System and method of providing computer networking
First Claim
Patent Images
1. A method of bypassing proxy settings of a computing device on a network wherein the proxy settings do not correspond to the network, the method comprising the steps of:
- receiving a request from the computing device in the form of a DNS or IP address;
determining if the request is directed to a proxy server;
responding to the request with the identification of a proxy server associated with the network;
receiving a request from the computing device directed to the proxy server associated with the network, after the step of responding; and
determining the level of access to the proxy server;
redirecting the computing device to a predetermined location if the level of access is determined to not include access outside of the proxy server; and
allowing the request to proceed to the proxy server associated with the network if the level of access is determined to include access outside of the proxy server.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of bypassing proxy settings of a computing device on a network wherein the proxy settings do not correspond to the network, the method comprising the steps of receiving a request from the computing device in the form of a DNS or IP address, determining if the request is directed to a proxy server and responding to the request with the identification of a proxy server associated with the network.
51 Citations
3 Claims
-
1. A method of bypassing proxy settings of a computing device on a network wherein the proxy settings do not correspond to the network, the method comprising the steps of:
-
receiving a request from the computing device in the form of a DNS or IP address; determining if the request is directed to a proxy server; responding to the request with the identification of a proxy server associated with the network; receiving a request from the computing device directed to the proxy server associated with the network, after the step of responding; and determining the level of access to the proxy server; redirecting the computing device to a predetermined location if the level of access is determined to not include access outside of the proxy server; and allowing the request to proceed to the proxy server associated with the network if the level of access is determined to include access outside of the proxy server. - View Dependent Claims (2, 3)
-
Specification