Nothing Special   »   [go: up one dir, main page]

CA2353623A1 - A system and method for selective anonymous access to a network - Google Patents

A system and method for selective anonymous access to a network Download PDF

Info

Publication number
CA2353623A1
CA2353623A1 CA002353623A CA2353623A CA2353623A1 CA 2353623 A1 CA2353623 A1 CA 2353623A1 CA 002353623 A CA002353623 A CA 002353623A CA 2353623 A CA2353623 A CA 2353623A CA 2353623 A1 CA2353623 A1 CA 2353623A1
Authority
CA
Canada
Prior art keywords
gateway
network
privacy
component
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002353623A
Other languages
French (fr)
Inventor
Hamnett Hill
Jean-Simon Venne
Luc Boulianne
Frank Foster
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZERO-KNOWLEDGE SYSTEMS Inc
Original Assignee
ZERO-KNOWLEDGE SYSTEMS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZERO-KNOWLEDGE SYSTEMS Inc filed Critical ZERO-KNOWLEDGE SYSTEMS Inc
Priority to CA002353623A priority Critical patent/CA2353623A1/en
Publication of CA2353623A1 publication Critical patent/CA2353623A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Description

A System and Method for Selective Anonymous Access to a Network The present invention provides a system and method for computer network users to access a privacy enhanced network, in a transparent fashion.
Background Current methods for accessing a privacy-enhanced network are either by using a web proxy or by installing software on the user's workstation. Both of these approaches have significant drawbacks.
In the first case, the user is required to make configuration changes to his or her workstation.
In the second, the user is required to download and install software and then configure it.
In a network environment, with a potentially large number of worlcstanon, administrators may be required to invest a substantial amount of work and time to install, manage and maintain this system.
In both cases the user must understand considerably complex notions about how the system works. In addition, both cases have the drawback that administrators are unable 2o to manage its use by users. Finally, both cases are tied to a single privacy network.
There exists a number of similar services which profess to ensure a users' privacy.
Safeweb and Anonymizer are two such services. Both have four significant disadvantages:
1. They are bound to a specific network of servers.
2. All existing services do not operate transparently. Users must make changes to their browser settings to take advantage.
3. All existing services do not operate at the LAN level. They exist as a service that operates on the Internet. Users must first locate the servers before they can be used.
4. All existing services do not assure privacy. The existing services are able to establish and log the source and destination of each connection.
There is thus a need for a system that addresses all of these issues. Users are not expected to install any software nor reconfigure their workstations. The system should provide a centralized privacy service. At the option of the administrators, the system is 1o either always on or users are provided with a mechanism to activate or de-activate the service at their discretion. Administrators can centrally manage the server, easing the time and work investing to maintain the system. If required, administrators can audit its use. Finally, the system should not be tied to a particular privacy network:
it can provide service for a number of these.
Accordingly, there is a need for a system that enables Network users to easily enroll in these services as the users are not required to make any local workstation changes or to download any software components to enable but are provided with a mechanism to activate or de-activate the privacy service for their workstation.
Summary of the Invention In accordance with this invention there is provided a Gateway for allowing selective anonymous access to a privacy enhanced network, such as the Zero-Knowledge Network. Typically, the Gateway will be installed at the exit point of the network, where it will be able to examine all traffic leaving this network. For the purposes of this discussion, a network may be as large as a major ISP network. Furthermore, the gateway is capable of being configured as a public gateway, wherein any user on the Internet could use the service. Also, the Gateway may be installed on either side of a fire wall Detailed Description of the Preferred Embodiments Ph~'~'~hanaed rraltwo* A
ZK Privacy Gatewa Internet Firewall p ivay anharcd r neltw* B
Client I
Computers Local Area Network Zero-Knowledge Privacy Gateway Environment Figure 1 The Gateway according to an embodiment of the invention is comprised of the following components:
Management ~ ~ User Control ~ ~ Monitoring Proxy Protocol Group Gateway Group Proxyl 1 Gafawrq A
Proxy Z
Gatwray B
P roxy 3 LAN Network Traffic Pr~, G~",~y D~cs6n D~cicbn tan Routing Zaro-KnoWlodg~ Privacy Gat~~ay Caanponants Figure 2 Routing Component Packets entering the Gateway are first supplied to the routing component. Each packet is examined by the routing component to determine if this packet is to be redirected to a Privacy network. The Gateway can serve a number of different Privacy networks.
Packet selection criteria are set by the management and user control components below.
Redirection takes place in two stages.
First, each packet's protocol is extracted. If a protocol proxy has been registered for this protocol, the packets are handed off in a transparent fashion to the protocol proxy component (see below). Once the proxy has completed its processing, the packet is to returned to the routing component where it will pass it on to the appropriate Gateway component.
Packets that do not have a corresponding protocol proxy registered are passed on directly to the Gateway Component.
Returning packets from the Privacy Network are passed first to the gateway component and then to any registered proxy component.
Packets, which do not match the selection criteria, are forwarded, as a regular muter would do. Optionally, packets may be masqueraded (or de-masqueraded in the case of returning packets). This allows administrators flexibility with regard to the installation of the machine.
Protocol Proxy Group The protocol proxy component group represents the collection of protocol proxies that are registered at any given time. Proxies are supplied for any protocol that requires sanitization of the data stream, that is, removal or replacement of identifying information.
As an example, and HTTP proxy would handle the removal of embedded IP
addresses and the replacement of cookies. In addition, this proxy would add a marker to returning HTML pages, indicating that the Gateway has processed this page.

Gateway Component Group The gateway component Group handles all packets to and from the privacy network.
The appropriate protocol proxy has rendered the payload of the packets anonymous. The Gateway component then removes (or replaces, in the case of a returning packet) any TCP/IP or UDP/IP specific information. In addition, the packets are encrypted or decrypted for returning packets.
Each Gateway component within this group is designed and implemented to interface with a specific Privacy network.
1o Management Component T'he management component handles all configuration and management of the Gateway.
This component is used to select, among other things, which protocols will be handled by the gateway, which Privacy network will be serviced, which users are use which Privacy network and which IP addresses are authorised to use the network. It interfaces ~5 with site user authentication mechanisms to establish which IP addresses are used by a user.
User Control Component The User Control Component allows authorized users to activate or de-active the service 2o for them. This can either be through a web-interface on the gateway or a Java application running in a browser window.
Monitoring Component The Monitoring Component interfaces with the various components on the Gateway to 25 report their state.
As may be evident, the gateway has many applications. In some markets or industries, corporations are required to eliminate the potential correlation of an account to the location of the account owner. With the advent of the Internet and the increase usage of web browsers to access online information about specifc accounts, this location can be s compromised by linking the Internet Protocol address assigned to the users workstation and the account number. With the Gateway, users can access anonymously the corporation web site without any installation required on their workstation, protecting therefore their location. The corporation can offer this service to their customers by providing them with the address of the Gateway that will anonymize the IP
traffic before reaching the corporation's servers.
In another example, current VPN products will open an encrypted point-to-point tunnel when a remote connection is made to the corporate LAN. That point to point tunnel will be open with 2 IP addresses (one at each end of the tunnel). The 2 IP
addresses are linked 1o by the tunnel protocol (L2F-L2TP) and will give away the location of the remote user IP
address connection compromising consequently the approximate geographical location (City or states/province, Country). The Gateway solves this problem by routing the VPN
tunnel on a privacy enhanced network. So, when a user initiates an anonymous VPN
connection with their corporate network, he will connect to the Gateway, which anonymizes the request and then from an undetermined exit point of the privacy enhanced network, the VPN tunnel is created. Therefore, for somebody who is monitoring the tunnel at the corporate network, he sees only the exit point of the privacy enhanced network and not the original IP address of the requester.
2o In a still further application, current technologies offer secure e-mails that guarantee that the content of the e-mail is not modified or accessible to users other then the recipients.
However, the identity of the sender and recipients is not protected. The Gateway offers the service of private mail that insures that the e-mail is authenticated and that only the sender and the recipients are aware of their communication. Also, the recipients can reply to the sender without compromising the privacy of their online communication.
Outsiders should not be able to can know that the recipients received e-mails from someone using the Gateway, neither the real identity of the sender. Also, Outsiders should not be able to view the content of the e-mails that are processed by the Gateway.
3o In Summary, the definition of a private e-mail is:

~ Alice is a user behind a Gateway who wants to send an e-mail message to Bob.
~ Bob is the user who should receive Alice's e-mail and be able to reply to it ~ Eve is an external eavesdropper who wants to read the message.
The email is private if Eve cannot read the text of the message, cannot tell that Alice has sent a message to Bob, cannot determine that Bob has received a message from someone using the Gateway.
Thus, it may be seen that the gateway ensures that no single node used to transport its 1o traffic is aware of the source and destination of any connection. In addition, as the gateway resides at the end-user LAN, the LAN administrator has full control over any possible logging that might take place at the gateway.

Claims

CA002353623A 2001-07-23 2001-07-23 A system and method for selective anonymous access to a network Abandoned CA2353623A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002353623A CA2353623A1 (en) 2001-07-23 2001-07-23 A system and method for selective anonymous access to a network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002353623A CA2353623A1 (en) 2001-07-23 2001-07-23 A system and method for selective anonymous access to a network

Publications (1)

Publication Number Publication Date
CA2353623A1 true CA2353623A1 (en) 2003-01-23

Family

ID=4169536

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002353623A Abandoned CA2353623A1 (en) 2001-07-23 2001-07-23 A system and method for selective anonymous access to a network

Country Status (1)

Country Link
CA (1) CA2353623A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11595496B2 (en) 2013-08-28 2023-02-28 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11611607B2 (en) 2009-10-08 2023-03-21 Bright Data Ltd. System providing faster and more efficient data communication
US11657110B2 (en) 2019-02-25 2023-05-23 Bright Data Ltd. System and method for URL fetching retry mechanism
US11711233B2 (en) 2017-08-28 2023-07-25 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11757961B2 (en) 2015-05-14 2023-09-12 Bright Data Ltd. System and method for streaming content from multiple servers
US11902253B2 (en) 2019-04-02 2024-02-13 Bright Data Ltd. System and method for managing non-direct URL fetching service
US12137008B2 (en) 2023-06-14 2024-11-05 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices

Cited By (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11888922B2 (en) 2009-10-08 2024-01-30 Bright Data Ltd. System providing faster and more efficient data communication
US11611607B2 (en) 2009-10-08 2023-03-21 Bright Data Ltd. System providing faster and more efficient data communication
US11616826B2 (en) 2009-10-08 2023-03-28 Bright Data Ltd. System providing faster and more efficient data communication
US11659018B2 (en) 2009-10-08 2023-05-23 Bright Data Ltd. System providing faster and more efficient data communication
US11659017B2 (en) 2009-10-08 2023-05-23 Bright Data Ltd. System providing faster and more efficient data communication
US12107911B2 (en) 2009-10-08 2024-10-01 Bright Data Ltd. System providing faster and more efficient data communication
US11671476B2 (en) 2009-10-08 2023-06-06 Bright Data Ltd. System providing faster and more efficient data communication
US12101372B2 (en) 2009-10-08 2024-09-24 Bright Data Ltd. System providing faster and more efficient data communication
US12095841B2 (en) 2009-10-08 2024-09-17 Bright Data Ltd. System providing faster and more efficient data communication
US12095843B2 (en) 2009-10-08 2024-09-17 Bright Data Ltd. System providing faster and more efficient data communication
US11700295B2 (en) 2009-10-08 2023-07-11 Bright Data Ltd. System providing faster and more efficient data communication
US12095840B2 (en) 2009-10-08 2024-09-17 Bright Data Ltd. System providing faster and more efficient data communication
US12081612B2 (en) 2009-10-08 2024-09-03 Bright Data Ltd. System providing faster and more efficient data communication
US12021916B2 (en) 2009-10-08 2024-06-25 Bright Data Ltd. System providing faster and more efficient data communication
US12021914B2 (en) 2009-10-08 2024-06-25 Bright Data Ltd. System providing faster and more efficient data communication
US12003568B2 (en) 2009-10-08 2024-06-04 Bright Data Ltd. System providing faster and more efficient data communication
US12003569B2 (en) 2009-10-08 2024-06-04 Bright Data Ltd. System providing faster and more efficient data communication
US12003567B2 (en) 2009-10-08 2024-06-04 Bright Data Ltd. System providing faster and more efficient data communication
US12003566B2 (en) 2009-10-08 2024-06-04 Bright Data Ltd. System providing faster and more efficient data communication
US11770435B2 (en) 2009-10-08 2023-09-26 Bright Data Ltd. System providing faster and more efficient data communication
US11962636B2 (en) 2009-10-08 2024-04-16 Bright Data Ltd. System providing faster and more efficient data communication
US11811850B2 (en) 2009-10-08 2023-11-07 Bright Data Ltd. System providing faster and more efficient data communication
US11811848B2 (en) 2009-10-08 2023-11-07 Bright Data Ltd. System providing faster and more efficient data communication
US11811849B2 (en) 2009-10-08 2023-11-07 Bright Data Ltd. System providing faster and more efficient data communication
US11956299B2 (en) 2009-10-08 2024-04-09 Bright Data Ltd. System providing faster and more efficient data communication
US11838119B2 (en) 2009-10-08 2023-12-05 Bright Data Ltd. System providing faster and more efficient data communication
US11949729B2 (en) 2009-10-08 2024-04-02 Bright Data Ltd. System providing faster and more efficient data communication
US11916993B2 (en) 2009-10-08 2024-02-27 Bright Data Ltd. System providing faster and more efficient data communication
US11902351B2 (en) 2009-10-08 2024-02-13 Bright Data Ltd. System providing faster and more efficient data communication
US11876853B2 (en) 2009-10-08 2024-01-16 Bright Data Ltd. System providing faster and more efficient data communication
US11888921B2 (en) 2009-10-08 2024-01-30 Bright Data Ltd. System providing faster and more efficient data communication
US11949756B2 (en) 2013-08-28 2024-04-02 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12010196B2 (en) 2013-08-28 2024-06-11 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11677856B2 (en) 2013-08-28 2023-06-13 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11689639B2 (en) 2013-08-28 2023-06-27 Bright Data Ltd. System and method for improving Internet communication by using intermediate nodes
US12088684B2 (en) 2013-08-28 2024-09-10 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12069148B2 (en) 2013-08-28 2024-08-20 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11902400B2 (en) 2013-08-28 2024-02-13 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11870874B2 (en) 2013-08-28 2024-01-09 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12069150B2 (en) 2013-08-28 2024-08-20 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12021945B2 (en) 2013-08-28 2024-06-25 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11924306B2 (en) 2013-08-28 2024-03-05 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11924307B2 (en) 2013-08-28 2024-03-05 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11838388B2 (en) 2013-08-28 2023-12-05 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11595496B2 (en) 2013-08-28 2023-02-28 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11949755B2 (en) 2013-08-28 2024-04-02 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11838386B2 (en) 2013-08-28 2023-12-05 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11729297B2 (en) 2013-08-28 2023-08-15 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12021944B2 (en) 2013-08-28 2024-06-25 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11799985B2 (en) 2013-08-28 2023-10-24 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12021946B2 (en) 2013-08-28 2024-06-25 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11979475B2 (en) 2013-08-28 2024-05-07 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12003605B2 (en) 2013-08-28 2024-06-04 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11985212B2 (en) 2013-08-28 2024-05-14 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11985210B2 (en) 2013-08-28 2024-05-14 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11758018B2 (en) 2013-08-28 2023-09-12 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US11757961B2 (en) 2015-05-14 2023-09-12 Bright Data Ltd. System and method for streaming content from multiple servers
US12088651B2 (en) 2015-05-14 2024-09-10 Bright Data Ltd. System and method for streaming content from multiple servers
US12003562B2 (en) 2015-05-14 2024-06-04 Bright Data Ltd. System and method for streaming content from multiple servers
US12057958B2 (en) 2017-08-28 2024-08-06 Bright Data Ltd. System and method for improving content fetching by using an appliance as a proxy device
US11979250B2 (en) 2017-08-28 2024-05-07 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11888639B2 (en) 2017-08-28 2024-01-30 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11876612B2 (en) 2017-08-28 2024-01-16 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11909547B2 (en) 2017-08-28 2024-02-20 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11729013B2 (en) 2017-08-28 2023-08-15 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11962430B2 (en) 2017-08-28 2024-04-16 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11956094B2 (en) 2017-08-28 2024-04-09 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11863339B2 (en) 2017-08-28 2024-01-02 Bright Data Ltd. System and method for monitoring status of intermediate devices
US12034559B2 (en) 2017-08-28 2024-07-09 Bright Data Ltd. System and method for selecting and using a proxy device
US12040910B2 (en) 2017-08-28 2024-07-16 Bright Data Ltd. Content fetching by mobile device selected based on battery changing level
US11711233B2 (en) 2017-08-28 2023-07-25 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11764987B2 (en) 2017-08-28 2023-09-19 Bright Data Ltd. System and method for monitoring proxy devices and selecting therefrom
US11757674B2 (en) 2017-08-28 2023-09-12 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11888638B2 (en) 2017-08-28 2024-01-30 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11979249B2 (en) 2017-08-28 2024-05-07 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US12047191B2 (en) 2017-08-28 2024-07-23 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11729012B2 (en) 2017-08-28 2023-08-15 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US11902044B2 (en) 2017-08-28 2024-02-13 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US12056202B2 (en) 2019-02-25 2024-08-06 Bright Data Ltd. System and method for URL fetching retry mechanism
US11675866B2 (en) 2019-02-25 2023-06-13 Bright Data Ltd. System and method for URL fetching retry mechanism
US11657110B2 (en) 2019-02-25 2023-05-23 Bright Data Ltd. System and method for URL fetching retry mechanism
US11902253B2 (en) 2019-04-02 2024-02-13 Bright Data Ltd. System and method for managing non-direct URL fetching service
US12010101B2 (en) 2019-04-02 2024-06-11 Bright Data Ltd. System and method for managing non-direct URL fetching service
US12069029B2 (en) 2019-04-02 2024-08-20 Bright Data Ltd. System and method for managing non-direct URL fetching service
US12143460B2 (en) 2021-01-12 2024-11-12 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12143461B2 (en) 2023-01-23 2024-11-12 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes
US12137008B2 (en) 2023-06-14 2024-11-05 Bright Data Ltd. System and method for improving content fetching by selecting tunnel devices
US12143462B2 (en) 2023-08-02 2024-11-12 Bright Data Ltd. System and method for improving internet communication by using intermediate nodes

Similar Documents

Publication Publication Date Title
EP1255395B1 (en) External access to protected device on private network
EP1859354B1 (en) System for protecting identity in a network environment
EP1536601B1 (en) Encryption method and system for emails
US6131120A (en) Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers
US7814541B1 (en) Virtual routing for virtual local area networks having overlapping IP addresses
US7760729B2 (en) Policy based network address translation
US7131141B1 (en) Method and apparatus for securely connecting a plurality of trust-group networks, a protected resource network and an untrusted network
EP1134955A1 (en) Enterprise network management using directory containing network addresses of users and devices providing access lists to routers and servers
KR100650843B1 (en) Method and system in an ip network for using a network address translationnat with any type of application
CN100525304C (en) Network system, internal server, terminal device, storage medium and packet relay method
JPH11167536A (en) Method and device for client/host communication using computer network
US20040243837A1 (en) Process and communication equipment for encrypting e-mail traffic between mail domains of the internet
US20060150243A1 (en) Management of network security domains
US20020103878A1 (en) System for automated configuration of access to the internet
US20050086533A1 (en) Method and apparatus for providing secure communication
CA2353623A1 (en) A system and method for selective anonymous access to a network
WO2008005188A2 (en) Message control system in a shared hosting environment
CA2136150C (en) Apparatus and method for providing a secure gateway for communication and data exchanges between networks
US20110225267A1 (en) Server system for viewing in-house information, and method of controlling same
JP2005217757A (en) Firewall management system, firewall management method, and firewall management program
CA2328548A1 (en) Privacy system
Tan et al. Bridging organizational network boundaries on the grid
Pimenidis et al. Transparent anonymization of ip based network traffic
Pimenidis A practical approach to transparent und usable anonymity networks
FI122184B (en) Search appliance for the discovery of secure paths in an Internet Protocol-based communication network

Legal Events

Date Code Title Description
FZDE Discontinued
FZDE Discontinued

Effective date: 20040518