Movatterモバイル変換


[0]ホーム

URL:


US20170142100A1 - Secure distribution of session credentials from client-side to server-side traffic management devices - Google Patents

Secure distribution of session credentials from client-side to server-side traffic management devices
Download PDF

Info

Publication number
US20170142100A1
US20170142100A1US15/356,471US201615356471AUS2017142100A1US 20170142100 A1US20170142100 A1US 20170142100A1US 201615356471 AUS201615356471 AUS 201615356471AUS 2017142100 A1US2017142100 A1US 2017142100A1
Authority
US
United States
Prior art keywords
server
client
side tmd
encrypted
tmd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/356,471
Inventor
Benn Sapin Bollay
Jeffrey Michael Warren
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
F5 Inc
Original Assignee
F5 Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F5 Networks IncfiledCriticalF5 Networks Inc
Priority to US15/356,471priorityCriticalpatent/US20170142100A1/en
Assigned to F5 NETWORKS, INC.reassignmentF5 NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: BOLLAY, BENN SAPIN, WARREN, JEFFREY MICHAEL
Publication of US20170142100A1publicationCriticalpatent/US20170142100A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A traffic management device (TMD), system, and processor-readable storage medium are directed to securely transferring session credentials from a client-side traffic management device (TMD) to a second server-side TMD that replaces a first server-side TMD. In one embodiment, a client-side TMD and the first server-side TMD have copies of secret data associated with an encrypted session between a client device and a server device, including a session key. For any of a variety of reasons, the first server-side TMD is replaced with the second server-side TMD, which may not have the secret data. In response to a request to create an encrypted connection associated with the encrypted session, the client-side TMD encrypts the secret data using the server device's public key and transmits the encrypted secret data to the second server-side TMD. If the second server-side TMD has a copy of the server device's private key, and is therefore considered to be an authentic and trusted TMD, the second sever-side TMD decrypts the secret data and participates in the encrypted connection.

Description

Claims (1)

What is claimed as new and desired to be protected by Letters Patent of the United States is:
1. A traffic management device (TMD) for managing network traffic between a client device and a server device, comprising:
a transceiver to send and receive data over a network; and
a processor, in communication with the transceiver, that performs actions, including:
intercepting a request to initiate an encrypted connection associated with an established encrypted session, wherein the established encrypted session includes a client device and a first server-side TMD in communication with the TMD, and wherein the first server-side TMD is in communication with a server device;
encrypting a set of cryptographic primitives associated with the established encrypted session using a public key associated with the server device; and
transmitting the encrypted set of cryptographic primitives to a second server-side TMD, wherein the second server-side TMD replaces the first server-side TMD and the second server-side TMD is enabled to decrypt data associated with the encrypted session.
US15/356,4712010-03-192016-11-18Secure distribution of session credentials from client-side to server-side traffic management devicesAbandonedUS20170142100A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/356,471US20170142100A1 (en)2010-03-192016-11-18Secure distribution of session credentials from client-side to server-side traffic management devices

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US31585710P2010-03-192010-03-19
US12/967,006US9509663B2 (en)2010-03-192010-12-13Secure distribution of session credentials from client-side to server-side traffic management devices
US15/356,471US20170142100A1 (en)2010-03-192016-11-18Secure distribution of session credentials from client-side to server-side traffic management devices

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US12/967,006ContinuationUS9509663B2 (en)2010-03-192010-12-13Secure distribution of session credentials from client-side to server-side traffic management devices

Publications (1)

Publication NumberPublication Date
US20170142100A1true US20170142100A1 (en)2017-05-18

Family

ID=44603286

Family Applications (10)

Application NumberTitlePriority DateFiling Date
US12/846,778Active2031-09-02US8700892B2 (en)2010-03-192010-07-29Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US12/848,096Expired - Fee RelatedUS9210131B2 (en)2010-03-192010-07-30Aggressive rehandshakes on unknown session identifiers for split SSL
US12/967,006ActiveUS9509663B2 (en)2010-03-192010-12-13Secure distribution of session credentials from client-side to server-side traffic management devices
US13/051,963Expired - Fee RelatedUS9166955B2 (en)2010-03-192011-03-18Proxy SSL handoff via mid-stream renegotiation
US13/051,994Active2031-08-25US9172682B2 (en)2010-03-192011-03-18Local authentication in proxy SSL tunnels using a client-side proxy agent
US13/052,005Expired - Fee RelatedUS9100370B2 (en)2010-03-192011-03-18Strong SSL proxy authentication with forced SSL renegotiation against a target server
US13/779,530ActiveUS9178706B1 (en)2010-03-192013-02-27Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US14/851,783ActiveUS9667601B2 (en)2010-03-192015-09-11Proxy SSL handoff via mid-stream renegotiation
US14/856,127Expired - Fee RelatedUS9705852B2 (en)2010-03-192015-09-16Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US15/356,471AbandonedUS20170142100A1 (en)2010-03-192016-11-18Secure distribution of session credentials from client-side to server-side traffic management devices

Family Applications Before (9)

Application NumberTitlePriority DateFiling Date
US12/846,778Active2031-09-02US8700892B2 (en)2010-03-192010-07-29Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US12/848,096Expired - Fee RelatedUS9210131B2 (en)2010-03-192010-07-30Aggressive rehandshakes on unknown session identifiers for split SSL
US12/967,006ActiveUS9509663B2 (en)2010-03-192010-12-13Secure distribution of session credentials from client-side to server-side traffic management devices
US13/051,963Expired - Fee RelatedUS9166955B2 (en)2010-03-192011-03-18Proxy SSL handoff via mid-stream renegotiation
US13/051,994Active2031-08-25US9172682B2 (en)2010-03-192011-03-18Local authentication in proxy SSL tunnels using a client-side proxy agent
US13/052,005Expired - Fee RelatedUS9100370B2 (en)2010-03-192011-03-18Strong SSL proxy authentication with forced SSL renegotiation against a target server
US13/779,530ActiveUS9178706B1 (en)2010-03-192013-02-27Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US14/851,783ActiveUS9667601B2 (en)2010-03-192015-09-11Proxy SSL handoff via mid-stream renegotiation
US14/856,127Expired - Fee RelatedUS9705852B2 (en)2010-03-192015-09-16Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion

Country Status (5)

CountryLink
US (10)US8700892B2 (en)
EP (1)EP2548332A4 (en)
JP (1)JP5744172B2 (en)
CN (2)CN102195878B (en)
WO (1)WO2011116342A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140245359A1 (en)*2011-06-012014-08-28Interdigital Patent Holdings, Inc.Content Delivery Network Interconnection (CDNI) Mechanism
EP3058438A4 (en)*2013-10-182017-04-05AppDynamics, Inc.Automatic asynchronous handoff identification
US10652224B2 (en)2017-12-052020-05-12International Business Machines CorporationStateless session synchronization between secure communication interceptors
US10681085B2 (en)2017-10-162020-06-09International Business Machines CorporationQuick transport layer security/secure sockets layer connection for internet of things devices
US20220021656A1 (en)*2015-05-272022-01-20Ping Identity CorporationScalable proxy clusters
US11431706B2 (en)2017-09-082022-08-30Kabushiki Kaisha ToshibaCommunication control system and communication control device
US11783033B2 (en)2017-10-132023-10-10Ping Identity CorporationMethods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions
US11843605B2 (en)2019-01-042023-12-12Ping Identity CorporationMethods and systems for data traffic based adaptive security
US11855968B2 (en)2016-10-262023-12-26Ping Identity CorporationMethods and systems for deep learning based API traffic security

Families Citing this family (238)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8166547B2 (en)2005-09-062012-04-24Fortinet, Inc.Method, apparatus, signals, and medium for managing a transfer of data in a data network
US8782393B1 (en)2006-03-232014-07-15F5 Networks, Inc.Accessing SSL connection data by a third-party
US8510560B1 (en)2008-08-202013-08-13Marvell International Ltd.Efficient key establishment for wireless networks
WO2010033497A1 (en)2008-09-182010-03-25Marvell World Trade Ltd.Preloading applications onto memory at least partially during boot up
US9769149B1 (en)*2009-07-022017-09-19Sonicwall Inc.Proxy-less secure sockets layer (SSL) data inspection
US8700892B2 (en)2010-03-192014-04-15F5 Networks, Inc.Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US20120030475A1 (en)*2010-08-022012-02-02Ma Felix Kuo-WeMachine-machine authentication method and human-machine authentication method for cloud computing
FR2966669B1 (en)*2010-10-212013-07-05Ipanema Technologies METHOD OF OPTIMIZING THE TRANSFER OF SECURE DATA STREAMS VIA AN AUTONOMOUS NETWORK
US9544770B2 (en)2010-12-012017-01-10Microsoft Technology Licensing, LlcUser authentication in a mobile environment
US9998545B2 (en)*2011-04-022018-06-12Open Invention Network, LlcSystem and method for improved handshake protocol
US8743885B2 (en)2011-05-032014-06-03Cisco Technology, Inc.Mobile service routing in a network environment
US8694782B2 (en)*2011-05-042014-04-08Marvell World Trade Ltd.Wireless authentication using beacon messages
US9049025B1 (en)*2011-06-202015-06-02Cellco PartnershipMethod of decrypting encrypted information for unsecure phone
CN102868665B (en)*2011-07-052016-07-27华为软件技术有限公司The method of data transmission and device
US8914635B2 (en)*2011-07-252014-12-16Grey Heron Technologies, LlcMethod and system for establishing secure communications using composite key cryptography
US9015469B2 (en)2011-07-282015-04-21Cloudflare, Inc.Supporting secure sessions in a cloud-based proxy service
US10362019B2 (en)2011-07-292019-07-23Amazon Technologies, Inc.Managing security credentials
US11444936B2 (en)2011-07-292022-09-13Amazon Technologies, Inc.Managing security credentials
US8856910B1 (en)*2011-08-312014-10-07Palo Alto Networks, Inc.Detecting encrypted tunneling traffic
US9264432B1 (en)2011-09-222016-02-16F5 Networks, Inc.Automatic proxy device configuration
US9294452B1 (en)2011-12-092016-03-22Rightquestion, LlcAuthentication translation
US11475105B2 (en)2011-12-092022-10-18Rightquestion, LlcAuthentication translation
US9497171B2 (en)2011-12-152016-11-15Intel CorporationMethod, device, and system for securely sharing media content from a source device
EP3518458B1 (en)*2011-12-152022-04-06INTEL CorporationMethod and device for secure communications over a network using a hardware security engine
US9647835B2 (en)*2011-12-162017-05-09Akamai Technologies, Inc.Terminating SSL connections without locally-accessible private keys
US9531691B2 (en)*2011-12-162016-12-27Akamai Technologies, Inc.Providing forward secrecy in a terminating TLS connection proxy
US8955103B2 (en)2012-01-052015-02-10Hightail, Inc.System and method for decentralized online data transfer and synchronization
US8914629B2 (en)*2012-01-302014-12-16The Nielsen Company (Us), LlcIntercepting encrypted network traffic for internet usage monitoring
US8863250B2 (en)2012-02-012014-10-14Amazon Technologies, Inc.Logout from multiple network sites
JP5746446B2 (en)*2012-02-212015-07-08インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Network node with network-attached stateless security offload device
US9167006B1 (en)2012-02-212015-10-20F5 Networks, Inc.Connection bucketing in mirroring asymmetric clustered multiprocessor systems
US9059853B1 (en)*2012-02-222015-06-16Rockwell Collins, Inc.System and method for preventing a computing device from obtaining unauthorized access to a secure network or trusted computing environment
US9537899B2 (en)2012-02-292017-01-03Microsoft Technology Licensing, LlcDynamic selection of security protocol
US8898314B2 (en)*2012-03-212014-11-25Verizon Patent And Licensing Inc.Direct communication between applications in a cloud computing environment
US9166959B2 (en)*2012-03-312015-10-20Intel CorporationSecure communication using physical proximity
US9348927B2 (en)2012-05-072016-05-24Smart Security Systems LlcSystems and methods for detecting, identifying and categorizing intermediate nodes
JP5295408B1 (en)*2012-05-132013-09-18淳也 榎本 Secure communication method, operated device, and operation program
US8843738B2 (en)*2012-05-142014-09-23Sierra Wireless, Inc.TLS abbreviated session identifier protocol
US10778659B2 (en)2012-05-242020-09-15Smart Security Systems LlcSystem and method for protecting communications
US9325676B2 (en)2012-05-242016-04-26Ip Ghoster, Inc.Systems and methods for protecting communications between nodes
WO2013188875A1 (en)*2012-06-152013-12-19Massachusetts Institute Of TechnologyOptimized transport layer security
US8862882B2 (en)*2012-06-292014-10-14Intel CorporationSystems and methods for authenticating devices by adding secure features to Wi-Fi tags
ES2628613T3 (en)*2012-09-172017-08-03Huawei Technologies Co., Ltd. Attack protection method and device
US9680813B2 (en)*2012-10-242017-06-13Cyber-Ark Software Ltd.User provisioning
EP2836951A4 (en)2012-10-242015-07-01Cyber Ark Software LtdA system and method for secure proxy-based authentication
KR20140052703A (en)*2012-10-252014-05-07삼성전자주식회사Method and apparatus for accelerating web service using a proxy server
US9277017B2 (en)2012-10-302016-03-01Netiq CorporationTechniques for device independent session migration
US9219762B2 (en)*2012-10-302015-12-22Netiq CorporationTechniques for desktop migration
EP2918140B1 (en)*2012-11-072020-05-06Provenance Asset Group LLCProxy connection method and apparatus
US8856515B2 (en)2012-11-082014-10-07Intel CorporationImplementation of robust and secure content protection in a system-on-a-chip apparatus
JP6172546B2 (en)2012-12-282017-08-02▲ホア▼▲ウェイ▼技術有限公司Huawei Technologies Co.,Ltd. Traffic steering method, device, and system
US9575768B1 (en)2013-01-082017-02-21Marvell International Ltd.Loading boot code from multiple memories
US8874761B2 (en)2013-01-252014-10-28Seven Networks, Inc.Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US9516102B2 (en)*2013-03-072016-12-06F5 Networks, Inc.Server to client reverse persistence
US8782774B1 (en)2013-03-072014-07-15Cloudflare, Inc.Secure session capability using public-key cryptography without access to the private key
US9026783B2 (en)2013-03-072015-05-05Google Inc.Low latency server-side redirection of UDP-based transport protocols traversing a client-side NAT firewall
US9043593B2 (en)2013-03-112015-05-26International Business Machines CorporationSession attribute propagation through secure database server tiers
US9794379B2 (en)2013-04-262017-10-17Cisco Technology, Inc.High-efficiency service chaining with agentless service nodes
US9137218B2 (en)*2013-05-032015-09-15Akamai Technologies, Inc.Splicing into an active TLS session without a certificate or private key
US9736801B1 (en)2013-05-202017-08-15Marvell International Ltd.Methods and apparatus for synchronizing devices in a wireless data communication system
US9521635B1 (en)2013-05-212016-12-13Marvell International Ltd.Methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system
US9300629B1 (en)*2013-05-312016-03-29Palo Alto Networks, Inc.Password constraint enforcement used in external site authentication
EP3008942B1 (en)2013-06-112018-10-10Seven Networks, LLCApplication and/or server stability in signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US9225704B1 (en)2013-06-132015-12-29Amazon Technologies, Inc.Unified management of third-party accounts
US9602540B1 (en)2013-06-132017-03-21Amazon Technologies, Inc.Enforcing restrictions on third-party accounts
US9531704B2 (en)*2013-06-252016-12-27Google Inc.Efficient network layer for IPv6 protocol
US10530757B2 (en)2013-07-252020-01-07Convida Wireless, LlcEnd-to-end M2M service layer sessions
WO2015015305A1 (en)2013-07-312015-02-05Marvell Word Trade Ltd.Parallelizing boot operations
US9491157B1 (en)2013-09-272016-11-08F5 Networks, Inc.SSL secured NTLM acceleration
US9225516B1 (en)*2013-10-032015-12-29Whatsapp Inc.Combined authentication and encryption
JPWO2015056601A1 (en)*2013-10-162017-03-09日本電信電話株式会社 Key device, key cloud system, decryption method, and program
US10069811B2 (en)*2013-10-172018-09-04Arm Ip LimitedRegistry apparatus, agent device, application providing apparatus and corresponding methods
WO2015055246A1 (en)*2013-10-172015-04-23Telefonaktiebolaget L M Ericsson (Publ)Authentication of wireless device entity
US9307405B2 (en)2013-10-172016-04-05Arm Ip LimitedMethod for assigning an agent device from a first device registry to a second device registry
US20150120943A1 (en)*2013-10-292015-04-30Homersoft Sp. Zo.O.Secure mobile access to resources within a private network
US10475018B1 (en)2013-11-292019-11-12Amazon Technologies, Inc.Updating account data for multiple account providers
CN103618726A (en)*2013-12-042014-03-05北京中创信测科技股份有限公司Method for recognizing mobile data service based on HTTPS
US10037514B2 (en)*2013-12-192018-07-31Centurylink Intellectual Property LlcUbiquitous in-cloud microsite generator for high speed data customer intake and activation
US10382595B2 (en)2014-01-292019-08-13Smart Security Systems LlcSystems and methods for protecting communications
US9344337B2 (en)2014-03-132016-05-17Cisco Technology, Inc.Service node originated service chains in a network environment
US10116731B2 (en)*2014-03-132018-10-30Oncam Global, Inc.Method and systems for providing data to a remote site
US9426176B2 (en)2014-03-212016-08-23Cisco Technology, Inc.Method, system, and logic for in-band exchange of meta-information
US8996873B1 (en)2014-04-082015-03-31Cloudflare, Inc.Secure session capability using public-key cryptography without access to the private key
US8966267B1 (en)2014-04-082015-02-24Cloudflare, Inc.Secure session capability using public-key cryptography without access to the private key
US9184911B2 (en)*2014-04-082015-11-10Cloudflare, Inc.Secure session capability using public-key cryptography without access to the private key
US9379931B2 (en)2014-05-162016-06-28Cisco Technology, Inc.System and method for transporting information to services in a network environment
US9479443B2 (en)2014-05-162016-10-25Cisco Technology, Inc.System and method for transporting information to services in a network environment
CN105207972B (en)*2014-06-172018-03-30腾讯科技(深圳)有限公司The data processing method and device of channel
US9712563B2 (en)2014-07-072017-07-18Cyber-Ark Software Ltd.Connection-specific communication management
KR101670496B1 (en)*2014-08-272016-10-28주식회사 파수닷컴Data management method, Computer program for the same, Recording medium storing computer program for the same, and User Client for the same
GB2530028B8 (en)2014-09-082021-08-04Advanced Risc Mach LtdRegistry apparatus, agent device, application providing apparatus and corresponding methods
CN104301333A (en)*2014-11-052015-01-21中国科学技术大学 Method and system for implementing non-blocking handshake
US10417025B2 (en)2014-11-182019-09-17Cisco Technology, Inc.System and method to chain distributed applications in a network environment
USRE48131E1 (en)2014-12-112020-07-28Cisco Technology, Inc.Metadata augmentation in a service function chain
US9660909B2 (en)2014-12-112017-05-23Cisco Technology, Inc.Network service header metadata for load balancing
CN104580190B (en)*2014-12-302018-09-04北京奇虎科技有限公司The implementation method and secure browser device of secure browser
US10608818B2 (en)*2015-01-162020-03-31Autonetworks Technologies, Ltd.In-vehicle communication system having a comparison means for verifying data and a comparison method for verifying data
US10158742B2 (en)*2015-02-182018-12-18Actmobile Networks, Inc.Multi-stage acceleration system and method
US9871772B1 (en)2015-03-172018-01-16The Charles Stark Draper Laboratory, Inc.Cryptographic system for secure command and control of remotely controlled devices
US9614816B2 (en)*2015-03-232017-04-04Oracle International CorporationDynamic encryption for tunneled real-time communications
US10834065B1 (en)*2015-03-312020-11-10F5 Networks, Inc.Methods for SSL protected NTLM re-authentication and devices thereof
US9660969B2 (en)2015-03-312017-05-23Here Global B.V.Method and apparatus for providing key management for data encryption for cloud-based big data environments
US11032379B2 (en)*2015-04-242021-06-08Citrix Systems, Inc.Secure in-band service detection
JP6577999B2 (en)*2015-04-302019-09-18日本電信電話株式会社 Data transmission / reception method and system
US10205598B2 (en)2015-05-032019-02-12Ronald Francis Sulpizio, JR.Temporal key generation and PKI gateway
US20170026414A1 (en)*2015-05-072017-01-26Saguna Networks Ltd.Methods Circuits Devices Systems and Functionally Associated Computer Executable Code for Managing a Data Access Network
US9774572B2 (en)*2015-05-112017-09-26Salesforce.Com, Inc.Obfuscation of references to network resources
US9762402B2 (en)2015-05-202017-09-12Cisco Technology, Inc.System and method to facilitate the assignment of service functions for service chains in a network environment
US9967236B1 (en)2015-07-312018-05-08Palo Alto Networks, Inc.Credentials enforcement using a firewall
US10051001B1 (en)2015-07-312018-08-14Palo Alto Networks, Inc.Efficient and secure user credential store for credentials enforcement using a firewall
US9450944B1 (en)*2015-10-142016-09-20FullArmor CorporationSystem and method for pass-through authentication
US9762563B2 (en)2015-10-142017-09-12FullArmor CorporationResource access system and method
US9992238B2 (en)*2015-11-112018-06-05International Business Machines CorporationProxy based data transfer utilizing direct memory access
US20170163607A1 (en)*2015-12-032017-06-08Microsoft Technology Licensing, LlcEstablishing a Communication Event Using Secure Signalling
US10469594B2 (en)*2015-12-082019-11-05A10 Networks, Inc.Implementation of secure socket layer intercept
US10505984B2 (en)*2015-12-082019-12-10A10 Networks, Inc.Exchange of control information between secure socket layer gateways
US10305871B2 (en)2015-12-092019-05-28Cloudflare, Inc.Dynamically serving digital certificates based on secure session properties
US10187475B2 (en)*2015-12-312019-01-22Hughes Network Systems, LlcMethod and system for automatically bypassing network proxies in the presence of interdependent traffic flows
US10277562B1 (en)*2016-01-122019-04-30Symantec CorporationControlling encrypted traffic flows using out-of-path analysis devices
GB2546340A (en)*2016-01-182017-07-19Isis InnovationImproving security protocols
US11044203B2 (en)2016-01-192021-06-22Cisco Technology, Inc.System and method for hosting mobile packet core and value-added services using a software defined network and service chains
US10250637B2 (en)*2016-01-292019-04-02Citrix Systems, Inc.System and method of pre-establishing SSL session connections for faster SSL connection establishment
BR112018016234A2 (en)*2016-02-232019-01-02Nchain Holdings Ltd computer-implemented method for controlling access to a resource, computer-based systems and method for controlling access to a digital wallet
US10979412B2 (en)2016-03-082021-04-13Nxp Usa, Inc.Methods and apparatus for secure device authentication
KR101847636B1 (en)*2016-03-142018-04-10주식회사 수산아이앤티Method and apprapatus for watching encrypted traffic
US10187306B2 (en)2016-03-242019-01-22Cisco Technology, Inc.System and method for improved service chaining
EP3438860B1 (en)*2016-03-292020-06-03Ricoh Company, Ltd.Service provision system, service exchange system, service provision method, and program
JP6620883B2 (en)2016-03-292019-12-18株式会社リコー Service providing system, service delivery system, service providing method, and program
JP6620884B2 (en)*2016-03-292019-12-18株式会社リコー Service providing system, service delivery system, service providing method, and program
US10931793B2 (en)2016-04-262021-02-23Cisco Technology, Inc.System and method for automated rendering of service chaining
CN109588057B (en)2016-05-112021-09-07康维达无线有限责任公司 A method and apparatus for connecting to a network via a communication circuit
US10264079B2 (en)2016-05-182019-04-16Cisco Technology, Inc.Fastpath web sessions with HTTP header modification by redirecting clients
CN109644089B (en)2016-06-152022-04-26康维达无线有限责任公司 Unlicensed uplink transmission for new radio
GB2551580A (en)*2016-06-242017-12-27Sony CorpData communications
US10116634B2 (en)*2016-06-282018-10-30A10 Networks, Inc.Intercepting secure session upon receipt of untrusted certificate
US10250596B2 (en)*2016-06-292019-04-02International Business Machines CorporationMonitoring encrypted communication sessions
US10419550B2 (en)2016-07-062019-09-17Cisco Technology, Inc.Automatic service function validation in a virtual network environment
US11503314B2 (en)2016-07-082022-11-15Interdigital Madison Patent Holdings, SasSystems and methods for region-of-interest tone remapping
US10291405B2 (en)*2016-07-152019-05-14International Business Machines CorporationSeamless abort and reinstatement of TLS sessions
US10320664B2 (en)2016-07-212019-06-11Cisco Technology, Inc.Cloud overlay for operations administration and management
US10218616B2 (en)2016-07-212019-02-26Cisco Technology, Inc.Link selection for communication with a service function cluster
US10225270B2 (en)2016-08-022019-03-05Cisco Technology, Inc.Steering of cloned traffic in a service function chain
EP3497812A1 (en)2016-08-112019-06-19Convida Wireless, LLCBeamforming sweeping and training in a flexible frame structure for new radio
US10218593B2 (en)2016-08-232019-02-26Cisco Technology, Inc.Identifying sources of packet drops in a service function chain environment
US10361969B2 (en)2016-08-302019-07-23Cisco Technology, Inc.System and method for managing chained services in a network environment
CN106302507A (en)*2016-08-312017-01-04北京盛世光明软件股份有限公司A kind of method based on SSL network data analytic technique
CN106453259A (en)*2016-09-132017-02-22广州善融信息科技有限公司Internet finance safety link realization method based on block chaining encryption technology
CN109891772B (en)2016-11-032022-10-04康维达无线有限责任公司 Frame structure in NR
US10382562B2 (en)*2016-11-042019-08-13A10 Networks, Inc.Verification of server certificates using hash codes
EP3583780B1 (en)2017-02-172023-04-05InterDigital Madison Patent Holdings, SASSystems and methods for selective object-of-interest zooming in streaming video
US10225187B2 (en)2017-03-222019-03-05Cisco Technology, Inc.System and method for providing a bit indexed service chain
US10476673B2 (en)2017-03-222019-11-12Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US10554684B2 (en)*2017-03-292020-02-04Juniper Networks, Inc.Content-based optimization and pre-fetching mechanism for security analysis on a network device
US10469459B2 (en)2017-04-072019-11-05Fujitsu LimitedUse of optical transport network overhead data for encryption
US10511629B2 (en)2017-04-072019-12-17Fujitsu LimitedEncryption control in optical networks without data loss
US10511582B2 (en)*2017-04-072019-12-17Fujitsu LimitedSimplified encryption key generation in optical networks
US10257033B2 (en)2017-04-122019-04-09Cisco Technology, Inc.Virtualized network functions and service chaining in serverless computing infrastructure
US10884807B2 (en)2017-04-122021-01-05Cisco Technology, Inc.Serverless computing and task scheduling
US10333855B2 (en)2017-04-192019-06-25Cisco Technology, Inc.Latency reduction in service function paths
US10554689B2 (en)2017-04-282020-02-04Cisco Technology, Inc.Secure communication session resumption in a service function chain
US11418364B2 (en)2017-06-072022-08-16Combined Conditional Access Development And Support, LlcDetermining a session key using session data
US10735275B2 (en)2017-06-162020-08-04Cisco Technology, Inc.Releasing and retaining resources for use in a NFV environment
US10798187B2 (en)2017-06-192020-10-06Cisco Technology, Inc.Secure service chaining
US10645183B2 (en)*2017-06-262020-05-05Microsoft Technology Licensing, LlcRedirection of client requests to multiple endpoints
US10397271B2 (en)2017-07-112019-08-27Cisco Technology, Inc.Distributed denial of service mitigation for web conferencing
US10673698B2 (en)2017-07-212020-06-02Cisco Technology, Inc.Service function chain optimization using live testing
US11063856B2 (en)2017-08-242021-07-13Cisco Technology, Inc.Virtual network function monitoring in a network function virtualization deployment
US10791065B2 (en)2017-09-192020-09-29Cisco Technology, Inc.Systems and methods for providing container attributes as part of OAM techniques
US10666430B2 (en)*2017-09-292020-05-26Intel CorporationSystem and techniques for encrypting chip-to-chip communication links
US10841096B2 (en)*2017-10-032020-11-17Salesforce.Com, Inc.Encrypted self-identification using a proxy server
US11018981B2 (en)2017-10-132021-05-25Cisco Technology, Inc.System and method for replication container performance and policy validation using real time network traffic
US9967292B1 (en)2017-10-252018-05-08Extrahop Networks, Inc.Inline secret sharing
US10541893B2 (en)2017-10-252020-01-21Cisco Technology, Inc.System and method for obtaining micro-service telemetry data
US10880268B2 (en)*2017-12-232020-12-29Mcafee, LlcDecrypting transport layer security traffic without man-in-the-middle proxy
US11082212B2 (en)*2017-12-262021-08-03Industrial Technology Research InstituteSystem and method for communication service verification, and verification server thereof
US10389574B1 (en)2018-02-072019-08-20Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10270794B1 (en)2018-02-092019-04-23Extrahop Networks, Inc.Detection of denial of service attacks
US11194930B2 (en)2018-04-272021-12-07Datatrendz, LlcUnobtrusive systems and methods for collecting, processing and securing information transmitted over a network
US11240858B2 (en)*2018-04-272022-02-01Nokia Solutions And Networks OyTraffic steering for stateless packets over multipath networks
WO2019213531A1 (en)*2018-05-042019-11-07Citrix Systems, Inc.Systems and methods for an embedded browser
US10666612B2 (en)2018-06-062020-05-26Cisco Technology, Inc.Service chains for inter-cloud traffic
US10411978B1 (en)2018-08-092019-09-10Extrahop Networks, Inc.Correlating causes and effects associated with network activity
US10887289B2 (en)2018-08-212021-01-05Fujitsu LimitedEncryption in optical transport networks using multiple randomly selected keys
CN119922729A (en)2018-09-272025-05-02交互数字专利控股公司 Sub-band operation in unlicensed spectrum for new radio
US11483295B2 (en)*2018-12-052022-10-25Citrix Systems, Inc.Method for securely negotiating end-to-end cryptographic context using inline messages through multiple proxies in cloud and customer environment
US11411924B2 (en)*2018-12-202022-08-09Check Point Software Technologies Ltd.Method for performing TLS/SSL inspection based on verified subject name
US11178218B2 (en)*2019-01-022021-11-16Citrix Systems, Inc.Bidirectional communication clusters
CN112334902B (en)*2019-01-042024-11-15百度时代网络技术(北京)有限公司 Method for establishing a secure information exchange channel between a host system and a data processing accelerator
WO2020151809A1 (en)*2019-01-222020-07-30Telefonaktiebolaget Lm Ericsson (Publ)Security for distributed networking
US11245685B2 (en)2019-01-232022-02-08Mcafee, LlcMethods and apparatus to verify encrypted handshakes
JP7191726B2 (en)*2019-03-042022-12-19株式会社東芝 Communication controller and communication system
JP7191727B2 (en)*2019-03-042022-12-19株式会社東芝 Communication controller and communication system
JP7204534B2 (en)*2019-03-042023-01-16株式会社東芝 Communications system
JP7278806B2 (en)*2019-03-042023-05-22株式会社東芝 Communication controller and communication system
JP7278807B2 (en)*2019-03-042023-05-22株式会社東芝 Communication controller and communication system
US11019044B2 (en)*2019-03-082021-05-25Gigamon Inc.Correlating network flows through a proxy device
US11516286B2 (en)2019-03-282022-11-29Comcast Cable Communications, LlcManaging service capacity
US11070566B2 (en)*2019-03-292021-07-20Dell Products L.P.System and method to secure renegotiation of connections between a baseboard management controller and a hosted agent
US10693872B1 (en)*2019-05-172020-06-23Q5ID, Inc.Identity verification system
CN110166561B (en)*2019-05-242022-04-15北京旷视科技有限公司Data processing method, device, system, equipment and medium for wearable equipment
US10965702B2 (en)2019-05-282021-03-30Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
JP7159117B2 (en)*2019-06-242022-10-24株式会社東芝 Article Sorting Control Device, Article Sorting Control Program, and Article Sorting System
ES3029641T3 (en)*2019-07-172025-06-24Siemens Mobility GmbHMethod and communication unit for cryptographically protected unidirectional data transmission of useful data between two networks
US11165814B2 (en)2019-07-292021-11-02Extrahop Networks, Inc.Modifying triage information based on network monitoring
US10742530B1 (en)2019-08-052020-08-11Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11388072B2 (en)2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US10742677B1 (en)2019-09-042020-08-11Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US20210075777A1 (en)2019-09-062021-03-11Winston PrivacyMethod and system for asynchronous side channel cipher renegotiation
CN110572418B (en)*2019-10-252022-08-19国机智骏汽车有限公司Vehicle identity authentication method and device, computer equipment and storage medium
US11283630B2 (en)2019-11-052022-03-22International Business Machines CorporationServer/server certificates exchange flow
US11165823B2 (en)2019-12-172021-11-02Extrahop Networks, Inc.Automated preemptive polymorphic deception
CN111064791B (en)*2019-12-192022-08-23中国移动通信集团江苏有限公司Method, device, equipment and medium for processing identifier field of JMS (Java Server System) message
CN111355713B (en)*2020-02-202022-09-30深信服科技股份有限公司Proxy access method, device, proxy gateway and readable storage medium
US10903990B1 (en)2020-03-112021-01-26Cloudflare, Inc.Establishing a cryptographic tunnel between a first tunnel endpoint and a second tunnel endpoint where a private key used during the tunnel establishment is remotely located from the second tunnel endpoint
US11800539B2 (en)*2020-05-182023-10-24Lynk Global, Inc.Messaging from an orbital base station to cellular user equipment applications with message processing via a card operating system
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
WO2022066910A1 (en)*2020-09-232022-03-31Extrahop Networks, Inc.Monitoring encrypted network traffic
US20230379150A1 (en)*2020-09-292023-11-23Telefonaktiebolaget Lm Ericsson (Publ)Methods and apparatuses for providing communication between a server and a client device via a proxy node
US11658820B2 (en)*2020-10-052023-05-23Vmware, Inc.Workflow for enabling data-in-transit in a distributed system
CN112511552B (en)*2020-12-082022-12-09山石网科通信技术股份有限公司Information prompting method and device in SSL proxy process
US11539755B1 (en)*2021-03-222022-12-27Trend Micro IncorporatedDecryption of encrypted network traffic using an inline network traffic monitor
US11349861B1 (en)2021-06-182022-05-31Extrahop Networks, Inc.Identifying network entities based on beaconing activity
DE102021206755A1 (en)2021-06-292022-12-29Siemens Mobility GmbH Management of keys for secure communication between communication participants via a separate communication channel
CN113810396A (en)*2021-09-072021-12-17北京明朝万达科技股份有限公司Data management and control method and device, electronic equipment and storage medium
US11296967B1 (en)2021-09-232022-04-05Extrahop Networks, Inc.Combining passive network analysis and active probing
US12206690B2 (en)2021-09-232025-01-21Mcafee, LlcMethods, systems, articles of manufacture and apparatus to reduce computation corresponding to inspection of non-malicious data flows
US11941266B2 (en)2021-10-202024-03-26Samsung Electronics Co., Ltd.Resource isolation in computational storage devices
US11824845B2 (en)*2021-10-282023-11-21Cisco Technology, Inc.Automatic encryption for cloud-native workloads
CN114124334B (en)*2021-11-162024-04-23紫光展锐(重庆)科技有限公司Processing method, client, equipment and medium of air interface data packet
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
CN114553939B (en)*2022-04-252022-07-19北京广通优云科技股份有限公司Encryption flow-based resource stable switching method in IT intelligent operation and maintenance system
CN115296847B (en)*2022-07-062024-02-13杭州涂鸦信息技术有限公司Flow control method, flow control device, computer equipment and storage medium
US12238226B2 (en)*2022-07-122025-02-25Dell Products L.P.Secure distribution of a client certificate private key to client-based services
US20240073188A1 (en)*2022-08-232024-02-29Cisco Technology, Inc.Optimal routing for secure access to resources
CN115514583B (en)*2022-11-212023-03-24北京长亭未来科技有限公司Flow acquisition and blocking method, system, equipment and storage medium
US20240214222A1 (en)*2022-12-212024-06-27Electronics And Telecommunications Research InstituteTls-based authentication method without intervention of certificate authority
CN116599652A (en)*2022-12-302023-08-15北京科东电力控制系统有限责任公司Safe communication method for distributed power supply power dispatching system
US20250200180A1 (en)*2023-12-152025-06-19International Business Machines CorporationMalware Encryption Detection - Host Encrypted Data Communication Algorithm

Family Cites Families (216)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5412730A (en)1989-10-061995-05-02Telequip CorporationEncrypted data transmission system employing means for randomly altering the encryption keys
US5319638A (en)1991-09-121994-06-07Bell Communications Research, Inc.Link-by-link congestion control for packet transmission systems
JP2966198B2 (en)*1992-06-041999-10-25信越化学工業株式会社 Polymer scale adhesion inhibitor, polymerization vessel for preventing adhesion of polymer scale, and method for producing polymer using the same
US5267314A (en)1992-11-171993-11-30Leon StamblerSecure transaction system and method utilized therein
US5657390A (en)1995-08-251997-08-12Netscape Communications CorporationSecure socket layer application program apparatus and method
US6703757B2 (en)1995-09-132004-03-09Delta Electronics Inc.Motor structure having low profile
US6724893B1 (en)1996-10-112004-04-20The United States Of America As Represented By The National Security AgencyMethod of passing a cryptographic key that allows third party access to the key
US5991881A (en)1996-11-081999-11-23Harris CorporationNetwork surveillance system
US6104716A (en)1997-03-282000-08-15International Business Machines CorporationMethod and apparatus for lightweight secure communication tunneling over the internet
US6212636B1 (en)1997-05-012001-04-03Itt Manufacturing EnterprisesMethod for establishing trust in a computer network via association
US6061454A (en)1997-06-272000-05-09International Business Machines Corp.System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver
US7117358B2 (en)1997-07-242006-10-03Tumbleweed Communications Corp.Method and system for filtering communication
US6094485A (en)1997-09-182000-07-25Netscape Communications CorporationSSL step-up
US5974143A (en)1997-09-301999-10-26Intel CorporationVirus-resistent mechanism for transaction verification to confirming user
US6134584A (en)1997-11-212000-10-17International Business Machines CorporationMethod for accessing and retrieving information from a source maintained by a network server
US6052785A (en)1997-11-212000-04-18International Business Machines CorporationMultiple remote data access security mechanism for multitiered internet computer networks
US6084969A (en)1997-12-312000-07-04V-One CorporationKey encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
US6681327B1 (en)1998-04-022004-01-20Intel CorporationMethod and system for managing secure client-server transactions
US6175869B1 (en)1998-04-082001-01-16Lucent Technologies Inc.Client-side techniques for web server allocation
US6105067A (en)1998-06-052000-08-15International Business Machines Corp.Connection pool management for backend servers using common interface
US6223287B1 (en)1998-07-242001-04-24International Business Machines CorporationMethod for establishing a secured communication channel over the internet
CA2287813C (en)1998-10-222005-03-29At&T Corp.System and method for network load balancing
US6799270B1 (en)1998-10-302004-09-28Citrix Systems, Inc.System and method for secure distribution of digital information to a chain of computer system nodes in a network
US6367009B1 (en)1998-12-172002-04-02International Business Machines CorporationExtending SSL to a multi-tier environment using delegation of authentication and authority
US7430757B1 (en)1999-01-082008-09-30International Business Machines CorporationOblivious proxying using a secure coprocessor
US7904951B1 (en)1999-03-162011-03-08Novell, Inc.Techniques for securely accelerating external domains locally
US7249377B1 (en)1999-03-312007-07-24International Business Machines CorporationMethod for client delegation of security to a proxy
US6526131B1 (en)1999-04-302003-02-25Hewlett-Packard CompanyInitiation of communication between network service system and customer-premises equipment
US6718388B1 (en)1999-05-182004-04-06Jp Morgan Chase BankSecured session sequencing proxy system and method therefor
TW425821B (en)1999-05-312001-03-11Ind Tech Res InstKey management method
US7146505B1 (en)1999-06-012006-12-05America Online, Inc.Secure data exchange between date processing systems
US7142676B1 (en)*1999-06-082006-11-28Entrust LimitedMethod and apparatus for secure communications using third-party key provider
US6584567B1 (en)1999-06-302003-06-24International Business Machines CorporationDynamic connection to multiple origin servers in a transcoding proxy
US6374300B2 (en)1999-07-152002-04-16F5 Networks, Inc.Method and system for storing load balancing information with an HTTP cookie
US6567857B1 (en)1999-07-292003-05-20Sun Microsystems, Inc.Method and apparatus for dynamic proxy insertion in network traffic flow
US6751677B1 (en)1999-08-242004-06-15Hewlett-Packard Development Company, L.P.Method and apparatus for allowing a secure and transparent communication between a user device and servers of a data access network system via a firewall and a gateway
US6772333B1 (en)1999-09-012004-08-03Dickens Coal LlcAtomic session-start operation combining clear-text and encrypted sessions to provide id visibility to middleware such as load-balancers
US6732269B1 (en)1999-10-012004-05-04International Business Machines CorporationMethods, systems and computer program products for enhanced security identity utilizing an SSL proxy
US6728884B1 (en)1999-10-012004-04-27Entrust, Inc.Integrating heterogeneous authentication and authorization mechanisms into an application access control system
US6643701B1 (en)1999-11-172003-11-04Sun Microsystems, Inc.Method and apparatus for providing secure communication with a relay in a network
US6704798B1 (en)2000-02-082004-03-09Hewlett-Packard Development Company, L.P.Explicit server control of transcoding representation conversion at a proxy or client location
US8291007B2 (en)2000-02-222012-10-16Flash Networks LtdSystem and method to accelerate client/server interactions using predictive requests
US6918041B1 (en)2000-02-232005-07-12Microsoft CorporationSystem and method of network communication with client-forced authentication
US7343413B2 (en)2000-03-212008-03-11F5 Networks, Inc.Method and system for optimizing a network by independently scaling control segments and data flow
US6674717B1 (en)2000-03-302004-01-06Network Physics, Inc.Method for reducing packet loss and increasing internet flow by feedback control
US6742044B1 (en)2000-05-102004-05-25Cisco Technology, Inc.Distributed network traffic load balancing technique implemented without gateway router
JP3730480B2 (en)2000-05-232006-01-05株式会社東芝 Gateway device
US20020035681A1 (en)2000-07-312002-03-21Guillermo MaturanaStrategy for handling long SSL messages
DE10037500A1 (en)2000-08-012002-02-28Deutsche Telekom Ag Method for key agreement for a cryptographically secured point-to-multipoint connection
EP1305931B1 (en)2000-08-042006-06-28Avaya Technology Corp.Method and system for demand driven recognition of connection oriented transactions
US20040015725A1 (en)2000-08-072004-01-22Dan BonehClient-side inspection and processing of secure content
US7137143B2 (en)2000-08-072006-11-14Ingrian Systems Inc.Method and system for caching secure web content
US7266613B1 (en)2000-08-092007-09-04Microsoft CorporationFast dynamic measurement of bandwidth in a TCP network environment
US7370015B2 (en)2000-10-122008-05-06Sap Portals Israel Ltd.User impersonation by a proxy server
US20020069241A1 (en)2000-12-062002-06-06Girija NarlikarMethod and apparatus for client-side proxy selection
US7254237B1 (en)2001-01-122007-08-07Slt Logic, LlcSystem and method for establishing a secure connection
US7360075B2 (en)2001-02-122008-04-15Aventail Corporation, A Wholly Owned Subsidiary Of Sonicwall, Inc.Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
US7383329B2 (en)2001-02-132008-06-03Aventail, LlcDistributed cache for state transfer operations
US20020116732A1 (en)*2001-02-132002-08-22Leandro ChristmannMicroinjection assembly and methods for microinjecting and reimplanting avian eggs
US7370351B1 (en)2001-03-222008-05-06Novell, Inc.Cross domain authentication and security services using proxies for HTTP access
US7322040B1 (en)2001-03-272008-01-22Microsoft CorporationAuthentication architecture
GB2374497B (en)2001-04-032003-03-12Ericsson Telefon Ab L MFacilitating legal interception of IP connections
US7017049B2 (en)2001-04-122006-03-21International Business Machines CorporationMethod and system providing secure socket layer session sharing between network based servers and a client
US7200679B2 (en)2001-04-132007-04-03Telefonaktiebolaget Lm Ericsson (Publ)Creating distributed proxy configurations
US6839761B2 (en)2001-04-192005-01-04Microsoft CorporationMethods and systems for authentication through multiple proxy servers that require different authentication data
US6996841B2 (en)2001-04-192006-02-07Microsoft CorporationNegotiating secure connections through a proxy server
US6914886B2 (en)2001-05-032005-07-05Radware Ltd.Controlling traffic on links between autonomous systems
US7516485B1 (en)2001-05-292009-04-07Nortel Networks LimitedMethod and apparatus for securely transmitting encrypted data through a firewall and for monitoring user traffic
US20020199098A1 (en)2001-06-082002-12-26Davis John M.Non-invasive SSL payload processing for IP packet using streaming SSL parsing
US20050198379A1 (en)2001-06-132005-09-08Citrix Systems, Inc.Automatically reconnecting a client across reliable and persistent communication sessions
US7243370B2 (en)2001-06-142007-07-10Microsoft CorporationMethod and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication
US7853781B2 (en)2001-07-062010-12-14Juniper Networks, Inc.Load balancing secure sockets layer accelerator
US7149892B2 (en)2001-07-062006-12-12Juniper Networks, Inc.Secure sockets layer proxy architecture
US7073066B1 (en)2001-08-282006-07-043Com CorporationOffloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution
JP2003110576A (en)2001-09-262003-04-11Toshiba Corp Wireless network system, wireless network management method, and computer-executable wireless network management program
US7010608B2 (en)2001-09-282006-03-07Intel CorporationSystem and method for remotely accessing a home server while preserving end-to-end security
US7584505B2 (en)2001-10-162009-09-01Microsoft CorporationInspected secure communication protocol
US8020201B2 (en)2001-10-232011-09-13Intel CorporationSelecting a security format conversion for wired and wireless devices
US8601566B2 (en)2001-10-232013-12-03Intel CorporationMechanism supporting wired and wireless methods for client and server side authentication
KR100843494B1 (en)2001-11-062008-07-04인터내셔널 비지네스 머신즈 코포레이션 Methods and systems for supplying data, methods and systems for providing digital signatures, methods and systems for transferring ownership of electronic property, methods and systems for electronic voting, and computer-readable recording media recording computer programs
US7574496B2 (en)2001-11-302009-08-11Surgient, Inc.Virtual server cloud interfacing
US7043632B2 (en)2001-12-122006-05-09Nortel Networks LimitedEnd-to-end security in data networks
US7093121B2 (en)2002-01-102006-08-15Mcafee, Inc.Transferring data via a secure network connection
NO318842B1 (en)2002-03-182005-05-09Telenor Asa Authentication and access control
EP1488594B1 (en)2002-03-202008-01-23Research In Motion LimitedSystem and method for supporting multiple certificate status providers on a mobile communication device
US20030196084A1 (en)2002-04-122003-10-16Emeka OkerekeSystem and method for secure wireless communications using PKI
US7082535B1 (en)2002-04-172006-07-25Cisco Technology, Inc.System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
US7240366B2 (en)2002-05-172007-07-03Microsoft CorporationEnd-to-end authentication of session initiation protocol messages using certificates
US7007163B2 (en)2002-05-312006-02-28Broadcom CorporationMethods and apparatus for accelerating secure session processing
US7219120B2 (en)2002-07-092007-05-15Savvis Communications CorporationSystems, methods and protocols for securing data in transit over networks
US7516491B1 (en)2002-10-172009-04-07Roger SchlaflyLicense tracking system
US7430755B1 (en)2002-09-032008-09-30Fs Networks, Inc.Method and system for providing persistence in a secure network access
US7343398B1 (en)2002-09-042008-03-11Packeteer, Inc.Methods, apparatuses and systems for transparently intermediating network traffic over connection-based authentication protocols
AU2003284204A1 (en)2002-10-152004-05-04Ingrian Networks, Inc.Client-side ssl connection completion through secure proxy server
US7120666B2 (en)2002-10-302006-10-10Riverbed Technology, Inc.Transaction accelerator for client-server communication systems
US8364815B2 (en)2005-03-182013-01-29Riverbed Technology, Inc.Reliability and availability of distributed servers
US8069225B2 (en)2003-04-142011-11-29Riverbed Technology, Inc.Transparent client-server transaction accelerator
US7630305B2 (en)2003-07-292009-12-08Orbital Data CorporationTCP selective acknowledgements for communicating delivered and missed data packets
US8233392B2 (en)2003-07-292012-07-31Citrix Systems, Inc.Transaction boundary detection for reduction in timeout penalties
US7318100B2 (en)2003-04-142008-01-08Riverbed Technology, Inc.Cooperative proxy auto-discovery and connection interception
US7650416B2 (en)*2003-08-122010-01-19Riverbed TechnologyContent delivery for client-server protocols with user affinities using connection end-point proxies
US8176186B2 (en)2002-10-302012-05-08Riverbed Technology, Inc.Transaction accelerator for client-server communications systems
US7574738B2 (en)2002-11-062009-08-11At&T Intellectual Property Ii, L.P.Virtual private network crossovers based on certificates
US7454785B2 (en)2002-12-192008-11-18Avocent Huntsville CorporationProxy method and system for secure wireless administration of managed entities
US7506368B1 (en)2003-02-132009-03-17Cisco Technology, Inc.Methods and apparatus for network communications via a transparent security proxy
US7430557B1 (en)2003-03-192008-09-30Unisys CorporationSystem and method for improving database reorganization time
US7644275B2 (en)2003-04-152010-01-05Microsoft CorporationPass-thru for client authentication
US7206846B1 (en)2003-04-292007-04-17Cisco Technology, Inc.Method and apparatus for adaptively coupling processing components in a distributed system
US8615795B2 (en)2003-06-252013-12-24Ntrepid CorporationSecure network privacy system
US7472285B2 (en)*2003-06-252008-12-30Intel CorporationApparatus and method for memory encryption with reduced decryption latency
US20050001660A1 (en)2003-06-262005-01-06Amit RoyPower-on reset circuit
US7496755B2 (en)2003-07-012009-02-24International Business Machines CorporationMethod and system for a single-sign-on operation providing grid access and network access
JP3912609B2 (en)2003-07-042007-05-09日本電信電話株式会社 Remote access VPN mediation method and mediation device
KR100523357B1 (en)2003-07-092005-10-25한국전자통신연구원Key management device and method for providing security service in epon
US7698453B2 (en)2003-07-292010-04-13Oribital Data CorporationEarly generation of acknowledgements for flow control
US7472413B1 (en)*2003-08-112008-12-30F5 Networks, Inc.Security for WAP servers
US7853699B2 (en)2005-03-152010-12-14Riverbed Technology, Inc.Rules-based transaction prefetching using connection end-point proxies
US7769994B2 (en)2003-08-132010-08-03Radware Ltd.Content inspection in secure networks
US7698549B2 (en)2003-08-152010-04-13Venafi, Inc.Program product for unified certificate requests from certificate authorities
US8321512B2 (en)2003-08-222012-11-27Geobytes, Inc.Method and software product for identifying unsolicited emails
US20050050316A1 (en)2003-08-252005-03-03Amir PelesPassive SSL decryption
US7117333B2 (en)*2003-08-252006-10-03International Business Machines CorporationApparatus, system, and method to estimate memory for recovering data
US20050080428A1 (en)*2003-09-032005-04-14White Ralph RichardExtracapsular surgical procedure for repair of anterior cruciate ligament rupture and surgical referencing instrument therefor
US20050086342A1 (en)2003-09-192005-04-21Andrew BurtTechniques for client-transparent TCP migration
US7328686B2 (en)*2003-09-232008-02-12Ford Global Technologies LlcSystem and method to control cylinder activation and deactivation
US7590840B2 (en)2003-09-262009-09-15Randy LangerMethod and system for authorizing client devices to receive secured data streams
US20050203849A1 (en)*2003-10-092005-09-15Bruce BensonMultimedia distribution system and method
US7584500B2 (en)2003-11-192009-09-01Hughes Network Systems, LlcPre-fetching secure content using proxy architecture
US7890751B1 (en)2003-12-032011-02-15Comtech Ef Data CorpMethod and system for increasing data access in a secure socket layer network environment
WO2005060202A1 (en)2003-12-102005-06-30International Business Machines CorporationMethod and system for analysing and filtering https traffic in corporate networks
US7665126B2 (en)2003-12-172010-02-16Microsoft CorporationMesh networks with exclusion capability
US7523314B2 (en)2003-12-222009-04-21Voltage Security, Inc.Identity-based-encryption message management system
US20050160161A1 (en)2003-12-292005-07-21Nokia, Inc.System and method for managing a proxy request over a secure network using inherited security attributes
EP1702429B1 (en)2004-01-092017-05-10PayPal Israel LtdDetecting relayed communications
US20050187979A1 (en)2004-02-092005-08-25Microsoft CorporationSystem and method for message-level connection management
US7293034B2 (en)2004-02-232007-11-06Microsoft CoporationDynamically customizing a user interface for the aggregation of content
US8116776B1 (en)*2004-03-232012-02-14Cisco Technology, Inc.Mobile communication handoff between heterogeneous networks
US7380129B2 (en)2004-04-222008-05-27International Business Machines CorporationMethod and apparatus for detecting grid intrusions
US20060036755A1 (en)2004-05-072006-02-16Abdullah Ibrahim SMeta-protocol
US20050265235A1 (en)2004-05-272005-12-01International Business Machines CorporationMethod, computer program product, and data processing system for improving transaction-oriented client-server application performance
US7506369B2 (en)2004-05-272009-03-17Microsoft CorporationSecure federation of data communications networks
US8136149B2 (en)2004-06-072012-03-13Check Point Software Technologies, Inc.Security system with methodology providing verified secured individual end points
US20050273650A1 (en)2004-06-072005-12-08Tsou Henry HSystems and methods for backing up computer data to disk medium
JP4339184B2 (en)*2004-06-072009-10-07パナソニック株式会社 Server apparatus, communication device, communication system, communication method, program, and recording medium
US7543146B1 (en)2004-06-182009-06-02Blue Coat Systems, Inc.Using digital certificates to request client consent prior to decrypting SSL communications
US7506164B2 (en)2004-08-092009-03-17Research In Motion LimitedAutomated key management system and method
KR100588211B1 (en)*2004-09-072006-06-08엘지이노텍 주식회사 Optical Disc Turntable Structure
US20060075114A1 (en)2004-09-302006-04-06Citrix Systems, Inc.In-line modification of protocol handshake by protocol aware proxy
KR20060062356A (en)2004-12-032006-06-12엘지노텔 주식회사 Jissie SL processing apparatus and method thereof
US7742406B1 (en)*2004-12-202010-06-22Packeteer, Inc.Coordinated environment for classification and control of network traffic
US7627896B2 (en)2004-12-242009-12-01Check Point Software Technologies, Inc.Security system providing methodology for cooperative enforcement of security policies during SSL sessions
US8943310B2 (en)2005-01-252015-01-27Cisco Technology, Inc.System and method for obtaining a digital certificate for an endpoint
US7661131B1 (en)2005-02-032010-02-09Sun Microsystems, Inc.Authentication of tunneled connections
US7958347B1 (en)2005-02-042011-06-07F5 Networks, Inc.Methods and apparatus for implementing authentication
US9118717B2 (en)2005-02-182015-08-25Cisco Technology, Inc.Delayed network protocol proxy for packet inspection in a network
US20070180227A1 (en)*2005-03-012007-08-02Matsushita Electric Works, Ltd.Decryption apparatus for use in encrypted communications
US8533473B2 (en)2005-03-042013-09-10Oracle America, Inc.Method and apparatus for reducing bandwidth usage in secure transactions
US20060248194A1 (en)2005-03-182006-11-02Riverbed Technology, Inc.Connection forwarding
US7975140B2 (en)2005-04-082011-07-05Nortel Networks LimitedKey negotiation and management for third party access to a secure communication session
JP4567785B2 (en)2005-04-152010-10-20サムスン エレクトロニクス カンパニー リミテッド Triggering apparatus and method for session renegotiation between access network and access terminal in high-speed packet data system
US9436804B2 (en)2005-04-222016-09-06Microsoft Technology Licensing, LlcEstablishing a unique session key using a hardware functionality scan
FI20050491A0 (en)2005-05-092005-05-09Nokia Corp System for delivery of certificates in a communication system
US8266452B2 (en)2005-06-012012-09-11Cisco Technology, Inc.System and method for communicating confidential messages
US8613071B2 (en)*2005-08-102013-12-17Riverbed Technology, Inc.Split termination for secure communication protocols
US20090083537A1 (en)2005-08-102009-03-26Riverbed Technology, Inc.Server configuration selection for ssl interception
US20090119504A1 (en)2005-08-102009-05-07Riverbed Technology, Inc.Intercepting and split-terminating authenticated communication connections
US8478986B2 (en)2005-08-102013-07-02Riverbed Technology, Inc.Reducing latency of split-terminated secure communication protocol sessions
US8438628B2 (en)2005-08-102013-05-07Riverbed Technology, Inc.Method and apparatus for split-terminating a secure network connection, with client authentication
US20070074282A1 (en)2005-08-192007-03-29Black Jeffrey TDistributed SSL processing
US20070078986A1 (en)2005-09-132007-04-05Cisco Technology, Inc.Techniques for reducing session set-up for real-time communications over a network
CN102904749B (en)2005-10-052015-12-09拜尔斯安全公司Adopt the method for safety means protecting network device, safety means and data network
US7725927B2 (en)2005-10-282010-05-25Yahoo! Inc.Low code-footprint security solution
JP4670598B2 (en)2005-11-042011-04-13日本電気株式会社 Network system, proxy server, session management method, and program
US7650389B2 (en)*2006-02-012010-01-19Subhashis MohantyWireless system and method for managing logical documents
US7904949B2 (en)2005-12-192011-03-08Quest Software, Inc.Apparatus, systems and methods to provide authentication services to a legacy application
US8316429B2 (en)2006-01-312012-11-20Blue Coat Systems, Inc.Methods and systems for obtaining URL filtering information
US20070192845A1 (en)2006-02-072007-08-16Xoom CorporationSystem and method for passively detecting a proxy
US20070266233A1 (en)2006-05-122007-11-15Mahesh JethanandaniMethod and apparatus to minimize latency by avoiding small tcp segments in a ssl offload environment
GB0612775D0 (en)2006-06-282006-08-09IbmAn apparatus for securing a communications exchange between computers
US8095787B2 (en)*2006-08-212012-01-10Citrix Systems, Inc.Systems and methods for optimizing SSL handshake processing
US8352728B2 (en)2006-08-212013-01-08Citrix Systems, Inc.Systems and methods for bulk encryption and decryption of transmitted data
US8181227B2 (en)2006-08-292012-05-15Akamai Technologies, Inc.System and method for client-side authenticaton for secure internet communications
US20080101445A1 (en)2006-08-312008-05-01Stoke,Inc.DSL wake-up
US7861290B2 (en)2006-09-222010-12-28Oracle International CorporationNon-invasive insertion of pagelets
JP2008109404A (en)*2006-10-252008-05-08Ricoh Co Ltd Information processing apparatus, communication method, and program
GB0623101D0 (en)2006-11-202006-12-27British TelecommSecure network architecture
US8214635B2 (en)2006-11-282012-07-03Cisco Technology, Inc.Transparent proxy of encrypted sessions
KR20080048764A (en)2006-11-292008-06-03삼성전자주식회사 Method and apparatus for signing on behalf of rights object
US7493383B1 (en)2006-12-292009-02-17F5 Networks, Inc.TCP-over-TCP using multiple TCP streams
US7827405B2 (en)2007-01-192010-11-02Microsoft CorporationMechanism for utilizing kerberos features by an NTLM compliant entity
US7647404B2 (en)2007-01-312010-01-12Edge Technologies, Inc.Method of authentication processing during a single sign on transaction via a content transform proxy service
US7979555B2 (en)2007-02-272011-07-12ExtraHop Networks,Inc.Capture and resumption of network application sessions
US8190875B2 (en)2007-03-222012-05-29Cisco Technology, Inc.Reducing processing load in proxies for secure communications
US20100031337A1 (en)2007-04-092010-02-04Certeon, Inc.Methods and systems for distributed security processing
US8549157B2 (en)2007-04-232013-10-01Mcafee, Inc.Transparent secure socket layer
US8225085B2 (en)2007-06-052012-07-17Blue Coat Systems, Inc.System and method for distributed SSL processing between co-operating nodes
US20090073943A1 (en)2007-08-172009-03-19Qualcomm IncorporatedHeterogeneous wireless ad hoc network
US20090070841A1 (en)2007-09-122009-03-12Proximetry, Inc.Systems and methods for delivery of wireless data and multimedia content to aircraft
EP2597816B1 (en)2007-09-262019-09-11Nicira Inc.Network operating system for managing and securing networks
US8650615B2 (en)2007-09-282014-02-11Emc CorporationCross domain delegation by a storage virtualization system
US8650389B1 (en)2007-09-282014-02-11F5 Networks, Inc.Secure sockets layer protocol handshake mirroring
EP2217995A4 (en)2007-10-262012-11-21Telcordia Tech IncMethod and system for secure session establishment using identity-based encryption (vdtls)
US20090113537A1 (en)2007-10-302009-04-30James WooProxy authentication server
US8190876B2 (en)2007-11-192012-05-29Red Hat, Inc.Renegotiating SSL/TLS connections with client certificates on post requests
JP5006941B2 (en)*2007-12-262012-08-22富士通株式会社 Communication terminal
US8788805B2 (en)2008-02-292014-07-22Cisco Technology, Inc.Application-level service access to encrypted data streams
WO2010008539A1 (en)2008-07-142010-01-21Riverbed Technology, Inc.Methods and systems for secure communications using a local certification authority
US8850553B2 (en)2008-09-122014-09-30Microsoft CorporationService binding
US20100071046A1 (en)2008-09-172010-03-18Yahoo! Inc.Method and System for Enabling Access to a Web Service Provider Through Login Based Badges Embedded in a Third Party Site
EP2345205B1 (en)2008-11-062016-04-27McAfee, Inc.Apparatus and method for mediating connections between policy source servers, corporate repositories, and mobile devices
US7984160B2 (en)2009-03-052011-07-19Riverbed Technology, Inc.Establishing a split-terminated communication connection through a stateful firewall, with network transparency
US8844040B2 (en)*2009-03-202014-09-23Citrix Systems, Inc.Systems and methods for using end point auditing in connection with traffic management
US20100242097A1 (en)2009-03-202010-09-23Wavemarket, Inc.System and method for managing application program access to a protected resource residing on a mobile device
US9654505B2 (en)2009-06-222017-05-16Citrix Systems, Inc.Systems and methods for encoding the core identifier in the session identifier
US8700892B2 (en)*2010-03-192014-04-15F5 Networks, Inc.Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
US9338147B1 (en)2015-04-242016-05-10Extrahop Networks, Inc.Secure communication secret sharing

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140245359A1 (en)*2011-06-012014-08-28Interdigital Patent Holdings, Inc.Content Delivery Network Interconnection (CDNI) Mechanism
EP3058438A4 (en)*2013-10-182017-04-05AppDynamics, Inc.Automatic asynchronous handoff identification
US11641343B2 (en)2015-05-272023-05-02Ping Identity CorporationMethods and systems for API proxy based adaptive security
US20220021656A1 (en)*2015-05-272022-01-20Ping Identity CorporationScalable proxy clusters
US11582199B2 (en)*2015-05-272023-02-14Ping Identity CorporationScalable proxy clusters
US11924170B2 (en)2016-10-262024-03-05Ping Identity CorporationMethods and systems for API deception environment and API traffic control and security
US11855968B2 (en)2016-10-262023-12-26Ping Identity CorporationMethods and systems for deep learning based API traffic security
US11431706B2 (en)2017-09-082022-08-30Kabushiki Kaisha ToshibaCommunication control system and communication control device
US11783033B2 (en)2017-10-132023-10-10Ping Identity CorporationMethods and apparatus for analyzing sequences of application programming interface traffic to identify potential malicious actions
US10681085B2 (en)2017-10-162020-06-09International Business Machines CorporationQuick transport layer security/secure sockets layer connection for internet of things devices
US11265303B2 (en)2017-12-052022-03-01International Business Machines CorporationStateless session synchronization between secure communication interceptors
US10652224B2 (en)2017-12-052020-05-12International Business Machines CorporationStateless session synchronization between secure communication interceptors
US11843605B2 (en)2019-01-042023-12-12Ping Identity CorporationMethods and systems for data traffic based adaptive security

Also Published As

Publication numberPublication date
US9166955B2 (en)2015-10-20
WO2011116342A2 (en)2011-09-22
HK1161787A1 (en)2012-08-03
CN102195878B (en)2015-07-22
US9210131B2 (en)2015-12-08
EP2548332A4 (en)2015-07-15
JP2013523050A (en)2013-06-13
US20110231923A1 (en)2011-09-22
US9705852B2 (en)2017-07-11
US20160072811A1 (en)2016-03-10
US9178706B1 (en)2015-11-03
US9667601B2 (en)2017-05-30
US8700892B2 (en)2014-04-15
US9509663B2 (en)2016-11-29
EP2548332A2 (en)2013-01-23
US9100370B2 (en)2015-08-04
CN102195878A (en)2011-09-21
WO2011116342A3 (en)2011-12-22
US20110231653A1 (en)2011-09-22
US20110231652A1 (en)2011-09-22
CN202206418U (en)2012-04-25
US20110231651A1 (en)2011-09-22
JP5744172B2 (en)2015-07-01
US20110231655A1 (en)2011-09-22
US20160080328A1 (en)2016-03-17
US9172682B2 (en)2015-10-27
US20110231649A1 (en)2011-09-22

Similar Documents

PublicationPublication DateTitle
US9509663B2 (en)Secure distribution of session credentials from client-side to server-side traffic management devices
US9742806B1 (en)Accessing SSL connection data by a third-party
JP2023116573A (en)Client(s) to cloud or remote server secure data or file object encryption gateway
US10069800B2 (en)Scalable intermediate network device leveraging SSL session ticket extension
JP4245838B2 (en) Method and system for managing secure client-server transactions
EP1774750B1 (en)Method, apparatuses and computer readable medium for establishing secure end-to-end connections by binding IPSec Security Associations
US8407771B1 (en)Method and system for providing persistence in a secure network access
US8671273B2 (en)Method of performance-aware security of unicast communication in hybrid satellite networks
US10447658B2 (en)System and method for providing improved optimization for secure session connections
US20090119504A1 (en)Intercepting and split-terminating authenticated communication connections
US20080271137A1 (en)Instant communication with tls vpn tunnel management
JP2009239919A (en)Dynamic connection to a plurality of origin servers by transcoding proxy
KR20180130203A (en)APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME
US12052326B2 (en)Packet acknowledgment techniques for improved network traffic management
CN110995730B (en)Data transmission method and device, proxy server and proxy server cluster
HK1161787B (en)Proxy ssl handoff via mid-stream renegotiation
US20230379150A1 (en)Methods and apparatuses for providing communication between a server and a client device via a proxy node
Huang et al.SSL Remote Access VPNs (Network Security)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:F5 NETWORKS, INC., WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOLLAY, BENN SAPIN;WARREN, JEFFREY MICHAEL;REEL/FRAME:040652/0366

Effective date:20101207

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp