events
TW201015940A (en)*2008-10-012010-04-16Avermedia Tech IncNetwork authorization method and application thereof
JP4631974B2 (en)2009-01-082011-02-16ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
US8887242B2 (en)*2009-04-142014-11-11Fisher-Rosemount Systems, Inc.Methods and apparatus to provide layered security for interface access control
US9083685B2 (en)2009-06-042015-07-14Sandisk Technologies Inc.Method and system for content replication control
US8706887B2 (en)*2009-06-292014-04-22Sap AgMulti-channel sessions
US8566593B2 (en)*2009-07-062013-10-22Intel CorporationMethod and apparatus of deriving security key(s)
US10721269B1 (en)2009-11-062020-07-21F5 Networks, Inc.Methods and system for returning requests with javascript for clients before passing a request to a server
US9054913B1 (en)2009-11-302015-06-09Dell Software Inc.Network protocol proxy
US8769686B2 (en)*2010-02-262014-07-01Futurewei Technologies, Inc.System and method for securing wireless transmissions
CN102835136B (en)*2010-04-152016-04-06高通股份有限公司For being session encryption and the contextual apparatus and method of Integrity Key signaling enhanced security
US9197669B2 (en)2010-04-152015-11-24Qualcomm IncorporatedApparatus and method for signaling enhanced security context for session encryption and integrity keys
US9084110B2 (en)2010-04-152015-07-14Qualcomm IncorporatedApparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network
EP2559292B1 (en)2010-04-162017-07-26Qualcomm IncorporatedApparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
CN102238000B (en)*2010-04-212015-01-21华为技术有限公司Encrypted communication method, device and system
FR2960734A1 (en)*2010-05-312011-12-02France Telecom METHOD AND DEVICES FOR SECURE COMMUNICATIONS IN A TELECOMMUNICATIONS NETWORK
US20110314532A1 (en)*2010-06-172011-12-22Kyle Dean AustinIdentity provider server configured to validate authentication requests from identity broker
US10015286B1 (en)*2010-06-232018-07-03F5 Networks, Inc.System and method for proxying HTTP single sign on across network domains
US8347100B1 (en)2010-07-142013-01-01F5 Networks, Inc.Methods for DNSSEC proxying and deployment amelioration and systems thereof
WO2012058643A2 (en)2010-10-292012-05-03F5 Networks, Inc.System and method for on the fly protocol conversion in obtaining policy enforcement information
CN102546562A (en)2010-12-222012-07-04腾讯科技(深圳)有限公司Encrypting and decrypting method and system during transmission of data in web
RU2453917C1 (en)*2010-12-302012-06-20Закрытое акционерное общество "Лаборатория Касперского"System and method for optimising execution of antivirus tasks in local area network
US10135831B2 (en)2011-01-282018-11-20F5 Networks, Inc.System and method for combining an access control system with a traffic management system
US9270766B2 (en)2011-12-302016-02-23F5 Networks, Inc.Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof
US9491620B2 (en)*2012-02-102016-11-08Qualcomm IncorporatedEnabling secure access to a discovered location server for a mobile device
US10230566B1 (en)2012-02-172019-03-12F5 Networks, Inc.Methods for dynamically constructing a service principal name and devices thereof
US10148438B2 (en)*2012-04-032018-12-04Rally Health, Inc.Methods and apparatus for protecting sensitive data in distributed applications
DE102012103106A1 (en)*2012-04-112013-10-17Vodafone Holding Gmbh A method of authenticating a user to a service on a service server, application and system
WO2013163648A2 (en)2012-04-272013-10-31F5 Networks, Inc.Methods for optimizing service of content requests and devices thereof
US9680813B2 (en)2012-10-242017-06-13Cyber-Ark Software Ltd.User provisioning
KR101487233B1 (en)*2013-09-252015-01-29(주) 시큐어가드 테크놀러지Method for changing password, device for changing password, and computer readable recording medium applying the same
US20150121517A1 (en)*2013-10-252015-04-30Stefan DimovBundle-to-bundle authentication in modular systems
US10187317B1 (en)2013-11-152019-01-22F5 Networks, Inc.Methods for traffic rate control and devices thereof
US9699261B2 (en)2014-01-142017-07-04Cyber-Ark Software Ltd.Monitoring sessions with a session-specific transient agent
US20150271162A1 (en)*2014-03-182015-09-24Cyber-Ark Software Ltd.Systems and methods for controlling sensitive applications
US10015143B1 (en)2014-06-052018-07-03F5 Networks, Inc.Methods for securing one or more license entitlement grants and devices thereof
US9712563B2 (en)2014-07-072017-07-18Cyber-Ark Software Ltd.Connection-specific communication management
US11838851B1 (en)2014-07-152023-12-05F5, Inc.Methods for managing L7 traffic classification and devices thereof
US10122630B1 (en)2014-08-152018-11-06F5 Networks, Inc.Methods for network traffic presteering and devices thereof
US10182013B1 (en)2014-12-012019-01-15F5 Networks, Inc.Methods for managing progressive image delivery and devices thereof
CN104486321A (en)*2014-12-112015-04-01上海斐讯数据通信技术有限公司Web data interaction method and system and corresponding Web server
