US20100023630A1 - System and method for globally and securely accessing unified information in a computer network - Google Patents

System and method for globally and securely accessing unified information in a computer network Download PDF

Info

Publication number
US20100023630A1
US20100023630A1 US12/575,387 US57538709A US2010023630A1 US 20100023630 A1 US20100023630 A1 US 20100023630A1 US 57538709 A US57538709 A US 57538709A US 2010023630 A1 US2010023630 A1 US 2010023630A1
Authority
US
United States
Prior art keywords
service
smartphone
server
downloadable
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/575,387
Inventor
Daniel J. Mendez
Mark D. Riggins
Prasad Wagle
Hong Q. Bui
Mason Ng
Sean Michael Quinlan
Christine C. Ying
Christopher R. Zuleeg
David J. Cowan
Joanna A. Aptekar-Strober
R. Stanley Bailes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Malikie Innovations Ltd
Good Technology Corp
Original Assignee
Visto Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=36933085&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20100023630(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US08/766,307 external-priority patent/US6131116A/en
Priority claimed from US08/841,950 external-priority patent/US7287271B1/en
Priority claimed from US08/835,997 external-priority patent/US6085192A/en
Priority claimed from US08/865,075 external-priority patent/US6023708A/en
Priority claimed from US09/666,877 external-priority patent/US6708221B1/en
Priority to US12/575,387 priority Critical patent/US20100023630A1/en
Application filed by Visto Corp filed Critical Visto Corp
Publication of US20100023630A1 publication Critical patent/US20100023630A1/en
Priority to US13/038,801 priority patent/US9361603B2/en
Assigned to GOOD TECHNOLOGY CORPORATION reassignment GOOD TECHNOLOGY CORPORATION CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: VISTO CORPORATION
Assigned to MALIKIE INNOVATIONS LIMITED reassignment MALIKIE INNOVATIONS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLACKBERRY LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • This invention relates generally to computer networks, and more particularly provides a system and method for globally and securely accessing unified information in a computer network.
  • the internet currently interconnects about 100,000 computer networks and several million computers. Each of these computers stores numerous application programs for providing numerous services, such as generating, sending and receiving e-mail, accessing World Wide Web sites, generating and receiving facsimile documents, storing and retrieving data, etc.
  • a roaming user i.e., a user who travels and accesses a workstation remotely, is faced with several problems.
  • Program designers have developed communication techniques for enabling the roaming user to establish a communications link and to download needed information and needed service application programs from the remote workstation to a local computer. Using these techniques, the roaming user can manipulate the data on the remote workstation and, when finished, can upload the manipulated data back from the remote workstation to the local computer.
  • slow computers and slow communication channels make downloading large files and programs a time-consuming process. Further, downloading files and programs across insecure channels severely threatens the integrity and confidentiality of the downloaded data.
  • Data consistency is also a significant concern for the roaming user. For example, when maintaining multiple independently modifiable copies of a document, a user risks using an outdated version. By the time the user notices an inconsistency, interparty miscommunication or data loss may have already resulted. The user must then spend more time attempting to reconcile the inconsistent versions and addressing any miscommunications.
  • Data consistency problems may also arise when using application programs from different vendors.
  • the Netscape Navigatorm web engine and the Internet Explorerm web engine each store bookmarks for quick reference to interesting web sites.
  • each web engine uses different formats and stores bookmarks in different files, the bookmarks are not interchangeable.
  • one web engine may store a needed bookmark, and the other may not.
  • a user who, for example, runs the Internet ExplorerTMweb engine at home and runs the Netscape NavigatorTM web engine at work risks having inconsistent bookmarks at each location.
  • a system and method are needed to enable multiple users to access computer services remotely without consuming excessive user time, without severely threatening the integrity and confidentiality of the data, and without compromising data consistency.
  • the present invention provides a system and methods for providing global and secure access to services and to unified (synchronized) workspace elements in a computer network.
  • a user can gain access to a global server using any terminal, which is connected via a computer network such as the Internet to the global server and which is enabled with a web engine.
  • a client stores a first set of workspace data, and is coupled via a computer network to a global server.
  • the client is configured to synchronize selected portions of the first set of workspace data (comprising workspace elements) with the global server, which stores independently modifiable copies of the selected portions.
  • the global server may also store workspace data not received from the client, such as e-mail sent directly to the global server. Accordingly, the global server stores a second set of workspace data.
  • the global server is configured to identify and authenticate a user attempting to access it from a remote terminal, and is configured to provide access based on the client configuration either to the first set of workspace data stored on the client or to the second set of workspace data stored on the global server. It will be appreciated that the global server can manage multiple clients and can synchronize workspace data between clients.
  • Service engines for managing services such as e-mail management, accessing bookmarks, calendaring, network access, etc. may be stored anywhere in the computer network, including on the client, on the global server or on any other computer.
  • the global server is configured to provide the user with access to services, which based on level of authentication management or user preferences may include only a subset of available services.
  • the global server Upon receiving a service request from the client, the global server sends configuration information to enable access to the service.
  • Each client includes a base system and the global server includes a synchronization agent.
  • the base system and synchronization agent automatically establish a secure connection therebetween and synchronize the selected portions of the first set of workspace data stored on the client and the second set of workspace data stored on the global server.
  • the base system operates on the client and examines the selected portions to determine whether any workspace elements have been modified since last synchronization.
  • the synchronization agent operates on the global server and informs the base system whether any of the workspace elements in the second set have been modified. Modified version may then be exchanged so that an updated set of workspace elements may be stored at both locations, and so that the remote user can access an updated database.
  • the base system then performs a responsive action such as examining content and generating a preferred version, which may be stored at both locations.
  • the system may further include a synchronization-start module at the client site (which may be protected by a firewall) that initiates interconnection and synchronization when predetermined criteria have been satisfied.
  • a method of the present invention includes establishing a communications link between the client and the global server.
  • the method includes establishing a communications link between the client and a service based upon user requests.
  • the method receives configuration data and uses the configuration data to configure the client components such as the operating system, the web engine and other components.
  • Configuring client components enables the client to communicate with the service and provides a user-and-service-specific user interface on the client.
  • Establishing a communications link may also include confirming access privileges.
  • Another method uses a global translator to synchronize workspace elements.
  • the method includes the steps of selecting workspace elements for synchronization, establishing a communications link between a client and a global server, examining version information for each of the workspace elements on the client and on the global server to determine workspace elements which have been modified since last synchronization.
  • the method continues by comparing the corresponding versions and performing a responsive action. Responsive actions may include storing the preferred version at both stores or reconciling the versions using content-based analysis.
  • the system and methods of the present invention advantageously provide a secure globally accessible third party, i.e. the global server.
  • the system and methods provide a secure technique for enabling a user to access the global server and thus workspace data remotely and securely. Because of the global firewall and the identification and security services performed by the global server, corporations can store relatively secret information on the global server for use by authorized clients. Yet, the present invention also enables corporations to maintain only a portion of their secret information on the global server, so that there would be only limited loss should the global server be compromised. Further, the global server may advantageously act as a client proxy for controlling access to services, logging use of keys and logging access of resources.
  • a client user who maintains a work site, a home site, an off-site and the global server site can securely synchronize the workspace data or portions thereof among all four sites.
  • the predetermined criteria (which control when the synchronization-start module initiates synchronization) may be set so that the general synchronization module synchronizes the workspace data upon user request, at predetermined times during the day such as while the user is commuting, or after a predetermined user action such as user log-off or user log-on. Because the system and method operate over the Internet, the system is accessible using any connected terminal having a web engine such as an internet-enabled smart phone, television settop (e.g., web TV), etc. and is accessible over any distance.
  • a web engine such as an internet-enabled smart phone, television settop (e.g., web TV), etc.
  • a roaming user may be enabled to access workspace data from the global server or may be enabled to access a service for accessing workspace data from a client. For example, a user may prefer not to store personal information on the global server but may prefer to have remote access to the information. Further, the user may prefer to store highly confidential workspace elements on the client at work as added security should the global server be compromised.
  • the present invention may further benefit the roaming user who needs emergency access to information.
  • the roaming user may request a Management Information Systems (MIS) director controlling the client to provide the global server with the proper keys to enable access to the information on the client. If only temporary access is desired, the keys can then be later destroyed either automatically or upon request.
  • MIS director may select the needed information as workspace elements to be synchronized and may request immediate synchronization with the global server. Accordingly, the global server and the client can synchronize the needed information, and the user can access the information from the global server after it has completed synchronization.
  • MIS Management Information Systems
  • the present invention also enables the system and methods to synchronize keys, available services and corresponding service addresses to update accessibility of workspace data and services. For example, if the user of a client accesses a site on the Internet which requires a digital certificate and the user obtains the certificate, the system and methods of the present invention may synchronize this newly obtained certificate with the keys stored on the global server. Thus, the user need not contact the global server to provide it with the information.
  • the synchronization means will synchronize the information automatically.
  • FIG. 1 is a block diagram illustrating a secure data-synchronizing remotely accessible network in accordance with the present invention
  • FIG. 2 is a block diagram illustrating details of a FIG. 1 remote terminal
  • FIG. 3 is a block diagram illustrating details of a FIG. 1 global server
  • FIG. 4 is a block diagram illustrating details of a FIG. 1 synchronization agent
  • FIG. 5 is a graphical representation of an example bookmark in global format
  • FIG. 6 is a graphical representation of the FIG. 3 configuration data
  • FIG. 7 is a block diagram illustrating the details of a FIG. 1 client
  • FIG. 8 is a block diagram illustrating the details of a FIG. 1 base system
  • FIG. 9 illustrates an example services list
  • FIG. 10 is a flowchart illustrating a method for remotely accessing a secure server
  • FIG. 11 is a flowchart illustrating details of the FIG. 10 step of creating a link between a client and global server;
  • FIG. 12 is a flowchart illustrating details of the FIG. 10 step of providing access to a service in a first embodiment
  • FIG. 13 is a flowchart illustrating details of the FIG. 10 step of providing access to a service in a second embodiment
  • FIG. 14 is a flowchart illustrating details of the FIG. 10 step of providing access to a service in a third embodiment.
  • FIG. 15 is a flowchart illustrating a method for synchronizing multiple copies of a workspace element over a secure network.
  • FIG. 1 is a block diagram illustrating a network 100 , comprising a first site such as a remote computer terminal 105 coupled via a communications channel 110 to a global server 115 .
  • the global server 115 is in turn coupled via a communications channel 120 to a second site such as a Local Area Network (LAN) 125 and via a communications channel 122 to a third site such as client 167 .
  • Communications channel 110 , communications channel 120 and communications channel 122 may be referred to as components of a computer network such as the Internet.
  • the global server 115 is protected by a global firewall 130
  • the LAN 125 is protected by a LAN firewall 135 .
  • the LAN 125 comprises a client 165 , which includes a base system 170 for synchronizing workspace data 180 (e-mail data, file data, calendar data, user data, etc.) with the global server 115 and may include a service engine 175 for providing computer services such as scheduling, e-mail, paging, word-processing or the like.
  • workspace data 180 may include other types of data such as application programs.
  • workspace data 180 may each be divided into workspace elements, wherein each workspace element may be identified by particular version information 782 ( FIG. 7 ). For example, each e-mail, file, calendar, etc.
  • each workspace element on the client 165 is referred to herein as being stored in format A. It will be further appreciated that the workspace data 180 or portions thereof may be stored at different locations such as locally on the client 165 , on other systems in the LAN 125 or on other systems (not shown) connected to the global server 115 .
  • the client 167 is similar to the client 165 .
  • workspace data stored on the client 167 is referred to as being stored in format B, which may be the same as or different than format A. All aspects described above and below with reference to the client 165 are also possible with respect to the client 167 .
  • client 167 may include services (not shown) accessible from remote terminal 105 , may include a base system (not shown) for synchronizing workspace elements with the global server 115 , etc.
  • the global server 115 includes a security system 160 for providing only an authorized user with secure access through firewalls to services.
  • the security system 160 may perform identification and authentication services and may accordingly enable multiple levels of access based on the level of identification and authentication.
  • the global server 115 further includes a configuration system 155 that downloads configuration data 356 ( FIGS. 3 and 6 ) to the remote terminal 105 to configure remote terminal 105 components such as the operating system 270 ( FIG. 2 ), the web engine 283 ( FIG. 2 ), the applet engine 290 ( FIG. 2 ), etc.
  • the configuration system 155 uses the configuration data 356 to enable the remote terminal 105 to access the services provided by the service engine 175 and to provide a user-and-service-specific user interface.
