×

Proxy interception

  • US 10,298,712 B2
  • Filed: 02/20/2014
  • Issued: 05/21/2019
  • Est. Priority Date: 12/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method in a proxy node for non-transparent interception, the method comprising:

  • receiving from a first node a primary request comprising an address of the first node as a source address, an address of a server node as a destination address, and a first token as an identifier of the primary request;

    storing the primary request;

    creating a secondary request based on the primary request, the secondary request comprising an address of the proxy node as a source address, the address of the server node as a destination address, and a second token as an identifier of the secondary request, wherein the secondary request is associated with the primary request;

    storing the secondary request;

    sending the secondary request to a second node;

    receiving a secondary response from the second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as a destination address, and the second token as an identifier of the secondary response;

    locating the stored secondary request based on the second token utilized with the secondary request and the secondary response;

    locating the stored primary request based on association with the stored secondary request;

    creating a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the address of the first node as a destination address, and the first token as an identifier of the primary response; and

    sending to said first node said primary response.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×