摘要:
A method of managing connection requests from an application supported on a client. The client has a modem connectable to at least one server via a dialup computer network. According to the method, a list is maintained of the local Internet Protocol (IP) addresses assigned as modem connections are established to the dialup computer network during a session. The list is preferably in Last In, First Out (LIFO) order and includes a latest IP address as the last entry and one or more stale IP addresses. In response to a connection request associated with a stale IP address, the stale IP address is mapped to the latest IP address. The connection request is then redirected using the latest IP address. Preferably, client supports a proxy server which services the connection request locally if possible to avoid network traffic.
摘要:
A method of enabling a proxy to participate in a secure communication between a client and a server. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to the server. Thereafter, the client and the server negotiate a session master secret. Using the first secure session, this session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the server. After receiving the session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding, monitoring, encryption/decryption, caching, or the like) on the client's behalf and without the server's knowledge or participation. The first secure session is maintained between the client and the proxy during such communications.
摘要:
An Internet client is provided with a SOCKS server. The client comprises a processor having an operating system, and a suite of one or more Internet tools. The SOCKS proxy server includes means for intercepting and servicing connection requests from the Internet tools. Preferably, the proxy server has a predetermined Internet Protocol address, preferably the loopback address. If the loopback address is not available on the protocol stack, a redirecting mechanism is used to redirect connection requests associated with stale IP addresses to a current IP address. The SOCKS server includes a filtering mechanism for filtering connection requests to particular servers, and a monitoring mechanism for monitoring network IP activity.
摘要:
Initially, a client requests a specific document and provides the preferences, including readability level preferences of the document, locale preferences, content filtering instructions preferences, governmental regulations preferences, natural language preferences, and document syntactic format preferences. The transcoding proxy requests and receives the document from the origin server, with the document having origin semantic characteristics. The document from the origin server has an origin readability level and origin locale, is conformant with origin content filtering instructions and origin governmental regulations, and is in origin natural language and in origin document syntactic format. Using the client semantics preferences, the transcoding proxy revises the document in a sequential or parallel fashion. The origin semantics characteristics of the document are, thus, revised to the semantic preferences specified by the client.
摘要:
A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
摘要:
A method of controlling how a Web document is presented for display on a browser of a Web appliance. The Web appliance typically includes a television class monitor associated therewith. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the document before it is displayed on the browser of the Web appliance. In particular, as the Web document is received from the server, the HTML is parsed to identify the format of the document and the information therein. A filter mechanism is then used to reformat the Web document according to some given protocol, and the re-formatted Web document is then passed to the browser for display on the monitor. Dynamic alteration of the HTML in this manner enables control of the “look and feel” of the browser display irrespective of the monitor resolution and/or quality.
摘要:
A system, method, and computer readable medium for eliminating unnecessary ring transitions is described. Often, a requested system service or I/O operation can be performed entirely at a higher ring level, such as Ring 3, with no need to transition to a lower ring. In these cases, the software interrupt or I/O instruction which generates the ring transition is replaced by a call to a program executing at the higher ring level. Thus, the software interrupt instruction or I/O instruction is redirected to code that resides at the same protection level and emulates the effects of the instruction, resulting in improved execution speed. In the Intel 80×86 family of microprocessors, both the software interrupt instruction and the I/O instruction take two bytes to encode. It is thus possible to replace the instruction with the op-code for a segment:offset far call, letting the instruction stream dictate the offset for the call. By manipulating the base address of the segment, the target entry point can be controlled, and no ring transitions are needed to process the resulting call. After an instruction has been patched once, it remains patched for each subsequent execution. Thus, each software interrupt instruction and/or I/O instruction need only be patched once.