Streamline your patent due diligence with deep analytics for patents, inventors, and attorneys



Compare patents by technology sector



Deep Analytics



Quickly evaluate patents of interest

► Want to see more? Join for free!

PatentQuant Patent Profile
Generated January 23, 2018

Providing security for external access to a protected computer network

Patent Number: 6,845,452

Patent Information

Abstract
A system and method are disclosed for providing controlled access via an external network to a resource residing on an internal network. An external request addressed to a first computer system associated with the internal network is received at the first computer system via the external network. The external request comprises a request from a requesting party for response data from a second computer system associated with the internal network. At least part of the content of the external request is analyzed at the first computer system to determine whether the request is authorized. If it is determined that the request is authorized, the request is processed.
Patent Number: 6,845,452
Issue Date: 2005-01-18

Primary Category

Biographical Information

Assignee

Executive Summary

Summary

This patent was granted in ► Log In, which is ► Log In speed.

It has ► Log In claims, which is ► Log In than average for this category.

Its proximity to basic research is ► Log In than others in this category, and it displays ► Log In technology cycle time.

This patent received ► Log In citations from other patents, and references ► Log In other patents, as compared to other patents in this category.

Grant Time

► Log In

Claims

► Log In

► Want to see more? Join for free!

PatentStat Scores in Not categorized
These scores show the percentile ranks for each metric.
For example, a score of 90 means that 90% of similar patents had lower scores.

Patent Grant Time

This patent had ► Log In grant time compared to others in this category.

Patent grant time can be influenced by many factors. Activities within the USPTO that are beyond the control of patent attornies can influence grant time, but short grant times can also indicate well-written patents and dedicated efforts to respond rapidly to USPTO office actions with strong arguments. Shorter grant times are preferable, and the scores for this section are inverse measures — higher scores are better.

Patent Claims

This patent has ► Log In claims compared to others in this category.

The number of claims in a patent is correlated with its strength. Because greater claim counts increase the cost of a patent, more claims can indicate the importance an applicant assigns to a patent. Importantly, some may elect to file claims across multiple patents. A higher score in this metric indicates more claims, relative to others in this category.

Citations From Other Patents

This patent has received ► Log In citations from other patents, than others in this category.

Citations from other patents are an important measure of the significance of a patent. More citations indicate that other technologies build on a patent. Higher scores in this metric are better, and indicate more citations from other patents.

Citations to Other Patents

This patent referenced ► Log In citations to other patents, than others in this category.

A lower number of citations to other patents can be a sign of diminished patent strength. More citations indicate dependence on more other technologies. Higher scores in this category are better, and indicate fewer citations to other patents.

Research and Innovation Indicators
These are percentile ranks — they indicate the percentage of peers with lower scores.

Proximity to Basic Research

► Log In

0%

Proximity to Basic Research

This patent has ► Log In proximity to basic research compared to others in this category.

Proximity to basic research is measured by comparing the number of citations to non-patent literature among a cohort of patents. Because most non-patent citations are primary research papers, a higher count indicates greater proximity to basic research.

► Want to see more? Join for free!

Citations

Patents cited by this patent

Patent Title
6,701,437 Method and apparatus for processing communications in a virtual private network
6,453,348 Extranet architecture
6,339,830 Deterministic user authentication service for communication network
6,304,973 Multi-level security network system
6,298,380 Method and apparatus for reducing overhead on a proxied connection
6,263,332 System and method for query processing of structured documents
6,226,751 Method and apparatus for configuring a virtual private network
6,182,226 System and method for controlling interactions between networks
6,175,917 Method and apparatus for swapping a computer operating system
6,154,839 Translating packet addresses based upon a user identifier
6,104,716 Method and apparatus for lightweight secure communication tunneling over the internet
6,098,172 Methods and apparatus for a computer network firewall with proxy reflection
6,088,796 Secure middleware and server control system for querying through a network firewall
6,061,798 Firewall system for protecting network elements connected to a public network
6,006,268 Method and apparatus for reducing overhead on a proxied connection
6,003,084 Secure network proxy for connecting entities
5,915,087 Transparent security proxy for unreliable message exchange protocols

Patents that cite this patent

Patent Title
9,286,484 Method and system for providing document retention using cryptography
9,258,383 Monetization of television audience data across muliple screens of a user watching television
9,167,419 Discovery and launch system and method
9,154,942 Zero configuration communication between a browser and a networked media device
9,129,120 Methods and systems for providing access control to secured data
9,106,624 System security for network resource access using cross firewall coded requests
9,026,668 Real-time and retargeted advertising on multiple screens of a user watching television
8,943,316 Document security system that permits external users to gain access to secured files
8,918,839 System and method for providing multi-location access management to secured items
8,799,644 System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
8,751,663 Method and apparatus for modifying HTTP at a remote data center via tunneling
8,739,302 Method and apparatus for transitioning between states of security policies used to secure electronic documents
8,707,034 Method and system for using remote headers to secure electronic files
8,613,102 Method and system for providing document retention using cryptography
8,590,031 Methods, systems, and computer program products for access control services using a transparent firewall in conjunction with an authentication server
8,543,827 Methods and systems for providing access control to secured data
8,381,281 Authenticating a remote host to a firewall
8,341,407 Method and system for protecting electronic data in enterprise environment
8,341,406 System and method for providing different levels of key security for controlling access to secured items
8,327,138 Method and system for securing digital assets using process-driven security policies
8,307,067 Protecting encrypted files transmitted over a network
8,306,475 Method and apparatus for configuring a wireless device through reverse advertising
8,301,896 Multi-level file digests
8,266,674 Method and system for implementing changes to security policies in a distributed security system
8,266,267 Detection and prevention of encapsulated network attacks using an intermediate device
8,209,756 Compound attack detection in a computer network
8,185,945 Systems and methods for selectively requesting certificates during initiation of secure communication sessions
8,181,237 Method for improving security of computer networks
8,176,334 Document security system that permits external users to gain access to secured files
8,145,793 System and method for distributed content transformation
8,141,125 Orchestration of policy engines and format technologies
8,127,366 Method and apparatus for transitioning between states of security policies used to secure electronic documents
8,112,482 System and method for securing access to electronic mail
8,065,713 System and method for providing multi-location access management to secured items
8,006,280 Security system for generating keys from access rules in a decentralized manner and methods therefor
7,950,066 Method and system for restricting use of a clipboard application
7,937,755 Identification of network policy violations
7,930,756 Multi-level cryptographic transformations for securing digital assets
7,921,450 Security system using indirect key generation from access rules and methods therefor
7,921,288 System and method for providing different levels of key security for controlling access to secured items
7,921,284 Method and system for protecting electronic data in enterprise environment
7,913,311 Methods and systems for providing access control to electronic data
7,890,990 Security system with staging capabilities
7,841,005 Method and apparatus for providing security to web services
7,836,310 Security system that uses indirect password-based encryption
7,823,195 Method, apparatus and computer program product for a network firewall
7,783,765 System and method for providing distributed access control to secured documents
7,774,836 Method, apparatus and computer program product for a network firewall
7,735,127 Method and system for communicating with a managed system located behind a firewall
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files
7,729,995 Managing secured files in designated locations
7,707,427 Multi-level file digests
7,703,140 Method and system for securing digital assets using process-driven security policies
7,681,034 Method and apparatus for securing electronic data
7,634,805 Use of network address translation for implementation of stateful routing
7,631,184 System and method for imposing security on copies of secured items
7,577,838 Hybrid systems for securing digital assets
7,565,683 Method and system for implementing changes to security policies in a distributed security system
7,562,232 System and method for providing manageability to security information for secured items
7,555,558 Method and system for fault-tolerant transfer of files across a network
7,526,640 System and method for automatic negotiation of a security protocol
7,512,810 Method and system for protecting encrypted files transmitted over a network
7,478,418 Guaranteed delivery of changes to security policies in a distributed system
7,463,935 Message queuing in an industrial environment
7,380,120 Secured data format for access control
7,107,612 Method, apparatus and computer program product for a network firewall

► Want to see more? Join for free!

Information presented on this site is collected from the USPTO and other sources. Errors may have been introduced in the original assembly or analysis of the data.
No warranties are expressed or implied.The content of this site is not a substitute for skilled legal, financial, or other guidance.
Copyright thinkBiotech LLC. All rights reserved.
Privacy policy.
`abc