Computer readable storage media for tiered connection pooling and methods and systems for utilizing same
First Claim
1. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
- receive a request from a user device to access a resource, the resource requiring authentication for access;
determine whether a previously used authenticated connection is available, wherein the previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request;
if the previously used authenticated connection is available, fulfill the request using the previously used authenticated connection;
if at least the previously used authenticated connection is not available, determine whether an unauthenticated connection is available;
if the unauthenticated connection is available, authenticate the unauthenticated connection to provide an unused authenticated connection and fulfill the request using the unused authenticated connection;
if the unauthenticated connection is not available, establish a first unauthenticated connection with the resource;
authenticate the first unauthenticated connection to provide a first authenticated connection; and
fulfill the request using the first unused authenticated connection.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool.
26 Citations
17 Claims
-
1. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
-
receive a request from a user device to access a resource, the resource requiring authentication for access; determine whether a previously used authenticated connection is available, wherein the previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request; if the previously used authenticated connection is available, fulfill the request using the previously used authenticated connection; if at least the previously used authenticated connection is not available, determine whether an unauthenticated connection is available; if the unauthenticated connection is available, authenticate the unauthenticated connection to provide an unused authenticated connection and fulfill the request using the unused authenticated connection; if the unauthenticated connection is not available, establish a first unauthenticated connection with the resource; authenticate the first unauthenticated connection to provide a first authenticated connection; and fulfill the request using the first unused authenticated connection. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of fulfilling user requests in an enterprise computing system, the method comprising:
-
generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource, wherein the one or more previously used authenticated connections are connections that have previously been used to fulfill a previous request provided by a user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; fulfilling, by the processing unit, the request based on the one or more previously used authenticated connections from the first connection pool if at least one of the one or more previously used authenticate connections is available; and if at least the one or more previously used authenticated connections are not available, by the processing unit, determine whether an unauthenticated connection is available; if the unauthenticated connection is available, authenticating the unauthenticated connection to provide an unused authenticated connection and fulfilling the request using the unused authenticated connection; if the unused unauthenticated connection is not available, generating a first unauthenticated connection with the resource; authenticating the first unauthenticated connection to provide a first unused authenticated connection; and fulfilling the request using the first unused authenticated connection. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A computer hardware system comprising:
-
a server; a plurality of resources, wherein each of the resources is accessible by one or more devices via an authenticated connection between the server and the resource; a tiered connection pool comprising; a first connection pool comprising one or more previously used authenticated connections with a first resource of the plurality of resources, wherein the one or more previously used authenticated connections have been used to fulfill a previous request provided by a first device of the one or more devices enabling data associated with the previous request to be buffered and more readily available to fulfill a subsequent request; and at least one of; a second connection pool that is distinct from the first connection pool, the second connection pool comprising one or more unused authenticated connections with the first resource;
or a third connection pool that is distinct from the first connection pool, the third connection pool comprising one or more unauthenticated connections with the first resource,wherein the server is configured to; determine whether at least one of the one or more previously used authenticated connections is available to fulfill a request from the first device to access at least one of the plurality of resources, and responsive to determining that at least one of the one or more previously used authenticated connections is available, fulfill the request using the at least one of the one or more previously used authenticated connections. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification