白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Supporting local host traffic in remote device infrastructure

專利號
US11888821B1
公開日期
2024-01-30
申請人
BrowserStack Limited(IE Dublin)
發(fā)明人
Bipul Jain; Vishal Shah; Ryan Rehman
IPC分類
H04L29/08; G06F9/54; H04L9/40; G06F16/955
技術領域
url,localhost,browser,request,ulb,rdb,exclusion,requests,server,remote
地域: Dublin

摘要

A remote software development infrastructure can include multiple cross-continent datacenters with a variety of remote devices to choose from in the datacenters. A user can select a remote device and access the remote device via a local machine. The infrastructure can stream a video feed of the display of the remote device to the local machine. The user can run a browser on the remote device to test a website, including for example, testing accessing the website and its features via the browser running on the remote device. URL requests to the user's website are received from the local machine and injected into the browser running on the remote device. The browser running on the remote device issues the URL requests. Restricted URL requests can be modified via a browser extension and replaced with a non-restricted URL pointing to the same communication endpoint as the restricted URL.

說明書

Referencing FIG. 1, the infrastructure 100 includes components to route traffic requests related to the user accessing various URLs from the RDB 109. For example, in some implementations of the infrastructure 100, a proxy server 115 can be installed on the host 118 to receive traffic requests, or URL access requests from the RDB 109. The remote device 112 can be set up with proxy settings 130, which directs the RDB 109 to proxy its traffic to the IP address and port of the host 118. The proxy server 115 receives and forwards the requests to a repeater 110. In some implementations, the repeater 110 is also a type of proxy server. Proxy servers act as intermediaries between request and response, and can provide a variety of functionality, including providing privacy, security, filtering, firewall, speed efficiency, caching, and other functionality. Proxy servers differ in how much exposure they have into the substance of the data they are routing. For example, some proxies implementing SSL inspection have a complete view into the content of the traffic they route, including passwords, and other sensitive data. Other proxy servers, for example, some using the TCP/IP model, may have no access to the payload in the data packets being transmitted, other than some routing information. In a preferred embodiment, both the proxy server 115 and the repeater 110 do not have access to payload or substantive data being transmitted, and only operate on the addresses contained in the data they transmit.

權利要求

1
微信群二維碼
意見反饋