-
公开(公告)号:CZ20014650A3
公开(公告)日:2002-05-15
申请号:CZ20014650
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:DE10051024A1
公开(公告)日:2001-05-23
申请号:DE10051024
申请日:2000-10-14
Applicant: IBM
Inventor: BARRETT ROBERT C , BELLWOOD THOMAS ALEXANDER , DUTTA RABINDRANATH , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS , STERLING DOUGLAS MERLE
Abstract: The method involves storing the overall output of the program element, e.g. code converters, group in the cache (707) instead of storing individual outputs of each program element (704,706,708). Independent claims are also included for the following: (a) Computer program for management of intermediate caching points in software system; (b) Computer system
-
公开(公告)号:CA2377257A1
公开(公告)日:2001-01-11
申请号:CA2377257
申请日:2000-06-28
Applicant: IBM
Inventor: RUTKOWSKI MATTHEW FRANCIS , LITA CHRISTIAN , BELLWOOD THOMAS ALEXANDER
Abstract: A method of enabling a proxy to participate in a secure communication betwee n a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using t he first secure session, this first session master secret is then provided by t he client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client 's behalf and without the first server's knowledge or participation. If data fr om a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:CA2377257C
公开(公告)日:2008-05-13
申请号:CA2377257
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
IPC: G06F13/00 , H04L9/00 , G06F15/00 , H04L9/08 , H04L9/32 , H04L12/22 , H04L12/66 , H04L29/06 , H04L29/08
Abstract: A method of enabling a proxy to participate in a secure communication betwee n a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server . After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given servi ce (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
15.
公开(公告)号:HK1045419A1
公开(公告)日:2002-11-22
申请号:HK02106767
申请日:2002-09-14
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:HU0201706A2
公开(公告)日:2002-09-28
申请号:HU0201706
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:GB2358313A
公开(公告)日:2001-07-18
申请号:GB0029073
申请日:2000-11-29
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , DUTTA RABINDRANATH , EILBOTT SETH AARON , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS , STERLING MERLE DOUGLAS
Abstract: Upon receiving a request for a document, recipient- specific identifying information for the requester is secured, including at least the TCP/IP address(es) of the client being utilized by the requester and the proxy, if any, transmitting the request from the client, and optionally including client authentication information such as userid and password or HTTP request header information such as authorization header information, "From" header information, proxy-authorization information, and user-agent header information. The recipient-specific identifying information is then compared to a watermark database for the requested document. If a match is found, the associated unique watermark is retrieved from the database. If no match is found, a unique watermark is generated for the document and associated with the recipient-specific identifying information in a new entry within the watermark database for the document. The watermark is employed to generate a uniquely watermarked version of the requested document, with the watermarked version being returned in response to the request. Subsequently, when an infringing copy of the document is located, the infringing copy is compared to the original, unwatermarked version of the document to extract the watermark. The extracted watermark is then looked up in the watermark database for the document to determine the "original" copyright infringer, and the associated recipient identifying information is retrieved.
-
-
-
-
-
-