Creating secure connections between distributed computing devices
First Claim
1. A computing system, comprising:
- a computing device including;
a processing unit; and
memory encoding instructions that, when executed by the processing unit, cause the processing unit to;
receive a request from a client computing device;
establish a first secured connection to the client computing device, the first secured connection being negotiated using a Mutually Authenticated Secure Sockets Layer protocol;
select a server computing device from a plurality of server computing devices to service the request from the client computing device, selection being made based, at least in part, upon load balancing considerations;
establish a second secured connection to the server computing device, the second secured connection being separate from the first secured connection, and the second secured connection being created by Internet Protocol filtering; and
allow the client computing device to securely communicate with the server computing device through the first and second secured connections.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device includes: a processing unit; and memory encoding instructions that, when executed by the processing unit, cause the processing unit to: receive a request from a client computing device; establish a first secured connection to the client computing device; select a server computing device from a plurality of server computing devices to service the request from the client computing device, selection being made based, at least in part, upon load balancing considerations; establish a second secured connection to the server computing device, the second secured connection being separate from the first secured connection; and allow the client computing device to securely communicate with the server computing device through the first and second secured connections.
24 Citations
15 Claims
-
1. A computing system, comprising:
a computing device including; a processing unit; and memory encoding instructions that, when executed by the processing unit, cause the processing unit to; receive a request from a client computing device; establish a first secured connection to the client computing device, the first secured connection being negotiated using a Mutually Authenticated Secure Sockets Layer protocol; select a server computing device from a plurality of server computing devices to service the request from the client computing device, selection being made based, at least in part, upon load balancing considerations; establish a second secured connection to the server computing device, the second secured connection being separate from the first secured connection, and the second secured connection being created by Internet Protocol filtering; and allow the client computing device to securely communicate with the server computing device through the first and second secured connections. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A method for forming a secure connection between a client computing device and a server computing device, the method comprising:
-
receiving a request from the client computing device; receiving an application certificate to negotiate a first secured connection, wherein the application certificate identifies a specific application on the client computing device, establishing the first secured connection to the client computing device; selecting the server computing device from a plurality of server computing devices to service the request from the client computing device, selection being made based, at least in part, upon load balancing considerations; establishing a second secured connection to the server computing device, the second secured connection being separate from the first secured connection; and allowing the client computing device to communicate with the server computing device through the first and second secured connections. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method for forming a secure connection between a client computing device and a server computing device, the method comprising:
-
receiving a request from the client computing device; establishing a first secured connection to the client computing device using a secure protocol; selecting the server computing device from a plurality of server computing devices to service the request from the client computing device, selection being made based, at least in part, upon load balancing considerations; establishing a second secured connection to the server computing device using Internet Protocol filtering, the second secured connection being separate from the first secured connection; and allowing the client computing device to communicate with the server computing device through the first and second secured connections. - View Dependent Claims (14, 15)
-
Specification