Routing proxy for resource requests and resources
First Claim
Patent Images
1. A method comprising:
- receiving, by a computing device and from a client device, a first request for a first resource,the first request including an identifier of the client device;
selecting, by the computing device, a first target device for the first resource;
connecting the computing device with the first target device;
providing, by the computing device, a proxy of the first request to the first target device,the proxy of the first request spoofing the identifier of the client device;
receiving, by the computing device, a first portion of the first resource from the first target device,the first portion of the first resource including an identifier of the first target device;
receiving, by the computing device and after receiving the first portion of the first resource from the first target device, an indication of an event associated with the first target device or a network associated with the first target device;
selecting, by the computing device and after receiving the indication of the event, a second target device for the first resource;
retrieving, by the computing device, a second portion of the first resource from the second target device;
providing, by the computing device and to the client device, a proxy of the first resource based on the first portion of the first resource and the second portion of the first resource,the proxy of the first resource spoofing the identifier of the first target device;
receiving, by the computing device and from the client device, a second request for a second resource,the first request and the second request being associated with a connection;
selecting, by the computing device, a third target device for the second resource;
retrieving, by the computing device, the second resource from the third target device; and
providing, by the computing device, a proxy of the second resource to the client device,the proxy of the second resource spoofing an identifier of the third target device.
1 Assignment
0 Petitions
Accused Products
Abstract
A device receives, from a client device, a request for a resource, where the request provides an identifier of the client device. The device selects a target device for the resource, connects with the selected target device, and provides a proxy of the request to the selected target device, where the proxy of the request hides the identifier of the client device. The device receives the resource from the selected target device, where the resource provides an identifier of the target device. The device provides a proxy of the resource to the client device, where the proxy of the resource hides the identifier of the target device.
66 Citations
25 Claims
-
1. A method comprising:
-
receiving, by a computing device and from a client device, a first request for a first resource, the first request including an identifier of the client device; selecting, by the computing device, a first target device for the first resource; connecting the computing device with the first target device; providing, by the computing device, a proxy of the first request to the first target device, the proxy of the first request spoofing the identifier of the client device; receiving, by the computing device, a first portion of the first resource from the first target device, the first portion of the first resource including an identifier of the first target device; receiving, by the computing device and after receiving the first portion of the first resource from the first target device, an indication of an event associated with the first target device or a network associated with the first target device; selecting, by the computing device and after receiving the indication of the event, a second target device for the first resource; retrieving, by the computing device, a second portion of the first resource from the second target device; providing, by the computing device and to the client device, a proxy of the first resource based on the first portion of the first resource and the second portion of the first resource, the proxy of the first resource spoofing the identifier of the first target device; receiving, by the computing device and from the client device, a second request for a second resource, the first request and the second request being associated with a connection; selecting, by the computing device, a third target device for the second resource; retrieving, by the computing device, the second resource from the third target device; and providing, by the computing device, a proxy of the second resource to the client device, the proxy of the second resource spoofing an identifier of the third target device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A network device comprising:
a processor to; receive, from a client device, a first request for a first resource, the first request including an identifier of the client device, select a first target device for the first resource, provide a proxy of the first request to the first target device, the proxy of the first request substituting the identifier of the client device with an Internet protocol (IP) address of the network device, receive a first portion of the first resource from the first target device, the first portion of the first resource including an identifier of the first target device, receive, after receiving the first portion of the first resource from the first target device, an indication of an event associated with the first target device or a network associated with the first target device, select, after receiving the indication of the event, a second target device for the first resource, retrieve a second portion of the first resource from the second target device; provide, to the client device, a proxy of the first resource based on the first portion and the second portion, the proxy of the first resource substituting the identifier of the first target device with the IP address of the network device, receive, from the client device, a second request for a second resource, the first request and the second request being associated with a connection, select a third target device for the second resource, retrieve the second resource from the third target device, and provide a proxy of the second resource to the client device, the proxy of the second resource substituting an identifier of the third target device with the IP address of the network device. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
19. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors of a system, cause the one or more processors to; receive, from a client device, a first request for a first resource, the first request including an identifier of the client device; select a first target device for the first resource from a plurality of server devices storing resources that include the first resource; provide a proxy of the first request to the first target device, the proxy of the first request spoofing the identifier of the client device; receive a first portion of the first resource from the first target device, and the first portion of the first resource including an identifier associated with the first target device; receive, after receiving the first portion of the first resource from the first target device, an indication of an event associated with the first target device or a network associated with the first target device; select, after receiving the indication of the event, a second target device for the first resource from the plurality of server devices; retrieve a second portion of the first resource from the second target device; provide, to the client device, a proxy of the first resource based on the first portion and the second portion, the proxy of the first resource spoofing the identifier of the first target device; receive, from the client device, a second request for a second resource, the first request and the second request being associated with a connection; select a third target device for the second resource; retrieve the second resource from the third target device; and provide a proxy of the second resource to the client device, the proxy of the second resource spoofing an identifier of the third target device. - View Dependent Claims (20, 21, 22, 23, 24, 25)
Specification