METHOD AND SYSTEM OF USING A LOCAL HOSTED CACHE AND CRYPTOGRAPHIC HASH FUNCTIONS TO REDUCE NETWORK TRAFFIC
2 Assignments
0 Petitions
Accused Products
Abstract
The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a hosted cache system is enabled. A hosted cache at the client side may provide the data to the client based on the hashes. The hashes may be generated to provide a fingerprint of the data which may be used to index the data in an efficient manner.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method, comprising:
-
receiving, at a server, a first request message from a client over a network, wherein the first request message comprises an indication of a first set of data stored at the server; determining, at the server, that the first request message is a request for encrypted data and the first request message contains an indication that the client is enabled to use a hosted cache; generating a set of hashes using a first hash function for the first set of data stored at the server; transmitting, by the server to the client via the network, the set of hashes without the first set of data; receiving, by the server, a second request message from the client over the network, wherein the second request message contains an indication of a second set of data stored at the server; determining, at the server, that the second request message is a request for non-encrypted data; and providing to the client the second set of data. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A server system, comprising:
-
at least one processor; memory, operatively connected to the at least one processor and storing instructions that, when executed by the at least one processor, cause the system to perform a method, the method comprising; receiving, at the server system, a first request message from a client over a network, wherein the first request message comprises an indication of a first set of data stored at the server system; determining, at the server system, that the first request message is a request for encrypted data and the first request message contains an indication that the client is enabled to use a hosted cache; generating a set of hashes using a first hash function for the first set of data stored at the server system; transmitting, by the server system to the client via the network, the set of hashes without the first set of data; receiving, by the server system, a second request message from the client over the network, wherein the second request message contains an indication of a second set of data stored at the server system; determining, at the server system, that the second request message is a request for non-encrypted data; and providing to the client the second set of data. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A computer memory storing instructions that, when executed by at least one processor, perform a method, the method comprising:
-
receiving, at a server, a first request message from a client over a network, wherein the first request message comprises an indication of a first set of data stored at the server; determining, at the server, that the first request message is a request for encrypted data and the first request message contains an indication that the client is enabled to use a hosted cache; generating a set of hashes using a first hash function for the first set of data stored at the server; transmitting, by the server to the client via the network, the set of hashes without the first set of data; receiving, by the server, a second request message from the client over the network, wherein the second request message contains an indication of a second set of data stored at the server; determining, at the server, that the second request message is a request for non-encrypted data; and providing to the client the second set of data. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification