Filtering web proxy for recording web-based transactions that supports secure HTTP steps
First Claim
1. A software product for a computer system to record a transaction for a user operating a web browser wherein the transaction is used for automated testing of an Internet server system, the software product comprising:
- proxy instructions configured to direct a processor to receive a first request from the web browser, transfer the first request to the Internet, receive a response to the first request from the Internet, transfer the response to the web browser, receive a second request from the web browser, and transfer the second request to the Internet;
response instructions configured to direct the processor to search the response for a secure address and if the response includes the secure address then replace the secure address with a non-secure address and identifying characters;
request instructions configured to direct the processor to record the second request as a new page if the second request is for a new page and to replace the non-secure address and the identifying characters with the secure address if the second request is for the non-secure address and the identifying characters; and
a storage medium configured to store the proxy instructions, the response instructions, and the request instructions.
5 Assignments
0 Petitions
Accused Products
Abstract
A software product tests and monitors an Internet server system. Advantageously, the software product communicates with a web browser without the need for other client software to configure transactions. The user of the web browser is guided through web pages to record, edit, and playback transactions. Recording may occur over a secure connection. The software product performs automated tests using the transactions in addition to measuring both system performance data and business performance data. The software product generates alarms when thresholds are exceeded. The test data, performance data, and alarms are correlated in time and presented graphically to the user.
-
Citations
20 Claims
-
1. A software product for a computer system to record a transaction for a user operating a web browser wherein the transaction is used for automated testing of an Internet server system, the software product comprising:
-
proxy instructions configured to direct a processor to receive a first request from the web browser, transfer the first request to the Internet, receive a response to the first request from the Internet, transfer the response to the web browser, receive a second request from the web browser, and transfer the second request to the Internet;
response instructions configured to direct the processor to search the response for a secure address and if the response includes the secure address then replace the secure address with a non-secure address and identifying characters;
request instructions configured to direct the processor to record the second request as a new page if the second request is for a new page and to replace the non-secure address and the identifying characters with the secure address if the second request is for the non-secure address and the identifying characters; and
a storage medium configured to store the proxy instructions, the response instructions, and the request instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operating a computer system to record a transaction for a user operating a web browser wherein the transaction is used for automated testing of an Internet server system, the method comprising:
-
receiving a first request from the web browser and transferring the first request to the Internet;
receiving a response to the first request from the Internet and searching the response for a secure address;
if the response includes the secure address, then replacing the secure address with a non-secure address and identifying characters;
transferring the response to the web browser and receiving a second request from the web browser;
if the second request is for a new page, then recording the second request as a new page;
if the second request is for the non-secure address and the identifying characters, then replacing the non-secure address and the identifying characters with the secure address; and
transferring the second request to the Internet. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification