Private network request forwarding
First Claim
Patent Images
1. A computer implemented method for private network request forwarding, comprising:
- receiving a request, by a second node coupled to one or more third nodes of a private network and configured to transmit the request to the one or more third nodes according to a routing policy of the private network,wherein the second node receives the request over a public network from a user computer via a first node of the public network,wherein the request is for services hosted by one or more provider nodes of a provider entity coupled to the private network,wherein each of the one or more provider nodes do not have an IP address directly accessible to the user computer,wherein the second node receives the request from the first node upon the first node determining the request is a legitimate request or an illegitimate request, andwherein the illegitimate request disrupts delivery capabilities of the provider entity;
determining, by the second node, a risk level based on an access profile comprising one or more characteristics of the request received from the first node to identify one or more threats associated with the request when the risk level exceeds a risk threshold; and
upon the second node determining that the risk level does not exceed the risk threshold;
forwarding, by the second node via the at least one third node of the private network, the request to the one or more provider nodes of the provider entity hosting the service indicated in the request through the private network according to the routing policy of the private network.
1 Assignment
0 Petitions
Accused Products
Abstract
Private network request forwarding can include receiving a request from a user for Internet services over a public network. Private network request forwarding can include analyzing the request and determining whether the request is legitimate. Private network request forwarding can include forwarding the request to an entity through a private network when it is determined that the request is legitimate, wherein the user has access to the entity through a proxy.
80 Citations
22 Claims
-
1. A computer implemented method for private network request forwarding, comprising:
-
receiving a request, by a second node coupled to one or more third nodes of a private network and configured to transmit the request to the one or more third nodes according to a routing policy of the private network, wherein the second node receives the request over a public network from a user computer via a first node of the public network, wherein the request is for services hosted by one or more provider nodes of a provider entity coupled to the private network, wherein each of the one or more provider nodes do not have an IP address directly accessible to the user computer, wherein the second node receives the request from the first node upon the first node determining the request is a legitimate request or an illegitimate request, and wherein the illegitimate request disrupts delivery capabilities of the provider entity; determining, by the second node, a risk level based on an access profile comprising one or more characteristics of the request received from the first node to identify one or more threats associated with the request when the risk level exceeds a risk threshold; and upon the second node determining that the risk level does not exceed the risk threshold; forwarding, by the second node via the at least one third node of the private network, the request to the one or more provider nodes of the provider entity hosting the service indicated in the request through the private network according to the routing policy of the private network. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for private network request forwarding, comprising:
-
a number of delivery nodes associated with a content delivery entity, each of the number of delivery nodes comprising a memory and a processing unit coupled to the memory, wherein the processing unit of a second delivery node of the number of delivery nodes is coupled to one or more third delivery nodes of a private network, coupled to one or more first delivery nodes of a public network, configured to receive a request from the one or more first delivery nodes, and configured to transmit the request to the one or more third delivery nodes according to a routing policy of the private network, the second delivery node further configured to; receive the request through a public network from a computing device via the one or more first delivery nodes, the request identifying a service hosted by one or more provider nodes of a provider entity coupled to the private network, wherein each of the one or more provider nodes do not have an IP address directly accessible to the computing device, and wherein the second delivery node receives the request from the one or more first delivery nodes upon at least one first delivery node determining that the request is a legitimate request or an illegitimate request, wherein an illegitimate request disrupts delivery capabilities of the provider entity; wherein the processing unit of the second delivery node of the number of delivery nodes is configured to; determine a risk level based on an access profile comprising one or more characteristics of the request received from the first node according to the routing policy of the private network; identifying one or more threats associated with the request when the risk level corresponding to the request is at or above a threshold level; and in response to determining that the risk level does not exceed the risk threshold, send the request to the one or more provider nodes of the provider entity through the private network, wherein the at least one third delivery node of the private network is only accessible to the computing device through the second delivery node from the number of delivery nodes. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer implemented method comprising:
-
receiving, by a second node coupled to one or more third nodes of a private network and configured to transmit requests to the one or more third nodes according to a routing policy of the private network, a request from a user device via a first node over a public network, wherein the request is for services hosted by one or more provider nodes of provider entity in communication with the one or more third nodes of the private network, wherein the second node receives the request from the first node upon the first node determining the request is a legitimate request or an illegitimate request, wherein an illegitimate request can disrupts delivery capabilities of the provider entity, and wherein each of the one or more provider nodes do not have an IP address directly accessible to the user device; determining, by the second node, a risk level based on an access profile comprising one or more characteristics of the request received from the first node to identify one or more types of threats disruptive to a service associated with the request and hosted by the one or more provider nodes of the provider entity in communication with the one or more third nodes via the private network when the risk level does not exceed a risk threshold; and forwarding, by the second node via a third node of the one or more third nodes of the private network, the request to a provider node of the one or more provider nodes of the provider entity through the private network when the second node determines that the risk level does not exceed the risk threshold. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification