External access to protected device on private network
First Claim
Patent Images
1. A reverse proxy network communication scheme comprising:
- a proxy agent located inside a protected network addressable by a least one internal network device, the proxy agent establishing outgoing network connections;
a security device through which all traffic between the protected network and external networks must travel, the security device permitting at least outgoing connections via at least one predetermined network protocol;
an external proxy server outside the protected network and reachable by the proxy agent via outgoing network connections through the security device, the external proxy server also being addressable by at least one external network device, thereby allowing communication between the at least one external network device and the at least one internal network device.
5 Assignments
0 Petitions
Accused Products
Abstract
A scheme allowing communication between a network device on a protected network and an external network device outside the protected network using “reverse proxying.” A proxy server receives incoming data on behalf of the protected network device, which data is retrieved by a proxy agent that periodically polls the proxy server to see if any data awaits retrieval.
120 Citations
23 Claims
-
1. A reverse proxy network communication scheme comprising:
-
a proxy agent located inside a protected network addressable by a least one internal network device, the proxy agent establishing outgoing network connections;
a security device through which all traffic between the protected network and external networks must travel, the security device permitting at least outgoing connections via at least one predetermined network protocol;
an external proxy server outside the protected network and reachable by the proxy agent via outgoing network connections through the security device, the external proxy server also being addressable by at least one external network device, thereby allowing communication between the at least one external network device and the at least one internal network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of accessing an internal network device on a protected network, the network including a security device, the method comprising:
-
storing data addressed to the internal network device in an external proxy server;
maintaining a proxy agent on the protected network, the proxy agent executing the step of;
polling the external proxy server for data addressed to the internal network device;
forwarding to the internal network device any data on the external proxy server and addressed to the internal network device; and
forwarding to the external proxy server any data addressed to an external device in communication with the external proxy server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification