×

Outside access to computer resources through a firewall

  • US 5,944,823 A
  • Filed: 10/21/1996
  • Issued: 08/31/1999
  • Est. Priority Date: 10/21/1996
  • Status: Expired due to Term
First Claim
Patent Images

1. Tunneling apparatus for a data communication network containing a firewall, said firewall defining inside and outside regions and forming a security barrier preventing objects in said outside region from directly initiating access to objects in said inside region, while permitting objects in said inside region to directly initiate and obtain access to objects in said outside region;

  • said tunneling apparatus enabling objects in said outside region to obtain access to predetermined trusted objects in said inside region in a manner requiring formation of connections under exclusive control of processes operating in said inside region, said tunneling apparatus comprising;

    an outside interface computer in said outside region, said outside interface computer interfacing between said firewall and objects in said outside region;

    an inside interface computer in said inside region, said inside interface computer interfacing between said firewall and objects in said inside region;

    said inside interface computer having a special control connection to said outside interface computer, through said firewall, for transferring control information to said outside computer;

    said inside interface computer maintaining a table of trusted objects and intermittently providing copies of said table to said outside interface computer through said control connection;

    entries in said table serving as a basis for permitting and denying access to access to trusted objects in said inside region when requests for such access are initiated by objects in said outside region;

    said outside interface computer acting to selectively transfer requests sent from objects in said outside region to said inside computer, via said control connection, when said requests are directed to trusted objects identified by entries in said table; and

    said inside computer acting in response to a said transferred request to establish a data communication connection unique to the respective request, and separate from said control connection, for communicating data associated with the respective trusted object between said inside and outside regions.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×