Web resource request processing
First Claim
Patent Images
1. An intermediary server system, at least partially implemented in hardware, comprising:
- a web server that receives, from client devices via a network, requests for resources;
a protocol handler, operatively connected to the web server, to;
receive the requests for resources,modify the requests to be directed to designated remote servers via a private network, andforward the modified requests for resources to the designated remote servers; and
a content transformer, operatively connected to the protocol handler, to;
receive the resources supplied by the designated remote servers in response to the modified requests,modify particular links, contained in the resources, to be directed to the intermediary server system instead of the designated remote servers, andinsert code into at least one of the resources, the code enabling operations provided by the intermediary server system.
0 Assignments
0 Petitions
Accused Products
Abstract
Improved approaches for providing secure remote access to email resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to email on a mail server within a private network through a common access point. The solution provided by the improved approaches allow not only native access to email resources but also robust authentication approaches.
-
Citations
31 Claims
-
1. An intermediary server system, at least partially implemented in hardware, comprising:
-
a web server that receives, from client devices via a network, requests for resources; a protocol handler, operatively connected to the web server, to; receive the requests for resources, modify the requests to be directed to designated remote servers via a private network, and forward the modified requests for resources to the designated remote servers; and a content transformer, operatively connected to the protocol handler, to; receive the resources supplied by the designated remote servers in response to the modified requests, modify particular links, contained in the resources, to be directed to the intermediary server system instead of the designated remote servers, and insert code into at least one of the resources, the code enabling operations provided by the intermediary server system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, executing on an intermediary server, implemented at least partially in hardware, for accessing resources on a private network via the intermediary server including a web server, a protocol handler, and a content transformer, the method comprising:
-
receiving, at the web server, requests for resources, from client devices via a network, and sending the requests for resources to the protocol handler; modifying, by the protocol handler, the requests for resources to be directed to designated remote servers via a private network and forwarding the modified requests for resources to the designated remote servers; and receiving, at the content transformer, the requested resources supplied by the designated remote servers in response to the modified requests and modifying the requested resources such that at least certain links contained therein are modified to be directed to the intermediary server instead of the designated remote servers and inserting code into one of the resources, wherein the code enables operations provided by the intermediary server. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. An intermediary server, at least partially implemented in hardware, comprising:
-
a secure socket layer (SSL) to receive a login request from a remote user for access to the intermediary server; an authorization manager to determine whether the remote user is permitted access to the intermediary server and grant access to the intermediary server based on the determination, wherein the granted access also carries access privileges associated with the remote user to predetermined portions of a private network associated with the intermediary server, wherein after the access is granted, the SSL is to receive a resource request from the remote user, the resource request requesting a particular resource of the private network; an access manager to determine whether the resource request from the remote user is permitted based on the access privileges; and a protocol handler to retrieve the requested resource from the private network, when it is determined that the resource request from the user is permitted, modify the retrieved resource by inserting code to provide controls and content to facilitate features and functionality provided by the intermediary server, and provide the modified resource to the user via the SSL.
-
Specification