Split termination for secure communication protocols
First Claim
1. A method of initiating a secure connection, the method comprising:
- intercepting a secure connection request from a client using an intercepting entity;
initiating a secure connection with the client, wherein the secure connection is associated with at least one attribute enabling the secure communication of data via the secure connection; and
forwarding the attribute to a network device, thereby enabling the network device to maintain the secure connection with the client.
18 Assignments
0 Petitions
Accused Products
Abstract
Transaction accelerators can be configured to terminate secure connections. A server-side accelerator intercepts a secure connection request from a client and directed to a server. The server-side accelerator responds to secure connection request in place of the server, thereby establishing a secure connection between the client and the server-side accelerator. Alternatively, the server-side accelerator monitors the establishment of a secure connection between the client and the server. After the secure connection has been established, the server-side accelerator forwards security information to a client-side accelerator, enabling the client-side accelerator to assume control of the secure connection. As a result of this arrangement, the client-side accelerator is able to encrypt and decrypt data on the secure connection and accelerate it in cooperation with the server-side accelerator. In a further embodiment, the accelerated traffic between accelerators is carried across the network via another secure connection.
178 Citations
56 Claims
-
1. A method of initiating a secure connection, the method comprising:
-
intercepting a secure connection request from a client using an intercepting entity;
initiating a secure connection with the client, wherein the secure connection is associated with at least one attribute enabling the secure communication of data via the secure connection; and
forwarding the attribute to a network device, thereby enabling the network device to maintain the secure connection with the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of communicating securely with a client, the method comprising:
-
intercepting a secure connection request from a client to a server at a first network device;
initiating a first secure connection between the first network device and the client in response to the secure connection request; and
in response to the inititation of the first secure connection being successfully completed;
communicating an indicator from the first network device to the second network device that the first secure connection has been established between the client and the first network device; and
assuming control of the first secure connection with the client at the second network device, such that communications between the client and the server pass through the first secure connection between the client and the second network device. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. A method of communicating securely with a client, the method comprising:
-
observing an initation of a secure connection between a client and a server;
receiving an indication that the initiation of the secure connection between the client and the server is complete;
assuming control of the secure connection with the client on behalf of the server;
receiving data directed to the client from the server via the network device; and
communicating the data to the client via the secure connection. - View Dependent Claims (52, 53, 54, 55, 56)
-
Specification