METHODS AND APPARATUSES FOR SECURE COMMUNICATION
First Claim
1. A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising:
- establishing a first secure communications connection between a second local server on the local network and the device;
establishing a second secure communications connection between the second local server and the first local server, wherein the second local server impersonates the device for at least a portion of the connection request; and
proxying data between the first local server and the device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising: establishing a first secure communications connection between a second local server on the local network and the device; establishing a second secure communications connection between the second local server and the first local server, wherein the second local server impersonates the device for at least a portion of the connection request; and proxying data between the local server and the device
-
Citations
50 Claims
-
1. A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising:
-
establishing a first secure communications connection between a second local server on the local network and the device; establishing a second secure communications connection between the second local server and the first local server, wherein the second local server impersonates the device for at least a portion of the connection request; and proxying data between the first local server and the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of establishing a secure communications path between a first local server on a local network and a device on a wide area network comprising:
-
establishing a first secure communications connection between a second local server on the local network and the device; establishing a second secure communications connection using a strong network authentication protocol between the first local server and a second local server wherein the second local server establishes the second secure communications connection on behalf of the device by receiving a session key of the strong communications protocol from the device over the first secure communications connection and impersonates the device for at least a portion of the connection initiation; and proxying data between the first local server and the device via the second local server. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for establishing a secure communications path between a local server on a local network and a device on a wide area network comprising:
-
a firewall separating the local network from the wide area network; a server located on the local network and in communication with both the wide area network and local network, wherein the server is configured to; form a first secure communications connection with the device; form a second secure communications connection with the local server by impersonating the device for at least a portion of the connection request; and proxy data between the local server and the device. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A method of establishing a secure communications path between a device on a wide area network and a server on a local network comprising the steps of:
establishing a communications connection between the device and the server, wherein the connection is established by an application running on the device that limits access to the secure communications connection to select applications. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
Specification