1
Hashem Mohammad Ebrahimi, Robert Drew Major: Brokering state information and identity among user agents, origin servers, and proxies. Novell, Schwegman Lundberg & Woessner P A, May 31, 2011: US07954144 (79 worldwide citation)

Methods, signals, devices, and systems are provided for using proxy servers to transparently forward messages between clients and origin servers if, and only if doing so does not violate network policies. In some systems, a transparent proxy uses a combination of standard-format HTTP commands, embed ...


2
Hashem Mohammad Ebrahimi, Bradley W Rupp, Mel J Oyler: Single sign-on with basic authentication for a transparent proxy. Novell, Schwegman Lundberg & Woessner P A, September 7, 2010: US07793342 (46 worldwide citation)

Methods, systems, and data structures are provided for single sign-on with basic authentication on a transparent proxy. A user accesses a client to issue requests for content on an origin server. The transparent proxy requires user authentication before access can be granted to the origin server. Th ...


3
Hashem Mohammad Ebrahimi, Baber Amin, Mark D Ackerman: Techniques for securely accelerating external domains locally. Novell, Schwegman Lundberg & Woessner P A, March 8, 2011: US07904951 (22 worldwide citation)

Techniques are provided for securely accelerating external domains locally. Secure client requests directed to an external domain are forwarded to a local domain accelerator. The local domain accelerator communicates securely with the client as if it were the external domain. The local domain accele ...


4
Hashem Mohammad Ebrahimi, Mark D Ackerman, Carolyn B McClain: Proxy authentication. Novell, Schwegman Lundberg & Woessner P A, March 16, 2010: US07681229 (17 worldwide citation)

Techniques are provided for proxy authentication. A proxy includes a first port, a second port, and a secure port; each port processing a different service. Requests received on the first and second ports which require authentication are redirected to the secure port. The secure port processes an au ...


5
Stephen R Carter, Lloyd Leon Burch, Hashem Mohammad Ebrahimi, Carolyn B McClain: Privileged network routing. Novell, Schwegman Lundberg & Woessner P A, May 20, 2008: US07376134 (16 worldwide citation)

Techniques are provided for establishing privileged paths for data packets over a network. A data packet is received with a header; the header includes a route selector. The route selector assists in resolving a privileged path for the data packet. The data packet is injected into the network over t ...


6
Hashem Mohammad Ebrahimi, Baber Amin, Stephen R Carter, Scott William Pathakis, Robert Skousen Stilmar: Techniques for preserving content during a redirection for authentication. Novell, Schwegman Lundberg & Woessner P A, February 19, 2008: US07334257 (16 worldwide citation)

Techniques are provided for preserving content during a network transaction. A client issues a content-bearing request to a desired service. At the time the request is issued, the client is not authenticated to the service. The content associated with the content-bearing request is preserved and ass ...


7
Hashem Mohammad Ebrahimi, Mark D Ackerman, Mel J Oyler: Techniques for securely managing and accelerating data delivery. Novell, Schwegman Lundberg & Woessner P A, November 15, 2011: US08060926 (9 worldwide citation)

Techniques are provided for securely managing and accelerating the delivery of data associated with remote sites. A client desires to establish secure communications with a remote site. Requests made from the client to the remote site are intercepted or forwarded to a proxy, which locates a local ma ...


8
Baber Amin, Hashem Mohammad Ebrahimi: Computer network having a security layer interface independent of the application transport mechanism. Novell, Schwegman Lundberg & Woessner P A, March 10, 2009: US07502922 (7 worldwide citation)

An architecture for secure network communications includes a security layer sandwiched between an upper connection layer and a lower connection layer. An application program need not deal directly with the details of security handshakes, encryption, and decryption. Instead, the application sends pla ...


9
Hashem Mohammad Ebrahimi, Robert Drew Major: Brokering state information and identity among user agents, origin servers, and proxies. Novell, Schwegman Lundberg & Woessner P A, September 30, 2014: US08850017 (3 worldwide citation)

Methods, signals, devices, and systems are provided for using proxy servers to transparently forward messages between clients and origin servers if, and only if, doing so does not violate network policies. In some systems, a transparent proxy uses a combination of standard-format HTTP commands, embe ...


10
Mark D Ackerman, Hashem Mohammad Ebrahimi, Baber Amin: Secure transparent virtual private networks. Novell, Schwegman Lundberg & Woessner P A, April 1, 2008: US07353537 (2 worldwide citation)

Techniques are provided for managing communications associated with Virtual Private Networks (VPNs). One or more local clients who attempt to communicate with one or more remote clients via a VPN are serviced by local and remote transparent VPN services. The services intercept VPN communications and ...