Handling Proxy Requests in a Computing System
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving a communication request;
identifying the communication request as a proxy request;
generating a fake SID for the communication request; and
transmitting the proxy request using the generated fake SID.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer-program products receive a communication request, identify the communication request as a proxy request, generate a fake SID for the communication request, and transmit the proxy request using the generated fake SID.
18 Citations
33 Claims
-
1. A computer-implemented method comprising:
-
receiving a communication request; identifying the communication request as a proxy request; generating a fake SID for the communication request; and transmitting the proxy request using the generated fake SID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 17, 18, 19)
-
-
13. A computer-implemented method comprising:
-
transmitting a communication request, the communication request comprising a proxy request; receiving a fake SID in response to the communication request, the fake SID generated by a tunneling service; transmitting the proxy request on the tunneling service using the generated fake SID. - View Dependent Claims (14, 15, 16)
-
-
20. A system, comprising:
-
a computing device; and a tunneling service operable to interact with the computing device and operable to perform operations comprising; receiving a communication request from the computing device; identifying the communication request as a proxy request; generating a fake SID for the communication request; transmitting the proxy request using the generated fake SID. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer program product, encoded on a computer-readable medium, operable to cause a data processing apparatus to perform operations comprising:
-
receiving a communication request; identifying the communication request as a proxy request; generating a fake SID for the communication request; and transmitting the proxy request using the generated fake SID. - View Dependent Claims (33)
-
Specification