1
Anand Subramaniam, Hashem M Ebrahimi: Secure intranet access. Novell, Computer Law, June 27, 2000: US06081900 (400 worldwide citation)

Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external cli ...


2
Anand Subramaniam, Hashem M Ebrahimi: Secure intranet access. Novell, Schwegman Lundberg Woessner & Kluth P A, October 28, 2003: US06640302 (157 worldwide citation)

Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external cli ...


3
Anand Subramaniam, Hashem M Ebrahimi: Secure intranet access. Novell, Schwegman Lundberg Woessner & Kluth P A, September 27, 2005: US06950936 (104 worldwide citation)

Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external cli ...


4
Hashem M Ebrahimi, Stephen R Carter, Mel J Oyler: Techniques for managing secure communications. Novell, Schwegman Lundberg & Woessner P A, November 22, 2011: US08065720 (18 worldwide citation)

Methods and systems for managing secure communications are provided. An external client establishes secure communications with a secure site. During the secure session, the external client attempts to access potentially insecure references. These potentially insecure references are inspected before ...


5
Anand Subramaniam, Hashem M Ebrahimi: Secure intranet access. Novell, Schwegman Lundberg Woessner & Kluth Pa, March 11, 2004: US20040049702-A1

Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external cli ...