NETWORK TRAFFIC RATE LIMITING SYSTEM AND METHOD
First Claim
1. A system for rate limiting network traffic flow of an untrusted application, comprising:
- a master module in a server environment configured to manage network traffic flow restrictions;
a slave module configured to execute client applications in the server environment;
a services module in the server environment operable to execute a trusted application configured to validate the client application to the master module; and
a traffic restriction module on the master module operable to set network traffic restrictions on a slave module when validation has not been received for the client application on the slave module, and to receive client application validations from the trusted application to unrestrict network traffic flow for the client application on the slave module.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for rate limiting network traffic flow of an untrusted application. A master module in a server environment manages network traffic flow restrictions. A slave module executes client applications in the server environment. A services module in the server environment executes a trusted application to validate the client application to the master module. A traffic restriction module on the master module sets network traffic restrictions when validation has not been received for the client application on the slave blade, and receives client application validations from the trusted application to unrestrict network traffic flow for the client application on the slave blade.
-
Citations
20 Claims
-
1. A system for rate limiting network traffic flow of an untrusted application, comprising:
-
a master module in a server environment configured to manage network traffic flow restrictions; a slave module configured to execute client applications in the server environment; a services module in the server environment operable to execute a trusted application configured to validate the client application to the master module; and a traffic restriction module on the master module operable to set network traffic restrictions on a slave module when validation has not been received for the client application on the slave module, and to receive client application validations from the trusted application to unrestrict network traffic flow for the client application on the slave module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for rate limiting network traffic flow of untrusted applications, comprising:
-
a master management module on a master blade in a blade server environment configured to manage network traffic flow restrictions; a slave blade in the blade server environment and accessible by a third-party; a client application configured to run on the slave blade; a trusted application configured to run on a services module in the blade server environment and to validate the client application to the master management module; and a traffic restriction module on the master management module operable to set network traffic restrictions on the slave blade when validation has not been received for the client application on the slave blade, and to receive client application validations from the trusted application to unrestrict network traffic flow for the client application on the slave blade.
-
-
16. A method for internal application authentication, comprising:
-
executing a trusted application on a services module in a blade server environment having restricted network traffic flow; running a client application on a slave blade; authenticating the client application using the trusted application; validating the client application to a master blade using the trusted application; and unrestricting network traffic flow for the client application on the slave blade with the master blade in response to validation of the client application. - View Dependent Claims (17, 18, 19, 20)
-
Specification