Securing Communication over a Network Using Client System Authorization and Dynamically Assigned Proxy Servers
First Claim
1. A method for securing communication over a network, comprising:
- at a trust broker system having one or more processors and memory storing one or more programs for execution by the one or more processors;
receiving a request to connect to applications and resources from a client system;
determining whether the client system is authorized to connect to the requested applications and resources; and
in response to determining the client system has authorization to connect to the requested applications and resources;
determining, from a plurality of potential proxy servers, a proxy server associated with the requested applications and resources;
transmitting an identification value for the client system to the determined proxy server;
transmitting the identification value to the client system; and
transmitting contact information for the determined proxy server to the client system, wherein all communication between the client system and the trust broker system for the requested applications and resources passes through the proxy server.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for securing communication over a network is disclosed. A trust broker system receives a request to connect to applications and resources from a client system. The trust broker system determines whether the client system is authorized to connect to the requested applications and resources. In response to determining the client system has authorization to connect to the requested applications and resources, the trust broker system determines, from a plurality of potential proxy servers, a proxy server associated with the requested server system and transmits an identification value for the client system to the requested server system. The trust broker system then transmits the identification value to the client system and transmits contact information for the determined proxy server to the client system, wherein all communication between the client system and the requested server system passes through the proxy server.
-
Citations
18 Claims
-
1. A method for securing communication over a network, comprising:
at a trust broker system having one or more processors and memory storing one or more programs for execution by the one or more processors; receiving a request to connect to applications and resources from a client system; determining whether the client system is authorized to connect to the requested applications and resources; and in response to determining the client system has authorization to connect to the requested applications and resources; determining, from a plurality of potential proxy servers, a proxy server associated with the requested applications and resources; transmitting an identification value for the client system to the determined proxy server; transmitting the identification value to the client system; and transmitting contact information for the determined proxy server to the client system, wherein all communication between the client system and the trust broker system for the requested applications and resources passes through the proxy server. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. An electronic device for securing communication over a network, comprising:
-
one or more processors; memory storing one or more programs to be executed by the one or more processors; the one or more programs comprising instructions for; receiving a request to connect to applications and resources from a client system; determining whether the client system is authorized to connect to the requested applications and resources; and in response to determining the client system has authorization to connect to the requested applications and resources; determining, from a plurality of potential proxy servers, a proxy server associated with the requested applications and resources; transmitting an identification value for the client system to the determined proxy server; transmitting the identification value to the client system; and transmitting contact information for the determined proxy server to the client system, wherein all communication between the client system and the trust broker system for the requested applications and resources passes through the proxy server. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium storing one or more programs configured for execution by an electronic device with a camera, the one or more programs comprising instructions for:
-
receiving a request to connect to applications and resources from a client system; determining whether the client system is authorized to connect to the requested applications and resources; and in response to determining the client system has authorization to connect to the requested applications and resources; determining, from a plurality of potential proxy servers, a proxy server associated with the requested applications and resources; transmitting an identification value for the client system to the determined proxy server; transmitting the identification value to the client system; and transmitting contact information for the determined proxy server to the client system, wherein all communication between the client system and the trust broker system for the requested applications and resources passes through the proxy server. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification