CN1578218A - 用透明虚拟专用网络减少网络配置复杂性 - Google Patents
用透明虚拟专用网络减少网络配置复杂性 Download PDFInfo
- Publication number
- CN1578218A CN1578218A CNA2004100632440A CN200410063244A CN1578218A CN 1578218 A CN1578218 A CN 1578218A CN A2004100632440 A CNA2004100632440 A CN A2004100632440A CN 200410063244 A CN200410063244 A CN 200410063244A CN 1578218 A CN1578218 A CN 1578218A
- Authority
- CN
- China
- Prior art keywords
- client
- compartment wall
- fire compartment
- private network
- network resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
Description
Claims (51)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/611,832 US7305705B2 (en) | 2003-06-30 | 2003-06-30 | Reducing network configuration complexity with transparent virtual private networks |
US10/611,832 | 2003-06-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1578218A true CN1578218A (zh) | 2005-02-09 |
CN1578218B CN1578218B (zh) | 2010-12-08 |
Family
ID=33435444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2004100632440A Expired - Fee Related CN1578218B (zh) | 2003-06-30 | 2004-06-30 | 用透明虚拟专用网络减少网络配置复杂性 |
Country Status (7)
Country | Link |
---|---|
US (1) | US7305705B2 (zh) |
EP (1) | EP1494420B1 (zh) |
JP (1) | JP4558389B2 (zh) |
KR (1) | KR101076848B1 (zh) |
CN (1) | CN1578218B (zh) |
AT (1) | ATE476044T1 (zh) |
DE (1) | DE602004028316D1 (zh) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222456A (zh) * | 2008-01-28 | 2008-07-16 | 陈勇 | 网络安全网关产品共享的方法 |
CN102131189A (zh) * | 2010-12-28 | 2011-07-20 | 中国电信股份有限公司 | 采集仪、移动监管方法和系统 |
CN102404334A (zh) * | 2011-12-07 | 2012-04-04 | 山石网科通信技术(北京)有限公司 | 拒绝服务攻击防护方法及装置 |
CN102611700A (zh) * | 2012-02-24 | 2012-07-25 | 汉柏科技有限公司 | 一种在透明模式下实现vpn接入的方法 |
WO2015021897A1 (en) * | 2013-08-12 | 2015-02-19 | Tencent Technology (Shenzhen) Company Limited | Method, apparatus and system for defending against network attack |
CN106357590A (zh) * | 2015-07-15 | 2017-01-25 | 艾默生网络能源系统北美公司 | 一种网络协议转换系统、网络协议转换器及其转换方法 |
CN107465752A (zh) * | 2017-08-22 | 2017-12-12 | 郑州云海信息技术有限公司 | 一种连接管理方法及装置 |
WO2023000248A1 (en) * | 2021-07-22 | 2023-01-26 | Huawei Technologies Co., Ltd. | Authentication methods using zero-knowledge proof algorithms for user equipments and nodes implementing the authentication methods |
Families Citing this family (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030115480A1 (en) * | 2001-12-17 | 2003-06-19 | Worldcom, Inc. | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks |
US7289522B2 (en) * | 2001-03-20 | 2007-10-30 | Verizon Business Global Llc | Shared dedicated access line (DAL) gateway routing discrimination |
US7840806B2 (en) * | 2002-10-16 | 2010-11-23 | Enterprise Information Management, Inc. | System and method of non-centralized zero knowledge authentication for a computer network |
US8239917B2 (en) * | 2002-10-16 | 2012-08-07 | Enterprise Information Management, Inc. | Systems and methods for enterprise security with collaborative peer to peer architecture |
GB2414627A (en) * | 2004-05-27 | 2005-11-30 | Hewlett Packard Development Co | Network administration |
US7594259B1 (en) * | 2004-09-15 | 2009-09-22 | Nortel Networks Limited | Method and system for enabling firewall traversal |
US8250214B2 (en) * | 2004-12-20 | 2012-08-21 | Vmware, Inc. | System, method and computer program product for communicating with a private network |
US8261341B2 (en) * | 2005-01-27 | 2012-09-04 | Nokia Corporation | UPnP VPN gateway configuration service |
US20060235973A1 (en) * | 2005-04-14 | 2006-10-19 | Alcatel | Network services infrastructure systems and methods |
US8132005B2 (en) * | 2005-07-07 | 2012-03-06 | Nokia Corporation | Establishment of a trusted relationship between unknown communication parties |
US8166538B2 (en) * | 2005-07-08 | 2012-04-24 | Microsoft Corporation | Unified architecture for remote network access |
US20070033646A1 (en) * | 2005-08-05 | 2007-02-08 | Sierra Wireless, Inc. A Canadian Corp. | Suspension and resumption of secure data connection session |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
CA2632235A1 (en) | 2005-12-02 | 2007-06-07 | Citrix Systems, Inc. | Method and apparatus for providing authentication credentials from a proxy server to a virtualized computing environment to access a remote resource |
US7614080B2 (en) * | 2005-12-28 | 2009-11-03 | Panasonic Electric Works Co., Ltd. | Systems and methods for providing secure access to embedded devices using a trust manager and a security broker |
KR100828372B1 (ko) * | 2005-12-29 | 2008-05-08 | 삼성전자주식회사 | 서비스 거부 공격으로부터 서버를 보호하는 방법 및 장치 |
DE602007014013D1 (de) * | 2006-02-06 | 2011-06-01 | Koninkl Philips Electronics Nv | Audio-video-schalter |
US9781162B2 (en) * | 2006-02-15 | 2017-10-03 | International Business Machines Corporation | Predictive generation of a security network protocol configuration |
US8356171B2 (en) * | 2006-04-26 | 2013-01-15 | Cisco Technology, Inc. | System and method for implementing fast reauthentication |
US8418243B2 (en) * | 2006-08-21 | 2013-04-09 | Citrix Systems, Inc. | Systems and methods of providing an intranet internet protocol address to a client on a virtual private network |
US8213393B2 (en) | 2006-08-21 | 2012-07-03 | Citrix Systems, Inc. | Methods for associating an IP address to a user via an appliance |
US8451806B2 (en) * | 2006-08-21 | 2013-05-28 | Citrix Sysrems, Inc. | Systems and methods for pinging a user's intranet IP address |
US7788513B2 (en) | 2006-08-29 | 2010-08-31 | Hewlett-Packard Development Company, L.P. | Method of reducing power consumption of a computing system by evacuating selective platform memory components thereof |
GB0623101D0 (en) | 2006-11-20 | 2006-12-27 | British Telecomm | Secure network architecture |
US9009327B2 (en) * | 2007-08-03 | 2015-04-14 | Citrix Systems, Inc. | Systems and methods for providing IIP address stickiness in an SSL VPN session failover environment |
US8676998B2 (en) * | 2007-11-29 | 2014-03-18 | Red Hat, Inc. | Reverse network authentication for nonstandard threat profiles |
KR101022508B1 (ko) * | 2009-03-30 | 2011-03-16 | 플러스기술주식회사 | 서비스 거부 공격 및 분산 서비스 공격 차단 시스템 |
US20100325424A1 (en) * | 2009-06-19 | 2010-12-23 | Etchegoyen Craig S | System and Method for Secured Communications |
US10721269B1 (en) * | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
WO2014150567A1 (en) | 2013-03-15 | 2014-09-25 | Asguard Networks, Inc. | Industrial network security |
US9729580B2 (en) | 2014-07-30 | 2017-08-08 | Tempered Networks, Inc. | Performing actions via devices that establish a secure, private network |
US9148408B1 (en) | 2014-10-06 | 2015-09-29 | Cryptzone North America, Inc. | Systems and methods for protecting network devices |
US9300635B1 (en) | 2015-06-15 | 2016-03-29 | Tempered Networks, Inc. | Overlay network with position independent insertion and tap points |
WO2017007705A1 (en) | 2015-07-06 | 2017-01-12 | Shape Security, Inc. | Asymmetrical challenges for web security |
US10003466B1 (en) * | 2015-09-15 | 2018-06-19 | Amazon Technologies, Inc. | Network traffic with credential signatures |
US10412048B2 (en) | 2016-02-08 | 2019-09-10 | Cryptzone North America, Inc. | Protecting network devices by a firewall |
US9628444B1 (en) | 2016-02-08 | 2017-04-18 | Cryptzone North America, Inc. | Protecting network devices by a firewall |
US9560015B1 (en) | 2016-04-12 | 2017-01-31 | Cryptzone North America, Inc. | Systems and methods for protecting network devices by a firewall |
US9729581B1 (en) | 2016-07-01 | 2017-08-08 | Tempered Networks, Inc. | Horizontal switch scalability via load balancing |
KR102510868B1 (ko) * | 2016-07-07 | 2023-03-16 | 삼성에스디에스 주식회사 | 클라이언트 시스템 인증 방법, 클라이언트 장치 및 인증 서버 |
US10630507B2 (en) * | 2016-11-29 | 2020-04-21 | Ale International | System for and method of establishing a connection between a first electronic device and a second electronic device |
CN108322366B (zh) * | 2017-01-17 | 2021-10-01 | 阿里巴巴集团控股有限公司 | 接入网络的方法、装置和系统 |
JP7148947B2 (ja) * | 2017-06-07 | 2022-10-06 | コネクトフリー株式会社 | ネットワークシステムおよび情報処理装置 |
US10069726B1 (en) | 2018-03-16 | 2018-09-04 | Tempered Networks, Inc. | Overlay network identity-based relay |
KR101997847B1 (ko) | 2018-04-26 | 2019-07-08 | (주)티에스이 | 냉각제를 이용한 반도체소자 테스트용 인터페이스 보드 |
KR102015395B1 (ko) | 2018-05-15 | 2019-08-28 | (주)티에스이 | 반도체소자 테스트용 인터페이스 보드 |
US10116539B1 (en) | 2018-05-23 | 2018-10-30 | Tempered Networks, Inc. | Multi-link network gateway with monitoring and dynamic failover |
US10158545B1 (en) | 2018-05-31 | 2018-12-18 | Tempered Networks, Inc. | Monitoring overlay networks |
US10911418B1 (en) | 2020-06-26 | 2021-02-02 | Tempered Networks, Inc. | Port level policy isolation in overlay networks |
US11070594B1 (en) | 2020-10-16 | 2021-07-20 | Tempered Networks, Inc. | Applying overlay network policy based on users |
US10999154B1 (en) | 2020-10-23 | 2021-05-04 | Tempered Networks, Inc. | Relay node management for overlay networks |
Family Cites Families (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2700430B1 (fr) * | 1992-12-30 | 1995-02-10 | Jacques Stern | Procédé d'authentification d'au moins un dispositif d'identification par un dispositif de vérification et dispositif pour sa mise en Óoeuvre. |
US5835726A (en) * | 1993-12-15 | 1998-11-10 | Check Point Software Technologies Ltd. | System for securing the flow of and selectively modifying packets in a computer network |
WO1997000471A2 (en) | 1993-12-15 | 1997-01-03 | Check Point Software Technologies Ltd. | A system for securing the flow of and selectively modifying packets in a computer network |
US5511122A (en) * | 1994-06-03 | 1996-04-23 | The United States Of America As Represented By The Secretary Of The Navy | Intermediate network authentication |
US6631435B1 (en) * | 1996-02-02 | 2003-10-07 | Sony Corporation | Application programming interface for data transfer and bus management over a bus structure |
US5983350A (en) * | 1996-09-18 | 1999-11-09 | Secure Computing Corporation | Secure firewall supporting different levels of authentication based on address or encryption status |
US6009475A (en) * | 1996-12-23 | 1999-12-28 | International Business Machines Corporation | Filter rule validation and administration for firewalls |
EP1010049B1 (en) * | 1997-05-13 | 2006-05-03 | Passlogix, Inc. | Generalized user identification and authentication system |
JP3655437B2 (ja) * | 1997-07-10 | 2005-06-02 | 日本電信電話株式会社 | 個人識別方法、セキュリティ・システム本体装置および個人識別プログラムを格納した記録媒体 |
US6230271B1 (en) * | 1998-01-20 | 2001-05-08 | Pilot Network Services, Inc. | Dynamic policy-based apparatus for wide-range configurable network service authentication and access control using a fixed-path hardware configuration |
US6141755A (en) * | 1998-04-13 | 2000-10-31 | The United States Of America As Represented By The Director Of The National Security Agency | Firewall security apparatus for high-speed circuit switched networks |
US6317838B1 (en) * | 1998-04-29 | 2001-11-13 | Bull S.A. | Method and architecture to provide a secured remote access to private resources |
JPH11328118A (ja) * | 1998-05-19 | 1999-11-30 | Hitachi Ltd | ユーザ認証方法および記録媒体 |
US6615358B1 (en) * | 1998-08-07 | 2003-09-02 | Patrick W. Dowd | Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network |
US6502135B1 (en) * | 1998-10-30 | 2002-12-31 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
CA2349520C (en) * | 1998-10-30 | 2011-05-17 | Science Applications International Corporation | An agile network protocol for secure communications with assured system availability |
US7051365B1 (en) * | 1999-06-30 | 2006-05-23 | At&T Corp. | Method and apparatus for a distributed firewall |
US7058817B1 (en) * | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
US6473863B1 (en) * | 1999-10-28 | 2002-10-29 | International Business Machines Corporation | Automatic virtual private network internet snoop avoider |
US6496935B1 (en) * | 2000-03-02 | 2002-12-17 | Check Point Software Technologies Ltd | System, device and method for rapid packet filtering and processing |
US6898710B1 (en) * | 2000-06-09 | 2005-05-24 | Northop Grumman Corporation | System and method for secure legacy enclaves in a public key infrastructure |
AU2001288309A1 (en) * | 2000-08-18 | 2002-03-04 | Distributed Trust Management Inc. | Distributed information system and protocol for affixing electronic signatures and authenticating documents |
JP2002183008A (ja) * | 2000-12-11 | 2002-06-28 | Sekisui House Ltd | 認証装置、ファイアウォール、端末、サーバー、認証方法及び記憶媒体 |
US6883095B2 (en) * | 2000-12-19 | 2005-04-19 | Singlesigon. Net Inc. | System and method for password throttling |
US7124189B2 (en) | 2000-12-20 | 2006-10-17 | Intellisync Corporation | Spontaneous virtual private network between portable device and enterprise network |
US6931529B2 (en) * | 2001-01-05 | 2005-08-16 | International Business Machines Corporation | Establishing consistent, end-to-end protection for a user datagram |
US6959336B2 (en) * | 2001-04-07 | 2005-10-25 | Secure Data In Motion, Inc. | Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets |
US7020645B2 (en) * | 2001-04-19 | 2006-03-28 | Eoriginal, Inc. | Systems and methods for state-less authentication |
JP3724564B2 (ja) * | 2001-05-30 | 2005-12-07 | 日本電気株式会社 | 認証システム及び認証方法並びに認証用プログラム |
US7216173B2 (en) * | 2001-06-12 | 2007-05-08 | Varian Medical Systems Technologies, Inc. | Virtual private network software system |
US6834795B1 (en) * | 2001-06-29 | 2004-12-28 | Sun Microsystems, Inc. | Secure user authentication to computing resource via smart card |
JP2003030063A (ja) * | 2001-07-16 | 2003-01-31 | Mitsubishi Electric Corp | Oa管理システム及びoa管理方法 |
US7827278B2 (en) * | 2001-07-23 | 2010-11-02 | At&T Intellectual Property Ii, L.P. | System for automated connection to virtual private networks related applications |
US20030046587A1 (en) * | 2001-09-05 | 2003-03-06 | Satyam Bheemarasetti | Secure remote access using enterprise peer networks |
US20030046586A1 (en) * | 2001-09-05 | 2003-03-06 | Satyam Bheemarasetti | Secure remote access to data between peers |
CN1268088C (zh) * | 2001-11-29 | 2006-08-02 | 东南大学 | 基于pki的vpn密钥交换的实现方法 |
EP1339199A1 (en) * | 2002-02-22 | 2003-08-27 | Hewlett-Packard Company | Dynamic user authentication |
US20030177390A1 (en) * | 2002-03-15 | 2003-09-18 | Rakesh Radhakrishnan | Securing applications based on application infrastructure security techniques |
US7143174B2 (en) * | 2002-06-12 | 2006-11-28 | The Jpmorgan Chase Bank, N.A. | Method and system for delayed cookie transmission in a client-server architecture |
US6954862B2 (en) * | 2002-08-27 | 2005-10-11 | Michael Lawrence Serpa | System and method for user authentication with enhanced passwords |
US7644433B2 (en) * | 2002-12-23 | 2010-01-05 | Authernative, Inc. | Authentication system and method based upon random partial pattern recognition |
US7073067B2 (en) * | 2003-05-07 | 2006-07-04 | Authernative, Inc. | Authentication system and method based upon random partial digitized path recognition |
-
2003
- 2003-06-30 US US10/611,832 patent/US7305705B2/en not_active Expired - Fee Related
-
2004
- 2004-06-21 DE DE602004028316T patent/DE602004028316D1/de active Active
- 2004-06-21 EP EP04014497A patent/EP1494420B1/en not_active Not-in-force
- 2004-06-21 AT AT04014497T patent/ATE476044T1/de not_active IP Right Cessation
- 2004-06-29 KR KR1020040049692A patent/KR101076848B1/ko not_active IP Right Cessation
- 2004-06-30 CN CN2004100632440A patent/CN1578218B/zh not_active Expired - Fee Related
- 2004-06-30 JP JP2004194757A patent/JP4558389B2/ja not_active Expired - Fee Related
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222456A (zh) * | 2008-01-28 | 2008-07-16 | 陈勇 | 网络安全网关产品共享的方法 |
CN102131189A (zh) * | 2010-12-28 | 2011-07-20 | 中国电信股份有限公司 | 采集仪、移动监管方法和系统 |
CN102131189B (zh) * | 2010-12-28 | 2014-11-12 | 中国电信股份有限公司 | 采集仪、移动监管方法和系统 |
CN102404334A (zh) * | 2011-12-07 | 2012-04-04 | 山石网科通信技术(北京)有限公司 | 拒绝服务攻击防护方法及装置 |
CN102611700A (zh) * | 2012-02-24 | 2012-07-25 | 汉柏科技有限公司 | 一种在透明模式下实现vpn接入的方法 |
CN102611700B (zh) * | 2012-02-24 | 2015-04-22 | 汉柏科技有限公司 | 一种在透明模式下实现vpn接入的方法 |
WO2015021897A1 (en) * | 2013-08-12 | 2015-02-19 | Tencent Technology (Shenzhen) Company Limited | Method, apparatus and system for defending against network attack |
CN106357590A (zh) * | 2015-07-15 | 2017-01-25 | 艾默生网络能源系统北美公司 | 一种网络协议转换系统、网络协议转换器及其转换方法 |
CN107465752A (zh) * | 2017-08-22 | 2017-12-12 | 郑州云海信息技术有限公司 | 一种连接管理方法及装置 |
WO2023000248A1 (en) * | 2021-07-22 | 2023-01-26 | Huawei Technologies Co., Ltd. | Authentication methods using zero-knowledge proof algorithms for user equipments and nodes implementing the authentication methods |
Also Published As
Publication number | Publication date |
---|---|
EP1494420A3 (en) | 2006-06-07 |
ATE476044T1 (de) | 2010-08-15 |
KR101076848B1 (ko) | 2011-10-25 |
US20040268121A1 (en) | 2004-12-30 |
US7305705B2 (en) | 2007-12-04 |
EP1494420B1 (en) | 2010-07-28 |
KR20050002632A (ko) | 2005-01-07 |
JP2005027312A (ja) | 2005-01-27 |
DE602004028316D1 (de) | 2010-09-09 |
CN1578218B (zh) | 2010-12-08 |
EP1494420A2 (en) | 2005-01-05 |
JP4558389B2 (ja) | 2010-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1578218B (zh) | 用透明虚拟专用网络减少网络配置复杂性 | |
Maughan et al. | Internet security association and key management protocol (ISAKMP) | |
US7069438B2 (en) | Establishing authenticated network connections | |
US8250631B2 (en) | Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages | |
US20030217148A1 (en) | Method and apparatus for LAN authentication on switch | |
US8417949B2 (en) | Total exchange session security | |
WO2011110096A1 (zh) | 通过路由器或交换机实现可信网络连接的方法和装置 | |
Badra et al. | Phishing attacks and solutions | |
WO2018075965A1 (en) | Dark virtual private networks and secure services | |
JP4783340B2 (ja) | 移動ネットワーク環境におけるデータトラフィックの保護方法 | |
Maughan et al. | RFC2408: Internet Security Association and Key Management Protocol (ISAKMP) | |
CN109040059A (zh) | 受保护的tcp通信方法、通信装置及存储介质 | |
Joshi | Network security: know it all | |
Liu | Next generation SSH2 implementation: securing data in motion | |
Volini | A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues | |
Pohly et al. | MICSS: A realistic multichannel secrecy protocol | |
US20240080314A1 (en) | Packet watermark with dynamic token validation | |
Ganguly | Network and application security: fundamentals and practices | |
Kim | A survey of Kerberos V and public-key Kerberos security | |
Qureshi | Network intrusion detection using an innovative statistical approach | |
Aledhari et al. | Protecting Internet Traffic: Security Challenges and Solutions | |
Thurimella et al. | Network Security | |
Sherman et al. | An analysis of VPN solutions and best practices for use in conjunction with cyber attack and defend exercises | |
Yang et al. | A secure end-to-end protocol for conference mobile call | |
Worden | Storage Security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150507 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150507 Address after: Washington State Patentee after: Micro soft technique license Co., Ltd Address before: Washington State Patentee before: Microsoft Corp. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101208 Termination date: 20200630 |
|
CF01 | Termination of patent right due to non-payment of annual fee |