CN104506517A (en)*2014-12-222015-04-08中软信息系统工程有限公司Encryption transmission method for MIPS (Million Instructions Per Second) platform on basis of HTTP (Hyper Text Transfer Protocol)
US11895138B1 (en)2015-02-022024-02-06F5, Inc.Methods for improving web scanner accuracy and devices thereof
US9712514B2 (en)2015-02-082017-07-18Cyber-Ark Software Ltd.Super-session access to multiple target services
US10834065B1 (en)2015-03-312020-11-10F5 Networks, Inc.Methods for SSL protected NTLM re-authentication and devices thereof
US10505818B1 (en)2015-05-052019-12-10F5 Networks. Inc.Methods for analyzing and load balancing based on server health and devices thereof
US11350254B1 (en)2015-05-052022-05-31F5, Inc.Methods for enforcing compliance policies and devices thereof
US11757946B1 (en)2015-12-222023-09-12F5, Inc.Methods for analyzing network traffic and enforcing network policies and devices thereof
US10404698B1 (en)2016-01-152019-09-03F5 Networks, Inc.Methods for adaptive organization of web application access points in webtops and devices thereof
US10797888B1 (en)2016-01-202020-10-06F5 Networks, Inc.Methods for secured SCEP enrollment for client devices and devices thereof
US11178150B1 (en)2016-01-202021-11-16F5 Networks, Inc.Methods for enforcing access control list based on managed application and devices thereof
US10791088B1 (en)2016-06-172020-09-29F5 Networks, Inc.Methods for disaggregating subscribers via DHCP address translation and devices thereof
US10505792B1 (en)2016-11-022019-12-10F5 Networks, Inc.Methods for facilitating network traffic analytics and devices thereof
US10812266B1 (en)2017-03-172020-10-20F5 Networks, Inc.Methods for managing security tokens based on security violations and devices thereof
US10972453B1 (en)2017-05-032021-04-06F5 Networks, Inc.Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof
US11343237B1 (en)2017-05-122022-05-24F5, Inc.Methods for managing a federated identity environment using security and access control data and devices thereof
US11122042B1 (en)2017-05-122021-09-14F5 Networks, Inc.Methods for dynamically managing user access control and devices thereof
US11122083B1 (en)2017-09-082021-09-14F5 Networks, Inc.Methods for managing network connections based on DNS data and network policies and devices thereof
EP3490191B1 (en)*2017-11-222020-01-15Siemens AktiengesellschaftProcessing method of service requests performed by a service provider node
KR102309044B1 (en)*2017-12-012021-10-05삼성에스디에스 주식회사Apparatus and method for establishing secure channel in message processing system
EP3515034B1 (en)*2018-01-172020-05-13ise Individuelle Software und Elektronik GmbHMethod, devices, computer-readable media and systems for establishing certified connections with end devices in a local area network

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6088451A (en)*1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US6108787A (en)*1995-03-312000-08-22The Commonwealth Of AustraliaMethod and means for interconnecting different security level networks
US6938057B2 (en)*1999-05-212005-08-30International Business Machines CorporationMethod and apparatus for networked backup storage
US6986040B1 (en)*2000-11-032006-01-10Citrix Systems, Inc.System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Family Cites Families (104)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPS583283A (en)1981-06-301983-01-10Toshiba Corp thyristor
GB2168831B (en)1984-11-131988-04-27Dowty Information Services LimPassword-protected data link
JP2585535B2 (en)1986-06-021997-02-26株式会社日立製作所 Process connection method in compound computer system
JP2608400B2 (en)1986-06-161997-05-07富士写真フイルム株式会社 Image reconstruction method from compressed image data
US4887204A (en)1987-02-131989-12-12International Business Machines CorporationSystem and method for accessing remote files in a distributed networking environment
US5202971A (en)1987-02-131993-04-13International Business Machines CorporationSystem for file and record locking between nodes in a distributed data processing environment maintaining one copy of each file lock
US5175852A (en)1987-02-131992-12-29International Business Machines CorporationDistributed file access structure lock
US5367688A (en)1987-09-041994-11-22Digital Equipment CorporationBoot system for distributed digital data processing system
US5390297A (en)1987-11-101995-02-14Auto-Trol Technology CorporationSystem for controlling the number of concurrent copies of a program in a network based on the number of available licenses
US5014221A (en)1988-01-291991-05-07Digital Equipment CorporationMechanism for arbitrating client access to a networked print server
US4924378A (en)1988-06-131990-05-08Prime Computer, Inc.License mangagement system and license storage key
US5341477A (en)1989-02-241994-08-23Digital Equipment CorporationBroker for computer network server selection
US5305440A (en)1989-05-151994-04-19International Business Machines CorporationFile extension by clients in a distributed data processing system
US5560008A (en)*1989-05-151996-09-24International Business Machines CorporationRemote authentication and authorization in a distributed data processing system
US5229864A (en)1990-04-161993-07-20Fuji Photo Film Co., Ltd.Device for regenerating a picture signal by decoding
AU639802B2 (en)1990-08-141993-08-05Oracle International CorporationMethods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment
US5583992A (en)1990-09-141996-12-10Kabushiki Kaisha ToshibaComputer network system for detecting global deadlock
US5161015A (en)1990-12-311992-11-03Zenith Electronics CorporationSystem for peaking a video signal with a control signal representative of the perceptual nature of blocks of video pixels
US5164727A (en)1991-04-301992-11-17Regents Of The Unversity Of CaliforniaOptimal decoding method and apparatus for data acquisition applications of sigma delta modulators
US5204897A (en)1991-06-281993-04-20Digital Equipment CorporationManagement interface for license management system
US5504814A (en)1991-07-101996-04-02Hughes Aircraft CompanyEfficient security kernel for the 80960 extended architecture
US5557518A (en)*1994-04-281996-09-17Citibank, N.A.Trusted agents for open electronic commerce
US5359721A (en)1991-12-181994-10-25Sun Microsystems, Inc.Non-supervisor mode cross address space dynamic linking
US5349682A (en)1992-01-311994-09-20Parallel Pcs, Inc.Dynamic fault-tolerant parallel processing system for performing an application function with increased efficiency using heterogeneous processors
US5412717A (en)1992-05-151995-05-02Fischer; Addison M.Computer system security method and apparatus having program authorization information data structures
US5440719A (en)1992-10-271995-08-08Cadence Design Systems, Inc.Method simulating data traffic on network in accordance with a client/sewer paradigm
US5329619A (en)1992-10-301994-07-12Software AgCooperative processing interface and communication broker for heterogeneous computing environments
US5550976A (en)1992-12-081996-08-27Sun Hydraulics CorporationDecentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
US5509070A (en)1992-12-151996-04-16Softlock Services Inc.Method for encouraging purchase of executable and non-executable software
US5325527A (en)1993-01-191994-06-28Canon Information Systems, Inc.Client/server communication system utilizing a self-generating nodal network
US5351293A (en)1993-02-011994-09-27Wave Systems Corp.System method and apparatus for authenticating an encrypted signal
FI107102B (en)1993-05-312001-05-31Nokia Networks Oy Procedure for communicating call costs and a subscriber apparatus
US5794207A (en)1996-09-041998-08-11Walker Asset Management Limited PartnershipMethod and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers
US5359593A (en)1993-08-261994-10-25International Business Machines CorporationDynamic bandwidth estimation and adaptation for packet communications networks
US5544246A (en)1993-09-171996-08-06At&T Corp.Smartcard adapted for a plurality of service providers and for remote installation of same
US5590199A (en)*1993-10-121996-12-31The Mitre CorporationElectronic information network user authentication and authorization system
US5455953A (en)1993-11-031995-10-03Wang Laboratories, Inc.Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket
EP1235177A3 (en)*1993-12-162003-10-08divine technology venturesDigital active advertising
US5515508A (en)1993-12-171996-05-07Taligent, Inc.Client server system and method of operation including a dynamically configurable protocol stack
US5564016A (en)1993-12-171996-10-08International Business Machines CorporationMethod for controlling access to a computer resource based on a timing policy
US5495411A (en)1993-12-221996-02-27Ananda; MohanSecure software rental system using continuous asynchronous password verification
US5491750A (en)1993-12-301996-02-13International Business Machines CorporationMethod and apparatus for three-party entity authentication and key distribution using message authentication codes
US5524238A (en)1994-03-231996-06-04Breakout I/O CorporationUser specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the field accessed
US5553139A (en)1994-04-041996-09-03Novell, Inc.Method and apparatus for electronic license distribution
US5757907A (en)1994-04-251998-05-26International Business Machines CorporationMethod and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
CA2143874C (en)1994-04-252000-06-20Thomas Edward CooperMethod and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5475757A (en)1994-06-071995-12-12At&T Corp.Secure data transmission method
US5550981A (en)1994-06-211996-08-27At&T Global Information Solutions CompanyDynamic binding of network identities to locally-meaningful identities in computer networks
US5668876A (en)1994-06-241997-09-16Telefonaktiebolaget Lm EricssonUser authentication method and apparatus
US5557732A (en)1994-08-111996-09-17International Business Machines CorporationMethod and apparatus for protecting software executing on a demonstration computer
US5604490A (en)1994-09-091997-02-18International Business Machines CorporationMethod and system for providing a user access to multiple secured subsystems
US6865551B1 (en)*1994-11-232005-03-08Contentguard Holdings, Inc.Removable content repositories
US5668999A (en)1994-12-201997-09-16Sun Microsystems, Inc.System and method for pre-verification of stack usage in bytecode program loops
JPH08235114A (en)1995-02-281996-09-13Hitachi Ltd Server access method and billing information management method
US5706349A (en)1995-03-061998-01-06International Business Machines CorporationAuthenticating remote users in a distributed environment
EP0734144A3 (en)1995-03-201999-08-18Siemens AktiengesellschaftMethod and apparatus for determination of user charges in a subscriber apparatus
US5666501A (en)1995-03-301997-09-09International Business Machines CorporationMethod and apparatus for installing software
US5689708A (en)1995-03-311997-11-18Showcase CorporationClient/server computer systems having control of client-based application programs, and application-program control means therefor
US5592549A (en)1995-06-151997-01-07Infosafe Systems, Inc.Method and apparatus for retrieving selected information from a secure information source
US5809144A (en)*1995-08-241998-09-15Carnegie Mellon UniversityMethod and apparatus for purchasing and delivering digital goods over a network
US5657390A (en)1995-08-251997-08-12Netscape Communications CorporationSecure socket layer application program apparatus and method
US5930786A (en)*1995-10-201999-07-27Ncr CorporationMethod and apparatus for providing shared data to a requesting client
US5729734A (en)1995-11-031998-03-17Apple Computer, Inc.File privilege administration apparatus and methods
CN1226852C (en)1995-11-142005-11-09国际商业机器公司 Information processing system and method allowing common WEB browsers to access multiple servers of different protocol types
US5787169A (en)1995-12-281998-07-28International Business Machines Corp.Method and apparatus for controlling access to encrypted data files in a computer system
US6226383B1 (en)1996-04-172001-05-01Integrity Sciences, Inc.Cryptographic methods for remote authentication
US6088450A (en)1996-04-172000-07-11Intel CorporationAuthentication system based on periodic challenge/response protocol
US5742757A (en)1996-05-301998-04-21Mitsubishi Semiconductor America, Inc.Automatic software license manager
EP0851628A1 (en)1996-12-231998-07-01ICO Services Ltd.Key distribution for mobile network
US5944791A (en)1996-10-041999-08-31Contigo Software LlcCollaborative web browser
US5881226A (en)1996-10-281999-03-09Veneklase; Brian J.Computer security system
US5974151A (en)1996-11-011999-10-26Slavin; Keith R.Public key cryptographic system having differential security levels
US6131116A (en)1996-12-132000-10-10Visto CorporationSystem and method for globally accessing computer services
US5818939A (en)*1996-12-181998-10-06Intel CorporationOptimized security functionality in an electronic system
US5918228A (en)*1997-01-281999-06-29International Business Machines CorporationMethod and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure access to supported web documents
US5923756A (en)*1997-02-121999-07-13Gte Laboratories IncorporatedMethod for providing secure remote command execution over an insecure computer network
AU6654798A (en)1997-02-261998-09-18Siebel Systems, Inc.Method of determining visibility to a remote database client of a plurality of database transactions using a networked proxy server
DE19718103A1 (en)1997-04-291998-06-04Kim SchmitzData transmission system authorise method e.g. for telebanking
US6408174B1 (en)1997-05-132002-06-18Telefonaktiebolaget Lm Ericsson (Publ)Communication method, system, and device for reducing processor load at tariff switch
US5991878A (en)*1997-09-081999-11-23Fmr Corp.Controlling access to information
US6094485A (en)*1997-09-182000-07-25Netscape Communications CorporationSSL step-up
NL1007409C1 (en)1997-10-311997-11-18Nederland PttAuthentication system for electronic transactions
US5926038A (en)*1997-11-101999-07-20The United States Of America As Represented By The Secretary Of The NavyTwo-phase dynamic logic circuits for gallium arsenide complementary HIGFET fabrication
US6246771B1 (en)*1997-11-262001-06-12V-One CorporationSession key recovery system and method
JPH11170750A (en)*1997-12-171999-06-29Katsumi HashimotoCard having memory device
US6035405A (en)1997-12-222000-03-07Nortel Networks CorporationSecure virtual LANs
KR20010033972A (en)1998-01-092001-04-25사이버세이퍼 코퍼레이션Client side public key authentication method and apparatus with short-lived certificates
US6128742A (en)1998-02-172000-10-03Bea Systems, Inc.Method of authentication based on intersection of password sets
JPH11282884A (en)*1998-03-301999-10-15Mitsubishi Electric Corp Network type CAD system
US6363365B1 (en)*1998-05-122002-03-26International Business Machines Corp.Mechanism for secure tendering in an open electronic network
US6289461B1 (en)1998-06-092001-09-11Placeware, Inc.Bi-directional process-to-process byte stream protocol
JP4353552B2 (en)*1998-06-182009-10-28富士通株式会社 Content server, terminal device, and content transmission system
JP2000049766A (en)*1998-07-272000-02-18Hitachi Ltd Key management server system
JP2000163369A (en)*1998-11-302000-06-16Nippon Telegr & Teleph Corp <Ntt> Processing result distribution management method and system, processing result distribution management server device, and storage medium storing processing result distribution management program
JP2000183866A (en)*1998-12-102000-06-30Nippon Telegr & Teleph Corp <Ntt> Cryptographic communication method and system and recording medium recording cryptographic communication program
EP1183613A4 (en)*1999-04-052006-06-21Neomedia Tech IncSystem and method of using machine-readable or human-readable linkage codes for accessing networked data resources
US6792424B1 (en)*1999-04-232004-09-14International Business Machines CorporationSystem and method for managing authentication and coherency in a storage area network
US6816274B1 (en)*1999-05-252004-11-09Silverbrook Research Pty LtdMethod and system for composition and delivery of electronic mail
US7079712B1 (en)*1999-05-252006-07-18Silverbrook Research Pty LtdMethod and system for providing information in a document
US6757825B1 (en)1999-07-132004-06-29Lucent Technologies Inc.Secure mutual network authentication protocol
US6286104B1 (en)1999-08-042001-09-04Oracle CorporationAuthentication and authorization in a multi-tier relational database management system
US6732269B1 (en)*1999-10-012004-05-04International Business Machines CorporationMethods, systems and computer program products for enhanced security identity utilizing an SSL proxy
RU2158485C1 (en)*2000-01-242000-10-27Общество с ограниченной ответственностью "Ти Би Кей Интернэшнл"Method for checking right for user's access to multiple access system
EP1439495B1 (en)*2003-01-172019-04-17QUALCOMM IncorporatedDevice for ordering and validating an electronic ticket

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6108787A (en)*1995-03-312000-08-22The Commonwealth Of AustraliaMethod and means for interconnecting different security level networks
US6088451A (en)*1996-06-282000-07-11Mci Communications CorporationSecurity system and method for network element access
US6938057B2 (en)*1999-05-212005-08-30International Business Machines CorporationMethod and apparatus for networked backup storage
US6986040B1 (en)*2000-11-032006-01-10Citrix Systems, Inc.System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel

Cited By (131)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20180121633A1 (en)*2000-11-102018-05-03Oath Inc.Digital content distribution and subscription sysem
US7437562B2 (en)*2003-04-012008-10-14Oracle International CorporationMethod and apparatus for digitally signing electronic mail that originates from a browser
US20040199761A1 (en)*2003-04-012004-10-07Philips Andrew B.Method and apparatus for digitally signing electronic mail that originates from a browser
US8559449B2 (en)2003-11-112013-10-15Citrix Systems, Inc.Systems and methods for providing a VPN solution
US7978716B2 (en)2003-11-242011-07-12Citrix Systems, Inc.Systems and methods for providing a VPN solution
US20090158418A1 (en)*2003-11-242009-06-18Rao Goutham PSystems and methods for providing a vpn solution
US20050120214A1 (en)*2003-12-022005-06-02Microsoft CorporationSystems and methods for enhancing security of communication over a public network
US7568098B2 (en)*2003-12-022009-07-28Microsoft CorporationSystems and methods for enhancing security of communication over a public network
US8726006B2 (en)2004-06-302014-05-13Citrix Systems, Inc.System and method for establishing a virtual private network
US8739274B2 (en)2004-06-302014-05-27Citrix Systems, Inc.Method and device for performing integrated caching in a data communication network
US8261057B2 (en)2004-06-302012-09-04Citrix Systems, Inc.System and method for establishing a virtual private network
US8495305B2 (en)2004-06-302013-07-23Citrix Systems, Inc.Method and device for performing caching of dynamically generated objects in a data communication network
US8046830B2 (en)*2004-07-232011-10-25Citrix Systems, Inc.Systems and methods for network disruption shielding techniques
US9219579B2 (en)2004-07-232015-12-22Citrix Systems, Inc.Systems and methods for client-side application-aware prioritization of network communications
US20060037072A1 (en)*2004-07-232006-02-16Citrix Systems, Inc.Systems and methods for network disruption shielding techniques
US7978714B2 (en)2004-07-232011-07-12Citrix Systems, Inc.Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices
US8014421B2 (en)2004-07-232011-09-06Citrix Systems, Inc.Systems and methods for adjusting the maximum transmission unit by an intermediary device
US8019868B2 (en)2004-07-232011-09-13Citrix Systems, Inc.Method and systems for routing packets from an endpoint to a gateway
US8892778B2 (en)2004-07-232014-11-18Citrix Systems, Inc.Method and systems for securing remote access to private networks
US20060029063A1 (en)*2004-07-232006-02-09Citrix Systems, Inc.A method and systems for routing packets from a gateway to an endpoint
US8897299B2 (en)2004-07-232014-11-25Citrix Systems, Inc.Method and systems for routing packets from a gateway to an endpoint
US20100002693A1 (en)*2004-07-232010-01-07Rao Goutham PMethod and systems for routing packets from an endpoint to a gateway
US8634420B2 (en)2004-07-232014-01-21Citrix Systems, Inc.Systems and methods for communicating a lossy protocol via a lossless protocol
US8914522B2 (en)2004-07-232014-12-16Citrix Systems, Inc.Systems and methods for facilitating a peer to peer route via a gateway
US8291119B2 (en)2004-07-232012-10-16Citrix Systems, Inc.Method and systems for securing remote access to private networks
US20060029062A1 (en)*2004-07-232006-02-09Citrix Systems, Inc.Methods and systems for securing access to private networks using encryption and authentication technology built in to peripheral devices
US8351333B2 (en)2004-07-232013-01-08Citrix Systems, Inc.Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements
US8363650B2 (en)2004-07-232013-01-29Citrix Systems, Inc.Method and systems for routing packets from a gateway to an endpoint
US7314169B1 (en)*2004-09-292008-01-01Rockwell Automation Technologies, Inc.Device that issues authority for automation systems by issuing an encrypted time pass
US8549149B2 (en)2004-12-302013-10-01Citrix Systems, Inc.Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US8706877B2 (en)2004-12-302014-04-22Citrix Systems, Inc.Systems and methods for providing client-side dynamic redirection to bypass an intermediary
US20060195547A1 (en)*2004-12-302006-08-31Prabakar SundarrajanSystems and methods for providing client-side accelerated access to remote applications via TCP multiplexing
US8856777B2 (en)2004-12-302014-10-07Citrix Systems, Inc.Systems and methods for automatic installation and execution of a client-side acceleration program
US8954595B2 (en)2004-12-302015-02-10Citrix Systems, Inc.Systems and methods for providing client-side accelerated access to remote applications via TCP buffering
US8788581B2 (en)2005-01-242014-07-22Citrix Systems, Inc.Method and device for performing caching of dynamically generated objects in a data communication network
US8848710B2 (en)2005-01-242014-09-30Citrix Systems, Inc.System and method for performing flash caching of dynamically generated objects in a data communication network
US20060288120A1 (en)*2005-05-112006-12-21Kazuyoshi HoshinoService network system and server device
US8041822B2 (en)*2005-05-112011-10-18Hitachi, Ltd.Service network system and server device
US20090177802A1 (en)*2005-05-112009-07-09Kazuyoshi HoshinoService network system and server device
US8255456B2 (en)2005-12-302012-08-28Citrix Systems, Inc.System and method for performing flash caching of dynamically generated objects in a data communication network
US8499057B2 (en)2005-12-302013-07-30Citrix Systems, IncSystem and method for performing flash crowd caching of dynamically generated objects in a data communication network
US8301839B2 (en)2005-12-302012-10-30Citrix Systems, Inc.System and method for performing granular invalidation of cached dynamically generated objects in a data communication network
US20090235347A1 (en)*2008-03-122009-09-17Yahoo! Inc.Method and system for securely streaming content
US8555367B2 (en)*2008-03-122013-10-08Yahoo! Inc.Method and system for securely streaming content
US8677466B1 (en)*2009-03-102014-03-18Trend Micro IncorporatedVerification of digital certificates used for encrypted computer communications
US20120179749A1 (en)*2009-09-242012-07-12Sony CorporationCommunication method, communication system, server and program
US12323287B2 (en)2009-10-082025-06-03Bright Data Ltd.System providing faster and more efficient data communication
US12294481B2 (en)2009-10-082025-05-06Bright Data Ltd.System providing faster and more efficient data communication
US12301401B2 (en)*2009-10-082025-05-13Bright Data Ltd.System providing faster and more efficient data communication
US20240314191A1 (en)*2009-10-082024-09-19Bright Data Ltd.System providing faster and more efficient data communication
US12284069B2 (en)2009-10-082025-04-22Bright Data Ltd.System providing faster and more efficient data communication
US9049025B1 (en)*2011-06-202015-06-02Cellco PartnershipMethod of decrypting encrypted information for unsecure phone
US9397885B2 (en)*2011-09-282016-07-19Apperian, Inc.Conveyance of configuration information in a network
US20130080636A1 (en)*2011-09-282013-03-28Robert U. FriedmanConveyance of configuration information in a network
CN102647462A (en)*2012-03-292012-08-22奇智软件(北京)有限公司 App acquisition and delivery method and device
US9923886B2 (en)2012-04-172018-03-20Intel CorporationTrusted service interaction
US9306934B2 (en)2012-04-172016-04-05Intel CorporationTrusted service interaction
US10834139B2 (en)2012-06-072020-11-10Amazon Technologies, Inc.Flexibly configurable data modification services
US10084818B1 (en)2012-06-072018-09-25Amazon Technologies, Inc.Flexibly configurable data modification services
US10075471B2 (en)2012-06-072018-09-11Amazon Technologies, Inc.Data loss prevention techniques
US10055594B2 (en)2012-06-072018-08-21Amazon Technologies, Inc.Virtual service provider zones
US10474829B2 (en)2012-06-072019-11-12Amazon Technologies, Inc.Virtual service provider zones
US10104060B2 (en)*2013-01-302018-10-16Hewlett Packard Enterprise Development LpAuthenticating applications to a network service
US20140215572A1 (en)*2013-01-302014-07-31Hewlett-Packard Development Company, L.P.Authenticating Applications to a Network Service
US9547771B2 (en)2013-02-122017-01-17Amazon Technologies, Inc.Policy enforcement with associated data
US9590959B2 (en)2013-02-122017-03-07Amazon Technologies, Inc.Data security service
US20140229739A1 (en)2013-02-122014-08-14Amazon Technologies, Inc.Delayed data access
US20140229732A1 (en)*2013-02-122014-08-14Amazon Technologies, Inc.Data security service
US10404670B2 (en)2013-02-122019-09-03Amazon Technologies, Inc.Data security service
US11695555B2 (en)2013-02-122023-07-04Amazon Technologies, Inc.Federated key management
US10467422B1 (en)2013-02-122019-11-05Amazon Technologies, Inc.Automatic key rotation
US10382200B2 (en)2013-02-122019-08-13Amazon Technologies, Inc.Probabilistic key rotation
US11372993B2 (en)2013-02-122022-06-28Amazon Technologies, Inc.Automatic key rotation
US11036869B2 (en)2013-02-122021-06-15Amazon Technologies, Inc.Data security with a security module
US12432054B2 (en)2013-02-122025-09-30Amazon Technologies, Inc.Federated key management
US10075295B2 (en)2013-02-122018-09-11Amazon Technologies, Inc.Probabilistic key rotation
US10666436B2 (en)2013-02-122020-05-26Amazon Technologies, Inc.Federated key management
US9705674B2 (en)2013-02-122017-07-11Amazon Technologies, Inc.Federated key management
US10210341B2 (en)2013-02-122019-02-19Amazon Technologies, Inc.Delayed data access
US10211977B1 (en)2013-02-122019-02-19Amazon Technologies, Inc.Secure management of information using a security module
US12395472B1 (en)2013-06-132025-08-19Amazon Technologies, Inc.Key rotation techniques
US10313312B2 (en)2013-06-132019-06-04Amazon Technologies, Inc.Key rotation techniques
US9608813B1 (en)2013-06-132017-03-28Amazon Technologies, Inc.Key rotation techniques
US10601789B2 (en)2013-06-132020-03-24Amazon Technologies, Inc.Session negotiations
US11470054B2 (en)2013-06-132022-10-11Amazon Technologies, Inc.Key rotation techniques
US9832171B1 (en)2013-06-132017-11-28Amazon Technologies, Inc.Negotiating a session with a cryptographic domain
US11323479B2 (en)2013-07-012022-05-03Amazon Technologies, Inc.Data loss prevention techniques
US12107897B1 (en)2013-07-012024-10-01Amazon Technologies, Inc.Data loss prevention techniques
US12355855B2 (en)2013-08-282025-07-08Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12341860B2 (en)2013-08-282025-06-24Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12278878B2 (en)2013-08-282025-04-15Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12289383B2 (en)2013-08-282025-04-29Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12368789B2 (en)2013-08-282025-07-22Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12425492B2 (en)2013-08-282025-09-23Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12309241B2 (en)2013-08-282025-05-20Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12413648B2 (en)2013-08-282025-09-09Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12323501B2 (en)2013-08-282025-06-03Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12323500B2 (en)2013-08-282025-06-03Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12375582B2 (en)2013-08-282025-07-29Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US12438956B2 (en)2013-08-282025-10-07Bright Data Ltd.System and method for improving internet communication by using intermediate nodes
US10721075B2 (en)2014-05-212020-07-21Amazon Technologies, Inc.Web of trust management in a distributed system
US11368300B2 (en)2014-06-272022-06-21Amazon Technologies, Inc.Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9942036B2 (en)2014-06-272018-04-10Amazon Technologies, Inc.Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US10587405B2 (en)2014-06-272020-03-10Amazon Technologies, Inc.Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US20170201510A1 (en)*2014-07-282017-07-13Encryptier Co., Ltd.User information management system; user information management method; program, and recording medium on which it is recorded, for management server; program, and recording medium on which it is recorded, for user terminal; and program, and recording medium on which it is recorded, for service server
US10382430B2 (en)*2014-07-282019-08-13Encryptier Co., Ltd.User information management system; user information management method; program, and recording medium on which it is recorded, for management server; program, and recording medium on which it is recorded, for user terminal; and program, and recording medium on which it is recorded, for service server
US11626996B2 (en)2014-09-152023-04-11Amazon Technologies, Inc.Distributed system web of trust provisioning
US9866392B1 (en)2014-09-152018-01-09Amazon Technologies, Inc.Distributed system web of trust provisioning
US10469477B2 (en)2015-03-312019-11-05Amazon Technologies, Inc.Key export techniques
