Method and system for transparent file proxying
First Claim
1. A method for transparent file proxying, the method comprising:
- coupling a plurality of computing devices to a local area network, each of said plurality of computing devices including a local memory element containing a plurality of files, at least one of said plurality of computing device coupled to a wide area network;
coupling a remote memory element to said wide area network, said remote memory element configured to maintain a copy of the first file selected from said plurality of files contained in the local memory elements of said plurality of computing devices;
said at least one of said plurality of computing devices to a wide area communication network;
coupling a remote computing device to said remote memory element;
intercepting, in said remote memory element, an Internet Protocol (IP) communication message from said remote computing device, said IP communication message corresponding to a request from a first user to access a requested file; and
providing information corresponding to said copy of said first file to said remote computing device from said remote memory element without said IP communication message traversing said wide area communication network and said local area network if the first user is authorized to access said requested file and if said requested file corresponds to said first file;
wherein, if the first user is authorized access, said remote memory element updates said copy of said first file in response to receiving information corresponding to a modification of said first file from said remote computing device; and
wherein, after the remote memory element updates said copy of said first file, said remote memory device causes said first file to be updated.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for transparent file proxying allows an intelligent storage appliance (ISA) that connects a remote computer connected to a local area network (LAN) through a wide area network (WAN) to locally provide to the remote computer files that would otherwise be obtained from a computing device connected to the LAN over the WAN. Based upon policies that include user policies, group policies and corporate policies, selected files are transferred (or mirrored) from the computing devices connected to the LAN to the ISA. When the remote computer desires to access a file, the ISA intercepts and analyzes the file request. If the ISA determines that the requested file is one that is locally stored on the ISA, the ISA intercepts and services the request locally (thereby preventing the request from traversing the WAN), and transparently proxies the selected file to the remote computer. A user of the remote computer views the file, unaware that the file is locally provided by the ISA. If the user modifies the file, the ISA forwards data necessary to reconstruct a modified copy of the file to a computing device connected to the LAN, thereby maintaining file integrity between the file located on a computing device connected to the LAN and the copy locally stored on the ISA. Similarly, if a file that is locally stored on the ISA is modified while on the computing device connected to the LAN, data necessary to reconstruct an updated version of the file is forwarded (mirrored) to the ISA.
34 Citations
10 Claims
-
1. A method for transparent file proxying, the method comprising:
-
coupling a plurality of computing devices to a local area network, each of said plurality of computing devices including a local memory element containing a plurality of files, at least one of said plurality of computing device coupled to a wide area network; coupling a remote memory element to said wide area network, said remote memory element configured to maintain a copy of the first file selected from said plurality of files contained in the local memory elements of said plurality of computing devices; said at least one of said plurality of computing devices to a wide area communication network; coupling a remote computing device to said remote memory element; intercepting, in said remote memory element, an Internet Protocol (IP) communication message from said remote computing device, said IP communication message corresponding to a request from a first user to access a requested file; and providing information corresponding to said copy of said first file to said remote computing device from said remote memory element without said IP communication message traversing said wide area communication network and said local area network if the first user is authorized to access said requested file and if said requested file corresponds to said first file; wherein, if the first user is authorized access, said remote memory element updates said copy of said first file in response to receiving information corresponding to a modification of said first file from said remote computing device; and wherein, after the remote memory element updates said copy of said first file, said remote memory device causes said first file to be updated. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for transparent file proxying, comprising:
-
a local network to which is coupled a plurality of computing devices, at least one of said plurality of computing devices including the ability to route communication packets to said remaining plurality of computing devices, each of said plurality of computing devices including a memory element containing a plurality of files; a communication network coupled to said at least one of said plurality of computing devices; a remote memory element coupled to said communication network; a remote computing device connected to said remote memory element, said remote memory element configured to intercept an Internet Protocol (IP) communication message from said remote computing device, said remote memory element configured to maintain a copy of a first file selected from said plurality of files contained in the memory elements of said plurality of computing devices; and wherein said remote memory element is configured to provide information corresponding to said copy of the first file to said remote computing device in response to said remote memory element; intercepting said IP communication message from said remote computing device, determining that the first user is authorized access, and determining that said file corresponds to said first file, said IP communication message corresponding to a request from the first user to access said first file from one of said plurality of computing devices connected to said local network, thus providing information corresponding to said copy of the first file to said remote computing device without said IP communication message traversing said communication network and said local area network; wherein said remote memory element updates said copy of said first file in response to receiving information corresponding to a modification of said first file from said remote computing device; and wherein, after the remote memory element updates said copy of said first file, said remote memory device causes said first file to be updated. - View Dependent Claims (7, 8, 9, 10)
-
Specification