Network traffic rate limiting system and method
First Claim
1. A system for rate limiting network traffic flow of an untrusted application, comprising:
- a master module in a server environment to manage network traffic flow restrictions for a client application on a slave module,wherein the master module comprises a processor and a memory on which is stored instructions to cause the processor to set the network traffic flow restrictions on the slave module when the master module has not received from a trusted application a validation of the client application on the slave module, to receive a validation of the client application from the trusted application to unrestrict the network traffic flow restrictions for the client application on the slave module, and to disable network traffic flow restrictions to allow a user to download the client application.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for rate limiting network traffic flow of an untrusted application. A master module in a server environment manages network traffic flow restrictions. A slave module executes client applications in the server environment. A services module in the server environment executes a trusted application to validate the client application to the master module. A traffic restriction module on the master module sets network traffic restrictions when validation has not been received for the client application on the slave blade, and receives client application validations from the trusted application to unrestrict network traffic flow for the client application on the slave blade.
20 Citations
18 Claims
-
1. A system for rate limiting network traffic flow of an untrusted application, comprising:
-
a master module in a server environment to manage network traffic flow restrictions for a client application on a slave module, wherein the master module comprises a processor and a memory on which is stored instructions to cause the processor to set the network traffic flow restrictions on the slave module when the master module has not received from a trusted application a validation of the client application on the slave module, to receive a validation of the client application from the trusted application to unrestrict the network traffic flow restrictions for the client application on the slave module, and to disable network traffic flow restrictions to allow a user to download the client application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A master blade for rate limiting network traffic flow of untrusted applications, comprising:
-
a processor; and a memory on which is stored machine readable instructions that cause the processor to; manage network traffic flow restrictions for a client application on a slave blade, and set the network traffic flow restrictions for the client application on the slave blade when the master blade has not received from a trusted application a validation for the client application on the slave blade, receive from the trusted application a validation of the client application to unrestrict the network traffic flow restrictions for the client application on the slave blade, and disable network traffic flow restrictions to allow a user to download the client application.
-
-
15. A method comprising:
-
executing a trusted application in a blade server environment having restricted network traffic flow; validating a client application running on a slave blade using the trusted application; receiving, at a master blade, a validation of the client application from the trusted application; unrestricting, by the master blade, the restricted network traffic flow for the client application on the slave blade in response to receiving the validation of the client application; and disabling, by the master blade, network traffic flow restrictions to allow a user to download the client application. - View Dependent Claims (16, 17, 18)
-
Specification