Computer readable storage media for tiered connection pooling and methods and systems for utilizing same
First Claim
1. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
- receive a request from a user device to access a resource, the resource requiring authentication for access;
determine whether a previously used authenticated connection is available, wherein a previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request;
if the previously used authenticated connection is available, fulfill the request using the previously used authenticated connection;
if the previously used authenticated connection is not available, determine whether a first unused authenticated connection is available;
if the first unused authenticated connection is available, fulfill the request using the first unused authenticated connection;
if the first unused authenticated connection is not available, determine whether a first unauthenticated connection is available;
if the first unauthenticated connection is not available, establish a second unauthenticated connection with the resource;
authenticate the second unauthenticated connection to provide a second unused authenticated connection; and
fulfill the request using the second unused authenticated connection.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for tiered connection pooling are disclosed herein. An example system may include a memory encoded with computer executable instructions that when executed cause a processing unit to receive a request to access a resource; determine whether a used authenticated connection is available; if the used authenticated connection is available, fulfill the request using the used authenticated connection; if the used authenticated connection is not available, determine whether a first unused authenticated connection is available; if the first unused authenticated connection is available, fulfill the request use the first unused authenticated connection; if the first unused authenticated connection is not available, determine whether a first unauthenticated connection is available; if the first unauthenticated connection is not available, establish a second unauthenticated connection with the resource; authenticate the second unauthenticated connection to provide a second unused authenticated connection; and fulfill the request using the second unused authenticated connection.
-
Citations
18 Claims
-
1. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
- receive a request from a user device to access a resource, the resource requiring authentication for access;
determine whether a previously used authenticated connection is available, wherein a previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request;
if the previously used authenticated connection is available, fulfill the request using the previously used authenticated connection;
if the previously used authenticated connection is not available, determine whether a first unused authenticated connection is available;
if the first unused authenticated connection is available, fulfill the request using the first unused authenticated connection;
if the first unused authenticated connection is not available, determine whether a first unauthenticated connection is available;
if the first unauthenticated connection is not available, establish a second unauthenticated connection with the resource;
authenticate the second unauthenticated connection to provide a second unused authenticated connection; and
fulfill the request using the second unused authenticated connection. - View Dependent Claims (2, 3, 4, 5)
- receive a request from a user device to access a resource, the resource requiring authentication for access;
-
6. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
- receive a request from a user device to access a resource, the resource requiring authentication for access;
determine whether an authenticated connection of a first type is available, wherein the authenticated connection of the first type is a previously used authenticated connection, and wherein a previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to be buffered and more readily available to fulfill a subsequent request;if the authenticated connection of the first type is available, fulfill the request using the authenticated connection of the first type;
if the authenticated connection of the first type is not available, determine whether a first authenticated connection of a second type is available;
if the first authenticated connection of the second type is available, fulfill the request using the authenticated connection of the second type;
if the first authenticated connection of the second type is not available, authenticate an unauthenticated connection to provide a second authenticated connection of the second type; and
fulfill the request using the second authenticated connection of the second type. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
- receive a request from a user device to access a resource, the resource requiring authentication for access;
-
14. A computer hardware system comprising at least one processing unit coupled to a memory, wherein the memory is encoded with computer executable instructions that when executed cause the at least one processing unit to:
- identify a user associated with a user device using a connection engine;
determine that a previously used authenticated connection is unavailable, wherein a previously used connection is a connection that has previously been used to fulfill a request provided by the user device enabling data associated with the previously fulfilled request to still be buffered and more readily available to fulfill the received request;
remove a connection of a first type from a connection pool, the connection of the first type established between the connection engine and a resource, wherein the connection of a first type is an unauthenticated connection;
authenticate the connection of the first type to provide a connection of a second type; and
assign the connection of the second type to the user. - View Dependent Claims (15, 16, 17, 18)
- identify a user associated with a user device using a connection engine;
Specification