SYSTEM AND METHOD FOR DISTRIBUTED SSL PROCESSING BETWEEN CO-OPERATING NODES
First Claim
Patent Images
1. A method, comprising:
- intercepting a secure communication protocol transaction request from a client to a server at a client-side proxy logically deployed between the client and the server and communicatively coupled to the client;
initiating, from the client-side proxy, a secure connection with the server, wherein the secure connection is associated with at least one attribute enabling secure communication of data with the server; and
forwarding the attribute from the client-side proxy to a server-side proxy logically deployed between the client and the server and communicatively coupled to the server, enabling the server-side proxy to engage in secure communications with the server.
11 Assignments
0 Petitions
Accused Products
Abstract
A secure communication protocol (e.g., SSL) transaction request from a client to a server is intercepted at a client-side proxy communicatively coupled to the client and logically deployed between the client and the server. The client-side proxy initiates a secure connection with the server and passes an attribute (e.g., a cryptographic key) associated with that secure connection to a server-side proxy communicatively coupled to the server and logically deployed between the client and the server. This enables the server-side proxy to engage in secure communications with the server in a transparent fashion.
129 Citations
25 Claims
-
1. A method, comprising:
-
intercepting a secure communication protocol transaction request from a client to a server at a client-side proxy logically deployed between the client and the server and communicatively coupled to the client; initiating, from the client-side proxy, a secure connection with the server, wherein the secure connection is associated with at least one attribute enabling secure communication of data with the server; and forwarding the attribute from the client-side proxy to a server-side proxy logically deployed between the client and the server and communicatively coupled to the server, enabling the server-side proxy to engage in secure communications with the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
- 15. A method comprising establishing a secure communication channel between a server-side proxy and a server using an attribute associated with the secure communication channel, the attribute having first been passed from the server to a client-side proxy in response to a request to establish secure communications between the client-side proxy and the server.
-
25. A method, comprising:
-
intercepting a secure communication protocol transaction request from a client to a server at a client-side proxy logically deployed between the client and the server and communicatively coupled to the client; initiating, from the client-side proxy, a secure connection with the server, wherein the secure connection is associated with at least one attribute enabling secure communication of data with the server; and forwarding the attribute from the client-side proxy to multiple server-side proxies arranged in a chain and each logically deployed between the client and the server, enabling secure communications between the server-side proxies and the server.
-
Specification