Processing data using information embedded in a data request
First Claim
Patent Images
1. A method comprising:
- receiving, at a first server device, a request for data from a second server device, the request being generated at a client application;
extracting, by the first server device, user profile information from the request;
customizing, by the first server device, data based on the extracted user profile information;
generating, by the first server device, a response to the request, the response including the customized data;
sending, by the first server device, the response to the client application;
receiving, by the first server device, a flush directive; and
in response to receiving the flush directive, discarding, by the first server device, stored user profile information.
5 Assignments
0 Petitions
Accused Products
Abstract
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
160 Citations
23 Claims
-
1. A method comprising:
-
receiving, at a first server device, a request for data from a second server device, the request being generated at a client application; extracting, by the first server device, user profile information from the request; customizing, by the first server device, data based on the extracted user profile information; generating, by the first server device, a response to the request, the response including the customized data; sending, by the first server device, the response to the client application; receiving, by the first server device, a flush directive; and in response to receiving the flush directive, discarding, by the first server device, stored user profile information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving, at a first server device, a request generated at a client application and forwarded from a second server device; extracting, by the first server device, encrypted user profile information from the request; decrypting, by the first server device, the encrypted user profile information; generating, by the first server device, a response to the request using the user profile information; sending the response to the request to the second server device; receiving, by the first server device, a flush directive; and in response to receiving the flush directive, discarding, by the first server device, stored user profile information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
at least one processor; at least one non-transitory computer readable storage medium storing a decryption key and instructions thereon that, when executed by the at least on processor, cause a first server device to; receive a request for data from a second server device, the request being generated at a client application; extract user profile information from the request; customize data based on the extracted user profile information; generate a response to the request, the response including the customized data; send the response to the client application; receive a flush directive; and in response to receiving the flush directive, discard stored user profile information. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification