[go: nahoru, domu]

WO2004036362A2 - Compression of secure content - Google Patents

Compression of secure content

Info

Publication number
WO2004036362A2
WO2004036362A2 PCT/US2003/032598 US0332598W WO2004036362A2 WO 2004036362 A2 WO2004036362 A2 WO 2004036362A2 US 0332598 W US0332598 W US 0332598W WO 2004036362 A2 WO2004036362 A2 WO 2004036362A2
Authority
WO
WIPO (PCT)
Prior art keywords
compression
recited
encrypted information
request
compressed
Prior art date
Application number
PCT/US2003/032598
Other languages
French (fr)
Other versions
WO2004036362A3 (en
Inventor
Brian Metzger
Venkitachalam Gopalakrishnan
Alan Frindell
Thomas Fountain
Sanjay Beri
Original Assignee
Ingrian Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingrian Networks, Inc. filed Critical Ingrian Networks, Inc.
Priority to AU2003279970A priority Critical patent/AU2003279970A1/en
Publication of WO2004036362A2 publication Critical patent/WO2004036362A2/en
Publication of WO2004036362A3 publication Critical patent/WO2004036362A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/30Compression, e.g. Merkle-Damgard construction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Definitions

  • This invention relates to secure content and, more specifically, to compression of secure content.
  • compression products and related functionality do not allow for content to be secured (encrypted) during the entire time that the content is transported through the network. This is because most compression products are unable to interpret the encrypted content. In order to determine if the content can be compressed, the compression product needs to interpret the encrypted content. Most compression products are able to interpret content only when the content is unencrypted, i.e., not secure.
  • FIG. 1 is a block diagram that illustrates a high-level network diagram showing aspects of a computerized environment in which the compression of secure content can be performed, according to certain embodiments.
  • FIG. 2 is a block diagram that illustrates some of the components typically incorporated in at least some of the computer systems and other devices on which the facility executes.
  • FIG. 3 is a flow chart that illustrates some of steps that the facility performs, according to certain embodiments.
  • FIG. 4 is a block diagram of a CSE graphical user interface (GUI), according to certain embodiments of the invention.
  • GUI graphical user interface
  • a facility for dynamically compressing secure information, i.e., encrypted information or content, before the secure information is transported to the client that is requesting the encrypted information is described.
  • secure information i.e., encrypted information or content
  • a software implementation of the facility is described.
  • the facility may be a software implementation, or a hardware implementation, or a combination thereof and may vary from implementation to implementation.
  • the current embodiments are not restricted to any particular implementation.
  • the facility includes a proxy server, a cryptographic engine, and a compression service engine.
  • the compression service engine in collaboration with the cryptographic engine, is configurable to interpret a request for encrypted information as well as the response to the request. The purpose of such an interpretation includes determining whether: 1) the client that sent the request is capable of accepting compressed encrypted information, and 2) the type and level of compression to apply to the encrypted information, if the client is capable of accepting compressed encrypted information. If a copy of the encrypted information is already stored in a proxy cache, then the encrypted information is retrieved from the proxy cache for serving to the client, rather than requesting the encrypted information from a back-end server.
  • T 1(3 ' . ' I ' ' a h' ⁇ gh ' -leveTbTock diagram that illustrates aspects of a computerized environment 100 in which the compression of secure content can be performed, according to certain embodiments.
  • FIG. 1 shows a plurality of clients 102a-102n, a network 104, a proxy server 106 and a back-end server 108. There may be more than one back-end server.
  • compression of secure content is performed with the aid of one or more other computer systems, such as proxy server 106.
  • Components of the facility may reside on and/or execute on any combination of these computer systems, and intermediate results from the compression may similarly reside on any combination of these computer systems.
  • the facility includes a proxy server, an encryption/decryption service engine (cryptographic engine) and a compression service engine (CSE).
  • the facility may be embodied in a single device or distributed among various devices. For embodiments that include hardware implementations, suitable hardware interfaces are used for the CSE.
  • the computer systems 100 shown in FIG. 1 are connected via network 104, which may use a variety of different networking technologies, including wired, guided or line-of-sight optical, and radio frequency networking.
  • the network includes the public switched telephone network.
  • Network connections established via the network may be fully-persistent, session-based, or intermittent, such as packet-based. While the facility typically operates in an environment such as is shown in FIG. 1 and described above, those skilled in the art will appreciate the facility may also operate in a wide variety of other environments.
  • communication between any of clients 102a-102n and back-end server 108 is through secure communication links using a secure protocol.
  • FIG. 2 is a block diagram showing some of the components typically incorporated in at least some of the computer systems and other devices on which the facility executes, including some or all of the server and client computer systems shown in FIG. 1.
  • These computer systems and devices 200 may include one or more central processing units ("CPUs") 201 for executing computer programs; a computer memory 202 for storing programs and data - including data structures -- while they are being used; a persistent storage device 203, such as a hard drive, for persistently storing programs and data; a computer-readable media drive 204, such as a CD-ROM drive, for reading programs and data stored on a computer-readable medium; and a network connection 205 for connecting the computer system to other computer systems, such as via the Internet, to exchange programs and/or data - including data structures. While computer systems configured as described above are typically used to support the operation of the facility, those skilled in the art will appreciate that the facility may be implemented using devices of various types and configurations, and having various components.
  • Clients and servers exchange sensitive data (secure content) by encrypting the data before transmission through the network.
  • bandwidth and latency constraints are of concern.
  • bandwidth is expressed as the number of bits of data per sec (bps). If the bandwidth is not wide enough to support the amount of data that is being relayed at the speed the data is being processed, then a bottleneck occurs. Bottlenecks have adverse effects on latency because bottlenecks increase the amount of time it takes for a data packet to travel from the packet's source to the packet's destination.
  • FIG. 3 is a flow chart that illustrates some of steps of a procedure 300 that the facility performs, according to certain embodiments.
  • the request is first decrypted, if the request is encrypted.
  • the requesting can accept compressed data if the request contains an "Accept-Encoding: gzip" header, for example.
  • a proxy server that can employ an encryption/decryption service engine to decrypt both the request and the response is used.
  • procedure 300 arrives at block 304 where the requested data is retrieved and sent to the requesting client in uncompressed form. Some older versions of client browsers are unable to accept compressed data.
  • procedure 300 arrives at block 306 where it is determined whether the requested data is stored in the cache. If the requested data is not already in the cache, then at block 308, the proxy server makes a request for the data from the back-end server. If the requested data is already stored in the cache, then at block 310, the proxy server retrieves the requested data from the cache.
  • the requested data is decrypted and examined to determine the desired type and level of compression.
  • the desired type of compression may either be a gzip compression or a GIF compression, for example.
  • the level of compression is the percentage by which images can be compressed.
  • the CSE With gzip compression enabled, the CSE will compress the response if: 1) the request contains an Accept-Encoding: gzip header, and 2) the response does ' NOT contain a Content-Encoding header.
  • GIF compression enabled the CSE will scale down GIF images according to a user specified level of compression or quality factor. Each image can be decoded, and a reduction algorithm can be applied. Next, the image can be re-encoded.
  • the type of image reduction algorithm may vary form implementation to implementation.
  • the proxy server will simply serve the desired compressed data object to the requesting client. If the desired compressed data object is not in the cache, then at block 318 the CSE is called upon to apply the appropriate compression technique to compress the requested data at the desired level of compression. It is further assumed that the proxy server and associated CSE can interface with third party libraries to perform the actual content compression and image reduction. Such libraries may or not be free, require license fees, etc. The performance of the proxy server and associated CSE is related to the performance of such libraries.
  • the CSE can leverage third party libraries to perform the actual compression.
  • gzip compression can be performed by zlib, and the GIF compression by giflib.
  • Gif Compression a modified version of GIFSICLE in a library form can be used.
  • a secure tunnel is maintained for the transport of the compressed data object to the requesting client.
  • the compression of the requested secure content results in improved response time and in a decreased amount of bandwidth that is needed to transport the compressed secure content.
  • Compression is a processor intensive activity.
  • a user configurable compression level will control the size of the compressed data object versus the performance impact.
  • the proxy server may make an intelligent choice not to compress the data if the processor is heavily loaded at the time of satisfying the request. If the requested data is suitable for caching, the proxy server will cause a copy of the requested data to be compressed at a later time when the processor is less busy. The resulting compressed data object is then stored in the cache for purposes of satisfying future requests for such secure content.
  • the cache is capable of distinguishing data objects by Content Encoding. This will prevent gzipped objects from being served to clients that did not send an "Accept-Encoding: gzip" header.
  • the quality factor will be part of the cache lookup for a GIF to prevent other forwarding rules from accessing compressed (ie: reduced quality) GIF images.
  • a particular forwarding rule may be such that it allows reduced quality images to be sent as a response if it is known that the client browser, such as a PDA browser for example, has little ability to appreciate high quality images.
  • the first client to request a compressed image may receive the original image. This will start the reduction process in the background, eventually placing the compressed image in the cache for future use.
  • clients accept plain encoded objects.
  • a given client may be served a plain encoded object even though such a client can accept compressed content.
  • An older browser makes a request for 7index.html" and does not send an "Accept-Encoding: gzip" header.
  • the plain object is stored in the cache.
  • a modern browser requests the same object but does send the Accept-Encoding: gzip header. Since the modern browser implicitly accepts plain encodings, the plain copy from the cache is served to the modern browser, rather than compressing the requested object and sending the compressed object to the modern browser.
  • the module informs the cache that the CSE is attached and the above scenario is treated as a cache miss.
  • a cache setting is added wherein the cache setting allows the administrator to specify that the backend server is performing the compression, so that plain encoding hits can be treated as missed on those forwarding rules as well.
  • the compression service engine can be configured to selectively compress secure content. As previously explained, some clients may not accept compressed content while other clients may accept compressed content.
  • the compression service engine can be configured to select for compression, only the secure content that is destined for clients that will accept compressed content. Furthermore, different compression algorithms may be selected based on the characteristics of the content being served.
  • the proxy server and the associated compression service engine can be configured by administrators who have knowledge of: 1) the type of content served through such a proxy server, and 2) the web server environment.
  • the compression service engine is configurable using a plurality of profiles. Each profile defines a different configuration. Profiles are described in greater detail herein with reference to FiG. 4.
  • the proxy server uses a set a forwarding rules to determine how incoming requests from client browsers are to be treated.
  • Service engine filters are filters that allow a user to specify conditions that need to be satisfied for a CSE to process a request or response.
  • a CSE and a filter are attached to each forwarding rule.
  • an administrator wishes to enable or disable the CSE based on the content type or User-Agent headers (or any other HTTP headers)
  • the administrator can create an appropriate service engine filter. For example, if a particular user agent has a bug which causes it to send an "Accept-Encoding: gzip" header when it does not in fact support gzip, a service engine filter can be used to disable the module for this agent.
  • the same method can be used to restrict compression to objects that have Content- Type: text/*, etc. The following steps may be followed: Create a new profile with the desired compression levels. Create a response filter to control what content will be compressed. Attach the profile and filter to the forwarding rule.
  • FIG. 4 is a block diagram of a CSE graphical user interface (GUI), according to certain embodiments of the invention.
  • CSE user interface 400 comprises a profile list 402.
  • Profile list 402 contains a list of existing profiles (compression profiles) as indicated by profile name 404.
  • CSE GUI 400 also comprises a "create profile" section such as create profile 408.
  • Each profile will have a properties page where the attributes of the profile can be viewed or modified. The properties page can be accessed by selecting the properties button 406.
  • Each profile of the CSE may include the following configurable attributes: Profile Name 410 - name by which this profile is referred to by forwarding rules. Log Level 412 - how much information should be logged. Enable gzip Compression 414 - true if this profile performs gzip compression, gzip Compression Level 416 - integer level of speed versus size. 1 fastest largest - 9 slowest/smallest.
  • GIF Compression 418 true if this profile performs GIF compression.
  • GIF Compression Level 420 user defined quality factor. The user will be able to set a specific number of colors to reduce to or a percentage to reduce colors by. Also, the user will be able to select from different compression algorithms, and will be able to select different algorithms for color and grayscale images.
  • a check box per-forwarding rule, for example
  • the proxy may need to be restarted. If image compression is performed in a separate process, such a process may also need to be restarted.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Compression, Expansion, Code Conversion, And Decoders (AREA)
  • Computer And Data Communications (AREA)

Abstract

The encrypted response to a request is first decrypted to determine the type and level compression that can be applied to the response. The response is then compressed and encrypted for satisfying the request.

Description

COMPRESSION OF SECURE CONTENT
FIELD OF THE INVENTION
This invention relates to secure content and, more specifically, to compression of secure content.
BACKGROUND OF THE INVENTION
Typically, compression products and related functionality do not allow for content to be secured (encrypted) during the entire time that the content is transported through the network. This is because most compression products are unable to interpret the encrypted content. In order to determine if the content can be compressed, the compression product needs to interpret the encrypted content. Most compression products are able to interpret content only when the content is unencrypted, i.e., not secure.
There is a need to have content be secure (encrypted) throughout its data flow (from backend server to client), and for the secure content to be compressed at the same time. Based on the foregoing, there is a need for a mechanism to compress secure content.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
FIG. 1 is a block diagram that illustrates a high-level network diagram showing aspects of a computerized environment in which the compression of secure content can be performed, according to certain embodiments.
FIG. 2 is a block diagram that illustrates some of the components typically incorporated in at least some of the computer systems and other devices on which the facility executes.
FIG. 3 is a flow chart that illustrates some of steps that the facility performs, according to certain embodiments. FIG. 4 is a block diagram of a CSE graphical user interface (GUI), according to certain embodiments of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
A facility for dynamically compressing secure information, i.e., encrypted information or content, before the secure information is transported to the client that is requesting the encrypted information, is described. For purposes of explanation, a software implementation of the facility is described. However, the facility may be a software implementation, or a hardware implementation, or a combination thereof and may vary from implementation to implementation. The current embodiments are not restricted to any particular implementation.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention. U.S. Provisional Patent Application No. 60/418,878 (Atty. Docket No. 36321- 8030.US00), filed October 15, 2002, by Brian Metzger, is herein incorporated by reference
In certain embodiments, the facility includes a proxy server, a cryptographic engine, and a compression service engine. The compression service engine, in collaboration with the cryptographic engine, is configurable to interpret a request for encrypted information as well as the response to the request. The purpose of such an interpretation includes determining whether: 1) the client that sent the request is capable of accepting compressed encrypted information, and 2) the type and level of compression to apply to the encrypted information, if the client is capable of accepting compressed encrypted information. If a copy of the encrypted information is already stored in a proxy cache, then the encrypted information is retrieved from the proxy cache for serving to the client, rather than requesting the encrypted information from a back-end server. Further, the encrypted information is compressed based on the determined type and level of compression before sending the encrypted information to the client in response to the client's request. T 1(3'.' I' 'a h'ϊgh'-leveTbTock "diagram that illustrates aspects of a computerized environment 100 in which the compression of secure content can be performed, according to certain embodiments. FIG. 1 shows a plurality of clients 102a-102n, a network 104, a proxy server 106 and a back-end server 108. There may be more than one back-end server.
In certain embodiments, compression of secure content is performed with the aid of one or more other computer systems, such as proxy server 106. Components of the facility may reside on and/or execute on any combination of these computer systems, and intermediate results from the compression may similarly reside on any combination of these computer systems. According to some embodiments, the facility includes a proxy server, an encryption/decryption service engine (cryptographic engine) and a compression service engine (CSE). The facility may be embodied in a single device or distributed among various devices. For embodiments that include hardware implementations, suitable hardware interfaces are used for the CSE.
The computer systems 100 shown in FIG. 1 are connected via network 104, which may use a variety of different networking technologies, including wired, guided or line-of-sight optical, and radio frequency networking. In some embodiments, the network includes the public switched telephone network. Network connections established via the network may be fully-persistent, session-based, or intermittent, such as packet-based. While the facility typically operates in an environment such as is shown in FIG. 1 and described above, those skilled in the art will appreciate the facility may also operate in a wide variety of other environments.
In some embodiments, communication between any of clients 102a-102n and back-end server 108 is through secure communication links using a secure protocol.
FIG. 2 is a block diagram showing some of the components typically incorporated in at least some of the computer systems and other devices on which the facility executes, including some or all of the server and client computer systems shown in FIG. 1. These computer systems and devices 200 may include one or more central processing units ("CPUs") 201 for executing computer programs; a computer memory 202 for storing programs and data - including data structures -- while they are being used; a persistent storage device 203, such as a hard drive, for persistently storing programs and data; a computer-readable media drive 204, such as a CD-ROM drive, for reading programs and data stored on a computer-readable medium; and a network connection 205 for connecting the computer system to other computer systems, such as via the Internet, to exchange programs and/or data - including data structures. While computer systems configured as described above are typically used to support the operation of the facility, those skilled in the art will appreciate that the facility may be implemented using devices of various types and configurations, and having various components.
Clients and servers exchange sensitive data (secure content) by encrypting the data before transmission through the network. As with any data transmission through a network, bandwidth and latency constraints are of concern. In digital systems, bandwidth is expressed as the number of bits of data per sec (bps). If the bandwidth is not wide enough to support the amount of data that is being relayed at the speed the data is being processed, then a bottleneck occurs. Bottlenecks have adverse effects on latency because bottlenecks increase the amount of time it takes for a data packet to travel from the packet's source to the packet's destination.
However, not all bits of data are equal. Data compression techniques make it possible for some data to contain more information than others. Thus, short of increasing the size of the bandwidth, bandwidth and latency problems may be mitigated by maximizing the amount of information that can be transmitted by compressing the data before transmission through the network. In non-secure network systems, the data requested by clients can be easily compressed before sending such data to the clients through the network.
However, in the case of secure network systems, the usual mechanisms for compressing data are unable to interpret the encrypted data and, as a consequence, are unable to compress the data. Such mechanisms are unable to interpret encrypted data because encrypted data does not permit deep inspection of the data. For example, such mechanisms are unable to look at the payload of an encrypted data packet. Insight into the payload is needed for decisions on the type of compression techniques' to apply. Further, the determination of the type of compression techniques to apply is affected by the characteristics of the client that is requesting the encrypted data, as explained in greater detail below.
For purposes of explanation, assume that a client is requesting encrypted content from the backend server of a server system. The data requested by the client from the back-end server is herein referred to as "requested data" or "response." The client that is making the request is herein referred to as a "requesting client." FIG. 3 is a flow chart that illustrates some of steps of a procedure 300 that the facility performs, according to certain embodiments. At block 302, it is determined whether the requesting client can accept compressed data. To make such a determination, the request is first decrypted, if the request is encrypted. The requesting can accept compressed data if the request contains an "Accept-Encoding: gzip" header, for example. According to certain embodiments, a proxy server that can employ an encryption/decryption service engine to decrypt both the request and the response is used.
If it is determined that the requesting client is unable to receive compressed data, then procedure 300 arrives at block 304 where the requested data is retrieved and sent to the requesting client in uncompressed form. Some older versions of client browsers are unable to accept compressed data.
If the requesting client is unable to receive compressed data, then procedure 300 arrives at block 306 where it is determined whether the requested data is stored in the cache. If the requested data is not already in the cache, then at block 308, the proxy server makes a request for the data from the back-end server. If the requested data is already stored in the cache, then at block 310, the proxy server retrieves the requested data from the cache.
At 312, the requested data is decrypted and examined to determine the desired type and level of compression. The desired type of compression may either be a gzip compression or a GIF compression, for example. The level of compression is the percentage by which images can be compressed. With gzip compression enabled, the CSE will compress the response if: 1) the request contains an Accept-Encoding: gzip header, and 2) the response does'NOT contain a Content-Encoding header. With GIF compression enabled, the CSE will scale down GIF images according to a user specified level of compression or quality factor. Each image can be decoded, and a reduction algorithm can be applied. Next, the image can be re-encoded. The type of image reduction algorithm may vary form implementation to implementation. Since there is no HTTP header indicating what GIF quality is acceptable to clients, it can be assumed that all clients, on a forwarding rule with the CSE attached, accept images with the configured quality factor. The type and level of compression can be configured using a compression profile. Compression profiles are described in greater detail herein with reference to FIG. 4. Sometimes, the requested data is already in compressed form as indicated by the presence of a "Content-Encoding" header in the requested data. In such cases, the compression service engine will know that there is no need to compress the data.
At block 314, it is determined whether the desired compressed form of the requested data is stored in the cache. The compressed form of the requested data is also referred to herein as a "compressed data object." If the desired compressed data object is already in the cache, then the proxy server will simply serve the desired compressed data object to the requesting client. If the desired compressed data object is not in the cache, then at block 318 the CSE is called upon to apply the appropriate compression technique to compress the requested data at the desired level of compression. It is further assumed that the proxy server and associated CSE can interface with third party libraries to perform the actual content compression and image reduction. Such libraries may or not be free, require license fees, etc. The performance of the proxy server and associated CSE is related to the performance of such libraries. Further, the CSE can leverage third party libraries to perform the actual compression. For example, gzip compression can be performed by zlib, and the GIF compression by giflib. For Gif Compression, a modified version of GIFSICLE in a library form can be used.
A secure tunnel is maintained for the transport of the compressed data object to the requesting client. As a consequence, the compression of the requested secure content results in improved response time and in a decreased amount of bandwidth that is needed to transport the compressed secure content.
Compression is a processor intensive activity. A user configurable compression level will control the size of the compressed data object versus the performance impact. As a consequence, at block 318 of FIG. 3, the proxy server may make an intelligent choice not to compress the data if the processor is heavily loaded at the time of satisfying the request. If the requested data is suitable for caching, the proxy server will cause a copy of the requested data to be compressed at a later time when the processor is less busy. The resulting compressed data object is then stored in the cache for purposes of satisfying future requests for such secure content.
According to certain embodiments, the cache is capable of distinguishing data objects by Content Encoding. This will prevent gzipped objects from being served to clients that did not send an "Accept-Encoding: gzip" header. As for images, the quality factor will be part of the cache lookup for a GIF to prevent other forwarding rules from accessing compressed (ie: reduced quality) GIF images. However, a particular forwarding rule may be such that it allows reduced quality images to be sent as a response if it is known that the client browser, such as a PDA browser for example, has little ability to appreciate high quality images.
In some embodiments, because of the way certain image reduction algorithms work, the first client to request a compressed image may receive the original image. This will start the reduction process in the background, eventually placing the compressed image in the cache for future use.
Typically, clients accept plain encoded objects. Thus, in the case of caching multiple copies of the same data object with different encodings, a given client may be served a plain encoded object even though such a client can accept compressed content. Consider the following scenario. An older browser makes a request for 7index.html" and does not send an "Accept-Encoding: gzip" header. In such a case, the plain object is stored in the cache. A modern browser then requests the same object but does send the Accept-Encoding: gzip header. Since the modern browser implicitly accepts plain encodings, the plain copy from the cache is served to the modern browser, rather than compressing the requested object and sending the compressed object to the modern browser. In certain embodiments, the module informs the cache that the CSE is attached and the above scenario is treated as a cache miss. In the case where the CSE is not attached, but the backend server itself is performing the compression, a cache setting is added wherein the cache setting allows the administrator to specify that the backend server is performing the compression, so that plain encoding hits can be treated as missed on those forwarding rules as well.
The compression service engine can be configured to selectively compress secure content. As previously explained, some clients may not accept compressed content while other clients may accept compressed content. The compression service engine can be configured to select for compression, only the secure content that is destined for clients that will accept compressed content. Furthermore, different compression algorithms may be selected based on the characteristics of the content being served.
The proxy server and the associated compression service engine can be configured by administrators who have knowledge of: 1) the type of content served through such a proxy server, and 2) the web server environment. The compression service engine is configurable using a plurality of profiles. Each profile defines a different configuration. Profiles are described in greater detail herein with reference to FiG. 4.
The proxy server uses a set a forwarding rules to determine how incoming requests from client browsers are to be treated. Service engine filters are filters that allow a user to specify conditions that need to be satisfied for a CSE to process a request or response. According to certain embodiments, a CSE and a filter are attached to each forwarding rule.
If an administrator wishes to enable or disable the CSE based on the content type or User-Agent headers (or any other HTTP headers), the administrator can create an appropriate service engine filter. For example, if a particular user agent has a bug which causes it to send an "Accept-Encoding: gzip" header when it does not in fact support gzip, a service engine filter can be used to disable the module for this agent. The same method can be used to restrict compression to objects that have Content- Type: text/*, etc. The following steps may be followed: Create a new profile with the desired compression levels. Create a response filter to control what content will be compressed. Attach the profile and filter to the forwarding rule.
According to certain embodiments, the CSE will have a User Interface similar to other service engines. FIG. 4 is a block diagram of a CSE graphical user interface (GUI), according to certain embodiments of the invention. In FIG. 4, CSE user interface 400 comprises a profile list 402. Profile list 402 contains a list of existing profiles (compression profiles) as indicated by profile name 404. CSE GUI 400 also comprises a "create profile" section such as create profile 408. Each profile will have a properties page where the attributes of the profile can be viewed or modified. The properties page can be accessed by selecting the properties button 406.
Each profile of the CSE may include the following configurable attributes: Profile Name 410 - name by which this profile is referred to by forwarding rules. Log Level 412 - how much information should be logged. Enable gzip Compression 414 - true if this profile performs gzip compression, gzip Compression Level 416 - integer level of speed versus size. 1 fastest largest - 9 slowest/smallest.
Enable GIF Compression 418 - true if this profile performs GIF compression. GIF Compression Level 420 - user defined quality factor. The user will be able to set a specific number of colors to reduce to or a percentage to reduce colors by. Also, the user will be able to select from different compression algorithms, and will be able to select different algorithms for color and grayscale images.
In addition, there may be a check box (per-forwarding rule, for example) indicating if the backend servers use compression. There may be one new configuration file containing all the configuration information for all CSE profiles. The name and format of this file is automatically generated, and is not of general interest, "forward. conf" contains a new per-forwarding rule setting for backend server compression. "Backup" and "Restore" will work as in other service engines. When the CSE configuration changes, the proxy may need to be restarted. If image compression is performed in a separate process, such a process may also need to be restarted.
In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is the invention, and is intended by the applicants to be the invention, is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Any express definitions set forth herein for terms contained in such claims shall govern the meaning of such terms as used in the claims. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims

CLAIMSWhat is claimed is
1. A facility, in response to a request for encrypted information, for increasing an amount of said encrypted information being passed through a secure network communication channel, said facility comprising: at least one processing device operable as a proxy server; a compression service engine that is associated with said at least one processing device; and wherein said compression service engine is configurable to interpret said request and said encrypted information for: determining whether said encrypted information is to be compressed based on one or i more characteristics of said request; and if said one or more characteristics of said request indicates compatibility with compression characteristics, then determining a type of compression for applying to said encrypted information.
2. The facility as recited in Claim 1 , wherein said compression engine has cryptographic capabilities for interpreting said request and said encrypted information.
3. The facility as recited in Claim 1 , wherein said compression engine employs a cryptographic engine for interpreting said request and said encrypted information.
4. The facility as recited in Claim 1 , wherein said compression service engine is associated with a graphical user interface, said graphical user interface comprising: i a create profile feature; a compression profile list feature; and a profile properties list feature.
5. The facility as recited in Claim 4, wherein said create profile feature comprises: a profile name feature; a log level feature for specifying an amount of information to be logged; an enable gzip compression feature; a gzip compression level; and an enable GIF compression feature.
6. The facility as recited in Claim 1 , wherein said processing device is associated with a proxy cache for storing a plurality of compressed versions of said encrypted information.
7. The facility as recited in Claim 1 , wherein said compression service engine is associated with a plurality of service engine filters.
8. The facility as recited in Claim 7, wherein said plurality of service engine filters affect compression functions of said compression service engine.
9. The facility as recited in Claim 1 , wherein said compression service engine is associated with a graphical user interface for configuring said compression service engine.
10. The facility as recited in Claim 1 , wherein said one or more characteristics of said request include an Accept-Encoding: gzip header.
11. The facility as recited in Claim 1 , wherein said type of compression includes gzip compression.
12. The facility as recited in Claim 1 , wherein said type of compression includes GIF compression.
13. The facility as recited in Claim 1 , wherein said secure network communication channel is established according to a secure protocol.
14. The facility as recited in Claim 13, wherein said secure protocol is a secure HTTP protocol.
15. A method for managing transmission of encrypted information through a secure communication link, the method comprising the computer-implemented acts of: intercepting a request from a client for encrypted information from a back-end server; determining whether said encrypted information is to be compressed based on one or more characteristics of said request; and if said one or more characteristics of said request indicates compatibility with compression characteristics, then determining a type of compression to apply to said encrypted information.
16. The method as recited in Claim 15, further comprising sending a compressed version of said encrypted data if said request indicates compatibility with compression characteristics.
17. The method as recited in Claim 15, further comprising deferring compression of said encrypted information based on availability of resources; and after said compression, storing a compressed version of said encrypted information in a proxy cache for satisfying future requests.
18. The method as recited in Claim 15, wherein the act of determining whether said encrypted information is to be compressed further comprising decrypting said request if said request is encrypted.
19. The method as recited in Claim 15, wherein the act of determining whether said encrypted information is to be compressed includes determining whether said request reveals that a client associated with said request is capable of accepting compressed data.
20. The method as recited in Claim 15, wherein the act of determining whether said encrypted information is to be compressed includes determining whether said request includes an Accept-Encoding:gzip header.
21. The method as recited in Claim 15, further comprising determining whether said request can be satisfied by retrieving data from a proxy cache.
22. The method as recited in Claim 21 , if said request can be satisfied by retrieving data from said proxy cache, then performing the acts of: compressing said data from said proxy cache if said data is not compressed; after compressing said data, then encrypting said data to form a compressed version of said encrypted information for satisfying said request.
23. The method as recited in Claim 22, further comprising storing a copy of said 5 compressed version of said encrypted information in said proxy cache.
24. The method as recited in Claim 21 , further comprising requesting said encrypted information from said back-end server if said request cannot be satisfied using data from said proxy cache.
25. The method as recited in Claim 24, further comprising the act of:
0 if said encrypted information from said back-end is already compressed and said client accepts compressed data, then sending said encrypted information to said client.
26. The method as recited in Claim 24, further comprising the acts of: if said encrypted information from said back-end is not already compressed and said client accepts compressed data, decrypting said encrypted information to obtain [5 corresponding decrypted information; compressing said corresponding decrypted information to form corresponding compressed information; and encrypting said corresponding compressed information to form corresponding compressed encrypted information for satisfying said request.
»0 27. The method as recited in Claim 25, further comprising storing a copy of said encrypted information in said proxy cache.
28. The method as recited in Claim 26, further comprising storing a copy of said compressed encrypted information in said proxy cache.
29. The method as recited in Claim 15, wherein the act of determining a type of .5 compression is based on one or more characteristics of said encrypted information.
30. The method as recited in Claim 15, wherein the act of determining a type of compression is based on one or more characteristics of said client.
31. The method as recited in Claim 15, wherein the act of determining a type of compression includes determining a level of compression.
5 32. The method as recited in Claim 31 , wherein the act of determining a level of compression is based on one or more characteristics of said encrypted information.
33. The method as recited in Claim 31 , wherein the act of determining a level of compression is based on one or more characteristics of said client.
34. The method as recited in Claim 15, further comprising using a graphical user [0 interface to control compression of said encrypted information, said graphical user interface comprising: a create profile feature; a compression profile list feature; and a profile properties list feature.
5 35. The method as recited in Claim 34, wherein said create profile feature comprises: a profile name feature; a log level feature for specifying an amount of information to be logged; an enable gzip compression feature; .0 a gzip compression level; and an enable GIF compression feature.
36. A method for managing transmission of encrypted information through a secure communication link, the method comprising the computer-implemented acts of: intercepting a request from a client for encrypted information from a back-end server; .5 decrypting said encrypted information for determining a type of compression to apply to said encrypted information; compressing said encrypted information using said type of compression; and satisfying said request using said compressed encrypted information.
PCT/US2003/032598 2002-10-15 2003-10-15 Compression of secure content WO2004036362A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003279970A AU2003279970A1 (en) 2002-10-15 2003-10-15 Compression of secure content

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US41884402P 2002-10-15 2002-10-15
US60/418,844 2002-10-15

Publications (2)

Publication Number Publication Date
WO2004036362A2 true WO2004036362A2 (en) 2004-04-29
WO2004036362A3 WO2004036362A3 (en) 2004-08-26

Family

ID=32107982

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/032598 WO2004036362A2 (en) 2002-10-15 2003-10-15 Compression of secure content

Country Status (2)

Country Link
AU (1) AU2003279970A1 (en)
WO (1) WO2004036362A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2091175A1 (en) * 2008-02-18 2009-08-19 Kabushiki Kaisha Toshiba Decryption processing apparatus, system, method, and computer program product
US20140040353A1 (en) * 2009-01-13 2014-02-06 Viasat, Inc. Return-link optimization for file-sharing traffic
US9935740B2 (en) 2011-06-14 2018-04-03 Viasat, Inc. Transport protocol for anticipatory content
US10044637B2 (en) 2012-06-15 2018-08-07 Viasat, Inc. Opportunistic delivery of cacheable content in a communications network
US10187436B2 (en) 2009-01-13 2019-01-22 Viasat, Inc. Content set based deltacasting
US10270842B2 (en) 2011-10-25 2019-04-23 Viasat, Inc. Opportunistic content delivery using delta coding

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4386416A (en) * 1980-06-02 1983-05-31 Mostek Corporation Data compression, encryption, and in-line transmission system
US6021198A (en) * 1996-12-23 2000-02-01 Schlumberger Technology Corporation Apparatus, system and method for secure, recoverable, adaptably compressed file transfer
US6154542A (en) * 1997-12-17 2000-11-28 Apple Computer, Inc. Method and apparatus for simultaneously encrypting and compressing data
WO2002101605A2 (en) * 2001-06-12 2002-12-19 Research In Motion Limited System and method for compressing secure e-mail for exchange with a mobile data communication device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4386416A (en) * 1980-06-02 1983-05-31 Mostek Corporation Data compression, encryption, and in-line transmission system
US6021198A (en) * 1996-12-23 2000-02-01 Schlumberger Technology Corporation Apparatus, system and method for secure, recoverable, adaptably compressed file transfer
US6154542A (en) * 1997-12-17 2000-11-28 Apple Computer, Inc. Method and apparatus for simultaneously encrypting and compressing data
WO2002101605A2 (en) * 2001-06-12 2002-12-19 Research In Motion Limited System and method for compressing secure e-mail for exchange with a mobile data communication device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2091175A1 (en) * 2008-02-18 2009-08-19 Kabushiki Kaisha Toshiba Decryption processing apparatus, system, method, and computer program product
US11252210B2 (en) 2009-01-13 2022-02-15 Viasat, Inc. Content set based deltacasting
US20140040353A1 (en) * 2009-01-13 2014-02-06 Viasat, Inc. Return-link optimization for file-sharing traffic
US10951671B2 (en) 2009-01-13 2021-03-16 Viasat, Inc. Content set based deltacasting
US10187436B2 (en) 2009-01-13 2019-01-22 Viasat, Inc. Content set based deltacasting
US11916990B2 (en) 2009-01-13 2024-02-27 Viasat, Inc. Content set based deltacasting
US10536495B2 (en) 2009-01-13 2020-01-14 Viasat, Inc. Content set based deltacasting
US10547655B2 (en) 2009-01-13 2020-01-28 Viasat, Inc. Deltacasting
US11139919B2 (en) 2011-06-14 2021-10-05 Viasat, Inc. Transport protocol for anticipatory content
US11777654B2 (en) 2011-06-14 2023-10-03 Viasat, Inc. Transport protocol for anticipatory content
US9935740B2 (en) 2011-06-14 2018-04-03 Viasat, Inc. Transport protocol for anticipatory content
US10270842B2 (en) 2011-10-25 2019-04-23 Viasat, Inc. Opportunistic content delivery using delta coding
US11290525B2 (en) 2011-10-25 2022-03-29 Viasat, Inc. Opportunistic content delivery using delta coding
US11575738B2 (en) 2011-10-25 2023-02-07 Viasat, Inc. Opportunistic content delivery using delta coding
US10594624B2 (en) 2012-06-15 2020-03-17 Viasat, Inc. Opportunistic delivery of cacheable content in a communications network
US11743207B2 (en) 2012-06-15 2023-08-29 Viasat, Inc. Opportunistic delivery of cacheable content in a communications network
US10044637B2 (en) 2012-06-15 2018-08-07 Viasat, Inc. Opportunistic delivery of cacheable content in a communications network
US11070490B2 (en) 2012-06-15 2021-07-20 Viasat, Inc. Opportunistic delivery of cacheable content in a communications network

Also Published As

Publication number Publication date
AU2003279970A1 (en) 2004-05-04
WO2004036362A3 (en) 2004-08-26
AU2003279970A8 (en) 2004-05-04

Similar Documents

Publication Publication Date Title
US10666522B2 (en) Server side content delivery network quality of service
US6088803A (en) System for virus-checking network data during download to a client device
US8024484B2 (en) Caching signatures
US6986018B2 (en) Method and apparatus for selecting cache and proxy policy
US20070245090A1 (en) Methods and Systems for Caching Content at Multiple Levels
US11038942B2 (en) Optimizing adaptive bit rate streaming at edge locations
EP2263208B1 (en) Content delivery in a network
EP1774439B1 (en) Method and device for performing integrated caching in a data communication network
US7636363B2 (en) Adaptive QoS system and method
CN101662503B (en) Information transmission method, proxy server and service system in network
US5838927A (en) Method and apparatus for compressing a continuous, indistinct data stream
US20020178330A1 (en) Systems and methods for applying a quality metric to caching and streaming of multimedia files over a network
US6772217B1 (en) Internet backbone bandwidth enhancement by initiating an additional data stream when individual bandwidth are approximately equal to the backbone limit
US11064230B2 (en) Optimizing adaptive bit rate streaming for content delivery
US20020046262A1 (en) Data access system and method with proxy and remote processing
US20130103791A1 (en) Optimizing content delivery over a protocol that enables request multiplexing and flow control
US20040111492A1 (en) Access relaying apparatus
US20070038637A1 (en) Optimized network cache for virus scanning by examining the magic bytes of a file
US7305387B2 (en) Method and apparatus for managing data object size in a multi-user environment
US9665646B1 (en) Method and system for providing bit rate adaptaion to video files having metadata
US20020147827A1 (en) Method, system and computer program product for streaming of data
WO2004036362A2 (en) Compression of secure content
US10893303B1 (en) Streaming chunked media segments
CN116827619A (en) Method, apparatus and computer readable medium for preventing HTTP amplification attacks
Proxy Zdenek Siblık Compressing Proxy

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP