×

Managing use of proxies to access restricted network locations

  • US 8,090,852 B2
  • Filed: 06/04/2008
  • Issued: 01/03/2012
  • Est. Priority Date: 06/04/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating a threat management facility to prevent proxy access to content prohibited by a network policy, the method comprising:

  • A. receiving a network location access request at the threat management facility from a client belonging to an enterprise secured by the threat management facility;

    B. accessing a URL database that contains categorized URLs and determining if a URL associated with the network location access request is a previously uncategorized URL;

    C. when the URL associated with the network location access request is a previously uncategorized URL, determining if the URL associated with the network location access request includes a primary URL with a first network location to be accessed by the client and a secondary URL within the primary URL with a second network location of a website to be accessed using the first network location as a proxy site;

    D. when the URL includes a secondary URL with a second network location of a website to be accessed using the first network location as a proxy site, accessing the URL database and determining if the client is restricted from accessing the website identified by the secondary URL; and

    E. when the client is restricted from accessing the website, blocking the network location access request for the URL.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×