Network site customization using proxies
First Claim
1. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising a plurality of instructions that cause the computing device to at least:
- determine whether a client is authorized to configure a domain name associated with a network site and a proxy server application associated with the network site, wherein the network site is one of a plurality of network sites maintained by the program and individual ones of the plurality of network sites may be exclusively configured by separate ones of a plurality of clients;
configure the domain name associated with the network site to point to the proxy server application in response to a first determination that the client is authorized to configure the domain name;
obtain a first identification of a first portion of the network site from the client, the first identification including a first uniform resource locator (URL);
configure the proxy server application associated with the network site to obtain the first portion of the network site from a first electronic commerce application hosted within a first network in response to a second determination that the client is authorized to configure the proxy server application associated with the network site;
obtain a second identification of a second portion of the network site from the client, the second identification including a second URL;
configure the proxy server application associated with the network site to obtain the second portion of the network site from a second electronic commerce application hosted within a second network in response to the second determination that the client is authorized to configure the proxy server application associated with the network site; and
reconfigure the proxy server application associated with the network site to obtain the first portion of the network site from the second electronic commerce application, wherein the first URL is mapped to a third URL corresponding to the second electronic commerce application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for network site customization using proxy server applications. A first request is obtained from an administrator of a network site to configure a proxy server application to obtain one or more network pages associated with a first portion of the network site from a first application executed in one or more computing devices. The proxy server application is configured in accordance with the first request. A second request is obtained from the administrator to reconfigure the proxy server application to obtain the one or more network pages from a second application executed in one or more computing devices. The network site includes one of several network sites hosted at least in part through the second application. The proxy server application is reconfigured in accordance with the second request.
-
Citations
25 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising a plurality of instructions that cause the computing device to at least:
-
determine whether a client is authorized to configure a domain name associated with a network site and a proxy server application associated with the network site, wherein the network site is one of a plurality of network sites maintained by the program and individual ones of the plurality of network sites may be exclusively configured by separate ones of a plurality of clients; configure the domain name associated with the network site to point to the proxy server application in response to a first determination that the client is authorized to configure the domain name; obtain a first identification of a first portion of the network site from the client, the first identification including a first uniform resource locator (URL); configure the proxy server application associated with the network site to obtain the first portion of the network site from a first electronic commerce application hosted within a first network in response to a second determination that the client is authorized to configure the proxy server application associated with the network site; obtain a second identification of a second portion of the network site from the client, the second identification including a second URL; configure the proxy server application associated with the network site to obtain the second portion of the network site from a second electronic commerce application hosted within a second network in response to the second determination that the client is authorized to configure the proxy server application associated with the network site; and reconfigure the proxy server application associated with the network site to obtain the first portion of the network site from the second electronic commerce application, wherein the first URL is mapped to a third URL corresponding to the second electronic commerce application. - View Dependent Claims (2)
-
-
3. A system, comprising:
-
at least one computing device; and a network site configuration application executable in the at least one computing device, the network site configuration application comprising a plurality of machine-readable instructions that cause the at least one computing device to at least; authenticate one a plurality of user accounts, wherein individual ones of the plurality of user accounts are exclusively authorized to configure respective ones of a plurality of network sites after the individual ones of the user accounts have been authenticated; obtain a first identification of a first network page associated with at least one of the plurality of network sites, wherein the at least one of the plurality of network sites is associated with the authenticated one of the plurality of user accounts; configure a proxy server application to obtain the first network page from a network page server application executed in the at least one computing device within an untrusted network that is separated from a trusted network by a firewall; obtain a second identification of a second network page associated with the at least one of the plurality of network sites; and configure the proxy server application to obtain the second network page from an application executed in at least one other computing device within the trusted network. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
authenticating, in at least one computing device, an administrator account of a network site, wherein the administrator account is one of a plurality of administrator accounts and the network site is one of a plurality of network sites and individual ones of the plurality of administrator accounts are exclusively authorized to configure individual ones of the plurality of network sites; obtaining, in the at least one computing device, a first request from the administrator account of the network site to configure a proxy server application to obtain at least one network page associated with a first portion of the network site from a first application executed in at least one computing device; configuring, in the at least one computing device, the proxy server application in accordance with the first request in response to authenticating the administrator account, wherein the proxy server application is configured via a control panel provided by the at least one computing device to the plurality of administrator accounts, wherein the control panel permits the individual ones of the plurality of administrator accounts to configure the proxy server application with respect to the individual ones of the plurality of network sites; obtaining, in the at least one computing device, a second request from the administrator account to reconfigure the proxy server application to obtain the at least one network page associated with the first portion of the network site from a second application executed in at least one computing device, wherein the network site comprises one of a plurality of network sites hosted at least in part through the second application; and reconfiguring, in the at least one computing device, the proxy server application in accordance with the second request in response to authenticating the administrator account. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification