CA2353623A1 - A system and method for selective anonymous access to a network - Google Patents
A system and method for selective anonymous access to a network Download PDFInfo
- Publication number
- CA2353623A1 CA2353623A1 CA002353623A CA2353623A CA2353623A1 CA 2353623 A1 CA2353623 A1 CA 2353623A1 CA 002353623 A CA002353623 A CA 002353623A CA 2353623 A CA2353623 A CA 2353623A CA 2353623 A1 CA2353623 A1 CA 2353623A1
- Authority
- CA
- Canada
- Prior art keywords
- gateway
- network
- privacy
- component
- users
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Description
A System and Method for Selective Anonymous Access to a Network The present invention provides a system and method for computer network users to access a privacy enhanced network, in a transparent fashion.
Background Current methods for accessing a privacy-enhanced network are either by using a web proxy or by installing software on the user's workstation. Both of these approaches have significant drawbacks.
In the first case, the user is required to make configuration changes to his or her workstation.
In the second, the user is required to download and install software and then configure it.
In a network environment, with a potentially large number of worlcstanon, administrators may be required to invest a substantial amount of work and time to install, manage and maintain this system.
In both cases the user must understand considerably complex notions about how the system works. In addition, both cases have the drawback that administrators are unable 2o to manage its use by users. Finally, both cases are tied to a single privacy network.
There exists a number of similar services which profess to ensure a users' privacy.
Safeweb and Anonymizer are two such services. Both have four significant disadvantages:
1. They are bound to a specific network of servers.
Background Current methods for accessing a privacy-enhanced network are either by using a web proxy or by installing software on the user's workstation. Both of these approaches have significant drawbacks.
In the first case, the user is required to make configuration changes to his or her workstation.
In the second, the user is required to download and install software and then configure it.
In a network environment, with a potentially large number of worlcstanon, administrators may be required to invest a substantial amount of work and time to install, manage and maintain this system.
In both cases the user must understand considerably complex notions about how the system works. In addition, both cases have the drawback that administrators are unable 2o to manage its use by users. Finally, both cases are tied to a single privacy network.
There exists a number of similar services which profess to ensure a users' privacy.
Safeweb and Anonymizer are two such services. Both have four significant disadvantages:
1. They are bound to a specific network of servers.
2. All existing services do not operate transparently. Users must make changes to their browser settings to take advantage.
3. All existing services do not operate at the LAN level. They exist as a service that operates on the Internet. Users must first locate the servers before they can be used.
4. All existing services do not assure privacy. The existing services are able to establish and log the source and destination of each connection.
There is thus a need for a system that addresses all of these issues. Users are not expected to install any software nor reconfigure their workstations. The system should provide a centralized privacy service. At the option of the administrators, the system is 1o either always on or users are provided with a mechanism to activate or de-activate the service at their discretion. Administrators can centrally manage the server, easing the time and work investing to maintain the system. If required, administrators can audit its use. Finally, the system should not be tied to a particular privacy network:
it can provide service for a number of these.
Accordingly, there is a need for a system that enables Network users to easily enroll in these services as the users are not required to make any local workstation changes or to download any software components to enable but are provided with a mechanism to activate or de-activate the privacy service for their workstation.
Summary of the Invention In accordance with this invention there is provided a Gateway for allowing selective anonymous access to a privacy enhanced network, such as the Zero-Knowledge Network. Typically, the Gateway will be installed at the exit point of the network, where it will be able to examine all traffic leaving this network. For the purposes of this discussion, a network may be as large as a major ISP network. Furthermore, the gateway is capable of being configured as a public gateway, wherein any user on the Internet could use the service. Also, the Gateway may be installed on either side of a fire wall Detailed Description of the Preferred Embodiments Ph~'~'~hanaed rraltwo* A
ZK Privacy Gatewa Internet Firewall p ivay anharcd r neltw* B
Client I
Computers Local Area Network Zero-Knowledge Privacy Gateway Environment Figure 1 The Gateway according to an embodiment of the invention is comprised of the following components:
Management ~ ~ User Control ~ ~ Monitoring Proxy Protocol Group Gateway Group Proxyl 1 Gafawrq A
Proxy Z
Gatwray B
P roxy 3 LAN Network Traffic Pr~, G~",~y D~cs6n D~cicbn tan Routing Zaro-KnoWlodg~ Privacy Gat~~ay Caanponants Figure 2 Routing Component Packets entering the Gateway are first supplied to the routing component. Each packet is examined by the routing component to determine if this packet is to be redirected to a Privacy network. The Gateway can serve a number of different Privacy networks.
Packet selection criteria are set by the management and user control components below.
Redirection takes place in two stages.
First, each packet's protocol is extracted. If a protocol proxy has been registered for this protocol, the packets are handed off in a transparent fashion to the protocol proxy component (see below). Once the proxy has completed its processing, the packet is to returned to the routing component where it will pass it on to the appropriate Gateway component.
Packets that do not have a corresponding protocol proxy registered are passed on directly to the Gateway Component.
Returning packets from the Privacy Network are passed first to the gateway component and then to any registered proxy component.
Packets, which do not match the selection criteria, are forwarded, as a regular muter would do. Optionally, packets may be masqueraded (or de-masqueraded in the case of returning packets). This allows administrators flexibility with regard to the installation of the machine.
Protocol Proxy Group The protocol proxy component group represents the collection of protocol proxies that are registered at any given time. Proxies are supplied for any protocol that requires sanitization of the data stream, that is, removal or replacement of identifying information.
As an example, and HTTP proxy would handle the removal of embedded IP
addresses and the replacement of cookies. In addition, this proxy would add a marker to returning HTML pages, indicating that the Gateway has processed this page.
Gateway Component Group The gateway component Group handles all packets to and from the privacy network.
The appropriate protocol proxy has rendered the payload of the packets anonymous. The Gateway component then removes (or replaces, in the case of a returning packet) any TCP/IP or UDP/IP specific information. In addition, the packets are encrypted or decrypted for returning packets.
Each Gateway component within this group is designed and implemented to interface with a specific Privacy network.
1o Management Component T'he management component handles all configuration and management of the Gateway.
This component is used to select, among other things, which protocols will be handled by the gateway, which Privacy network will be serviced, which users are use which Privacy network and which IP addresses are authorised to use the network. It interfaces ~5 with site user authentication mechanisms to establish which IP addresses are used by a user.
User Control Component The User Control Component allows authorized users to activate or de-active the service 2o for them. This can either be through a web-interface on the gateway or a Java application running in a browser window.
Monitoring Component The Monitoring Component interfaces with the various components on the Gateway to 25 report their state.
As may be evident, the gateway has many applications. In some markets or industries, corporations are required to eliminate the potential correlation of an account to the location of the account owner. With the advent of the Internet and the increase usage of web browsers to access online information about specifc accounts, this location can be s compromised by linking the Internet Protocol address assigned to the users workstation and the account number. With the Gateway, users can access anonymously the corporation web site without any installation required on their workstation, protecting therefore their location. The corporation can offer this service to their customers by providing them with the address of the Gateway that will anonymize the IP
traffic before reaching the corporation's servers.
In another example, current VPN products will open an encrypted point-to-point tunnel when a remote connection is made to the corporate LAN. That point to point tunnel will be open with 2 IP addresses (one at each end of the tunnel). The 2 IP
addresses are linked 1o by the tunnel protocol (L2F-L2TP) and will give away the location of the remote user IP
address connection compromising consequently the approximate geographical location (City or states/province, Country). The Gateway solves this problem by routing the VPN
tunnel on a privacy enhanced network. So, when a user initiates an anonymous VPN
connection with their corporate network, he will connect to the Gateway, which anonymizes the request and then from an undetermined exit point of the privacy enhanced network, the VPN tunnel is created. Therefore, for somebody who is monitoring the tunnel at the corporate network, he sees only the exit point of the privacy enhanced network and not the original IP address of the requester.
2o In a still further application, current technologies offer secure e-mails that guarantee that the content of the e-mail is not modified or accessible to users other then the recipients.
However, the identity of the sender and recipients is not protected. The Gateway offers the service of private mail that insures that the e-mail is authenticated and that only the sender and the recipients are aware of their communication. Also, the recipients can reply to the sender without compromising the privacy of their online communication.
Outsiders should not be able to can know that the recipients received e-mails from someone using the Gateway, neither the real identity of the sender. Also, Outsiders should not be able to view the content of the e-mails that are processed by the Gateway.
3o In Summary, the definition of a private e-mail is:
~ Alice is a user behind a Gateway who wants to send an e-mail message to Bob.
~ Bob is the user who should receive Alice's e-mail and be able to reply to it ~ Eve is an external eavesdropper who wants to read the message.
The email is private if Eve cannot read the text of the message, cannot tell that Alice has sent a message to Bob, cannot determine that Bob has received a message from someone using the Gateway.
Thus, it may be seen that the gateway ensures that no single node used to transport its 1o traffic is aware of the source and destination of any connection. In addition, as the gateway resides at the end-user LAN, the LAN administrator has full control over any possible logging that might take place at the gateway.
There is thus a need for a system that addresses all of these issues. Users are not expected to install any software nor reconfigure their workstations. The system should provide a centralized privacy service. At the option of the administrators, the system is 1o either always on or users are provided with a mechanism to activate or de-activate the service at their discretion. Administrators can centrally manage the server, easing the time and work investing to maintain the system. If required, administrators can audit its use. Finally, the system should not be tied to a particular privacy network:
it can provide service for a number of these.
Accordingly, there is a need for a system that enables Network users to easily enroll in these services as the users are not required to make any local workstation changes or to download any software components to enable but are provided with a mechanism to activate or de-activate the privacy service for their workstation.
Summary of the Invention In accordance with this invention there is provided a Gateway for allowing selective anonymous access to a privacy enhanced network, such as the Zero-Knowledge Network. Typically, the Gateway will be installed at the exit point of the network, where it will be able to examine all traffic leaving this network. For the purposes of this discussion, a network may be as large as a major ISP network. Furthermore, the gateway is capable of being configured as a public gateway, wherein any user on the Internet could use the service. Also, the Gateway may be installed on either side of a fire wall Detailed Description of the Preferred Embodiments Ph~'~'~hanaed rraltwo* A
ZK Privacy Gatewa Internet Firewall p ivay anharcd r neltw* B
Client I
Computers Local Area Network Zero-Knowledge Privacy Gateway Environment Figure 1 The Gateway according to an embodiment of the invention is comprised of the following components:
Management ~ ~ User Control ~ ~ Monitoring Proxy Protocol Group Gateway Group Proxyl 1 Gafawrq A
Proxy Z
Gatwray B
P roxy 3 LAN Network Traffic Pr~, G~",~y D~cs6n D~cicbn tan Routing Zaro-KnoWlodg~ Privacy Gat~~ay Caanponants Figure 2 Routing Component Packets entering the Gateway are first supplied to the routing component. Each packet is examined by the routing component to determine if this packet is to be redirected to a Privacy network. The Gateway can serve a number of different Privacy networks.
Packet selection criteria are set by the management and user control components below.
Redirection takes place in two stages.
First, each packet's protocol is extracted. If a protocol proxy has been registered for this protocol, the packets are handed off in a transparent fashion to the protocol proxy component (see below). Once the proxy has completed its processing, the packet is to returned to the routing component where it will pass it on to the appropriate Gateway component.
Packets that do not have a corresponding protocol proxy registered are passed on directly to the Gateway Component.
Returning packets from the Privacy Network are passed first to the gateway component and then to any registered proxy component.
Packets, which do not match the selection criteria, are forwarded, as a regular muter would do. Optionally, packets may be masqueraded (or de-masqueraded in the case of returning packets). This allows administrators flexibility with regard to the installation of the machine.
Protocol Proxy Group The protocol proxy component group represents the collection of protocol proxies that are registered at any given time. Proxies are supplied for any protocol that requires sanitization of the data stream, that is, removal or replacement of identifying information.
As an example, and HTTP proxy would handle the removal of embedded IP
addresses and the replacement of cookies. In addition, this proxy would add a marker to returning HTML pages, indicating that the Gateway has processed this page.
Gateway Component Group The gateway component Group handles all packets to and from the privacy network.
The appropriate protocol proxy has rendered the payload of the packets anonymous. The Gateway component then removes (or replaces, in the case of a returning packet) any TCP/IP or UDP/IP specific information. In addition, the packets are encrypted or decrypted for returning packets.
Each Gateway component within this group is designed and implemented to interface with a specific Privacy network.
1o Management Component T'he management component handles all configuration and management of the Gateway.
This component is used to select, among other things, which protocols will be handled by the gateway, which Privacy network will be serviced, which users are use which Privacy network and which IP addresses are authorised to use the network. It interfaces ~5 with site user authentication mechanisms to establish which IP addresses are used by a user.
User Control Component The User Control Component allows authorized users to activate or de-active the service 2o for them. This can either be through a web-interface on the gateway or a Java application running in a browser window.
Monitoring Component The Monitoring Component interfaces with the various components on the Gateway to 25 report their state.
As may be evident, the gateway has many applications. In some markets or industries, corporations are required to eliminate the potential correlation of an account to the location of the account owner. With the advent of the Internet and the increase usage of web browsers to access online information about specifc accounts, this location can be s compromised by linking the Internet Protocol address assigned to the users workstation and the account number. With the Gateway, users can access anonymously the corporation web site without any installation required on their workstation, protecting therefore their location. The corporation can offer this service to their customers by providing them with the address of the Gateway that will anonymize the IP
traffic before reaching the corporation's servers.
In another example, current VPN products will open an encrypted point-to-point tunnel when a remote connection is made to the corporate LAN. That point to point tunnel will be open with 2 IP addresses (one at each end of the tunnel). The 2 IP
addresses are linked 1o by the tunnel protocol (L2F-L2TP) and will give away the location of the remote user IP
address connection compromising consequently the approximate geographical location (City or states/province, Country). The Gateway solves this problem by routing the VPN
tunnel on a privacy enhanced network. So, when a user initiates an anonymous VPN
connection with their corporate network, he will connect to the Gateway, which anonymizes the request and then from an undetermined exit point of the privacy enhanced network, the VPN tunnel is created. Therefore, for somebody who is monitoring the tunnel at the corporate network, he sees only the exit point of the privacy enhanced network and not the original IP address of the requester.
2o In a still further application, current technologies offer secure e-mails that guarantee that the content of the e-mail is not modified or accessible to users other then the recipients.
However, the identity of the sender and recipients is not protected. The Gateway offers the service of private mail that insures that the e-mail is authenticated and that only the sender and the recipients are aware of their communication. Also, the recipients can reply to the sender without compromising the privacy of their online communication.
Outsiders should not be able to can know that the recipients received e-mails from someone using the Gateway, neither the real identity of the sender. Also, Outsiders should not be able to view the content of the e-mails that are processed by the Gateway.
3o In Summary, the definition of a private e-mail is:
~ Alice is a user behind a Gateway who wants to send an e-mail message to Bob.
~ Bob is the user who should receive Alice's e-mail and be able to reply to it ~ Eve is an external eavesdropper who wants to read the message.
The email is private if Eve cannot read the text of the message, cannot tell that Alice has sent a message to Bob, cannot determine that Bob has received a message from someone using the Gateway.
Thus, it may be seen that the gateway ensures that no single node used to transport its 1o traffic is aware of the source and destination of any connection. In addition, as the gateway resides at the end-user LAN, the LAN administrator has full control over any possible logging that might take place at the gateway.
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002353623A CA2353623A1 (en) | 2001-07-23 | 2001-07-23 | A system and method for selective anonymous access to a network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002353623A CA2353623A1 (en) | 2001-07-23 | 2001-07-23 | A system and method for selective anonymous access to a network |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2353623A1 true CA2353623A1 (en) | 2003-01-23 |
Family
ID=4169536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002353623A Abandoned CA2353623A1 (en) | 2001-07-23 | 2001-07-23 | A system and method for selective anonymous access to a network |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2353623A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11595496B2 (en) | 2013-08-28 | 2023-02-28 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11611607B2 (en) | 2009-10-08 | 2023-03-21 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11657110B2 (en) | 2019-02-25 | 2023-05-23 | Bright Data Ltd. | System and method for URL fetching retry mechanism |
US11711233B2 (en) | 2017-08-28 | 2023-07-25 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11757961B2 (en) | 2015-05-14 | 2023-09-12 | Bright Data Ltd. | System and method for streaming content from multiple servers |
US11902253B2 (en) | 2019-04-02 | 2024-02-13 | Bright Data Ltd. | System and method for managing non-direct URL fetching service |
US12137008B2 (en) | 2023-06-14 | 2024-11-05 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
-
2001
- 2001-07-23 CA CA002353623A patent/CA2353623A1/en not_active Abandoned
Cited By (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11888922B2 (en) | 2009-10-08 | 2024-01-30 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11611607B2 (en) | 2009-10-08 | 2023-03-21 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11616826B2 (en) | 2009-10-08 | 2023-03-28 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11659018B2 (en) | 2009-10-08 | 2023-05-23 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11659017B2 (en) | 2009-10-08 | 2023-05-23 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12107911B2 (en) | 2009-10-08 | 2024-10-01 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11671476B2 (en) | 2009-10-08 | 2023-06-06 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12101372B2 (en) | 2009-10-08 | 2024-09-24 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12095841B2 (en) | 2009-10-08 | 2024-09-17 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12095843B2 (en) | 2009-10-08 | 2024-09-17 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11700295B2 (en) | 2009-10-08 | 2023-07-11 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12095840B2 (en) | 2009-10-08 | 2024-09-17 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12081612B2 (en) | 2009-10-08 | 2024-09-03 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12021916B2 (en) | 2009-10-08 | 2024-06-25 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12021914B2 (en) | 2009-10-08 | 2024-06-25 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12003568B2 (en) | 2009-10-08 | 2024-06-04 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12003569B2 (en) | 2009-10-08 | 2024-06-04 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12003567B2 (en) | 2009-10-08 | 2024-06-04 | Bright Data Ltd. | System providing faster and more efficient data communication |
US12003566B2 (en) | 2009-10-08 | 2024-06-04 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11770435B2 (en) | 2009-10-08 | 2023-09-26 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11962636B2 (en) | 2009-10-08 | 2024-04-16 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11811850B2 (en) | 2009-10-08 | 2023-11-07 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11811848B2 (en) | 2009-10-08 | 2023-11-07 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11811849B2 (en) | 2009-10-08 | 2023-11-07 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11956299B2 (en) | 2009-10-08 | 2024-04-09 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11838119B2 (en) | 2009-10-08 | 2023-12-05 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11949729B2 (en) | 2009-10-08 | 2024-04-02 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11916993B2 (en) | 2009-10-08 | 2024-02-27 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11902351B2 (en) | 2009-10-08 | 2024-02-13 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11876853B2 (en) | 2009-10-08 | 2024-01-16 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11888921B2 (en) | 2009-10-08 | 2024-01-30 | Bright Data Ltd. | System providing faster and more efficient data communication |
US11949756B2 (en) | 2013-08-28 | 2024-04-02 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12010196B2 (en) | 2013-08-28 | 2024-06-11 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11677856B2 (en) | 2013-08-28 | 2023-06-13 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11689639B2 (en) | 2013-08-28 | 2023-06-27 | Bright Data Ltd. | System and method for improving Internet communication by using intermediate nodes |
US12088684B2 (en) | 2013-08-28 | 2024-09-10 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12069148B2 (en) | 2013-08-28 | 2024-08-20 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11902400B2 (en) | 2013-08-28 | 2024-02-13 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11870874B2 (en) | 2013-08-28 | 2024-01-09 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12069150B2 (en) | 2013-08-28 | 2024-08-20 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12021945B2 (en) | 2013-08-28 | 2024-06-25 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11924306B2 (en) | 2013-08-28 | 2024-03-05 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11924307B2 (en) | 2013-08-28 | 2024-03-05 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11838388B2 (en) | 2013-08-28 | 2023-12-05 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11595496B2 (en) | 2013-08-28 | 2023-02-28 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11949755B2 (en) | 2013-08-28 | 2024-04-02 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11838386B2 (en) | 2013-08-28 | 2023-12-05 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11729297B2 (en) | 2013-08-28 | 2023-08-15 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12021944B2 (en) | 2013-08-28 | 2024-06-25 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11799985B2 (en) | 2013-08-28 | 2023-10-24 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12021946B2 (en) | 2013-08-28 | 2024-06-25 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11979475B2 (en) | 2013-08-28 | 2024-05-07 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12003605B2 (en) | 2013-08-28 | 2024-06-04 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11985212B2 (en) | 2013-08-28 | 2024-05-14 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11985210B2 (en) | 2013-08-28 | 2024-05-14 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11758018B2 (en) | 2013-08-28 | 2023-09-12 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US11757961B2 (en) | 2015-05-14 | 2023-09-12 | Bright Data Ltd. | System and method for streaming content from multiple servers |
US12088651B2 (en) | 2015-05-14 | 2024-09-10 | Bright Data Ltd. | System and method for streaming content from multiple servers |
US12003562B2 (en) | 2015-05-14 | 2024-06-04 | Bright Data Ltd. | System and method for streaming content from multiple servers |
US12057958B2 (en) | 2017-08-28 | 2024-08-06 | Bright Data Ltd. | System and method for improving content fetching by using an appliance as a proxy device |
US11979250B2 (en) | 2017-08-28 | 2024-05-07 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11888639B2 (en) | 2017-08-28 | 2024-01-30 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11876612B2 (en) | 2017-08-28 | 2024-01-16 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11909547B2 (en) | 2017-08-28 | 2024-02-20 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11729013B2 (en) | 2017-08-28 | 2023-08-15 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11962430B2 (en) | 2017-08-28 | 2024-04-16 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11956094B2 (en) | 2017-08-28 | 2024-04-09 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11863339B2 (en) | 2017-08-28 | 2024-01-02 | Bright Data Ltd. | System and method for monitoring status of intermediate devices |
US12034559B2 (en) | 2017-08-28 | 2024-07-09 | Bright Data Ltd. | System and method for selecting and using a proxy device |
US12040910B2 (en) | 2017-08-28 | 2024-07-16 | Bright Data Ltd. | Content fetching by mobile device selected based on battery changing level |
US11711233B2 (en) | 2017-08-28 | 2023-07-25 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11764987B2 (en) | 2017-08-28 | 2023-09-19 | Bright Data Ltd. | System and method for monitoring proxy devices and selecting therefrom |
US11757674B2 (en) | 2017-08-28 | 2023-09-12 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11888638B2 (en) | 2017-08-28 | 2024-01-30 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11979249B2 (en) | 2017-08-28 | 2024-05-07 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US12047191B2 (en) | 2017-08-28 | 2024-07-23 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11729012B2 (en) | 2017-08-28 | 2023-08-15 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US11902044B2 (en) | 2017-08-28 | 2024-02-13 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US12056202B2 (en) | 2019-02-25 | 2024-08-06 | Bright Data Ltd. | System and method for URL fetching retry mechanism |
US11675866B2 (en) | 2019-02-25 | 2023-06-13 | Bright Data Ltd. | System and method for URL fetching retry mechanism |
US11657110B2 (en) | 2019-02-25 | 2023-05-23 | Bright Data Ltd. | System and method for URL fetching retry mechanism |
US11902253B2 (en) | 2019-04-02 | 2024-02-13 | Bright Data Ltd. | System and method for managing non-direct URL fetching service |
US12010101B2 (en) | 2019-04-02 | 2024-06-11 | Bright Data Ltd. | System and method for managing non-direct URL fetching service |
US12069029B2 (en) | 2019-04-02 | 2024-08-20 | Bright Data Ltd. | System and method for managing non-direct URL fetching service |
US12143460B2 (en) | 2021-01-12 | 2024-11-12 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12143461B2 (en) | 2023-01-23 | 2024-11-12 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
US12137008B2 (en) | 2023-06-14 | 2024-11-05 | Bright Data Ltd. | System and method for improving content fetching by selecting tunnel devices |
US12143462B2 (en) | 2023-08-02 | 2024-11-12 | Bright Data Ltd. | System and method for improving internet communication by using intermediate nodes |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1255395B1 (en) | External access to protected device on private network | |
EP1859354B1 (en) | System for protecting identity in a network environment | |
EP1536601B1 (en) | Encryption method and system for emails | |
US6131120A (en) | Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers | |
US7814541B1 (en) | Virtual routing for virtual local area networks having overlapping IP addresses | |
US7760729B2 (en) | Policy based network address translation | |
US7131141B1 (en) | Method and apparatus for securely connecting a plurality of trust-group networks, a protected resource network and an untrusted network | |
EP1134955A1 (en) | Enterprise network management using directory containing network addresses of users and devices providing access lists to routers and servers | |
KR100650843B1 (en) | Method and system in an ip network for using a network address translationnat with any type of application | |
CN100525304C (en) | Network system, internal server, terminal device, storage medium and packet relay method | |
JPH11167536A (en) | Method and device for client/host communication using computer network | |
US20040243837A1 (en) | Process and communication equipment for encrypting e-mail traffic between mail domains of the internet | |
US20060150243A1 (en) | Management of network security domains | |
US20020103878A1 (en) | System for automated configuration of access to the internet | |
US20050086533A1 (en) | Method and apparatus for providing secure communication | |
CA2353623A1 (en) | A system and method for selective anonymous access to a network | |
WO2008005188A2 (en) | Message control system in a shared hosting environment | |
CA2136150C (en) | Apparatus and method for providing a secure gateway for communication and data exchanges between networks | |
US20110225267A1 (en) | Server system for viewing in-house information, and method of controlling same | |
JP2005217757A (en) | Firewall management system, firewall management method, and firewall management program | |
CA2328548A1 (en) | Privacy system | |
Tan et al. | Bridging organizational network boundaries on the grid | |
Pimenidis et al. | Transparent anonymization of ip based network traffic | |
Pimenidis | A practical approach to transparent und usable anonymity networks | |
FI122184B (en) | Search appliance for the discovery of secure paths in an Internet Protocol-based communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued | ||
FZDE | Discontinued |
Effective date: 20040518 |