WO2006052714A3 - Apparatus and method for protection of communications systems - Google Patents
Apparatus and method for protection of communications systems Download PDFInfo
- Publication number
- WO2006052714A3 WO2006052714A3 PCT/US2005/039939 US2005039939W WO2006052714A3 WO 2006052714 A3 WO2006052714 A3 WO 2006052714A3 US 2005039939 W US2005039939 W US 2005039939W WO 2006052714 A3 WO2006052714 A3 WO 2006052714A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- client
- request
- proxy
- content
- methods
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/142—Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/561—Adding application-functional data or data for application control, e.g. adding metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
- H04L67/5651—Reducing the amount or size of exchanged application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Library & Information Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US62632404P | 2004-11-09 | 2004-11-09 | |
| US60/626,324 | 2004-11-09 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| WO2006052714A2 WO2006052714A2 (en) | 2006-05-18 |
| WO2006052714A3 true WO2006052714A3 (en) | 2006-09-21 |
| WO2006052714A9 WO2006052714A9 (en) | 2009-01-22 |
Family
ID=36337017
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2005/039939 Ceased WO2006052714A2 (en) | 2004-11-09 | 2005-11-03 | Apparatus and method for protection of communications systems |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2006052714A2 (en) |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8281147B2 (en) | 2007-06-21 | 2012-10-02 | Microsoft Corporation | Image based shared secret proxy for secure password entry |
| US9363327B2 (en) * | 2011-06-15 | 2016-06-07 | Juniper Networks, Inc. | Network integrated dynamic resource routing |
| US8504723B2 (en) * | 2011-06-15 | 2013-08-06 | Juniper Networks, Inc. | Routing proxy for resource requests and resources |
| US9571566B2 (en) | 2011-06-15 | 2017-02-14 | Juniper Networks, Inc. | Terminating connections and selecting target source devices for resource requests |
| US9514231B2 (en) * | 2013-01-16 | 2016-12-06 | Market76, Inc. | Computer-based system for use in providing advisory services |
| EP2830274A1 (en) * | 2013-07-23 | 2015-01-28 | Knightsbridge Portable Communications SP | Method for electronic transmission of a message and proxy device therefore |
| US9723027B2 (en) * | 2015-11-10 | 2017-08-01 | Sonicwall Inc. | Firewall informed by web server security policy identifying authorized resources and hosts |
| US9860259B2 (en) | 2015-12-10 | 2018-01-02 | Sonicwall Us Holdings Inc. | Reassembly free deep packet inspection for peer to peer networks |
| US10237364B2 (en) | 2016-03-24 | 2019-03-19 | International Business Machines Corporation | Resource usage anonymization |
| EP3475867A4 (en) * | 2016-06-16 | 2019-07-03 | Beestripe LLC | Method for identifying and removing malicious software |
| LU100580B1 (en) * | 2017-12-18 | 2019-06-28 | Luxembourg Inst Science & Tech List | Profiling proxy |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020152305A1 (en) * | 2000-03-03 | 2002-10-17 | Jackson Gregory J. | Systems and methods for resource utilization analysis in information management environments |
| US20030080997A1 (en) * | 2001-10-23 | 2003-05-01 | Marcel Fuehren | Anonymous network-access method and client |
| US20030133426A1 (en) * | 2000-09-29 | 2003-07-17 | Brett Schein | Selecting random access channels |
| US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
| US6754181B1 (en) * | 1996-11-18 | 2004-06-22 | Mci Communications Corporation | System and method for a directory service supporting a hybrid communication system architecture |
| US6772345B1 (en) * | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
-
2005
- 2005-11-03 WO PCT/US2005/039939 patent/WO2006052714A2/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6754181B1 (en) * | 1996-11-18 | 2004-06-22 | Mci Communications Corporation | System and method for a directory service supporting a hybrid communication system architecture |
| US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
| US20020152305A1 (en) * | 2000-03-03 | 2002-10-17 | Jackson Gregory J. | Systems and methods for resource utilization analysis in information management environments |
| US20030133426A1 (en) * | 2000-09-29 | 2003-07-17 | Brett Schein | Selecting random access channels |
| US20030080997A1 (en) * | 2001-10-23 | 2003-05-01 | Marcel Fuehren | Anonymous network-access method and client |
| US6772345B1 (en) * | 2002-02-08 | 2004-08-03 | Networks Associates Technology, Inc. | Protocol-level malware scanner |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2006052714A2 (en) | 2006-05-18 |
| WO2006052714A9 (en) | 2009-01-22 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7424609B2 (en) | Method and system for protecting against computer viruses | |
| Thomas et al. | Investigating commercial {Pay-Per-Install} and the distribution of unwanted software | |
| Caballero et al. | Measuring {Pay-per-Install}: The commoditization of malware distribution | |
| US9092823B2 (en) | Internet fraud prevention | |
| JP5878560B2 (en) | System and method for detecting malicious PDF network content | |
| Sood et al. | Malvertising–exploiting web advertising | |
| WO2004095281A3 (en) | System and method for network quality of service protection on security breach detection | |
| CA2777831C (en) | Detecting and responding to malware using link files | |
| WO2006052714A3 (en) | Apparatus and method for protection of communications systems | |
| FR2906661B1 (en) | METHOD FOR PROVIDING AUTHENTICATION PARAMETERS AND SOFTWARE IMAGES IN SECURE NETWORK ENVIRONMENTS | |
| Kalaimannan et al. | Influences on ransomware’s evolution and predictions for the future challenges | |
| Tasril et al. | Threats of computer system and its prevention | |
| US9069964B2 (en) | Identification of malicious activities through non-logged-in host usage | |
| Rawal et al. | Malware | |
| Paulson | Spam hits instant messaging | |
| Emm | Focus on trojans–holding data to ransom | |
| Intelligence | Mariposa botnet analysis | |
| Falcone et al. | New sofacy attacks against US government agency | |
| GK | MALWARE DETECTION USING HONEYPOT BASED ON MACHINE LEARNING | |
| KR20030003640A (en) | System and Method for mailing warning e-mail against the worm virus and anti-virus vaccine automatically against it | |
| KR20030021859A (en) | System and Method for mailing warning message against the worm virus and anti-virus vaccine automatically against it via wireless networks | |
| Hughes | A report on safe use of the Internet: Some of the most common risks | |
| Furnell | Mac security: An Apple that can't be bitten? | |
| Ben-Itzhak | Defending your organization against the new generation of Web-based hybrid | |
| Hunter | Proactive security latest: vendors wire the cage but has the budgie flown…. |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 05815674 Country of ref document: EP Kind code of ref document: A2 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 05815674 Country of ref document: EP Kind code of ref document: A2 |