×

Authentication of tunneled connections

  • US 7,661,131 B1
  • Filed: 02/03/2005
  • Issued: 02/09/2010
  • Est. Priority Date: 02/03/2005
  • Status: Active Grant
First Claim
Patent Images

1. A Secure tunnel communications method, comprising;

  • establishing a first connection from an inner agent to an outer agent comprising;

    initiating a first TCP connection from the inner agent to the outer agent over an inner firewall, wherein the inner firewall only allows connections to be initiated by the inner agent to the outer agent,negotiating a first SSL/TLS session between the inner agent and the outer agent over the first TCP connection when an outer agent certificate is presented by the outer agent to the inner agent, andapplying the first SSL/TLS session between the inner agent and the outer agent over the first TCP connection;

    establishing a second connection from a client to the outer agent comprising;

    initiating a second TCP connection from the client to the outer agent over a client firewall, wherein the client firewall only allows connections to be initiated by the client to the outer agent, and wherein the client and outer agent each reside on devices separated by a network,negotiating a second SSL/TLS session between the client and the outer agent over the second TCP connection when the outer agent certificate is presented by the outer agent to the client, andapplying the second SSL/TLS session between the client and the outer agent over the second TCP connection;

    negotiating a third SSL/TLS session between the client and the inner agent; and

    applying the third SSL/TLS session between the client and the inner agent layered over both the first SSL/TLS session and the second SSL/TLS session,wherein negotiating the second SSL/TLS session comprises authenticating the client, by the outer agent,wherein the outer agent implements an outer agent authentication policy,wherein the client possesses a certificate signed with a certificate key associated with a shared certificate possessed by the outer agent and inner agent,wherein the client presents the certificate possessed by the client to the outer agent, andwherein the outer agent verifies the certificate possessed by the client using the shared certificate possessed by the outer agent,wherein negotiating the third SSL/TLS session comprises authenticating the third SSL/TLS session at the inner agent, wherein authenticating the third SSL/TLS session comprises;

    implementing, by the inner agent, an inner agent authentication policy;

    presenting, by the client, the certificate possessed by the client to the inner agent; and

    verifying, by the inner agent, the certificate possessed by the client using the shared certificate possessed by the inner agent.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×