Transferring data via a secure network connection
First Claim
1. A computer program product for controlling a proxy computer to transfer data via a secure network connection, said computer program product comprising:
- first link establishing code operable to establish a first secure link between a first computer and said proxy computer;
second link establishing code operable to establish a second secure link between said proxy computer and a second computer;
receiving code operable to receive at said proxy computer said data in encrypted form from said second computer;
decrypting code operable to decrypt said data at said proxy computer;
scanning code operable to scan said data at said proxy computer for illegal content and triggering illegal content found action if illegal content is found within said data; and
sending code operable to send said data in encrypted form from said proxy computer to said first computer.
11 Assignments
0 Petitions
Accused Products
Abstract
A request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6. A secure connection is established with the proxy computer 6 using a protocol such as HTTPS and Certificate Exchange. The proxy computer 6 then establishes its own secure connection with the website server 4. The data requested is passed in encrypted form from the website server computer 4 to the proxy computer 6. The proxy computer 6 decrypts this data and then scans it for illegal content, such as computer viruses, worms, Trojans, banned computer files, banned words, banned combinations of words or banned images and the like. Providing no illegal content is found, the data is encrypted again for transfer over the secure link between the proxy computer 6 and the client computer 2. The proxy computer 6 may conveniently be the firewall computer within a local area network.
-
Citations
24 Claims
-
1. A computer program product for controlling a proxy computer to transfer data via a secure network connection, said computer program product comprising:
-
first link establishing code operable to establish a first secure link between a first computer and said proxy computer;
second link establishing code operable to establish a second secure link between said proxy computer and a second computer;
receiving code operable to receive at said proxy computer said data in encrypted form from said second computer;
decrypting code operable to decrypt said data at said proxy computer;
scanning code operable to scan said data at said proxy computer for illegal content and triggering illegal content found action if illegal content is found within said data; and
sending code operable to send said data in encrypted form from said proxy computer to said first computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 16)
-
-
9. A method of transferring data via a secure network connection, said method comprising the steps of:
-
establishing a first secure link between a first computer and a proxy computer;
establishing a second secure link between said proxy computer and a second computer;
receiving at said proxy computer said data in encrypted form from said second computer;
decrypting said data at said proxy computer;
scanning said data at said proxy computer for illegal content and triggering illegal content found action if illegal content is found within said data; and
sending said data in encrypted form from said proxy computer to said first computer. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
17. Apparatus for transferring data via a secure network connection, said apparatus comprising:
-
first link establishing logic operable to establish a first secure link between a first computer and said proxy computer;
second link establishing logic operable to establish a second secure link between said proxy computer and a second computer;
receiving logic operable to receive at said proxy computer said data in encrypted form from said second computer;
decrypting logic operable to decrypt said data at said proxy computer;
scanning logic operable to scan said data at said proxy computer for illegal content and triggering illegal content found action if illegal content is found within said data; and
sending logic operable to send said data in encrypted form from said proxy computer to said first computer. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification