ROUTING PROXY FOR RESOURCE REQUESTS AND RESOURCES
First Claim
1. A method performed by a computing device, the method comprising:
- receiving, by the computing device and from a client device, a request for a resource, where the request provides an identifier of the client device;
selecting, by the computing device, a target device for the resource;
connecting the computing device with the selected target device;
providing, by the computing device, a proxy of the request to the selected target device, where the proxy of the request hides the identifier of the client device;
receiving, by the computing device, the resource from the selected target device, where the resource provides an identifier of the target device; and
providing, by the computing device, a proxy of the resource to the client device, where the proxy of the resource hides the identifier of the target device.
1 Assignment
0 Petitions
Accused Products
Abstract
A device receives, from a client device, a request for a resource, where the request provides an identifier of the client device. The device selects a target device for the resource, connects with the selected target device, and provides a proxy of the request to the selected target device, where the proxy of the request hides the identifier of the client device. The device receives the resource from the selected target device, where the resource provides an identifier of the target device. The device provides a proxy of the resource to the client device, where the proxy of the resource hides the identifier of the target device.
71 Citations
25 Claims
-
1. A method performed by a computing device, the method comprising:
-
receiving, by the computing device and from a client device, a request for a resource, where the request provides an identifier of the client device; selecting, by the computing device, a target device for the resource; connecting the computing device with the selected target device; providing, by the computing device, a proxy of the request to the selected target device, where the proxy of the request hides the identifier of the client device; receiving, by the computing device, the resource from the selected target device, where the resource provides an identifier of the target device; and providing, by the computing device, a proxy of the resource to the client device, where the proxy of the resource hides the identifier of the target device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network device, comprising:
a processor to; receive, from a client device, a request for a resource, where the request provides an identifier of the client device, select a target device for the resource, connect the network device with the selected target device, provide a proxy of the request to the selected target device, where the proxy of the request includes the request and substitutes an Internet protocol (IP) address of the network device for the identifier of the client device, receive the resource from the selected target device, where the resource provides an identifier of the target device, and provide a proxy of the resource to the client device, where the proxy of the resource includes the resource and substitutes the IP address of the network device for the identifier of the target device. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
18. One or more non-transitory computer-readable media storing instructions executable by one or more processors of an edge device, the media comprising:
-
one or more instructions to receive, from a client device, a request for a resource, where the request provides an identifier of the client device; one or more instructions to select a target device for the resource from a plurality of server devices storing resources and a local cache associated with the edge device; one or more instructions to provide a proxy of the request to the selected target device, where the proxy of the request hides the identifier of the client device; one or more instructions to receive the resource from the selected target device, where the resource provides an identifier of the target device; and one or more instructions to provide a proxy of the resource to the client device, where the proxy of the resource hides the identifier of the target device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification