×

Secure proxying using network intermediaries

  • US 8,799,641 B1
  • Filed: 12/16/2011
  • Issued: 08/05/2014
  • Est. Priority Date: 12/16/2011
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • one or more servers; and

    a hardware device configured to implement a network intermediary;

    wherein the network intermediary is configured to;

    receive a client request;

    generate security metadata associated with the client request, wherein the security metadata comprises an identification of a source of the client request; and

    transmit an encoded version of the security metadata and a backend request corresponding to the client request to a server of the one or more servers, wherein the encoded version is based at least in part on at least a portion of the security metadata and a key held by the network intermediary; and

    wherein the server is configured to;

    determine whether the security metadata is valid;

    in response to determining that the security metadata is valid, perform one or more operations in accordance with the backend request and the security metadata; and

    in response to determining that the security metadata is not valid, reject the backend request.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×