[미국특허]
Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04L-029/06
H04L-009/32
출원번호
US-0779530
(2013-02-27)
등록번호
US-9178706
(2015-11-03)
발명자
/ 주소
Bollay, Benn Sapin
Hawthorne, Jonathan Mini
출원인 / 주소
F5 Networks, Inc.
대리인 / 주소
Branch, John W.
인용정보
피인용 횟수 :
1인용 특허 :
99
초록▼
A traffic management device (TMD), system, and processor-readable storage medium are directed to determining that an end-to-end encrypted session has been established between a client and an authentication server, intercepting and decrypting subsequent task traffic from the client, and forwarding th
A traffic management device (TMD), system, and processor-readable storage medium are directed to determining that an end-to-end encrypted session has been established between a client and an authentication server, intercepting and decrypting subsequent task traffic from the client, and forwarding the intercepted traffic toward a server. In some embodiments, a second connection between the TMD and server may be employed to forward the intercepted traffic, and the second connection may be unencrypted or encrypted with a different mechanism than the encrypted connection to the authentication server. The encrypted connection to the authentication server may be maintained following authentication to enable termination of the second connection if the client becomes untrusted, and/or to enable logging of client requests, connection information, and the like. In some embodiments, the TMD may act as a proxy to provide client access to a number of servers and/or resources.
대표청구항▼
1. A traffic management device for managing network traffic between a client device and a plurality of server devices, comprising: a transceiver to send and receive data over a network; anda processor, in communication with the transceiver, that performs actions, including: intercepting a message se
1. A traffic management device for managing network traffic between a client device and a plurality of server devices, comprising: a transceiver to send and receive data over a network; anda processor, in communication with the transceiver, that performs actions, including: intercepting a message sent from a client device toward an authentication server device over an encrypted first connection; andemploying a key associated with the first connection to analyze the intercepted message, wherein the analysis is employed to selectively forward the intercepted message toward a determined server device over a second connection that is separate from communication with the authentication server device. 2. The traffic management device of claim 1, wherein the encrypted first connection is established using a two-way authentication between the client device and the authentication server device. 3. The traffic management device of claim 1, wherein the encrypted first connection is actively maintained between the client device and the authentication server device while the intercepted message is forwarded over the second connection. 4. The traffic management device of claim 1, wherein the actions further include forwarding the intercepted message to the authentication server device, wherein the authentication server device is enabled to log at least some information included in the intercepted message. 5. The traffic management device of claim 1, wherein the actions further include: receiving from the determined server device a response message to the forwarded intercepted message;encrypting the response message based on the key; andforwarding the encrypted response message to the client device, using the first connection. 6. A system for managing network traffic, comprising: a plurality of server devices;an authentication server device; anda traffic management device in communication with the plurality of server devices, the authentication server device, and a client device, and configured to perform actions including: intercepting a message sent from a client device toward an authentication server device over an encrypted first connection; andemploying a key associated with the first connection to analyze the intercepted message, wherein the analysis is employed to selectively forward the intercepted message toward a determined server device over a second connection that is separate from communication with the authentication server device. 7. The system of claim 6, wherein the encrypted first connection is established using a two-way authentication between the client device and the authentication server device. 8. The system of claim 6, wherein the encrypted first connection is actively maintained between the client device and the authentication server device while the intercepted message is forwarded over the second connection. 9. The system of claim 6, wherein the actions further include forwarding the intercepted message to the authentication server device, wherein the authentication server device is enabled to log at least some information included in the intercepted message. 10. The system of claim 6, wherein the actions further include: receiving from the determined server device a response message to the forwarded intercepted message;encrypting the response message based on the key; andforwarding the encrypted response message to the client device, using the first connection. 11. A method for managing network traffic between a client device and a plurality of server devices over a network, wherein a traffic management device is operative to perform actions, comprising: intercepting a message sent from the client device toward an authentication server device over an encrypted first connection; andemploying a key associated with the first connection to analyze the intercepted message, wherein the analysis is employed to selectively forward the intercepted message toward a determined server device over a second connection that is separate from communication with the authentication server device. 12. The method of claim 11, wherein the encrypted first connection is established using a two-way authentication between the client device and the authentication server device. 13. The method of claim 11, wherein the encrypted first connection is actively maintained between the client device and the authentication server device while the intercepted message is forwarded over the second connection. 14. The method of claim 11, wherein the actions further include forwarding the intercepted message to the authentication server device, wherein the authentication server device is enabled to log at least some information included in the intercepted message. 15. The method of claim 11, wherein the actions further comprise: receiving from the determined server device a response message to the forwarded intercepted message;encrypting the response message based on the key; andforwarding the encrypted response message to the client device, using the first connection. 16. A processor readable non-transitory storage medium storing instructions that enable a processor to perform actions for managing network traffic between a client device and a plurality of server devices, comprising: intercepting a message sent from the client device toward an authentication server device over an encrypted first connection; andemploying a key associated with the first connection to analyze the intercepted message, wherein the analysis is employed to selectively forward the intercepted message toward a determined server device over a second connection that is separate from communication with the authentication server device. 17. The medium of claim 16, wherein the encrypted first connection is established using a two-way authentication between the client device and the authentication server device. 18. The medium of claim 16, wherein the encrypted first connection is actively maintained between the client device and the authentication server device while the intercepted message is forwarded over the second connection. 19. The medium of claim 16, wherein the actions further include forwarding the intercepted message to the authentication server device, wherein the authentication server device is enabled to log at least some information included in the intercepted message.
Mark Charles Davis ; David G. Kuehr-McLaren ; Timothy Glenn Shoriak, Extending SSL to a multi-tier environment using delegation of authentication and authority.
Zimmerman, Gary D.; Skaggs, Terrence L.; Wiley, Anthony J.; McBride, Brian W.; Banks, David, Initiation of communication between network service system and customer-premises equipment.
Ilnicki, Slawomir K.; Rice, James P., Method and apparatus for allowing a secure and transparent communication between a user device and servers of a data access network system via a firewall and a gateway.
Crichton Joseph M. ; Garvin Peter F. ; Staten Jeffrey W. ; Wright Waiki L., Method and apparatus for lightweight secure communication tunneling over the internet.
Aziz, Ashar; Baehr, Geoffrey; Caronni, Germano; Gupta, Amit; Gupta, Vipul; Scott, Glenn C., Method and apparatus for providing secure communication with a relay in a network.
Bobde, Nikhil; Demirtjis, Ann; Han, Mu, Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication.
Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
Cooper, Nathaniel; Hodecker, Steven; Yeager, Douglas, Method of authentication processing during a single sign on transaction via a content transform proxy service.
Lownsbrough,Derek Leigh, Methods, apparatuses and systems for transparently intermediating network traffic over connection-based authentication protocols.
Baskey, Michael Edward; Hahn, Timothy James; Kandlur, Dilip Dinkar; Kuehr-McLaren, David Gerard, Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy.
Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
Yamaguchi,Kensaku; Nakakita,Hideaki; Hashimoto,Mikio, Radio network system using multiple authentication servers with consistently maintained information.
Little, Herbert A.; Janhunen, Stefan E.; Hobbs, Dale J., System and method for supporting multiple certificate status providers on a mobile communication device.
Norman,Stuart; Halasz,David E., System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol.
malik Sohail ; Muresan Michael, System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver.
Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.