×

Securing communication over a network using client system authorization and dynamically assigned proxy servers

  • US 9,648,044 B2
  • Filed: 06/23/2015
  • Issued: 05/09/2017
  • Est. Priority Date: 02/01/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing secure access to network resources, comprising:

  • at a trust broker system having one or more processors and memory storing one or more programs for execution by the one or more processors;

    receiving, from a client system, a request to access network applications and resources associated with and hosted by a server system;

    locating a first virtual domain of a plurality of virtual domains, wherein;

    each virtual domain provides a respective logical set of network applications and resources, distinct from other virtual domains, wherein a respective logical set of network applications and information corresponds to a subset of network resources provided by the server system; and

    the first virtual domain provides the requested network applications and resources;

    determining whether the client system is authorized to access the first virtual domain based on permissions of a user associated with the client system;

    identifying a particular server of the server system containing the first virtual domain;

    identifying, from a plurality of potential proxy servers, a proxy server currently assigned to the particular server; and

    in response to the determination that the client system is authorized to access the first virtual domain;

    transmitting an identification value for the client system to the identified proxy server, wherein the identification value is an encrypted value identifying the client system; and

    after transmitting the identification value to the identified proxy server, transmitting, to the client system, contact information for connecting to the identified proxy server to access the requested network applications and resources provided by the first virtual domain, wherein the contact information includes one or more session keys, a network address of the identified proxy server, and the identification value.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×