×

Systems and methods for protocol detection in a proxy

  • US 8,793,390 B2
  • Filed: 05/23/2006
  • Issued: 07/29/2014
  • Est. Priority Date: 05/23/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for protocol detection in a network proxy, comprising:

  • receiving at the network proxy and from a first computer, a request for connection to a second computer, the network proxy including a plurality of application proxies;

    establishing by the network proxy, a connection with at least one of the first computer and the second computer according to a connection establishment routine;

    receiving at the network proxy, application data from at least one of the first computer and the second computer, wherein the application data conforms to an application protocol;

    prior to forwarding the application data between the first and second computers, determining the application protocol by comparing the received application data to protocol signatures and, according to results of the comparison, determining whether or not the application protocol corresponds to any one of the plurality of application proxies in the network proxy;

    if the application protocol, as determined by comparing the received application data to protocol signatures, corresponds to one of the application proxies in the network proxy, then responsively handing off the connection to the one application proxy corresponding to the application protocol; and

    if the application protocol, as determined by comparing the received application data to protocol signatures, does not correspond to any one of the plurality of application proxies in the network proxy, then responsively handling the connection according to a predetermined policy that is one of (i) allowing the connection, (ii) allowing the connection to be subject to protocol optimization, and (iii) allowing the connection subject to at least bandwidth limitation, bandwidth prioritization, or bandwidth optimization,wherein a first set of protocol signatures is employed for analyzing application data received from the first computer and a second set of protocol signatures, different from the first set, is employed for analyzing application data received from the second computer.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×