TECHNIQUES FOR ANONYMOUS INTERNET ACCESS
First Claim
1. A machine-implemented method, comprising:
- inspecting an Internet Protocol (IP) address that originates from a principal and that is directed to an external resource located over the Internet from the principal;
evaluating a policy in response to the IP address of the external resource;
selecting a particular anonymizer from a list of available anonymizers in response to the policy evaluation; and
establishing a secure connection between the principal and the particular anonymizer for the particular anonymizer to access the external resource on behalf of the principal.
11 Assignments
0 Petitions
Accused Products
Abstract
Techniques are presented for anonymous Internet access. Internet requests are intercepted within a firewalled environment before being routed over the Internet to destination sites. Each Internet requests is evaluated in view of policy and one or more anonymizers are selected in response to that evaluation. The Internet requests are then routed through the appropriate anonymizers for processing to the destination sites. A relationship between an Internet Protocol (IP) address associated with the firewalled environment and IP addresses of the destination sites is masked and hidden via the anonymizers from Internet observers. Moreover, a secure communication between the firewalled environment and the anonymizers is maintained.
-
Citations
24 Claims
-
1. A machine-implemented method, comprising:
-
inspecting an Internet Protocol (IP) address that originates from a principal and that is directed to an external resource located over the Internet from the principal; evaluating a policy in response to the IP address of the external resource; selecting a particular anonymizer from a list of available anonymizers in response to the policy evaluation; and establishing a secure connection between the principal and the particular anonymizer for the particular anonymizer to access the external resource on behalf of the principal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine-implemented method, comprising:
-
receiving a request to access an external resource over the Internet from a user within a firewall environment; determining in response to a policy that the request is to be masked when routed over the Internet; and routing the request through an anonymizer that hides a relationship between the user and the external resource from network onlookers. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, comprising:
-
a policy store residing in a computer-readable medium and accessible to an anonymizer selection service; and the anonymizer selection service implemented in a computer-readable medium and to process on a proxy machine within a firewalled environment, wherein the proxy acts as an intermediate to Internet access from and to the firewalled environment; wherein the anonymizer selection service intercepts uniform resource locator (URL) link requests from users within the firewalled environment that are directed to external world-wide web (WWW) sites and acquires policies from the policy store, the policies are evaluated to determine when particular URL requests are to be re-routed through anonymizers to mask an Internet Protocol (IP) address of the firewalled environment from where the URL requests originate. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A computer-implemented system, comprising:
-
a proxy implemented on a server machine within a firewalled environment and that handles traffic exiting the firewalled environment over an Internet connection and entering the firewalled environment from the Internet; and an anonymizer implemented on a machine outside the firewalled environment over the Internet; wherein the proxy uses policies to determine when Internet requests that emanate from within the firewalled environment are to be processed via the anonymizer and routed through the anonymizer. - View Dependent Claims (22, 23, 24)
-
Specification