Interception method and system for compensating disadvantageous characteristics of a communication protocol
First Claim
1. A data communication method that compensates for disadvantageous characteristics of a first protocol that is used to communicate data between a client application and a server application, wherein the client application and the server application employ a second protocol that is mapped onto the first protocol, said method comprising the acts of:
- intercepting, by a client interceptor acting on behalf of a server application, a second-protocol data communication request from a client application;
mapping, by the client interceptor, the second-protocol data communication request onto the first protocol;
sending the communication request to a server interceptor using the first protocol;
compensating a disadvantageous characteristic of the first protocol;
mapping, by the server interceptor, the communication request back onto the second protocol to recreate substantially the second-protocol data communication request; and
delivering the second-protocol data communication request to the server application.
2 Assignments
0 Petitions
Accused Products
Abstract
Means and method of data communication compensating disadvantageous characteristics of a first protocol for data communication between a client-application and a server-application. Communication requests of the client application and the server application adhering to a second protocol are intercepted by an client interceptor and a server interceptor. Besides mapping the second protocol onto the first protocol and back again the interceptors compensate disadvantageous characteristics inherent to the first protocol or arising from the combination of protocols transparently.
-
Citations
9 Claims
-
1. A data communication method that compensates for disadvantageous characteristics of a first protocol that is used to communicate data between a client application and a server application, wherein the client application and the server application employ a second protocol that is mapped onto the first protocol, said method comprising the acts of:
-
intercepting, by a client interceptor acting on behalf of a server application, a second-protocol data communication request from a client application;
mapping, by the client interceptor, the second-protocol data communication request onto the first protocol;
sending the communication request to a server interceptor using the first protocol;
compensating a disadvantageous characteristic of the first protocol;
mapping, by the server interceptor, the communication request back onto the second protocol to recreate substantially the second-protocol data communication request; and
delivering the second-protocol data communication request to the server application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification