Efficient transmission of IP data using multichannel SOCKS server proxy
First Claim
1. In a data communications network, a split proxy comprising:
- a split proxy server disposed behind a firewall in a private portion of the data communications network;
a split proxy client disposed in a client computing device positioned externally to said private portion of the data communications network;
a split proxy client interface to at least one client application in said client computing device, and a split proxy server interface to at least one server application corresponding to said at least one client application in said private portion of the data communications network; and
,a tunnel established between said split proxy client and split proxy server, said tunnel hosting all Internet Protocol (IP) data traffic between said at least one client application and said at least one corresponding server application in said private portion of the data communications network.
3 Assignments
0 Petitions
Accused Products
Abstract
In a data communications network, a split proxy can include a split proxy server disposed behind a firewall in a private portion of the data communications network; a split proxy client disposed in a client computing device positioned externally to the private portion of the data communications network; a split proxy client interface to at least one client application in the client computing device, and a split proxy server interface to at least one server application corresponding to the at least one client application in the private portion of the data communications network. A tunnel can be established between the split proxy client and split proxy server. The tunnel can host all Internet Protocol (IP) data traffic between the client application and the corresponding server application in the private portion of the data communications network.
-
Citations
16 Claims
-
1. In a data communications network, a split proxy comprising:
-
a split proxy server disposed behind a firewall in a private portion of the data communications network; a split proxy client disposed in a client computing device positioned externally to said private portion of the data communications network; a split proxy client interface to at least one client application in said client computing device, and a split proxy server interface to at least one server application corresponding to said at least one client application in said private portion of the data communications network; and
,a tunnel established between said split proxy client and split proxy server, said tunnel hosting all Internet Protocol (IP) data traffic between said at least one client application and said at least one corresponding server application in said private portion of the data communications network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for processing secure data communications between a server application disposed in a private portion of a data communications network, and a client application hosted in a client computing device in a portion of the data communications network which is external to the private portion, said method comprising the steps of:
-
programming a firewall in the private portion of the data communications network to disallow communicative links between the server application and computing devices which are external to the private portion of the data communications network; socksifying the client application; configuring the client computing device to host a split SOCKS client; forming an authenticated tunnel between said split SOCKS client in the client computing device, and a split SOCKS server disposed in the private portion of the data communications network; and
,passing application data between the client application and server application over said authenticated tunnel.
-
-
9. A multichannel method for processing secure data communications between server applications disposed in a private portion of a data communications network, and socksified client applications hosted in a client computing device in a portion of the data communications network which is external to the private portion, the data communications network having a firewall separating said private and external portions, said firewall having a configuration for disallowing communicative links between the server applications and computing devices in the external portion, said method comprising the steps of:
-
establishing a communicative link between a split SOCKS client in the client computing device, and a split SOCKS server disposed in the private portion of the data communications network, said communicative link forming an authenticated tunnel; and
,establishing a sub-channel over said authenticated tunnel for each pair of client applications and server applications, wherein application data associated with each pair can be passed through said authenticated tunnel over said sub-channel. - View Dependent Claims (10, 11, 12)
-
-
13. A machine readable storage having stored thereon a computer program for processing secure data communications between server applications disposed in a private portion of a data communications network, and socksified client applications hosted in a client computing device in a portion of the data communications network which is external to the private portion, the data communications network having a firewall separating said private and external portions, said firewall having a configuration for disallowing communicative links between the server applications and computing devices in the external portion, said computer program comprising a routine set of instructions for causing the machine to perform the steps of:
-
establishing a communicative link between a split SOCKS client in the client computing device, and a split SOCKS server disposed in the private portion of the data communications network, said communicative link forming an authenticated tunnel; and
,establishing a sub-channel over said authenticated tunnel for each pair of client applications and server applications, wherein application data associated with each pair can be passed through said authenticated tunnel over said sub-channel. - View Dependent Claims (14, 15, 16)
-
Specification