Method and Apparatus for Managing Proxy and Non-Proxy Requests In A Telecommunications Network
First Claim
Patent Images
1. A method comprising:
- determining attributes of a client connection configured for use with a telecommunications network;
comparing determined attributes with location definition information stored in a configuration file;
determining at least one user-defined location in the location definition information associated with the client connection based on the comparison;
wherein the method is performed by one or more computing devices.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for determining attributes of a client connection configured for use with a telecommunications network; comparing determined attributes with location definition information stored in a configuration file; determining at least one user-defined location in the location definition information associated with the client connection based on the comparison; wherein the method is performed by one or more computing devices.
-
Citations
20 Claims
-
1. A method comprising:
-
determining attributes of a client connection configured for use with a telecommunications network; comparing determined attributes with location definition information stored in a configuration file; determining at least one user-defined location in the location definition information associated with the client connection based on the comparison; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable medium comprising one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform:
-
determining attributes of a client connection; comparing determined attributes with location definition information stored in a configuration file; determining at least one user-defined location in the location definition information associated with the client connection based on the comparison. - View Dependent Claims (15, 16)
-
-
17. A method comprising:
-
a proxy server receiving a secure request from the edge session; the proxy server opening a connection to a web portal; the proxy server making an out-of-band request to the web portal, the out-of-band request containing proxy meta-data; the web portal using the proxy meta-data to determine a hostkey, the hostkey identifying the edge session; wherein the method is performed by one or more computing devices. - View Dependent Claims (18)
-
-
19. A non-transitory computer readable medium comprising one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to perform:
-
a proxy server receiving a secure request from the edge session; the proxy server opening a connection to a web portal; the proxy server making an out-of-band request to the web portal, the out-of-band request containing proxy meta-data; the web portal using the proxy meta-data to determine a hostkey, the hostkey identifying the edge session. - View Dependent Claims (20)
-
Specification