INTERNET-BASED PROXY SECURITY SERVICES
First Claim
1. A method in a proxy server, comprising:
- receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities, and wherein the proxy server and the plurality of origin servers are owned by different entities;
analyzing the request to determine whether a visitor belonging to the request poses a threat;
responsive to a determination that the visitor belonging to the request poses a threat, performing the following;
blocking the request, andtransmitting a block page to the client device that indicates that the request has been blocked.
0 Assignments
0 Petitions
Accused Products
Abstract
A proxy server receives from a client device a request to perform an action on an identified resource that is hosted at an origin server for a domain. The proxy server receives the request as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server and the origin servers are owned by different entities. The proxy server analyzes the request to determine whether a visitor belonging to that request poses a threat. If the proxy server determines that the visitor poses a threat, the proxy server blocks the request and transmits a block page to the client device that indicates that the request has been blocked.
-
Citations
27 Claims
-
1. A method in a proxy server, comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities, and wherein the proxy server and the plurality of origin servers are owned by different entities; analyzing the request to determine whether a visitor belonging to the request poses a threat; responsive to a determination that the visitor belonging to the request poses a threat, performing the following; blocking the request, and transmitting a block page to the client device that indicates that the request has been blocked. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A proxy server, comprising:
-
a memory to store instructions; a processor coupled with the memory to process the stored instructions to; receive, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities, and wherein the proxy server and the plurality of origin servers are owned by different entities; analyze the request to determine whether a visitor belonging to the request poses a threat; responsive to a determination that the visitor belonging to the request poses a threat, perform the following; block the request, and transmit a block page to the client device that indicates that the request has been blocked. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor, cause said processor to perform operations comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities, and wherein the proxy server and the plurality of origin servers are owned by different entities; analyzing the request to determine whether a visitor belonging to the request poses a threat; responsive to a determination that the visitor belonging to the request poses a threat, performing the following; blocking the request, and transmitting a block page to the client device that indicates that the request has been blocked. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification