Secure asynchronous retrieval of data behind a firewall
First Claim
1. A method comprising:
- receiving, at a server coupled to a network, an encrypted request for data behind a firewall from a data transfer client executing on a first computing device coupled to the network;
maintaining the encrypted request in a first queue of requests associated with a data transfer agent executing on a second computing device residing behind the firewall, wherein the second computing device is coupled to the network via the firewall;
providing, by the server, the encrypted request from the first queue to the data transfer agent via the network in response to a second request received from the data transfer agent via the network;
providing, by the server, a public key associated with the data transfer client to the data transfer agent residing behind the firewall in response to a third request received from the data transfer agent via the network, wherein the data transfer agent decrypts the encrypted request using the public key associated with the data transfer client provided by the server prior to processing the encrypted request to obtain a first response comprising the data;
receiving, at the server, the first response from the data transfer agent via the network;
maintaining the first response in a second queue of responses associated with the data transfer client; and
providing, by the server, the first response from the second queue to the data transfer client via the network in response to a fourth request received from the data transfer client via the network.
1 Assignment
0 Petitions
Accused Products
Abstract
Computing systems and related methods are provided for retrieving data residing behind a firewall. One exemplary method involves a server receiving a first request from a data transfer client, maintaining the first request in a first queue of requests associated with a data transfer agent coupled to the network via a firewall, and providing the first request from the first queue to the data transfer agent in response to a second request received from the data transfer agent. The server receives a first response from the data transfer agent, maintains the first response in a second queue of responses associated with the data transfer client, and provides the first response from the second queue to the data transfer client in response to a third request received from the data transfer client.
172 Citations
18 Claims
-
1. A method comprising:
-
receiving, at a server coupled to a network, an encrypted request for data behind a firewall from a data transfer client executing on a first computing device coupled to the network; maintaining the encrypted request in a first queue of requests associated with a data transfer agent executing on a second computing device residing behind the firewall, wherein the second computing device is coupled to the network via the firewall; providing, by the server, the encrypted request from the first queue to the data transfer agent via the network in response to a second request received from the data transfer agent via the network; providing, by the server, a public key associated with the data transfer client to the data transfer agent residing behind the firewall in response to a third request received from the data transfer agent via the network, wherein the data transfer agent decrypts the encrypted request using the public key associated with the data transfer client provided by the server prior to processing the encrypted request to obtain a first response comprising the data; receiving, at the server, the first response from the data transfer agent via the network; maintaining the first response in a second queue of responses associated with the data transfer client; and providing, by the server, the first response from the second queue to the data transfer client via the network in response to a fourth request received from the data transfer client via the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 14, 15, 16, 17)
-
-
9. A computing system comprising:
-
a data transfer agent executing on a computing device coupled to a network via a firewall; a database to maintain a first queue of requests for the data transfer agent and a second queue of responses to one or more of the requests; and a server coupled to the database and the network to provide an encrypted request for data behind the firewall from a data transfer client from the first queue of requests to the data transfer agent residing behind the firewall via the network in response to receiving a second request from the data transfer agent via the firewall, provide a public key associated with the data transfer client to the data transfer agent residing behind the firewall via the network in response to a third request from the data transfer agent, and add a first response received from the data transfer agent via the network to the second queue of responses, wherein the data transfer agent decrypts the encrypted request using the public key associated with the data transfer client provided by the server prior to processing the encrypted request to obtain a result comprising the data and encrypts the result to obtain the first response provided to the server. - View Dependent Claims (10, 11, 12, 13, 18)
-
Specification