![]() EXPANSION OF A CONTENT SUPPLY NETWORK (CDN) INSIDE A MOBILE OR WIRELESS NETWORK
专利摘要:
EXTEND A CONTENT DISTRIBUTION NETWORK ON A MOBILE OR FIXED NETWORK. A content distribution network (CDN) comprising a set of extreme servers, and a domain name service (DNS) that is authorized for the provider's content domains served by the CDN. The CDN is extended to one or more mobile fixed-line networks or which cannot or cannot otherwise support extreme servers fully managed by the CDN. In particular, an extender is deployed on the mobile or fixed network, preferably as a proxy for passive web storage that is beyond the end of the CDN, but which serves as CDN content - provisioned under the control of the CDN. The extender can also be used to cache transparent and serve non-CDN content. An information channel is established between the extender and the CDN to facilitate the functionality of the extender. 公开号:BR112012032371B1 申请号:R112012032371-7 申请日:2011-06-20 公开日:2020-11-10 发明作者:Robert D. Blumofe;Vinay Kanitkar;Dane S. Walther 申请人:Akamai Technologies, Inc; IPC主号:
专利说明:
This patent application is based on Serial No. 61 / 356,306, filed on June 18, 2010. BACKGROUND OF THE INVENTION Technical Field This patent application generally refers to the expansion of a content delivery network (CDN) functionality into a network, such as a mobile network, in which it is not practical or possible to provide managed Internet-based CDN services. . Brief Description of the Related Technique Distributed computer systems are well known in the art. One of these distributed computing systems is a "content delivery network" or "CDN" that is operated and managed by a service provider. The service provider typically provides the service of providing content on behalf of third parties, such as consumers of content providers. A "distributed system" of this type typically refers to a set of autonomous computers connected by a network or networks, along with software, systems, protocols and techniques designed to facilitate various services, such as providing content or supporting infrastructure outsourced portals. Typically, "content delivery" refers to the storage, auxiliary storage, or transmission of content, means of transmission and applications on behalf of content providers, including ancillary technologies used with those such as handling DNS queries, provisioning, monitoring and data communication, content targeting and personalization, and business intelligence. It is known in the prior art how to expand an Internet content delivery network (ICDN) into a corporate computing environment that may be located behind a corporate firewall. An example is described in US Patent No. 7,600,025, which is a common property. It is also known as associating third-party auxiliary memories with a content supply network in a manner described in US Patent No. 7,010,578, which is also common property. Due to the way fixed or mobile wireless networks are designed and operated, it is not always possible or practical to implement on those fully managed CDN servers (that is, close to end users). For example, in the case of the dominant 3G mobile technology, UMTS (Universal Mobile Telecommunications System), a mobile device connects over the air to a tower, the towers are connected by a terrestrial network called UTRAN (Terrestrial Radio Access Network UMTS) to RNCs (Radio Network Controllers), RNCs connect via the Package Core to Service Nodes, and Service Nodes connect via Internet portals. A typical mobile network has only a few of these Internet portals, which can be thousands of kilometers and tens or even hundreds of milliseconds away from end users, but these portals may be the only locations where fully managed CDN servers can be implemented. In addition to these locations, at the Package Core and at UTRAN, it is typically not possible to implement a device with a publicly routable IP address and open doors to the Internet. Wireless networks also typically have a barrier behind which it is not possible to implement fully managed CDN servers. That barrier in wireless networks is generally much deeper, much closer to end users than in the case of mobile networks, but in many cases it still represents a real impediment to the full realization of the benefits of a CDN or other distributed network. It is also important to note that even when there is no such technical barrier, there is often a cultural or commercial barrier. Specifically, many network operators are highly protective of their networks and will not allow a fully managed device beyond any barriers on those. BRIEF SUMMARY A content delivery network (CDN) comprises a set of edge servers, and a domain naming service (DNS) that is mandatory for CDN content provider domains. The CDN is expanded into one or more mobile or wireless networks that cannot or do not otherwise support fully managed CDN edge servers. In particular, an "Extender" is implemented on the mobile or wireless network, preferably as an auxiliary web storage proxy that is behind the edge of the CDN, but which delivers configured CDN content under the control of the CDN. The Extender can also be used to transparently store and deliver non-CDN content. An information channel is established between the Extender and the CDN to facilitate the functionality of the Extender. In one embodiment, the information channel facilitates the following auxiliary storage method. The method starts after receiving a request for content in the Extender. It is then determined whether the content is a first type or a second type, the first type being content that is adapted to be provided by a content supply network (CDN). If the content is of the first type (CDN content) and is located in the auxiliary memory, the Extender uses the information channel to obtain an auxiliary memory handling policy from the CDN. That directive provided by CDN is then applied and the content is delivered. If, however, the content is of the second type (non-CDN content), the Extender transparently stores and delivers the content in response to the request, but using an auxiliary memory handling policy received from another than the CDN (for example, source server). The aforementioned outlined some of the most pertinent aspects of the invention. These aspects should be considered as merely illustrative. Many other beneficial results can be obtained by applying the invention presented in a different way or by modifying the invention as will be described. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the present invention and its advantages, reference will now be made to the following descriptions considered in conjunction with the accompanying drawings, in which: FIG. 1 shows an exemplary block diagram of a distributed computer system environment in which exemplary aspects of the illustrated modalities can be implemented; FIG. 2 is an exemplary block diagram of an edge server machine in the content delivery network in FIG. 1; FIG. 3 is a block diagram illustrating how an Internet content delivery network (CDN) is expanded according to the techniques of this invention; FIG. 4 illustrates how an Extender as described here can interact with a CDN edge server according to this invention; FIG. 5 is a name server search operation used to determine whether a specific domain belongs to a CDN consumer; FIG. 6 illustrates multiple Extenders supported within a network; and FIG. 7 illustrates a representative Extensor architecture. DETAILED DESCRIPTION In a known system, as shown in FIG. 1, a distributed computer system 100 is configured as a CDN and is assumed to have a set of machines 102a-n distributed around the Internet. Typically, most machines are servers located near the edge of the Internet, that is, on or adjacent to the end user access networks. A network operations command center (NOCC) 104 manages the operations of the various machines in the system. Third party portals, such as web portal 106, download content delivery (for example, HTML, embedded page objects, means of transmission, software download, and the like) to the distributed computer system 100 and, in particular, for "edge" servers. Typically, content providers download their content supplies by assigning (for example, a CN7XME (canonical name) DNS) domains or subdomains of certain content providers to edge traffic domains managed by the provider's mandatory domain name service of service. End users who want the content are routed to the distributed computer system to obtain that content more reliably and efficiently. Although not shown in detail, the distributed computer system can also include other infrastructure, such as a distributed data collection system 108 that collects usage and other data from edge servers, aggregates that data across a region or set of regions , and passes that data to other rear end systems 110, 112, 114 and 116 to facilitate monitoring, recording, alerts, billing, management and other operational and administrative functions. Distributed network agents 118 monitor the network as well as server loads and provide network, traffic and load data to a DNS 115 mechanism, which is mandatory for content domains being managed by CDN. A distributed data transport mechanism 120 can be used to distribute control information (e.g., metadata to manage content, to facilitate load balancing, and the like) to edge servers. In one embodiment, the CDN features described above are implemented as an "overlap" in the existing Internet infrastructure (third party networks, co-location facilities, servers, routers, and the like). As illustrated in FIG. 2, a given machine 200 comprises specified hardware (for example, an Intel Pentium processor) 202 that operates on an operating system core (such as Linux or variant) 204 that supports one or more applications 206a-n. To facilitate content delivery services, for example, certain machines typically operate a set of applications, such as an HTTP (web) proxy 207, a name server 208, a local monitoring process 210, a distributed data collection process 212, and the like. For transmission media, the machine typically includes one or more media servers, such as a Windows Media Server (WMS) or Flash server, as required by the supported media formats. A CDN edge server is configured to provide one or more aspects of providing expanded content, preferably on a specific domain, specific consumer basis, preferably using configuration files that are distributed to the edge servers using a configuration system . A given configuration file is preferably based on XML and includes a set of content handling rules and guidelines that facilitate one or more advanced aspects of content handling. The configuration file can be delivered to the CDN