[go: nahoru, domu]

US20060236124A1 - Method and apparatus for determining whether to encrypt outbound traffic - Google Patents

Method and apparatus for determining whether to encrypt outbound traffic Download PDF

Info

Publication number
US20060236124A1
US20060236124A1 US11/109,099 US10909905A US2006236124A1 US 20060236124 A1 US20060236124 A1 US 20060236124A1 US 10909905 A US10909905 A US 10909905A US 2006236124 A1 US2006236124 A1 US 2006236124A1
Authority
US
United States
Prior art keywords
request
universal resource
response
encrypted form
resource identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/109,099
Inventor
Alexandre Polozoff
Kulvir Bhogal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/109,099 priority Critical patent/US20060236124A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BHOGAL, KULVIR SINGH, POLOZOFF, ALEXANDRE
Publication of US20060236124A1 publication Critical patent/US20060236124A1/en
Priority to US12/137,946 priority patent/US8478985B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention relates generally to a data processing system, and in particular, to a method and apparatus for processing data. Still, more particularly, the present invention provides an improved method, apparatus, and computer instruction for managing transfer of data in a network.
  • the Internet is a global network of computers and networks joined together by means of gateways that handle data transfer and the conversion of messages from a protocol of the sending network to a protocol used by the receiving network.
  • any computer may communicate with any other computer with information traveling over the Internet through a variety of languages, also referred to as protocols.
  • the set of protocols used on the Internet is called transmission control protocol/Internet Protocol (TCP/IP).
  • the Internet has revolutionized both communications and commerce, as well as, being a source of both information and entertainment.
  • e-mail is a widely used format to communicate over the Internet.
  • the Internet is also used for real-time voice conversations.
  • HTTP hypertext transfer protocol
  • HTML hypertext markup language
  • Web pages are connected to each other through links or hyperlinks. These links allow for a connection or link to other Web resources identified by a universal resource identifier (URI), such as a uniform resource locator (URL).
  • URI universal resource identifier
  • URL uniform resource locator
  • a browser is a program used to look at and interact with all of the information on the Web.
  • a browser is able to display Web pages and to traverse links to other Web pages.
  • Resources such as Web pages, are retrieved by a browser, which is capable of submitting a request for the resource.
  • This request typically includes an identifier, such as, for example, a URL.
  • a browser is an application used to navigate or view information or data in any distributed database, such as the Internet or the World Wide Web.
  • a user may enter a domain name through a graphical user interface (GUI) for the browser to access a source of content.
  • the domain name is automatically converted to the IP address by a domain name server (DNS), which is a service that translates the symbolic name entered by the user into an IP address by looking up the domain name in a database.
  • DNS domain name server
  • SSL secure sockets layer
  • Various network appliances are employed to accept inbound encrypted traffic on a specific port.
  • This port may be configured to either end the outbound traffic from a network appliance in an encrypted form or an unencrypted form. Mixing of encrypted and unencrypted outbound traffic cannot occur with currently available network appliances.
  • These appliances include, for example, load balancers, routers, and firewalls. In some situations, such as in an enterprise environment, different types of traffic flow over an internal firewall protected network. Some of the traffic may not need encryption. For example, all traffic with passwords may need encryption while other forms of traffic do not need encryption.
  • the present invention provides an improved method, apparatus, and computer instructions for processing outbound traffic passing through a port.
  • This port is for a server and receives a request from a client.
  • the request includes a universal resource identifier to a destination.
  • a determination is made as to whether the request requires encryption using the universal resource identifier in the request.
  • the request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
  • FIG. 1 is a diagram illustrating a network data processing system, in which the present invention may be implemented
  • FIG. 2 is a block diagram of a data processing system that may be implemented as a server in accordance with a preferred embodiment of the present invention
  • FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented
  • FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention
  • FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention
  • FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention.
  • FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention.
  • FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention.
  • FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention.
  • FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention.
  • Network data processing system 100 is a network of computers in which the present invention may be implemented.
  • Network data processing system 100 contains network 102 and network 104 . These two networks are connected to one another through network appliance 106 . These components are for the medium used to provide communications links between various devices and computers connected together within network data processing system 100 .
  • Networks 102 and 104 may include connections, such as wire, wireless communication links, or fiber optic cables.
  • network 104 contains server 108 and server 110 . These servers in network 104 may be, for example, in a local area network (LAN) for an enterprise or business.
  • Network 102 contains client 112 , 114 , and 116 , along with server 118 . These two networks may be part of the Internet in these examples.
  • Network appliance 106 provides a connection between network 102 and network 104 .
  • network appliance 106 is a device that accepts inbound traffic on a port and may send the outbound traffic in an encrypted or unencrypted form through the same port.
  • Network appliance 106 may be, for example, a load balancer, a firewall, or a router.
  • Network appliance 106 includes a mechanism used to selectively encrypt traffic through a port such that encrypted and unencrypted traffic flow through the same port.
  • FIG. 2 is a block diagram of a data processing system that may be implemented as a server, such as server 108 in FIG. 1 , in accordance with a preferred embodiment of the present invention. Further, data processing system 200 may be used to implement a network appliance, such as network appliance 106 in FIG. 1 .
  • a network appliance such as network appliance 106 in FIG. 1 .
  • Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality of processors 202 and 204 connected to system bus 206 . Alternatively, a single processor system may be employed. Also connected to system bus 206 is memory controller/cache 208 , which provides an interface to local memory 209 . I/O Bus Bridge 210 connects to system bus 206 and provides an interface to I/O bus 212 . Memory controller/cache 208 and I/O Bus Bridge 210 may be integrated as depicted.
  • SMP symmetric multiprocessor
  • Peripheral component interconnect (PCI) bus bridge 214 connected to I/O bus 212 provides an interface to PCI local bus 216 .
  • PCI Peripheral component interconnect
  • a number of modems may be connected to PCI local bus 216 .
  • Communications links to clients 108 - 112 in FIG. 1 may be provided through modem 218 and network adapter 220 connected to PCI local bus 216 through add-in connectors.
  • Additional PCI bus bridges 222 and 224 provide interfaces for additional PCI local buses 226 and 228 , from which additional modems or network adapters may be supported. In this manner, data processing system 200 allows connections to multiple network computers.
  • a memory-mapped graphics adapter 230 and hard disk 232 may also be connected to I/O bus 212 as depicted, either directly or indirectly.
  • FIG. 2 may vary.
  • other peripheral devices such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted.
  • the depicted example is not meant to imply architectural limitations with respect to the present invention.
  • the data processing system depicted in FIG. 2 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, N.Y., running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
  • AIX Advanced Interactive Executive
  • FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented.
  • Data processing system 300 is an example of a client computer, such as client 112 in FIG. 1 .
  • Data processing system 300 employs a peripheral component interconnect (PCI) local bus architecture.
  • PCI peripheral component interconnect
  • AGP Accelerated Graphics Port
  • ISA Industry Standard Architecture
  • Processor 302 and main memory 304 connects to PCI local bus 306 through PCI Bridge 308 .
  • PCI Bridge 308 also may include an integrated memory controller and cache memory for processor 302 . Additional connections to PCI local bus 306 may be made through direct component interconnection or through add-in boards.
  • local area network (LAN) adapter 310 small computer system interface (SCSI) host bus adapter 312 , and expansion bus interface 314 connect to PCI local bus 306 by direct component connection.
  • audio adapter 316 graphics adapter 318 , and audio/video adapter 319 connect to PCI local bus 306 by add-in boards inserted into expansion slots.
  • Expansion bus interface 314 connects to a keyboard and mouse adapter 320 , modem 322 , and additional memory 324 .
  • SCSI host bus adapter 312 connects to hard disk drive 326 , tape drive 328 , and CD-ROM drive 330 .
  • An operating system runs on processor 302 and is used to coordinate and provide control of various components within data processing system 300 in FIG. 3 .
  • the operating system may be a commercially available operating system, such as Windows XP, which is available from Microsoft Corporation.
  • Applications or programs are located on storage devices, such as hard disk drive 326 , and may be loaded into main memory 304 for execution by processor 302 .
  • FIG. 3 may vary depending on the implementation.
  • Other internal hardware or peripheral devices such as flash read-only memory (ROM), equivalent nonvolatile memory, or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIG. 3 .
  • the processes of the present invention may be applied to a multiprocessor data processing system.
  • data processing system 300 also may be a notebook computer or hand held computer in addition to taking the form of a PDA.
  • data processing system 300 also may be a kiosk or a Web appliance.
  • FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention.
  • TCP/IP and similar protocols are utilized by communications architecture 400 .
  • communications architecture 400 is a 4-layer system. This architecture includes application layer 402 , transport layer 404 , network layer 406 , and link layer 408 . Each layer is responsible for handling various communications tasks.
  • Link layer 408 also is referred to as the data-link layer or the network interface layer and normally includes the device driver in the operating system and the corresponding network interface card in the computer. This layer handles all the hardware details of physically interfacing with the network media being used, such as optical cables or Ethernet cables.
  • Network layer 406 also is referred to as the Internet layer and handles the movement of packets of data around the network. For example, network layer 406 handles the routing of various packets of data that are transferred over the network.
  • Network layer 406 in the TCP/IP suite is comprised of several protocols, including Internet protocol (IP), Internet control message protocol (ICMP), and Internet group management protocol (IGMP).
  • IP Internet protocol
  • ICMP Internet control message protocol
  • IGMP Internet group management protocol
  • transport layer 404 provides an interface between network layer 406 and application layer 402 that facilitates the transfer of data between two host computers.
  • Transport layer 404 is concerned with things such as, for example, dividing the data passed to it from the application into appropriately sized chunks for the network layer below, acknowledging received packets, and setting timeouts to make certain the other end acknowledges packets that are sent.
  • TCP/IP protocol suite two distinctly different transport protocols are present, TCP and User datagram protocol (UDP).
  • TCP provides reliability services to ensure that data is properly transmitted between two hosts, including dropout detection and retransmission services.
  • UDP provides a much simpler service to the application layer by merely sending packets of data called datagrams from one host to the other, without providing any mechanism for guaranteeing that the data is properly transferred.
  • the application layer must perform the reliability functionality.
  • Application layer 402 handles the details of the particular application. Many common TCP/IP applications are present for almost every implementation, including a Telnet for remote login; a file transfer protocol (FTP); a simple mail transfer protocol (SMTP) for electronic mail; and a simple network management protocol (SNMP).
  • Telnet for remote login
  • FTP file transfer protocol
  • SMTP simple mail transfer protocol
  • SNMP simple network management protocol
  • the mechanism of the present invention may be more specifically implemented in a layer, such as transport layer 404 or network layer 406 in these examples.
  • This layer examines requests received in inbound traffic and determines whether the request should be relayed in outbound traffic in an encrypted or unencrypted form.
  • a request contains a fully qualified universal resource locator (URL).
  • a fully qualified URL contains a host name, as well as, the context.
  • An example of a fully qualified URL is www.ibm.com/tech.
  • the host name is “ibm.com”, while the context is “tech” in this illustrative example.
  • the request may contain just the host name, rather than a fully qualified URL.
  • FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention.
  • traffic 500 is sent between client process 502 and routing process 504 .
  • Traffic 500 may be unencrypted traffic or encrypted traffic.
  • Client process 502 may be, for example, a browser executing on a client, such as client 112 in FIG. 1 .
  • Routing process 504 may be, for example, a process running on a device, such as network appliance 106 in FIG. 1 . More specifically, routing process 504 may be located in transport layer 404 or network layer 406 in FIG. 4 . In this illustrative example, routing process 504 routes traffic for a single port. This port may be a logical port or a physical port.
  • Routing process 504 employs URI table 506 to determine whether inbound traffic from client process 502 is to be sent as encrypted traffic 508 , or unencrypted traffic 510 to server process 512 .
  • URI table 506 is a table of URLs.
  • URI table 506 may take other form depending on the particular implementation.
  • URI table 506 may contain universal resource names (URNs) instead of URLs.
  • URNs use regular words that are protocol and location independent. URNs provide a higher level of abstraction. URNs are persistent (never change) and require a resolution service similar to the domain name system (DNS) to convert names into real addresses.
  • URI table 506 may contain multiple types of URIs, such as URLs and URNs.
  • routing process 504 When traffic 500 takes the form of incoming traffic such as a request from a client to a server, routing process 504 identifies the URL in the request. Routing process 504 compares this URL with URLs in URI table 506 to determine whether a match is present. In this example, a match indicates that the outbound traffic from routing process 504 to server process 512 should take the form of encrypted traffic 508 . In other words, if the request in traffic 500 is unencrypted, routing process 504 encrypts the request. Determining whether traffic 500 is encrypted may be performed using a number of different mechanisms. For example, if traffic 500 is using an SSL connection that is received at the port typically used for this type of connection, the traffic coming through that port is identified as being encrypted.
  • header information in traffic 500 may be examined by routing process 504 to determine whether traffic 500 is encrypted.
  • encryption protocols include information in headers in the traffic that may be used to determine whether the traffic is encrypted. Further, particular ports may be identified ahead of time as ports that will be used for encrypted traffic.
  • routing process 504 routes the request to server process 512 in the encrypted form.
  • the connection for this request is recorded in encrypted connection table 514 .
  • the encryption takes the form of SSL.
  • SSL is used in these examples, other types of security protocol may be used to encrypt traffic to form encrypted traffic 508 .
  • SSL secure hypertext transfer protocol
  • IPSEC IP Security Protocol
  • Routing process 504 sends the request in an unencrypted form as unencrypted traffic 510 to server process 512 .
  • routing process 504 When routing process 504 receives incoming traffic from server process 512 , routing process 504 identifies existing connection information for this traffic if the incoming traffic is in an unencrypted form such as unencrypted traffic 510 . This incoming traffic may be, for example, a response to the request. Routing process 504 compares the connection with existing connections recorded in encrypted connection table 514 . If the connection is located within this table, routing process 504 encrypts the unencrypted response and returns this response to client 502 in traffic 500 . In this example, the client has sent a request in an encrypted form and routing process 504 returns the response in traffic 500 to client 502 in the same form. However, depending on the particular implementation, the response could be returned in an unencrypted form. In this manner, the mechanism of the present invention allows for selectively encrypting traffic passing through a port in a network appliance.
  • FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention.
  • traffic is sent between client 602 and server 604 , in examining this traffic between these two nodes, the traffic flows through router 606 , routing process 608 , router 610 , routing process 612 , and router 614 .
  • Routing process 608 and routing process 612 along with router 610 are located within network 600 .
  • Network 600 may be, for example, a wider remote network or a local area network.
  • Routing process 608 and routing process 612 contain the processes of the present invention in these illustrative examples. These components contain processes similar to those found in routing process 404 in FIG. 4 .
  • the routes between routing processes 608 and 612 could flow over a third-party network commonly known as a Wide Area Network (WAN).
  • WAN Wide Area Network
  • These routing processes are located in routers within network 600 .
  • Wide Area Networks typically interconnect distant divisions of the same organization with locations in various cities around the world.
  • WANs are typically provided by third-party organizations.
  • the third-party provider controls the connections and routes within the WAN.
  • the network traffic for each of the third-party provider customers is isolated on different links.
  • the network traffic flowing through the WAN is visible to anyone working within the third-party provider WAN. In these cases, the organization using the WAN has no control over who can see the network traffic flowing between routing processes 608 and 612 .
  • routing process 608 can flow unencrypted because this traffic is on the internal LAN.
  • routing process 608 is configured to encrypt certain URLs deemed to contain sensitive information the organization does not want exposed to the WAN provider.
  • Routing process 612 may exchange traffic with server 604 in either an encrypted or unencrypted form depending on the network configuration. For example, if server 604 is on an internal LAN, routing process 612 does not have to encrypt those URI's. Therefore, routing process 612 does not necessarily have the same configuration as routing process 608 .
  • routing process 612 compares the responses connection (see FIG. 9 ) and either encrypts or does not encrypt the response traffic on existing connections back to routing process 608 .
  • Routing process 608 networks traffic back to client 602 .
  • Client 602 is sent traffic based on the existing encrypted or unencrypted connections.
  • FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention.
  • entry 700 is an entry found in a table, such as URI table 506 in FIG. 5 .
  • Entry 700 contains indicator 702 and a URL that contains host name 704 and context 706 .
  • the URL is a qualified URL.
  • Indicator 702 is used to identify the URL in entry 700 as one that requires encryption.
  • FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention.
  • Entry 800 is an example of an entry in an encrypted connection table, such as encrypted connection table 514 in FIG. 5 .
  • entry 800 contains a connection identifier.
  • a connection identifier may include any information that uniquely identifies the connection. For example, this information may include an end point IP address, a port identifier, and a processor thread that receives the connection in the network appliance. Of course, other information also may be used in the connection identifier.
  • FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention.
  • the process illustrated in FIG. 9 may be implemented in a process, such as routing process 504 in FIG. 5 .
  • the process begins by determining whether an encrypted connection has been established (step 900 ). If an encrypted connection is not present, a determination is made as to whether the request should be encrypted by comparing the URL to a table, such as URI table 506 in FIG. 5 (step 902 ). If the request is not to be encrypted, the process sends the request in an unencrypted form (step 904 ) with the process terminating thereafter.
  • step 900 if an encrypted connection is present, the process records the encrypted connection in the table (step 906 ) with the process proceeding to step 902 to compare the URL to the table to encrypt. In step 906 , the information for this request is recorded such that additional traffic on this connection remains encrypted.
  • step 902 if the request is to be sent in encrypted form, the process sends the request in this form (step 908 ) with the process terminating thereafter.
  • FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention.
  • the process illustrated in FIG. 10 may be implemented in a process, such as routing process 504 in FIG. 5 .
  • the process begins by receiving a response from a server (step 1000 ).
  • the connection for this response is compared to a table of encrypted connections (step 1002 ).
  • This table may be, for example, encrypted connection table 514 in FIG. 5 .
  • a determination is made as to whether the original connection was encrypted (step 1004 ). This determination is used to ensure that responses returned to a client are returned in the same form as received from the client. For example, if the original connection was encrypted, all responses are returned in an encrypted form. This particular process does not rely on the URI. If the original connection was encrypted, the process sends a response in encrypted form (step 1006 ), with the process terminating thereafter.
  • step 1004 if the original connection was not encrypted, the process sends the response in unencrypted form (step 1008 ), thus ending the process.
  • the present invention provides an improved method, apparatus, and computer instructions for selectively encrypting traffic.
  • the mechanism of the present invention allows for both encrypted and unencrypted traffic to pass through the same port.
  • This mechanism compares the URI in incoming traffic, such as a request from a client, to a set of URIs. If a match is present, the request is sent in the outbound traffic to a server in an encrypted form. If a match is absent, the traffic is sent in an unencrypted form. In this manner, the amount of capital expenditures and management of resources is reduced by decreasing the number of paths needed to route encrypted and unencrypted traffic as compared to currently available routing systems in network appliances.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

An improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request includes a universal resource identifier to a destination. A determination is made as to whether the request requires encryption using the universal resource identifier in the request. The request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.

Description

    BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • The present invention relates generally to a data processing system, and in particular, to a method and apparatus for processing data. Still, more particularly, the present invention provides an improved method, apparatus, and computer instruction for managing transfer of data in a network.
  • 2. Description of Related Art
  • The Internet is a global network of computers and networks joined together by means of gateways that handle data transfer and the conversion of messages from a protocol of the sending network to a protocol used by the receiving network. On the Internet, any computer may communicate with any other computer with information traveling over the Internet through a variety of languages, also referred to as protocols. The set of protocols used on the Internet is called transmission control protocol/Internet Protocol (TCP/IP).
  • The Internet has revolutionized both communications and commerce, as well as, being a source of both information and entertainment. For many users, e-mail is a widely used format to communicate over the Internet. Additionally, the Internet is also used for real-time voice conversations.
  • With respect to transferring data over the Internet, the World Wide Web environment is used. This environment also is referred to simply as “the Web”. The Web is a mechanism used to access information over the Internet. In the Web environment, servers and clients effect data transaction using the hypertext transfer protocol (HTTP), a known protocol for handling the transfer of various data files, such as text files, graphic images, animation files, audio files, and video files.
  • On the Web, the information in various data files is formatted for presentation to a user by a standard page description language, the hypertext markup language (HTML). Documents using HTML also are referred to as Web pages. Web pages are connected to each other through links or hyperlinks. These links allow for a connection or link to other Web resources identified by a universal resource identifier (URI), such as a uniform resource locator (URL).
  • A browser is a program used to look at and interact with all of the information on the Web. A browser is able to display Web pages and to traverse links to other Web pages. Resources, such as Web pages, are retrieved by a browser, which is capable of submitting a request for the resource. This request typically includes an identifier, such as, for example, a URL. As used herein, a browser is an application used to navigate or view information or data in any distributed database, such as the Internet or the World Wide Web. A user may enter a domain name through a graphical user interface (GUI) for the browser to access a source of content. The domain name is automatically converted to the IP address by a domain name server (DNS), which is a service that translates the symbolic name entered by the user into an IP address by looking up the domain name in a database.
  • Users employ browsers to access data on the Web. Additionally, these browsers and other programs are used in business transactions. For example, a user may purchase goods or services from a business through a Website. Often times in retrieving data or completing a business transaction, the traffic is required to be encrypted to provide for maintaining the security and confidentiality of the information. In purchasing goods or services, the user may provide bank account information or credit card information for payment. Clearly, the user only wants the business offering the goods or services to see this information. In another example, a user may access personal medical information from a hospital Website. This information also is sent in an encrypted form. One encryption scheme is secure sockets layer (SSL). This standard is a widely used security protocol on the Internet. SSL is used to securely send credit card and other sensitive data to a business' Web site.
  • Various network appliances are employed to accept inbound encrypted traffic on a specific port. This port may be configured to either end the outbound traffic from a network appliance in an encrypted form or an unencrypted form. Mixing of encrypted and unencrypted outbound traffic cannot occur with currently available network appliances. These appliances include, for example, load balancers, routers, and firewalls. In some situations, such as in an enterprise environment, different types of traffic flow over an internal firewall protected network. Some of the traffic may not need encryption. For example, all traffic with passwords may need encryption while other forms of traffic do not need encryption.
  • Currently, the different types of traffic flow through different network routes or paths in which some are totally encrypted while others are unencrypted. This type of architecture results in higher capital expenditures, as well as, increased administration and network management.
  • Therefore, it would be advantageous to have an improved method, apparatus, and computer instructions for encrypting and unencrypting traffic in a network appliance.
  • SUMMARY OF THE INVENTION
  • The present invention provides an improved method, apparatus, and computer instructions for processing outbound traffic passing through a port. This port is for a server and receives a request from a client. The request includes a universal resource identifier to a destination. A determination is made as to whether the request requires encryption using the universal resource identifier in the request. The request is sent through the port to the destination in an encrypted form, in response to a determination that the request requires encryption.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
  • FIG. 1 is a diagram illustrating a network data processing system, in which the present invention may be implemented;
  • FIG. 2 is a block diagram of a data processing system that may be implemented as a server in accordance with a preferred embodiment of the present invention;
  • FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented;
  • FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention;
  • FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention;
  • FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention;
  • FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention;
  • FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention;
  • FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention; and
  • FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention.
  • AILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • With reference now to the figures, and in particular with reference to FIG. 1, this figure is a diagram illustrating a network data processing system in which the present invention may be implemented. Network data processing system 100 is a network of computers in which the present invention may be implemented. Network data processing system 100 contains network 102 and network 104. These two networks are connected to one another through network appliance 106. These components are for the medium used to provide communications links between various devices and computers connected together within network data processing system 100. Networks 102 and 104 may include connections, such as wire, wireless communication links, or fiber optic cables.
  • In this illustrative example, network 104 contains server 108 and server 110. These servers in network 104 may be, for example, in a local area network (LAN) for an enterprise or business. Network 102 contains client 112, 114, and 116, along with server 118. These two networks may be part of the Internet in these examples. Network appliance 106 provides a connection between network 102 and network 104. In these examples, network appliance 106 is a device that accepts inbound traffic on a port and may send the outbound traffic in an encrypted or unencrypted form through the same port. Network appliance 106 may be, for example, a load balancer, a firewall, or a router. Network appliance 106 includes a mechanism used to selectively encrypt traffic through a port such that encrypted and unencrypted traffic flow through the same port.
  • FIG. 2 is a block diagram of a data processing system that may be implemented as a server, such as server 108 in FIG. 1, in accordance with a preferred embodiment of the present invention. Further, data processing system 200 may be used to implement a network appliance, such as network appliance 106 in FIG. 1.
  • Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality of processors 202 and 204 connected to system bus 206. Alternatively, a single processor system may be employed. Also connected to system bus 206 is memory controller/cache 208, which provides an interface to local memory 209. I/O Bus Bridge 210 connects to system bus 206 and provides an interface to I/O bus 212. Memory controller/cache 208 and I/O Bus Bridge 210 may be integrated as depicted.
  • Peripheral component interconnect (PCI) bus bridge 214 connected to I/O bus 212 provides an interface to PCI local bus 216. A number of modems may be connected to PCI local bus 216. Communications links to clients 108-112 in FIG. 1 may be provided through modem 218 and network adapter 220 connected to PCI local bus 216 through add-in connectors.
  • Additional PCI bus bridges 222 and 224 provide interfaces for additional PCI local buses 226 and 228, from which additional modems or network adapters may be supported. In this manner, data processing system 200 allows connections to multiple network computers. A memory-mapped graphics adapter 230 and hard disk 232 may also be connected to I/O bus 212 as depicted, either directly or indirectly.
  • Those of ordinary skill in the art will appreciate that the hardware depicted in FIG. 2 may vary. For example, other peripheral devices, such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted. The depicted example is not meant to imply architectural limitations with respect to the present invention.
  • The data processing system depicted in FIG. 2 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, N.Y., running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
  • FIG. 3 is a block diagram illustrating a data processing system in which the present invention may be implemented. Data processing system 300 is an example of a client computer, such as client 112 in FIG. 1. Data processing system 300 employs a peripheral component interconnect (PCI) local bus architecture. Although the depicted example employs a PCI bus, other bus architectures such as Accelerated Graphics Port (AGP) and Industry Standard Architecture (ISA) may be used. Processor 302 and main memory 304 connects to PCI local bus 306 through PCI Bridge 308. PCI Bridge 308 also may include an integrated memory controller and cache memory for processor 302. Additional connections to PCI local bus 306 may be made through direct component interconnection or through add-in boards. In the depicted example, local area network (LAN) adapter 310, small computer system interface (SCSI) host bus adapter 312, and expansion bus interface 314 connect to PCI local bus 306 by direct component connection. In contrast, audio adapter 316, graphics adapter 318, and audio/video adapter 319 connect to PCI local bus 306 by add-in boards inserted into expansion slots. Expansion bus interface 314 connects to a keyboard and mouse adapter 320, modem 322, and additional memory 324. SCSI host bus adapter 312 connects to hard disk drive 326, tape drive 328, and CD-ROM drive 330.
  • An operating system runs on processor 302 and is used to coordinate and provide control of various components within data processing system 300 in FIG. 3. The operating system may be a commercially available operating system, such as Windows XP, which is available from Microsoft Corporation. Applications or programs are located on storage devices, such as hard disk drive 326, and may be loaded into main memory 304 for execution by processor 302.
  • Those of ordinary skill in the art will appreciate that the hardware in FIG. 3 may vary depending on the implementation. Other internal hardware or peripheral devices, such as flash read-only memory (ROM), equivalent nonvolatile memory, or optical disk drives and the like, may be used in addition to or in place of the hardware depicted in FIG. 3. Also, the processes of the present invention may be applied to a multiprocessor data processing system.
  • The depicted example in FIG. 3 and above-described examples are not meant to imply architectural limitations. For example, data processing system 300 also may be a notebook computer or hand held computer in addition to taking the form of a PDA. Data processing system 300 also may be a kiosk or a Web appliance.
  • FIG. 4 is a diagram of a transmission control protocol/Internet protocol (TCP/IP) and similar protocols in accordance with a preferred embodiment of the present invention. TCP/IP and similar protocols are utilized by communications architecture 400. In this example, communications architecture 400 is a 4-layer system. This architecture includes application layer 402, transport layer 404, network layer 406, and link layer 408. Each layer is responsible for handling various communications tasks. Link layer 408 also is referred to as the data-link layer or the network interface layer and normally includes the device driver in the operating system and the corresponding network interface card in the computer. This layer handles all the hardware details of physically interfacing with the network media being used, such as optical cables or Ethernet cables.
  • Network layer 406 also is referred to as the Internet layer and handles the movement of packets of data around the network. For example, network layer 406 handles the routing of various packets of data that are transferred over the network. Network layer 406 in the TCP/IP suite is comprised of several protocols, including Internet protocol (IP), Internet control message protocol (ICMP), and Internet group management protocol (IGMP).
  • Next, transport layer 404 provides an interface between network layer 406 and application layer 402 that facilitates the transfer of data between two host computers. Transport layer 404 is concerned with things such as, for example, dividing the data passed to it from the application into appropriately sized chunks for the network layer below, acknowledging received packets, and setting timeouts to make certain the other end acknowledges packets that are sent. In the TCP/IP protocol suite, two distinctly different transport protocols are present, TCP and User datagram protocol (UDP). TCP provides reliability services to ensure that data is properly transmitted between two hosts, including dropout detection and retransmission services.
  • Conversely, UDP provides a much simpler service to the application layer by merely sending packets of data called datagrams from one host to the other, without providing any mechanism for guaranteeing that the data is properly transferred. When using UDP, the application layer must perform the reliability functionality.
  • Application layer 402 handles the details of the particular application. Many common TCP/IP applications are present for almost every implementation, including a Telnet for remote login; a file transfer protocol (FTP); a simple mail transfer protocol (SMTP) for electronic mail; and a simple network management protocol (SNMP).
  • The mechanism of the present invention may be more specifically implemented in a layer, such as transport layer 404 or network layer 406 in these examples. This layer examines requests received in inbound traffic and determines whether the request should be relayed in outbound traffic in an encrypted or unencrypted form. In these illustrative examples, a request contains a fully qualified universal resource locator (URL). A fully qualified URL contains a host name, as well as, the context. An example of a fully qualified URL is www.ibm.com/tech. The host name is “ibm.com”, while the context is “tech” in this illustrative example. Depending on the particular implementation, the request may contain just the host name, rather than a fully qualified URL.
  • FIG. 5 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention. In this example, traffic 500 is sent between client process 502 and routing process 504. Traffic 500 may be unencrypted traffic or encrypted traffic. Client process 502 may be, for example, a browser executing on a client, such as client 112 in FIG. 1. Routing process 504 may be, for example, a process running on a device, such as network appliance 106 in FIG. 1. More specifically, routing process 504 may be located in transport layer 404 or network layer 406 in FIG. 4. In this illustrative example, routing process 504 routes traffic for a single port. This port may be a logical port or a physical port.
  • Routing process 504 employs URI table 506 to determine whether inbound traffic from client process 502 is to be sent as encrypted traffic 508, or unencrypted traffic 510 to server process 512. In this example, URI table 506 is a table of URLs. Of course, URI table 506 may take other form depending on the particular implementation. For example, URI table 506 may contain universal resource names (URNs) instead of URLs. URNs use regular words that are protocol and location independent. URNs provide a higher level of abstraction. URNs are persistent (never change) and require a resolution service similar to the domain name system (DNS) to convert names into real addresses. Further, URI table 506 may contain multiple types of URIs, such as URLs and URNs.
  • When traffic 500 takes the form of incoming traffic such as a request from a client to a server, routing process 504 identifies the URL in the request. Routing process 504 compares this URL with URLs in URI table 506 to determine whether a match is present. In this example, a match indicates that the outbound traffic from routing process 504 to server process 512 should take the form of encrypted traffic 508. In other words, if the request in traffic 500 is unencrypted, routing process 504 encrypts the request. Determining whether traffic 500 is encrypted may be performed using a number of different mechanisms. For example, if traffic 500 is using an SSL connection that is received at the port typically used for this type of connection, the traffic coming through that port is identified as being encrypted. As another example, header information in traffic 500 may be examined by routing process 504 to determine whether traffic 500 is encrypted. In some cases, encryption protocols include information in headers in the traffic that may be used to determine whether the traffic is encrypted. Further, particular ports may be identified ahead of time as ports that will be used for encrypted traffic.
  • If the request was received in an encrypted form, routing process 504 routes the request to server process 512 in the encrypted form. The connection for this request is recorded in encrypted connection table 514.
  • In these illustrative examples, the encryption takes the form of SSL. Although SSL is used in these examples, other types of security protocol may be used to encrypt traffic to form encrypted traffic 508. For example, secure hypertext transfer protocol (SHTTP) or IP Security Protocol (IPSEC) may be used as the security protocol for encrypting traffic.
  • On the other hand, if the URL is not found in URI table 506, encryption of the request is not necessary. Routing process 504 sends the request in an unencrypted form as unencrypted traffic 510 to server process 512.
  • When routing process 504 receives incoming traffic from server process 512, routing process 504 identifies existing connection information for this traffic if the incoming traffic is in an unencrypted form such as unencrypted traffic 510. This incoming traffic may be, for example, a response to the request. Routing process 504 compares the connection with existing connections recorded in encrypted connection table 514. If the connection is located within this table, routing process 504 encrypts the unencrypted response and returns this response to client 502 in traffic 500. In this example, the client has sent a request in an encrypted form and routing process 504 returns the response in traffic 500 to client 502 in the same form. However, depending on the particular implementation, the response could be returned in an unencrypted form. In this manner, the mechanism of the present invention allows for selectively encrypting traffic passing through a port in a network appliance.
  • FIG. 6 is a diagram of components used in selectively encrypting traffic flowing through a port in accordance with a preferred embodiment of the present invention. In this illustrative example, traffic is sent between client 602 and server 604, in examining this traffic between these two nodes, the traffic flows through router 606, routing process 608, router 610, routing process 612, and router 614. Routing process 608 and routing process 612 along with router 610 are located within network 600. Network 600 may be, for example, a wider remote network or a local area network. Routing process 608 and routing process 612 contain the processes of the present invention in these illustrative examples. These components contain processes similar to those found in routing process 404 in FIG. 4.
  • In a network flow, the routes between routing processes 608 and 612 could flow over a third-party network commonly known as a Wide Area Network (WAN). These routing processes, in this example, are located in routers within network 600. Wide Area Networks typically interconnect distant divisions of the same organization with locations in various cities around the world. WANs are typically provided by third-party organizations. The third-party provider controls the connections and routes within the WAN. In most cases, the network traffic for each of the third-party provider customers is isolated on different links. However, the network traffic flowing through the WAN is visible to anyone working within the third-party provider WAN. In these cases, the organization using the WAN has no control over who can see the network traffic flowing between routing processes 608 and 612.
  • The traffic from client 602 to routing process 608 can flow unencrypted because this traffic is on the internal LAN. In order to protect information flowing across the WAN, routing process 608 is configured to encrypt certain URLs deemed to contain sensitive information the organization does not want exposed to the WAN provider. Routing process 612 may exchange traffic with server 604 in either an encrypted or unencrypted form depending on the network configuration. For example, if server 604 is on an internal LAN, routing process 612 does not have to encrypt those URI's. Therefore, routing process 612 does not necessarily have the same configuration as routing process 608.
  • On the reverse network flow from server 604, routing process 612 compares the responses connection (see FIG. 9) and either encrypts or does not encrypt the response traffic on existing connections back to routing process 608. Routing process 608 networks traffic back to client 602. Client 602 is sent traffic based on the existing encrypted or unencrypted connections.
  • FIG. 7 is a diagram of an entry in a URI table in accordance with a preferred embodiment of the present invention. In this example, entry 700 is an entry found in a table, such as URI table 506 in FIG. 5. Entry 700 contains indicator 702 and a URL that contains host name 704 and context 706. In this illustrative example, the URL is a qualified URL. Indicator 702 is used to identify the URL in entry 700 as one that requires encryption.
  • FIG. 8 is a diagram of an entry in an encrypted connection table in accordance with a preferred embodiment of the present invention. Entry 800 is an example of an entry in an encrypted connection table, such as encrypted connection table 514 in FIG. 5. In this example, entry 800 contains a connection identifier. As used in these examples, a connection identifier may include any information that uniquely identifies the connection. For example, this information may include an end point IP address, a port identifier, and a processor thread that receives the connection in the network appliance. Of course, other information also may be used in the connection identifier.
  • FIG. 9 is a flowchart of a process for selectively encrypting traffic received from a client in accordance with a preferred embodiment of the present invention. The process illustrated in FIG. 9 may be implemented in a process, such as routing process 504 in FIG. 5.
  • The process begins by determining whether an encrypted connection has been established (step 900). If an encrypted connection is not present, a determination is made as to whether the request should be encrypted by comparing the URL to a table, such as URI table 506 in FIG. 5 (step 902). If the request is not to be encrypted, the process sends the request in an unencrypted form (step 904) with the process terminating thereafter.
  • Turning back to step 900, if an encrypted connection is present, the process records the encrypted connection in the table (step 906) with the process proceeding to step 902 to compare the URL to the table to encrypt. In step 906, the information for this request is recorded such that additional traffic on this connection remains encrypted.
  • Turning back now to step 902, if the request is to be sent in encrypted form, the process sends the request in this form (step 908) with the process terminating thereafter.
  • FIG. 10 is a flowchart of a process for selectively encrypting traffic received from a server in accordance with a preferred embodiment of the present invention. The process illustrated in FIG. 10 may be implemented in a process, such as routing process 504 in FIG. 5.
  • The process begins by receiving a response from a server (step 1000). The connection for this response is compared to a table of encrypted connections (step 1002). This table may be, for example, encrypted connection table 514 in FIG. 5. Next, a determination is made as to whether the original connection was encrypted (step 1004). This determination is used to ensure that responses returned to a client are returned in the same form as received from the client. For example, if the original connection was encrypted, all responses are returned in an encrypted form. This particular process does not rely on the URI. If the original connection was encrypted, the process sends a response in encrypted form (step 1006), with the process terminating thereafter.
  • With reference again to step 1004, if the original connection was not encrypted, the process sends the response in unencrypted form (step 1008), thus ending the process.
  • Thus, the present invention provides an improved method, apparatus, and computer instructions for selectively encrypting traffic. The mechanism of the present invention allows for both encrypted and unencrypted traffic to pass through the same port. This mechanism compares the URI in incoming traffic, such as a request from a client, to a set of URIs. If a match is present, the request is sent in the outbound traffic to a server in an encrypted form. If a match is absent, the traffic is sent in an unencrypted form. In this manner, the amount of capital expenditures and management of resources is reduced by decreasing the number of paths needed to route encrypted and unencrypted traffic as compared to currently available routing systems in network appliances.
  • It is important to note that while the present invention has been described in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer readable medium of instructions and a variety of forms and that the present invention applies equally regardless of the particular type of signal bearing media actually used to carry out the distribution. Examples of computer readable media include recordable-type media, such as a floppy disk, a hard disk drive, a RAM, CD-ROMs, DVD-ROMs, and transmission-type media, such as digital and analog communications links, wired or wireless communications links using transmission forms, such as, for example, radio frequency and light wave transmissions. The computer readable media may take the form of coded formats that are decoded for actual use in a particular data processing system.
  • The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (19)

1. A method in a data processing system for processing outbound traffic passing through a port, the method comprising:
receiving a request from a client for a server at the port, wherein the request includes a universal resource identifier to a destination;
determining whether the request requires encryption using the universal resource identifier in the request; and
responsive to a determination that the request requires encryption, sending the request through the port to the destination in an encrypted form.
2. The method of claim 1 further comprising:
receiving a response from the source for routing to a requesting client;
determining whether the original request for the response was in the encrypted form; and
responsive to a determination that the original request for the response was in the encrypted form, sending the response the requesting client in the encrypted form.
3. The method of claim 1, wherein the determining step comprises:
comparing the universal resource identifier in the request to a set of universal resource identifiers; and
responsive to a match between the universal resource identifier in the request to a particular universal resource identifier in the set of universal resource identifiers, identifying the response as requiring encryption.
4. The method of claim 2 further comprising:
responsive to sending the request to the destination in the encrypted form, recording a connection for the request in a set of connections.
5. The method of claim 4, wherein the determining step comprises:
identifying the connection for the response; and
identifying original response as being in the encrypted form if the connection is in the set of connections.
6. The method of claim 1, wherein the universal resource identifier is a universal resource locator.
7. The method of claim 3, wherein the set of universal resource identifiers is located in a table.
8. The method of claim 1, wherein the method is located in a network appliance.
9. A data processing system for processing outbound traffic passing through a port, the data processing system comprising:
receiving means for receiving a request from a client for a server at the port, wherein the request includes a universal resource identifier to a destination;
determining means for determining whether the request requires encryption using the universal resource identifier in the request; and
sending means, responsive to a determination that the request requires encryption, for sending the request through the port to the destination in an encrypted form.
10. The data processing system of claim 9, wherein the receiving means is a first receiving means, the determining means is a first determining means, and the sending means is a first sending means and further comprising:
second receiving means for receiving a response from the source for routing to a requesting client;
second determining means for determining whether the original request for the response was in the encrypted form; and
second sending means, responsive to a determination that the original request for the response was in the encrypted form, for sending the response the requesting client in the encrypted form.
11. The data processing system of claim 9, wherein the determining means comprises:
comparing means for comparing the universal resource identifier in the request to a set of universal resource identifiers; and
identifying means, responsive to a match between the universal resource identifier in the request to a particular universal resource identifier in the set of universal resource identifiers, for identifying the response as requiring encryption.
12. The data processing system of claim 10 further comprising:
recording means, responsive to sending the request to the destination in the encrypted form, for recording a connection for the request in a set of connections.
13. The data processing system of claim 12, wherein the second determining means comprises:
first means for identifying the connection for the response; and
second means for identifying original response as being in the encrypted form if the connection is in the set of connections.
14. A computer program product in a computer readable medium for processing outbound traffic passing through a port, the computer program product comprising:
first instructions for receiving a request from a client for a server at the port, wherein the request includes a universal resource identifier to a destination;
second instructions for determining whether the request requires encryption using the universal resource identifier in the request; and
third instructions, responsive to a determination that the request requires encryption, for sending the request through the port to the destination in an encrypted form.
15. The computer program product of claim 14 further comprising:
fourth instructions for receiving a response from the source for routing to a requesting client;
fifth instructions for determining whether the original request for the response was in the encrypted form; and
sixth instructions, responsive to a determination that the original request for the response was in the encrypted form, for sending the response the requesting client in the encrypted form.
16. The computer program product of claim 14, wherein the second instructions comprises:
first sub instructions for comparing the universal resource identifier in the request to a set of universal resource identifiers; and
second sub instructions, responsive to a match between the universal resource identifier in the request to a particular universal resource identifier in the set of universal resource identifiers, for identifying the response as requiring encryption.
17. The computer program product of claim 15 further comprising:
seventh instructions, responsive to sending the request to the destination in the encrypted form, for recording a connection for the request in a set of connections.
18. The computer program product of claim 17, wherein the fifth instructions comprises:
first sub instructions for identifying the connection for the response; and
second sub instructions for identifying original response as being in the encrypted form if the connection is in the set of connections.
19. The computer program product of claim 14 wherein the universal resource identifier is a universal resource locator.
US11/109,099 2005-04-19 2005-04-19 Method and apparatus for determining whether to encrypt outbound traffic Abandoned US20060236124A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/109,099 US20060236124A1 (en) 2005-04-19 2005-04-19 Method and apparatus for determining whether to encrypt outbound traffic
US12/137,946 US8478985B2 (en) 2005-04-19 2008-06-12 Determining whether to encrypt outbound traffic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/109,099 US20060236124A1 (en) 2005-04-19 2005-04-19 Method and apparatus for determining whether to encrypt outbound traffic

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/137,946 Continuation US8478985B2 (en) 2005-04-19 2008-06-12 Determining whether to encrypt outbound traffic

Publications (1)

Publication Number Publication Date
US20060236124A1 true US20060236124A1 (en) 2006-10-19

Family

ID=37109953

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/109,099 Abandoned US20060236124A1 (en) 2005-04-19 2005-04-19 Method and apparatus for determining whether to encrypt outbound traffic
US12/137,946 Expired - Fee Related US8478985B2 (en) 2005-04-19 2008-06-12 Determining whether to encrypt outbound traffic

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/137,946 Expired - Fee Related US8478985B2 (en) 2005-04-19 2008-06-12 Determining whether to encrypt outbound traffic

Country Status (1)

Country Link
US (2) US20060236124A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070160200A1 (en) * 2004-01-14 2007-07-12 Nec Corporation Encryption communication system
US20080025310A1 (en) * 2006-07-31 2008-01-31 Fujitsu Limited Data relaying apparatus, data relaying method, and computer product
US20100011206A1 (en) * 2008-07-14 2010-01-14 Ricoh Company, Ltd. Embedded apparatus, remote-processing method, and computer program product
US20120166343A1 (en) * 2010-12-22 2012-06-28 Giovanni Carapelli Fuel dispensing payment system for secure evaluation of cardholder data
WO2012112820A2 (en) * 2011-02-16 2012-08-23 Medicity, Inc. Sending healthcare information securely
US20160197886A1 (en) * 2015-01-07 2016-07-07 Anchorfree Inc. Secure personal server system and method
CN108055230A (en) * 2017-10-19 2018-05-18 福建中金在线信息科技有限公司 The method and apparatus of data request processing

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429715B2 (en) * 2008-08-08 2013-04-23 Microsoft Corporation Secure resource name resolution using a cache

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5086469A (en) * 1990-06-29 1992-02-04 Digital Equipment Corporation Encryption with selective disclosure of protocol identifiers
US5228083A (en) * 1991-06-28 1993-07-13 Digital Equipment Corporation Cryptographic processing in a communication network, using a single cryptographic engine
US5548646A (en) * 1994-09-15 1996-08-20 Sun Microsystems, Inc. System for signatureless transmission and reception of data packets between computer networks
US5835726A (en) * 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5978918A (en) * 1997-01-17 1999-11-02 Secure.Net Corporation Security process for public networks
US20010034792A1 (en) * 2000-03-10 2001-10-25 Swildens Eric Sven-Johan Decrypting load balancing array system
US20020048269A1 (en) * 2000-08-04 2002-04-25 Hong Jack L. Intelligent demand driven recognition of URL objects in connection oriented transactions
US6708218B1 (en) * 2000-06-05 2004-03-16 International Business Machines Corporation IpSec performance enhancement using a hardware-based parallel process

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3688830B2 (en) * 1995-11-30 2005-08-31 株式会社東芝 Packet transfer method and packet processing apparatus
US6182226B1 (en) * 1998-03-18 2001-01-30 Secure Computing Corporation System and method for controlling interactions between networks
US20020129243A1 (en) * 2001-03-08 2002-09-12 Viswanath Nanjundiah System for selective encryption of data packets
US7181506B1 (en) * 2001-04-06 2007-02-20 Mcafee, Inc. System and method to securely confirm performance of task by a peer in a peer-to-peer network environment
NZ531861A (en) * 2001-09-20 2006-02-24 Hitwise Pty Ltd Method and system for characterization of online behavior
US7362780B2 (en) * 2002-12-11 2008-04-22 Nokia Corporation Avoiding compression of encrypted payload

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5086469A (en) * 1990-06-29 1992-02-04 Digital Equipment Corporation Encryption with selective disclosure of protocol identifiers
US5228083A (en) * 1991-06-28 1993-07-13 Digital Equipment Corporation Cryptographic processing in a communication network, using a single cryptographic engine
US5835726A (en) * 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5548646A (en) * 1994-09-15 1996-08-20 Sun Microsystems, Inc. System for signatureless transmission and reception of data packets between computer networks
US5978918A (en) * 1997-01-17 1999-11-02 Secure.Net Corporation Security process for public networks
US20010034792A1 (en) * 2000-03-10 2001-10-25 Swildens Eric Sven-Johan Decrypting load balancing array system
US6708218B1 (en) * 2000-06-05 2004-03-16 International Business Machines Corporation IpSec performance enhancement using a hardware-based parallel process
US20020048269A1 (en) * 2000-08-04 2002-04-25 Hong Jack L. Intelligent demand driven recognition of URL objects in connection oriented transactions

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8356169B2 (en) * 2004-01-14 2013-01-15 Nec Corporation Encryption communication system, apparatus and method for allowing direct encryption communication with a plurality of nodes
US20070160200A1 (en) * 2004-01-14 2007-07-12 Nec Corporation Encryption communication system
US20080025310A1 (en) * 2006-07-31 2008-01-31 Fujitsu Limited Data relaying apparatus, data relaying method, and computer product
US20100011206A1 (en) * 2008-07-14 2010-01-14 Ricoh Company, Ltd. Embedded apparatus, remote-processing method, and computer program product
US8966244B2 (en) * 2008-07-14 2015-02-24 Ricoh Company, Ltd. Embedded apparatus, remote-processing method, and computer program product
US9262760B2 (en) * 2010-12-22 2016-02-16 Gilbarco Inc. Fuel dispensing payment system for secure evaluation of cardholder data
US20120166343A1 (en) * 2010-12-22 2012-06-28 Giovanni Carapelli Fuel dispensing payment system for secure evaluation of cardholder data
US10657524B2 (en) 2010-12-22 2020-05-19 Gilbarco Inc. Fuel dispensing payment system for secure evaluation of cardholder data
WO2012112820A3 (en) * 2011-02-16 2014-04-24 Medicity, Inc. Sending healthcare information securely
WO2012112820A2 (en) * 2011-02-16 2012-08-23 Medicity, Inc. Sending healthcare information securely
US20160197886A1 (en) * 2015-01-07 2016-07-07 Anchorfree Inc. Secure personal server system and method
US9942204B2 (en) * 2015-01-07 2018-04-10 Anchorfree Inc. Secure personal server system and method
CN108055230A (en) * 2017-10-19 2018-05-18 福建中金在线信息科技有限公司 The method and apparatus of data request processing

Also Published As

Publication number Publication date
US8478985B2 (en) 2013-07-02
US20080240436A1 (en) 2008-10-02

Similar Documents

Publication Publication Date Title
US8478985B2 (en) Determining whether to encrypt outbound traffic
US9860251B2 (en) Dynamic encryption of a universal resource locator
US7269848B2 (en) Method and system for access to development environment of another in a secure zone
US7003565B2 (en) Clickstream data collection technique
US7657737B2 (en) Method for mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server
Rose et al. Current technological impediments to business-to-consumer electronic commerce
US7596607B2 (en) Apparatus for managing email messages
US6671723B2 (en) Method and apparatus for scanning a web site in a distributed data processing system for problem determination
US20080034036A1 (en) Proxy server apparatus and method for providing service using the same
CN101753606A (en) Method for realizing WEB reverse proxy
EP0858201A2 (en) Method and apparatus for allowing secure transactions through a firewall
US20020103878A1 (en) System for automated configuration of access to the internet
US6950873B2 (en) Apparatus and method for port sharing a plurality of server processes
US20080228874A1 (en) Method and Apparatus for Collocating Application Monitoring Reports with Web Applications
US20040003113A1 (en) Apparatus, system and method of double-checking DNS provided IP addresses
US9300677B2 (en) Data security system
US7421576B1 (en) Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes
US6968356B1 (en) Method and apparatus for transferring data between a client and a host across a firewall
US7769766B1 (en) Method and an apparatus to store content rating information
JP2004046681A (en) Content output system, relay server for request to output content, and content output device
US6938088B1 (en) Method and system for caching HTTP data transported with socks data in IP datagrams
US20060107324A1 (en) Method to prevent denial of service attack on persistent TCP connections
US20030236997A1 (en) Secure network agent
US12132807B2 (en) Third party gateway
US20230403345A1 (en) Third party gateway

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POLOZOFF, ALEXANDRE;BHOGAL, KULVIR SINGH;REEL/FRAME:016201/0472;SIGNING DATES FROM 20050413 TO 20050414

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION