Systems and methods for dynamically validating remote requests within enterprise networks
First Claim
1. A computer-implemented method for dynamically validating a remote request within an enterprise network including a target system and a remote system, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- receiving, by the target system and from the remote system, the remote request for access to a portion of the target system, the target system and the remote system performing direct Peer-to-Peer (P2P) communications with one another within the enterprise network;
performing, by the target system directly with the remote system, a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising;
querying, by the target system, the remote system for contextual information about the remote system; and
in response to the query, receiving, by the target system and from the remote system, the contextual information;
determining, by the target system, a trustworthiness of the remote request based at least in part on the received contextual information; and
based on determining that the remote request is trusted, granting, by the target system and to the remote system, access to the portion of the target system.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for dynamically validating remote requests within enterprise networks may include (1) receiving, on a target system within an enterprise network, a request to access a portion of the target system from a remote system within the enterprise network, (2) performing a validation operation to determine whether the remote system is trustworthy to access the portion of the target system by (A) querying an enterprise security system to authorize the request from the remote system and (B) receiving, from the enterprise security system in response to the query, a notification indicating whether the remote system is trustworthy to access the portion of the target system, and then (3) determining whether to grant the request based at least in part on the notification received from the enterprise security system as part of the validation operation. Various other methods, systems, and computer-readable media are also disclosed.
97 Citations
18 Claims
-
1. A computer-implemented method for dynamically validating a remote request within an enterprise network including a target system and a remote system, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving, by the target system and from the remote system, the remote request for access to a portion of the target system, the target system and the remote system performing direct Peer-to-Peer (P2P) communications with one another within the enterprise network; performing, by the target system directly with the remote system, a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising; querying, by the target system, the remote system for contextual information about the remote system; and in response to the query, receiving, by the target system and from the remote system, the contextual information; determining, by the target system, a trustworthiness of the remote request based at least in part on the received contextual information; and based on determining that the remote request is trusted, granting, by the target system and to the remote system, access to the portion of the target system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for dynamically validating a remote request within an enterprise network that includes a target system and a remote system, the system comprising:
-
a request module, stored in memory in the target system, that receives from the remote system the remote request for access to a portion of the target system, the target system and the remote system performing direct Peer-to-Peer (P2P) communications with one another within the enterprise network; a validation module, stored in the memory in the target system, that performs a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising; querying, by the target system, the remote system for contextual information about the remote system; and in response to the query, receiving, by the target system and from the remote system, the contextual information; a security module, stored in the memory in the target system, that determines a trustworthiness of the remote request based at least in part on the received contextual information, and that grants to the remote system access to the portion of the target system based on determining that the remote request is trusted; and at least one physical processor that executes the request module, the validation module, and the security module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
receive, by a target system and from a remote system, a remote request for access to a portion of the target system, the target system and the remote system performing direct Peer-to-Peer (P2P) communications with one another within an enterprise network; perform, by the target system directly with the remote system, a validation operation to determine whether the remote system is trustworthy to access the portion of the target system, the validation operation comprising; querying, by the target system, the remote system for contextual information about the remote system; and in response to the query, receiving, by the target system and from the remote system, the contextual information; determine, by the target system, a trustworthiness of the remote request based at least in part on the received contextual information; and based on determining that the remote request is trusted, grant, by the target system and to the remote system, access to the portion of the target system. - View Dependent Claims (18)
-
Specification