Method and system for providing secure access to private networks
First Claim
Patent Images
1. A method comprising:
- receiving a login request from a user for access to an intermediary server, the intermediary server storing an authentication identifier for each of a plurality of users, the authentication identifier identifying an authentication server;
accessing, based on the authentication identifier, an authentication server, where the authentication server is separate and distinct from the intermediary server, to authenticate the user in response to the login request;
receiving a resource request from the authenticated user at the intermediary server, the resource request requesting a particular operation with respect to a resource from a private network; and
performing the particular operation at the private network to determine a response to the resource request.
11 Assignments
0 Petitions
Accused Products
Abstract
Improved approaches for providing secure access to resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to at least portions of a private network through a common access point. The solution provided by the invention is not only easily set up and managed, but also able to support many remote users in a cost-effective manner.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a login request from a user for access to an intermediary server, the intermediary server storing an authentication identifier for each of a plurality of users, the authentication identifier identifying an authentication server; accessing, based on the authentication identifier, an authentication server, where the authentication server is separate and distinct from the intermediary server, to authenticate the user in response to the login request; receiving a resource request from the authenticated user at the intermediary server, the resource request requesting a particular operation with respect to a resource from a private network; and performing the particular operation at the private network to determine a response to the resource request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, by an intermediary server, a login request from a user at a client machine; obtaining, by the intermediary server, an authentication identifier identifying an authentication server based on the login request; sending, by the intermediary server, authentication information based on the login request to the authentication server; receiving, by the intermediary server, an authentication response based on the authentication information from the authentication server; and returning, by the intermediary server, an access page to the client machine when the authentication response indicates success, where the access page allows the user to access resources available on a private network connected to the intermediary server. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. An intermediary server comprising:
-
a memory to store an authentication identifier for each of a plurality of users, the authentication identifier identifying an authentication server; and a processor, connected to the memory, to; receive a login request from a user, obtain the authentication identifier identifying the authentication server based on the login request, send authentication information based on the login request to the authentication server, receive an authentication response based on the authentication information from the authentication server, receive a resource request from the user when the authentication response indicates success, and process the resource request using a remote server located on a private network connected to the intermediary server. - View Dependent Claims (17, 18, 19, 20)
-
Specification