Portable embedded local server for write-through cache
First Claim
Patent Images
1. A computer-implemented process, comprising:
- intercepting, at an intermediary on a first computing device, from an application running on the first computing device, a first request;
wherein the first request is a request directed to a server, and identifies;
a particular resource identifier, wherein a resource identifier identifies a resource that is remote to the first computing device; and
one or more particular methods, wherein the one or more particular methods represent actions that may be performed on a resource;
determining that the first request and an interception key of a plurality of interception keys match based on the particular resource identifier and the one or more particular methods;
wherein each interception key of the plurality of interception keys is associated with a respective embedded server on the first computing device;
in response to determining that the first request and the interception key match, relaying the first request to an embedded server associated with the interception key;
wherein the process is performed by one or more computing devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of facilitating, via an embedded local server, dynamic responses to requests originating from an application and directed to a server is disclosed. An intermediary intercepts requests responds to the requests with locally stored data. The intermediary may also forward requests to an embedded local server for processing based on local data.
-
Citations
38 Claims
-
1. A computer-implemented process, comprising:
-
intercepting, at an intermediary on a first computing device, from an application running on the first computing device, a first request; wherein the first request is a request directed to a server, and identifies; a particular resource identifier, wherein a resource identifier identifies a resource that is remote to the first computing device; and one or more particular methods, wherein the one or more particular methods represent actions that may be performed on a resource; determining that the first request and an interception key of a plurality of interception keys match based on the particular resource identifier and the one or more particular methods; wherein each interception key of the plurality of interception keys is associated with a respective embedded server on the first computing device; in response to determining that the first request and the interception key match, relaying the first request to an embedded server associated with the interception key; wherein the process is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
intercepting, at an intermediary on a first computing device, from an application running on the first computing device, a first request; wherein the first request is a request directed to a server, and identifies; a particular resource identifier, wherein a resource identifier identifies a resource that is remote to the first computing device; and one or more particular methods, wherein the one or more particular methods represent actions that may be performed on a resource; determining that the first request and an interception key of a plurality of interception keys match based on the particular resource identifier and the one or more particular methods; wherein each interception key of the plurality of interception keys is associated with a respective embedded server on the first computing device, and is associated with; a respective resource identifier; and one or more references to respective methods, wherein the respective methods represent actions that may be performed on a resource; relaying the first request to the server; receiving, from the server, a first response to the first request; relaying the first response to an embedded server associated with the interception key; the embedded server, based on a determination made from analyzing the first response, causing first data associated with the first response to be stored; wherein the process is performed by one or more computing devices. - View Dependent Claims (16, 17, 18, 19)
-
-
20. One or more non-transitory computer-readable media storing instructions, which, when executed by one or more processors, cause one or more computing devices to perform operations comprising:
-
intercepting, at an intermediary on a first computing device, from an application running on the first computing device, a first request; wherein the first request is a request directed to a server, and identifies; a particular resource identifier, wherein a resource identifier identifies a resource that is remote to the first computing device; and one or more particular methods, wherein the one or more particular methods represent actions that may be performed on a resource; determining that the first request and an interception key of a plurality of interception keys match based on the particular resource identifier and the one or more particular methods; wherein each interception key of the plurality of interception keys is associated with a respective embedded server on the first computing device; in response to determining that the first request and the interception key match, relaying the first request to an embedded server associated with the interception key. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. One or more non-transitory computer-readable media storing instructions, which, when executed by one or more processors, cause one or more computing devices to perform operations comprising:
-
intercepting, at an intermediary on a first computing device, from an application running on the first computing device, a first request; wherein the first request is a request directed to a server, and identifies; a particular resource identifier, wherein a resource identifier identifies a resource that is remote to the first computing device; and one or more particular methods, wherein the one or more particular methods represent actions that may be performed on a resource; determining that the first request and an interception key of a plurality of interception keys match based on the particular resource identifier and the one or more particular methods; wherein each interception key of the plurality of interception keys is associated with a respective embedded server on the first computing device, and is associated with; a respective resource identifier; and one or more references to respective methods, wherein the respective methods represent actions that may be performed on a resource; relaying the first request to the server; receiving, from the server, a first response to the first request; relaying the first response to an embedded server associated with the interception key; the embedded server, based on a determination made from analyzing the first response, causing first data associated with the first response to be stored. - View Dependent Claims (35, 36, 37, 38)
-
Specification