Three component secure tunnel
First Claim
1. A secure tunnel communications method in a computer system, comprising:
- establishing a first connection from an inner agent to an outer agent including establishing a first TCP connection from the inner agent to the outer agent, creating a first SSL/TLS session between the inner agent and the outer agent over the first TCP connection, andapplying the first SSL/TLS session between the inner agent and the outer agent over the first TCP connection;
establishing a second connection from a client to the outer agent including;
establishing a second TCP connection from the client to the outer agent,creating a second SSL/TLS session between the client and the outer agent over the second TCP connection andapplying the second SSL/TLS session between the client and the outer agent over the second TCP Connection;
creating a third SSL/TLS session between the client and the inner agent andapplying the third SSL/TLS session between the client and the inner agent layered over both the first SSL/TLS session and the second SSL/TLS session wherein the outer agent is restricted from accessing the third SSL/TLS session.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described for a secure tunnel. A method includes establishing a first connection (CIO) from an inner agent to an outer agent including making a first TCP connection from the inner agent to the outer agent, negotiating a first SSL/TLS session (SSLSessionIO) between the inner agent and the outer agent over the first TCP connection and applying the first SSL/TLS session (SSLSessionIO) between the inner agent and the outer agent over the first TCP connection; establishing a second connection (CCO) from a client to the outer agent including making a second TCP connection from the client to the outer agent, negotiating a second SSL/TLS session (SSLSessionCO) between the client and the outer agent over the second TCP connection and applying the second SSL/TLS session (SSLSessionCO) between the client and the outer agent over the second TCP connection; and then negotiating a third SSL/TLS session (SSLSessionCI) between the client and the inner agent via both the first SSL/TLS session (SSLSessionIO) and the second SSL/TLS session (SSLSessionCO) and applying the third SSL/TLS session (SSLSessionCI) between the client and the inner agent layered over both the first SSL/TLS session (SSLSessionIO) and the second SSL/TLS session (SSLSessionCO).
-
Citations
20 Claims
-
1. A secure tunnel communications method in a computer system, comprising:
- establishing a first connection from an inner agent to an outer agent including establishing a first TCP connection from the inner agent to the outer agent, creating a first SSL/TLS session between the inner agent and the outer agent over the first TCP connection, and
applying the first SSL/TLS session between the inner agent and the outer agent over the first TCP connection; establishing a second connection from a client to the outer agent including; establishing a second TCP connection from the client to the outer agent, creating a second SSL/TLS session between the client and the outer agent over the second TCP connection and applying the second SSL/TLS session between the client and the outer agent over the second TCP Connection; creating a third SSL/TLS session between the client and the inner agent and applying the third SSL/TLS session between the client and the inner agent layered over both the first SSL/TLS session and the second SSL/TLS session wherein the outer agent is restricted from accessing the third SSL/TLS session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
- establishing a first connection from an inner agent to an outer agent including establishing a first TCP connection from the inner agent to the outer agent, creating a first SSL/TLS session between the inner agent and the outer agent over the first TCP connection, and
-
13. A computer readable medium, comprising computer readable code, wherein the computer readable code is configured to be executed to implement a secure tunnel communications method;
- the method comprising;
establishing a first connection from an inner agent to an outer agent including; establishing a first TCP connection from the inner agent to the outer agent, creating a first SSL/TLS session between the inner agent and the outer agent over the first TCP connection, and applying the first SSL/TLS session between the inner agent and the outer agent over the first TCP connection; establishing a second connection from a client to the outer agent including; establishing a second TCP connection from the client to the outer agent, creating a second SSL/TLS session between the client and the outer agent over the second TCP connection, and applying the second SSL/TLS session between the client and the outer agent over the second TCP connection; creating a third SSL/TLS session between the client and the inner agent; and applying the third SSL/TLS session between the client and the inner agent layered over both the first SSL/TLS session and the second SSL/TLS session wherein the outer agent is restricted from accessing the third SSL/TLS session. - View Dependent Claims (15, 16, 17)
- the method comprising;
-
14. A secure tunnel communications system, comprising:
-
an inner agent; an outer agent coupled to the inner agent; and a client coupled to the outer agent, wherein the secured tunnel communications system is established by; establishing a first connection from an inner agent to an outer agent including; establishing a first TCP connection from the inner agent to the outer agent, creating a first SSL/TLS session between the inner agent and the outer agent over the first TCP connection, and applying the first SSL/TLS session between the inner agent and the outer agent over the first TCP connection; establishing a second connection (CCO) from a client to the outer agent including; establishing a second TCP connection from the client to the outer agent, creating a second SSL/TLS session between the client and the outer agent over the second TCP connection, and applying the second SSL/TLS session between the client and the outer agent over the second TCP Connection; creating a third SSL/TLS session between the client and the inner agent; and applying the third SSL/TLS session between the client and the inner agent layered over both the first SSL/TLS session and the second SSL/TLS session wherein the outer agent is restricted from accessing the third SSL/TLS session. - View Dependent Claims (18, 19, 20)
-
Specification