Language selection

Search

Patent 2401985 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 2401985
(54) English Title: HIGH SPEED, HIGH SECURITY REMOTE ACCESS SYSTEM
(54) French Title: SYSTEME D'ACCES A DISTANCE HAUTE VITESSE, HAUTE SECURITE
Status: Dead
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 29/06 (2006.01)
(72) Inventors :
  • VENTURA, PAUL A. (Canada)
(73) Owners :
  • VENTURA, PAUL A. (Canada)
(71) Applicants :
  • VENTURA, PAUL A. (Canada)
(74) Agent: SIM & MCBURNEY
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2001-03-02
(87) Open to Public Inspection: 2001-09-07
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/CA2001/000262
(87) International Publication Number: WO2001/065797
(85) National Entry: 2002-09-03

(30) Application Priority Data:
Application No. Country/Territory Date
2,300,066 Canada 2000-03-03

Abstracts

English Abstract




A method and apparatus which is capable of providing high-speed, high security
remote access.


French Abstract

Cette invention se rapporte à un procédé et à un appareil capables d'assurer un accès à distance haute vitesse, haute sécurité.

Claims

Note: Claims are shown in the official language in which they were submitted.


7
What is claimed is:
1. A method of providing over a public network access by a client computer to
a
network having a public network address protected by a firewall of a
communications
server, comprising
receiving a request for access to the network from the client computer over a
secured channel connected to the communications server;
opening an access port having a port number for accessing the network pass the
firewall; and
sending the port number to the client computer.
2. The method of claim 1, wherein the request further comprises a client
public
network address of the client computer on the public network and the access
port is set to
communicate only with the client public network address.
3. The method of claim 2, further comprises changing the number of the access
port
at selected intervals and communicating the changed number to the client
computer over
the secured channel for continued access to the network.
4. The method of any of claims 1 to 3, further comprises encrypting
communications
between the client port and the access port and providing a new encryption key
to the
client computer at selected intervals over the secured channel.
5. The method of any of claims 1 to 4, further comprises providing a password
to the
client computer over the secured channel for password protected access to the
access port.
6. The method of any of claims 1 to 5, wherein the secured channel comprises a
telephone line.
7. The method of claim 6, further comprises verifying identity of the client
computer
by at least one of dialing back, allowing access from predetermined telephone
numbers
only as confirmed by caller ID, and requiring dial back at selected intervals.




9

8. The method of any of claims 1 to 7, wherein the public network comprises
the
Internet.

9. The method of any of claims 1 to 8, wherein the client computer is an
another
communications server to another network.

10. A remote access system for providing a client computer access to a network
having
a public network address, over a public network, comprising
a communications server for protecting the network from unauthorized access;
and
for communicating with the client computer over a secured channel and over the
public
network and where upon receiving a request for access to the network over a
secured
channel from the client computer, opening an access port having a port number
for
accessing the network pass a firewall, and sending the port number to the
client computer.

11. The system of claim 10, wherein the request further comprises a client
public
network address of the client computer on the public network and the access
port is set to
communicate only with the client public network address.

12. The system of claim 11, further comprising changing the port number of the
access
port at selected intervals and communicating the changed port number to the
client
computer over the secured channel for continued access to the network.

13. The system of any of claims 10 to 12, further comprising a encryption
system for
encrypting communications between the client computer and the communications
server
and providing a new encryption key to the client computer at selected
intervals over the
secured channel.

14. The system of any of claims 10 to 13, further comprising providing a
password to
the client computer over the secured channel for communications between the
client
computer and the access port.

15. The system of any of claims 10 to 14, wherein the secured channel
comprises a
telephone line.





3

16. The system of claim 15, wherein the secured channel further comprising
verification features of at least one of dialing back, allowing access from
predetermined
telephone numbers only as confirmed by caller ID, and requiring dial back ai
selected
intervals.

17. The system of any of claims 10 to 16, wherein the public network comprises
the
Internet.

18. The system of any of claims 10 to 17, wherein the client computer is an
another
communications server to another network.


Description

Note: Descriptions are shown in the official language in which they were submitted.



CA 02401985 2002-09-03
WO 01/65797 PCT/CA01/00262
HIGH SPEED. HIGH SECURITY REMOTE ACCESS SYSTEM
Field of the Invention
The present invention relates in general to remote access systems and more
specifically to a method and apparatus for providing a high speed, high
security remote
access system.
Background of the Invention
With the continued growrth of computer use in businesses, many companies
are beginning to store their documents in a central network server. In most
cases,
documents are shared between employees and therefore having all the documents
stored in
a central location improves the availability of these documents. Many of these
documents
are private in nature and therefore access should be restricted to employees
and not
available to the public. This is generally achieved via a firewall or by
restricting remote
access to the server.
However, with the evolution of business, many employees work out of the
office. There may be occasions when the employee is out of town on business or
even
working from home and has forgotten a document. Instead of contacting the
office and
having someone fax the document, which is not possible after working hours,
the
employee may retrieve the document by remotely accessing the server. However,
by
allowing remote access to the server, the server runs the risk of being
illegally accessed by
outside parties. If the outside parties are able to illegally access the
server, private
documents may be stolen.
Also, when the employee remotely accesses the server, the document
retrieval process is generally quite slow. By using a direct dial-up
connection, the
document retrieval process is restricted to the speed of the modem being used.
A firewall separates a network into two segments. A private segment (the
inside) which is usually the LAN and a public segment (the outside) which is
usually the
Internet. In its most secure configuration a firewall will allow users from
the inside
through to the outside but will not allow users from the outside in. However,
ports can be
left open for the purpose of ''Business to Business" or giving remote access
to employees
when they are out of the office. A port acts like a door on the public side of
the firewall


CA 02401985 2002-09-03
WO 01/65797 PCT/CA01/00262
2
that can be opened or closed by the firewall software. There are usually
65,000 ports on a
firewall of which all can be opened or closed. Ports are left open so that
users on the
public segment can request access from the firewall into the private segment.
Unfortunately, the ports can be hacked if they are open or left opened.
Summary of the Invention
In accordance with the present invention, there is provided a method and
apparatus which is capable of providing high-speed, high security remote
access. The
present invention allows an employee to securely access a network server via
the Internet.
By accessing the server via the Internet, the employee is able to quickly
retrieve the
necessary documents and exit the server system.
According to another aspect of the invention, security is provided in the
form of a switch and a software module, which opens specified ports after
being instructed
by a remote computer.
General Description of the Detailed Drawing
An embodiment of the present invention is described below with reference
to the accompanying drawing, in which:
Figure 1 is a schematic diagram of a high speed, high security remote
access system of the present invention; and
Figure 2 is a schematic diagram of a network to network remote access
system of the present invention.
Detailed Description of the Preferred Embodiment
Turning to Figure 1, a high speed, high security remote access system is
shown. The remote access system 10 comprises a remote client computer 12
connected to
a high speed modem 14 and a regular modem 16. The regular modem 16 is
connected, via
a phone line connection 15, to a communication server 18 located at a site
(e.g. at a
company ). The communication server 18 includes a firewall server 19. The
communication server 18 comprises at least two network interface cards (NIC)
20 and 2~.
NIC 22 contains a Public IP address while NIC 20 contains a private 1P
address. NIC 20
SUBSTITUTE SHEET (RULE 26)


CA 02401985 2002-09-03
WO 01/65797 PCT/CA01/00262
3
is connected to a Private IP hub 24 which, in turn, is connected to a
corporate server 26
and an application server 28. NIC 22 is connected to a public IP hub 30 which,
in turn is
connected to a web server 32, a mail server 34 and a muter 36. The private hub
24, the
corporate server 26 and the application server 28 form a private network 25
while the
public hub 30, the web server 32 and the mail server 34 form a public network
33. The
private network 25 stores the private documents and should not be accessible
by outside
parties and therefore requires extra security features. The public network 33
does not
require the same security or privacy. Since the web server 32 or the e-mail
server 34 are
not included in the private network 25, outside parties are able to access the
two servers 32
and 34 and e-mail may be sent and received. Distribution of the corporate
server 26 and
application server 28 in a private network 25 and the web server 32 and the
mail server 34
in a public network will be well known to one skilled in the art.
The router 36 contains the public IP address for the location of the
firewall server 19 on the Internet. The client computer 12 accesses the
Internet 38 via the
high-speed modem 14 using a high-speed connection 40. The client computer 12
In operation, the firewall server 19 acts as a control center. In a default
mode, the firewall server 19 is a Network Address Translation (NAT) server and
does not
allow any of the ports to be open. It will be understood by one skilled in the
art that high-
speed access to the private hub 24 is via ports located in the firewall server
19. When an
authorized remote user has successfully logged into the system, the firewall
server 19
randomly opens a port in the firewall and via the phone line connection 15,
notifies the
client computer 12 which port has just been opened. The client computer 12
then connects
to the to the private hub 24 via this opened port using the high speed modem
14. This
port remains open for a fraction of a second. Subsequently, a new port is
randomly
opened and the client computer 12 is informed via the phone line connection
15. This
technique is known as port scrambling.
In order to access the corporate server 26 or application server 28 via the
high
speed connection 40; and to ensure the privacy and integrity of the
information traveling
via the high-speed connection 40, encryption is used. The key to encrypt and
decrypt the
information traveling via the high-speed connection 40 is randomly generated
by the
firewall server 19. This key is sent by the firewall server 19 to the client
computer 12 via
the phone line connection 15. The client computer 12 uses the key to decrypt
any
incoming information from the firewall server 19 and encrypt any outgoing
information to


CA 02401985 2002-09-03
WO 01/65797 PCT/CA01/00262
4
the firewall server 19. A new key is randomly generated by the firewall server
19, many
times per second. In order to provide a matching pair of keys, the high-speed
connection
40 and the phone line connection 15 must originate from the same client
computer 12.
In the present invention, high security on a high speed Internet connection
to the private network 25 is achieved by sending a new encryption key to the
client
computer 12 every fraction of a second. Security is drastically enhanced by
constantly
changing the encryption key and port scrambling. It will be understood that if
the same
port is chosen by two separate client computers, both computers may access the
corporate
server 26 or application server 28 via the same port.
It will also be understood that the present invention may be implemented
on a
various number of servers such as a Linux server, an NT server or a Novell
server.
It will be appreciated that, although an embodiment of the invention has
been
described and illustrated in detail, various changes and modification may be
made. For
example, the present invention may include caller ID. In this manner, only
select phone
numbers are authorized to access the corporate server 26 or application server
28. This
enhances the security of the remote access system 10 by not allowing
unauthorized phone
numbers to access the communication server 18 in an attempt to gain illegal
entry. Yet
another modification may be to include User ID and password log in resulting
in a further
level of security being provided to the company network. Yet another
modification may
be to randomly generate a password such that an access port only allows access
from the
client computer's IP address using said password. Another security enhancement
may be
to include dial back security. In this manner, the communication server 18
disconnects the
initial call, looks up the user's phone number and dials the client computer
12.
According to another embodiment of the present invention, there is
provided the application of this invention to "Business to Business" settings
of
interconnecting at least two private networks over a public network such as
the Internet.
More than two private networks may be interconnected simultaneously over the
Internet
accordingly to the present invention. Examples of such applications include
where a
branch office network wants to connect up to head office network over the
Internet; a
customer wants to connect to supplier's database, where the supplier is
overseas, therefore
the most cost effective way to do it is via the Internet; and where a
corporate network


CA 02401985 2002-09-03
WO 01/65797 PCT/CA01/00262
needs to connect up to an ASP (application service provider) that is hosting
the company's
accounting package.
Figure 2 shows a two private network interconnection over the Internet
300, each private network (network-I 310 and network-2 340) connect to the
Internet 300
S through a communications server with a firewall server (firewall-1 312 and
firewall-2
342). When a user from network-1 310 wants to access network-2 340, firewall-I
312
calls firewall-2 342 via a secure connection 360 such as a telephone line.
Firewall-2 342
is equipped with a device 344 that detects the caller ID which checks that the
call is from
firewall-1 312 to ensure that the caller ID received, matches with the one in
the database
for the firewall that is logging in. To enhance security, firewall-2 342 may
further use
dial-back security. In other words, after the firewall-1 312 logs in, the
firewall-2 342
server hangs-up and calls firewall-1 312 server back at its telephone number
to complete
the authentication. This process of using caller ID and dial-back physically
verifies that
the callers are who they say they are.
Once firewall-1 312 has been authenticated via the secure connection 360,
firewall-2 342 sends firewall-1 312 a port number and a randomly generated
password.
Firewall-2 342 also requests and receives the IP address of Firewall-1 312.
Firewall-2 342
then opens the specified port and only allows access from Firewall-1 312 IP
address and
password to pass through it. Depending on the level of security desired, the
secure
connection 360 is severed at the end of the log in process, but it can be
maintained
throughout the entire session for enhanced security. Firewall-1 312 also
provides firewall-
2 342 with a port number and a randomly generated password for access or
return packets
from the private network of the firewall-2 342 side. Port scrambling by both
firewall-1
312 and firewall-2 342 also enhances security.
The above disclosure generally describes the present invention. A more
complete understanding can be obtained by reference to the following specific
Examples.
These Examples are described solely for purposes of illustration and are not
intended to limit
the scope of the invention. Changes in form and substitution of equivalents
are contemplated
as circumstances may suggest or render expedient. Although specific terms have
been
employed herein, such terms are intended in a descriptive sense and not for
purposes of
imitation.
Examples
The examples are described for the purposes of illustration and are not
intended to limit the scope of the invention.
SUBSTITUTE SHEET (RULE 26)


CA 02401985 2002-09-03
WO 01/65797 PCT/CA01/00262
6
For a client computer accessing a private network over a public network, in
a low security mode: the client computer is physically authenticated via a
secure
connection and caller ID or dial-back security, a firewall server sends the
client computer
a port number and password, the client computer sends the firewall server its
IP address,
handshaking between the client computer and firewall server is maintained via
the secure
channel until a high speed connection through the unsecured public network is
in place,
the secure connection is severed, and the port closes once this session is
over.
In a medium security mode: the client computer is physically authenticated
via the secure connection and caller ID or dial-back security; the firewall
server sends the
client computer a port number and password; client computer sends firewall
server its IP
address; handshaking between the client computer and firewall server is
maintained via
the secure channel until a high speed connection through the unsecured public
network is
in place; the secure connection is severed but the client computer is re-
authenticated
periodically via the secure connection (for example every 15 minutes); with
every re-
authentication the port number and password are changed; and the port is
closed once this
session is over.
In a high security mode: the client computer is physically authenticated via
the secure connection and caller ID or dial-back; firewall server sends client
computer a
port number and password; client computer sends firewall server it's IP
address;
handshaking between the client computer and firewall server is maintained via
the secure
channel until a high speed connection through the unsecured channel is in
place; the
secure connection stays active throughout the session and if the secure
connection is
severed at any time during the session the port is closed, the port number and
password are
constantly changed and the updates are sent to the client computer via the
secure
connection; and the port remains open as long as there exists a secure
connection.
For two or more private networks interconnecting over a public network,
above security levels can also be similarly set for each firewall server of
each private
network.
Although preferred embodiments of the invention have been described herein, it
will be understood by those skilled in the art that variations may be made
thereto without
departing from the spirit of the invention or the scope of the appended
claims.

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date Unavailable
(86) PCT Filing Date 2001-03-02
(87) PCT Publication Date 2001-09-07
(85) National Entry 2002-09-03
Dead Application 2007-03-02

Abandonment History

Abandonment Date Reason Reinstatement Date
2006-03-02 FAILURE TO REQUEST EXAMINATION
2006-03-02 FAILURE TO PAY APPLICATION MAINTENANCE FEE

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Application Fee $150.00 2002-09-03
Maintenance Fee - Application - New Act 2 2003-03-03 $50.00 2002-09-03
Maintenance Fee - Application - New Act 3 2004-03-02 $50.00 2004-03-01
Maintenance Fee - Application - New Act 4 2005-03-02 $50.00 2005-03-02
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
VENTURA, PAUL A.
Past Owners on Record
None
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative Drawing 2003-01-08 1 29
Cover Page 2003-01-08 1 51
Abstract 2002-09-03 1 59
Claims 2002-09-03 3 98
Drawings 2002-09-03 2 90
Description 2002-09-03 6 334
PCT 2002-09-03 25 938
Assignment 2002-09-03 3 106
Prosecution-Amendment 2002-09-03 7 224
Fees 2004-03-01 1 50
Fees 2005-03-02 2 107