PORTABLE EMBEDDED LOCAL SERVER FOR WRITE-THROUGH CACHE
First Claim
Patent Images
1. A computer-implemented method, comprising:
- intercepting, at an intermediary, from an application running on a first computing device, a first request;
wherein the first request is a request directed to a server, and includes;
a first resource identifier; and
one or more first protocol methods, wherein the one or more first protocol methods represent actions that may be performed on a resource in conformance to a particular protocol;
matching the first resource identifier and the one or more first protocol methods with an interception key in an interception key registry, wherein the interception key comprises a second resource identifier and one or more references to second protocol methods;
based at least in part on the interception key, relaying the first request to an embedded server;
receiving, from the embedded server, a response to the first request;
wherein the method is performed by one or more computing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of facilitating, via an embedded local server, dynamic responses to requests originating from an application and directed to a server is disclosed. An intermediary intercepts requests responds to the requests with locally stored data. The intermediary may also forward requests to an embedded local server for processing based on local data.
126 Citations
19 Claims
-
1. A computer-implemented method, comprising:
-
intercepting, at an intermediary, from an application running on a first computing device, a first request; wherein the first request is a request directed to a server, and includes; a first resource identifier; and one or more first protocol methods, wherein the one or more first protocol methods represent actions that may be performed on a resource in conformance to a particular protocol; matching the first resource identifier and the one or more first protocol methods with an interception key in an interception key registry, wherein the interception key comprises a second resource identifier and one or more references to second protocol methods; based at least in part on the interception key, relaying the first request to an embedded server; receiving, from the embedded server, a response to the first request; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
intercepting, at an intermediary, from an application running on a first computing device, a first request; wherein the first request is a request directed to a server, and includes; a first resource identifier; and one or more first protocol methods, wherein the one or more first protocol methods represent actions that may be performed on a resource in conformance to a particular protocol; matching the first resource identifier and the one or more first protocol methods with an interception key in an interception key registry, wherein the interception key comprises a second resource identifier and one or more references to second protocol methods; relaying the first request to the server; receiving, from the server, a first response to the first request; based at least in part on the interception key, relaying the first response to an embedded server; the embedded server, based on a determination made from analyzing the first response, instructing the intermediary to store first data associated with the first response; wherein the method is performed by one or more computing devices. - View Dependent Claims (16, 17, 18, 19)
-
Specification