Method and system for providing secure access to private networks
First Claim
Patent Images
1. A method comprising:
- receiving, by a first server, a request from a client device;
determining, by the first server, a time associated with the request;
determining, by the first server and based on the time associated with the request, that the client device is permitted to access a second server that is connected to the first server via a private network;
obtaining, by the first server and based on the request, content from the second server after determining that the client device is permitted to access the second server;
modifying, by the first server, the content to form modified content; and
transmitting, by the first server, the modified content to the client device.
9 Assignments
0 Petitions
Accused Products
Abstract
Improved approaches for providing secure access to resources maintained on private networks are disclosed. The secure access can be provided through a public network using a standard network browser. Multiple remote users are able to gain restricted and controlled access to at least portions of a private network through a common access point. The solution provided by the invention is not only easily set up and managed, but also able to support many remote users in a cost-effective manner.
76 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a first server, a request from a client device; determining, by the first server, a time associated with the request; determining, by the first server and based on the time associated with the request, that the client device is permitted to access a second server that is connected to the first server via a private network; obtaining, by the first server and based on the request, content from the second server after determining that the client device is permitted to access the second server; modifying, by the first server, the content to form modified content; and transmitting, by the first server, the modified content to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by at least one processor of a first server, cause the at least one processor to; receive a request from a client device; determine a time associated with the request; determine, based on the time associated with the request, that the client device is permitted to access resources available on a private network connected to the first server; obtain, based on the request, content from a second server connected to the private network after determining that the client device is permitted to access resources available on the private network; modify the content to form modified content; and transmit the modified content to the client device. - View Dependent Claims (11, 12, 13, 14, 15)
-
16. A system comprising:
one or more processors to; receive a request from a client device; determine a time associated with the request; determine, based on the time associated with the request, that the client device is permitted to access a server that is connected to a private network; obtain, based on the request, content from the server after determining that the client device is permitted to access the server; modify the content to form modified content; and transmit the modified content to the client device. - View Dependent Claims (17, 18, 19, 20)
Specification