System and method for optimizing name-resolution overhead in a caching network intermediary device
First Claim
1. A computer-implemented method for a network intermediary device communicatively coupled to a client and a server, the method comprising:
- receiving by the network intermediary device a request for an object, the object request associated with a network protocol;
querying an object storage to determine whether the object, as identified by an object name determined from the object request, is stored in the object storage;
responsive to the object being stored in the object storage, examining one or more trust properties of the object to determine whether the object was obtained from a supplier trusted by the network intermediary device; and
responsive to the object being obtained from a supplier not trusted by the network intermediary device, comparing an identity of the supplier with an implied client-resolved supplier address to determine whether the supplier identity matches the implied client-resolved supplier address.
11 Assignments
0 Petitions
Accused Products
Abstract
The present invention describes a system, method, and article of manufacture for resolving names received in network protocol requests by a network intermediary device coupled between a client network and a server network. A deferred trust model caching engine in the network intermediary device includes a transactor module configured to efficiently process a protocol request with a sequence of determinant criteria, although the sequence can occur in different orders. The deferred trust model caching engine includes a cacheability evaluator component configured to determine whether the protocol request is for a resource that the protocol permits to be cached by the network intermediate device, and a supplier trust evaluator component configured to compare information about the client'"'"'s network protocol request and a cached object representation to determine if the object is trustworthy or not. The cached object representation associates an object with a supplier identity and a supplier trust property.
4 Citations
29 Claims
-
1. A computer-implemented method for a network intermediary device communicatively coupled to a client and a server, the method comprising:
-
receiving by the network intermediary device a request for an object, the object request associated with a network protocol; querying an object storage to determine whether the object, as identified by an object name determined from the object request, is stored in the object storage; responsive to the object being stored in the object storage, examining one or more trust properties of the object to determine whether the object was obtained from a supplier trusted by the network intermediary device; and responsive to the object being obtained from a supplier not trusted by the network intermediary device, comparing an identity of the supplier with an implied client-resolved supplier address to determine whether the supplier identity matches the implied client-resolved supplier address. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A network intermediary device disposed between a client network and a server network, the network intermediary device comprising:
-
a processor; a storage device communicatively coupled to the processor; and a set of instructions on the storage device that, when executed by the processor, cause the processor to; receive a request for an object, the object request associated with a network protocol; query an object storage to determine whether the object, as identified by an object name determined from the object request, is stored in the object storage; responsive to the object being stored in the object storage, examine one or more trust properties of the object to determine whether the object was obtained from a supplier trusted by the network intermediary device; and responsive to the object being obtained from a supplier not trusted by the network intermediary device, compare an identity of the supplier with an implied client-resolved supplier address to determine whether the supplier identity matches the implied client-resolved supplier address.
-
-
29. A computer program product comprising a non-transitory computer readable storage medium structured to store instructions, that when executed by a processor, cause the processor to:
-
receive a request for an object, the object request associated with a network protocol; query an object storage to determine whether the object, as identified by an object name determined from the object request, is stored in the object storage; responsive to the object being stored in the object storage, examine one or more trust properties of the object to determine whether the object was obtained from a supplier trusted by a network intermediary device; and responsive to the object being obtained from a supplier not trusted by the network intermediary device, compare an identity of the supplier with an implied client-resolved supplier address to determine whether the supplier identity matches the implied client-resolved supplier address.
-
Specification