WO2006052714A2 - Apparatus and method for protection of communications systems - Google Patents
Apparatus and method for protection of communications systems Download PDFInfo
- Publication number
- WO2006052714A2 WO2006052714A2 PCT/US2005/039939 US2005039939W WO2006052714A2 WO 2006052714 A2 WO2006052714 A2 WO 2006052714A2 US 2005039939 W US2005039939 W US 2005039939W WO 2006052714 A2 WO2006052714 A2 WO 2006052714A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- client
- content
- request
- proxy system
- proxy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/142—Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/561—Adding application-functional data or data for application control, e.g. adding metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
- H04L67/5651—Reducing the amount or size of exchanged application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Definitions
- the present invention relates generally to a communications device, more particularly, to a proxy system for use in requesting content from a another communications system while protecting a user's communications system, e.g., computer system, from damage which can otherwise be inflicted during such a process and/or avoiding disclosure of user information, such as the user's identity, the user's personal information and tracking of network sites visited by the user.
- the present invention also relates to methods for a method of obtaining content from a communications system, more particularly, for obtaining content while protecting a user's communication system and/or avoiding disclosure of user information.
- Modern society has become increasingly dependent on communications networks, such as the Internet, for shopping, for entertainment and as a source of information.
- Modern businesses also rely heavily on their communications networks for making purchases and for obtaining up-to-date technical information, as well as for the storage and retrieval of non- public (classified and company sensitive) and employee personal information.
- a third party could infiltrate a company communications system is by a connection to an external computer on a communications network, such as the Internet. For instance, by attaching undesired or spurious content to a message, the third party might attempt to monitor the activities of a user or group of users for a benign or harmful purpose, or attempt to retrieve some specific information from the company communications system.
- the spurious content may include data mining or spy software (spyware), malicious software (malware) or advertisement software, including pop-up advertisements (adware).
- a method of filling a request for content from a communications system comprising: receiving in a proxy system a client request for content from at least one communications system; removing from the client request information identifying the client to produce an anonymous request; adding to the anonymous request information identifying the proxy system to produce a proxy request; sending the proxy request to the communications system; receiving response content from the communications system in response to the proxy request; removing undesired material (e.g., adware, spyware and/or malware) from the response content to produce filtered response content; and transmitting the filtered response content to the client.
- undesired material e.g., adware, spyware and/or malware
- a method of filling a request for content from a communications system comprising: receiving from a client a client request for content from at least one communications system; removing from the client request for content information identifying the client to produce an anonymous request; adding to the anonymous request information identifying the proxy system to produce a proxy request; sending the proxy request to the communications system; receiving response content from the communications system in response to the proxy request; and transmitting at least a portion of the response content to the client.
- a method of filling a request for content from a communications system comprising: receiving from a client a client request for content from at least one communications system; sending at least a portion of the client request to the communications system; receiving response content from the communications system in response to the proxy request; removing undesired material from the response content to produce filtered response content; and transmitting the filtered response content to the client.
- a proxy system comprising a request receiver, a request parser, a proxy system identification information inserter, a request transmitter, a response receiver and a filtered response transmitter.
- the request receiver receives from a client a request for content from at least one communications system.
- the request parser removes from the request for content information identifying the client to produce an anonymous request.
- the proxy system identification information inserter inserts information identifying the proxy system into the anonymous request to produce a proxy request.
- the request transmitter transmits the proxy request to the at least one communications system.
- the response receiver receives response content from the communications system.
- the filtered response transmitter transmits at least a portion of the response content to the client.
- the proxy system further comprises a content filter which removes undesired material from the response content to produce the portion of the response content which is transmitted to the client by the filtered response transmitter.
- the content filter, the proxy system identification information inserter and/or the request parser comprise at least one text processor.
- a proxy system comprising a request receiver, a request transmitter, a response receiver, a content filter and a filtered response transmitter.
- the request receiver receives from a client a request for content from at least one communications system.
- the request fransmitter transmits the proxy request to the at least one communications system.
- the response receiver receives response content from the communications system.
- the content filter removes undesired material from the response content to produce filtered response content.
- the filtered response transmitter which transmits the filtered response content to the client.
- the present invention provides a proxy system (e.g., a computer or server) which provides the capability to protect the client's communications system (e.g., computer) from being infiltrated by data-mining or spy software (spyware), malicious software (malware), or advertisement software, including pop-up advertisements (adware).
- the proxy system of the present invention can be used as an intermediary system which acts as a buffer between the client's communications system and the communications system from which content is being requested, presenting the client system's requests for information to the designated addressee and receiving the addressee's response.
- Another capability which can be provided by the proxy system of the present invention is the ability to remove the client's identifying information (e.g., the client's machine ID and/or the client's e-mail address) from a client's information request message before retransmitting the modified information request message to the designated addressee.
- the proxy system provides the capability to search the response's source code (e.g., hypertext markup language (HTML) source code) for spurious web content, including spyware, malware and adware.
- the proxy system can remove the identified spyware, malware and adware from the received data stream before the data stream is retransmitted to the client.
- the proxy system can thus prevent spyware, malware and adware from reaching and/or harming the client's communications system, and can thus act as a buffer between the client's communications system and the communications system (e.g., Internet) by removing bothersome and/or potentially harmful items before these items can infiltrate the client's communications system.
- the communications system e.g., Internet
- Figure 1 is a diagram of a client's interface to the Internet without the present invention.
- Figure 2 is a diagram of communications paths using a proxy system for Internet communications according to the present invention.
- PCs personal computers
- web "browsers” such as Microsoft Internet Explorer
- Netscape Navigator The web browsers provide the user with the ability to access information available on the Internet. Users now frequently access the Internet using their employer's computer system for both business and personal reasons. The potential for business computers being infiltrated and possibly attacked by spyware, adware and malware is high and can cause a serious disruption in the company's business activities.
- HTTP hypertext transfer protocol
- TCP Transmission Control Protocol
- HTTP is an application level protocol with the speed necessary for the distributed, collaborative, information systems of the Internet. HTTP has been in use by the World-Wide Web global information initiative since 1990.
- the data transferred by the HTTP protocol can be plain text, hypertext, audio, images, or any Internet- accessible information.
- HTTP is a stateless transaction-oriented client/server protocol, in which every request from a client to a web server is treated independently.
- a typical implementation creates a new TCP connection between a client and a web server for each transaction, then terminates the connection as soon as the transaction completes.
- the protocol does not require this one-to-one relationship between transaction and connection lifetimes and the connection can be maintained to complete additional transactions.
- the transaction-based approach of HTTP is beneficial for normal web applications involving retrieving a sequence of pages and documents.
- Web servers and clients (users) primarily communicate using two types of HTTP messages: request messages and response messages. A request message is sent by a client to a web server to initiate some action. Examples of HTTP request commands are presented in Table 1.
- HTTP response message may include an entity body containing hypertext-based information.
- response message must specify a status code, which indicates the action taken on the HTTP request.
- HTTP status code categories are shown in Table 2 and some examples of HTTP status codes are shown in Table 3.
- a client using a web browser, initiates an Internet request message (HTTP request message) for a resource, for instance, from a web server where desired information is located.
- HTTP request message an Internet request message
- the client's web browser opens a direct TCP connection (i.e., point-to-point) between the client's web browser and the web server. After opening the direct connection, the client's web browser issues the HTTP request message.
- the HTTP request message consists of a specific command (referred to as a method), a URL, and a message containing request parameters, information about the client, and perhaps additional content information.
- the HTTP response includes status category and status code (success/error) information, and a message containing information about the web server, information about the response itself, and possible data (body) content.
- the TCP connection is then closed.
- the HTTP request contains information about the web browser which sent the request.
- the web browser may be disclosing personal information including: the computer being used, the PC's software and hardware levels, details of the web sites the user has visited, and possibly even the user's email address.
- a "cookie" is often sent to the web browser.
- the cookie is a message given to a web browser by a web server that acts as a unique identifier that a web server places on a user's computer and can be used to retrieve an individual's records from a web server's database.
- the web browser stores the message in a text file and sends the cookie message back to the web server, as part of the HTTP request, each time the client's web browser requests information from the web server.
- Many organizations use "cookies" to track user's moves on their web site.
- a persistent cookie one that is stored on a user's computer until it expires or the user deletes it, can be used to collect identifying information about the user, such as web surfing behavior or user preferences for a specific web site.
- An aspect of the present invention is directed to preventing the disclosure or theft of the client user's personal information, including the client's identity, personal information, credit card information and web surfing activity.
- the present invention provides an intermediary buffer between the client's computer system and the Internet, and removes client identifying and personal information from HTTP request messages before the HTTP message is forwarded to the web server.
- the invention's ability to hide the client's identity is useful to alleviate industrial espionage related data gathering of client web activity and provides anonymous web browsing capability for the client.
- Another increasing problem on the Internet is the undesirable spurious content that may be attached to the information requested by the user. As noted below, the spurious content may include malware, spyware, and/or adware.
- Malware refers to software that is designed specifically to damage or disrupt a computer system, which includes viruses and Trojan horses. Malware is frequently delivered to a user's PC through pop-up windows that appear when a user accesses a web site or
- Some Trojan horse programs perform malicious acts - including capturing what is on a computer's screen and what is typed in using the keyboard. Trojans can also be used to remotely control PC devices or to set up FTP, HTTP or Telnet servers on an unsuspecting user's machine.
- Spyware is similar to malware (Trojans), in that users may unknowingly install a harmful program when installing some other desired program.
- Spyware refers to any software that covertly gathers information about the user through the user's Internet connection without the user's knowledge, usually for advertising purposes.
- Spyware applications are sometimes bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to a third party. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers, similar to malware.
- Spyware adversely impacts a computer system's performance by using up the memory resources available on the user's PC and also by using part of the user's available Internet connection's data transfer capability (bandwidth) as it sends information back to its creator. Also, because spyware is running in the background, using memory and system resources, spyware can cause general system instability and lead to system crashes. Malware is designed to disrupt the operation of the computer and frequently cause system lockup or crashes.
- the Internet proxy system can also be used to enhance security where a company intranet is protected by a firewall.
- the client company can restrict an employee's Internet access by requiring the firewall to validate a connection to the Internet proxy system before allowing the connection to be established.
- the present invention discloses proxy systems which comprise a plurality of components selected from among a request receiver, a request parser, a proxy system identification information inserter, a request transmitter, a response receiver, a content filter and a filtered response transmitter.
- the request receiver receives from a client (e.g., a personal computer or workstation) a request for content from at least one communications system.
- a request receiver can comprise, for example, a computer server, workstation or other communications device capable of receiving and handling a web browser generated message or any other standard Internet communication protocol formatted message received from any other communications system, which includes an FTP, Telenet or radio frequency (RF) connection.
- RF radio frequency
- the request parser removes from the request for content information identifying the client to produce an anonymous request.
- the request parser comprises a text processor.
- a variety of text processors are well known by those of skill art, any of which can be employed in connection with the present invention.
- the proxy system identification information inserter inserts information identifying the proxy system into the anonymous request to produce a proxy request.
- the proxy system identification information inserter comprises a text processor.
- a variety of text processors are well known by those of skill art, any of which can be employed in connection with the present invention.
- the request transmitter transmits the proxy request to the at least one communications system.
- Such a request transmitter can comprise, for example, a web browser or similar application program running on a computer server, a laptop or desktop personal computer, a handheld computer, a personal digital assistant, a cellular phone or other web-enabled communications device.
- a request transmitter can also be implemented using an FTP, Telenet or RF connection.
- the response receiver receives response content from the communications system.
- a response receiver can comprise, for example, an internet computer server, workstation or other communications device capable of receiving and handling a web server generated response message or any other standard Internet communication protocol formatted message received from any other communications system, which includes but is not limited to an FTP, Telenet or radio frequency (RF) connection.
- RF radio frequency
- the content filter removes undesired material from the response content to produce filtered response content.
- the content filter comprises a text processor.
- text processors are well known by those of skill art, any of which can be employed in connection with the present invention.
- the filtered response transmitter transmits the filtered response content to the client.
- Such a filtered response transmitter can comprise, for example, a web browser or similar application program running on a computer server, a laptop or desktop personal computer, a handheld computer, a personal digital assistant, a cellular phone or other web-enabled communications device.
- a filtered response transmitter can also be implemented using an FTP, Telenet or RF connection.
- a filtered response transmitter can communicate the response to the client in a manner similar to that in which the request was received.
- the proxy system may optionally further comprise an undesired material information receiver which collects information regarding adware, spyware and/or malware.
- an undesired material information receiver can comprise, for example, one or more application programs, which further analyze the identified adware, malware and spyware.
- the application programs can include functions to allow manual or automatic update of the proprietary database with the analysis results.
- the proxy system can use intelligent data analysis programming to control database updating.
- a proxy system By preventing spyware, adware and malware, as well as web-based advertisements, including pop-up advertisements, from infiltrating the client's computer system, a proxy system according to the present invention enhances the client's computer system performance by saving memory space and computer system speed and reduces or eliminates the risk of a computer virus infecting the client's system, thereby avoiding lost productivity.
- HTML Hypertext Markup Language
- HTML is the scripting language used to create documents for the Internet.
- software developers use markup languages to describe the structure of the document.
- the web browser reading the HTML document interprets the markup tags or commands to help format the document for subsequent display to a user.
- the web browser thus displays the document with regard to features that the viewer selects either explicitly or implicitly. Factors affecting the layout and presentation include, for instance, the markup tags used, the physical page width available, and the fonts used to display the text.
- HTML documents require an ordered sequence of standard HTML tags to be correctly interpreted by web browsers. Ih compliance with HTML and standard generalized markup language (SGML) specifications, the web browser's programming expects this specific sequence of tag information to properly display an HTML document to the user accessing them.
- HTML document consists of head and body text. The head contains the title, and the body contains the actual text that is made up of paragraphs, lists, and other elements.
- HTML marks the various elements in a document, including headings, paragraphs, lists, and tables. Elements can contain plain text, other elements, or both.
- An HTML document also includes formatting commands or "tags" embedded within the text of the document that serve as commands to a web browser.
- the basic layout of an HTML document, including required elements, is illustrated by the following simple HTML document.
- the required elements of an HTML request message include the ⁇ HTML>, ⁇ HEAD>, ⁇ TITLE>, and ⁇ BODY> tags, together with their corresponding ⁇ /HTML>, ⁇ /HEAD>, ⁇ /TITLE>, and ⁇ /BODY>end tags.
- the content of the HTML request message element is the text or data located between the first tag and the corresponding end tag (i.e., ⁇ HEAD> ⁇ /HEAD>.
- the HTML tag pair's function is listed in Table 4. Table 4 HTML Tags Function
- a proxy system is used in connection with accessing content from the Internet by clients using a personal computer (PC) or workstation operating a web browser, such as Netscape Navigator or Microsoft Internet Explorer.
- the client PC can be operating standalone or as part of an intranet.
- the client may access the Internet by establishing a TCP connection using the HTTP request-response protocol on the Transmission Control Protocol/Internet Protocol (TCP/IP).
- TCP/IP Transmission Control Protocol/Internet Protocol
- a user uses a web browser to establish a point-to-point connection on the Internet.
- the web browser issues an HTTP request message to access individual web sites and retrieve desired information.
- An HTTP Request or Response message uses a generic message format, defined in Table 1, for requesting data and transferring the data requested.
- the client's computer When the client connects to the Internet, the client's computer is vulnerable to infiltration or possibly attack by third parties, as depicted in Figure 1.
- the source of a majority of the spurious content is the target web site because the TCP connection is poiiit-to- point.
- the remaining sources can usually be blocked using a firewall and are well known in the art and further description is not needed.
- the present invention uses a proxy system to prevent infiltration of the client's computer by spurious content that may be attached to the requested data.
- the client establishes a point-to-point TCP connection to the proxy system, as depicted in Figure 2, instead of establishing a point-to-point TCP connection between the client's PC and a web server containing the information desired by the client.
- the proxy system acts as an intermediary buffer between the client's computer system and the Internet web server, shielding the client's computer system from disclosing client specific data, personal information or even the client's web surfing activity.
- the proxy system first receives the request message from the client, as depicted by item (1) in Figure 2.
- the proxy system then "deconstructs" or "parses” the HTTP request message received from the client, using a text processor program.
- the text processor program searches and identifies the web server designated to be the recipient of the message and HTTP request message status and content.
- the identified information is transferred to a new HTTP request message that contains the proxy system's identifying information.
- the proxy system then transmits the modified version of the client's HTTP request message as an HTTP request from the proxy system to the designated communication system (e.g., web server), as depicted by item (2) in Figure 2.
- the transmission of the modified HTTP message modifications prevents disclosure of client information or web browsing activity, providing the client the ability to "surf the Internet anonymously.
- the client is required to "log in” to the proxy system that verifies the client's identity and subscription service status before permitting the client to proceed.
- a client authentication can comprise a basic log-in name and password authentication procedure or the use of a certificate (a digital credential) which is used for establishing a Secure Socket Layer (SSL) connection.
- Additional authentication options include the use of an encryption device, the use of an encryption program with a user public key, such as PGP, or more elaborate procedures such as RSA SecurID, a random password generator, which can be implemented on the client side or proxy server side.
- the proxy system When the designated communications system (e.g., web server) responds with an HTTP response message containing a cookie, as depicted by item (3) in Figure 2, the proxy system preferably responds to any information requested with the proxy system's information and stores the cookie in a text file in a temporary memory area that is deleted when the HTTP response completing the transaction has been received. By acting as a buffer between the web server and the client's computer system, the proxy system limits the cookie to reporting the proxy system's information, (i.e., computer being used, hardware and software levels), preventing the client's computer system information from being disclosed.
- the proxy system's information i.e., computer being used, hardware and software levels
- the proxy system receives the HTTP response as a stream of data from the web server. After receiving the data, the proxy system preferably first "deconstructs” or “parses” the received HTTP response message, using a text processor program. The text processor searches the received data stream for valid HTML tag pair by initially locating a valid " ⁇ " symbol, denoting the beginning of an HTML tag pair. After locating the initial valid left side " ⁇ " symbol, the proxy system then removes the HTTP response header information which includes the information preceding the first valid left side " ⁇ " symbol.
- a text processor program searches the received data stream for valid HTML tag pair by initially locating a valid " ⁇ " symbol, denoting the beginning of an HTML tag pair. After locating the initial valid left side " ⁇ " symbol, the proxy system then removes the HTTP response header information which includes the information preceding the first valid left side " ⁇ " symbol.
- the proxy system continues searching the HTTP request message for the corresponding right side of the tag (i.e., ">" symbol). After locating a complete tag pair, the proxy system allocates memory for the data contained by the tag pair, including the tag delimiters. After identifying the valid HTML tag pairs, the proxy system then preferably searches the data contained in each individual tag pair combination for any embedded HTML tag pairs within each identified pair.
- the proxy system preferably searches the content defined by each HTML tag pair for text strings indicating the presence of malware, spyware or adware (e.g., Internet advertisements, including pop-ups).
- the proxy system preferably compares the text contained within the HTML tag pairs against the proprietary database of malware, spyware or adware resident on the proxy system.
- Discovered malware, spyware or adware (e.g., Internet advertisements, including pop- ups) is preferably removed by the proxy system.
- the removed malware, spyware or adware is replaced with a null data set as a placeholder of equal size.
- the proxy system preferably reformats the remaining data from the original HTTP response message and the portions of the original HTML response now containing null data to properly display the remaining data to the client.
- the proxy system reformats the data remaining in the received HTML response message to facilitate viewing by the client.
- the modified version of the HTTP response message is transmitted to the client's computer system, as depicted by item (5) in Figure 2.
- a client is preferably allocated a portion of the memory available on the proxy system when a connection is established between the client's computer system and the proxy system. This allocated memory is used to store (e.g., cache) HTML web pages accessed by the client.
- the proxy system After the proxy system has modified the HTTP response message, removing malware, spyware or adware, the proxy system copies the modified HTTP response message's data to the client's allocated memory cache.
- the proxy system sends an HTTP message to check the date of the file on the web server and compares the date against the date of the cached file.
- the proxy system retransmits the cached file to the client instead of downloading it again from the web server.
- the use of cache for frequently accessed web pages increases proxy system response time to client requests.
- the web pages can be retained in the allocated memory either for a fixed period of time or until the connection between the client and the proxy system is closed.
- the proxy system maintains the client accessed web pages for 2 hours.
- the proxy system preferably automatically caches frequently accessed web pages, such as the CNN home page.
- the proxy system preferably periodically updates such frequently accessed web page content.
- the proxy system updates the common use web pages every repeated time interval, e.g., every 20 seconds.
- Any two or more parts of the proxy systems described herein can be integrated. Any structural part of the proxy systems described herein can be provided in two or more parts. Similarly, any two or more functions can be conducted simultaneously, and/or any function can be conducted in a series of steps.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Library & Information Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US62632404P | 2004-11-09 | 2004-11-09 | |
| US60/626,324 | 2004-11-09 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| WO2006052714A2 true WO2006052714A2 (en) | 2006-05-18 |
| WO2006052714A3 WO2006052714A3 (en) | 2006-09-21 |
| WO2006052714A9 WO2006052714A9 (en) | 2009-01-22 |
Family
ID=36337017
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2005/039939 Ceased WO2006052714A2 (en) | 2004-11-09 | 2005-11-03 | Apparatus and method for protection of communications systems |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2006052714A2 (en) |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8281147B2 (en) | 2007-06-21 | 2012-10-02 | Microsoft Corporation | Image based shared secret proxy for secure password entry |
| EP2536105A1 (en) * | 2011-06-15 | 2012-12-19 | Juniper Networks, Inc. | Routing proxy for resource requests and resources |
| CN102833306A (en) * | 2011-06-15 | 2012-12-19 | 丛林网络公司 | Network integrated dynamic resource routing |
| US20140201221A1 (en) * | 2013-01-16 | 2014-07-17 | Market76, Inc. | Computer-based system for use in providing advisory services |
| EP2830274A1 (en) * | 2013-07-23 | 2015-01-28 | Knightsbridge Portable Communications SP | Method for electronic transmission of a message and proxy device therefore |
| US9571566B2 (en) | 2011-06-15 | 2017-02-14 | Juniper Networks, Inc. | Terminating connections and selecting target source devices for resource requests |
| US20170134428A1 (en) * | 2015-11-10 | 2017-05-11 | Dell Software Inc. | Firewall informed by web server security policy identifying authorized resources and hosts |
| WO2017216774A1 (en) * | 2016-06-16 | 2017-12-21 | Beestripe Llc | Method for identifying and removing malicious software |
| US9860259B2 (en) | 2015-12-10 | 2018-01-02 | Sonicwall Us Holdings Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US10237364B2 (en) | 2016-03-24 | 2019-03-19 | International Business Machines Corporation | Resource usage anonymization |
| WO2019121659A1 (en) * | 2017-12-18 | 2019-06-27 | Luxembourg Institute Of Science And Technology (List) | Proxy for avoiding on-line tracking of user |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6754181B1 (en) * | 1996-11-18 | 2004-06-22 | Mci Communications Corporation | System and method for a directory service supporting a hybrid communication system architecture |
| US8271336B2 (en) * | 1999-11-22 | 2012-09-18 | Accenture Global Services Gmbh | Increased visibility during order management in a network-based supply chain environment |
| US20020152305A1 (en) * | 2000-03-03 | 2002-10-17 | Jackson Gregory J. | Systems and methods for resource utilization analysis in information management environments |
| US7349371B2 (en) * | 2000-09-29 | 2008-03-25 | Arraycomm, Llc | Selecting random access channels |
| CN1575470A (en) * | 2001-10-23 | 2005-02-02 | 皇家飞利浦电子股份有限公司 | Anonymous network-access method and client |
| US6772345B1 (en) * | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
-
2005
- 2005-11-03 WO PCT/US2005/039939 patent/WO2006052714A2/en not_active Ceased
Cited By (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8281147B2 (en) | 2007-06-21 | 2012-10-02 | Microsoft Corporation | Image based shared secret proxy for secure password entry |
| CN102833148B (en) * | 2011-06-15 | 2016-01-20 | 瞻博网络公司 | Resource request and resource routing proxy |
| CN102833148A (en) * | 2011-06-15 | 2012-12-19 | 丛林网络公司 | Resource request and resource routing agent |
| CN102833306A (en) * | 2011-06-15 | 2012-12-19 | 丛林网络公司 | Network integrated dynamic resource routing |
| EP2536097A1 (en) * | 2011-06-15 | 2012-12-19 | Juniper Networks, Inc. | Network integrated dynamic resource routing |
| US8504723B2 (en) | 2011-06-15 | 2013-08-06 | Juniper Networks, Inc. | Routing proxy for resource requests and resources |
| EP2536105A1 (en) * | 2011-06-15 | 2012-12-19 | Juniper Networks, Inc. | Routing proxy for resource requests and resources |
| US9647871B2 (en) | 2011-06-15 | 2017-05-09 | Juniper Networks, Inc. | Routing proxy for resource requests and resources |
| US9571566B2 (en) | 2011-06-15 | 2017-02-14 | Juniper Networks, Inc. | Terminating connections and selecting target source devices for resource requests |
| CN105407164A (en) * | 2011-06-15 | 2016-03-16 | 瞻博网络公司 | Routing proxy for resource requests and resources |
| US9363327B2 (en) | 2011-06-15 | 2016-06-07 | Juniper Networks, Inc. | Network integrated dynamic resource routing |
| CN102833306B (en) * | 2011-06-15 | 2016-06-08 | 瞻博网络公司 | The dynamic resource routing of system integrating |
| US20140201221A1 (en) * | 2013-01-16 | 2014-07-17 | Market76, Inc. | Computer-based system for use in providing advisory services |
| US9514231B2 (en) * | 2013-01-16 | 2016-12-06 | Market76, Inc. | Computer-based system for use in providing advisory services |
| EP2830274A1 (en) * | 2013-07-23 | 2015-01-28 | Knightsbridge Portable Communications SP | Method for electronic transmission of a message and proxy device therefore |
| WO2015011175A1 (en) * | 2013-07-23 | 2015-01-29 | Knightsbridge Portable Communications Sp | Method for electronic transmission of a message and proxy device therefore |
| US20170134428A1 (en) * | 2015-11-10 | 2017-05-11 | Dell Software Inc. | Firewall informed by web server security policy identifying authorized resources and hosts |
| US9723027B2 (en) | 2015-11-10 | 2017-08-01 | Sonicwall Inc. | Firewall informed by web server security policy identifying authorized resources and hosts |
| US10491566B2 (en) | 2015-11-10 | 2019-11-26 | Sonicwall Inc. | Firewall informed by web server security policy identifying authorized resources and hosts |
| US11005858B2 (en) | 2015-12-10 | 2021-05-11 | Sonicwall Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US9860259B2 (en) | 2015-12-10 | 2018-01-02 | Sonicwall Us Holdings Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US12095779B2 (en) | 2015-12-10 | 2024-09-17 | Sonicwall Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US11695784B2 (en) | 2015-12-10 | 2023-07-04 | Sonicwall Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US10630697B2 (en) | 2015-12-10 | 2020-04-21 | Sonicwall Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US10237364B2 (en) | 2016-03-24 | 2019-03-19 | International Business Machines Corporation | Resource usage anonymization |
| WO2017216774A1 (en) * | 2016-06-16 | 2017-12-21 | Beestripe Llc | Method for identifying and removing malicious software |
| US11190612B2 (en) | 2017-12-18 | 2021-11-30 | Luxembourg Institute Of Science And Technology (List) | Proxy for avoiding on-line tracking of user |
| LU100580B1 (en) * | 2017-12-18 | 2019-06-28 | Luxembourg Inst Science & Tech List | Profiling proxy |
| WO2019121659A1 (en) * | 2017-12-18 | 2019-06-27 | Luxembourg Institute Of Science And Technology (List) | Proxy for avoiding on-line tracking of user |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2006052714A3 (en) | 2006-09-21 |
| WO2006052714A9 (en) | 2009-01-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10491614B2 (en) | Illegitimate typosquatting detection with internet protocol information | |
| US8978140B2 (en) | System and method of analyzing web content | |
| CN101512522B (en) | System and method for analyzing web content | |
| US8826411B2 (en) | Client-side extensions for use in connection with HTTP proxy policy enforcement | |
| US9055093B2 (en) | Method, system and computer program product for detecting at least one of security threats and undesirable computer files | |
| US8677481B1 (en) | Verification of web page integrity | |
| KR101497742B1 (en) | System and method for authentication, data transfer, and protection against phising | |
| Kirda et al. | Client-side cross-site scripting protection | |
| US6789201B2 (en) | Anti-virus toolbar system and method for use with a network browser | |
| US8850584B2 (en) | Systems and methods for malware detection | |
| US7707636B2 (en) | Systems and methods for determining anti-virus protection status | |
| US20080222299A1 (en) | Method for preventing session token theft | |
| US20100306184A1 (en) | Method and device for processing webpage data | |
| US20140283078A1 (en) | Scanning and filtering of hosted content | |
| US7325185B1 (en) | Host-based detection and prevention of malicious code propagation | |
| WO2006052714A2 (en) | Apparatus and method for protection of communications systems | |
| US8196200B1 (en) | Piggybacking malicious code blocker | |
| Gaur | Assessing the security of your web applications | |
| Hromcová et al. | Anatomy of native IIS malware | |
| EP4456484A1 (en) | Encrypted interstitial techniques for web security | |
| Al-Ibrahim | Are our Educational Technology Systems Secured? | |
| CN110266724A (en) | Malicious server detection method and device | |
| Sanyasi | Demographics of Adware and Spyware | |
| Jackson et al. | WEEK IN REVIEW | |
| Jiva | Helping Johnny pentest: addressing the shortcomings of black-box Web vulnerability scanners |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 05815674 Country of ref document: EP Kind code of ref document: A2 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 05815674 Country of ref document: EP Kind code of ref document: A2 |