Separating control of network sites

ABSTRACT

Disclosed are various embodiments for separating control of network sites through the use of a proxy server application. A request for network content is received from a computing device. The network content is hosted by an organization on behalf of a customer. The network content is requested from one application on a trusted network that is subject to security supervision by the organization when the network content is determined to correspond to a secured portion of a network site. The network content is instead requested from another application managed by the customer on an untrusted network that is not subject to security supervision by the organization when the network content is determined to correspond to an unsecured portion of the network site. The network content is then sent to the computing device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional of, and claims priority to, co-pendingU.S. Patent Application entitled “SEPARATING CONTROL OF NETWORK SITES,”filed on Nov. 10, 2010, and assigned application Ser. No. 12/943,127,which is related to co-pending U.S. Patent Application entitled “NETWORKSITE CUSTOMIZATION USING PROXIES,” filed on Nov. 10, 2010, and assignedSer. No. 12/943,130, and to co-pending U.S. Patent Application entitled“EXECUTING UNTRUSTED CONTENT IN A TRUSTED NETWORK,” filed on Nov. 10,2010, and assigned Ser. No. 12/943,132, all of which are incorporatedherein by reference in their entirety.

BACKGROUND

Compliance with Payment Card Industry Data Security Standards (PCI DSS)and/or other security standards may present challenges for onlinemerchants. For this and other reasons, online merchants may elect tohave their electronic commerce platform managed by a third-partyelectronic commerce hosting provider who ensures compliance with thesecurity standards. However, merchants may lose flexibility incustomizing or configuring their network sites when using such a hostedsolution as compared with a self-managed solution.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the present disclosure can be better understood withreference to the following drawings. The components in the drawings arenot necessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the disclosure. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views.

FIG. 1 is a drawing of a networked environment according to variousembodiments of the present disclosure.

FIG. 2 is a drawing of an example of a user interface rendered by aclient in the networked environment of FIG. 1 according to variousembodiments of the present disclosure.

FIG. 3 is a flowchart illustrating one example of functionalityimplemented as portions of a proxy server application executed in acomputing device in the networked environment of FIG. 1 according tovarious embodiments of the present disclosure.

FIG. 4 is a flowchart illustrating one example of functionalityimplemented as portions of an electronic commerce application executedin a computing device in the networked environment of FIG. 1 accordingto various embodiments of the present disclosure.

FIG. 5 is a flowchart illustrating one example of functionalityimplemented as portions of a network site configuration applicationexecuted in a computing device in the networked environment of FIG. 1according to various embodiments of the present disclosure.

FIG. 6 is a schematic block diagram that provides one exampleillustration of a computing device employed in the networked environmentof FIG. 1 according to various embodiments of the present disclosure.

DETAILED DESCRIPTION

The present disclosure relates to separating control of network sitesusing proxy server applications. Network sites handling electroniccommerce may be subjected to various security standards, and compliancewith the standards may be burdensome. Electronic marketplaces and/orother providers of managed services may restrict the ability ofmerchants to control and/or customize their hosted network sites inorder to ensure compliance with the security standards. Variousembodiments of the present disclosure enable merchants on such hostedelectronic commerce platforms to designate portions of their networksites to be self-managed. The separation of control may be accomplishedby using a proxy server application. Also, by employing a proxy serverapplication, an administrator of a network site may be able to movehosting of a network site from one provider or platform to another in asimplified way. Furthermore, various embodiments of the presentdisclosure use proxy server applications external to a trusted networkin order to prevent unauthorized access of content within the trustednetwork. In the following discussion, a general description of thesystem and its components is provided, followed by a discussion of theoperation of the same.

With reference to FIG. 1, shown is a networked environment 100 accordingto various embodiments. The networked environment 100 includes one ormore computing devices 103 coupled to a trusted network 106. The trustednetwork 106 includes, for example, intranets, wide area networks (WANs),local area networks (LANs), wired networks, wireless networks, or othersuitable networks, etc., or any combination of two or more suchnetworks. In various embodiments, the trusted network 106 may comprise anetwork controlled by an organization that maintains compliance with thePayment Card Industry Data Security Standards (PCI DSS) and/or othersecurity standards. In one embodiment, the trusted network 106 maycomprise an internet protocol (IP) subnetwork using a private addressrange.

The trusted network 106 may be behind a firewall 109 that separates thetrusted network 106 from an untrusted network 112. In variousembodiments, the firewall 109 may comprise a network-layer device, atransport-layer device, and/or another type of network device. Theuntrusted network 112 includes, for example, the Internet, intranets,extranets, wide area networks (WANs), local area networks (LANs), wirednetworks, wireless networks, or other suitable networks, etc., or anycombination of two or more such networks. Although the untrusted network112 may include the Internet and may not comply with PCI DSS and/orother security standards, it is understood that portions of theuntrusted network 112 may be compliant with PCI DSS and/or othersecurity standards. In various embodiments, one or more computingdevices 113, one or more computing devices 115, one or more computingdevices 118, and/or one or more clients 121, among other devices, may becoupled to the untrusted network 112.

The computing device 103 may comprise, for example, a server computer orany other system providing computing capability. Alternatively, aplurality of computing devices 103 may be employed that are arranged,for example, in one or more server banks or computer banks or otherarrangements. For example, a plurality of computing devices 103 togethermay comprise a cloud computing resource, a grid computing resource,and/or any other distributed computing arrangement. Such computingdevices 103 may be located in a single installation or may bedistributed among many different geographical locations. For purposes ofconvenience, the computing device 103 is referred to herein in thesingular. Even though the computing device 103 is referred to in thesingular, it is understood that a plurality of computing devices 103 maybe employed in the various arrangements as described above. In someembodiments, all of the computing devices 103 may be managed by a singleentity for purposes of security standard compliance.

Various applications and/or other functionality may be executed in thecomputing device 103 according to various embodiments. Also, variousdata is stored in a data store 124 that is accessible to the computingdevice 103. The data store 124 may be representative of a plurality ofdata stores 124 as can be appreciated. The data stored in the data store124, for example, is associated with the operation of the variousapplications and/or functional entities described below.

The components executed on the computing device 103, for example,include an electronic commerce application 130 and other applications,services, processes, systems, engines, or functionality not discussed indetail herein. The electronic commerce application 130 is executed inorder to facilitate the online purchase of items from any of a pluralityof online merchants over the untrusted network 112. The electroniccommerce application 130 also performs various backend functionsassociated with the online presence of the merchants in order tofacilitate the online purchase of items. Although the electroniccommerce application 130 may host a portion of an online presence of amerchant, a merchant may also have other portions of its online presencein social networking sites, blog sites, and so on.

