×

Routing proxy for resource requests and resources

  • US 8,504,723 B2
  • Filed: 06/15/2011
  • Issued: 08/06/2013
  • Est. Priority Date: 06/15/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving, by a computing device and from a client device, a first request for a first resource,the first request including an identifier of the client device;

    selecting, by the computing device, a first target device for the first resource;

    connecting the computing device with the first target device;

    providing, by the computing device, a proxy of the first request to the first target device,the proxy of the first request spoofing the identifier of the client device;

    receiving, by the computing device, a first portion of the first resource from the first target device,the first portion of the first resource including an identifier of the first target device;

    receiving, by the computing device and after receiving the first portion of the first resource from the first target device, an indication of an event associated with the first target device or a network associated with the first target device;

    selecting, by the computing device and after receiving the indication of the event, a second target device for the first resource;

    retrieving, by the computing device, a second portion of the first resource from the second target device;

    providing, by the computing device and to the client device, a proxy of the first resource based on the first portion of the first resource and the second portion of the first resource,the proxy of the first resource spoofing the identifier of the first target device;

    receiving, by the computing device and from the client device, a second request for a second resource,the first request and the second request being associated with a connection;

    selecting, by the computing device, a third target device for the second resource;

    retrieving, by the computing device, the second resource from the third target device; and

    providing, by the computing device, a proxy of the second resource to the client device,the proxy of the second resource spoofing an identifier of the third target device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×