$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for providing secured access to a server connected to a private computer network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0762761 (1996-12-10)
발명자 / 주소
  • Cain Michael Eugene
출원인 / 주소
  • U S West, Inc.
대리인 / 주소
    Brooks & Kushman PC
인용정보 피인용 횟수 : 77  인용 특허 : 7

초록

A method and system for providing secured access to a server connected to a private computer network protected by a router acting as a firewall is provided. The method includes establishing a bypass communication route around the firewall router, exchanging information between a client and the serve

대표청구항

[ What is claimed is:] [1.] A system for providing secured access to a server connected to a private computer network protected by a router acting as a firewall, the system comprising:an external machine located outside the firewall router, the external machine operated by an outside software progra

이 특허에 인용된 특허 (7)

  1. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  2. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  3. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  4. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  5. Johnson Donavon W. (Georgetown TX) Smith Todd A. (Austin TX), Remote authentication and authorization in a distributed data processing system.
  6. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  7. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.

이 특허를 인용한 특허 (77)

  1. Bector, Rajeev; Gourley, David; Gauthier, Paul Andre; Totty, Brian, Adaptive traffic bypassing in an intercepting network driver.
  2. Dixon Michael D., Bi-directional process-to-process byte stream protocol.
  3. Dixon,Michael D., Bi-directional process-to-process byte stream protocol.
  4. Desai,Bhavesh N.; Shankaranarayanan,Nemmara K.; Shur,David Hilton; Smiljanic,Aleksandra; Totland,Todd J.; van der Merwe,Jacobus E.; Woodward,Sheryl Leigh, Cable data service method.
  5. Klemets, Anders E., Client to server streaming of multimedia content using HTTP.
  6. Klemets, Anders E., Client-to-server streaming of multimedia content using HTTP.
  7. Desai, Bhavesh N.; Shankaranarayanan, Nemmara K.; Shur, David Hilton; Smiljanic, Aleksandra; Totland, Todd J.; Van der Merwe, Jacobus E.; Woodward, Sheryl Leigh, Data service including channel group.
  8. Bandini, Jean-Christophe Denis; Odnert, Daryl, Delay technique in e-mail filtering system.
  9. Desai, Bhavesh N.; Shankaranarayanan, Nemmara K.; Shur, David Hilton; Smiljanic, Aleksandra; Totland, Todd J.; van der Merwe, Jacobus E.; Woodward, Sheryl Leigh, Devices and methods to communicate data streams.
  10. Dickinson, III,Robert D.; Krishnamurthy,Sathvik, E-mail firewall.
  11. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with policy-based cryptosecurity.
  12. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with policy-based cryptosecurity.
  13. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with stored key encryption/decryption.
  14. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, E-mail firewall with stored key encryption/decryption.
  15. Dickinson, III,Robert D.; Krishnamurthy,Sathvik, E-mail firewall with stored key encryption/decryption.
  16. Khosravi, Hormuzd; Gokulrangan, Venkat R.; Shustak, Tal; Eldar, Avigdor, Enabling access to remote entities in access controlled networks.
  17. Lin, Chih-Jung; Liao, Yueh-Lin, Eyewear device for transmitting signal and communication method thereof.
  18. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  19. Christie, IV,Samuel H., Firewall control for secure private networks with public VoIP access.
  20. Toga, James E., Firewall for controlling data transfers between networks based on embedded tags in content description language.
  21. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  22. Toga, James E., Firewalls that filter based upon protocol commands.
  23. Wootton Bruce Anthony ; Colvin William G.,CAX, Internet protocol filter.
  24. Lim, Chang; Hui, Jimmy K.; Wu, Wendy W. J.; Lee, Timmy W.; Look, Heng M., Internet-enabled service management and authorization system and method.
  25. Lim,Chang; Hui,Jimmy K.; Wu,Wendy W. J.; Lee,Timmy W.; Look,Heng M., Internet-enabled service management and authorization system and method.
  26. Chang Lim CA; Jimmy K. Hui CA; Wendy W. J. Wu CA; Timmy W. Lee CA; Heng M. Look CA, Internet-enabled service management system and method.
  27. Clark, Gregory Scott, Large file transfer in a design collaboration environment.
  28. McDonough, John C.; McDonough, Suzanne K.; O'Brien, Erin D., Message passing over secure connections using a network server.
  29. Aziz Ashar,PKX ; Markson Thomas, Method and apparatus for client-host communication over a computer network.
  30. Coile, Brantley W.; Howes, Richard A.; LeBlanc, William M., Method and apparatus for eliminating use of a transfer protocol on a proxied connection.
  31. Crichton Joseph M. ; Garvin Peter F. ; Staten Jeffrey W. ; Wright Waiki L., Method and apparatus for lightweight secure communication tunneling over the internet.
  32. Aziz, Ashar; Baehr, Geoffrey; Caronni, Germano; Gupta, Amit; Gupta, Vipul; Scott, Glenn C., Method and apparatus for providing secure communication with a relay in a network.
  33. Slemmer Michael W., Method and apparatus for providing uninterrupted communication over a network link.
  34. Coile Brantley W. ; Howes Richard A. ; LeBlanc William M., Method and apparatus for reducing overhead on a proxied connection.
  35. Coile Brantley W. ; Howes Richard A. ; LeBlanc William M., Method and apparatus for reducing overhead on a proxied connection.
  36. Coile,Brantley W.; Howes,Richard A.; LeBlanc,William M., Method and apparatus for reducing overhead on a proxied connection.
  37. Brantley W. Coile ; Richard A. Howes ; William M. LeBlanc, Method and apparatus for transparently proxying a connection.
  38. Coile, Brantley W.; Howes, Richard A.; LeBlanc, William M., Method and apparatus for transparently proxying a connection.
  39. Coile,Brantley W.; Howes,Richard A.; LeBlanc,William M., Method and apparatus for transparently proxying a connection.
  40. Naudus Stanley T., Method and protocol for synchronized transfer-window based firewall traversal.
  41. Bandini,Jean Christophe Denis; Smith,Jeffrey C., Method and system for e-mail message transmission.
  42. Bandini,Jean Christophe Denis; Smith,Jeffrey C., Method and system for e-mail message transmission.
  43. Bandini, Jean-Christophe Denis; Smith, Jeffrey C., Method and system for messaging security.
  44. Bandini, Jean-Christophe Denis; Smith, Jeffrey C., Method and system for messaging security.
  45. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  46. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  47. Slavin, Sean; Cook, Jay S.; El-Sabaaly, Hatem K., Method and system for remote control of a local system.
  48. Slavin,Sean; Cook,Jay S.; El Sabaaly,Hatem K., Method and system for remote control of a local system.
  49. Chan Nai Tiong SG, Method for security partitioning of a computer system.
  50. Klaghofer,Karl; M��ller,Harald; Totzke,J��rgen; Volkmann,Gerald, Method for the transmission of data in a packet-oriented data network.
  51. Toga James E., Method for transferring data between a network of computers dynamically based on tag information.
  52. Desai, Bhavesh N.; Shankaranarayanan, Nemmara K.; Shur, David Hilton; Smiljanic, Aleksandra; Totland, Todd J.; van der Merwe, Jacobus E.; Woodward, Sheryl Leigh, Method, system, and device for sending data in a cable data service.
  53. Balabine, Igor, Methods and apparatus for securing access to a computer.
  54. Ceragioli, Dennis M.; Jeyaraj, Melvin, Network architecture for secure data communications.
  55. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  56. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  57. Choudhury,Gagan Lal; Guha,Arunabha; Lai,Wai Sum; Lester,William G.; Segal,Moshe, Network having bandwidth sharing.
  58. Dickinson, III, Robert D.; Krishnamurthy, Sathvik, Policy-based messaging firewall.
  59. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; LeBlanc, William M.; McGuire, Jacob Mark; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming; Wong, Bruce, Proxying and unproxying a connection using a forwarding agent.
  60. Todd, Stephen James Paul; Ayres, Malcolm David; Holloway, Timothy Nicholas; Holdsworth, Simon Anthony James; Schmidt, Marc-Thomas; Taylor, Michael George, Publish/subscribe data processing with subscription points for customized message processing.
  61. Desai, Bhavesh N.; Shankaranarayanan, Nemmara K.; Shur, David Hilton; Smiljanic, Aleksandra; Totland, Todd L.; Van der Merwe, Jacobus; Woodward, Sheryl Leigh, Receive device for a cable data service.
  62. Kalajan Kevin E., Remote access-controlled communication.
  63. Oelsner, Tom, Remote diagnosis system and method and printing machine having the system.
  64. Nelson, Dean S., Reverse HTTP connections for device management outside a firewall.
  65. Yarborough,William Jordan, Secured FTP architecture.
  66. Gehrmann,Christian, Securing arbitrary communication services.
  67. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  68. Gwertzman James ; McDaniel William Paul Allan, System and method for accessing user properties from multiple storage mechanisms.
  69. Remer, Eric B.; King, David A.; Remer, David L., System and method for connecting to a device on a protected network.
  70. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  71. Jardin, Cary A.; Schnetzler, Steven, System and method for managing client requests in client-server networks.
  72. Ahuja, Alok; Apte, Atul Chandrakant, System and method for private information communication from a browser to a driver.
  73. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  74. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  75. Natan, Eetay, Techniques to enable firewall bypass for open mobile alliance device management server-initiated notifications in wireless networks.
  76. Hammarstrom,Martin; Sparr,Thomas, Transmission system, a method and an apparatus providing access for IP data packets to a firewall protected network.
  77. Desai,Bhavesh N.; Shankaranarayanan,Nemmara K.; Shur,David Hilton; Smiljanic,Aleksandra; Totland,Todd J.; van der Merwe,Jacobus E.; Woodward,Sheryl Leigh, Transmit and receive system for cable data service.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로