edge server via the data transport mechanism. US Patent No. 7,111,057 illustrates a useful infrastructure for providing and managing edge server content control information, and this and other edge server control information can be provided by the service provider itself, or (through extranet or similar) by the consumer of the content provider operating the source server. A technique for applying that content control information to content requests received at the edge server is described in US Patent No. 7,240,1000, the disclosure of which is incorporated by reference. According to that disclosure, a client request is received at the edge server identified by the imposing DNS of the CDN. The client request includes an HTTP host header whose contents are initially examined to verify that the request is for content that is being managed by CDN (and therefore must be available in the edge server's auxiliary memory, if the content has been previously requested by another and is still present in the auxiliary memory). If the request is for CDN-managed content, the rules in the XML configuration file are applied to the request, and an appropriate response is sent to the customer's request. The CDN may include a storage subsystem, as described in US Patent No. 7,472,178. The CDN can operate an auxiliary server memory hierarchy to provide intermediate storage of consumer content; one of these auxiliary memory hierarchy systems is described in US Patent No. 7,376,716. CDN can provide secure delivery of content between a client browser, edge server and consumer origin server in the manner described in US Publication No. 20040093419. Secured delivery of content as described there enforces SSL-based connections between the client and the edge server process, on the one hand, and between the edge server process and the origin server process, on the other hand. This allows a web page protected by SSL and / or its components to be delivered through the edge server. Extender With the knowledge of the above, the subject of this invention is now described. According to this invention, a CDN "Extender" is a piece of software or a device (such as rack-mounted equipment that comprises such software) that (1) can deliver content provided by CDN, (2) does this under control of the CDN, but (3) is not necessarily fully managed as part of the CDN. These properties are explained below. As seen in FIG. 3, Extensor 300 expands the ability to deliver the CDN deeper into networks where it is not possible (for technical or other reasons) to implement fully managed CDN servers. This capability can be implemented on mobile networks, wireless networks, or any other network environment in or for which CDN overlay network features and services are not available or do not exist. The nomenclature "Extender" is intended for descriptive purposes, and should not be considered to limit the scope of the subject of the invention. Generally speaking, the Extender works as a passive proxy for auxiliary web memory beyond the edge of the CDN. Typically, the Extender does not have direct access to consumer configuration metadata on the CDN, and interacts with the CDN to forward requests to the CDN edge and store / deliver content based on response headers received from the edge. Preferably, the Extender does not need to be fully managed as part of the CDN, although the Extender takes advantage of some functionality in that, as will be described. Therefore, the Extender does not need to have a publicly routable Internet Protocol (IP) address or open ports to the Internet. The Network Operations Command Center (such as NOCC 104 in FIG. 10 of CDN does not need to monitor you. The Extender also does not need to report to a distributed data collection service (such as system 108 in FIG. 1) Similarly, CDN's NOCC 103 would not require secure access (for example, via SSH or similar) to the Extender for configuration, provisioning and / or administration The NOCC would not need to install software updates on the Extender, and the Extender would not need to receive updates of configuration data or other control data. It would not have to be under any mapping control provided by the CDN mapping services. In summary, the Extender does not need to be managed as a service. , as will be described, the Extender is software or a device provided to the Network Operator, and it is up to that Network Operator to manage and monitor it. While not necessarily managed or fully managed as part of the CDN, the Extender preferably provides all forms of CDN content (that is, content that has been downloaded by content providers for delivery by CDNSP through CDN). In addition, the Extender can store and deliver storable content, including media on demand. It can also provide non-storable content, secure content, and live media. To deliver CDN content, the Extender acts under the control of the CDN. This control is necessary because, typically, it is desired (by the CDN consumer) that the correct content is provided according to the consumer's metadata rules. In addition, the CDNSP wishes to charge its consumer (for example, the content provider) for providing that content, even if it is provided from the Extender's auxiliary memory. Likewise, consumers of CDN (content providers) want to monitor and have information about the provision of their content. To facilitate this control, the Extender communicates preferably with a CDN resource (for example, a fully managed and configured CDN server), preferably on each request, and preferably using an HTTP-based application programming interface (API), sometimes called "information channel" here. Specifically, and according to the techniques here, whenever the Extender receives a request for CDN content, regardless of having that content already stored, the Extender preferably makes a request HTTP to a CDN server The CDN server, which is typically fully managed, then uses (applies) its metadata rules (for content) and sends back an HTTP response, instructing the Extender on how to respond to the Preferably, the HTTP response from the CDN server also includes the data to be provided when needed and, when requested, an appropriate memory key to allow the Extender to properly archive that data object in its local auxiliary memory. The CDN server (typically an edge server) also uses the information in the request to record a record (for example, for billing and historical record), writes data to the data collection system 108 for real-time recording, and performs any another necessary action. In addition to delivering CDN consumer content, an Extender can provide transparent storage for storable non-CDN consumer content. With transparent storage, an Extender is implemented online, receiving all HTTP requests for a set of end users. In the case of requests for CDN content, the Extender uses the Extender API and behaves as described above. In the case of non-CDN content, the Extender acts as a traditional transparent auxiliary memory. Unlike traditional transparent auxiliary memory, however, the Extender can use information (such as content extension and a checksum) in addition to URI to uniquely identify and store a data object. FIG. 4 illustrates a representative operation of the Extender operating in this "double" mode to handle both CDN and non-CDN content. This operation is implemented in software, as a set of program instructions executed on a processor. Operation starts at step 400, when a request from an end user is received at the Extender. As noted above, the Extender is located within or in association with a network that is distinct from the CDN overlay network, but the Extender has the ability to interact with the CDN via the Extender API. In step 402, a test is performed to determine whether the request is for CDN consumer content. A simple technique for making this determination is described below in relation to FIG. 5, as will be described. If the test result in step 402 indicates that the request is for CDN consumer content, the routine drifts to step 404. In step 404, a test is performed to determine whether the requested content already exists in the Extender's auxiliary memory. If so, the routine continues to step 406 by sending a modified-from (IMS) request to the CDN (and, in particular, a CDN edge server, as determined by the CDN DNS). Based on the response received from the CDN, the routine then proceeds to step 408 with the Extender delivering the appropriate end-user response code and / or requesting content to the requesting end user. If, however, the result of the text in step 404 indicates that the requested content does not exist in the Extender's auxiliary memory (or, if the content exists but is prescribed), the routine proceeds to step 410. In this step, the Extender sends a HTTP GET request to the CDN to fetch the content. Based on the response received from the CDN, the process continues with step 408 as previously described. If the test result in step 402 indicates that the content request is not CDN consumer content, the routine moves to step 412. In this step, a test is performed to determine whether the content is in the Extender's auxiliary memory. If the test result in step 412 is negative, the Extender sends a GET request to the originating server (the taxing entity). This is step 414. Based on the response, the routine continues to step in the manner previously described. If, however, the test result in step 414 indicates that the content is available to be delivered from the Extender's auxiliary memory, a test is performed in step 416 to determine whether the content is valid. If so, the content is delivered to the requesting end user in step 418. If the content is in auxiliary memory, but is not valid, the Extender sends an IMS to the origin server to determine whether the content can be validated. This is step 420. Based on the response, the routine then continues to step 408 in the previously described mode. This completes the process. In this way, the Extender functions as an intelligent transparent web proxy for non-CDN content while also delivering (and, where appropriate, storing) CDN consumer content. Step 402 in the process flow includes determining whether a domain associated with the end user request belongs to a CDN consumer. This domain can be included in an HTTP host header. A simple but efficient way of carrying out this determination is to have the Extender perform a DNS lookup on the domain. Typically, for a CDN consumer, a top-level domain (LTD) suffix of a canonical name (CNAME) will be a name that belongs to a set of one or more CDN edge traffic domains. By comparing the TLD domain of a final CNAME (canonical name) against a list of edge traffic domains (which should be relatively short, since such names rarely change), the Extender can determine whether the content is consumer content CDN or non-CDN consumer content. FIG. 5 illustrates a simple DNS lookup in the consumer domain "... bestbuy.com", with the result returning a final CNAME (canonical name) that includes a TLD suffix "akamai.net" associated with (that is, identifying) CDN. An alternative technique for performing DNS lookup is to pass such information in HTTP headers, publishing a list of edge traffic domains to which the Extender can subscribe, or similar. The technique identified above (using DNS lookup) is advantageous because the information (if a consumer has given a CNAME (canonical name) of a specific domain to the CDN) can be propagated for each example of Extensor within a lifetime ( TTL) DNS, and also because a DNS lookup from the Extender also captures policies based on the content provider’s geography for service traffic. As noted above, the Extender stores and delivers CDN consumer content based on the information it receives, in terms of content and auxiliary memory control instructions, from CDN edge servers. Therefore, in effect, the CDN (and, in particular, an edge server) acts as the "source" server for Extenders. Whenever an Extender receives a request for CDN consumer content (as determined by a DNS lookup as described above), the Extender moves to a CDN server (one of the IPs returned by the DNS lookup) to fetch the content or, if the content is already in the auxiliary memory, to validate it (preferably by IMS). By definition, this request forwarding is done synchronously even for objects in the Extender's auxiliary memory; alternatively, the forwarding operation can be performed asynchronously, for example, at the request of the content provider, a network operator associated with the network on which the Extender is located, or similar. Preferably, and to allow the edge server to accurately record how many bytes were delivered to the end user, the Extender request forwarding contains an appropriate HTTP header that indicates whether the end user has made an IMS request. When a partial object is delivered to the end user, the Extender can make an HTTP POST request to the CDN edge server to indicate precisely how many bytes were delivered on behalf of the content provider. When the CDN edge server responds to an Extender, it preferably communicates some or all of the auxiliary memory control information available in one or more HTTP response headers. This auxiliary memory control information includes, for example, time-to-live (TTL) expiration times, (when necessary) a suitable auxiliary memory key specifies for a content provider consumer, whether an object is "not stored ", if a stored object can be purged (an explicit header is not necessary for purging, since the delivery of an HTTP 404 can signal to the Extender the object that must be excluded from the auxiliary memory), and so on. If desired, the CDN edge server can respond with headers that contain a list of objects that must be pre-fetched by the Extender. In addition, the CDN edge server can send specific metadata tags to the Extender to further customize its content handling operation. In yet another alternative, the CDN edge server includes a header that gives Extensor suggestions regarding an object's popularity; this information is then used in the Extender's auxiliary memory replacement algorithm. Preferably, Extensor transparently stores and delivers third party content that includes, without limitation, user generated content. If desired, the Extender can be configured to store content from only a targeted set of content providers (non-CDN). In this way, the Extender provides a much higher auxiliary memory hit rate than transparent off-the-shelf auxiliary memory. For this purpose, the Extender preferably includes a web-based or command line configuration interface through which an operator dynamically configures the list of domains, subdirectories, and types of content / file extensions to be stored by the implementation Extender. In one embodiment, this transparent oriented configuration is generated manually by both the network operator and the CDN. The configuration can be the same or different for instances of Extenders on an operator network. By using a well-defined HTTP-based API, the Extender appears to CDN much like a regular browser. In one embodiment, HTTP requests from an Extender (for CDN) are mapped to the nearest CDN edge server using conventional CDN-based mapping techniques, such as those described in US Patent No. 6,108,703 and related patents, although this is not necessary. There may be other ways in which an Extender locates a specific CDN edge server or cluster of edge servers. If desired, Extenders can use persistent connections and other optimized protocols in their communications with CDN servers. Persistent connections can be used for some domains or content classes. An exemplary optimized protocol can be one in which TCP and RTO window sizes are adjusted based on historical data, and so on. An Extender can fetch content from multiple edge servers in parallel to maximize throughput. Preferably, Extenders are authenticated and authorized before they can interact with CDN edge servers. This ensures that CDN servers only provide responses to legitimate Extenders. An HMAC key exchange protocol can be used for this purpose. Similarly, preferably the CDN can audit instances of Extensor, revoking credentials if discovered to be illegitimate. To accomplish this, a set of tests are evaluated against the API and a behavior specification that defines what it means to be a legitimate Extender. Extender credentials are given only to software or devices that pass the test suite, and credentials are revoked if that software or device later fails an audit with the test suite. In a non-limiting modality, the credential is in the form of a shared secret or a certificate, using standard mechanisms for authentication and authorization. The credential can include an identifier for each CDN Extender or family of Extenders. For example, all Extenders implemented on a given network can share a common identifier for reporting purposes. When these Extenders invoke the API, that identifier is registered with the CDN, which then allows communication, for example, through a CDN extranet (such as a secure web-based consumer portal). The network operator can then access the portal and see a report that shows how much traffic was provided from the Extenders. on your network. Preferably, all third party traffic delivered by an Extender is also communicated to CDN (an edge server) so that it can be registered and later processed for communication by the data collection system. To reduce the volume of records, data (in terms of edge requests and bytes delivered, requests for origin and bytes fetched, etc.) are reported on an aggregate basis instead of each individual hit being reported separately. Preferably, an Extender supports network-specific protocol optimizations. In many cases, the properties of the network (bandwidth, latency, instability, and the like) will be very different in the downstream segment (between the Extender and the end user device) compared to the upstream segment (between the Extender and the CDN edge server on which the Extender is mapped). When closing TCP in the Extender, different TCP parameters and different optimizations can be applied between the two segments, thus improving the overall throughput and efficiency. An Extender may also have the ability to capture low level network information and pass it on to an application layer for the purpose of content adaptation or authentication. For example, an Extender that integrates into a mobile network can see low-level device information that is embedded in mobile communication protocols. To obtain device identification and related information, the Extender has access to the network operator's control channel (s). In such a case, the Extender can be configured to extract that information and include it in the HTTP API calls that the Extender then makes to the CDN. With device information now in HTTP headers, that information can be used in the CDN (or in the consumer’s source infrastructure) to adapt content to the target mobile device. Similarly, for authentication, an identifier (for example, a SIM identifier) that exists in low-level mobile communication protocols can be extracted and included in the HTTP API calls back to the CDN. With this identifier now in HTTP headers, the identifier can be used as part of a consumer authentication system. These SIM identifiers are strong authenticators and thus allow for a simple two-factor authentication. For example, in a mobile electronic banking application, users could be authenticated by having a mobile device and a password. In addition, this integration at the HTTP layer means that the consumer (the bank in this example) only has to do a single integration with the CDN. They would not need to do separate integrations with each mobile network operator. Therefore, when an Extender advances to a CDN edge server, the edge server can verify that it is communicating with a legitimate Extender, and the edge server can identify the operator to which the Extender belongs. An Extender can be implemented in a reduced way as a "micro-Extender". Again, the nomenclature used here should not be considered as limiting. Typically, a micro-Extender provides a subset of the functionality of the basic Extender, such as identifying requests for CDN content and forwarding these requests to a nearby CDN edge server. In the case of UMTS networks, with such a mechanism, requests reported by CDN should not go through the Package Core to the Internet portal, which must be very far away. Instead, requests reported by CDN should go to a nearest CDN server. In addition, requests could include low-level protocol parameters, as described above. A set of Extenders can have Extenders co-located or located close to each other in a cluster, in which case a load sharing routine can be implemented in all of them. This would allow a single location to have multiple Extenders for both handling additional cargo and transferring, or both. Non-stored content can be fetched (for example, by ICP) from an Extender in a cluster. More generally, a specific network implementation can use several different types of Extenders depending on how the operator wants to integrate them into the destination network and how much traffic is redirected. Simple integration uses DNS-based redirection. In this case, Extenders receive only requests for CDN content. These would not perform transparent storage or capture low-level protocol parameters. Another possible integration uses Auxiliary Web Memory Communication Protocol (WCCP) to redirect all HTTP requests on some ports to the Extender. FIG. 6 provides a representative implementation that uses this technique. In this example, Extenders 602, 604 and 606 are associated with router 608 within the network. As is well known, WCCP is the method most commonly used to direct traffic to transparent storage proxies. Allows one (WCCPvl) or more (WCCPv2) routers to use a cluster of storage servers as proxies for local content. In a cluster of auxiliary memory servers, one server is elected as the leader. This integration allows for transparent storage, but not for capturing low-level protocol parameters. Finally, the integration could be done with the Extender directly in line in the communication path. This integration requires specialization of the Extender for the protocol on that route. In such a case, the Extender captures low level protocol parameters. This latter type of integration is convenient for depth within a network that is not otherwise accessible. Each Extender process described above is preferably implemented in computer software as a set of program instructions executable on one or more processors, as a specific purpose machine. Representative machines on which the subject in question is provided can be Intel Pentium-based computers that operate on a Linux operating system or Linux variant and one or more applications to perform the described functionality. One or more of the processes described above are implemented with the computer program, namely, as a set of computer instructions for carrying out the described functionality. FIG. 7 illustrates a representative Extender implemented as a rack-mounted hardware device. The Extender 700 comprises one or more processors 702, disk storage 704, memory 706, an operating system 708, a connected transparent auxiliary memory 710, applications and sockets 712, a web-based configurator 714, and network I / O support 716 The 710 connected transparent auxiliary memory can be implemented with known proxy storage software, such as Apache Traffic Server (an HTTP / 1.1 compliant proxy storage server), as modified or controlled by one or more 712 applications to provide functionality described here. Auxiliary memory 710 can be subdivided (partitioned) into a first part for storing CDN consumer content, and a second part for storing non-CDN content. In addition, the subject matter here is not limited to use with any specific type of network, protocol or telecommunications technology. For illustrative purposes only, the disclosure describes the invention in the context of a UMTS / GSM network as an environment representative of a mobile service provider network. The invention can similarly be implemented in a CDMA network environment, or in or through other known environments or to be developed later including, without limitation, Evolved Packet Core (EPC), 4G / LTE, WLAN (including WiFi), and the like. Likewise, the CDN modality is also exemplary, since other forms of CDN architectures (for example, those that implement large clusters of servers in a small number of data centers, those that install servers near or at large points interconnection, etc.) can also interact with mobile or wireless networks in the manner described here. In an example scenario, the Extender is implemented within a UMTS 3G compatible network in association with the operator's core network infrastructure (for example, a mobile operator portal, which can comprise an SGSN, a GGSN, and similar) and used to facilitate the delivery of content (including CDN content) to connected mobile devices (for example, a smartphone or tablet). As noted, the Preferred Extender includes a web-based configuration interface that allows dynamic configuration management, for example, by the network operator. This dynamic configuration includes several options. One option is the ability to specify which CDN consumer content (specified as a list of domains and content types) can be stored. A standard option is to store all consumer CDN content with substitutions based on auxiliary memory control instructions from the CDN edge servers. Another option is the ability to specify what third-party content (specified as a list of domains and content types) can be stored. A standard option is to store all third party content. Yet another option is an option to share auxiliary disk memory space for CDN consumer content against third party content, and / or share auxiliary disk memory space for specific domains or sets of domains. Yet another option is an option to share the available Extender flow to obtain desired flow levels / percentages for CDN consumer content and third party content stored transparently. Preferably, a network operator can determine how much traffic the CDN is delivering from the operator's Extender implementation. These reports are based on the record or other data processed by the distributed data system. These may include, for example, total delivered traffic, consumer CDN traffic versus non-CDN consumer traffic, traffic to identified web portals, traffic disruption by end user geography, traffic disruption by cluster or Geography of the Extender, and the like. The Extender can export such data via SNMP or other network or systems management software. As noted above, the Extender implements an auxiliary memory. The auxiliary memory is an auxiliary memory transparently connected (to the CDN), as described. If desired, the Extender can implement auxiliary memory dump rates that are influenced by global popularity (based on information provided by CDN), and operators can use the configuration interface to share popularity data generated in the Extender's implementation. If desired, CDN edge servers can be programmed to provide additional data for an Extender, such as network conditions, predictive data, content rules and the like, to influence the Extender's operation in relation to both CDN and non-CDN traffic. -CDN. An Extender does not deliver a response to a client if the CDN edge server had not delivered the response to the client. Preferably, an Extender delivers a response from its auxiliary memory if the CDN edge server to which it is directed had delivered the same response to the client. In the technique described above, an Extender queries the CDN edge server when there is an auxiliary memory hit on the Extender; the CDN edge server (and, in particular, its web storage proxy) decides whether for that request the Extender should use the stored content, or instead deliver new content received from the CDN edge server. In this context, the business logic of deciding what is storable and for how long for any given request is implemented on the CDN edge server. In other words, the Extender delegates processing to the CDN. An alternative is to move part of the business logic to the Extensor so that it does not need to contact the CDN for each request. In this variant, the Extender gains some advance knowledge from invariants on how the CDN edge server handles certain requests (and therefore can take that functionality for itself), or receives instructions (from the edge server) on how to do it itself manipulation. In yet another alternative, the Extender receives enough information from the CDN edge server to be able to independently decide for a client request whether it is safe to deliver a stored response to the client. If the Extender cannot determine that it is safe to respond to the specific request from its auxiliary memory, then proceed to the CDN. This technique may have limitations in situations when the information known to the CDN edge server changes after the edge server has already communicated it to the Extender. To solve this, a minimum frequency can be imposed with which the Extender validates stored content, replacing other considerations. In a CDN Extender operating scenario, if a CDN edge server can determine (according to the consumer metadata applicable to the requested URL) that the response only depends on the URL, the edge server preferably communicates the possibility of storage and remaining TTL of the object fetched from the Extender in a response header. The Extender then knows that it is safe to store an object during the remaining TTL. If, however, the CDN edge server cannot determine that the response depends only on the request URL, it communicates this fact to the Extender in a response header, in which case the Extender cannot store the response. If the CDN edge server can determine (for example, according to consumer metadata applicable to the requested URL) that the response is completely determined by the request URL and specific request header fields, the preferred edge server lists the specific request header fields in a Vary response header. Any consumer configuration on the CDN edge server in which a change response label appears within a condition other than secure conditions (such as a condition in the Host request header, or in the URL) preferably causes the CDN edge establish a special bit of control in responses to the Extender. Although the aforementioned describes a specific sequence of operations performed by some modalities of the invention, it should be understood that such sequence is exemplary, since alternative modalities can perform the operations in a different sequence, combine some operations, overlap some operations, or similar . References in the specification to a given modality indicate that the described modality may include a specific aspect, structure or characteristic, but each modality may not necessarily include the specific aspect, structure or characteristic. Although the revealed matter was described in the context of a method or process, the disclosure in question also refers to equipment to perform operations here. This equipment can be built especially for the required purposes, or it can comprise a general purpose computer activated or selectively reconfigured by a computer program stored on the computer. Such a computer program can be stored on a computer-readable storage medium, such as any type of disk including an optical disk, a CD-ROM, and an optical magnetic disk, a read-only memory (ROM), a memory random access (RAM), a magnetic or optical card, or any type of media suitable for storing electronic instructions, but not limited to them, and each coupled to a computer system bus. Although certain components of the system have been described separately, those skilled in the art will understand that some of the functions can be combined or shared in certain instructions, program sequences, portions of codes, and the like. Having described our invention, what we now claim is the following.
权利要求:
Claims (15) [0001] 1. Equipment to extend a content supply network, CDN, characterized by comprising: a hardware processor; an auxiliary memory; computer memory containing computer program instructions executed by the processor to perform a method, the method comprising: receiving a request for content; in response to the request for content; (i) determining whether the content is of a first type or a second type, the first type being content that is adapted to be provided by a content supply network (CDN) other than the equipment, the second type being distinct from the first type; (ii) when the content is of a first type and is located in the auxiliary memory, receive an auxiliary memory handling directive from the CDN, in which the auxiliary memory communicates with the CDN synchronously or asynchronously to receive the handling directive auxiliary memory from CDN, and apply the auxiliary memory handling policy received from CDN and deliver the content accordingly; and (iii) when the content is of the second type, store it transparently and send the content. [0002] 2. Equipment, according to claim 1, characterized by the fact that the step of receiving an auxiliary memory handling directive comprises the following substeps: receiving information that identifies an edge resource in the CDN; direct a validation request to the identified edge resource; and receiving the auxiliary memory handling policy in response to the validation request, the auxiliary memory handling policy having been determined on the edge feature by applying consumer-specific configuration data. [0003] 3. Equipment, according to claim 1 or 2, characterized in that the auxiliary memory is partitioned into first and second parts, the first part to store content of the first type, and the second part to store content of the second type. [0004] 4. Equipment according to any one of claims 1 to 3, characterized in that the step of determining whether the content is of a first type is to compare a domain associated with the request with a list of CDN edge traffic domains. [0005] 5. Equipment, according to claim 4, characterized by the fact that the domain is a high level domain (TLD) of a canonical name (CNAME). [0006] 6. Equipment according to any one of claims 1 to 5, characterized in that the auxiliary memory handling directive received from the CDN is one of: a time-to-live (TTL) expiration time, a "non- store "and data indicating whether the content should be purged from auxiliary memory. [0007] 7. Equipment according to any one of claims 1 to 6, characterized by the fact that the method also includes authentication of the auxiliary memory to the CDN. [0008] 8. Equipment according to any one of claims 1 to 7, characterized in that the method also includes providing data to the CDN. [0009] 9. Equipment, according to claim 8, characterized in that the data identifies data of the first type delivered from the auxiliary memory, and data of the second type of the auxiliary memory. [0010] 10. Equipment according to any one of claims 1 to 9, characterized in that the auxiliary memory handling directive includes an auxiliary memory key associated with a specific domain associated with the CDN consumer. [0011] 11. Content delivery method performed in association with a third party content delivery network (CDN), the CDN comprising a set of edge servers, and an imposing DNS from one or more content provider domains delivered by CDN, the method characterized by comprising: implementing auxiliary memory in a network other than CDN; establish an information channel between auxiliary memory and at least one edge server; and use the information channel to control how much content associated with one or more domains of content providers is delivered from auxiliary memory; where, when the given content request is content associated with one or more domains of content providers and the given content is present in the auxiliary memory and is not prescribed, the auxiliary memory communicates with the CDN synchronously or asynchronously via the channel information to receive at least one auxiliary memory from the CDN, and apply the auxiliary memory handling directive received from the CDN to control how content is delivered from the auxiliary memory. [0012] 12. Method, according to claim 11, characterized by the fact that the network is a mobile network. [0013] 13. Method, according to claim 11, characterized in that the network is a wireless network. [0014] Method according to claim 11, characterized in that it also transparently includes storing and delivering content associated with domains other than one or more content provider domains from auxiliary memory. [0015] 15. Method, according to claim 11, characterized in that the auxiliary memory expands the content supply network into the network.
类似技术:
公开号 | 公开日 | 专利标题 BR112012032371B1|2020-11-10|EXPANSION OF A CONTENT SUPPLY NETWORK | INSIDE A MOBILE OR WIRELESS NETWORK US11146615B2|2021-10-12|Multi-domain configuration handling in an edge network server US10237374B2|2019-03-19|Scalable content delivery network request handling mechanism to support a request processing layer US10742546B2|2020-08-11|Traffic on-boarding for acceleration through out-of-band security authenticators US8843636B1|2014-09-23|Managing digital certificates for WAN optimization over content delivery networks BRPI0713910A2|2012-12-25|Method and device for allowing a wireless gateway to support transparent proxi, system with wireless gateway that supports transparent proxi, gateway US11252071B2|2022-02-15|Sandbox environment for testing integration between a content provider origin and a content delivery network US9871850B1|2018-01-16|Enhanced browsing using CDN routing capabilities US20130111004A1|2013-05-02|File manager having an HTTP-based user interface
同族专利:
公开号 | 公开日 WO2011160113A8|2013-01-31| JP5874146B2|2016-03-02| WO2011160113A3|2012-04-05| EP2583189A4|2015-04-08| CN103069776A|2013-04-24| BR112012032371A2|2016-11-08| KR101837004B1|2018-03-09| EP2583189B1|2018-09-19| CN103069776B|2016-10-05| CA2802904C|2019-06-18| US10977747B2|2021-04-13| CA2802904A1|2011-12-22| AU2011268104A1|2013-05-16| JP2013539564A|2013-10-24| EP2583189A2|2013-04-24| AU2011268104B2|2016-12-15| US20120096106A1|2012-04-19| ES2693648T3|2018-12-13| KR20130095249A|2013-08-27| WO2011160113A2|2011-12-22|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 CA2121151A1|1993-04-16|1994-10-17|Trevor Lambert|Method and apparatus for automatic insertion of a television signal from a remote source| US5534944A|1994-07-15|1996-07-09|Matsushita Electric Corporation Of America|Method of splicing MPEG encoded video| WO1996016497A1|1994-11-21|1996-05-30|Oracle Corporation|Transferring binary large objects in a network environment| WO1996017306A2|1994-11-21|1996-06-06|Oracle Corporation|Media server| JPH09130346A|1995-10-30|1997-05-16|Sony Corp|Av data reception equipment, av data transmission equipment, and broadcasting system| US5859660A|1996-02-29|1999-01-12|Perkins; Michael G.|Non-seamless splicing of audio-video transport streams| WO1998056372A1|1997-06-09|1998-12-17|Massachusetts Institute Of Technology|TYPE 2 METHIONINE AMINOPEPTIDASE INHIBITORS AND USES THEROF| EP1467563A1|1997-07-25|2004-10-13|Sony Corporation|Editing device and method| US6154496A|1997-11-25|2000-11-28|Philips Electronics N.A. Corp.|Video buffer for seamless splicing of MPEG streams| JP4232209B2|1998-01-19|2009-03-04|ソニー株式会社|Compressed image data editing apparatus and compressed image data editing method| US7949779B2|1998-02-10|2011-05-24|Level 3 Communications, Llc|Controlling subscriber information rates in a content delivery network| US6108703A|1998-07-14|2000-08-22|Massachusetts Institute Of Technology|Global hosting system| US6636512B1|1998-07-31|2003-10-21|International Business Machines Corporation|System, method, and article of manufacture for increasing link bandwidth utilization in a high speed digital network| US6912251B1|1998-09-25|2005-06-28|Sarnoff Corporation|Frame-accurate seamless splicing of information streams| US7664864B2|1998-11-13|2010-02-16|Verisign, Inc.|Meta content distribution network| US6657991B1|1998-12-21|2003-12-02|3Com Corporation|Method and system for provisioning network addresses in a data-over-cable system| US6542964B1|1999-06-02|2003-04-01|Blue Coat Systems|Cost-based optimization for content distribution using dynamic protocol selection and query resolution for cache server| US6480539B1|1999-09-10|2002-11-12|Thomson Licensing S.A.|Video encoding method and apparatus| US8060581B2|2000-07-19|2011-11-15|Akamai Technologies, Inc.|Dynamic image delivery system| US7912978B2|2000-07-19|2011-03-22|Akamai Technologies, Inc.|Method for determining metrics of a content delivery and global traffic management network| US6785704B1|1999-12-20|2004-08-31|Fastforward Networks|Content distribution system for operation over an internetwork including content peering arrangements| US6678332B1|2000-01-04|2004-01-13|Emc Corporation|Seamless splicing of encoded MPEG video and audio| AU2964401A|2000-01-27|2001-08-07|Suzanne M Berberet|System and method for providing broadcast programming, a virtual vcr, and a video scrapbook to programming subscribers| US7096418B1|2000-02-02|2006-08-22|Persistence Software, Inc.|Dynamic web page cache| US6711607B1|2000-02-04|2004-03-23|Ensim Corporation|Dynamic scheduling of task streams in a multiple-resource system to ensure task stream quality of service| US6980526B2|2000-03-24|2005-12-27|Margalla Communications, Inc.|Multiple subscriber videoconferencing system| US6877043B2|2000-04-07|2005-04-05|Broadcom Corporation|Method for distributing sets of collision resolution parameters in a frame-based communications network| US6693907B1|2000-04-11|2004-02-17|Sun Microsystems, Inc.|Method and system for measuring reception characteristics in a multicast data distribution group| US7240100B1|2000-04-14|2007-07-03|Akamai Technologies, Inc.|Content delivery network content server request handling mechanism with metadata framework support| US6996616B1|2000-04-17|2006-02-07|Akamai Technologies, Inc.|HTML delivery from edge-of-network servers in a content delivery network | US7562153B2|2000-05-12|2009-07-14|AT&T Intellectual Property II, L. P.|Method and apparatus for content distribution network brokering and peering| US7251688B2|2000-05-26|2007-07-31|Akamai Technologies, Inc.|Method for generating a network map| JP2004505513A|2000-07-25|2004-02-19|エイジルビジョン・エル・エル・シー|Splicing compressed local video segments into fixed time slots in the network feed| US20040015725A1|2000-08-07|2004-01-22|Dan Boneh|Client-side inspection and processing of secure content| WO2002017082A1|2000-08-22|2002-02-28|Akamai Technologies, Inc.|Dynamic content assembly on edge-of-network servers in a content delivery network| US6944585B1|2000-09-01|2005-09-13|Oracle International Corporation|Dynamic personalized content resolution for a media server| US7010578B1|2000-09-21|2006-03-07|Akamai Technologies, Inc.|Internet content delivery service with third party cache interface support| US8010469B2|2000-09-25|2011-08-30|Crossbeam Systems, Inc.|Systems and methods for processing data flows| US7111057B1|2000-10-31|2006-09-19|Akamai Technologies, Inc.|Method and system for purging content from a content delivery network| US20020065899A1|2000-11-30|2002-05-30|Smith Erik Richard|System and method for delivering dynamic content| JP2002171258A|2000-11-30|2002-06-14|Fujitsu Ltd|Extended cell communication network and transmitting device| US7096266B2|2001-01-08|2006-08-22|Akamai Technologies, Inc.|Extending an Internet content delivery network into an enterprise| WO2002057917A2|2001-01-22|2002-07-25|Sun Microsystems, Inc.|Peer-to-peer network computing platform| WO2002071242A1|2001-03-01|2002-09-12|Akamai Technologies, Inc.|Optimal route selection in a content delivery network| AU2002338270A1|2001-04-02|2002-10-15|Akamai Technologies, Inc.|Scalable, high performance and highly available distributed storage system for internet content| US7149797B1|2001-04-02|2006-12-12|Akamai Technologies, Inc.|Content delivery network service provider -managed content delivery network for network service provider | KR100426399B1|2001-04-06|2004-04-08|니트젠테크놀러지스 주식회사|A method for providing contents delivery network service through wireless networks and a system therefor| US7007089B2|2001-06-06|2006-02-28|Akarnai Technologies, Inc.|Content delivery network map generation using passive measurement data| US6981029B1|2001-07-17|2005-12-27|Cisco Technology, Inc.|System and method for processing a request for information in a network| US7467233B2|2002-07-30|2008-12-16|Akamai Technologies, Inc.|Edge side components and application programming environment for building and delivering highly distributed heterogenous component-based web applications| EP1436736B1|2001-09-28|2017-06-28|Level 3 CDN International, Inc.|Configurable adaptive global traffic control and management| US7860964B2|2001-09-28|2010-12-28|Level 3 Communications, Llc|Policy-based content delivery network selection| US7127713B2|2002-01-11|2006-10-24|Akamai Technologies, Inc.|Java application framework for use in a content delivery network | JP2003223378A|2002-01-29|2003-08-08|Fujitsu Ltd|Contents delivery network service method and system| US7133905B2|2002-04-09|2006-11-07|Akamai Technologies, Inc.|Method and system for tiered distribution in a content delivery network| US7289519B1|2002-05-01|2007-10-30|Cisco Technology, Inc.|Methods and apparatus for processing content requests using domain name service| US7260598B1|2002-05-03|2007-08-21|Cisco Technology, Inc.|Methods and apparatus for processing client requests in a content distribution network using client lists| US7216170B2|2002-05-22|2007-05-08|Microsoft Corporation|Systems and methods to reference resources in a television-based entertainment system| US7107309B1|2002-07-03|2006-09-12|Sprint Spectrum L.P.|Method and system for providing interstitial notice| US7395355B2|2002-07-11|2008-07-01|Akamai Technologies, Inc.|Method for caching and delivery of compressed content in a content delivery network| US20040093419A1|2002-10-23|2004-05-13|Weihl William E.|Method and system for secure content delivery| KR100518270B1|2002-12-18|2005-10-04|엘지.필립스 엘시디 주식회사|Method of forming pattern using printing process| US20040167981A1|2003-02-25|2004-08-26|Douglas Christopher Paul|Method and system for monitoring relationships between content devices in a content delivery network| US20040205162A1|2003-04-11|2004-10-14|Parikh Jay G.|Method of executing an edge-enabled application in a content delivery network | US20040243704A1|2003-04-14|2004-12-02|Alfredo Botelho|System and method for determining the unique web users and calculating the reach, frequency and effective reach of user web access| US7305479B1|2003-05-13|2007-12-04|Cisco Technology, Inc.|Methods and apparatus for delivery of content requests within a content delivery network| US7761570B1|2003-06-26|2010-07-20|Nominum, Inc.|Extensible domain name service| US7343485B1|2003-09-03|2008-03-11|Cisco Technology, Inc.|System and method for maintaining protocol status information in a network device| DE60307652T2|2003-11-24|2007-08-09|Akamai Technologies, Inc., Cambridge|Method and system for secure content delivery| US7945945B2|2004-08-06|2011-05-17|Enterasys Networks, Inc.|System and method for address block enhanced dynamic network policy management| JP4718122B2|2004-04-06|2011-07-06|株式会社日立製作所|Media distribution device| US8738614B2|2004-04-23|2014-05-27|Qualcomm Incorporated|Methods and apparatus for providing hierarchical content flow in a data network| US7555774B2|2004-08-02|2009-06-30|Cisco Technology, Inc.|Inline intrusion detection using a single physical port| US7561515B2|2004-09-27|2009-07-14|Intel Corporation|Role-based network traffic-flow rate control| US7787416B2|2004-11-18|2010-08-31|Gidwani Sanjay M|Wireless network having real-time channel allocation| US7933247B2|2004-11-18|2011-04-26|Sanjay M. Gidwani|Real-time scalable wireless switching network| US7917624B2|2004-11-18|2011-03-29|Sanjay M. Gidwani|Wireless network having control plane segregation| US20060174035A1|2005-01-28|2006-08-03|At&T Corp.|System, device, & method for applying COS policies| US7529850B2|2005-03-11|2009-05-05|International Business Machines Corporation|Method and system for rapid dissemination of public announcements| JP4515319B2|2005-04-27|2010-07-28|株式会社日立製作所|Computer system| US8856279B2|2005-05-26|2014-10-07|Citrix Systems Inc.|Method and system for object prediction| US8266327B2|2005-06-21|2012-09-11|Cisco Technology, Inc.|Identity brokering in a network element| US8184641B2|2005-07-20|2012-05-22|Verizon Business Global Llc|Method and system for providing secure communications between proxy servers in support of interdomain traversal| US7603131B2|2005-08-12|2009-10-13|Sellerbid, Inc.|System and method for providing locally applicable internet content with secure action requests and item condition alerts| US20070055984A1|2005-08-24|2007-03-08|C-Cor Incorporated|Multi-tiered architecture for targeted ad insertion| WO2007034209A1|2005-09-23|2007-03-29|Scansafe Limited|Network communications| US8141156B1|2005-12-28|2012-03-20|At&T Intellectual Property Ii, L.P.|Method and apparatus for mitigating routing misbehavior in a network| US7660296B2|2005-12-30|2010-02-09|Akamai Technologies, Inc.|Reliable, high-throughput, high-performance transport and routing mechanism for arbitrary data flows| US8447837B2|2005-12-30|2013-05-21|Akamai Technologies, Inc.|Site acceleration with content prefetching enabled through customer-specific configurations| JP4855107B2|2006-03-08|2012-01-18|ソニー株式会社|Information processing system, information processing method, providing apparatus and method, information processing apparatus, and program| KR101486431B1|2006-09-06|2015-01-26|아카마이 테크놀로지스, 인크.|Hybrid content delivery network and peer-to-peer network| US20090217362A1|2007-01-18|2009-08-27|Microsoft Corporation|Selectively provisioning clients with digital identity representations| CN101242422B|2007-02-06|2011-01-26|中国电信股份有限公司|Content distribution network system and method applicable to multi-service fusion| US7865585B2|2007-03-12|2011-01-04|Citrix Systems, Inc.|Systems and methods for providing dynamic ad hoc proxy-cache hierarchies| US20080263180A1|2007-04-19|2008-10-23|Hurst Mark B|Apparatus, system, and method for resilient content acquisition| US8549157B2|2007-04-23|2013-10-01|Mcafee, Inc.|Transparent secure socket layer| US20100036725A1|2007-06-07|2010-02-11|Bhavin Turakhia|Method and system for providing a predetermined service to a domain registrant by a tld registry| US8370424B2|2007-06-22|2013-02-05|Aol Inc.|Systems and methods for caching and serving dynamic content| US8543700B1|2007-06-28|2013-09-24|Emc Corporation|Asynchronous content transfer| US20090083811A1|2007-09-26|2009-03-26|Verivue, Inc.|Unicast Delivery of Multimedia Content| US20090156171A1|2007-12-17|2009-06-18|At&T Knowledge Ventures, L.P.|System and method of processing messages| US8199916B2|2007-12-26|2012-06-12|International Business Machines Corporation|Selectively loading security enforcement points with security association information| US8543667B2|2008-01-14|2013-09-24|Akamai Technologies, Inc.|Policy-based content insertion| US7925782B2|2008-06-30|2011-04-12|Amazon Technologies, Inc.|Request routing using network computing components| US7996475B2|2008-07-03|2011-08-09|Barracuda Networks Inc|Facilitating transmission of email by checking email parameters with a database of well behaved senders| US20110119724A1|2008-07-07|2011-05-19|Telefonaktiebolaget Lm Ericsson |Proxy Functionality| KR101091980B1|2008-10-16|2011-12-08|에스케이플래닛 주식회사|System and method for content delivery using cache server and browser cache| US20120209942A1|2008-10-28|2012-08-16|Cotendo, Inc.|System combining a cdn reverse proxy and an edge forward proxy with secure connections| WO2010049876A2|2008-10-28|2010-05-06|Cotendo Ltd|System and method for sharing transparent proxy between isp and cdn| US8856322B2|2008-12-19|2014-10-07|Openpeak Inc.|Supervisory portal systems and methods of operation of same| US11134102B2|2009-01-28|2021-09-28|Headwater Research Llc|Verifiable device assisted service usage monitoring with reporting, synchronization, and notification| US8245037B1|2009-02-17|2012-08-14|Amazon Technologies, Inc.|Encryption key management| US8417816B2|2009-02-20|2013-04-09|Alcatel Lucent|Topology aware cache cooperation| WO2011068784A1|2009-12-01|2011-06-09|Azuki Systems, Inc.|Method and system for secure and reliable video streaming with rate adaptation| US8069266B2|2009-06-30|2011-11-29|The Go Daddy Group, Inc.|Integrated static and dynamic content delivery| JP4991903B2|2010-04-26|2012-08-08|シャープ株式会社|MFP, authentication server, MFP control system, program, and recording medium| CN103069776B|2010-06-18|2016-10-05|阿卡麦科技公司|Content distributing network is expanded to mobile or cable network| US8559433B2|2011-01-07|2013-10-15|Jeda Networks, Inc.|Methods, systems and apparatus for the servicing of fibre channel fabric login frames| US8589996B2|2011-03-16|2013-11-19|Azuki Systems, Inc.|Method and system for federated over-the-top content delivery| FR2973978A1|2011-04-08|2012-10-12|France Telecom|METHOD OF COMMUNICATION BETWEEN DIGITAL CONTENT DISTRIBUTION NETWORKS| EP2716011A1|2011-06-01|2014-04-09|Interdigital Patent Holdings, Inc.|Content delivery network interconnection mechanism| US8510807B1|2011-08-16|2013-08-13|Edgecast Networks, Inc.|Real-time granular statistical reporting for distributed platforms| US9747592B2|2011-08-16|2017-08-29|Verizon Digital Media Services Inc.|End-to-end content delivery network incorporating independently operated transparent caches and proxy caches| US9774616B2|2012-06-26|2017-09-26|Oppleo Security, Inc.|Threat evaluation system and method| FR2995487A1|2012-09-11|2014-03-14|France Telecom|TECHNIQUE FOR PROCESSING A CONTENT DISTRIBUTION REQUEST| US9729605B2|2012-12-27|2017-08-08|Akamai Technologies Inc.|Mechanism for distinguishing between content to be served through first or second delivery channels| US9948675B2|2013-04-04|2018-04-17|The Mitre Corporation|Identity-based internet protocol networking| US9450824B2|2014-02-04|2016-09-20|Wipro Limited|Systems and methods for smart request processing|US8543667B2|2008-01-14|2013-09-24|Akamai Technologies, Inc.|Policy-based content insertion| WO2010049876A2|2008-10-28|2010-05-06|Cotendo Ltd|System and method for sharing transparent proxy between isp and cdn| US9215423B2|2009-03-30|2015-12-15|Time Warner Cable Enterprises Llc|Recommendation engine apparatus and methods| US8813124B2|2009-07-15|2014-08-19|Time Warner Cable Enterprises Llc|Methods and apparatus for targeted secondary content insertion| US8701138B2|2010-04-23|2014-04-15|Time Warner Cable Enterprises Llc|Zone control methods and apparatus| CN103069776B|2010-06-18|2016-10-05|阿卡麦科技公司|Content distributing networkis expanded to mobile or cable network| US8671221B2|2010-11-17|2014-03-11|Hola Networks Ltd.|Method and system for increasing speed of domain name system resolution within a computing device| CN102143509B|2010-12-16|2014-04-02|华为终端有限公司|Method, device and system for managing wireless repeater by using access point | US8886742B2|2011-01-28|2014-11-11|Level 3 Communications, Llc|Content delivery network with deep caching infrastructure| US9747592B2|2011-08-16|2017-08-29|Verizon Digital Media Services Inc.|End-to-end content delivery network incorporating independently operated transparent caches and proxy caches| US8977704B2|2011-12-29|2015-03-10|Nokia Corporation|Method and apparatus for flexible caching of delivered media| US9401968B2|2012-01-20|2016-07-26|Nokia Techologies Oy|Method and apparatus for enabling pre-fetching of media| US20130227283A1|2012-02-23|2013-08-29|Louis Williamson|Apparatus and methods for providing content to an ip-enabled device in a content distribution network| US9426123B2|2012-02-23|2016-08-23|Time Warner Cable Enterprises Llc|Apparatus and methods for content distribution to packet-enabled devices via a network bridge| US8838149B2|2012-04-02|2014-09-16|Time Warner Cable Enterprises Llc|Apparatus and methods for ensuring delivery of geographically relevant content| US9467723B2|2012-04-04|2016-10-11|Time Warner Cable Enterprises Llc|Apparatus and methods for automated highlight reel creation in a content delivery network| JP5918642B2|2012-06-29|2016-05-18|Kddi株式会社|Web content distribution device| JP5716712B2|2012-07-24|2015-05-13|横河電機株式会社|Packet transfer apparatus and method| US10261938B1|2012-08-31|2019-04-16|Amazon Technologies, Inc.|Content preloading using predictive models| US9628345B2|2012-12-13|2017-04-18|Level 3 Communications, Llc|Framework supporting content delivery with collector services network| US20140337472A1|2012-12-13|2014-11-13|Level 3 Communications, Llc|Beacon Services in a Content Delivery Framework| US9654579B2|2012-12-21|2017-05-16|Akamai Technologies, Inc.|Scalable content delivery network request handling mechanism| US9736271B2|2012-12-21|2017-08-15|Akamai Technologies, Inc.|Scalable content delivery network request handling mechanism with usage-based billing| US9729605B2|2012-12-27|2017-08-08|Akamai Technologies Inc.|Mechanism for distinguishing between content to be served through first or second delivery channels| CN104641655A|2013-04-07|2015-05-20|华为技术有限公司|Terminal cache method, terminal and server| KR101407934B1|2013-08-22|2014-06-17|에스케이텔레콤 주식회사|System for distributing a content, method and apparatus thereof| US9648125B2|2013-10-04|2017-05-09|Akamai Technologies, Inc.|Systems and methods for caching content with notification-based invalidation| US9641640B2|2013-10-04|2017-05-02|Akamai Technologies, Inc.|Systems and methods for controlling cacheability and privacy of objects| KR102147053B1|2013-10-10|2020-08-21|에스케이텔레콤 주식회사|Method for API of CDN service and apparatus therefor| EP3108644B1|2014-02-19|2021-01-13|Level 3 Communications, LLC|Content delivery network architecture with edge proxy| CN103873604B|2014-03-24|2017-03-22|成都博宇科技有限公司|Network access method based on analysis of CDN data| US9613158B1|2014-05-13|2017-04-04|Viasat, Inc.|Cache hinting systems| US9094443B1|2014-07-30|2015-07-28|Iboss, Inc.|Web redirection for content scanning| US10506027B2|2014-08-27|2019-12-10|Tensera Networks Ltd.|Selecting a content delivery network| US9367410B2|2014-09-12|2016-06-14|Facebook, Inc.|Failover mechanism in a distributed computing system| KR101999719B1|2014-10-29|2019-07-12|에스케이텔레콤 주식회사|Apparatus and method for managing contents| US10355964B2|2014-10-31|2019-07-16|At&T Intellectual Property I, L.P.|Method and system to capture selected network data| EP3219086A4|2014-11-11|2018-05-30|Akamai Technologies, Inc.|Content delivery to physically-proximate devices using a mesh-assisted cache| US9401949B1|2014-11-21|2016-07-26|Instart Logic, Inc.|Client web content cache purge| US9967734B1|2014-11-24|2018-05-08|Sprint Communications Company, L.P.|Content delivery network request handling in wireless communication systems| CN105704708A|2014-11-25|2016-06-22|中兴通讯股份有限公司|Mobile network content distribution method, device and system| US20160182668A1|2014-12-18|2016-06-23|Limelight Networks, Inc.|Acceleration nodes for improving web traffic quality of service| US10116676B2|2015-02-13|2018-10-30|Time Warner Cable Enterprises Llc|Apparatus and methods for data collection, analysis and service modification based on online activity| CN105991787A|2015-02-16|2016-10-05|中兴通讯股份有限公司|Packet data service processing system, method and apparatus| US10630758B2|2015-05-06|2020-04-21|Radware, Ltd.|Method and system for fulfilling server push directives on an edge proxy| US10616356B2|2015-02-24|2020-04-07|Radware, Ltd.|Optimization of asynchronous pushing of web resources| US10298713B2|2015-03-30|2019-05-21|Huawei Technologies Co., Ltd.|Distributed content discovery for in-network caching| CN104853384B|2015-05-14|2018-08-24|南京邮电大学|A kind of content buffering method based on popularity in 5th Generation Mobile Communication System| US10432723B2|2015-09-03|2019-10-01|Toshiba Memory Corporation|Storage server and storage system| US20170078434A1|2015-09-11|2017-03-16|Amazon Technologies, Inc.|Read-only data store replication to edge locations| US10848582B2|2015-09-11|2020-11-24|Amazon Technologies, Inc.|Customizable event-triggered computation at edge locations| US9954816B2|2015-11-02|2018-04-24|Nominum, Inc.|Delegation of content delivery to a local service| US10530852B2|2016-05-19|2020-01-07|Level 3 Communications, Llc|Network mapping in content delivery network| US11212593B2|2016-09-27|2021-12-28|Time Warner Cable Enterprises Llc|Apparatus and methods for automated secondary content management in a digital network| DE112016007324B4|2016-11-09|2020-06-18|Mitsubishi Electric Corporation|Data distribution system, mobile station, distribution device, data distribution method, mobile station program and distribution device program| US11165825B2|2017-02-16|2021-11-02|Emerald Cactus Ventures, Inc.|System and method for creating encrypted virtual private network hotspot| US11122013B2|2017-02-16|2021-09-14|Emerald Cactus Ventures, Inc.|System and method for encrypting data interactions delineated by zones| US11165751B2|2017-02-16|2021-11-02|Emerald Cactus Ventures, Inc.|System and method for establishing simultaneous encrypted virtual private networks from a single computing device| US10439925B2|2017-12-21|2019-10-08|Akamai Technologies, Inc.|Sandbox environment for testing integration between a content provider origin and a content delivery network| US10587426B2|2018-05-17|2020-03-10|At&T Intellectual Property I, L.P.|System and method for optimizing revenue through bandwidth utilization management| CN109347637B|2018-08-01|2021-01-15|华为技术有限公司|Authentication method, Content Delivery Networkand content server| US10750368B1|2019-03-04|2020-08-18|Cisco Technology, Inc.|Security protection to prevent unauthorized use of mobile network extenders| CN113366816A|2019-04-12|2021-09-07|三星电子株式会社|Method and system for discovering edge server or edge service through domain name server resolution|
法律状态:
2018-12-26| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]| 2020-06-30| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2020-11-10| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 20/06/2011, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US35630610P| true| 2010-06-18|2010-06-18| US61/356,306|2010-06-18| PCT/US2011/041069|WO2011160113A2|2010-06-18|2011-06-20|Extending a content delivery networkinto a mobile or wireline network| US13/164,102|US10977747B2|2010-06-18|2011-06-20|Extending a content delivery networkinto a mobile or wireline network| US13/164,102|2011-06-20| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|