Secure network resource access system
First Claim
1. A secure network resource access system for facilitating network access by network terminals to network resources located behind an enterprise firewall, the secure network resource access system comprising:
- a proxy server located logically outside the enterprise firewall for receiving application data from the network terminals; and
a polling server located logically behind the enterprise firewall, the polling server being configured for polling the proxy server to initiate transmission of the received application data from the proxy server to the polling server.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure network resource access system facilitates network access by network terminals to network resources located behind an enterprise firewall, and comprises a proxy server and a polling server. The proxy server is located logically outside the enterprise firewall for receiving application data from the network terminals. The polling server is located logically behind the enterprise firewall, and is configured to poll the proxy server to initiate transmission of the received application data from the proxy server to the polling server, to receive application data and associated network resource data from the proxy server in response to the poll, and to direct the application data to one of the network resources in accordance with the associated network resource data.
86 Citations
4 Claims
-
1. A secure network resource access system for facilitating network access by network terminals to network resources located behind an enterprise firewall, the secure network resource access system comprising:
-
a proxy server located logically outside the enterprise firewall for receiving application data from the network terminals; and
a polling server located logically behind the enterprise firewall, the polling server being configured for polling the proxy server to initiate transmission of the received application data from the proxy server to the polling server. - View Dependent Claims (2)
-
-
3. A method for facilitating secure network access by network terminals to network resources located behind an enterprise firewall, the method comprising the steps of:
-
polling a proxy server located logically outside the enterprise firewall for requests for communication with the network resources;
receiving application data and associated network resource data from the proxy server in response to the polling step; and
directing the application data to one of the network resources in accordance with the associated network resource data. - View Dependent Claims (4)
-
Specification