×

User interface proxy method and system

  • US 8,893,004 B2
  • Filed: 05/12/2010
  • Issued: 11/18/2014
  • Est. Priority Date: 05/12/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a computer processor of a dispatcher computing system, a first application user interface request from a first client computing system, said first application user interface request comprising first parameters associated with a first application user interface, wherein said first parameters comprise an application user interface type and a necessary security domain;

    maintaining, by said computer processor, a pool comprising configurable and commonly used proxy user interfaces;

    determining, by said computer processor, a specified type of proxy user interface;

    determining, by said computer processor, a specified access level of said user;

    additionally determining, by said computer processor based on said specified access level, if said specified access level of said user is associated with an internal company Intranet or an external, from said internal company Intranet, network without access to a firewall of said company;

    selecting, by said computer processor based on properties of said first client computing system, an associated application requested for proxy, and results of said additionally determining, a proxy user interface instance location and associated parameters;

    initializing, by said computer processor, a first cloud instance without any proxy user interfaces;

    transmitting, by said computer processor to said first client computing system, an IP address or a hostname of a first proxy user interface;

    enabling on demand, by said computer processor in response to said receiving said first application user interface request, said transmitting said IP address or said hostname, and said initializing, said first proxy user interface instance within said first cloud instance associated with said first parameters and said proxy user interface instance location, wherein said first proxy user interface instance is selected from said pool, wherein said first proxy user interface instance is enabled within a first cloud virtual machine instance associated with only said first proxy user interface instance, wherein said first proxy user interface is completely isolated from any additional proxy user interfaces, wherein said first cloud virtual machine instance is selected based on said specified access level, and wherein said enabling is based on said specified type of proxy user interface and said specified access level;

    isolating, by said computing system, said first proxy user interface instance by enabling a first isolated operating system session associated with only said first proxy user interface;

    transmitting, by said computer processor to said first proxy user interface instance, said first application user interface request;

    receiving, by said computer processor from said first proxy user interface instance, first results associated with said first application user interface request;

    transmitting, by said computer processor to said first client computing system, said first results associated with said first application user interface request;

    receiving, by said computer processor from said first client computing system, first messages associated with first interactions between said first client computing system and a first user;

    transmitting, by said computer processor to said first proxy user interface instance, said first messages;

    receiving, by said computer processor from said first proxy user interface instance, first feedback data associated with said first messages;

    transmitting, by said computer processor to said first client computing system, first feedback data associated with said first messages; and

    redirecting, by said computer processor, proxy user interface connections to said additional proxy user interfaces for future proxy interface requests such that said dispatcher computing system will not become overloaded if multiple operating system sessions are running concurrently.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×