US11374916B2 (en)2015-03-312022-06-28Amazon Technologies, Inc.Key export techniques
US9866568B2 (en)*2015-05-072018-01-09Cyberark Software Ltd.Systems and methods for detecting and reacting to malicious activity in computer networks
US9866567B2 (en)*2015-05-072018-01-09Cyberark Software Ltd.Systems and methods for detecting and reacting to malicious activity in computer networks
US20160330220A1 (en)*2015-05-072016-11-10Cyber-Ark Software Ltd.Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
US20160330221A1 (en)*2015-05-072016-11-10Cyber-Ark Software Ltd.Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
US20170257376A1 (en)*2015-05-072017-09-07Cyber-Ark Software Ltd.Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
US20170257375A1 (en)*2015-05-072017-09-07Cyber-Ark Software Ltd.Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
US20170264617A1 (en)*2015-05-072017-09-14Cyber-Ark Software Ltd.Systems and Methods for Detecting and Reacting to Malicious Activity in Computer Networks
US10044726B2 (en)*2015-05-072018-08-07Cyberark Software Ltd.Systems and methods for detecting and reacting to malicious activity in computer networks
US9866566B2 (en)*2015-05-072018-01-09Cyberark Software Ltd.Systems and methods for detecting and reacting to malicious activity in computer networks
US10979407B2 (en)*2016-06-242021-04-13Sony CorporationData communications
US20190260719A1 (en)*2016-06-242019-08-22Sony CorporationData communications
US10262146B2 (en)*2016-12-152019-04-16Vmware, Inc.Application-to-application messaging over an insecure application programming interface
US10511670B2 (en)*2016-12-212019-12-17Apple Inc.Techniques for providing authentication information to external and embedded web browsers
US20180176203A1 (en)*2016-12-212018-06-21Apple Inc.Techniques for providing authentication information to external and embedded web browsers
US12250090B2 (en)2017-08-282025-03-11Bright Data Ltd.System and method for improving content fetching by selecting tunnel devices
US12250089B2 (en)2017-08-282025-03-11Bright Data Ltd.System and method for improving content fetching by selecting tunnel devices
US12332960B2 (en)2019-02-252025-06-17Bright Data Ltd.System and method for URL fetching retry mechanism
US12411902B2 (en)2019-02-252025-09-09Bright Data Ltd.System and method for URL fetching retry mechanism
US12309123B2 (en)2019-04-022025-05-20Bright Data Ltd.System and method for managing non-direct URL fetching service
US11288381B2 (en)2019-07-192022-03-29Eaglys Inc.Calculation device, calculation method, calculation program and calculation system
US12445511B2 (en)2023-01-222025-10-14Bright Data Ltd.System and method for streaming content from multiple servers

Also Published As

Publication numberPublication date
AU3514902A (en)2002-06-11
EP1332599A2 (en)2003-08-06
CN1505892A (en)2004-06-16
CA2427699A1 (en)2002-06-06
AU2002235149B2 (en)2005-12-01
EP1332599B1 (en)2013-03-20
HK1054281A1 (en)2003-11-21
JP2004531914A (en)2004-10-14
IL155698A0 (en)2003-11-23
US6986040B1 (en)2006-01-10
KR100783208B1 (en)2007-12-06
IL155698A (en)2008-04-13
KR20040004425A (en)2004-01-13
WO2002044858A3 (en)2003-05-01
WO2002044858A2 (en)2002-06-06
CA2427699C (en)2012-01-03
CN100583871C (en)2010-01-20
RU2279186C2 (en)2006-06-27

Similar Documents

PublicationPublication DateTitle
US6986040B1 (en)System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
AU2002235149A1 (en)System and method for securing a non-secure communication channel
CA2280869C (en)System for providing secure remote command execution network
US7627896B2 (en)Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US7590684B2 (en)System providing methodology for access control with cooperative enforcement
US7747856B2 (en)Session ticket authentication scheme
US9092635B2 (en)Method and system of providing security services using a secure device
US7366900B2 (en)Platform-neutral system and method for providing secure remote operations over an insecure computer network
US6874084B1 (en)Method and apparatus for establishing a secure communication connection between a java application and secure server
EP2002373B1 (en)Providing security services using a secure device
US7100054B2 (en)Computer network security system
RU2439692C2 (en)Policy-controlled delegation of account data for single registration in network and secured access to network resources
US6785729B1 (en)System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful
US20020099940A1 (en)Secure internet applications with mobile code
JP2005518595A (en) Secure traversal of network components
US20040143762A1 (en)Method and system for authenticating a personal security device vis-a-vis at least one remote computer system
US7890751B1 (en)Method and system for increasing data access in a secure socket layer network environment
HK1054281B (en)System and method for securing a non-secure communication channel
KR100366403B1 (en)Method for authenticating user in internet and system for the same
CainIntroduction to web security
Schäfer et al.Security and Web Services

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp