Method, apparatus and system for virtualized peer-to-peer proxy services
First Claim
1. A method for providing a virtual proxy, comprising:
- starting up a virtual proxy in a first virtual machine (“
VM”
) on a VM host, the virtual proxy capable of;
intercepting a content request from a second VM on the VM host; and
enforcing access restrictions on the content request.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus and system for virtualized proxy services are disclosed herein. Specifically, on one embodiment, a virtual proxy may be implemented in a virtual machine host. The virtual proxy may reside within a dedicated or shared virtual partition and may include a set of access restrictions. In one embodiment, a network including virtual machine hosts having virtual proxies may also provide additional peer-to-peer services. More specifically, a virtual proxy on a virtual host may be configured to broadcast/multicast content requests to other virtual hosts on the network prior to accessing the content from a remote location. If the content has previously been downloaded by another virtual host on the network, the virtual proxy on the requesting host may copy the content from the peer virtual host, instead of downloading the content from the remote location again. A variety of security measures may be implemented in one embodiment to ensure data integrity.
-
Citations
33 Claims
-
1. A method for providing a virtual proxy, comprising:
starting up a virtual proxy in a first virtual machine (“
VM”
) on a VM host, the virtual proxy capable of;
intercepting a content request from a second VM on the VM host; and
enforcing access restrictions on the content request. - View Dependent Claims (2, 3, 4)
-
5. A method for providing a virtual proxy, comprising:
starting up a virtual proxy in a first virtual machine (“
VM”
) on a first VM host coupled to a network, the virtual proxy capable of;
intercepting a content request from a second VM on the first VM host;
enforcing access restrictions on the content request;
transmitting the content request via a broadcast protocol to other VM hosts coupled to the network; and
receiving a response from at least one of the other VM hosts coupled to the network if the at least one of the other VM hosts contains content corresponding to the content request. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
12. A system for providing a virtual proxy, comprising:
-
a virtual machine manager;
a first virtual machine coupled to the virtual machine manager;
a second virtual machine coupled to the virtual machine manager;
a virtual proxy coupled to the virtual machine manager, the virtual proxy capable of intercepting content requests from the first virtual machine and the second virtual machine, the virtual proxy additionally capable of enforcing access restrictions to content corresponding to the content requests. - View Dependent Claims (13, 14, 15)
-
-
16. A system for providing a virtual proxy, comprising:
-
a first virtual machine (“
VM”
) host coupled to a network;
other VM hosts coupled to the network;
a virtual proxy in the first VM host, the virtual proxy capable of;
intercepting a content request from a VM on the first VM host;
enforcing access restrictions on the content request;
transmitting the content request via a broadcast protocol to the other VM hosts coupled to the network; and
receiving a response from at least one of the VM hosts coupled to the network if the at least one of the VM hosts contains content corresponding to the content request. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. An article comprising a machine-accessible medium having stored thereon instructions that, when executed by a rnachine, cause the machine to:
start up a virtual proxy in a first virtual machine (“
VM”
) on a VM host, the virtual proxy capable of;
intercepting a content request from a second VM on the VM host; and
enforcing access restrictions on the content request. - View Dependent Claims (24, 25, 26)
-
27. An article comprising a machine-accessible medium having stored thereon instructions that, when executed by a machine, cause the machine to:
start up a virtual proxy in a first virtual machine (“
VM”
) on a first VM host coupled to a network, the virtual proxy capable of;
intercepting a content request from a second VM on the first VM host;
enforcing access restrictions on the content request;
transmitting the content request via a broadcast protocol to other VM hosts coupled to the network; and
receiving a response from at least one of the other VM hosts coupled to the network if the at least one of the other VM hosts contains content corresponding to the content request. - View Dependent Claims (28, 29, 30, 31, 32, 33)
Specification