INTERNET-BASED PROXY SERVICE TO LIMIT INTERNET VISITOR CONNECTION SPEED
First Claim
1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:
- receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities;
analyzing the request to determine whether a visitor belonging to the request poses a threat; and
responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open.
2 Assignments
0 Petitions
Accused Products
Abstract
A proxy server for limiting Internet connection speed of visitors that pose a threat. The proxy server receives from a client device a request to perform an action on an identified resource that is hosted at an origin server for a domain. The proxy server receives the request as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server analyzes the request to determine whether a visitor belonging to the request poses a threat. If the proxy server determines that the visitor poses a threat, the proxy server reduces the speed at which the proxy server processes the request while keeping a connection to the client device open.
-
Citations
21 Claims
-
1. A method in a proxy server for limiting Internet connection speed of visitors that pose a threat, comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities; analyzing the request to determine whether a visitor belonging to the request poses a threat; and responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A proxy server to limit Internet connection speed of visitors that pose a threat, comprising:
-
a memory to store instructions; a processor coupled with the memory to process the stored instructions to; receive, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities; analyze the request to determine whether a visitor belonging to the request poses a threat; and responsive to a determination that the visitor belonging to the request poses a threat, reduce the speed at which the proxy server processes the request while keeping a connection to the client device open. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable storage medium that provides instructions that, when executed by a processor, cause said processor to perform operations comprising:
-
receiving, from a client device, a request to perform an action on an identified resource that is hosted at an origin server for a domain as a result of a DNS (Domain Name System) request for the domain resolving to the proxy server, wherein the origin server is one of a plurality of origin servers that belong to different domains that resolve to the proxy server and are owned by different entities; analyzing the request to determine whether a visitor belonging to the request poses a threat; and responsive to a determination that the visitor belonging to the request poses a threat, reducing the speed at which the proxy server processes the request while keeping a connection to the client device open. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification