COMPUTER READABLE STORAGE MEDIA FOR TIERED CONNECTION POOLING AND METHODS AND SYSTEMS FOR UTILIZING SAME
First Claim
1. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
- receive a request from a user device to access a resource, the resource requiring authentication for access;
assign a plurality of unused authenticated connections to the user device, the plurality of unused authenticated connections including a first unused authenticated connection;
determine whether a previously used authenticated connection is available, wherein a previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request;
if the previously used authenticated connection is available, fulfill the request using the previously used authenticated connection;
if the previously used authenticated connection is not available, determine whether the first unused authenticated connection is available;
if the first unused authenticated connection is available, fulfill the request using the first unused authenticated connection;
if the first unused authenticated connection is not available, determine whether another of the authenticated connections of the plurality of unused authenticated connections is available;
if the another of the authenticated connections is not available, establish a first unauthenticated connection with the resource;
authenticate the first unauthenticated connection to provide an unused authenticated connection; and
fulfill the request using the unused authenticated connection.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for tiered connection pooling are disclosed herein, which may be used in a method of fulfilling user requests in an enterprise computing system. The method involving generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool.
-
Citations
20 Claims
-
1. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
-
receive a request from a user device to access a resource, the resource requiring authentication for access; assign a plurality of unused authenticated connections to the user device, the plurality of unused authenticated connections including a first unused authenticated connection; determine whether a previously used authenticated connection is available, wherein a previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request; if the previously used authenticated connection is available, fulfill the request using the previously used authenticated connection; if the previously used authenticated connection is not available, determine whether the first unused authenticated connection is available; if the first unused authenticated connection is available, fulfill the request using the first unused authenticated connection; if the first unused authenticated connection is not available, determine whether another of the authenticated connections of the plurality of unused authenticated connections is available; if the another of the authenticated connections is not available, establish a first unauthenticated connection with the resource; authenticate the first unauthenticated connection to provide an unused authenticated connection; and fulfill the request using the unused authenticated connection. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of fulfilling user requests in an enterprise computing system, the method comprising:
-
generating, by a processing unit, a first connection pool comprising one or more previously used authenticated connections with a resource, wherein the one or more previously used authenticated connections are connections that have previously been used to fulfill a previous request provided by a user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request; generating, by the processing unit, a second connection pool comprising one or more unused authenticated connections with the resource; and generating, by the processing unit, a third connection pool comprising one or more unauthenticated connections with the resource; receiving, by the processing unit, a request from the user device to access the resource, the resource requiring authentication for access; and fulfilling, by the processing unit, the request based on a connection from the first, second, or third connection pool. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer hardware system comprising:
-
a server; a plurality of resources, wherein each of the resources is accessible by one or more devices via an authenticated connection between the server and the resource; and a tiered connection pool comprising; a first connection pool comprising one or more previously used authenticated connections with a first resource of the plurality of resources, wherein the one or more previously used authenticated connections have been used to fulfill a previous request provided by a first device of the one or more devices enabling data associated with the previous request to be buffered and more readily available to fulfill a subsequent request; a second connection pool comprising one or more unused authenticated connections with the first resource; and a third connection pool comprising one or more unauthenticated connections with the first resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification