×

PROXY INTERCEPTION

  • US 20160337464A1
  • Filed: 02/20/2014
  • Published: 11/17/2016
  • Est. Priority Date: 12/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method in a proxy node for non-transparent interception, the method comprising:

  • receiving from a first node a primary request comprising an address of the first node as a source address, an address of a server node as destination address, and an identifier of the primary request;

    creating a secondary request based on the primary request, the secondary request comprising an address to the proxy node as a source address, the address of the server node as destination address, and an identifier of the second request;

    sending the secondary request to the server node;

    receiving a secondary response from a second node, said secondary response comprising an address of the second node as a source address, the address of the proxy node as destination address, and an identifier of the secondary response;

    checking whether the secondary response matches the secondary request;

    when the secondary response matches the secondary request,identifying the primary request on which the secondary request is based;

    creating a primary response based on the primary request and the secondary response, said primary response comprising the address of the proxy node as a source address, the source address of the primary request as destination address of the primary response, and the identifier of the primary request; and

    sending to said first node said primary response.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×