Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web caching with security as a service

A security and caching technology, applied in the field of computer networks, which can solve problems such as the inability to implement security policies

Active Publication Date: 2015-02-04
CISCO TECH INC
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, SecaaS is provided outside the network, so identity-based security policies for in-network cached content may not be possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web caching with security as a service
  • Web caching with security as a service
  • Web caching with security as a service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The cached content is filtered by SecaaS. However, the identity of the requester may change, so identity-based security is a security breach for cached content. When the content in the cache is not available, the cloud connector can fetch from the web cache or redirect the traffic to SecaaS. For security, Cloud Connector redirects HTTP traffic to SecaaS. It also collects user identities so that SecaaS can provide identity-based security on the cloud. This implies that the Cloud Connector is not aware of policies on the cloud. On the other hand, with the advent of web caching, cached content is obtained from a web cache rather than from a content server. Traffic is not redirected to SecaaS.

[0016] Combining web caching and SecaaS enables similar identity-based policies to be enforced both on SecaaS and on content delivered from web caching. Identity-based policy implementation outside the corporate network using SecaaS and within the network for web-cached content...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In one implementation, Web-Cache deployed in the Enterprise premises and cloud-based SecaaS are combined such that similar identity-based polices are enforced on both the SecaaS and content delivered from the Web-Cache. This identity-based policy implementation outside the network using SecaaS and within the network for web-cached content provides consistent identity-based security while still providing content to end-users with high performance. Content inspected and / or modified by SecaaS may be cached in the enterprise premises so that requests for content from an origin server decreases, freeing Internet bandwidth and reducing access time. Local caching of streaming content may decrease latency while local implementation of identity-based policy continues to limit the streamed content as appropriate. Local implementation of identity-based policy may reduce the load on SecaaS. Rather than using content delivery networks provided by a service provider for web-content, a cache server within the enterprise is used.

Description

technical field [0001] The present disclosure relates generally to the field of computer networking, and more particularly to web caching employing cloud-based security as a service. Background technique [0002] Corporate networks can cache web content. Web caching enhances end-to-end delivery of content by caching popular content. The most in-demand content is cached on servers within the network to deliver it to end users with high reliability and high performance. Enterprises deploy caching of web content to reduce bandwidth requirements, reduce server load, and improve client response times for content stored in the cache. [0003] Content is filtered as a security measure. Enterprises deploy security appliances that perform application protocol inspection / decryption, deep packet inspection, heuristics, and / or other functions within the network to detect malware, exploit scripts, prevent data leakage, or otherwise protect the network. These network-based security tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/10H04L63/20H04L63/0245H04L63/306H04L67/1097H04L63/0281
Inventor 瑞迪·蒂鲁玛勒什沃尔帕蒂尔·普拉尚斯内什·拉梅什温·丹尼尔怀尔德·克里斯多夫
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products