Content transform proxy
First Claim
1. A method of modifying content transferred to and from the Internet during a web transaction having a client side and a server side, comprising the steps of:
- initiating a Web transaction on the client side, wherein the Web transaction includes a plurality of components; and
acting on at least one component of the Web transaction on the server side by at least one of searching, altering, and replacing the at least one component.
14 Assignments
0 Petitions
Accused Products
Abstract
The Content Transform Proxy (CTP) service is an advanced Web proxy service, the basic function of which is to modify incoming HTTP requests having a server-side destination and/or outgoing HTTP responses. The CTP service is implemented by the CTP program, which resides on a host in a data communications network between an end user (the Web client) and a content server that the client is attempting to access. The HTTP request and/or an HTTP response is modified by making an HTTP request on the client side using a client web browser, processing the HTTP request on the server side using outgoing proxy rules, passing on the processed HTTP transaction to the server-side destination, returning the results of the processed HTTP request from the server-side destination, processing the HTTP response on the server side using incoming proxy rules, and returning the processed HTTP response to the client web browser on the client side.
-
Citations
22 Claims
-
1. A method of modifying content transferred to and from the Internet during a web transaction having a client side and a server side, comprising the steps of:
-
initiating a Web transaction on the client side, wherein the Web transaction includes a plurality of components; and acting on at least one component of the Web transaction on the server side by at least one of searching, altering, and replacing the at least one component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of modifying at least one of an HTTP request and an HTTP response during a web transaction having a client side and a server side, comprising the steps of:
-
making an HTTP request on the client side using a client Web browser, the HTTP request having a server-side destination; processing the HTTP request on the server side using outgoing proxy rules to determine whether to modify the HTTP request; passing on the processed HTTP transaction to the server-side destination; returning the results of the processed HTTP request from the server-side destination; processing the HTTP response on the server side using incoming proxy rules to determine whether to modify the HTTP response; and returning the processed HTTP response to the client web browser on the client side. - View Dependent Claims (11)
-
-
12. A system for modifying Web transactions having a client side and a server side, comprising:
-
a host on the server side; and Web proxy transform means residing on the host for modifying a Web transaction at least one of before and after the Web transaction passes through the host. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of authentication processing during a Single Sign On transaction when any aspect of at least one of a transaction processing request, content processing, and output processing is accessed via a Web connection, and an authentication is required as part of that application, the method comprising the steps of:
-
using a Web client to request content from a Web application, wherein the Web application is proxied through a content transform proxy service; using the Web application to match a set of definitions in the content transform proxy program; creating a content transform proxy process for the content request; determining whether the content request matches a specific Web application single sign on; if the content request matches the specific Web application single sign on, continuing the authentication processing; using the content transform proxy process to request an AuthToken for the Web application from a login proxy service; using the login proxy service to obtain an AuthToken; reading in pre-determined Resolver definitions; after reading in the resolver definitions, using the resolver to determine specific authentication definitions that are required for the Web application; using the resolver to check the database to determine whether the authentication credentials are stored for the user/application; if the authentication credentials are stored for the user/application, using the resolver to re-submit the credentials from the database; if the authentication credentials are not stored for the user/application, using the resolver to query the user for input for the credentials; upon successful authentication, using the resolver to store the active AuthToken in the database; and using the database to return the active AuthToken to the login proxy service used in the request to the proxied Web application. - View Dependent Claims (22)
-
Specification