US20060236124A1 - Method and apparatus for determining whether to encrypt outbound traffic - Google Patents
Method and apparatus for determining whether to encrypt outbound traffic Download PDFInfo
- Publication number
- US20060236124A1 US20060236124A1 US11/109,099 US10909905A US2006236124A1 US 20060236124 A1 US20060236124 A1 US 20060236124A1 US 10909905 A US10909905 A US 10909905A US 2006236124 A1 US2006236124 A1 US 2006236124A1
- Authority
- US
- United States
- Prior art keywords
- request
- universal resource
- response
- encrypted form
- resource identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 89
- 230000004044 response Effects 0.000 claims abstract description 36
- 238000012545 processing Methods 0.000 claims abstract description 35
- 238000004590 computer program Methods 0.000 claims 7
- 230000008569 process Effects 0.000 description 72
- 238000010586 diagram Methods 0.000 description 16
- 238000004891 communication Methods 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 8
- 238000012546 transfer Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 5
- 230000002093 peripheral effect Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000008520 organization Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present invention relates generally to a data processing system, and in particular, to a method and apparatus for processing data. Still, more particularly, the present invention provides an improved method, apparatus, and computer instruction for managing transfer of data in a network.
- the Internet is a global network of computers and networks joined together by means of gateways that handle data transfer and the conversion of messages from a protocol of the sending network to a protocol used by the receiving network.
- any computer may communicate with any other computer with information traveling over the Internet through a variety of languages, also referred to as protocols.
- the set of protocols used on the Internet is called transmission control protocol/Internet Protocol (TCP/IP).
- the Internet has revolutionized both communications and commerce, as well as, being a source of both information and entertainment.
- e-mail is a widely used format to communicate over the Internet.
- the Internet is also used for real-time voice conversations.
- HTTP hypertext transfer protocol
- HTML hypertext markup language
- Web pages are connected to each other through links or hyperlinks. These links allow for a connection or link to other Web resources identified by a universal resource identifier (URI), such as a uniform resource locator (URL).
- URI universal resource identifier
- URL uniform resource locator
- a browser is a program used to look at and interact with all of the information on the Web.
- a browser is able to display Web pages and to traverse links to other Web pages.
- Resources such as Web pages, are retrieved by a browser, which is capable of submitting a request for the resource.
- This request typically includes an identifier, such as, for example, a URL.
- a browser is an application used to navigate or view information or data in any distributed database, such as the Internet or the World Wide Web.
- a user may enter a domain name through a graphical user interface (GUI) for the browser to access a source of content.
- the domain name is automatically converted to the IP address by a domain name server (DNS), which is a service that translates the symbolic name entered by the user into an IP address by looking up the domain name in a database.
- DNS domain name server
- SSL secure sockets layer
- Various network appliances are employed to accept inbound encrypted traffic on a specific port.
- This port may be configured to either end the outbound traffic from a network appliance in an encrypted form or an unencrypted form. Mixing of encrypted and unencrypted outbound traffic cannot occur with currently available network appliances.
- These appliances include, for example, load balancers, routers, and firewalls. In some situations, such as in an enterprise environment, different types of traffic flow over an internal firewall protected network. Some of the traffic may not need encryption. For example, all traffic with passwords may need encryption while other forms of traffic do not need encryption.
- the present invention provides an improved method, apparatus, and computer instructions for processing outbound traffic passing through a port.
- This port is for a server and receives a request from a client.
- the request includes a universal resource identifier to a destination.
- a determination is made as to whether the request requires encryption using the universal resource identifier in the request.
- the request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
- FIG. 1 is a diagram illustrating a network data processing system, in which the present invention may be implemented
- FIG. 2 is a block diagram of a data processing system that may be implemented as a server in accordance with a preferred embodiment of the present invention
- FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented
- FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention
- FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention
- FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention.
- FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention.
- FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention.
- FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention.
- FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention.
- Network data processing system 100 is a network of computers in which the present invention may be implemented.
- Network data processing system 100 contains network 102 and network 104 . These two networks are connected to one another through network appliance 106 . These components are for the medium used to provide communications links between various devices and computers connected together within network data processing system 100 .
- Networks 102 and 104 may include connections, such as wire, wireless communication links, or fiber optic cables.
- network 104 contains server 108 and server 110 . These servers in network 104 may be, for example, in a local area network (LAN) for an enterprise or business.
- Network 102 contains client 112 , 114 , and 116 , along with server 118 . These two networks may be part of the Internet in these examples.
- Network appliance 106 provides a connection between network 102 and network 104 .
- network appliance 106 is a device that accepts inbound traffic on a port and may send the outbound traffic in an encrypted or unencrypted form through the same port.
- Network appliance 106 may be, for example, a load balancer, a firewall, or a router.
- Network appliance 106 includes a mechanism used to selectively encrypt traffic through a port such that encrypted and unencrypted traffic flow through the same port.
- FIG. 2 is a block diagram of a data processing system that may be implemented as a server, such as server 108 in FIG. 1 , in accordance with a preferred embodiment of the present invention. Further, data processing system 200 may be used to implement a network appliance, such as network appliance 106 in FIG. 1 .
- a network appliance such as network appliance 106 in FIG. 1 .
- Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality of processors 202 and 204 connected to system bus 206 . Alternatively, a single processor system may be employed. Also connected to system bus 206 is memory controller/cache 208 , which provides an interface to local memory 209 . I/O Bus Bridge 210 connects to system bus 206 and provides an interface to I/O bus 212 . Memory controller/cache 208 and I/O Bus Bridge 210 may be integrated as depicted.
- SMP symmetric multiprocessor
- Peripheral component interconnect (PCI) bus bridge 214 connected to I/O bus 212 provides an interface to PCI local bus 216 .
- PCI Peripheral component interconnect
- a number of modems may be connected to PCI local bus 216 .
- Communications links to clients 108 - 112 in FIG. 1 may be provided through modem 218 and network adapter 220 connected to PCI local bus 216 through add-in connectors.
- Additional PCI bus bridges 222 and 224 provide interfaces for additional PCI local buses 226 and 228 , from which additional modems or network adapters may be supported. In this manner, data processing system 200 allows connections to multiple network computers.
- a memory-mapped graphics adapter 230 and hard disk 232 may also be connected to I/O bus 212 as depicted, either directly or indirectly.
- FIG. 2 may vary.
- other peripheral devices such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted.
- the depicted example is not meant to imply architectural limitations with respect to the present invention.
- the data processing system depicted in FIG. 2 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, N.Y., running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
- AIX Advanced Interactive Executive
- FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented.
- Data processing system 300 is an example of a client computer, such as client 112 in FIG. 1 .
- Data processing system 300 employs a peripheral component interconnect (PCI) local bus architecture.
- PCI peripheral component interconnect
- AGP Accelerated Graphics Port
- ISA Industry Standard Architecture
- Processor 302 and main memory 304 connects to PCI local bus 306 through PCI Bridge 308 .
- PCI Bridge 308 also may include an integrated memory controller and cache memory for processor 302 . Additional connections to PCI local bus 306 may be made through direct component interconnection or through add-in boards.
- local area network (LAN) adapter 310 small computer system interface (SCSI) host bus adapter 312 , and expansion bus interface 314 connect to PCI local bus 306 by direct component connection.
- audio adapter 316 graphics adapter 318 , and audio/video adapter 319 connect to PCI local bus 306 by add-in boards inserted into expansion slots.
- Expansion bus interface 314 connects to a keyboard and mouse adapter 320 , modem 322 , and additional memory 324 .
- SCSI host bus adapter 312 connects to hard disk drive 326 , tape drive 328 , and CD-ROM drive 330 .
- An operating system runs on processor 302 and is used to coordinate and provide control of various components within data processing system 300 in FIG. 3 .
- the operating system may be a commercially available operating system, such as Windows XP, which is available from Microsoft Corporation.
- Applications or programs are located on storage devices, such as hard disk drive 326 , and may be loaded into main memory 304 for execution by processor 302 .
- FIG. 3 may vary depending on the implementation.
- Other internal hardware or peripheral devices such as flash read-only memory (ROM), equivalent nonvolatile memory, or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIG. 3 .
- the processes of the present invention may be applied to a multiprocessor data processing system.
- data processing system 300 also may be a notebook computer or hand held computer in addition to taking the form of a PDA.
- data processing system 300 also may be a kiosk or a Web appliance.
- FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention.
- TCP/IP and similar protocols are utilized by communications architecture 400 .
- communications architecture 400 is a 4-layer system. This architecture includes application layer 402 , transport layer 404 , network layer 406 , and link layer 408 . Each layer is responsible for handling various communications tasks.
- Link layer 408 also is referred to as the data-link layer or the network interface layer and normally includes the device driver in the operating system and the corresponding network interface card in the computer. This layer handles all the hardware details of physically interfacing with the network media being used, such as optical cables or Ethernet cables.
- Network layer 406 also is referred to as the Internet layer and handles the movement of packets of data around the network. For example, network layer 406 handles the routing of various packets of data that are transferred over the network.
- Network layer 406 in the TCP/IP suite is comprised of several protocols, including Internet protocol (IP), Internet control message protocol (ICMP), and Internet group management protocol (IGMP).
- IP Internet protocol
- ICMP Internet control message protocol
- IGMP Internet group management protocol
- transport layer 404 provides an interface between network layer 406 and application layer 402 that facilitates the transfer of data between two host computers.
- Transport layer 404 is concerned with things such as, for example, dividing the data passed to it from the application into appropriately sized chunks for the network layer below, acknowledging received packets, and setting timeouts to make certain the other end acknowledges packets that are sent.
- TCP/IP protocol suite two distinctly different transport protocols are present, TCP and User datagram protocol (UDP).
- TCP provides reliability services to ensure that data is properly transmitted between two hosts, including dropout detection and retransmission services.
- UDP provides a much simpler service to the application layer by merely sending packets of data called datagrams from one host to the other, without providing any mechanism for guaranteeing that the data is properly transferred.
- the application layer must perform the reliability functionality.
- Application layer 402 handles the details of the particular application. Many common TCP/IP applications are present for almost every implementation, including a Telnet for remote login; a file transfer protocol (FTP); a simple mail transfer protocol (SMTP) for electronic mail; and a simple network management protocol (SNMP).
- Telnet for remote login
- FTP file transfer protocol
- SMTP simple mail transfer protocol
- SNMP simple network management protocol
- the mechanism of the present invention may be more specifically implemented in a layer, such as transport layer 404 or network layer 406 in these examples.
- This layer examines requests received in inbound traffic and determines whether the request should be relayed in outbound traffic in an encrypted or unencrypted form.
- a request contains a fully qualified universal resource locator (URL).
- a fully qualified URL contains a host name, as well as, the context.
- An example of a fully qualified URL is www.ibm.com/tech.
- the host name is “ibm.com”, while the context is “tech” in this illustrative example.
- the request may contain just the host name, rather than a fully qualified URL.
- FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention.
- traffic 500 is sent between client process 502 and routing process 504 .
- Traffic 500 may be unencrypted traffic or encrypted traffic.
- Client process 502 may be, for example, a browser executing on a client, such as client 112 in FIG. 1 .
- Routing process 504 may be, for example, a process running on a device, such as network appliance 106 in FIG. 1 . More specifically, routing process 504 may be located in transport layer 404 or network layer 406 in FIG. 4 . In this illustrative example, routing process 504 routes traffic for a single port. This port may be a logical port or a physical port.
- Routing process 504 employs URI table 506 to determine whether inbound traffic from client process 502 is to be sent as encrypted traffic 508 , or unencrypted traffic 510 to server process 512 .
- URI table 506 is a table of URLs.
- URI table 506 may take other form depending on the particular implementation.
- URI table 506 may contain universal resource names (URNs) instead of URLs.
- URNs use regular words that are protocol and location independent. URNs provide a higher level of abstraction. URNs are persistent (never change) and require a resolution service similar to the domain name system (DNS) to convert names into real addresses.
- URI table 506 may contain multiple types of URIs, such as URLs and URNs.
- routing process 504 When traffic 500 takes the form of incoming traffic such as a request from a client to a server, routing process 504 identifies the URL in the request. Routing process 504 compares this URL with URLs in URI table 506 to determine whether a match is present. In this example, a match indicates that the outbound traffic from routing process 504 to server process 512 should take the form of encrypted traffic 508 . In other words, if the request in traffic 500 is unencrypted, routing process 504 encrypts the request. Determining whether traffic 500 is encrypted may be performed using a number of different mechanisms. For example, if traffic 500 is using an SSL connection that is received at the port typically used for this type of connection, the traffic coming through that port is identified as being encrypted.
- header information in traffic 500 may be examined by routing process 504 to determine whether traffic 500 is encrypted.
- encryption protocols include information in headers in the traffic that may be used to determine whether the traffic is encrypted. Further, particular ports may be identified ahead of time as ports that will be used for encrypted traffic.
- routing process 504 routes the request to server process 512 in the encrypted form.
- the connection for this request is recorded in encrypted connection table 514 .
- the encryption takes the form of SSL.
- SSL is used in these examples, other types of security protocol may be used to encrypt traffic to form encrypted traffic 508 .
- SSL secure hypertext transfer protocol
- IPSEC IP Security Protocol
- Routing process 504 sends the request in an unencrypted form as unencrypted traffic 510 to server process 512 .
- routing process 504 When routing process 504 receives incoming traffic from server process 512 , routing process 504 identifies existing connection information for this traffic if the incoming traffic is in an unencrypted form such as unencrypted traffic 510 . This incoming traffic may be, for example, a response to the request. Routing process 504 compares the connection with existing connections recorded in encrypted connection table 514 . If the connection is located within this table, routing process 504 encrypts the unencrypted response and returns this response to client 502 in traffic 500 . In this example, the client has sent a request in an encrypted form and routing process 504 returns the response in traffic 500 to client 502 in the same form. However, depending on the particular implementation, the response could be returned in an unencrypted form. In this manner, the mechanism of the present invention allows for selectively encrypting traffic passing through a port in a network appliance.
- FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention.
- traffic is sent between client 602 and server 604 , in examining this traffic between these two nodes, the traffic flows through router 606 , routing process 608 , router 610 , routing process 612 , and router 614 .
- Routing process 608 and routing process 612 along with router 610 are located within network 600 .
- Network 600 may be, for example, a wider remote network or a local area network.
- Routing process 608 and routing process 612 contain the processes of the present invention in these illustrative examples. These components contain processes similar to those found in routing process 404 in FIG. 4 .
- the routes between routing processes 608 and 612 could flow over a third-party network commonly known as a Wide Area Network (WAN).
- WAN Wide Area Network
- These routing processes are located in routers within network 600 .
- Wide Area Networks typically interconnect distant divisions of the same organization with locations in various cities around the world.
- WANs are typically provided by third-party organizations.
- the third-party provider controls the connections and routes within the WAN.
- the network traffic for each of the third-party provider customers is isolated on different links.
- the network traffic flowing through the WAN is visible to anyone working within the third-party provider WAN. In these cases, the organization using the WAN has no control over who can see the network traffic flowing between routing processes 608 and 612 .
- routing process 608 can flow unencrypted because this traffic is on the internal LAN.
- routing process 608 is configured to encrypt certain URLs deemed to contain sensitive information the organization does not want exposed to the WAN provider.
- Routing process 612 may exchange traffic with server 604 in either an encrypted or unencrypted form depending on the network configuration. For example, if server 604 is on an internal LAN, routing process 612 does not have to encrypt those URI's. Therefore, routing process 612 does not necessarily have the same configuration as routing process 608 .
- routing process 612 compares the responses connection (see FIG. 9 ) and either encrypts or does not encrypt the response traffic on existing connections back to routing process 608 .
- Routing process 608 networks traffic back to client 602 .
- Client 602 is sent traffic based on the existing encrypted or unencrypted connections.
- FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention.
- entry 700 is an entry found in a table, such as URI table 506 in FIG. 5 .
- Entry 700 contains indicator 702 and a URL that contains host name 704 and context 706 .
- the URL is a qualified URL.
- Indicator 702 is used to identify the URL in entry 700 as one that requires encryption.
- FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention.
- Entry 800 is an example of an entry in an encrypted connection table, such as encrypted connection table 514 in FIG. 5 .
- entry 800 contains a connection identifier.
- a connection identifier may include any information that uniquely identifies the connection. For example, this information may include an end point IP address, a port identifier, and a processor thread that receives the connection in the network appliance. Of course, other information also may be used in the connection identifier.
- FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention.
- the process illustrated in FIG. 9 may be implemented in a process, such as routing process 504 in FIG. 5 .
- the process begins by determining whether an encrypted connection has been established (step 900 ). If an encrypted connection is not present, a determination is made as to whether the request should be encrypted by comparing the URL to a table, such as URI table 506 in FIG. 5 (step 902 ). If the request is not to be encrypted, the process sends the request in an unencrypted form (step 904 ) with the process terminating thereafter.
- step 900 if an encrypted connection is present, the process records the encrypted connection in the table (step 906 ) with the process proceeding to step 902 to compare the URL to the table to encrypt. In step 906 , the information for this request is recorded such that additional traffic on this connection remains encrypted.
- step 902 if the request is to be sent in encrypted form, the process sends the request in this form (step 908 ) with the process terminating thereafter.
- FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention.
- the process illustrated in FIG. 10 may be implemented in a process, such as routing process 504 in FIG. 5 .
- the process begins by receiving a response from a server (step 1000 ).
- the connection for this response is compared to a table of encrypted connections (step 1002 ).
- This table may be, for example, encrypted connection table 514 in FIG. 5 .
- a determination is made as to whether the original connection was encrypted (step 1004 ). This determination is used to ensure that responses returned to a client are returned in the same form as received from the client. For example, if the original connection was encrypted, all responses are returned in an encrypted form. This particular process does not rely on the URI. If the original connection was encrypted, the process sends a response in encrypted form (step 1006 ), with the process terminating thereafter.
- step 1004 if the original connection was not encrypted, the process sends the response in unencrypted form (step 1008 ), thus ending the process.
- the present invention provides an improved method, apparatus, and computer instructions for selectively encrypting traffic.
- the mechanism of the present invention allows for both encrypted and unencrypted traffic to pass through the same port.
- This mechanism compares the URI in incoming traffic, such as a request from a client, to a set of URIs. If a match is present, the request is sent in the outbound traffic to a server in an encrypted form. If a match is absent, the traffic is sent in an unencrypted form. In this manner, the amount of capital expenditures and management of resources is reduced by decreasing the number of paths needed to route encrypted and unencrypted traffic as compared to currently available routing systems in network appliances.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
An improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request includes a universal resource identifier to a destination. A determination is made as to whether the request requires encryption using the universal resource identifier in the request. The request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
Description
- 1. Technical Field
- The present invention relates generally to a data processing system, and in particular, to a method and apparatus for processing data. Still, more particularly, the present invention provides an improved method, apparatus, and computer instruction for managing transfer of data in a network.
- 2. Description of Related Art
- The Internet is a global network of computers and networks joined together by means of gateways that handle data transfer and the conversion of messages from a protocol of the sending network to a protocol used by the receiving network. On the Internet, any computer may communicate with any other computer with information traveling over the Internet through a variety of languages, also referred to as protocols. The set of protocols used on the Internet is called transmission control protocol/Internet Protocol (TCP/IP).
- The Internet has revolutionized both communications and commerce, as well as, being a source of both information and entertainment. For many users, e-mail is a widely used format to communicate over the Internet. Additionally, the Internet is also used for real-time voice conversations.
- With respect to transferring data over the Internet, the World Wide Web environment is used. This environment also is referred to simply as “the Web”. The Web is a mechanism used to access information over the Internet. In the Web environment, servers and clients effect data transaction using the hypertext transfer protocol (HTTP), a known protocol for handling the transfer of various data files, such as text files, graphic images, animation files, audio files, and video files.
- On the Web, the information in various data files is formatted for presentation to a user by a standard page description language, the hypertext markup language (HTML). Documents using HTML also are referred to as Web pages. Web pages are connected to each other through links or hyperlinks. These links allow for a connection or link to other Web resources identified by a universal resource identifier (URI), such as a uniform resource locator (URL).
- A browser is a program used to look at and interact with all of the information on the Web. A browser is able to display Web pages and to traverse links to other Web pages. Resources, such as Web pages, are retrieved by a browser, which is capable of submitting a request for the resource. This request typically includes an identifier, such as, for example, a URL. As used herein, a browser is an application used to navigate or view information or data in any distributed database, such as the Internet or the World Wide Web. A user may enter a domain name through a graphical user interface (GUI) for the browser to access a source of content. The domain name is automatically converted to the IP address by a domain name server (DNS), which is a service that translates the symbolic name entered by the user into an IP address by looking up the domain name in a database.
- Users employ browsers to access data on the Web. Additionally, these browsers and other programs are used in business transactions. For example, a user may purchase goods or services from a business through a Website. Often times in retrieving data or completing a business transaction, the traffic is required to be encrypted to provide for maintaining the security and confidentiality of the information. In purchasing goods or services, the user may provide bank account information or credit card information for payment. Clearly, the user only wants the business offering the goods or services to see this information. In another example, a user may access personal medical information from a hospital Website. This information also is sent in an encrypted form. One encryption scheme is secure sockets layer (SSL). This standard is a widely used security protocol on the Internet. SSL is used to securely send credit card and other sensitive data to a business' Web site.
- Various network appliances are employed to accept inbound encrypted traffic on a specific port. This port may be configured to either end the outbound traffic from a network appliance in an encrypted form or an unencrypted form. Mixing of encrypted and unencrypted outbound traffic cannot occur with currently available network appliances. These appliances include, for example, load balancers, routers, and firewalls. In some situations, such as in an enterprise environment, different types of traffic flow over an internal firewall protected network. Some of the traffic may not need encryption. For example, all traffic with passwords may need encryption while other forms of traffic do not need encryption.
- Currently, the different types of traffic flow through different network routes or paths in which some are totally encrypted while others are unencrypted. This type of architecture results in higher capital expenditures, as well as, increased administration and network management.
- Therefore, it would be advantageous to have an improved method, apparatus, and computer instructions for encrypting and unencrypting traffic in a network appliance.
- The present invention provides an improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request includes a universal resource identifier to a destination. A determination is made as to whether the request requires encryption using the universal resource identifier in the request. The request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
- The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
-
FIG. 1 is a diagram illustrating a network data processing system, in which the present invention may be implemented; -
FIG. 2 is a block diagram of a data processing system that may be implemented as a server in accordance with a preferred embodiment of the present invention; -
FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented; -
FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention; -
FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention; -
FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention; -
FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention; -
FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention; -
FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention; and -
FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention. - With reference now to the figures, and in particular with reference to
FIG. 1 , this figure is a diagram illustrating a network data processing system in which the present invention may be implemented. Networkdata processing system 100 is a network of computers in which the present invention may be implemented. Networkdata processing system 100 containsnetwork 102 andnetwork 104. These two networks are connected to one another throughnetwork appliance 106. These components are for the medium used to provide communications links between various devices and computers connected together within networkdata processing system 100.Networks - In this illustrative example,
network 104 containsserver 108 andserver 110. These servers innetwork 104 may be, for example, in a local area network (LAN) for an enterprise or business.Network 102 containsclient server 118. These two networks may be part of the Internet in these examples.Network appliance 106 provides a connection betweennetwork 102 andnetwork 104. In these examples,network appliance 106 is a device that accepts inbound traffic on a port and may send the outbound traffic in an encrypted or unencrypted form through the same port.Network appliance 106 may be, for example, a load balancer, a firewall, or a router.Network appliance 106 includes a mechanism used to selectively encrypt traffic through a port such that encrypted and unencrypted traffic flow through the same port. -
FIG. 2 is a block diagram of a data processing system that may be implemented as a server, such asserver 108 inFIG. 1 , in accordance with a preferred embodiment of the present invention. Further,data processing system 200 may be used to implement a network appliance, such asnetwork appliance 106 inFIG. 1 . -
Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality ofprocessors system bus 206. Alternatively, a single processor system may be employed. Also connected tosystem bus 206 is memory controller/cache 208, which provides an interface tolocal memory 209. I/O Bus Bridge 210 connects tosystem bus 206 and provides an interface to I/O bus 212. Memory controller/cache 208 and I/O Bus Bridge 210 may be integrated as depicted. - Peripheral component interconnect (PCI)
bus bridge 214 connected to I/O bus 212 provides an interface to PCIlocal bus 216. A number of modems may be connected to PCIlocal bus 216. Communications links to clients 108-112 inFIG. 1 may be provided throughmodem 218 andnetwork adapter 220 connected to PCIlocal bus 216 through add-in connectors. - Additional
PCI bus bridges local buses data processing system 200 allows connections to multiple network computers. A memory-mappedgraphics adapter 230 andhard disk 232 may also be connected to I/O bus 212 as depicted, either directly or indirectly. - Those of ordinary skill in the art will appreciate that the hardware depicted in
FIG. 2 may vary. For example, other peripheral devices, such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted. The depicted example is not meant to imply architectural limitations with respect to the present invention. - The data processing system depicted in
FIG. 2 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, N.Y., running the Advanced Interactive Executive (AIX) operating system or LINUX operating system. -
FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented.Data processing system 300 is an example of a client computer, such asclient 112 inFIG. 1 .Data processing system 300 employs a peripheral component interconnect (PCI) local bus architecture. Although the depicted example employs a PCI bus, other bus architectures such as Accelerated Graphics Port (AGP) and Industry Standard Architecture (ISA) may be used.Processor 302 andmain memory 304 connects to PCIlocal bus 306 throughPCI Bridge 308.PCI Bridge 308 also may include an integrated memory controller and cache memory forprocessor 302. Additional connections to PCIlocal bus 306 may be made through direct component interconnection or through add-in boards. In the depicted example, local area network (LAN)adapter 310, small computer system interface (SCSI)host bus adapter 312, andexpansion bus interface 314 connect to PCIlocal bus 306 by direct component connection. In contrast,audio adapter 316,graphics adapter 318, and audio/video adapter 319 connect to PCIlocal bus 306 by add-in boards inserted into expansion slots.Expansion bus interface 314 connects to a keyboard andmouse adapter 320,modem 322, andadditional memory 324. SCSIhost bus adapter 312 connects tohard disk drive 326,tape drive 328, and CD-ROM drive 330. - An operating system runs on
processor 302 and is used to coordinate and provide control of various components withindata processing system 300 inFIG. 3 . The operating system may be a commercially available operating system, such as Windows XP, which is available from Microsoft Corporation. Applications or programs are located on storage devices, such ashard disk drive 326, and may be loaded intomain memory 304 for execution byprocessor 302. - Those of ordinary skill in the art will appreciate that the hardware in
FIG. 3 may vary depending on the implementation. Other internal hardware or peripheral devices, such as flash read-only memory (ROM), equivalent nonvolatile memory, or optical disk drives and the like, may be used in addition to or in place of the hardware depicted inFIG. 3 . Also, the processes of the present invention may be applied to a multiprocessor data processing system. - The depicted example in
FIG. 3 and above-described examples are not meant to imply architectural limitations. For example,data processing system 300 also may be a notebook computer or hand held computer in addition to taking the form of a PDA.Data processing system 300 also may be a kiosk or a Web appliance. -
FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention. TCP/IP and similar protocols are utilized bycommunications architecture 400. In this example,communications architecture 400 is a 4-layer system. This architecture includesapplication layer 402,transport layer 404,network layer 406, andlink layer 408. Each layer is responsible for handling various communications tasks.Link layer 408 also is referred to as the data-link layer or the network interface layer and normally includes the device driver in the operating system and the corresponding network interface card in the computer. This layer handles all the hardware details of physically interfacing with the network media being used, such as optical cables or Ethernet cables. -
Network layer 406 also is referred to as the Internet layer and handles the movement of packets of data around the network. For example,network layer 406 handles the routing of various packets of data that are transferred over the network.Network layer 406 in the TCP/IP suite is comprised of several protocols, including Internet protocol (IP), Internet control message protocol (ICMP), and Internet group management protocol (IGMP). - Next,
transport layer 404 provides an interface betweennetwork layer 406 andapplication layer 402 that facilitates the transfer of data between two host computers.Transport layer 404 is concerned with things such as, for example, dividing the data passed to it from the application into appropriately sized chunks for the network layer below, acknowledging received packets, and setting timeouts to make certain the other end acknowledges packets that are sent. In the TCP/IP protocol suite, two distinctly different transport protocols are present, TCP and User datagram protocol (UDP). TCP provides reliability services to ensure that data is properly transmitted between two hosts, including dropout detection and retransmission services. - Conversely, UDP provides a much simpler service to the application layer by merely sending packets of data called datagrams from one host to the other, without providing any mechanism for guaranteeing that the data is properly transferred. When using UDP, the application layer must perform the reliability functionality.
-
Application layer 402 handles the details of the particular application. Many common TCP/IP applications are present for almost every implementation, including a Telnet for remote login; a file transfer protocol (FTP); a simple mail transfer protocol (SMTP) for electronic mail; and a simple network management protocol (SNMP). - The mechanism of the present invention may be more specifically implemented in a layer, such as
transport layer 404 ornetwork layer 406 in these examples. This layer examines requests received in inbound traffic and determines whether the request should be relayed in outbound traffic in an encrypted or unencrypted form. In these illustrative examples, a request contains a fully qualified universal resource locator (URL). A fully qualified URL contains a host name, as well as, the context. An example of a fully qualified URL is www.ibm.com/tech. The host name is “ibm.com”, while the context is “tech” in this illustrative example. Depending on the particular implementation, the request may contain just the host name, rather than a fully qualified URL. -
FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention. In this example,traffic 500 is sent betweenclient process 502 androuting process 504.Traffic 500 may be unencrypted traffic or encrypted traffic.Client process 502 may be, for example, a browser executing on a client, such asclient 112 inFIG. 1 .Routing process 504 may be, for example, a process running on a device, such asnetwork appliance 106 inFIG. 1 . More specifically, routingprocess 504 may be located intransport layer 404 ornetwork layer 406 inFIG. 4 . In this illustrative example, routingprocess 504 routes traffic for a single port. This port may be a logical port or a physical port. -
Routing process 504 employs URI table 506 to determine whether inbound traffic fromclient process 502 is to be sent asencrypted traffic 508, orunencrypted traffic 510 toserver process 512. In this example, URI table 506 is a table of URLs. Of course, URI table 506 may take other form depending on the particular implementation. For example, URI table 506 may contain universal resource names (URNs) instead of URLs. URNs use regular words that are protocol and location independent. URNs provide a higher level of abstraction. URNs are persistent (never change) and require a resolution service similar to the domain name system (DNS) to convert names into real addresses. Further, URI table 506 may contain multiple types of URIs, such as URLs and URNs. - When
traffic 500 takes the form of incoming traffic such as a request from a client to a server,routing process 504 identifies the URL in the request.Routing process 504 compares this URL with URLs in URI table 506 to determine whether a match is present. In this example, a match indicates that the outbound traffic from routingprocess 504 toserver process 512 should take the form ofencrypted traffic 508. In other words, if the request intraffic 500 is unencrypted, routingprocess 504 encrypts the request. Determining whethertraffic 500 is encrypted may be performed using a number of different mechanisms. For example, iftraffic 500 is using an SSL connection that is received at the port typically used for this type of connection, the traffic coming through that port is identified as being encrypted. As another example, header information intraffic 500 may be examined by routingprocess 504 to determine whethertraffic 500 is encrypted. In some cases, encryption protocols include information in headers in the traffic that may be used to determine whether the traffic is encrypted. Further, particular ports may be identified ahead of time as ports that will be used for encrypted traffic. - If the request was received in an encrypted form,
routing process 504 routes the request toserver process 512 in the encrypted form. The connection for this request is recorded in encrypted connection table 514. - In these illustrative examples, the encryption takes the form of SSL. Although SSL is used in these examples, other types of security protocol may be used to encrypt traffic to form
encrypted traffic 508. For example, secure hypertext transfer protocol (SHTTP) or IP Security Protocol (IPSEC) may be used as the security protocol for encrypting traffic. - On the other hand, if the URL is not found in URI table 506, encryption of the request is not necessary.
Routing process 504 sends the request in an unencrypted form asunencrypted traffic 510 toserver process 512. - When routing
process 504 receives incoming traffic fromserver process 512, routingprocess 504 identifies existing connection information for this traffic if the incoming traffic is in an unencrypted form such asunencrypted traffic 510. This incoming traffic may be, for example, a response to the request.Routing process 504 compares the connection with existing connections recorded in encrypted connection table 514. If the connection is located within this table, routingprocess 504 encrypts the unencrypted response and returns this response toclient 502 intraffic 500. In this example, the client has sent a request in an encrypted form androuting process 504 returns the response intraffic 500 toclient 502 in the same form. However, depending on the particular implementation, the response could be returned in an unencrypted form. In this manner, the mechanism of the present invention allows for selectively encrypting traffic passing through a port in a network appliance. -
FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention. In this illustrative example, traffic is sent betweenclient 602 andserver 604, in examining this traffic between these two nodes, the traffic flows throughrouter 606, routingprocess 608,router 610, routingprocess 612, androuter 614.Routing process 608 androuting process 612 along withrouter 610 are located withinnetwork 600.Network 600 may be, for example, a wider remote network or a local area network.Routing process 608 androuting process 612 contain the processes of the present invention in these illustrative examples. These components contain processes similar to those found inrouting process 404 inFIG. 4 . - In a network flow, the routes between
routing processes network 600. Wide Area Networks typically interconnect distant divisions of the same organization with locations in various cities around the world. WANs are typically provided by third-party organizations. The third-party provider controls the connections and routes within the WAN. In most cases, the network traffic for each of the third-party provider customers is isolated on different links. However, the network traffic flowing through the WAN is visible to anyone working within the third-party provider WAN. In these cases, the organization using the WAN has no control over who can see the network traffic flowing betweenrouting processes - The traffic from
client 602 torouting process 608 can flow unencrypted because this traffic is on the internal LAN. In order to protect information flowing across the WAN, routingprocess 608 is configured to encrypt certain URLs deemed to contain sensitive information the organization does not want exposed to the WAN provider.Routing process 612 may exchange traffic withserver 604 in either an encrypted or unencrypted form depending on the network configuration. For example, ifserver 604 is on an internal LAN, routingprocess 612 does not have to encrypt those URI's. Therefore, routingprocess 612 does not necessarily have the same configuration asrouting process 608. - On the reverse network flow from
server 604, routingprocess 612 compares the responses connection (seeFIG. 9 ) and either encrypts or does not encrypt the response traffic on existing connections back torouting process 608.Routing process 608 networks traffic back toclient 602.Client 602 is sent traffic based on the existing encrypted or unencrypted connections. -
FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention. In this example,entry 700 is an entry found in a table, such as URI table 506 inFIG. 5 .Entry 700 containsindicator 702 and a URL that containshost name 704 andcontext 706. In this illustrative example, the URL is a qualified URL.Indicator 702 is used to identify the URL inentry 700 as one that requires encryption. -
FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention.Entry 800 is an example of an entry in an encrypted connection table, such as encrypted connection table 514 inFIG. 5 . In this example,entry 800 contains a connection identifier. As used in these examples, a connection identifier may include any information that uniquely identifies the connection. For example, this information may include an end point IP address, a port identifier, and a processor thread that receives the connection in the network appliance. Of course, other information also may be used in the connection identifier. -
FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention. The process illustrated inFIG. 9 may be implemented in a process, such asrouting process 504 inFIG. 5 . - The process begins by determining whether an encrypted connection has been established (step 900). If an encrypted connection is not present, a determination is made as to whether the request should be encrypted by comparing the URL to a table, such as URI table 506 in
FIG. 5 (step 902). If the request is not to be encrypted, the process sends the request in an unencrypted form (step 904) with the process terminating thereafter. - Turning back to step 900, if an encrypted connection is present, the process records the encrypted connection in the table (step 906) with the process proceeding to step 902 to compare the URL to the table to encrypt. In
step 906, the information for this request is recorded such that additional traffic on this connection remains encrypted. - Turning back now to step 902, if the request is to be sent in encrypted form, the process sends the request in this form (step 908) with the process terminating thereafter.
-
FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention. The process illustrated inFIG. 10 may be implemented in a process, such asrouting process 504 inFIG. 5 . - The process begins by receiving a response from a server (step 1000). The connection for this response is compared to a table of encrypted connections (step 1002). This table may be, for example, encrypted connection table 514 in
FIG. 5 . Next, a determination is made as to whether the original connection was encrypted (step 1004). This determination is used to ensure that responses returned to a client are returned in the same form as received from the client. For example, if the original connection was encrypted, all responses are returned in an encrypted form. This particular process does not rely on the URI. If the original connection was encrypted, the process sends a response in encrypted form (step 1006), with the process terminating thereafter. - With reference again to step 1004, if the original connection was not encrypted, the process sends the response in unencrypted form (step 1008), thus ending the process.
- Thus, the present invention provides an improved method, apparatus, and computer instructions for selectively encrypting traffic. The mechanism of the present invention allows for both encrypted and unencrypted traffic to pass through the same port. This mechanism compares the URI in incoming traffic, such as a request from a client, to a set of URIs. If a match is present, the request is sent in the outbound traffic to a server in an encrypted form. If a match is absent, the traffic is sent in an unencrypted form. In this manner, the amount of capital expenditures and management of resources is reduced by decreasing the number of paths needed to route encrypted and unencrypted traffic as compared to currently available routing systems in network appliances.
- It is important to note that while the present invention has been described in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer readable medium of instructions and a variety of forms and that the present invention applies equally regardless of the particular type of signal bearing media actually used to carry out the distribution. Examples of computer readable media include recordable-type media, such as a floppy disk, a hard disk drive, a RAM, CD-ROMs, DVD-ROMs, and transmission-type media, such as digital and analog communications links, wired or wireless communications links using transmission forms, such as, for example, radio frequency and light wave transmissions. The computer readable media may take the form of coded formats that are decoded for actual use in a particular data processing system.
- The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Claims (19)
1. A method in a data processing system for processing outbound traffic passing through a port, the method comprising:
receiving a request from a client for a server at the port, wherein the request includes a universal resource identifier to a destination;
determining whether the request requires encryption using the universal resource identifier in the request; and
responsive to a determination that the request requires encryption, sending the request through the port to the destination in an encrypted form.
2. The method of claim 1 further comprising:
receiving a response from the source for routing to a requesting client;
determining whether the original request for the response was in the encrypted form; and
responsive to a determination that the original request for the response was in the encrypted form, sending the response the requesting client in the encrypted form.
3. The method of claim 1 , wherein the determining step comprises:
comparing the universal resource identifier in the request to a set of universal resource identifiers; and
responsive to a match between the universal resource identifier in the request to a particular universal resource identifier in the set of universal resource identifiers, identifying the response as requiring encryption.
4. The method of claim 2 further comprising:
responsive to sending the request to the destination in the encrypted form, recording a connection for the request in a set of connections.
5. The method of claim 4 , wherein the determining step comprises:
identifying the connection for the response; and
identifying original response as being in the encrypted form if the connection is in the set of connections.
6. The method of claim 1 , wherein the universal resource identifier is a universal resource locator.
7. The method of claim 3 , wherein the set of universal resource identifiers is located in a table.
8. The method of claim 1 , wherein the method is located in a network appliance.
9. A data processing system for processing outbound traffic passing through a port, the data processing system comprising:
receiving means for receiving a request from a client for a server at the port, wherein the request includes a universal resource identifier to a destination;
determining means for determining whether the request requires encryption using the universal resource identifier in the request; and
sending means, responsive to a determination that the request requires encryption, for sending the request through the port to the destination in an encrypted form.
10. The data processing system of claim 9 , wherein the receiving means is a first receiving means, the determining means is a first determining means, and the sending means is a first sending means and further comprising:
second receiving means for receiving a response from the source for routing to a requesting client;
second determining means for determining whether the original request for the response was in the encrypted form; and
second sending means, responsive to a determination that the original request for the response was in the encrypted form, for sending the response the requesting client in the encrypted form.
11. The data processing system of claim 9 , wherein the determining means comprises:
comparing means for comparing the universal resource identifier in the request to a set of universal resource identifiers; and
identifying means, responsive to a match between the universal resource identifier in the request to a particular universal resource identifier in the set of universal resource identifiers, for identifying the response as requiring encryption.
12. The data processing system of claim 10 further comprising:
recording means, responsive to sending the request to the destination in the encrypted form, for recording a connection for the request in a set of connections.
13. The data processing system of claim 12 , wherein the second determining means comprises:
first means for identifying the connection for the response; and
second means for identifying original response as being in the encrypted form if the connection is in the set of connections.
14. A computer program product in a computer readable medium for processing outbound traffic passing through a port, the computer program product comprising:
first instructions for receiving a request from a client for a server at the port, wherein the request includes a universal resource identifier to a destination;
second instructions for determining whether the request requires encryption using the universal resource identifier in the request; and
third instructions, responsive to a determination that the request requires encryption, for sending the request through the port to the destination in an encrypted form.
15. The computer program product of claim 14 further comprising:
fourth instructions for receiving a response from the source for routing to a requesting client;
fifth instructions for determining whether the original request for the response was in the encrypted form; and
sixth instructions, responsive to a determination that the original request for the response was in the encrypted form, for sending the response the requesting client in the encrypted form.
16. The computer program product of claim 14 , wherein the second instructions comprises:
first sub instructions for comparing the universal resource identifier in the request to a set of universal resource identifiers; and
second sub instructions, responsive to a match between the universal resource identifier in the request to a particular universal resource identifier in the set of universal resource identifiers, for identifying the response as requiring encryption.
17. The computer program product of claim 15 further comprising:
seventh instructions, responsive to sending the request to the destination in the encrypted form, for recording a connection for the request in a set of connections.
18. The computer program product of claim 17 , wherein the fifth instructions comprises:
first sub instructions for identifying the connection for the response; and
second sub instructions for identifying original response as being in the encrypted form if the connection is in the set of connections.
19. The computer program product of claim 14 wherein the universal resource identifier is a universal resource locator.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/109,099 US20060236124A1 (en) | 2005-04-19 | 2005-04-19 | Method and apparatus for determining whether to encrypt outbound traffic |
US12/137,946 US8478985B2 (en) | 2005-04-19 | 2008-06-12 | Determining whether to encrypt outbound traffic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/109,099 US20060236124A1 (en) | 2005-04-19 | 2005-04-19 | Method and apparatus for determining whether to encrypt outbound traffic |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/137,946 Continuation US8478985B2 (en) | 2005-04-19 | 2008-06-12 | Determining whether to encrypt outbound traffic |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060236124A1 true US20060236124A1 (en) | 2006-10-19 |
Family
ID=37109953
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/109,099 Abandoned US20060236124A1 (en) | 2005-04-19 | 2005-04-19 | Method and apparatus for determining whether to encrypt outbound traffic |
US12/137,946 Expired - Fee Related US8478985B2 (en) | 2005-04-19 | 2008-06-12 | Determining whether to encrypt outbound traffic |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/137,946 Expired - Fee Related US8478985B2 (en) | 2005-04-19 | 2008-06-12 | Determining whether to encrypt outbound traffic |
Country Status (1)
Country | Link |
---|---|
US (2) | US20060236124A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070160200A1 (en) * | 2004-01-14 | 2007-07-12 | Nec Corporation | Encryption communication system |
US20080025310A1 (en) * | 2006-07-31 | 2008-01-31 | Fujitsu Limited | Data relaying apparatus, data relaying method, and computer product |
US20100011206A1 (en) * | 2008-07-14 | 2010-01-14 | Ricoh Company, Ltd. | Embedded apparatus, remote-processing method, and computer program product |
US20120166343A1 (en) * | 2010-12-22 | 2012-06-28 | Giovanni Carapelli | Fuel dispensing payment system for secure evaluation of cardholder data |
WO2012112820A2 (en) * | 2011-02-16 | 2012-08-23 | Medicity, Inc. | Sending healthcare information securely |
US20160197886A1 (en) * | 2015-01-07 | 2016-07-07 | Anchorfree Inc. | Secure personal server system and method |
CN108055230A (en) * | 2017-10-19 | 2018-05-18 | 福建中金在线信息科技有限公司 | The method and apparatus of data request processing |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429715B2 (en) * | 2008-08-08 | 2013-04-23 | Microsoft Corporation | Secure resource name resolution using a cache |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5086469A (en) * | 1990-06-29 | 1992-02-04 | Digital Equipment Corporation | Encryption with selective disclosure of protocol identifiers |
US5228083A (en) * | 1991-06-28 | 1993-07-13 | Digital Equipment Corporation | Cryptographic processing in a communication network, using a single cryptographic engine |
US5548646A (en) * | 1994-09-15 | 1996-08-20 | Sun Microsystems, Inc. | System for signatureless transmission and reception of data packets between computer networks |
US5835726A (en) * | 1993-12-15 | 1998-11-10 | Check Point Software Technologies Ltd. | System for securing the flow of and selectively modifying packets in a computer network |
US5978918A (en) * | 1997-01-17 | 1999-11-02 | Secure.Net Corporation | Security process for public networks |
US20010034792A1 (en) * | 2000-03-10 | 2001-10-25 | Swildens Eric Sven-Johan | Decrypting load balancing array system |
US20020048269A1 (en) * | 2000-08-04 | 2002-04-25 | Hong Jack L. | Intelligent demand driven recognition of URL objects in connection oriented transactions |
US6708218B1 (en) * | 2000-06-05 | 2004-03-16 | International Business Machines Corporation | IpSec performance enhancement using a hardware-based parallel process |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3688830B2 (en) * | 1995-11-30 | 2005-08-31 | 株式会社東芝 | Packet transfer method and packet processing apparatus |
US6182226B1 (en) * | 1998-03-18 | 2001-01-30 | Secure Computing Corporation | System and method for controlling interactions between networks |
US20020129243A1 (en) * | 2001-03-08 | 2002-09-12 | Viswanath Nanjundiah | System for selective encryption of data packets |
US7181506B1 (en) * | 2001-04-06 | 2007-02-20 | Mcafee, Inc. | System and method to securely confirm performance of task by a peer in a peer-to-peer network environment |
NZ531861A (en) * | 2001-09-20 | 2006-02-24 | Hitwise Pty Ltd | Method and system for characterization of online behavior |
US7362780B2 (en) * | 2002-12-11 | 2008-04-22 | Nokia Corporation | Avoiding compression of encrypted payload |
-
2005
- 2005-04-19 US US11/109,099 patent/US20060236124A1/en not_active Abandoned
-
2008
- 2008-06-12 US US12/137,946 patent/US8478985B2/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5086469A (en) * | 1990-06-29 | 1992-02-04 | Digital Equipment Corporation | Encryption with selective disclosure of protocol identifiers |
US5228083A (en) * | 1991-06-28 | 1993-07-13 | Digital Equipment Corporation | Cryptographic processing in a communication network, using a single cryptographic engine |
US5835726A (en) * | 1993-12-15 | 1998-11-10 | Check Point Software Technologies Ltd. | System for securing the flow of and selectively modifying packets in a computer network |
US5548646A (en) * | 1994-09-15 | 1996-08-20 | Sun Microsystems, Inc. | System for signatureless transmission and reception of data packets between computer networks |
US5978918A (en) * | 1997-01-17 | 1999-11-02 | Secure.Net Corporation | Security process for public networks |
US20010034792A1 (en) * | 2000-03-10 | 2001-10-25 | Swildens Eric Sven-Johan | Decrypting load balancing array system |
US6708218B1 (en) * | 2000-06-05 | 2004-03-16 | International Business Machines Corporation | IpSec performance enhancement using a hardware-based parallel process |
US20020048269A1 (en) * | 2000-08-04 | 2002-04-25 | Hong Jack L. | Intelligent demand driven recognition of URL objects in connection oriented transactions |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8356169B2 (en) * | 2004-01-14 | 2013-01-15 | Nec Corporation | Encryption communication system, apparatus and method for allowing direct encryption communication with a plurality of nodes |
US20070160200A1 (en) * | 2004-01-14 | 2007-07-12 | Nec Corporation | Encryption communication system |
US20080025310A1 (en) * | 2006-07-31 | 2008-01-31 | Fujitsu Limited | Data relaying apparatus, data relaying method, and computer product |
US20100011206A1 (en) * | 2008-07-14 | 2010-01-14 | Ricoh Company, Ltd. | Embedded apparatus, remote-processing method, and computer program product |
US8966244B2 (en) * | 2008-07-14 | 2015-02-24 | Ricoh Company, Ltd. | Embedded apparatus, remote-processing method, and computer program product |
US9262760B2 (en) * | 2010-12-22 | 2016-02-16 | Gilbarco Inc. | Fuel dispensing payment system for secure evaluation of cardholder data |
US20120166343A1 (en) * | 2010-12-22 | 2012-06-28 | Giovanni Carapelli | Fuel dispensing payment system for secure evaluation of cardholder data |
US10657524B2 (en) | 2010-12-22 | 2020-05-19 | Gilbarco Inc. | Fuel dispensing payment system for secure evaluation of cardholder data |
WO2012112820A3 (en) * | 2011-02-16 | 2014-04-24 | Medicity, Inc. | Sending healthcare information securely |
WO2012112820A2 (en) * | 2011-02-16 | 2012-08-23 | Medicity, Inc. | Sending healthcare information securely |
US20160197886A1 (en) * | 2015-01-07 | 2016-07-07 | Anchorfree Inc. | Secure personal server system and method |
US9942204B2 (en) * | 2015-01-07 | 2018-04-10 | Anchorfree Inc. | Secure personal server system and method |
CN108055230A (en) * | 2017-10-19 | 2018-05-18 | 福建中金在线信息科技有限公司 | The method and apparatus of data request processing |
Also Published As
Publication number | Publication date |
---|---|
US8478985B2 (en) | 2013-07-02 |
US20080240436A1 (en) | 2008-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8478985B2 (en) | Determining whether to encrypt outbound traffic | |
US9860251B2 (en) | Dynamic encryption of a universal resource locator | |
US7269848B2 (en) | Method and system for access to development environment of another in a secure zone | |
US7003565B2 (en) | Clickstream data collection technique | |
US7657737B2 (en) | Method for mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server | |
Rose et al. | Current technological impediments to business-to-consumer electronic commerce | |
US7596607B2 (en) | Apparatus for managing email messages | |
US6671723B2 (en) | Method and apparatus for scanning a web site in a distributed data processing system for problem determination | |
US20080034036A1 (en) | Proxy server apparatus and method for providing service using the same | |
CN101753606A (en) | Method for realizing WEB reverse proxy | |
EP0858201A2 (en) | Method and apparatus for allowing secure transactions through a firewall | |
US20020103878A1 (en) | System for automated configuration of access to the internet | |
US6950873B2 (en) | Apparatus and method for port sharing a plurality of server processes | |
US20080228874A1 (en) | Method and Apparatus for Collocating Application Monitoring Reports with Web Applications | |
US20040003113A1 (en) | Apparatus, system and method of double-checking DNS provided IP addresses | |
US9300677B2 (en) | Data security system | |
US7421576B1 (en) | Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes | |
US6968356B1 (en) | Method and apparatus for transferring data between a client and a host across a firewall | |
US7769766B1 (en) | Method and an apparatus to store content rating information | |
JP2004046681A (en) | Content output system, relay server for request to output content, and content output device | |
US6938088B1 (en) | Method and system for caching HTTP data transported with socks data in IP datagrams | |
US20060107324A1 (en) | Method to prevent denial of service attack on persistent TCP connections | |
US20030236997A1 (en) | Secure network agent | |
US12132807B2 (en) | Third party gateway | |
US20230403345A1 (en) | Third party gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POLOZOFF, ALEXANDRE;BHOGAL, KULVIR SINGH;REEL/FRAME:016201/0472;SIGNING DATES FROM 20050413 TO 20050414 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |