Firewall tunneling and security service
First Claim
1. A system that facilitates data sharing, comprising:
- a request component that receives a request to access data stored behind a firewall;
an authorization component that verifies if the request is associated with a key that permits access to the data;
a permissions component that determines one or more levels of access permitted to entities outside the firewall including a complete access level and a plurality of limited access levels; and
a classifier that automatically performs load balancing of the data sharing process, learning a level of access of the requestor, determining levels of priority for scheduling the sharing of the data, and analyzing content of the data to determine permission levels.
2 Assignments
0 Petitions
Accused Products
Abstract
A data-sharing scheme between entities disposed behind respective firewalls. A sharer of the data subscribes to a public service that enables a secure connection (similar to a peer-to-peer network) between at least one requestor and the data sharer. By subscribing, the sharer provides information to the service that enables the service to generate a private key. When the request is received from the requestor, the service retrieves the corresponding private key, authenticates the requestor, and transmits the key to the requestor thereby facilitating a secure tunnel for communicating the shared data. The requestor can then access the data directly from the sharer without the need for copying or moving the shared data to a server outside the firewall or for emailing.
88 Citations
32 Claims
-
1. A system that facilitates data sharing, comprising:
-
a request component that receives a request to access data stored behind a firewall; an authorization component that verifies if the request is associated with a key that permits access to the data; a permissions component that determines one or more levels of access permitted to entities outside the firewall including a complete access level and a plurality of limited access levels; and a classifier that automatically performs load balancing of the data sharing process, learning a level of access of the requestor, determining levels of priority for scheduling the sharing of the data, and analyzing content of the data to determine permission levels. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system that facilitates the sharing of data, comprising:
-
a request component that receives a request from a requestor to access data stored behind a firewall; a communications component that establishes a secure tunnel from the data to the requestor of the data; and a classifier that automatically performs load balancing of the data sharing process, learning a level of access of the requestor, determining levels of priority for scheduling the sharing of the data, and analyzing content of the data to determine permission levels. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method that facilitates data sharing, comprising:
-
receiving a request from a requestor to access data of a sharer stored behind a firewall; verifying if the request is associated with a key that permits access to the data; determining one or more levels of access for the requestor; establishing a secure tunnel between a sharer of the data and the requestor; and transmitting rules data with the shared data such that the shared data can be manipulated only in conformity with the rules data. - View Dependent Claims (22, 23, 24)
-
-
25. A system that facilitates data sharing, comprising:
-
means for receiving a plurality of requests from at least one requestor to access data of a sharer stored behind a firewall; means for routing the plurality of requests to one or more available services; means for verifying if the request is associated with a key that permits access to the data; means for establishing a secure tunnel between a sharer of the data and the requestor; and means for automatically estimating a level of security of an environment of the sharer in which the data is stored. - View Dependent Claims (26, 27)
-
-
28. A computer-readable medium having computer-executable instructions for performing a method of sharing data, the method comprising:
-
receiving a request from a requestor to access data of a sharer stored behind a firewall; verifying if the request is associated with a key that permits access to the data; determining one or more levels of access for the requestor; and establishing a secure tunnel between a sharer of the data and the requestor, wherein the requestor must store the data with at least the same level of security in which the data is stored at the sharer. - View Dependent Claims (29, 30, 31, 32)
-
Specification