Firewall tunneling and security service
First Claim
1. A system that facilitates data sharing, comprising:
- a request component that receives a request to access data stored behind a firewall; and
an authorization component that verifies if the request is associated with a key that permits access to the data.
2 Assignments
0 Petitions
Accused Products
Abstract
A data-sharing scheme between entities disposed behind respective firewalls. A sharor of the data subscribes to a public service that enables a secure connection (similar to a peer-to-peer network) between at least one requester and the data sharor. By subscribing, the sharor provides information to the service that enables the service to generate a private key. When the request is received from the requester, the service retrieves the corresponding private key, authenticates the requester, and transmits the key to the requestor thereby facilitating a secure tunnel for communicating the shared data. The requestor can then access the data directly from the sharor without the need for copying or moving the shared data to a server outside the firewall or for emailing.
-
Citations
39 Claims
-
1. A system that facilitates data sharing, comprising:
-
a request component that receives a request to access data stored behind a firewall; and
an authorization component that verifies if the request is associated with a key that permits access to the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system that facilitates the sharing of data, comprising:
-
a request component that receives a request from a requestor to access data stored behind a firewall; and
a communications component that establishes a secure tunnel from the data to the requestor of the data. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method that facilitates data sharing, comprising:
-
receiving a request from a requestor to access data of a sharor stored behind a firewall;
verifying if the request is associated with a key that permits access to the data;
determining one or more levels of access for the requester; and
establishing a secure tunnel between a sharor of the data and the requestor. - View Dependent Claims (26, 27, 28, 29)
-
-
30. A system that facilitates data sharing, comprising:
-
means for receiving a plurality of requests from at least one requestor to access data of a sharor stored behind a firewall;
means for routing the plurality of requests to one or more available services;
means for verifying if the request is associated with a key that permits access to the data; and
means for establishing a secure tunnel between a sharor of the data and the requestor. - View Dependent Claims (31, 32, 33)
-
-
34. A computer-readable medium having computer-executable instructions for performing a method of sharing data, the method comprising:
-
receiving a request from a requestor to access data of a sharor stored behind a firewall;
verifying if the request is associated with a key that permits access to the data;
determining one or more levels of access for the requester; and
establishing a secure tunnel between a sharor of the data and the requester. - View Dependent Claims (35, 36, 37, 38, 39)
-
Specification