NETWORK ARCHITECTURE FOR SECURE DATA COMMUNICATIONS
First Claim
1. A method for secure data communications, comprising:
- receiving an indication of a data communication from an external network to a perimeter network, wherein the perimeter network includes one or more external edge nodes, one or more internal edge nodes and a plurality of proxy servers connected between the one or more external edge nodes and the one or more internal edge nodes;
selecting one of the plurality of proxy servers to receive the data communication via a first secure connection, wherein the plurality of proxy servers are configured with substantially similar configuration information;
receiving at least a portion of the data communication over the first secure connection via one or more external edge nodes and the selected proxy server; and
when the selected proxy server becomes unavailable, selecting another one of the plurality of proxy servers to receive a remaining portion of the data communication over the first secure connection.
1 Assignment
0 Petitions
Accused Products
Abstract
A network architecture includes a perimeter network connected between an internal network and an external network. The perimeter network includes one or more external edge nodes that are connected to the external network and a plurality of proxy servers that are each connected to one or more of the external edge nodes. One or more internal edge nodes are connected between the plurality of proxy servers and the internal network. The proxy servers are operable to establish a first secure connection between a destination through the external network and a second secure connection to a destination in the internal network. Each of the plurality of proxy servers provide a substantially identical identification for authentication when establishing the first and second secure connections.
-
Citations
20 Claims
-
1. A method for secure data communications, comprising:
-
receiving an indication of a data communication from an external network to a perimeter network, wherein the perimeter network includes one or more external edge nodes, one or more internal edge nodes and a plurality of proxy servers connected between the one or more external edge nodes and the one or more internal edge nodes; selecting one of the plurality of proxy servers to receive the data communication via a first secure connection, wherein the plurality of proxy servers are configured with substantially similar configuration information; receiving at least a portion of the data communication over the first secure connection via one or more external edge nodes and the selected proxy server; and when the selected proxy server becomes unavailable, selecting another one of the plurality of proxy servers to receive a remaining portion of the data communication over the first secure connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A network system, comprising:
-
one or more external edge nodes connected to an external network; one or more internal edge nodes connected to an internal network; and a plurality of proxy servers connected between the external edge nodes and the internal edge nodes, wherein each of the plurality of proxy servers are operable to receive data communications over a first secure connection from the external network and transmitting the data communications over a second secure connection to the internal network. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification