Buffering proxy for telnet access
First Claim
1. A buffering communication protocol proxy for connection between a first party and a second party, comprising:
- a data store;
a first communication protocol proxy system for authentication operative, in response to receipt of at least one communication option negotiation request from the first party before a communication connection is established between the first party and the second party, to store the received at least one communication option negotiation request in the data store; and
a second communication protocol proxy system for setup operative to establish a communication connection to the second party and to send the stored at least one communication option negotiation request to the second party after the communication connection is established;
wherein the first communication protocol proxy system for authentication and the second communication protocol proxy system for setup are operative to pass data through the communication protocol proxy, between the first party and the second party, after the communication connection is established.
12 Assignments
0 Petitions
Accused Products
Abstract
A single- or multi-protocol buffering proxy accepts communication option negotiation commands from a client before establishing a connection between the client and a host. The proxy negotiates a limited set of options with the client before the connection is established and buffers (accepts and temporarily stores without responding to) other option negotiation commands from the client. The proxy accepts credentials from a user and establishes, or denies the connection based on the credentials. If the connection is established, the proxy buffers option negotiation commands sent by the host. After the proxy logs in to the host on behalf of the user or the user logs in directly, the proxy sends each party'"'"'s buffered option negotiation commands to the other party, ceases buffering option negotiation commands and enters a “pass-through” mode, in which the proxy passes characters and commands between the parties until the session ends. The proxy uses the credentials to allow or deny subsequent connection requests, without re-prompting for credentials.
148 Citations
53 Claims
-
1. A buffering communication protocol proxy for connection between a first party and a second party, comprising:
-
a data store;
a first communication protocol proxy system for authentication operative, in response to receipt of at least one communication option negotiation request from the first party before a communication connection is established between the first party and the second party, to store the received at least one communication option negotiation request in the data store; and
a second communication protocol proxy system for setup operative to establish a communication connection to the second party and to send the stored at least one communication option negotiation request to the second party after the communication connection is established;
whereinthe first communication protocol proxy system for authentication and the second communication protocol proxy system for setup are operative to pass data through the communication protocol proxy, between the first party and the second party, after the communication connection is established. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of establishing a communication connection between a first party and a second party, comprising:
-
receiving at least one communication option negotiation request from the first party;
storing the received at least one communication option negotiation request;
after storing the at least one communication option negotiation request, establishing the communication connection between the first party and the second party;
after establishing the communication connection, sending the stored at least one communication option negotiation request to the second party and passing data between the first party and the second party. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. An article of manufacture, comprising:
a computer-readable medium storing computer instructions for;
receiving at least one communication option negotiation request from a first party;
storing the received at least one communication option negotiation request;
after storing the at least one communication option negotiation request, establishing a communication connection between the first party and a second party;
after establishing the communication connection, sending the stored at least one communication option negotiation request to the second party and passing data between the first party and the second party. - View Dependent Claims (43, 44)
-
45. An authenticating multi-protocol proxy, comprising:
-
a data store; and
a proxy operative to establish a connection according to one of a plurality of protocols between a first party having an identifier and a second party, wherein the plurality of protocols includes Telnet, HTTP and FTP, the proxy being further operative to;
prompt for user credentials before establishing a first connection between the first party and the second party;
based on entered user credentials, obtain data indicative of user access rights;
store the obtained information indicative of user access rights in the data store and associate the stored information with the identity of the first party;
based on the data indicative of user access rights, either establish or not establish the first connection between the first party and the second party; and
subsequently use the stored information to determine whether to establish or not establish a second connection between the first party and another party, without prompting for user credentials. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53)
-
Specification