Providing security for external access to a protected computer network
First Claim
Patent Images
1. A method of sending a request, comprising:
- receiving via an external network an external request sent using a first security procedure, wherein the external request comprises a request from a requesting party for response data associated with an internal computer system associated with an internal network;
normalizing at least a portion of the external request into a common format;
applying a decision tree to the normalized external request to determine an action to take in response to the external request; and
sending to the internal computer system, after applying the decision tree to the normalized external request and using a second security procedure based at least in part on the results of the application of the decision tree, an internal request for said response data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for providing controlled access via an external network to a resource residing on an internal network. An external request addressed to a first computer system associated with the internal network is received at the first computer system via the external network. The external request comprises a request from a requesting party for response data from a second computer system associated with the internal network. At least part of the content of the external request is analyzed at the first computer system to determine whether the request is authorized. If it is determined that the request is authorized, the request is processed.
-
Citations
19 Claims
-
1. A method of sending a request, comprising:
-
receiving via an external network an external request sent using a first security procedure, wherein the external request comprises a request from a requesting party for response data associated with an internal computer system associated with an internal network; normalizing at least a portion of the external request into a common format; applying a decision tree to the normalized external request to determine an action to take in response to the external request; and sending to the internal computer system, after applying the decision tree to the normalized external request and using a second security procedure based at least in part on the results of the application of the decision tree, an internal request for said response data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for sending a request, comprising:
-
an external network interface configured to receive an external request sent using a first security procedure and to normalize at least a portion of the external request into a common format, wherein the external request comprises a request from a requesting party for response data associated with an internal computer system associated with an internal network; and one or more processors coupled to the external network interface and configured to apply a decision tree to the normalized external request to determine an action to take in response to the external request, the process being further configured to send to the internal computer system, after applying the decision tree to the normalized external request and using a second security procedure based at least in part on the results of the application of the decision tree, an internal request for said response data. - View Dependent Claims (15, 16, 17)
-
-
18. A computer program product for sending a request, the computer program product being embodied in a computer readable storage medium and comprising computer instructions for:
-
receiving via an external network an external request sent using a first security procedure, wherein the external request comprises a request from a requesting party for response data associated with an internal computer system associated with an internal network; normalizing at least a portion of the external request into a common format; applying a decision tree to the normalized external request to determine an action to take in response to the external request; and sending to the internal computer system, after applying the decision tree to the normalized external request and using a second security procedure based at least in part on the results of the application of the decision tree, an internal request for said response data. - View Dependent Claims (19)
-
Specification