Launching a Cached Web Application Based on Authentication Status
First Claim
1. A computer-implemented method, the method comprising:
- receiving, at a computing device, a request to retrieve electronic resources that correspond to a first network address;
retrieving, from a cache that is stored locally at the computing device, resources that (i) are responsive to the received request, (ii) correspond to the first network address, and (iii) are configured to activate a first web application that is for interacting with a user, wherein activation of the first web application requires that the computing device be currently authenticated; and
executing, by the computing device, instructions that are in the retrieved resources and that are for activating the first web application, execution of the instructions including;
determining that the computing device is not currently authenticated to activate the first web application, andrequesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application for interacting with the user, wherein activation of the second web application does not require that the computing device be currently authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for receiving a request to retrieve electronic resources that correspond to a first network address. The resources are retrieved from a cache. The retrieved resources are responsive to the request, correspond to the first network address, and are configured to activate a first web application. Activation of the first web application requires that the computing device be authenticated. Instructions that are in the retrieved resources and are for activating the first web application are executed. The execution includes determining that the computing device is not authenticated to activate the first web application, and requesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application. Activation of the second web application does not require that the computing device be currently authenticated.
-
Citations
20 Claims
-
1. A computer-implemented method, the method comprising:
-
receiving, at a computing device, a request to retrieve electronic resources that correspond to a first network address; retrieving, from a cache that is stored locally at the computing device, resources that (i) are responsive to the received request, (ii) correspond to the first network address, and (iii) are configured to activate a first web application that is for interacting with a user, wherein activation of the first web application requires that the computing device be currently authenticated; and executing, by the computing device, instructions that are in the retrieved resources and that are for activating the first web application, execution of the instructions including; determining that the computing device is not currently authenticated to activate the first web application, and requesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application for interacting with the user, wherein activation of the second web application does not require that the computing device be currently authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, the method comprising:
-
receiving, at a computing device, a request to retrieve electronic resources that correspond to a first network address; retrieving, from a cache that is stored locally at the computing device, resources that (i) are responsive to the received request, (ii) correspond to the first network address, and (iii) are configured to activate a first web application that is for interacting with a user, wherein activation of the first web application requires that the computing device be currently unauthenticated; and executing, by the computing device, instructions that are in the retrieved resources and that are for activating the first web application, execution of the instructions including; determining that the computing device is currently authenticated for the first web application, and requesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application for interacting with the user, wherein activation of the second web application requires that the computing device be currently authenticated. - View Dependent Claims (16, 17, 18)
-
-
19. A computer-implemented system comprising:
-
a cache on a computing device that stores a first set of resources that correspond to a first Uniform Resource Locator (URL) and a second set of resources that correspond to a second URL, the first and second sets of resources obtained from remote computing devices over a network in response to respective requests to access resources that correspond to the first and second URLs; a web browser application program to; receive user input that initiates a request for resources that correspond to the first URL; load from the cache the first set of resources that correspond to the first URL; execute instructions obtained from within the first set of resources and that influence the operation of the web browser application program; and means for determining, by executing the instructions obtained from the first set of resources, that the computing device does not presently have a correct authentication status for activating the first set of resources, and for loading from the cache the second set of resources that correspond to both the second URL and a present authentication status. - View Dependent Claims (20)
-
Specification