-
公开(公告)号:DE60026838D1
公开(公告)日:2006-05-11
申请号:DE60026838
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD ALEXANDER , LITA CHRISTIAN , RUTKOWSKI FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
22.
公开(公告)号:HK1045419A1
公开(公告)日:2002-11-22
申请号:HK02106767
申请日:2002-09-14
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:HU0201706A2
公开(公告)日:2002-09-28
申请号:HU0201706
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:GB2358313A
公开(公告)日:2001-07-18
申请号:GB0029073
申请日:2000-11-29
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , DUTTA RABINDRANATH , EILBOTT SETH AARON , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS , STERLING MERLE DOUGLAS
Abstract: Upon receiving a request for a document, recipient- specific identifying information for the requester is secured, including at least the TCP/IP address(es) of the client being utilized by the requester and the proxy, if any, transmitting the request from the client, and optionally including client authentication information such as userid and password or HTTP request header information such as authorization header information, "From" header information, proxy-authorization information, and user-agent header information. The recipient-specific identifying information is then compared to a watermark database for the requested document. If a match is found, the associated unique watermark is retrieved from the database. If no match is found, a unique watermark is generated for the document and associated with the recipient-specific identifying information in a new entry within the watermark database for the document. The watermark is employed to generate a uniquely watermarked version of the requested document, with the watermarked version being returned in response to the request. Subsequently, when an infringing copy of the document is located, the infringing copy is compared to the original, unwatermarked version of the document to extract the watermark. The extracted watermark is then looked up in the watermark database for the document to determine the "original" copyright infringer, and the associated recipient identifying information is retrieved.
-
公开(公告)号:CA2313558A1
公开(公告)日:2001-02-26
申请号:CA2313558
申请日:2000-07-06
Applicant: IBM
Inventor: LITA CHRISTIAN , DUTTA RABINDRANATH , RODRIGUEZ JEFFREY EDWARD
Abstract: Initially, a client requests a specific document and provides the preference s, including readability level preferences of the document, locale preferences, content filtering instructions preferences, governmental regulations preferences, natural language preferences, and document syntactic format preferences. The transcoding proxy requests and receives th e document from the origin server, with the document having origin semantic characteristics. The document from the origin server has an origin readability level and origin locale, is conformant with origin content filtering instructions and origin governmental regulations, and is i n origin natural language and in origin document syntactic format. Using the client semantics preferences, the transcoding proxy revises the document in a sequential or parallel fashion. The origin semantics characteristics of the document are, thus, revised to the semantic preferenc es specified by the client.
-
公开(公告)号:GB2329310A
公开(公告)日:1999-03-17
申请号:GB9816410
申请日:1998-07-29
Applicant: IBM
Inventor: BERANEK MICHAEL , LITA CHRISTIAN
Abstract: A method of controlling how a Web document is presented for display on a browser of a client machine. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the document before it is displayed on the browser. In particular, as the Web document is received from the server, the HTML is parsed to identify the format of the document and the information therein. A filter mechanism is then used to reformat the Web document according to some given protocol, and the re-formatted Web document is then passed to the browser for display. Dynamic alteration of the HTML in this manner enables control of the "look and feel" of the browser display.
-
-
-
-
-