Methods for adaptive organization of web application access points in webtops and devices thereof
First Claim
1. A method implemented by an enterprise network system comprising one or more access management apparatuses, client devices, or web application server devices, the method comprising:
- monitoring network traffic exchanged with web applications to generate and store historical application access pattern data;
identifying one or more of the web applications that are allowed for a client based on a stored access policy and in response to a login request received from the client;
analyzing the stored historical application access pattern data to determine, for at least a subset of the allowed web applications and prior to any of the allowed web applications being accessed by the client in a current session, an indication of whether each of the subset of the allowed web applications will be accessed by the client in the current session;
generating a webtop configured to, when rendered in a web browser, graphically organize access points for at least the subset of the allowed web applications based on the determined indication; and
providing the webtop to the client in response to the login request to facilitate access to the subset of the allowed web applications.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, non-transitory computer readable media, access policy management apparatuses, and enterprise network systems that facilitate adaptive organization of web application access points in webtops are disclosed. With this technology, access points for web applications are more effectively presented in webtops to facilitate more efficient access to web applications by clients. In particular, this technology utilizes historical application access pattern data to determine a subset of allowed web applications most likely to be accessed in a current session, and generates and provides a webtop with access points for web applications organized based on the determined subset of the allowed web applications. Thereby, this technology facilitates adaptive webtops that reduce the amount of time required to locate access points for web applications and improve user productivity.
1683 Citations
20 Claims
-
1. A method implemented by an enterprise network system comprising one or more access management apparatuses, client devices, or web application server devices, the method comprising:
-
monitoring network traffic exchanged with web applications to generate and store historical application access pattern data; identifying one or more of the web applications that are allowed for a client based on a stored access policy and in response to a login request received from the client; analyzing the stored historical application access pattern data to determine, for at least a subset of the allowed web applications and prior to any of the allowed web applications being accessed by the client in a current session, an indication of whether each of the subset of the allowed web applications will be accessed by the client in the current session; generating a webtop configured to, when rendered in a web browser, graphically organize access points for at least the subset of the allowed web applications based on the determined indication; and providing the webtop to the client in response to the login request to facilitate access to the subset of the allowed web applications. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An access management apparatus, comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions:
-
monitor network traffic exchanged with web applications to generate and store historical application access pattern data; identify one or more of the web applications that are allowed for a client based on a stored access policy and in response to a login request received from the client; analyze the stored historical application access pattern data to determine, for at least a subset of the allowed web applications and prior to any of the allowed web applications being accessed by the client in a current session, an indication of whether each of the subset of the allowed web applications will be accessed by the client in the current session; generate a webtop configured to, when rendered in a web browser, graphically organize access points for at least the subset of the allowed web applications based on the determined indication; and provide the webtop to the client in response to the login request to facilitate access to the at least the subset of the allowed web applications. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium having stored thereon instructions comprising executable code which when executed by one or more processors, causes the processors to:
-
monitor network traffic exchanged with web applications to generate and store historical application access pattern data; identify one or more of the web applications that are allowed for a client based on a stored access policy and in response to a login request received from the client; analyze the stored historical application access pattern data to determine, for at least a subset of the allowed web applications and prior to any of the allowed web applications being accessed by the client in a current session, an indication of whether each of the subset of the allowed web applications will be accessed by the client in the current session; generate a webtop configured to, when rendered in a web browser, graphically organize access points for at least the subset of the allowed web applications based on the determined indication; and provide the webtop to the client in response to the login request to facilitate access to the at least the subset of the allowed web applications. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An enterprise network system comprising one or more access management apparatuses, client devices, or web application server devices, the enterprise network system comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions to:
-
monitor network traffic exchanged with web applications to generate and store historical application access pattern data; identify one or more of the web applications that are allowed for a client based on a stored access policy and in response to a login request received from the client; analyze the stored historical application access pattern data to determine, for at least a subset of the allowed web applications and prior to any of the allowed web applications being accessed by the client in a current session, an indication of whether each of the subset of the allowed web applications will be accessed by the client in the current session; generate a webtop configured to, when rendered in a web browser, graphically organize access points for at least the subset of the allowed web applications based on the determined indication; and provide the webtop to the client in response to the login request to facilitate access to the at least the subset of the allowed web applications. - View Dependent Claims (17, 18, 19, 20)
-
Specification