WO2001065806A2 - System and method for avoiding re-routing in a computer network during secure remote access - Google Patents
System and method for avoiding re-routing in a computer network during secure remote access Download PDFInfo
- Publication number
- WO2001065806A2 WO2001065806A2 PCT/US2001/006598 US0106598W WO0165806A2 WO 2001065806 A2 WO2001065806 A2 WO 2001065806A2 US 0106598 W US0106598 W US 0106598W WO 0165806 A2 WO0165806 A2 WO 0165806A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message packet
- network
- over
- computer
- transfer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the invention relates generally to the field of digital computer systems and more particularly to systems and methods for facilitating secure communications over a network or the like.
- the invention particularly provides an arrangement for avoiding re-routing of message packets by a computer or other device (generally, "computer") that is involved in communications over a secure connection with a second computer, to a third computer connected thereto, and for avoiding re-routing of packets received from the third computer to the second computer over the secure connection.
- a computer or other device generally, "computer”
- a number of personal computers, workstations, and other various network resources such as mass storage subsystems, network printers and interfaces to the public telephony system, are typically interconnected in a computer network.
- the personal computers and workstations are used by individual users to perform processing in connection with data and programs that may be stored in the network mass storage subsystems.
- the personal computers/workstations operating as clients, download the information, including data and programs, from the network mass storage subsystems for processing.
- the personal computers or workstations will enable processed data to be uploaded to the network mass storage subsystems for storage, to a network printer for printing, to the telephony interface for transmission over the public telephony system, or the like.
- the network mass storage subsystems, network printers and telephony interfaces operate as shared resources, since they are available to service requests from all of the clients in the network.
- the servers are readily available for use by all of the personal computers/workstations in the network. Networks may be spread over a fairly wide area, and may interconnect personal computers, workstations and other devices among a number of companies and individuals.
- a firewall is essentially a computer or other device that connects to both the external communication link and to the internal network and mediates communications therebetween.
- communications are in the form of message packets
- the firewall receives each message packet from the external communication link that is destined for a computer connected to the internal network, determines whether the communication is authorized and, if so, transfers the message packet over the internal network, which, in turn, transfers the message packet to the destination computer.
- the firewall receives each message packet from the internal network that is destined for a computer connected to the external communication link, determines whether the communication is authorized and, if so, transmits the message packet over the external communication link, which, in turn, transfers the message packet to the destination computer.
- a firewall may determine whether a message packet is authorized by examining address information in the packet, such as its source and/or destination address, a port number or the like.
- the secure connection can be considered as effectively being part of the respective organization's internal network, and the firewall will normally transfer message packets from the external computer over the internal network (after decrypting the information therein), and message packets from the internal network that are to be transferred to the external computer over the secure connection (after encrypting the information therein).
- a problem can arise, however, if the external computer is also connected to one or more other computers outside of the ente ⁇ rise' s internal network, and if the external computer is further enabled to operate as a packet router, since typically once a secure connection is set up, the firewall ignores the address information in message packets thereover when performing the transfer. In that situation, if, for example, the computer receives a message packet from the firewall over the secure connection, it may, after the information is decrypted, forward the message packet to the other computer, particularly if the address information in the message packet indicates that the other computer is the destination. Similarly, if the computer receives a message packet from the other computer, it may forward it (that is, the message packet) over the secure connection.
- Some types of computers will automatically operate as a packet router if they receive message packets from other computers.
- an external computer might operate as a router can be undesirable, since it can result in the transmission of information received from the internal network over an insecure connection, that is, over the connection between the external computer and the other computer.
- the invention provides a new and improved system and method for avoiding re-routing of message packets by a computer or other device that is involved in communications over a secure connection with a second computer, to a third computer connected thereto, and to avoid re-routing of packets received from the third computer to the second computer over the secure connection.
- the invention provides a firewall arrangement for use in connection with a network, the firewall arrangement comprising a message packet receiver module and a message packet transfer module.
- the message packet receiver module is configured to receive a message packet to be transferred between the network and a device over with secure connection, the device having an device address.
- the message packet transfer module is configured to selectively transfer the message packet over at least one of the network or the secure connection. In particular, the message packet transfer module determines whether to transfer the message packet in relation to the device address and an address in the message packet as received by the message packet receiver module.
- the message packet in connection with message packets received from the network for transfer over the secure connection, the message packet includes a destination address, and the message packet transfer module is configured to transfer the message packet over the secure connection if the destination address corresponds to the device address of the device, and to not transfer the message packet over the secure connection if the destination address does not correspond to the device address.
- the message packet in connection with message packets received from the secure connection for transfer over the network, the message packet includes a source address, and the message packet transfer module is configured to transfer the message packet over the network if the source address corresponds to the device address of the device, and to not transfer the message packet over the network if the source address does not correspond to the device address.
- the message packet includes a data portion including data
- the firewall arrangement may encrypt the data in the data portion in connection with message packets to be transmitted over the secure connection, and decrypt encrypted data in the data portion in connection with message packets received over the secure connection.
- the firewall arrangement can guard against unauthorized routing of message packets to computers which are not part of a secure connection, which may occur if a device with which a secure connection is established is conditioned to operate as a packet router. This will minimize the likelihood that information from the network will be transmitted over insecure connections external to the network. In addition, it will minimize the likelihood of message packets from unauthorized sources external to the network being routed over the network.
- FIG. 1 is a schematically functional schematic diagram of an arrangement including a network and one or more computers located externally of the network, including an arrangement for avoiding re-routing during secure remote access, constructed in accordance with the invention
- FIGS. 2 and 3 are flow charts depicting operations performed by the network depicted in FIG. 1 in connection with the invention.
- FIG. 1 is a functional schematic diagram including a network 10 and one or more computers, identified by reference numerals 20(1) through 20(M) (generally identified by reference numeral 20(m) located externally of the network 10, and including an arrangement for avoiding re-routing during secure remote access, constructed in accordance with the invention.
- the network 10 is generally maintained by an ente ⁇ rise, such as a company or other organization, government agency, or the like, for use by its employees in connection with the business of the ente ⁇ rise, and will facilitate sharing of information among the employees, while contemporaneously protecting the information from unauthorized access by persons from outside of the ente ⁇ rise.
- an ente ⁇ rise such as a company or other organization, government agency, or the like
- network 10 includes a plurality of computers 11(1) through 11(N) (generally identified by reference numeral l l(n)), 12 and 16 interconnected by a communication link 13.
- the computers l l(n) in the network 10 are used by employees of the ente ⁇ rise and other authorized persons in connection with their work for the ente ⁇ rise.
- the computers l l(n) are in the form of personal computers or computer workstations, each of which includes a system unit, a video display unit and operator input devices such as a keyboard and mouse.
- the computers 12 and 16 also include a system unit, and may also include a video display unit and operator input devices.
- the computers ll(n), 12 and 16 are of the conventional stored-program computer architecture.
- a system unit generally includes processing, memory, mass storage devices such as disk and/or tape storage elements and other elements (not separately shown), including network interface devices represented by respective arrows 14(n), 15 and 17 for interfacing the respective computer to the communication link 13.
- a video display unit permits the computer to display processed data and processing status to the user, and an operator input device enable the user to input data and control processing by the computer.
- the computers 1 l(n), 12 and 16 transfer information, in the form of message packets, through their respective network interface devices 14(n), 15 and 17 among each other over the communication link 13.
- the communication link 13 interconnecting the computers l l(n), 12 and 16 in the network 10 may, as is conventional, comprise wires, optical fibers or other transmission media for carrying signals representing message packets among the computers l l(n), 12 and 16.
- the communication link 13 may include one or more wireless links, such as but not limited to an infrared link.
- the communication link 13 may further include switches for switching signals representing message packets among the computers l l(n), 12 and 16.
- each of the computers l l(n) typically includes a network interface device 14(n), which connects the respective computer to the communications link 13.
- the transmission media and switches comprising communication link 13 may interconnect the computers 11 in any convenient topology.
- Information is transferred among the computers 1 l(n), 12 and 16 in the form of message packets.
- Each message packet contains a header portion, which generally contains information that is useful in controlling the transfer of the message packet from the source computer, that is, the computer that transmits the message packet, to the destination computer or computers, that is, the computer or computers that is/are to receive the message packet, and a data portion, which generally contains information that is to be transferred.
- any of the computers l l(n), 12 and 16 can operate as a source computer and as a destination computer.
- the information contained in the header portion includes message packet transfer protocol information, including, inter alia, source and destination addresses that identify the source computer and the destination computer(s) that is/are to receive the message packet, and each computer can determine from a message packet's destination address whether it is to receive the message packet.
- message packet transfer protocol information including, inter alia, source and destination addresses that identify the source computer and the destination computer(s) that is/are to receive the message packet, and each computer can determine from a message packet's destination address whether it is to receive the message packet.
- the computers 1 l(n), 12 and 16 preferably transfer information according to the client-server paradigm.
- certain computer systems in the network illustratively computer 12
- other computers for example, computers l l(n) are designated as clients.
- the server computer 12 stores information for processing by the client computers l l(n) thereby to enable the client computers to conveniently share the information.
- a client computer system which needs access to information maintained by a particular server will enable the server to download the information to it over the network. After processing the data, the client computer system may also return the processed data to the server for storage.
- the computers 1 l(n), 12 and 16 may also transfer information in message packets in a "peer-to-peer" manner, in which one computer, illustratively computers l l(n ⁇ ) and l l(n ⁇ ) (n ⁇ 5 ny e 1,...N) , exchange information over, for example, a connection established therebetween over communication link 13.
- External computers 20(m) may be constructed similar to the various computers comprising the network 10, and may also operate in a similar manner.
- the external computers 20(m) include network interface devices represented by respective arrows 22(m) for interfacing the respective computer to a communication link 23 to facilitate transfer of information thereamong.
- the external computers transfer information by means of message packets in a manner similar to the manner in which the computers l l(n), 12 and 16 transfer message packets thereamong over communication link 13.
- the computer 16 operates to provide a firewall arrangement permitting communications between the computers in the network 10 and computers which are external to the network 10 which are being operated by authorized individuals, thereby to permit the external computers to access information in the network 10, to retrieve the information from the network 10 and to store processed information therein.
- an authorized individual wishes to use external computer 20(1) to access information in the network 10.
- the authorized individual as operator of external computer 20(1), will enable the external computer 20(1) to establish a communications session with the firewall computer 16, which, in turn, mediates communications between the external computer 20(1) and another computer, illustratively server computer 12, in the network.
- the external computer 20(1) communicates with the firewall computer 16 over a communication link identified by reference numeral 23.
- Communication link 23 may comprise any convenient communications arrangement, including the Internet, Public Switched Telephony Network (PSTN), or any other form of network or point-to-point connection, or any combination thereof.
- PSTN Public Switched Telephony Network
- the computers 20(1) and 16 will establish a secure connection therebetween using any known technique so that, if a third party attempts to eavesdrop on communications between the computers over the communication link 23, or if a message packet is erroneously received at another computer (not shown), the information contained in the message packet will not be apparent.
- the information in the message packets transferred over communication link 23 will be encrypted by the transmitting computer 20(1) or 16, and decrypted by the receiving computer 16 or 20(1), respectively.
- a session key will be generated by one of the computers 20(1) and 16 and provided to the other computer in a conventional manner.
- a computer 20(1) or 16 When a computer 20(1) or 16 has a message packet to transmit to the other computer 16 or 20(1), it will use the session key to encrypt the information in the message packet before transmitting the message packet to the other computer 16 or 11(1). Since, when the message packets are transferred over the communication link 23, the information in them is encrypted, even if a message packet is received by a third party, the third party will not be able to understand or make use of the information in the message packet.
- the external computer 20(1) will operate as a client in a manner similar to the computers l l(n) in the network 10 to retrieve information from the server computer 12 and store information thereon.
- the external computer 20(1) When the external computer 20(1) is performing an access operation in connection with the server 12, it will generate a message packet for transfer to the firewall computer 16 over communication link 23, with the information in the message packet being encrypted as described above.
- the information in the message packet will generally include a retrieval command including an identifier that identifies the information to be retrieved, which retrieval command will, as described above, be encrypted before the message packet is transmitted over communication link 23.
- the message packet will also include the destination and source addresses as described above, with the source address identifying the external computer 20(1) and the destination address identifying the server computer 12.
- the source and destination addresses will be unencrypted so that the firewall computer 16 will be able to recognize them without decrypting the message packet.
- the firewall computer 16 will generally receive the message packet over the communication link 23, decrypt the information in the message packet and transfer the message packet with the decrypted information to the server computer 12.
- the server computer 12 after receiving the message packet, will obtain the information identified in the retrieval command, generate one or more message packets for transfer to the external computer 20(1) including the information requested by external computer 20(1), and transfer the message packet(s) to the firewall computer 16.
- the message packet(s) will also include the destination and source addresses as described above, with the destination address identifying the external computer 20(1) and the source address identifying the server computer 12.
- the firewall computer 16 will receive the message packet(s), encrypt the information therein, and transfer the message packet(s) with encrypted information to the external computer 20(1) over the communication link 23.
- the external computer 20(1) will generate one or more message packets containing a storage command and the information to be stored for transfer to the firewall computer 16 over communication link 23.
- the storage command and information to be stored will be encrypted, as described above, before the message packet is transmitted over communication link 23.
- the message packet will also include the destination and source addresses as described above, with the source address identifying the external computer 20(1) and the destination address identifying the server computer 12.
- the firewall computer 16 will receive the message packet over the communication link 23, decrypt the storage command and information to be stored in the message packet(s) and transfer the message packet(s) with the decrypted information to the server computer 12.
- the server computer 12 after receiving the message packet, will store the information as specified in the storage command. Thereafter, the server computer 12 may also provide an acknowledgment message packet to the external computer 20(1) acknowledging that it has received the message packet(s) containing the storage command and information to be stored, and that the information to be stored has been stored. In that case, the server computer 12 will generate the acknowledgment message packet, including the acknowledgment as the information in the packet, and transfer the message packet(s) to the firewall computer 16. The firewall computer 16, in turn, will receive the message packet(s), encrypt the information therein, and transfer the message packet(s) with encrypted information to the external computer 20(1) over the communication link 23. The external computer 20(1) can decrypt the information contained in the message packet to obtain the acknowledgment.
- a computer such as external computer 20(1)
- external computer 20(1) may forward message packets from another external computer 20(m) (m ⁇ l) to the firewall computer 16 over the secure connection over communication link 23.
- the external computer 20(2) will forward the message packet to the external computer 20(1) over communication link 21.
- the external computer 20(1) will forward the message packet to the firewall computer 16 over the secure connection.
- the external computer 20(1) will encrypt the information in the message packet and transmit the message packet with the encrypted information to the firewall computer 16.
- the firewall computer 16 When the firewall computer 16 receives the message packet, it would normally decrypt the information and transfer the message packet, with the decrypted information, to the server computer 12.
- the server computer 12 may generate a message packet for transmission to the external computer 20(2) through the firewall computer 16 and external computer 20(1), the latter operating as a packet router. This may occur if, for example, a message packet transmitted earlier by the external computer 20(2) to the server computer 12 contained a retrieval command. In that case, the server computer 12 will generate one or more message packets containing the information to be retrieved and transfer them to the firewall computer 16. The message packets generated will have identify the server computer 12 as the source computer and the external computer 20(2) as the destination computer. Normally, as with message packets transmitted to the external computer 20(1) as described above, the firewall computer 16 would encrypt the information in the message packets and transfer them to the external computer 20(1) over the secure connection. When the external computer 20(1) receives the message packets, it would decrypt the information and forward the message packets, with the decrypted information, to the external computer 20(2) over the communication link 21.
- the firewall computer 16 to minimize particularly the likelihood that information from the network will be transferred between external computer 20(2) and the server 12 using external computer 20(1) as an intermediary, before the firewall computer 16 transfers a message to the external computer 20(1) over the secure connection over communication link 23, it checks the destination address in the message packet that it receives over the communication link 13 which is to be transferred thereover after the information therein is encrypted, to verify that the destination address is that of the external computer 20(1) for which the secure connection was established. If the destination address in the message packet is that of the external computer 20(1), the firewall computer 16 will proceed to encrypt the information in the message packet and transfer it over the secure connection.
- the firewall computer 16 will not transfer the message packet (either with the information encrypted or unencrypted) over the secure connection. Instead the firewall computer 16 can discard the message packet.
- the firewall computer 16 may provide a notification to the source computer (illustratively, server computer 12) and/or the destination computer (illustratively, external computer 20(2)) indicating, for example, that the information transfer was unauthorized.
- the firewall computer 16 when it receives a message packet from the external computer 20(1) over the secure connection, will check the source address in the message packet to verify that the source computer was the external computer 20(1). If the firewall computer 16 determines that the source address in the message packet is the address of external computer 20(1), the firewall computer 16 will decrypt the information and forward the message packet, with the decrypted information, to the destination.
- the firewall computer 16 determines that the source address in the message packet is not the address of the external computer 20(1) with which the secure connection was established, the firewall computer 16 will not transfer the message packet (either with the information encrypted or unencrypted) over the communication link 13. Instead the firewall computer 16 can discard the message packet.
- the firewall computer 16 may provide a notification to the source computer (illustratively, external computer 20(2)) and/or the destination computer (illustratively, server computer 12) indicating, for example, that the information transfer was unauthorized.
- FIG. 2 specifically depicts operations performed in connection with message packets that the firewall computer 16 receives from the secure connection
- FIG. 3 depicts operations performed in connection with message packets that the firewall computer 16 receives from the network 10.
- the firewall computer 16 when the firewall computer 16 receives a message packet from the secure connection (step 100), it initially determines whether the source address in the message packet corresponds to the source address of the external computer with which the secure connection was established (step 101). If the firewall computer 16 makes a positive determination in step 101, it proceeds to decrypt the information in the message packet (step 102) and transmits the message packet over the communication link 13 connected thereto (step 103), thereby to facilitate transfer of the message packet to the destination computer.
- firewall computer 16 makes a negative determination in that step, which will occur if the source address in the message packet does not correspond to the address of the external computer with which the secure connection was established, it (that is, firewall computer 16) will proceed to step 105, in which it transmits message packets to the source and destination indicating that a source which was not authorized to transfer a message packet over the secure connection had attempted to transfer a message packet thereover. In addition, the firewall computer 16 will discard the message packet (step 106).
- the firewall computer 16 when the firewall computer 16 receives a message packet from communication link 13 connected thereto (step 110), it initially determines whether the destination address in the message packet corresponds to the destination address of the external computer with which the secure connection was established (step 111). If the firewall computer 16 makes a positive determination in step 111, it proceeds to encrypt the information in the message packet (step 112) and transfer the message packet over the communication link 23 connected thereto (step 113), thereby to facilitate transfer of the message packet to the destination external computer.
- firewall computer 16 makes a negative determination in that step, which will occur if the destination address in the message packet does not correspond to the address of the external computer with which the secure connection was established, it (that is, firewall computer 16) will proceed to step 115, in which it transmits message packets to the source and destination indicating that a source had attempted to transfer a message packet over the secure connection to a destination that was not authorized to receive a message packet thereover. In addition, the firewall computer 16 will discard the message packet (step 116).
- the invention provides a number of advantages.
- it provides an arrangement by which the firewall computer 16 can guard against unauthorized routing of message packets to computers which are not part of a secure connection, which may be accomplished if an external computer, with which a secure connection is established, is conditioned to operate as a packet router. This will minimize the likelihood that information from the network 10 will be transmitted over insecure connections external to the network 10. In addition, it will minimize the likelihood of message packets from unauthorized external sources being routed over the network 10.
- network 10 has been described as comprising various computers (including the above-described server computer 12, client computers l l(n) and firewall computer 16), it will be appreciated that a network may also include, for example, printers and facsimile devices, digital audio or video storage and distribution devices, and the like, which may be shared among the various computers connected in the network 10 and the external computer 20(1).
- secure connection has been described as being provided by encryption in connection with information transmitted thereover, it will be appreciated that a secure connection can be provided using other conventional mechanisms.
- the information may be transmitted using plain text, which may be authenticated using any conventional authentication arrangement.
- a computer l l(n) may also operate as and perform the functions described above for a server 12 and/or a firewall 16.
- hardware and/or software connections may provide information transfer between hardware and/or software components performing operations described above for computers 1 l(n), server 12 and firewall 16.
- firewall computer 16 has been described as sending notifications to the source and destination after it receives unauthorized message packets received from, or to be transferred over, the secure connection (that is, message packets other than those for which the external computer, with which the secure connection was established, is the respective source or destination), it will be appreciated that the firewall computer 16 may merely send a notification to either the source or destination, or neither. Alternatively or in addition, the firewall computer 16 may provide a notification to a system administrator. As a further alternative, and the firewall computer 16 may merely log the fact that it had received an unauthorized message packet.
- a system in accordance with the invention can be constructed in whole or in part from special pu ⁇ ose hardware or a general pu ⁇ ose computer system, or any combination thereof, any portion of which may be controlled by a suitable program.
- Any program may in whole or in part comprise part of or be stored on the system in a conventional manner, or it may in whole or in part be provided in to the system over a network or other mechanism for transferring information in a conventional manner.
- the system may be operated and/or otherwise controlled by means of information provided by an operator using operator input elements (not shown) which may be connected directly to the system or which may transfer the information to the system over a network or other mechanism for transferring information in a conventional manner.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2001243364A AU2001243364A1 (en) | 2000-03-01 | 2001-03-01 | System and method for avoiding re-routing in a computer network during secure remote access |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US51641000A | 2000-03-01 | 2000-03-01 | |
| US09/516,410 | 2000-03-01 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2001065806A2 true WO2001065806A2 (en) | 2001-09-07 |
| WO2001065806A3 WO2001065806A3 (en) | 2002-03-28 |
Family
ID=24055453
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2001/006598 Ceased WO2001065806A2 (en) | 2000-03-01 | 2001-03-01 | System and method for avoiding re-routing in a computer network during secure remote access |
Country Status (2)
| Country | Link |
|---|---|
| AU (1) | AU2001243364A1 (en) |
| WO (1) | WO2001065806A2 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004075587A1 (en) * | 2003-02-20 | 2004-09-02 | Nokia Corporation | A communication system |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1010283B1 (en) * | 1997-07-24 | 2006-11-29 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
| SE513828C2 (en) * | 1998-07-02 | 2000-11-13 | Effnet Group Ab | Firewall device and method for controlling network data packet traffic between internal and external networks |
| AU4824499A (en) * | 1998-06-17 | 2000-01-05 | Sun Microsystems, Inc. | Method and apparatus for authenticated secure access to computer networks |
-
2001
- 2001-03-01 WO PCT/US2001/006598 patent/WO2001065806A2/en not_active Ceased
- 2001-03-01 AU AU2001243364A patent/AU2001243364A1/en not_active Abandoned
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2004075587A1 (en) * | 2003-02-20 | 2004-09-02 | Nokia Corporation | A communication system |
| CN100571461C (en) * | 2003-02-20 | 2009-12-16 | 诺基亚公司 | Communication system |
| US7917620B2 (en) | 2003-02-20 | 2011-03-29 | Nokia Corporation | Communication system |
| EP3651435A1 (en) * | 2003-02-20 | 2020-05-13 | INVT SPE LLC c/o Fortress Investment Group | A communication system |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2001065806A3 (en) | 2002-03-28 |
| AU2001243364A1 (en) | 2001-09-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5812671A (en) | Cryptographic communication system | |
| US5638448A (en) | Network with secure communications sessions | |
| US6959393B2 (en) | System and method for secure message-oriented network communications | |
| US5689566A (en) | Network with secure communications sessions | |
| RU2289886C2 (en) | Method, bridge, and system for data transfer between public data network device and intercom network device | |
| US6442686B1 (en) | System and methodology for messaging server-based management and enforcement of crypto policies | |
| US8364772B1 (en) | System, device and method for dynamically securing instant messages | |
| US6154839A (en) | Translating packet addresses based upon a user identifier | |
| US5680461A (en) | Secure network protocol system and method | |
| US8290871B1 (en) | Systems and methods for a secure recording environment | |
| US20070165865A1 (en) | Method and system for encryption and storage of information | |
| WO2003058879A1 (en) | Secure transport for mobile communication network | |
| JPH1155322A (en) | Cryptographic communication system | |
| US7848524B2 (en) | Systems and methods for a secure recording environment | |
| US20030007645A1 (en) | Method and system for allowing a sender to send an encrypted message to a recipient from any data terminal | |
| US7853800B2 (en) | Systems and methods for a secure recording environment | |
| JP2001203761A (en) | Relay device and network system provided with the same | |
| JPH07250058A (en) | Security protection device and data communication network | |
| US6661896B1 (en) | Computer network security system and method | |
| JP3955378B2 (en) | Data communication system for data access control | |
| JPH118615A (en) | Data encryption system, information processing device, IC card, recording medium, and data encryption method | |
| WO2001065806A2 (en) | System and method for avoiding re-routing in a computer network during secure remote access | |
| JP2002009815A (en) | Electronic mail system with security function | |
| EP2036244B1 (en) | Systems and methods for a secure recording environment | |
| JP2001345832A (en) | Mail system, mail guard device, operation terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |