In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to the service may send a service request for information about a URL to a server computer providing the service. The service request may be included in a first data set posted by the router to the server computer. The first data set may be described by an HTML form and include an encrypted device authenticator used by the server computer to validate the router. The first data set may further include a server authentication code. In responding to the service request, the server computer returns the server authentication code to the router along with information about the URL. The response may be in a second data set, such as an XML document sent by the server computer to the router over an HTTP connection.
Authentication Protocol For Network Security Services
In one embodiment, an authentication protocol used in a network security service is performed over non-secure connection, such as HTTP. A router subscribing to the service may send a service request for information about a URL to a server computer providing the service. The service request may be included in a first data set posted by the router to the server computer. The first data set may be described by an HTML form and include an encrypted device authenticator used by the server computer to validate the router. The first data set may further include a server authentication code. In responding to the service request, the server computer returns the server authentication code to the router along with information about the URL. The response may be in a second data set, such as an XML document sent by the server computer to the router over an HTTP connection.
Kong Yew Chan - San Mateo CA, US Shuosen Robert Liu - San Jose CA, US Jianda Li - San Jose CA, US Bharath Kumar Chandra Sekhar - Santa Clara CA, US Pei-wei Wu - Sunnyvale CA, US
Assignee:
Trend Micro Inc - Tokyo
International Classification:
G06F 15/173 G06F 12/00 G06F 7/00 H04W 4/00
US Classification:
709224, 370338, 711108, 707 3
Abstract:
Methods and apparatus for rating Uniform Resource Locators (URLs) are disclosed. The method includes determining a request size pertaining to a length of the URL to be rated and for generating a rating request message containing the URL. The rating request message is a DNS (domain name system) message if the request size is less than or equal to a predefined size limitation, and the rating request message is a HTTP (hypertext transfer protocol) message if the request size is greater than the predefined size limitation.
Name / Title
Company / Classification
Phones & Addresses
Kong W. Chan Owner
Acon Builders Construction Inc Single-Family House Construction
2144 Wyandotte St, Mountain View, CA 94043 PO Box 1672, Mountain View, CA 94042
Kong Chan President
Evergreen Global Express Business Services at Non-Commercial Site · Nonclassifiable Establishments
727 W Lemon Ave, Arcadia, CA 91007 18615 Wl St, Whittier, CA 91748
British Virgin IslandsGlobal Investment Organisations (GIO) provides Investment Opportunities to high net worth individuals and/or corporations whereby given an investment, the... Global Investment Organisations (GIO) provides Investment Opportunities to high net worth individuals and/or corporations whereby given an investment, the objective function of GIO is to optimize the Returns on Investments subject to the constraints of minimization of risks.