SYSTEM AND METHOD FOR OPTIMIZING NAME-RESOLUTION OVERHEAD IN A CACHING NETWORK INTERMEDIARY DEVICE
First Claim
1. In a network intermediary device, a computer-implemented method for name resolution, comprising:
- receiving an object by the network intermediary device that is transmitted between a client and a server, the object associated with a network protocol, an object name, a supplier identity, and one or more trust properties responsive to the resolution of the object name to the supplier identity;
querying an object storage to determine if the object name associated with the object exists in the object storage;
responsive to the object name associated with the object that exists in the object storage, examining the trust properties of the object to be obtained from a supplier of trusted resolution by the network intermediary device; and
responsive to the object being an untrusted object, comparing the supplier identity of the object with an implied client-resolved supplier address by the network intermediary device.
11 Assignments
0 Petitions
Accused Products
Abstract
The present invention describes a system, method, and article of manufacture for resolving names received in network protocol requests by a network intermediary device coupled between a client network and a server network. A deferred trust model caching engine in the network intermediary device includes a transactor module configured to efficiently process a protocol request with a sequence of determinant criteria, although the sequence can occur in different orders. The deferred trust model caching engine includes a cacheability evaluator component configured to determine whether the protocol request is for a resource that the protocol permits to be cached by the network intermediate device, and a supplier trust evaluator component configured to compare information about the client'"'"'s network protocol request and a cached object representation to determine if the object is trustworthy or not. The cached object representation associates an object with a supplier identity and a supplier trust property.
-
Citations
46 Claims
-
1. In a network intermediary device, a computer-implemented method for name resolution, comprising:
-
receiving an object by the network intermediary device that is transmitted between a client and a server, the object associated with a network protocol, an object name, a supplier identity, and one or more trust properties responsive to the resolution of the object name to the supplier identity; querying an object storage to determine if the object name associated with the object exists in the object storage; responsive to the object name associated with the object that exists in the object storage, examining the trust properties of the object to be obtained from a supplier of trusted resolution by the network intermediary device; and responsive to the object being an untrusted object, comparing the supplier identity of the object with an implied client-resolved supplier address by the network intermediary device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A network intermediary device disposed between a client network and a server network, comprising:
-
a network protocol module configured to decode a network protocol associated with an object transmitted from a client, the object associated with a network protocol, an object name, a supplier identity, and one or more trust properties responsive to the resolution of the object name to the supplier identity; a transactor module, communicatively coupled to the network protocol module, having a cacheability evaluator component and a supplier trust evaluator component, the cacheability evaluator component configured to determine that the network protocol of the object permits the object to be cached by the network intermediary device, the transactor configured to query an object storage to determine if the name object exists in the object storage. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
-
39. A computer program product comprising a computer readable storage medium structured to store instructions executable by a processor in a mobile device, the instructions, when executed cause the processor to:
-
a network protocol module configured to decode a network protocol associated with an object transmitted from a client, the object associated with a network protocol, an object name, and a supplier identity, and one or more trust properties responsive to the resolution of the object name to the supplier identity; a transactor module, communicatively coupled to the network protocol module, having a cacheability evaluator component and a supplier trust evaluator component, the cacheability evaluator component configured to determine that the network protocol of the object permits the object to be cached by the network intermediary device, the transactor configured to query an object storage to determine if the name object exists in the object storage.
-
-
40. In a network intermediary device, a computer-implemented method for name resolution, comprising:
-
receiving an object by the network intermediary device that is transmitted between a client and a server, the object associated with a network protocol, an object name, a supplier identity, and one or more trust properties responsive to the resolution of the object name to the supplier identity; and determining by the network intermediary device if the object is cacheable, the object being cacheable if the associated network protocol is permitted to be cached by the network intermediary device. - View Dependent Claims (41, 42, 43, 44, 45)
-
-
46. In a network intermediary device, a computer-implemented method for name resolution, comprising:
-
receiving an object by the network intermediary device that is transmitted between a client and a server, the object associated with a network protocol, an object name, a supplier identity and one or more trust properties responsive to the resolution of the object name to the supplier identity; determining by the network intermediary device if the object is cacheable, the object being cacheable if the associated network protocol is permitted to be cached by the network intermediary device; responsive to the object being provisionally cacheable, querying an object storage to determine if the object name associated with the object exists in the object storage; responsive to the object name associated with the object that exists in the object storage, examining the one or more trust properties of the object to be a trusted objected or an untrusted object by the network intermediary device; responsive to the object being an untrusted object, comparing the supplier identity of the object with an implied client-resolved supplier address by the network intermediary device; and responsive to the supplier identity of the object that does not match with the implied client-resolved supplier address, resolving the object name associated with the object by a name resolution module in the network intermediary device to determine an authoritative list of supplier identities.
-
Specification