The electronic commerce application 130 may generate network pages 134such as, for example, web pages and/or other types of network contentthat may be provided to clients 121 for the purposes of selecting itemsfor purchase, rental, download, lease, and/or other forms ofconsumption. The network pages 134 may comprise hypertext markuplanguage (HTML), extensible markup language (XML), JavaScript®, and/orother code along with text, images, audio, video, and/or othermultimedia. In various embodiments, the electronic commerce application130 may include a commercially available network page server applicationsuch as, for example, Apache® HTTP Server, Apache® Tomcat®, Microsoft®Internet Information Services (IIS), etc.

Although many examples given herein relate to merchants and electroniccommerce, it is understood that the principles described herein mayapply, for example, to any application managed by an organization thathas a plurality of customers. As a non-limiting example, an organizationmay manage a healthcare application that maintains patient records.Various medical groups and/or physicians may be customers of theorganization and may manage their patient records by way of the hostedhealthcare application.

The data stored in the data store 124 may include, for example, catalogdata 136, order data 139, network site data 142, and potentially otherdata. The catalog data 136 includes a listing of items 148. An item 148may include any good, product, service, software item, multimedia item,or other item that may be offered for sale, purchase, download, lease,or any other form of consumption as can be appreciated. Each item 148may include various data such as, for example, title, description,price, weight, customer reviews, categories, quantities, conditions,options, and/or other data.

The order data 139 includes data relating to orders for items 148 placedthrough the electronic commerce application 130. In various embodiments,the order data 139 may include sensitive data regarding customers,including, for example, contact information, electronic paymentinformation, date of birth, identification information (e.g., SocialSecurity numbers, driver's license numbers, etc.), and/or other data.PCI DSS and/or other security standards may impose rules that govern thestorage and use of information in the order data 139. For example, asecurity standard may require that a credit card number be stored in anencrypted format in a different computing device 103 from a verificationcode for the credit card number.

The network site data 142 may include various data used in generatingnetwork pages 134 associated with network sites of merchants hosted bythe electronic commerce application 130. To this end, the network sitedata 142 may include various customizations of the merchants for theirrespective network sites. In one embodiment, the customizations storedin the network site data 142 may be subjected to a manual review forcompliance with PCI DSS and/or other data security standards. Asnon-limiting examples, the network site data 142 may include graphics,images, templates, code, video, audio, multimedia, static network pages134, and/or other data.

The computing device 113 may comprise, for example, a server computer orany other system providing computing capability. Alternatively, aplurality of computing devices 113 may be employed that are arranged,for example, in one or more server banks or computer banks or otherarrangements. For example, a plurality of computing devices 113 togethermay comprise a cloud computing resource, a grid computing resource,and/or any other distributed computing arrangement. Such computingdevices 113 may be located in a single installation or may bedistributed among many different geographical locations. For purposes ofconvenience, the computing device 113 is referred to herein in thesingular. Even though the computing device 113 is referred to in thesingular, it is understood that a plurality of computing devices 113 maybe employed in the various arrangements as described above. In someembodiments, all of the computing devices 113 may be managed by a singleentity for purposes of security standard compliance.

Various applications and/or other functionality may be executed in thecomputing device 113 according to various embodiments. Also, variousdata is stored in a data store 143 that is accessible to the computingdevice 113. The data store 143 may be representative of a plurality ofdata stores 143 as can be appreciated. The data stored in the data store143, for example, is associated with the operation of the variousapplications and/or functional entities described below.

The components executed on the computing device 113, for example,include a network site configuration application 144, a proxy serverapplication 145, and other applications, services, processes, systems,engines, or functionality not discussed in detail herein. The networksite configuration application 144 is executed to configure how anetwork site is served up by the proxy server application 145. Forexample, the network site configuration application 144 may enable auser to configure one portion of a network site to be served up by afirst server application and another portion of the same network site tobe served up by a second server application.

The proxy server application 145 comprises an application-layer proxyservice that receives requests for a resource, requests and obtains theresource from another application, and returns the resource. Such aresource may comprise a network page 134. In one embodiment, the proxyserver application 145 comprises a hypertext transfer protocol (HTTP)proxy service. In various embodiments, the proxy server application 145may be considered to be a transparent reverse proxy. As will be furtherdescribed herein, the proxy server application 145 may be configured toobtain one portion of a network site from an application that is trustedto comply with certain security standards and another portion of thenetwork site from another application that is not similarly trusted. Invarious embodiments using an elastic computing platform, the proxyserver application 145 may be configured to scale automatically toallocate more computing resources in the computing device 113 as needed.

As shown in FIG. 1, the proxy server application 145 may be executed ina computing device 113 coupled to the untrusted network 112. In otherembodiments, the proxy server application 145 may execute in a computingdevice 103 coupled to the trusted network 106. In one embodiment, theproxy server application 145 may be executed in a computing device 113within a demilitarized zone, or a quarantined portion, of the trustednetwork 106 that prevents the proxy server application 145 fromaccessing restricted resources of the trusted network 106.

The data stored in the data store 143 may include, for example, proxycustomization data 146 and potentially other data. The proxycustomization data 146 includes configuration parameters and/or othersettings for the configuration of the proxy server application 145. Invarious embodiments, some or all parameters may be configured bymerchant administrative users. The proxy customization data 146 maycontrol a partitioning of a network site such that one portion of thesite is served up by the electronic commerce application 130, whileanother portion of the site is served up by some other application. Insome instances, the proxy customization data 146 may specify that theentirety of the network site may be served up by one application. Theproxy customization data 146 may also be used to control mapping ofindividual requested resource identifiers to actual resourceidentifiers. In one embodiment, such resource identifiers compriseuniform resource locators (URLs).

The computing device 115 may comprise, for example, a server computer orany other system providing computing capability. Alternatively, aplurality of computing devices 115 may be employed that are arranged,for example, in one or more server banks or computer banks or otherarrangements. For example, a plurality of computing devices 115 togethermay comprise a cloud computing resource, a grid computing resource,and/or any other distributed computing arrangement. Such computingdevices 115 may be located in a single installation or may bedistributed among many different geographical locations. For purposes ofconvenience, the computing device 115 is referred to herein in thesingular. Even though the computing device 115 is referred to in thesingular, it is understood that a plurality of computing devices 115 maybe employed in the various arrangements as described above. In oneembodiment, the computing device 115 may be under the control of amerchant or other user of the electronic commerce application 130, whilein another embodiment, the computing device 115 may be under the controlof a hosting provider such as, for example, the hosting providerresponsible for the computing device 103.

Various applications and/or other functionality may be executed in thecomputing device 115 according to various embodiments. Also, variousdata is stored in a network site content data store 151 that isaccessible to the computing device 115. The network site content datastore 151 may be representative of a plurality of data stores as can beappreciated. The data stored in the network site content data store 151,for example, is associated with the operation of the variousapplications and/or functional entities described below.

The components executed on the computing device 115, for example,include a network page server application 154 and other applications,services, processes, systems, engines, or functionality not discussed indetail herein. The network page server application 154 is executed toserve up network pages 134 and/or other forms of network site contentfrom the network site content data store 151. In one embodiment, thenetwork pages 134 served up by the network page server application 154are fully managed by an administrative user associated with a merchant.In various embodiments, the network page server application 154 and thecomputing device 115 may be compliant with PCI DSS and/or other securitystandards. In one embodiment, the network page server application 154comprises an electronic commerce application, which may be the same asor different from the electronic commerce application 130 executed inthe computing device 103. In various embodiments, the network pageserver application 154 may include a commercially available network pageserver application such as, for example, Apache® HTTP Server, Apache®Tomcat®, Microsoft® Internet Information Services (IIS), etc.

The computing device 118 may comprise, for example, a server computer orany other system providing computing capability. Alternatively, aplurality of computing devices 118 may be employed that are arranged,for example, in one or more server banks or computer banks or otherarrangements. For example, a plurality of computing devices 118 togethermay comprise a cloud computing resource, a grid computing resource,and/or any other distributed computing arrangement. Such computingdevices 118 may be located in a single installation or may bedistributed among many different geographical locations. For purposes ofconvenience, the computing device 118 is referred to herein in thesingular. Even though the computing device 118 is referred to in thesingular, it is understood that a plurality of computing devices 118 maybe employed in the various arrangements as described above. In oneembodiment, the computing device 118 may be under the control of thesame hosting provider as the computing device 103 even though thecomputing device 118 is separated from the trusted network 106 by thefirewall 109.

Various applications and/or other functionality may be executed in thecomputing device 118 according to various embodiments. The componentsexecuted on the computing device 118, for example, include an externalproxy server application 157 and other applications, services,processes, systems, engines, or functionality not discussed in detailherein. The external proxy server application 157 comprises anapplication-layer proxy service that receives requests for a resource,requests and obtains the resource from another application, and returnsthe resource. Such a resource may comprise a network page 134. In oneembodiment, the external proxy server application 157 comprises ahypertext transfer protocol (HTTP) proxy service. Because the externalproxy server application 157 is separated from the resources on thetrusted network 106 by the firewall 109, the external proxy serverapplication 157 has an external view of the trusted network 106 andcannot gain access to restricted resources on the trusted network 106that are protected by the firewall 109.

The client 121 is representative of a plurality of client devices thatmay be coupled to the untrusted network 112. The client 121 maycomprise, for example, a processor-based system such as a computersystem. Such a computer system may be embodied in the form of a desktopcomputer, a laptop computer, personal digital assistants, cellulartelephones, smartphones, set-top boxes, music players, web pads, tabletcomputer systems, game consoles, electronic book readers, or otherdevices with like capability. The client 121 may include a display 160.The display 160 may comprise, for example, one or more devices such ascathode ray tubes (CRTs), liquid crystal display (LCD) screens, gasplasma-based flat panel displays, LCD projectors, or other types ofdisplay devices, etc.

The client 121 may be configured to execute various applications such asa browser 163 and/or other applications. The browser 163 may be executedin a client 121, for example, to access and render network pages 134,such as web pages, or other network content served up by the computingdevice 103 and/or other servers, thereby generating a rendered networkpage 166 on the display 160. The client 121 may be configured to executeapplications beyond browser 163 such as, for example, emailapplications, instant message applications, and/or other applications.

Next, a general description of the operation of the various componentsof the networked environment 100 is provided. To begin, in a first setof embodiments, control of a network site of a merchant may be separatedthrough the use of the proxy server application 145. When a user at abrowser 163 executed in a client 121 sends a request for a network site,the request is received by the proxy server application 145. Networktraffic for a domain name associated with the merchant is configured tobe sent to the proxy server application 145.

When the request corresponds to a portion of the network site that isnot managed by the merchant, the request is forwarded by the proxyserver application 145 to the electronic commerce application 130, andthe resource is obtained. The resource is then returned to the client121 over the untrusted network 112. When the request corresponds to aportion of the network site that is managed by the merchant, the requestis forwarded by the proxy server application 145 to the network pageserver application 154 executed in the computing device 118, and theresource is obtained and returned to the client 121 over the untrustednetwork 112.

The proxy server application 145 may make a decision on where to routethe request based in part on a URL embodied in the request, headerfields embodied in the request, and/or other data. For example, theproxy server application 145 may make a routing decision based in parton HTTP headers such as a User-Agent field, an Accept field, anAccept-Language field, an Accept-Encoding field, an Accept-Charsetfield, an Authorization field, a Proxy-Authorization field, a Fromfield, a Referrer field, a Host field, and/or other header fields.

It is noted that the electronic commerce application 130 is within thetrusted network 106 protected by the firewall 109. The trusted network106 is under the security supervision of an organization such as aprovider of shared electronic commerce hosting. The organization may beresponsible for ensuring compliance of the trusted network 106 with PCIDSS and/or other security standards. By contrast, the network pageserver application 154 is on the untrusted network 112 across thefirewall 109, and the same organization supervising security complianceof the trusted network 106 behind the firewall 109 is not responsiblefor compliance of the network page server application 154 with PCI DSSand/or other security standards. It may be the case that the networkpage server application 154 is compliant with PCI DSS, etc., but thesame organization does not supervise compliance. Consequently, thenetwork page server application 154 is considered untrusted relative tothe organization. In some embodiments, the network page serverapplication 154 may be executed in a computing device 103 behind thefirewall 109, but the network page server application 154 is stillconsidered untrusted relative to the organization.

By separating control of the network site, a manual review for securitycompliance of merchant-customized network content is avoided. Typically,the electronic commerce application 130 is configured to accept andprocess electronic payments and/or other information of a sensitivenature where security standard compliance is especially important. Othercontent, such as, for example, warranty registration network pages 134,store locator network pages 134, and so on, may be withinmerchant-controlled accounts such that the network pages 134 are fullycustomizable or partially customizable by the merchant. The merchant maybe able to customize network pages 134 served up through the sharedelectronic commerce application 130, but customization may be limitedand subjected to a manual review by staff of the organization thatsupervises security compliance of the electronic commerce application130. Alternatively, customization may be subjected to an automatedreview by the organization that supervises security compliance of theelectronic commerce application 130.

In some embodiments, the network site may be separated by differentdomain names. For example, a merchant-controlled portion of the networksite may correspond to “www.merchantname.site,” while a non-merchantcontrolled portion of the network site may correspond to“secure.merchantname.site.” Although the parent domain names may beshared in such subdomains, they may be different in some embodiments. Invarious embodiments, designated network pages and/or directories ofnetwork pages may comprise a portion of the network site that ismerchant controlled or not merchant controlled.

In a second set of embodiments, the portions of the network site thatare merchant controlled or not merchant controlled may be configured bythe merchant. That is, a configuration facility is provided by thenetwork site configuration application 144. To this end, the networksite configuration application 144 may be configured to generate andserve up one or more network pages 134 providing user interfaces similarto that which will be discussed in connection with FIG. 2.

Migration of a network site from one provider to another is one areawhere a proxy server application 145 configured by the merchant can behelpful. A merchant may point its domain name at the proxy serverapplication 145 and configure the proxy server application 145 torespond to requests transparently by obtaining the requested data fromthe current site platform. Gradually, or all at once, the merchant mayconfigure the proxy server application 145 to respond to requests byobtaining the requested data from a new site platform. However, thechange is made transparent to end users, search engine spiders, etc., bymapping the existing set of URLs to potentially different URLs from thenew site platform. The URLs may differ not only in the domain name or IPaddress but also in the filename.

In one embodiment, the existing set of URLs may be automatically learnedby the proxy server application 145 by observing requests for URLs ofthe network site over time. Thus, the existing set of URLs may bepresented to an administrative user for mapping to a different set ofURLs from the new site platform. In one embodiment, the mapping may beperformed in an automated way based at least in part on predefined rulesfor mapping one electronic commerce platform to another.

The network site configuration application 144 may be configured toenable rollback of a current site configuration to a previous siteconfiguration that is stored within the proxy customization data 146 forthe network site. Consequently, if an error occurs when redirectingtraffic to a new electronic commerce platform, the previousconfiguration may quickly be applied. Other than providing an easy wayto rollback troublesome changes, using the proxy server application 145also avoids problems associated with updating the domain name in thedomain name system (DNS) such as propagation delays and caching.

In a third set of embodiments, it may be desirable for users to be ableto specify remote content to be included within a network page 134 oftheir network site. As a non-limiting example, a user may specify a URLidentifying a resource that is to be included within a network page. Asanother non-limiting example, a user may configure the proxy serverapplication 145 to obtain and serve up a network page 134 identified bya URL. A security problem may result if the electronic commerceapplication 130, the proxy server application 145, or any anotherapplication that is configured to retrieve the URL has unrestrictedaccess to the resources of the trusted network 106 behind the firewall109. For example, a malicious user or security exploit may be able toinclude private documents accessed from inside the trusted network 106within a network page 134.

To avoid this security problem, an external proxy server application 157may be employed. The external proxy server application 157 is executedin the computing device 118, which is not within the trusted network106. Specifically, the computing device 118 is located on the other sideof the firewall 109 from the trusted network 106. In variousembodiments, the electronic commerce application 130, the proxy serverapplication 145, or any another application that retrieves auser-specified URL may be further configured to retrieve the URL usingthe external proxy server application 157. The external proxy serverapplication 157, by virtue of having an external view of the trustednetwork 106, is not permitted access to private documents within thetrusted network 106. Consequently, an application executing within thetrusted network 106 may avoid accessing private documents by adopting anexternal view of the trusted network 106 by routing URL requests throughthe external proxy server application 157.

It may be desirable to restrict access to the external proxy serverapplication 157 to avoid the security problems associated with having anopen proxy. An open proxy is a proxy that is configured to obtainresources from any network site when requested by any user. Malicioususers may use open proxies to cloak their identity while performingillegal activities. Therefore, it is important to restrict access to theexternal proxy server application 157. In one embodiment, access to theexternal proxy server application 157 may be restricted to hosts withinthe trusted network 106. In another embodiment, access to the externalproxy server application 157 may be restricted on an application basisto the electronic commerce application 130, the proxy server application145, and/or any other application that is configured to obtain resourcesthrough the external proxy server application 157. In such anembodiment, the requesting application may be required to authenticateusing secure certificates, usernames and passwords, and/or other typesof security credentials.

Turning next to FIG. 2, shown is an example of a user interface 200rendered by a browser 163 (FIG. 1) executed in a client 121 (FIG. 1) inthe networked environment 100 (FIG. 1). Specifically, the user interface200 illustrates a rendered network page 166 (FIG. 1) generated by thenetwork site configuration application 144 (FIG. 1) for configuring theoperation of the proxy server application 145 (FIG. 1). The renderednetwork page 166 includes a network site indication 203 that shows thatthe proxy management tool is presently configuring the network site atthe domain name “www.e-retailer.site.” The domain name is configured toresolve to an IP address associated with a network interface on whichthe proxy server application 145 is listening for resource requests.

Various proxy configuration entries 206 are displayed. The proxyconfiguration entries 206 that are displayed may be filtered by one ormore keywords using the keyword filtering tool 209 and/or by statususing the status filtering tool 212. The keyword filtering tool 209 mayshow, for example, only those proxy configuration entries 206 thatinclude the specified keyword in one or more designated fields. Thekeyword filtering tool 209 may include a text input box, a text area, adrop-down box, and/or other user interface components. The statusfiltering tool 212 may be used to include the proxy configurationentries 206 that meet one or more selected statuses, such as active,inactive, and so on. The status filtering tool 212 may include radiobuttons, a drop-down box, a slider, and/or other user interfacecomponents.

A create entry component 215 is provided for creating a new proxyconfiguration entry 206. A save component 218 is provided in order tosave changes to the proxy configuration and to update the proxycustomization data 146 (FIG. 1). A cancel component 221 is provided inorder to discard the changes to the proxy configuration. Edit components224 are provided in association with the respective proxy configurationentries 206 for making changes to existing proxy configuration entries.Although the create entry component 215, the save component 218, thecancel component 221, and the edit components 224 are depicted asbuttons, it is understood that the same may comprise links and/or otheruser interface components as desired.

Each of the proxy configuration entries 206 may include fields such asname, store URL, target URL, and a status. The name may specify afriendly name for the resource for purposes of management and tracking.The store URL may correspond to the URL provided by a user at a client121 within a request for a network page from the network site. Thetarget URL may correspond to a URL of a resource served up by theelectronic commerce application 130 (FIG. 1), the network page serverapplication 154 (FIG. 1), and/or another application. The statusindicates whether the respective proxy configuration entry 206 isactive. Different fields may be included in other embodiments.

The proxy configuration entry 206 a corresponds to a warrantyregistration application hosted by the merchant. When a user requests anetwork page 134 from the portion of the network site corresponding toURLs matching “/warranty/*,” the proxy server application 145 isconfigured to obtain the resource from the URL“http://www3.e-retailer.site/wreg/*,” which may correspond to networkresources served up by the network page server application 154 andmaintained by the merchant. The “*” occurring the URLs indicates one useof a regular expression for matching that includes a wildcard character.Uniform resource identifier (URI) templates and other forms of patternmatching may be used in some embodiments. It is noted that the URLs maybe absolute or relative in various embodiments. The proxy configurationentry 206 b corresponds to a store locator function for the merchant.The network page 134 at the URL “/locate.html” is mapped to the URL“http://www3.e-retailer.site/locate.xhtml,” which is also managed by themerchant and served up by the network page server application 154.

The proxy configuration entry 206 c corresponds to a mapping from onetype of a product catalog to another type of a product catalog. URLsthat match “/cat?id=(.*)” will be translated into a different formatcorresponding, for example, to a different electronic commerce platform.Grouping is used within the regular expression to capture theidentifier, which may be utilized in the target URL“http://www2.e-retailer.site/prod/CAT2PROD($1)),” for example, in thevariable “$1.” The network site configuration application 127 mayprovide various functions for use in the translation, such as, forexample, data dictionary lookup functions and others. In this case, thefunction “CAT2PROD( )” is employed to translate a first identifier intoa second identifier for use in the target URL. The data dictionaryand/or functions may be user defined in some embodiments. The proxyconfiguration entry 206 d corresponds to a default entry to match therest of the URLs in requests received by the proxy server application145. The proxy configuration entry 206 d specifies that all other URLsare to be served up by “http://www2.e-retailer.site/*,” whichcorresponds to the electronic commerce application 130 hosted by anelectronic commerce hosting provider.

In one embodiment, the ordering of the proxy configuration entries 206may be configurable, and the precedence of the proxy configurationentries 206 may be determined through the ordering. In otherembodiments, the precedence of the proxy configuration entries 206 maybe determined by other rules. In some embodiments, regular expressionsmay be used merely to determine matching. In other embodiments, regularexpressions may be used to define a translation of one URL to another,where extracted portions of a first URL are used in generating a secondURL.

Referring next to FIG. 3, shown is a flowchart that provides one exampleof the operation of a portion of the proxy server application 145according to various embodiments. It is understood that the flowchart ofFIG. 3 provides merely an example of the many different types offunctional arrangements that may be employed to implement the operationof the portion of the proxy server application 145 as described herein.As an alternative, the flowchart of FIG. 3 may be viewed as depicting anexample of steps of a method implemented in the computing device 113(FIG. 1) according to one or more embodiments.

Beginning with box 303, the proxy server application 145 obtains a URLfrom a client 121 (FIG. 1). For instance, the client 121 may open up aconnection to a network site at a given domain name or IP address. Theproxy server application 145 may be configured to listen, for example,at transmission control protocol (TCP) port 80, 443, 8080, or some otherport at an IP address to which the network site domain name resolvesusing the domain name system (DNS). The browser 163 (FIG. 1) at theclient 121 may issue an HTTP “GET” request, or another type of request,that includes the URL. The URL may correspond to an absolute URL or arelative URL in various embodiments.

In box 304, the proxy server application 145 determines which serverapplication hosts the content identified by the URL. As an example, theURL may point to content hosted by a server application that iscontrolled by an organization that is responsible for maintainingsecurity compliance for multiple customers. As another example, the URLmay point to content hosted by a server application that is controlledby the owner of the network site.

Next, in box 306, the proxy server application 145 determines whetherthe URL corresponds to external content. For example, the URL maycorrespond to a portion of the network site that is managed externallyby the owner of the network site, such as, for example, a merchant. Theproxy server application 145 may consult the proxy customization data146 (FIG. 1) to determine whether the obtained URL corresponds to auser-managed portion of the network site or a hosting provider-managedportion of the network site. The URL itself may be mapped to another URLin the proxy customization data 146, or one or more regular expressionsmay be used to define a mapping of one set of URLs matching the regularexpression(s) to another set of URLs.

If the URL corresponds to external content, the proxy server application145 moves to box 309 and obtains the content identified by the URL froman external server such as the network page server application 154(FIG. 1) executed in the computing device 115 (FIG. 1). In variousembodiments, the external content may be hosted within the computingdevice 103 in a trusted network 106 (FIG. 1) or within a computingdevice 115 in an untrusted network 112 (FIG. 1). Where the proxy serverapplication 145 comprises an HTTP proxy service, the proxy serverapplication 145 may open a connection to the computing device 115 at TCPport 80 and issue a “GET” or other HTTP request embodying the URL thatcorresponds to the external content. The proxy server application 145may need to authenticate with the network page server application 154 insome embodiments. The network page server application 154 may thenaccordingly provide the external content over the HTTP connection to theproxy server application 145.

In some embodiments, an encrypted connection such as an HTTP secure(HTTPS) connection employing secure sockets layer (SSL) and/or transportlayer security (TLS) may be used. Further, whether an encryptedconnection is used may depend on whether the client 121 initiates anencrypted connection. Where an HTTPS connection is used, a different TCPport such as 443 or another port may be used for the server-side ports.

In box 312, the proxy server application 145 sends the external contentto the client 121 by way of the previously established HTTP connection,HTTPS connection, or other connection. The content may be sent to theclient 121 after being the content has been received or while thecontent is being received. Thereafter, the portion of the proxy serverapplication 145 ends.

If the proxy server application 145 determines in box 306 that the URLobtained from the client 121 does not correspond to external content,the proxy server application 145 instead proceeds to box 315. As anon-limiting example, the URL may identify trusted content that iscontrolled or managed by a hosting provider such that compliance withsecurity standards such as PCI DSS is maintained. In box 315, the proxyserver application 145 obtains the content identified by the URL fromthe electronic commerce application 130 (FIG. 1) or some otherapplication. PCI DSS and other security standards are particularlyconcerned with the security of systems, applications, and data relatingto electronic commerce, making it desirable for the electronic commerceapplication 130 to be provider managed on behalf of one or moremerchants.

In one embodiment where the proxy server application 145 comprises anHTTP proxy service, the proxy server application 145 may open aconnection to the electronic commerce application 130 at TCP port 80 oranother port. The proxy server application 145 may issue a “GET” orother request followed by a URL corresponding to the content availablethrough the electronic commerce application 130. The proxy serverapplication 145 may need to authenticate with the electronic commerceapplication 130 in some embodiments. Accordingly, the content may bereturned by the electronic commerce application 130 to the proxy serverapplication 145 over the HTTP connection. Upon receiving the content,the proxy server application 145 transitions to box 312 and sends thecontent to the client 121. The content may be sent to the client 121after the content has been received or while the content is beingreceived. Thereafter, the portion of the proxy server application 145ends.

Turning now to FIG. 4, shown is a flowchart that provides one example ofthe operation of a portion of the electronic commerce application 130according to various embodiments. Specifically, FIG. 4 illustrates anexample of the electronic commerce application 130 functioning in atrusted network 106 (FIG. 1) in conjunction with an external proxyserver application 157 (FIG. 1) to request content that is userspecified. It is understood that the flowchart of FIG. 4 provides merelyan example of the many different types of functional arrangements thatmay be employed to implement the operation of the portion of theelectronic commerce application 130 as described herein. As analternative, the flowchart of FIG. 4 may be viewed as depicting anexample of steps of a method implemented in the computing device 103(FIG. 1) according to one or more embodiments. It is noted that thefunctionality depicted in FIG. 4 may additionally or alternatively beimplemented by any other application that is configured to generatenetwork pages 134 (FIG. 1).

Beginning with box 403, the electronic commerce application 130 obtainsa request for network data from untrusted content executed in a trustednetwork 106. For example, a merchant-specified URL may be embeddedwithin a network page template that is being processed by the electroniccommerce application 130 or another application to generate a networkpage 134. Because the URL is merchant specified and not manuallyapproved by the electronic commerce hosting provider, the URL comprisesuntrusted content.

In box 406, the electronic commerce application 130 determines whetherthe requested data is to be obtained from within the trusted network106. If the electronic commerce application 130 determines that therequested data is not to be obtained from the trusted network 106,electronic commerce application 130 proceeds to box 409 and obtains therequested data from the untrusted network 112 (FIG. 1). In box 412, theelectronic commerce application 130 returns the requested data.Thereafter, the portion of the electronic commerce application 130 ends.

If the proxy server application 145 determines in box 406 that therequested data is within the trusted network 106, the electroniccommerce application 130 instead proceeds to box 415. In box 415, theelectronic commerce application 130 determines whether the firewall 109(FIG. 1) permits external access of the requested data by a computingdevice 118 (FIG. 1) connected to the untrusted network 112. In variousembodiments, the electronic commerce application 130 may request thenetwork data from the external proxy server application 157, which hasan external view of the trusted network 106.

If the firewall 109 does not permit external access of the requesteddata, the electronic commerce application 130 moves to box 418 andreturns a denial of access error. In such a case, the requested data isrestricted from access by the untrusted content. Thereafter, the portionof the electronic commerce application 130 ends.

If the firewall 109 does permit external access of the requested data,the electronic commerce application 130 obtains the requested data fromthe trusted network 106 through the firewall 109. For example, therequested data may be returned by the external proxy server application157. In box 412, the electronic commerce application 130 returns therequested data. Thereafter, the portion of the electronic commerceapplication 130 ends.

Moving on to FIG. 5, shown is a flowchart that provides one example ofthe operation of a portion of the network site configuration application144 according to various embodiments. Specifically, FIG. 5 depicts animplementation of a migration of a network site from one electroniccommerce platform to another using the network site configurationapplication 144 to configure a proxy server application 145 (FIG. 1). Itis understood that the flowchart of FIG. 5 provides merely an example ofthe many different types of functional arrangements that may be employedto implement the operation of the portion of the network siteconfiguration application 144 as described herein. As an alternative,the flowchart of FIG. 5 may be viewed as depicting an example of stepsof a method implemented in the computing device 113 (FIG. 1) accordingto one or more embodiments.

Beginning with box 503, the network site configuration application 144configures the proxy server application 145 to obtain a first portion ofthe network site from a first electronic commerce application 130 (FIG.1). In one embodiment, the first electronic commerce application 130 maycorrespond to a network page server application 154 that is executed ina computing device 115 (FIG. 1). The first portion of the network sitemay correspond to one or more URLs, which may be defined through the useof one or more regular expressions.

In box 506, the network site configuration application 144 configuresthe domain name associated with the network site to point to the proxyserver application 145. For example, the network site configurationapplication 144 may configure the DNS zone file for the domain name suchthat the domain name and/or one or more subdomains of the domain namemay point to an IP address associated with the proxy server application145. Thus, network traffic for the network site will be directed to theproxy server application 145 hosted on the computing device 113.

In box 509, the network site configuration application 144 configuresthe proxy server application 145 to obtain a second portion of thenetwork site from a second electronic commerce application 130. In oneembodiment, the second electronic commerce application 130 is executedin the computing device 103, which may be under the security supervisionof a different organization from the computing device 115. Additionally,the second electronic commerce application 130 may correspond to adifferent electronic commerce platform from the first electroniccommerce application 130. In such a case, the proxy server application145 may be configured to translate URLs corresponding to the firstelectronic commerce application 130 and platform to the secondelectronic commerce application 130 and platform. In various sitemigrations, the site may be completely migrated from one platform toanother at once, and the task of box 509 may be omitted.

Next, in box 512, the network site configuration application 144reconfigures the proxy server application 145 to obtain the firstportion of the network site from the second electronic commerceapplication 130. To this end, the proxy server application 145 may beconfigured to translate URLs corresponding to the first electroniccommerce application 130 and platform to the second electronic commerceapplication 130 and platform for the first portion of the network site.Thereafter, the migration of the network site is complete and theportion of the network site configuration application 144 ends.

With reference to FIG. 6, shown is a schematic block diagram of thecomputing device 113 according to an embodiment of the presentdisclosure. The computing device 113 includes at least one processorcircuit, for example, having a processor 603 and a memory 606, both ofwhich are coupled to a local interface 609. To this end, the computingdevice 113 may comprise, for example, at least one server computer orlike device. The local interface 609 may comprise, for example, a databus with an accompanying address/control bus or other bus structure ascan be appreciated. The computing devices 103, 115 and 118 may beimplemented in hardware similarly to the computing device 113 asdepicted in FIG. 6.

Stored in the memory 606 are both data and several components that areexecutable by the processor 603. In particular, stored in the memory 606and executable by the processor 603 are the network site configurationapplication 144, the proxy server application 145, and potentially otherapplications. Also stored in the memory 606 may be a data store 143 andother data. In addition, an operating system may be stored in the memory606 and executable by the processor 603.

It is understood that there may be other applications that are stored inthe memory 606 and are executable by the processors 603 as can beappreciated. Where any component discussed herein is implemented in theform of software, any one of a number of programming languages may beemployed such as, for example, C, C++, C#, Objective C, Java,Javascript, Perl, PHP, Visual Basic, Python, Ruby, Delphi, Flash, orother programming languages.

A number of software components are stored in the memory 606 and areexecutable by the processor 603. In this respect, the term “executable”means a program file that is in a form that can ultimately be run by theprocessor 603. Examples of executable programs may be, for example, acompiled program that can be translated into machine code in a formatthat can be loaded into a random access portion of the memory 606 andrun by the processor 603, source code that may be expressed in properformat such as object code that is capable of being loaded into a randomaccess portion of the memory 606 and executed by the processor 603, orsource code that may be interpreted by another executable program togenerate instructions in a random access portion of the memory 606 to beexecuted by the processor 603, etc. An executable program may be storedin any portion or component of the memory 606 including, for example,random access memory (RAM), read-only memory (ROM), hard drive,solid-state drive, USB flash drive, memory card, optical disc such ascompact disc (CD) or digital versatile disc (DVD), floppy disk, magnetictape, or other memory components.

The memory 606 is defined herein as including both volatile andnonvolatile memory and data storage components. Volatile components arethose that do not retain data values upon loss of power. Nonvolatilecomponents are those that retain data upon a loss of power. Thus, thememory 606 may comprise, for example, random access memory (RAM),read-only memory (ROM), hard disk drives, solid-state drives, USB flashdrives, memory cards accessed via a memory card reader, floppy disksaccessed via an associated floppy disk drive, optical discs accessed viaan optical disc drive, magnetic tapes accessed via an appropriate tapedrive, and/or other memory components, or a combination of any two ormore of these memory components. In addition, the RAM may comprise, forexample, static random access memory (SRAM), dynamic random accessmemory (DRAM), or magnetic random access memory (MRAM) and other suchdevices. The ROM may comprise, for example, a programmable read-onlymemory (PROM), an erasable programmable read-only memory (EPROM), anelectrically erasable programmable read-only memory (EEPROM), or otherlike memory device.

Also, the processor 603 may represent multiple processors 603 and thememory 606 may represent multiple memories 606 that operate in parallelprocessing circuits, respectively. In such a case, the local interface609 may be an appropriate network that facilitates communication betweenany two of the multiple processors 603, between any processor 603 andany of the memories 606, or between any two of the memories 606, etc.The local interface 609 may comprise additional systems designed tocoordinate this communication, including, for example, performing loadbalancing. The processor 603 may be of electrical or of some otheravailable construction.

Although the network site configuration application 144, the electroniccommerce application 130, the proxy server application 145, and othervarious systems described herein may be embodied in software or codeexecuted by general purpose hardware as discussed above, as analternative the same may also be embodied in dedicated hardware or acombination of software/general purpose hardware and dedicated hardware.If embodied in dedicated hardware, each can be implemented as a circuitor state machine that employs any one of or a combination of a number oftechnologies. These technologies may include, but are not limited to,discrete logic circuits having logic gates for implementing variouslogic functions upon an application of one or more data signals,application specific integrated circuits having appropriate logic gates,or other components, etc. Such technologies are generally well known bythose skilled in the art and, consequently, are not described in detailherein.

The flowcharts of FIGS. 3-5 show the functionality and operation of animplementation of portions of the proxy server application 145, theelectronic commerce application 130, and the network site configurationapplication 144. If embodied in software, each block may represent amodule, segment, or portion of code that comprises program instructionsto implement the specified logical function(s). The program instructionsmay be embodied in the form of source code that comprises human-readablestatements written in a programming language or machine code thatcomprises numerical instructions recognizable by a suitable executionsystem such as a processor 603 in a computer system or other system. Themachine code may be converted from the source code, etc. If embodied inhardware, each block may represent a circuit or a number ofinterconnected circuits to implement the specified logical function(s).

Although the flowcharts of FIGS. 3-5 show a specific order of execution,it is understood that the order of execution may differ from that whichis depicted. For example, the order of execution of two or more blocksmay be scrambled relative to the order shown. Also, two or more blocksshown in succession in FIGS. 3-5 may be executed concurrently or withpartial concurrence. Further, in some embodiments, one or more of theblocks shown in FIGS. 3-5 may be skipped or omitted. In addition, anynumber of counters, state variables, warning semaphores, or messagesmight be added to the logical flow described herein, for purposes ofenhanced utility, accounting, performance measurement, or providingtroubleshooting aids, etc. It is understood that all such variations arewithin the scope of the present disclosure.

Also, any logic or application described herein, including the networksite configuration application 144, the electronic commerce application130, and the proxy server application 145, that comprises software orcode can be embodied in any non-transitory computer-readable medium foruse by or in connection with an instruction execution system such as,for example, a processor 603 in a computer system or other system. Inthis sense, the logic may comprise, for example, statements includinginstructions and declarations that can be fetched from thecomputer-readable medium and executed by the instruction executionsystem. In the context of the present disclosure, a “computer-readablemedium” can be any medium that can contain, store, or maintain the logicor application described herein for use by or in connection with theinstruction execution system. The computer-readable medium can compriseany one of many physical media such as, for example, magnetic, optical,or semiconductor media. More specific examples of a suitablecomputer-readable medium would include, but are not limited to, magnetictapes, magnetic floppy diskettes, magnetic hard drives, memory cards,solid-state drives, USB flash drives, or optical discs. Also, thecomputer-readable medium may be a random access memory (RAM) including,for example, static random access memory (SRAM) and dynamic randomaccess memory (DRAM), or magnetic random access memory (MRAM). Inaddition, the computer-readable medium may be a read-only memory (ROM),a programmable read-only memory (PROM), an erasable programmableread-only memory (EPROM), an electrically erasable programmableread-only memory (EEPROM), or other type of memory device.

It should be emphasized that the above-described embodiments of thepresent disclosure are merely possible examples of implementations setforth for a clear understanding of the principles of the disclosure.Many variations and modifications may be made to the above-describedembodiment(s) without departing substantially from the spirit andprinciples of the disclosure. All such modifications and variations areintended to be included herein within the scope of this disclosure andprotected by the following claims.

For the Examiner's convenience, Applicant notes that this application isa divisional of U.S. application Ser. No. 12/943,127. The claims of thepresent application are different and possibly, at least in someaspects, broader in scope than the claims pursued in the parentapplication. To the extent any prior amendments or characterizations ofthe scope of any claim or cited document made during prosecution of theparent could be construed as a disclaimer of any subject mattersupported by the present disclosure, Applicant hereby rescinds andretracts such disclaimer. Accordingly, the references previouslypresented in the parent applications may need to be revisited.

Therefore, the following is claimed:
 1. A method, comprising: receiving,via a proxy server application executed by a first computing device, arequest for network content from a second computing device, the networkcontent being hosted by an organization on behalf of a customer;determining, via the proxy server application executed by the firstcomputing device, whether the network content corresponds to a securedportion of a network site based at least in part on a proxyconfiguration entry designating a predefined uniform resource locator(URL) pattern that corresponds to the secured portion; receiving, viathe proxy server application executed by the first computing device, thenetwork content, wherein the network content is received across afirewall from an application on a trusted network that is subject tosecurity supervision by the organization when the network content isdetermined to correspond to the secured portion of the network site, andwherein the network content is received from a network content serverapplication managed by the customer not behind the firewall on anuntrusted network that is not subject to security supervision by theorganization when the network content is determined to correspond to anunsecured portion of the network site; and sending, via the proxy serverapplication executed by the first computing device, the network contentto the second computing device, the first computing device being withinthe untrusted network.
 2. The method of claim 1, wherein the customer isa merchant, and the application comprises an electronic commerceapplication.
 3. The method of claim 2, wherein the electronic commerceapplication is configured to process an electronic payment for aplurality of different merchants.
 4. The method of claim 2, wherein theelectronic commerce application is subject to compliance with PaymentCard Industry Data Security Standards (PCI DSS).
 5. The method of claim1, further comprising initiating, via the proxy server applicationexecuted by the first computing device, a hypertext transfer protocolsecure (HTTPS) connection to the network content server application overthe untrusted network.
 6. The method of claim 1, wherein the securedportion of the network site corresponds to a first domain name of thecustomer, and the unsecured portion of the network site corresponds to asecond domain name of the customer.
 7. The method of claim 1, furthercomprising determining, via the first computing device, whether thenetwork content corresponds to the secured portion of the network siteor the unsecured portion of the network site based at least in part on auniform resource locator (URL) included in the request for the networkcontent.
 8. The method of claim 1, further comprising: restricting, viathe first computing device, first management access by the customer tothe secured portion of the network site; and facilitating, via the firstcomputing device, second management access by the customer to theunsecured portion of the network site.
 9. A system, comprising: aprocessor of a first computing device; and a proxy server applicationexecutable in the first computing device, wherein when executed theproxy server application causes the first computing device to at least:receive a request for network content from a second computing device,the network content being hosted by an organization on behalf of acustomer; request the network content from a second application across afirewall on a trusted network that is subject to security supervision bythe organization when the network content is determined to correspond toa secured portion of a network site based at least in part on a firstproxy configuration entry designating a first predefined uniformresource locator (URL) pattern that corresponds to the secured portion;request the network content from a third application managed by thecustomer on an untrusted network that is not behind the firewall and isnot subject to security supervision by the organization when the networkcontent is determined to correspond to an unsecured portion of thenetwork site based at least in part on a second proxy configurationentry designating a second predefined URL pattern that corresponds tothe unsecured portion; and send the network content to the secondcomputing device.
 10. The system of claim 9, wherein when executed theproxy server application further causes the first computing device to atleast determine whether the network content corresponds to the securedportion of the network site or the unsecured portion of the network sitebased at least in part on a uniform resource locator (URL) embodied inthe request for the network content.
 11. The system of claim 9, whereinwhen executed the proxy server application further causes the firstcomputing device to at least determine whether the network contentcorresponds to the secured portion of the network site or the unsecuredportion of the network site based at least in part on a header fieldembodied in the request for the network content.
 12. The system of claim9, wherein first management access by the customer to the securedportion of the network site is subject to a restriction, and secondmanagement access by the customer to the unsecured portion of thenetwork site is not subject to the restriction.
 13. The system of claim9, wherein the proxy server application is executed in the untrustednetwork or a quarantined portion of the trusted network.
 14. The systemof claim 9, wherein the third application is a network page serverapplication.
 15. The system of claim 9, wherein the network contentcomprises a network page.
 16. A non-transitory computer-readable mediumembodying a proxy server application executable in a first computingdevice, wherein when executed the proxy server application causes thefirst computing device to at least: receive a request for networkcontent from a second computing device, the network content being hostedby an organization on behalf of a customer; request the network contentacross a firewall from a second application on a trusted network that issubject to security supervision by the organization when the networkcontent is determined to correspond to a secured portion of a networksite based at least in part on a proxy configuration entry designating afirst predefined uniform resource locator (URL) pattern that correspondsto the secured portion; request the network content from a thirdapplication managed by the customer on an untrusted network that is notsubject to security supervision by the organization when the networkcontent is determined to correspond to an unsecured portion of thenetwork site based at least in part on a second proxy configurationentry designating a second predefined URL pattern that corresponds tothe unsecured portion; and send the network content to the secondcomputing device.
 17. The non-transitory computer-readable medium ofclaim 16, wherein when executed the proxy server application furthercauses the first computing device to at least determine whether thenetwork content corresponds to the unsecured portion of the network siteby comparing a uniform resource locator (URL) embodied in the requestfor the network content to a set of URLs managed by the customer. 18.The non-transitory computer-readable medium of claim 16, wherein thesecond application is configured to facilitate electronic commerce forthe customer and at least one other customer of the organization. 19.The non-transitory computer-readable medium of claim 16, wherein whenexecuted the proxy server application further causes the first computingdevice to at least: restrict first management access by the customer tothe secured portion of the network site; and facilitate secondmanagement access by the customer to the unsecured portion of thenetwork site.
 20. The non-transitory computer-readable medium of claim16, wherein when executed the proxy server application further causesthe first computing device to at least determine whether the networkcontent corresponds to the secured portion of the network site or theunsecured portion of the network site based at least in part on a headerfield embodied in the request for the network content.