×

Techniques for managing secure communications

  • US 8,065,720 B1
  • Filed: 01/06/2004
  • Issued: 11/22/2011
  • Est. Priority Date: 01/06/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method to manage secure communications executes in a proxy server, the method, comprising:

  • establishing, by the proxy server, a secure session on a secure site with an external client that communicates from an insecure site;

    detecting, by the proxy server, access attempts during the secure session directed to insecure transactions, the insecure transactions identified as links to a site that is external (external site) to, not controlled by, and not recognized by the secure site, and the access attempts are directed to the insecure transactions having references to resources of the external site; and

    transparently managing, by the proxy server, the access attempts by pre-acquiring content from the external site by accessing the links on behalf of the external client to pre-acquire the content and by scanning and inspecting the content within the secure site before determining whether the content should be made available to the external client during the secure session, and at least one access attempt associated with at least one piece of the content that is scanned identifies a true insecure reference by determining that the true insecure reference is a particular reference that has been determined by the method to have had the piece of the content or metadata of the true insecure reference tampered with, and the true insecure reference is entirely removed from the content before the content is supplied to the external client and an event is reported as a custom warning inserted into the content supplied to the external client, the event identifies for the external client within the content that the true insecure reference was removed before being provided to the external client, and a number of other access attempts are associated with different content for other references that are secure but appear insecure, these other references are provided as secure references to the external client to suppress warning messages from being generated within the external client with these other access attempts made during the secure session.

View all claims
  • 16 Assignments
Timeline View
Assignment View
    ×
    ×