Method and apparatus for effecting secure communications
First Claim
Patent Images
1. A method of effecting secure communications between a server and a client, the method comprising:
- detecting a client connection at a first port;
providing the client with a decoy port number; and
providing services to the client on a second port that is mapped to the decoy port number.
2 Assignments
0 Petitions
Accused Products
Abstract
A technique to effect secure communications with a server application, such as server applications that are accessible on the Internet. In one embodiment, a client connection is detected at a first port. The client is provided with a decoy port number. A server provides services to the client on a second port that is mapped to the decoy port number.
68 Citations
30 Claims
-
1. A method of effecting secure communications between a server and a client, the method comprising:
-
detecting a client connection at a first port;
providing the client with a decoy port number; and
providing services to the client on a second port that is mapped to the decoy port number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system comprising:
-
a plurality of ports, each port having a respective port number;
a server application; and
a routine that, if executed, is operative to;
detect a client connection at a first port;
provide the client with a decoy port number; and
provide services to the client on a second port that is mapped to the decoy port number. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A server computer system comprising:
-
a plurality of ports, each port having a respective port number;
a first server application; and
a first routine that is associated with the first server application and that, if executed, is operative to;
detect a client connection at a first port;
provide the client with a decoy port number;
terminate the connection to the first port; and
provide services to the client on a second port that is mapped to the decoy port number;
a second server application; and
a second routine that is associated with the second server application and that, if executed, is operative to;
detect a client connection at a third port;
provide the client with a decoy port number;
terminate the connection to the third port; and
provide services to the client on a fourth port that is mapped to the decoy port number. - View Dependent Claims (16)
-
-
17. A method comprising:
-
attempting to access a server application on a first port;
receiving a decoy port number;
translating the decoy port number to a translated port number; and
connecting to the server application on the translated port number. - View Dependent Claims (18, 19, 20)
-
-
21. A computer system comprising:
-
a plurality of ports, each port having a respective port number;
an application; and
means for effecting secure access to the application by redirecting a client from a first port to a second port. - View Dependent Claims (22)
-
-
23. An article comprising a machine-readable storage medium that comprises instructions that, if executed, are operable to:
-
detect a connection at a first port by a client application;
provide the client application with a decoy port number; and
cause a server application to be launched at a second port that is mapped to the decoy port number. - View Dependent Claims (24, 25, 26)
-
-
27. A client/server architecture comprising:
-
a server computer system; and
a server application installed on the sever computer system and comprising instructions that, if executed on the server computer system, are effective to;
detect a connection at a first port by a client application;
provide the client application with a decoy port number;
terminate the connection on the first port; and
provide services to the client application on a second port that is mapped to the decoy port number. - View Dependent Claims (28, 29, 30)
-
Specification