INCOMPATIBLE NETWORK GATEWAY PROVISIONED THROUGH DNS

    公开(公告)号:US20200007494A1

    公开(公告)日:2020-01-02

    申请号:US16570505

    申请日:2019-09-13

    Abstract: A first packet of a first protocol version type that includes an incoming request for an action to be performed on an identified resource is received from a client at a proxy server as a result of a DNS request resolving to a network address of the proxy server. The proxy server transmits an outgoing request for the action to be performed on the identified resource to a network address of the destination origin server in a second packet that is of the second protocol version type. The proxy server receives a third packet that includes an incoming response from the destination origin server, the third packet being of the second protocol version type. The proxy server transmits a fourth packet to the client, the fourth packet being of the first protocol version type, wherein the fourth packet includes an outgoing response that is based on the incoming response.

    Mobile Accelerator
    62.
    发明申请
    Mobile Accelerator 审中-公开

    公开(公告)号:US20190334812A1

    公开(公告)日:2019-10-31

    申请号:US16505458

    申请日:2019-07-08

    Abstract: A mobile accelerator system includes point of presences (POPs) that includes an entry POP. The entry POP receives a query to a content server from a mobile device via a dedicated transport channel. The entry POP determines a direct connection score for a direct connection between the mobile device and the content server that does not traverse the mobile accelerator system. The entry POP determines a POP connection score for a connection between the mobile device and the content server through the entry POP and a candidate exit POP. The entry POP determines a dynamic path ranking based on the direct connection score, the POP connection score, and other POP connection score(s) associated with other candidate exit POP(s). The entry POP determines at least a portion of a dynamic path between the mobile device based on the dynamic path ranking and routes data transfers through that dynamic path.

    ESTABLISHING AND USING A TUNNEL FROM AN ORIGIN SERVER IN A DISTRIBUTED EDGE COMPUTE AND ROUTING SERVICE

    公开(公告)号:US20190319919A1

    公开(公告)日:2019-10-17

    申请号:US16160294

    申请日:2018-10-15

    Abstract: An edge server of a distributed edge compute and routing service receives a tunnel connection request from a tunnel client residing on an origin server, that requests a tunnel be established between the edge server and the tunnel client. The request identifies the hostname that is to be tunneled. An IP address is assigned for the tunnel. DNS record(s) are added or changed that associate the hostname with the assigned IP address. Routing rules are installed in the edge servers of the distributed edge compute and routing service to reach the edge server for the tunneled hostname. The edge server receives a request for a resource of the tunneled hostname from another edge server that received the request from a client, where the other edge server is not connected to the origin server. The request is transmitted from the edge server to the origin server over the tunnel.

    SUPPORTING SECURE SESSIONS IN A CLOUD-BASED PROXY SERVICE

    公开(公告)号:US20190215166A1

    公开(公告)日:2019-07-11

    申请号:US16356304

    申请日:2019-03-18

    Abstract: A proxy server in a cloud-based proxy service receives a secure session request from a client device as a result of a Domain Name System (DNS) request for a domain resolving to the proxy server. The proxy server participates in a secure session negotiation with the client device including transmitting a digital certificate to the client device that is bound to domain and multiple other domains. The proxy server receives an encrypted request from the client device for an action to be performed on a resource that is hosted at an origin server corresponding to the domain. The proxy server decrypts the request and participates in a secure session negotiation with the origin server including receiving a digital certificate from the origin server. The proxy server encrypts the decrypted request using the digital certificate from the origin server and transmits the encrypted request to the origin server.

    Internet-based proxy service for responding to server offline errors

    公开(公告)号:US10313475B2

    公开(公告)日:2019-06-04

    申请号:US15489433

    申请日:2017-04-17

    Abstract: A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server transmits the request to the origin server. Responsive to determining that the origin server is offline, the proxy server determines whether the requested resource is available in cache. If it is in cache, the proxy server retrieves the requested resource from the cache and transmits the requested resource to the client device.

    Managing private key access in multiple nodes

    公开(公告)号:US10177909B1

    公开(公告)日:2019-01-08

    申请号:US15828123

    申请日:2017-11-30

    Abstract: Managing private key access in multiple nodes is described. A piece of data (e.g., a private key) is encrypted using identity-based broadcast encryption and identity-based revocation encryption so that only certain servers in a distributed network of servers can decrypt the piece of data. The piece of data is encrypted with a key encryption key (KEK). The KEK is split into two pieces. The first piece is encrypted using identity-based broadcast encryption with an identified location as input such that only servers of the identified location can decrypt the first piece, and the second piece is encrypted using identity-based revocation encryption so that certain identified servers of the identified location cannot decrypt cannot decrypt the second piece. The keys are transmitted to the servers.

    PROVIDING CROSS SITE REQUEST FORGERY PROTECTION AT AN EDGE SERVER

    公开(公告)号:US20190007214A1

    公开(公告)日:2019-01-03

    申请号:US16103820

    申请日:2018-08-14

    Inventor: Evan Johnson

    Abstract: A request from a computing device for accessing a resource is received by an edge server, where the request includes a cookie containing a first token value and a second token value. The edge server validates the first token value and a second token value using a third token value generated using hashing algorithm with a secret key and one or more other values. The edge server then compares the received token values with the third token value. When the request is validated, the edge server retrieves the request resource.

    METHOD AND APPARATUS FOR REDUCING NETWORK RESOURCE TRANSMISSION SIZE USING DELTA COMPRESSION

    公开(公告)号:US20180324270A1

    公开(公告)日:2018-11-08

    申请号:US16025903

    申请日:2018-07-02

    Abstract: A near end point of presence (PoP) of a cloud proxy service receives, from a client device, a request for a network resource. A far end PoP from a plurality of PoPs of the cloud proxy service is identified. Responsive to determining that a version of the network resource is stored in the near end PoP, a request for the network resource is transmitted to the far end PoP with a version identifier that identifies that version. The far end PoP receives, from the near end PoP, a response that includes difference(s) between the version of the network resource stored in the near end PoP with a most current version of the network resource. The response does not include the entire network resource. The near end PoP applies the specified difference(s) to the version that it has stored to generate an updated version of the network resource, and transmits it to the client device.

Patent Agency Ranking