×

Network architecture for secure data communications

  • US 8,631,134 B2
  • Filed: 07/30/2008
  • Issued: 01/14/2014
  • Est. Priority Date: 07/30/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure data communications, comprising:

  • receiving an indication of a data communication from a device in an external network to a perimeter network, wherein the perimeter network includes one or more external edge nodes, one or more internal edge nodes and a plurality of proxy servers connected between the one or more external edge nodes and the one or more internal edge nodes;

    selecting one of the plurality of proxy servers to receive the data communication via a first secure connection, wherein each of the plurality of proxy servers in the plurality of proxy servers is configured with configuration information such that the device connected to the external network is unable to discern said proxy server from the other of said plurality of proxy servers;

    receiving a portion of the data communication over the first secure connection via the one or more external edge nodes and the selected proxy server;

    establishing a second secure connection between the selected proxy server and an internal network, wherein establishing the second secure connection comprises providing the associated configuration information by the selected proxy server to the internal network via the one or more internal edge nodes;

    transmitting the portion of the data communication from the selected proxy server to the internal network over the second secure connection;

    determining that the selected proxy server is unavailable;

    selecting another proxy server of the plurality of proxy servers to receive a remaining portion of the data communication over the first secure connection; and

    transmitting the remaining portion of the data communication from the another proxy server to the internal network over the second secure connection,wherein the configuration information includes a digital certificate in each of the plurality of proxy servers and wherein the method further compriseswhen the first secure connection or the second secure connection is not successfully established, determining whether one of the plurality of proxy servers is unavailable;

    when one of the plurality of proxy servers is unavailable, removing the unavailable proxy server from a list of available proxy servers; and

    establishing the first secure connection or the second secure connection with one of the plurality of proxy servers on the list of available proxy servers.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×