Negotiating secure connections through a proxy server

    公开(公告)号:US20060101510A1

    公开(公告)日:2006-05-11

    申请号:US11305600

    申请日:2005-12-16

    IPC分类号: G06F15/16

    摘要: Methods, systems, and computer program products for negotiating a secure end-to-end connection using a proxy server as an intermediary. The client first negotiates a secure connection between the client and the proxy so that any credentials exchanged will be encrypted. After the exchange of authentication credentials, the secure client-proxy connection is altered so that no further encryption takes place. The client and server then negotiate a secure end-to-end connection through the proxy, with the secure end-to-end connection being encapsulated within the insecure client-proxy connection. In this way, the overhead of creating a separate client-proxy connection for the secure end-to-end connection may be avoided, but the insecure client-proxy connection introduces only minimal overhead because it no longer encrypts any data that it carries.

    Accounting for update notification in synchronizing data that may be represented by different data structures
    2.
    发明申请
    Accounting for update notification in synchronizing data that may be represented by different data structures 有权
    计算可能由不同数据结构表示的同步数据中的更新通知

    公开(公告)号:US20050060355A1

    公开(公告)日:2005-03-17

    申请号:US10958723

    申请日:2004-10-05

    摘要: Methods, systems, and computer program products for synchronizing data stored at one or more message clients with data stored at a message server where the message clients may receive update notifications and may represent the data using different data structures than the message server uses to represent the same data. A token is associated with each data change that occurs at the message server. The message server sends each change and associated token to the message clients. When the message clients request a synchronization, the tokens they received are returned to the message server for comparison with the tokens the message server sent to the message clients. If the message clients do not return a particular token, the message server determines that the clients did not receive the corresponding change and resends the change to the message clients. Tokens may also be used to divide a change into one or more portions, with only one portion being provided initially. Then, in response to receiving the token associated with the portion, the message server may provide the remaining portion of the message to the message clients.

    摘要翻译: 用于将存储在一个或多个消息客户端的数据与存储在消息服务器上的数据同步的方法,系统和计算机程序产品,其中消息客户端可以接收更新通知,并且可以使用不同于消息服务器用于表示 相同的数据。 令牌与消息服务器上发生的每个数据更改相关联。 消息服务器向消息客户端发送每个更改和关联的令牌。 当消息客户端请求同步时,他们收到的令牌将返回到消息服务器,以便与消息服务器发送到消息客户端的令牌进行比较。 如果消息客户端不返回特定令牌,则消息服务器确定客户端没有收到相应的更改,并将更改重新发送给消息客户端。 还可以使用令牌将改变分成一个或多个部分,其中最初仅提供一个部分。 然后,响应于接收到与该部分相关联的令牌,消息服务器可以向消息客户端提供消息的剩余部分。

    Using an expert proxy server as an agent for wireless devices
    4.
    发明申请
    Using an expert proxy server as an agent for wireless devices 有权
    使用专家代理服务器作为无线设备的代理

    公开(公告)号:US20050160140A1

    公开(公告)日:2005-07-21

    申请号:US11059860

    申请日:2005-02-17

    IPC分类号: H04L12/28 H04L29/08 G06F15/16

    摘要: An expert proxy server is described that is coupled to a number of wireless devices through a wireless network, and to a number of server computer systems through an external network such as, for example, the Internet. The expert proxy server acts as an agent for a wireless device by providing a service for the wireless device. Specifically, the expert proxy server determines that a service is to be provided to the wireless device. Next, the expert proxy server identifies an application that provides the service and then communicates with the identified application that provides the service. The expert proxy server compiles the results of the communication with the application and then transmits the compilation to the wireless device over the wireless network. Thus, the relatively smaller bandwidth of the wireless network is preserved by transmitting a minimal amount of information over the wireless network while leaving more extensive communications to occur over higher bandwidth external networks. Also, since the extensive processing occurs at the expert proxy server rather than at the wireless device, the application on the wireless device may be simplified and smaller as compared to the supporting applications on the expert proxy server thereby preserving the limited memory and processing capability of the wireless device.

    摘要翻译: 描述了通过无线网络耦合到多个无线设备的专家代理服务器,以及通过诸如因特网的外部网络到多个服务器计算机系统。 专家代理服务器通过为无线设备提供服务来充当无线设备的代理。 具体来说,专家代理服务器确定要向无线设备提供服务。 接下来,专家代理服务器识别提供服务的应用,然后与提供服务的所识别的应用进行通信。 专家代理服务器编译与应用程序通信的结果,然后通过无线网络将编译发送到无线设备。 因此,无线网络的相对较小的带宽通过在无线网络上传送最少量的信息而保留,同时使更广泛的通信在较高带宽的外部网络上发生。 此外,由于广泛的处理发生在专家代理服务器而不是在无线设备处,所以与专家代理服务器上的支持应用相比,无线设备上的应用可以被简化和更小,从而保持有限的存储器和处理能力 无线设备。

    Caching transformed content in a mobile gateway
    6.
    发明授权
    Caching transformed content in a mobile gateway 有权
    在移动网关中缓存变换的内容

    公开(公告)号:US06871236B2

    公开(公告)日:2005-03-22

    申请号:US09771184

    申请日:2001-01-26

    IPC分类号: H04L29/06 H04L29/08 G06F15/16

    摘要: Methods, systems, and computer program products for caching content that has been customized based on one or more operating characteristics of a mobile client. A mobile gateway receives content from a content source and customizes the content using transforms assigned to each mobile client. Transforms account for differences between mobile clients without imposing significant processing burdens on the content server. Copies of the content, the transformed content, and a transform identifier are cached at the mobile gateway so that subsequent requests for the content may be satisfied without requiring access to the content source. Processing that is common among several transforms may be shared. Mobile clients may be any type of computer.

    摘要翻译: 用于缓存基于移动客户端的一个或多个操作特征定制的内容的方法,系统和计算机程序产品。 移动网关从内容源接收内容,并使用分配给每个移动客户端的转换来定制内容。 转换占用移动客户端之间的差异,而不会对内容服务器造成重大的处理负担。 内容,转换的内容和转换标识符的副本被缓存在移动网关处,使得对内容的后续请求可以被满足,而不需要访问内容源。 可以共享几个变换中常见的处理。 移动客户端可能是任何类型的计算机。

    Pushing Rich Content Information to Mobile Devices
    8.
    发明申请
    Pushing Rich Content Information to Mobile Devices 有权
    将丰富的内容信息推送到移动设备

    公开(公告)号:US20070016690A1

    公开(公告)日:2007-01-18

    申请号:US11532768

    申请日:2006-09-18

    IPC分类号: G06F15/173

    摘要: Methods, systems, and computer program products for customizing content based on at least one operating characteristic of a mobile client. A mobile gateway receives content from a content source, such as an email server, a Web server, or some other content server. For example, content may include email, calendar, contact, task, Web, notification, financial, sports data, configuration information, etc. The mobile gateway customizes the content based on transforms assigned to each mobile client. Transforms account for differences in the software, display, processor, memory, communication channel, and the like, of each mobile client, without imposing additional processing burdens on the content server. Processing that is common among several transforms may be shared. Mobile clients may be any type of computer, including telephones, pagers, PDAs, laptops, and other mobile gateways.

    摘要翻译: 用于基于移动客户端的至少一个操作特征定制内容的方法,系统和计算机程序产品。 移动网关从诸如电子邮件服务器,Web服务器或其他内容服务器的内容源接收内容。 例如,内容可以包括电子邮件,日历,联系人,任务,网络,通知,财务,体育数据,配置信息等。移动网关基于分配给每个移动客户端的转换来定制内容。 对每个移动客户端的软件,显示器,处理器,存储器,通信信道等的差异进行变换,而不会对内容服务器造成额外的处理负担。 可以共享几个变换中常见的处理。 移动客户端可以是任何类型的计算机,包括电话,寻呼机,PDA,膝上型计算机和其他移动网关。

    Latency free scanning of malware at a network transit point
    9.
    发明申请
    Latency free scanning of malware at a network transit point 有权
    在网络转接点,不间断地扫描恶意软件

    公开(公告)号:US20060224724A1

    公开(公告)日:2006-10-05

    申请号:US11097060

    申请日:2005-03-31

    IPC分类号: G06F15/173

    摘要: In accordance with the present invention, a system, method, and computer-readable medium for identifying malware at a network transit point such as a computer that serves as a gateway to an internal or private network is provided. A network transmission is scanned for malware at a network transit point without introducing additional latency to the transmission of data over the network. In accordance with one aspect of the present invention, a computer-implemented method for identifying malware at a network transit point is provided. More specifically, when a packet in a transmission is received at the network transit point, the packet is immediately forwarded to the target computer. Simultaneously, the packet and other data in the transmission are scanned for malware by an antivirus engine. If malware is identified in the transmission, the target computer is notified that the transmission contains malware.

    摘要翻译: 根据本发明,提供了一种系统,方法和计算机可读介质,用于在诸如用作内部或专用网络的网关的计算机之类的网络转接点处识别恶意软件。 在网络传输点扫描网络传输恶意软件,而不会对网络上的数据传输造成额外的延迟。 根据本发明的一个方面,提供了一种用于在网络中转点识别恶意软件的计算机实现的方法。 更具体地,当在网络转接点接收到传输中的分组时,该分组立即被转发到目标计算机。 同时,传输中的数据包和其他数据由防病毒引擎扫描恶意软件。 如果在传输中识别到恶意软件,则通知目标计算机该传输包含恶意软件。

    Optimizing malware recovery
    10.
    发明申请
    Optimizing malware recovery 审中-公开
    优化恶意软件恢复

    公开(公告)号:US20070006304A1

    公开(公告)日:2007-01-04

    申请号:US11172373

    申请日:2005-06-30

    IPC分类号: G06F12/14

    摘要: Malware recovery optimization is provided in which malware detection processes and protocol processes on a device are monitored for events indicating a breach of security of the device, such as the presence of an infection or other evidence of a malware attack. The devices report the events for collection on a centralized event collector that issues alerts of the events to other devices that may have been compromised as a result of the breach of security. Upon receipt of the alert, the receiving devices may initiate malware recovery optimization, including activating anti-virus software to initiate a targeted scan of those resources that may have been compromised. In this manner, malware recovery processes are optimized to recover the receiving device and/or resources when indicated.

    摘要翻译: 提供了恶意软件恢复优化,其中监视设备上的恶意软件检测过程和协议进程,以指示违反设备安全性的事件,例如是否存在感染或其他恶意软件攻击证据。 这些设备会报告在集中式事件收集器上收集的事件,从而将事件的警报发送到可能由于违反安全性而受到威胁的其他设备。 在接收到警报之后,接收设备可以启动恶意软件恢复优化,包括激活防病毒软件以对可能已经被泄露的那些资源进行有针对性的扫描。 以这种方式,恶意软件恢复过程被优化以在指示时恢复接收设备和/或资源。