Launching a cached web application based on authentication status
First Claim
1. A computer-implemented method, the method comprising:
- receiving, by a web browser at a computing device, a first request to retrieve first resources that correspond to a first network address;
submitting, by the computing device and over a network, the first request to retrieve the first resources;
receiving, at the computing device and from a different computing device communicating over the network in response to the computing device having submitted the first request, the first resources, wherein the first resources are configured to activate a user interface of a first web application and activation of the user interface of the first web application requires that the computing device be currently authenticated;
executing, by the web browser at the computing device in response to having received the first resources over the network, instructions that are in the first resources and that are for activating the user interface of the first web application, wherein execution of the instructions includes determining whether the computing device is currently authenticated to activate the user interface of the first web application;
using, by the web browser at the computing device, the first resources to activate the user interface of the first web application, in response to having determined that the computing device is currently authenticated to activate the user interface of the first web application;
storing, in response to having received the first resources over the network, the first resources in a cache that is stored locally at the computing device;
receiving, by the web browser at the computing device and after the resources have been stored in the cache, a second request to retrieve the first resources;
submitting, by the web browser at the computing device, the second request to retrieve the first resources;
retrieving, by the web browser and from the cache in response to having submitted the second request, the first resources; and
executing, by the web browser at the computing device in response to having retrieved the first resources from the cache, the instructions that are in the first resources and that are for activating the user interface of the first web application, wherein execution of the instructions includes;
determining whether the computing device is currently authenticated to activate the user interface of the first web application, andas a result of having determined that the computing device is not currently authenticated to activate the user interface of the first web application, requesting to retrieve second resources that correspond to a second network address and that are configured to activate a user interface of a second web application, wherein activation of the user interface of the second web application does not require that the computing device be currently authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for receiving a request to retrieve electronic resources that correspond to a first network address. The resources are retrieved from a cache. The retrieved resources are responsive to the received request, correspond to the first network address, and are configured to activate a first web application. Activation of the first web application requires that the computing device be authenticated. Instructions that are in the retrieved resources and are for activating the first web application are executed. The execution includes determining that the computing device is not authenticated to activate the first web application, and requesting to retrieve electronic resources that correspond to a second network address and that are configured to activate a second web application. Activation of the second web application does not require that the computing device be currently authenticated.
16 Citations
17 Claims
-
1. A computer-implemented method, the method comprising:
-
receiving, by a web browser at a computing device, a first request to retrieve first resources that correspond to a first network address; submitting, by the computing device and over a network, the first request to retrieve the first resources; receiving, at the computing device and from a different computing device communicating over the network in response to the computing device having submitted the first request, the first resources, wherein the first resources are configured to activate a user interface of a first web application and activation of the user interface of the first web application requires that the computing device be currently authenticated; executing, by the web browser at the computing device in response to having received the first resources over the network, instructions that are in the first resources and that are for activating the user interface of the first web application, wherein execution of the instructions includes determining whether the computing device is currently authenticated to activate the user interface of the first web application; using, by the web browser at the computing device, the first resources to activate the user interface of the first web application, in response to having determined that the computing device is currently authenticated to activate the user interface of the first web application; storing, in response to having received the first resources over the network, the first resources in a cache that is stored locally at the computing device; receiving, by the web browser at the computing device and after the resources have been stored in the cache, a second request to retrieve the first resources; submitting, by the web browser at the computing device, the second request to retrieve the first resources; retrieving, by the web browser and from the cache in response to having submitted the second request, the first resources; and executing, by the web browser at the computing device in response to having retrieved the first resources from the cache, the instructions that are in the first resources and that are for activating the user interface of the first web application, wherein execution of the instructions includes; determining whether the computing device is currently authenticated to activate the user interface of the first web application, and as a result of having determined that the computing device is not currently authenticated to activate the user interface of the first web application, requesting to retrieve second resources that correspond to a second network address and that are configured to activate a user interface of a second web application, wherein activation of the user interface of the second web application does not require that the computing device be currently authenticated.
-
-
2. The computer-implemented method of claim 1, wherein the first network address comprises a first uniform resource locator (URL) for accessing the first resources over the network, and the second network address comprises a second URL for accessing the second resources over the network.
-
3. The computer-implemented method of claim 2, further comprising receiving, at the computing device, user input that initiates the first request to retrieve the first resources, the user input either being user typing of the first URL or user selection of a link that is addressed to the first URL.
-
4. The computer-implemented method of claim 1, wherein the instructions that are in the first resources are described in a scripting language that can control execution of the web browser.
-
5. The computer-implemented method of claim 1, wherein requesting to retrieve the second resources includes issuing, by the computing device, a redirection request that is directed to the second network address.
-
6. The computer-implemented method of claim 5, further comprising:
-
receiving, by the computing device, the issued redirection request, and in response, retrieving, by the computing device and from the cache, the second resources.
-
-
7. The computer-implemented method of claim 1, wherein during the submission of the second request, the computing device is not operationally connected to the network, so that the computing device is unable to communicate with remote computing devices over the network.
-
8. The computer-implemented method of claim 1, wherein during the submission of the second request, the computing device is not operationally connected to the network, so that the computing device is unable to receive, from over the network, the first resources and the second resources.
-
9. The computer-implemented method of claim 1, further comprising determining that the computing device is not currently authenticated to activate the user interface of the first web application by determining that the computing device does not have a locally-stored cookie that indicates that the computing device is currently authenticated to activate the user interface of the first web application.
-
10. The computer-implemented method of claim 1, wherein requesting to retrieve the second resources includes identifying the second network address within the instructions that are in the first resources.
-
11. The computer-implemented method of claim 1, wherein the second web application is an unauthenticated version of the first web application and is hosted by a same domain that hosts the first web application.
-
12. The computer-implemented method of claim 1, wherein the requesting to retrieve the second resources is performed in lieu of activating the user interface of the first web application for interacting with the user.
-
13. The computer-implemented method of claim 1, wherein the cache is a web browser application cache.
-
14. A computer-implemented method, the method comprising:
-
receiving, by a web browser at a computing device, a first request to retrieve first resources that correspond to a first network address; submitting, by the computing device and over a network, the first request to retrieve the first resources; receiving, at the computing device and from a different computing device communicating over the network in response to the computing device having submitted the first request, the first resources, wherein the first resources are configured to activate a user interface of a first web application and activation of the user interface of the first web application requires that the computing device be currently unauthenticated; executing, by the web browser at the computing device in response to having received the first resources over the network, instructions that are in the first resources and that are for activating the user interface of the first web application, wherein execution of the instructions includes determining whether the computing device is currently unauthenticated; using, by the web browser at the computing device, the first resources to activate the user interface of the first web application, in response to having determined that the computing device is currently unauthenticated; storing, in response to having received the first resources over the network, the first resources in a cache that is stored locally at the computing device; receiving, by the web browser at the computing device and after the resources have been stored in the cache, a second request to retrieve the first resources; submitting, by the web browser at the computing device, the second request to retrieve the first resources; retrieving, by the web browser and from the cache in response to having submitted the second request, the first resources; and executing, by the web browser at the computing device in response to having retrieved the first resources from the cache, the instructions that are in the first resources and that are for activating the user interface of the first web application, wherein execution of the instructions includes; determining whether the computing device is currently unauthenticated, and as a result of having determined that the computing device is currently authenticated, requesting to retrieve second resources that correspond to a second network address and that are configured to activate a user interface of a second web application, wherein activation of the user interface of the second web application requires that the computing device be currently authenticated.
-
-
15. The computer-implemented method of claim 14, further comprising determining that the computing device is currently authenticated by determining that the computing device does have a locally-stored cookie that indicates that the computing device is currently authenticated to activate the user interface of the second web application.
-
16. The computer-implemented method of claim 14, further comprising:
-
retrieving, by the computing device and from the cache, the second resources; and executing, by the computing device, second instructions that are in the second resources, wherein execution of the second instructions includes; determining whether the computing device is currently authenticated to activate the user interface of the first web application; and as a result of having determined that the computing device is currently authenticated to activate the user interface of the second web application, generating the user interface of the second web application.
-
-
17. The computer-implemented method of claim 16, further comprising receiving user input from user interaction with the user interface of the second web application.
Specification