×

Rule-based routing to resources through a network

  • US 10,003,576 B2
  • Filed: 06/13/2016
  • Issued: 06/19/2018
  • Est. Priority Date: 12/10/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for routing requests to a resource in a computer network, the method comprising:

  • receiving, using hardware processor, a redirection rule list at a client device from a redirection rule server in the computer network, wherein the redirection rule list includes a redirection rule specifying that resource requests having an identified spoofed address are to be forwarded to a first resource server;

    sorting the redirection rule list by the client device;

    obtaining an existing Proxy Auto Configuration (PAC) file and logic associated with an evaluation logic template;

    merging the sorted redirection rule list, the existing PAC file, and the logic associated with the evaluation logic template to create a new PAC file,initializing a local circuit proxy at the client device;

    registering the new PAC file to enable redirection of Virtual Private Network (VPN) resource access requests;

    receiving a request to access a first resource at the first resource server in the computer network;

    evaluating the request to access the first resource at the first resource server in the computer network via execution of the logic associated with the evaluation logic template included in the new PAC file to determine whether the request includes the identified spoofed address; and

    processing the evaluated request,wherein the processing of the evaluated request when the evaluated request includes the identified spoofed address includes;

    providing the identified spoofed address to the local circuit proxy at the client device for accessing the first resource at the first resource server in the computer network via a VPN connection based on the new PAC file that enables the redirection of the VPN resource access requests, wherein the identified spoofed address is mapped to a second address in the computer network that corresponds to the first resource at the first resource server in the computer network; and

    forwarding the evaluated request to a server associated with the second address in the computer network according to the redirection rule mapping of the identified spoofed address to the second address, wherein the evaluated request is forwarded by the local circuit proxy at the client device over the computer network to the server associated with the second address in the computer network, and the first resource is accessed from the server in the computer network according to the redirection rule via the VPN connection based on the forwarded evaluated request; and

    wherein the processing of the evaluated request when the evaluated request does not include the identified spoofed address includes;

    matching a resource identifier referenced in the evaluated request against an address rule list, andredirecting the evaluated request via the local circuit proxy of the client device based on the matched resource identifier in the address rule list.

View all claims
  • 17 Assignments
Timeline View
Assignment View
    ×
    ×