×

Transparent secure socket layer

  • US 8,549,157 B2
  • Filed: 04/23/2007
  • Issued: 10/01/2013
  • Est. Priority Date: 04/23/2007
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a first network interface operable to connect to at least one non-configured client;

    a second network interface operable to connect to at least one network resource; and

    a transparent proxy module executing on one or more hardware processors, the one or more hardware processors comprising a part of a computerized system and operable to intercept a request for a secured connection from a first non-configured client of the at least one non-configured clients to a first network resource of the at least one network resources, and to provide a proxy connection between the first non-configured client and the first network resource by establishing a secure encrypted connection to the first non-configured client and establishing a secure encrypted connection to the first network resource such that data may be securely passed between the first non-configured client and the first network resource;

    the transparent proxy module further operable to provide a proper secure connection certificate to the first non-configured client by determining a common name of the first network resource and providing the common name of the first network resource in a certificate used to establish a secure encrypted connection to the first non-configured client such that the first non-configured client recognizes the common name in the certificate as associated with the first network resource;

    a policy module operable to determine whether a connection from the first non-configured client to the first network resource violates a security and usage policy;

    the transparent proxy module further operable to provide a proper certificate even when the intercepted request violates the security and usage policy; and

    the transparent proxy module further operable to selectively provide a proxy connection between only those non-configured clients and network resources that do not violate a security and usage policy.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×