Methods and apparatuses for providing internet-based proxy services
First Claim
1. A method in a proxy server for providing Internet-based proxy services, the method comprising:
- receiving, from a plurality of client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers, wherein at least some of the plurality of origin servers belong to different domains and are owned by different entities, wherein the proxy server and the plurality of origin servers are owned by different entities, and wherein the plurality of requests are received at the proxy server as a result of Domain Name System (DNS) requests for the different domains returning an IP address of the proxy server;
for each of the plurality of requests, analyzing that request to determine one or more of whether that request itself poses a threat and whether a visitor belonging to the request poses a threat;
blocking each request that itself poses a threat and blocking each request that is received from a visitor that poses a threat; and
transmitting at least some of the plurality of requests that are not either a threat themselves or from a visitor that is a threat to the appropriate origin servers.
0 Assignments
0 Petitions
Accused Products
Abstract
A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers. At least some of the origin servers belong to different domains and are owned by different entities. The proxy server and the origin servers are also owned by different entities. The proxy server analyzes each request it receives to determine whether that request poses a threat and whether the visitor belonging to the request poses a threat. The proxy server blocks those requests from visitors that pose a threat or in which the request itself poses a threat. The proxy server transmits the requests that are not a threat and is from a visitor that is not a threat to the appropriate origin server.
102 Citations
12 Claims
-
1. A method in a proxy server for providing Internet-based proxy services, the method comprising:
-
receiving, from a plurality of client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers, wherein at least some of the plurality of origin servers belong to different domains and are owned by different entities, wherein the proxy server and the plurality of origin servers are owned by different entities, and wherein the plurality of requests are received at the proxy server as a result of Domain Name System (DNS) requests for the different domains returning an IP address of the proxy server; for each of the plurality of requests, analyzing that request to determine one or more of whether that request itself poses a threat and whether a visitor belonging to the request poses a threat; blocking each request that itself poses a threat and blocking each request that is received from a visitor that poses a threat; and transmitting at least some of the plurality of requests that are not either a threat themselves or from a visitor that is a threat to the appropriate origin servers. - View Dependent Claims (2, 3, 4)
-
-
5. A proxy server to provide Internet-based proxy services, the proxy server comprising:
-
a memory to store instructions; a processor coupled with the memory to process the stored instructions to; receive, from a plurality of client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers, wherein at least some of the plurality of origin servers belong to different domains and are owned by different entities, wherein the proxy server and the plurality of origin servers are owned by different entities, and wherein the plurality of requests are received at the proxy server as a result of Domain Name System (DNS) requests for the different domains returning an IP address of the proxy server; for each of the plurality of requests, analyze that request to determine one or more of whether that request itself poses a threat and whether a visitor belonging to the request poses a threat; block each request that itself poses a threat and blocking each request that is received from a visitor that poses a threat; and transmit at least some of the plurality of requests that are not either a threat themselves or from a visitor that is a threat to the appropriate origin servers. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor, cause said processor to perform operations comprising:
-
receiving, from a plurality of client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers, wherein at least some of the plurality of origin servers belong to different domains and are owned by different entities, wherein the proxy server and the plurality of origin servers are owned by different entities, and wherein the plurality of requests are received at the proxy server as a result of Domain Name System (DNS) requests for the different domains returning an IP address of the proxy server; for each of the plurality of requests, analyzing that request to determine one or more of whether that request itself poses a threat and whether a visitor belonging to the request poses a threat; blocking each request that itself poses a threat and blocking each request that is received from a visitor that poses a threat; and transmitting at least some of the plurality of requests that are not either a threat themselves or from a visitor that is a threat to the appropriate origin servers. - View Dependent Claims (10, 11, 12)
-
Specification