×

Reducing network configuration complexity with transparent virtual private networks

  • US 7,305,705 B2
  • Filed: 06/30/2003
  • Issued: 12/04/2007
  • Est. Priority Date: 06/30/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a private network comprising a resource and a firewall, which acts as a gateway by controlling client desired access to the private network resource, a method of establishing a connection to the private network resource while balancing authentication processing requirements between a client and the firewall to mutually guard against denial of service attacks, the method comprising steps for:

  • receiving an assertion from the client that the client has credentials appropriate for accessing the private network resource;

    initiating a plurality of authentication transactions between the client and the firewall, the plurality of authentication transactions designed to impose commensurable processing burdens on the client requesting access to the private network resource and the firewall operating as a gateway for the private network to mitigate the potential of a client performing a denial of service attack against the private network, wherein the client initially is unaware that the firewall operates as a gateway for the private network, and wherein successful completion of each authentication transaction incrementally increases a level of trust between the client and the firewall;

    for each of the series plurality of authentication transactions between the client and the firewall, using a zero-knowledge proof to challenge the client for credentials, the zero-knowledge proof including;

    sending a challenge to the client, the correct answer to the challenge obtainable from the asserted credentials without having to arrange the credentials according to a specified layout and without even having to divulge the asserted credentials such that if the client actually possesses the asserted credentials the client can generate the correct answer;

    receiving a response from the client including an answer to the challenge, the answer including at least some measure of proof that the client has credentials and that the client'"'"'s credentials are correct; and

    verifying whether or not the answer included in the response the correct answer to the challenge; and

    when an acceptable level of probability that the client actually possesses the asserted credentials is reached based on a plurality of correct answers, the firewall granting the client access to the private network resource through the firewall for processing of the asserted credentials.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×