Systems and methods for dynamically validating remote requests within enterprise networks
First Claim
1. A computer-implemented method for dynamically validating a remote request within an enterprise network including a target system, a remote system, and a server, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- receiving, by the target system and from the remote system, the remote request for access to a portion of the target system, the target system and the remote system being host systems that perform direct Peer-to-Peer (P2P) communications with one another within the enterprise network;
performing a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising;
querying, by the target system, an enterprise security system included in the server to authorize the remote request from the remote system;
receiving, by the target system and from the enterprise security system in response to the query, a notification indicating whether the remote system is trustworthy to access the portion of the target system, the notification based at least in part on contextual information about the remote request, the remote system sending the contextual information to the server, and the remote system sending, by way of P2P communications, the remote request to the target system at approximately the same time; and
determining, by the target system, whether to grant the remote request from the remote system based at least in part on the notification received from the enterprise security system; and
based on the notification indicating that the remote system is trustworthy, allowing, by the target system, the remote system access to the portion of the target system.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for dynamically validating remote requests within enterprise networks may include (1) receiving, on a target system within an enterprise network, a request to access a portion of the target system from a remote system within the enterprise network, (2) performing a validation operation to determine whether the remote system is trustworthy to access the portion of the target system by (A) querying an enterprise security system to authorize the request from the remote system and (B) receiving, from the enterprise security system in response to the query, a notification indicating whether the remote system is trustworthy to access the portion of the target system, and then (3) determining whether to grant the request based at least in part on the notification received from the enterprise security system as part of the validation operation. Various other methods, systems, and computer-readable media are also disclosed.
72 Citations
20 Claims
-
1. A computer-implemented method for dynamically validating a remote request within an enterprise network including a target system, a remote system, and a server, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving, by the target system and from the remote system, the remote request for access to a portion of the target system, the target system and the remote system being host systems that perform direct Peer-to-Peer (P2P) communications with one another within the enterprise network; performing a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising; querying, by the target system, an enterprise security system included in the server to authorize the remote request from the remote system; receiving, by the target system and from the enterprise security system in response to the query, a notification indicating whether the remote system is trustworthy to access the portion of the target system, the notification based at least in part on contextual information about the remote request, the remote system sending the contextual information to the server, and the remote system sending, by way of P2P communications, the remote request to the target system at approximately the same time; and determining, by the target system, whether to grant the remote request from the remote system based at least in part on the notification received from the enterprise security system; and based on the notification indicating that the remote system is trustworthy, allowing, by the target system, the remote system access to the portion of the target system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for dynamically validating remote requests within enterprise networks, the system comprising:
-
a request module, stored in memory, that receives, on a target system within an enterprise network, a remote request to access a portion of the target system from a remote system included in the enterprise network, the target system and the remote system being host systems that perform direct Peer-to-Peer (P2P) communications with one another within the enterprise network; a validation module, stored in memory, that performs a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising; querying an enterprise security system included in a server included in the enterprise network to authorize the remote request from the remote system; and receiving, from the enterprise security system in response to the query, a notification indicating whether the remote system is trustworthy to access the portion of the target system, the notification based at least in part on contextual information about the remote request, the remote system sending the contextual information to the server and the remote system sending, by way of P2P communications, the remote request to the target system at approximately the same time; a security module, stored in memory, that; determines whether to grant the remote request from the remote system based at least in part on the notification received from the enterprise security system as part of the validation operation; and based on the notification indicating that the remote system is trustworthy, allows the remote system access to the portion of the target system; and at least one physical processor that executes the request module, the validation module, and the security module. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
receive, by a target system and from a remote system, a request for access to a portion of the target system, the target system and the remote system being host systems that perform direct Peer-to-Peer (P2P) communications with one another within an enterprise network; perform a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising; querying, by the target system, an enterprise security system included in a server to authorize the remote request from the remote system; and receiving, by the target system and from the enterprise security system in response to the query, a notification indicating whether the remote system is trustworthy to access the portion of the target system, the notification based at least in part on contextual information about the remote request, the remote system sending the contextual information to the server, and the remote system sending, by way of P2P communications, the remote request to the target system at approximately the same time; and determining, by the target system, whether to grant the remote request from the remote system based at least in part on the notification received from the enterprise security system; and based on the notification indicating that the remote system is trustworthy, allow, by the target system, the remote system access to the portion of the target system. - View Dependent Claims (19, 20)
-
Specification