scispace - formally typeset
Patent

Security gateway utilizing ssl protocol protection and related method

Kao Wen-Hung
Reads0
Chats0
TLDR
In this paper, the authors propose a security gateway for a network system for linking at least a client end and a server end, which includes a user interface, a SSL VPN driver, a connection interface and an IPSEC VPN driver.
Abstract
A security gateway, for use in a network system for linking at least a client end and a server end, includes a user interface, a SSL VPN driver, a connection interface and an IPSEC VPN driver. The security gateway supports IPSEC and SSL protocols. Before establishing an IPSEC VPN between a client end and a server end, the security gateway will perform ID authentication for the user of the client end with a widely-used SSL protocol, so as to establish a SSL VPN between a server end and a client end. When the ID of the client end is authorized, a configuration file comprising the SA is generated and then safely sent to the client end through the SSL VPN tunnel. After the client end receives and executes the configuration file having the SA, an IPSEC VPN tunnel between the server end and the client end is established.

read more

Citations
More filters
Patent

Highly scalable architecture for application network appliances

TL;DR: In this article, a highly scalable application network appliance is described, where the first service module is configured to perform a first portion of OSI (Open System Interconnection) compatible layers of network processes on the packets.
Patent

Multi-service VPN network client for mobile device

TL;DR: In this paper, an integrated, multi-service network client for cellular mobile devices is described, which can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise virtual private network (VPN) connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services.
Patent

Disposable browsers and authentication techniques for a secure online user environment

TL;DR: In this article, the authors present systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.
Patent

Dual-Mode Multi-Service VPN Network Client for Mobile Device

TL;DR: In this article, an integrated, multi-service network client for cellular mobile devices is described, which includes a VPN handler having an interface programmed to exchange the network packets with the security manager for application of the security service, wherein the VPN handler is configurable to operate in one of an enterprise mode and in a non-enterprise mode.
Patent

Multi-service vpn network client for mobile device having integrated acceleration

TL;DR: In this article, an integrated, multi-service virtual private network (VPN) network client for cellular mobile devices is described, which can be deployed as a single software package on cellular mobile network devices to provide integrated services including secure enterprise VPN connectivity, acceleration, security management including monitored and enforced endpoint compliance, and collaboration services.
References
More filters
Patent

Negotiated wireless peripheral security systems

TL;DR: In this paper, the authors describe a system in which a mobile unit is temporarily augmented with the added peripheral services supplied by the negotiated wireless peripheral, which allows the mobile unit to communicate securely with a remote server, even when the wireless peripheral is not fully trusted.
Patent

Virtual private network crossovers based on certificates

TL;DR: In this article, a method and system for enabling interconnection of VPNs is disclosed, where the gateway allows interconnection without the need for a completely centralized decision-making process, and does so independently of the type of device and/or VPN(s) being used.