  • the global server 115 stores workspace data 163 , which includes an independently modifiable copy of each selected workspace element in the selected portions of the workspace data 180 . Accordingly, the workspace data 163 includes an independently modifiable copy of each corresponding version information 782 ( FIG. 7 ).
  • the workspace data 163 may also include workspace elements which originate on the global server 115 such as e-mails sent directly to the global server 115 or workspace elements which are downloaded from another client (not shown).
  • the global server 115 maintains the workspace data 163 in a format, referred to as a “global format,” which is selected to be easily translatable by the global translator 150 to and from format A and to and from format B.
  • the global format actually includes a global format for each information type.
  • a global format for bookmarks FIG. 5
  • a global format for files FIG. 5
  • a global format for calendar data FIG. 5
  • a global format for e-mails etc.
  • the global server 115 also includes a synchronization agent 145 for examining the workspace elements of workspace data 163 . More particularly, the base system 170 and the synchronization agent 145 , collectively referred to herein as “synchronization means,” cooperate to synchronize the workspace data 163 with the selected portions of the workspace data 180 .
  • the synchronization means may individually synchronize workspace elements (e.g., specific word processor documents) or may synchronize workspace element folders (e.g., a bookmark folder).
  • the base system 170 manages the selected portions of the workspace data 180 within the LAN 125 and the synchronization agent 145 manages the selected portions of workspace data 163 within the global server 115 .
  • the global translator 150 cooperates with the synchronization means to translate between format A (or format B) and the global format. It will be further appreciated that the global server 115 may synchronize the workspace data 163 with workspace data 180 and with the workspace data (not shown) on the client 167 . Accordingly, the workspace data 163 can be easily synchronized with the workspace data (not shown) on the client 167 .
  • the remote terminal 105 includes a web engine 140 , which sends requests to the global server 115 and receives information to display from the global server 115 .
  • the web engine 140 may use HyperText Transfer Protocol (HTTP) and HyperText Markup Language (HTML) to interface with the global server 115 .
  • HTTP HyperText Transfer Protocol
  • HTML HyperText Markup Language
  • the web engine 140 may be enabled to run applets, which when executed operate as the security interface for providing access to the global server 115 and which operate as the application interface with the requested service.
  • applets which when executed operate as the security interface for providing access to the global server 115 and which operate as the application interface with the requested service.
  • a user can operate any remote client 105 connected to the Internet to access the global server 115 , and thus to access the services and the workspace data on or accessible by the global server 115 .
  • FIG. 2 is a block diagram illustrating details of the remote terminal 105 , which includes a Central Processing Unit (CPU) 210 such as a Motorola Power PCTM microprocessor or an Intel PentiumTM microprocessor.
  • CPU Central Processing Unit
  • An input device 220 such as a keyboard and mouse, and an output device 230 such as a Cathode Ray Tube (CRT) display are coupled via a signal bus 235 to CPU 210 .
  • a communications interface 240 , a data storage device 250 such as Read Only Memory (ROM) and a magnetic disk, and a Random-Access Memory (RAM) 260 are further coupled via signal bus 235 to CPU 210 .
  • the communications interface 240 is coupled to a communications channel 110 as shown in FIG. 1 .
  • An operating system 270 includes a program for controlling processing by CPU 210 , and is typically stored in data storage device 250 and loaded into RAM 260 (as shown) for execution. Operating system 270 further includes a communications engine 275 for generating and transferring message packets via the communications interface 240 to and from the communications channel 110 . Operating system 270 further includes an Operating System (OS) configuration module 278 , which configures the operating system 270 based on OS configuration data 356 ( FIG. 3 ) such as Transmission Control Protocol (TCP) data, Domain Name Server (DNS) addresses, etc. received from the global server 115 .
  • OS Operating System
  • Operating system 270 further includes the web engine 140 for communicating with the global-server 115 .
  • the web engine 140 may include a web engine (WE) configuration module 286 for configuring elements of the webengine 140 such as home page addresses, bookmarks, caching data, user preferences, etc. based on the configuration data 356 received from the global server 115 .
  • the web engine 140 may also include an encryption engine 283 for using encryption techniques to communicate with the global server 115 .
  • the web engine 140 further may include an applet engine 290 for handling the execution of downloaded applets including applets for providing security.
  • the applet engine 290 may include an Applet Engine (AE) configuration module 295 for configuring the elements of the applet engine 290 based on configuration data 356 received from the global server 115 .
  • AE Applet Engine
  • FIG. 3 is a block diagram illustrating details of the global server 115 , which includes a Central Processing Unit (CPU) 310 such as a Motorola Power PCTM microprocessor or an Intel PentiumTM microprocessor.
  • CPU Central Processing Unit
  • An input device 320 such as a keyboard and mouse, and an output device 330 such as a Cathode Ray Tube (CRT) display are coupled via a signal bus 335 to CPU 310 .
  • a communications interface 340 , a data storage device 350 such as Read Only Memory (ROM) and a magnetic disk, and a Random-Access Memory (RAM) 370 are further coupled via signal bus 335 to CPU 310 .
  • the communications interface 340 is coupled to the communication: channel 110 and to the communications channel 120 .
  • An operating system 380 includes a program for controlling processing by CPU 310 , and is typically stored in data storage device 350 and loaded into RAM 370 (as illustrated) for execution.
  • the operating system 380 further includes a communications engine 382 for generating and transferring message packets via the communications interface 340 to and from the communications channel 345 .
  • the operating system 380 also includes a web page engine 398 for transmitting web page data 368 to the remote terminal 105 , so that the remote terminal 105 can display a web page 900 ( FIG. 9 ) listing functionality offered by the global server 115 .
  • Other web page data 368 may include information for displaying security method selections.
  • the operating system 380 may include an applet host engine 395 for transmitting applets to the remote terminal 105 .
  • a configuration engine 389 operates in conjunction with the applet host engine 395 for transmitting configuration applets 359 and configuration and user data 356 to the remote terminal 105 .
  • the remote terminal 105 executes the configuration applets 359 and uses the configuration and user data 356 to configure the elements (e.g., the operating system 270 , the web engine 140 and the applet engine 290 ) of the remote terminal 105 .
  • Configuration and user data 356 is described in greater detail with reference to FIG. 6 .
  • the operating system 380 also includes the synchronization agent 145 described with reference to FIG. 1 .
  • the synchronization agent 145 synchronizes the workspace data 163 on the global server 115 with the workspace data 180 on the client 165 .
  • the global translator 150 translates between format A used by the client 165 and the global format used by the global server 115 .
  • the operating system 380 may also includes a security engine 392 for determining whether to instruct a communications engine 382 to create a secure communications link with a client 165 or terminal 105 , and for determining the access rights of the user.
  • the security engine 392 forwards to the client 165 or remote terminal 105 security applets 362 , which when executed by the receiver poll the user and respond back to the global server 115 .
  • the global server 115 can examine the response to identify and authenticate the user.
  • the security engine 384 determines whether the global server 115 accepts in-bound communications from a particular port. If so, the security engine 392 allows the communications engine 382 to open a communications channel 345 to the client 165 . Otherwise, no channel will be opened. After a channel is opened, the security engine 392 forwards an authentication security applet 362 to the remote terminal 105 to poll the user for identification and authentication information such as for a user ID and a password. The authentication security applet 362 will generate and forward a response back to the global server 115 , which will use the information to verify the identity of the user and provide access accordingly.
  • a “request-servicing engine” may be the configuration engine 389 and the applet host engine 395 when providing services to a remote terminal 105 or client 165 .
  • the request-servicing engine may be the web page engine 398 when performing workspace data 163 retrieval operations directly from the global server 115 .
  • the request-servicing engine may be the configuration engine 389 and the applet host engine 395 when performing workspace data 180 retrieval operations from the client 165 or from any other site connected, to the global server 115 .
  • the request-servicing engine may be security engine 392 when performing security services such as user identification and authentication.
  • the request-servicing engine may be the synchronization agent when the performing synchronization with the client 165 . Further, the request-servicing engine may be any combination of these components.
  • FIG. 4 is a block diagram illustrating details of the synchronization agent 145 , which includes a communications module 405 and a general synchronization module 410 .
  • the communications module 405 includes routines for compressing data and routines for communicating via the communications channel 120 with the base system 170 .
  • the communications module 405 may further include routines for communicating securely channel through the global firewall 130 and through the LAN firewall 125 .
  • the general synchronization module 410 includes routines for determining whether workspace elements have been synchronized and routines for forwarding to the base system 170 version information (not shown) of elements determined to be modified after last synchronization.
  • the general synchronization module 410 may either maintain its own last synchronization signature (not shown), receive a copy of the last synchronization signature with the request to synchronize from the base system 170 , or any other means for insuring that the workspace data has been synchronized.
  • the general synchronization module 410 further includes routines for receiving preferred versions of workspace data 180 workspace elements from the base system 170 , and routines for forwarding preferred versions of workspace data 180 workspace elements to the base system 170 .
  • FIG. 5 illustrates an example bookmark workspace element in the global format.
  • the translator 150 incorporates all the information needed to translate between all incorporated formats. For example, if for a first client a bookmark in format A needs elements X, Y and Z and for a second client a bookmark in format B needs elements W, X and Y, the global translator 150 incorporates elements W, X, Y and Z to generate a bookmark in the global format. Further, the translator 150 incorporates the information which is needed by the synchronization means (as described below in FIG. 4 ) such as the last modified date.
  • a bookmark in the Global Format may include a user identification (ID) 505 , an entry ID 510 , a parent ID 515 , a folder ID flag 520 , a name 525 , a description 530 , the Uniform Resource Locator (URL) 535 , the position 540 , a deleted ID flag 545 , a last modified date 550 , a created date 555 and a separation ID flag 560 .
  • FIG. 6 is a block diagram illustrating details of the configuration and user data 356 .
  • Configuration data 356 includes settings 605 such as TCP data and the DNS address, web browser settings such as home page address, bookmarks and caching data, applet engine settings, and applet configuration data such as the user's e-mail address, name and signature block. It will be appreciated that applet-specific configuration and user data 356 is needed, since the service may not be located on the user's own local client 165 .
  • Configuration and user data 356 further includes predetermined user preferences 610 such as font, window size, text size, etc.
  • Configuration data 356 further includes the set of services 615 , which will be provided to the user.
  • Services 615 include a list of registered users and each user's list of user-preferred available services 615 .
  • Services may also include a list of authentication levels needed to access the services 615 .
  • Configuration and user data 137 further includes service addresses 620 specifying the location of each of the services 615 accessible via the global server 115 .
  • FIG. 7 is a block diagram illustrating details of the client 165 , which includes a CPU 705 , an input device 710 , an output device 725 , a communications interface 710 , a data storage device 720 and RAM 730 , each coupled to a signal bus 740 .
  • An operating system 735 includes a program for controlling processing by the CPU 705 , and is typically stored in the data storage device 720 and loaded into the RAM 730 (as illustrated) for execution.
  • a service engine 175 includes a service program for managing workspace data 180 that includes version information (not shown). The service engine 175 maybe also stored in the data storage device 720 and loaded into the RAM 730 (as illustrated) for execution.
  • the workspace data 180 may be stored in the data storage device 330 .
  • the base system 170 operates to synchronize the workspace data 180 on the client 165 with the workspace data 163 on the global server 115 .
  • the base system 170 may be also stored in the data storage device 720 and loaded into the RAM 730 (as shown) for execution. The base system 170 is described in greater detail with reference to FIG. 8 .
  • FIG. 8 is a block diagram illustrating details of the base system 170 , which includes a communications module 805 , a user interface module 810 , locator modules 815 , a synchronization-start (“synch-start”) module 820 , a general synchronization module 825 and a content-based synchronization module 830 .
  • each module is illustrated as communicating with one another via a signal bus 840 .
  • the base system 170 includes the same components as included in the synchronization agent 145 .
  • the communications module 805 includes routines for compressing data, and routines for communicating via the communications interface 710 ( FIG. 7 ) with the synchronization agent 145 ( FIG. 1 ).
  • the communications module 805 may include routines for applying Secure Socket Layer (SSL) technology and user identification and authentication techniques (i.e., digital certificates) to establish a secure communication channel through the LAN firewall 135 and through the global firewall 130 .
  • SSL Secure Socket Layer
  • user identification and authentication techniques i.e., digital certificates
  • HTTP HyperText Transfer Protocol
  • Examples of communications modules 805 may include TCP/IP stacks or the AppleTalkTM protocol.
  • the user interface 810 includes routines for communicating with a user, and may include a conventional Graphical User Interface (GUI).
  • GUI Graphical User Interface
  • the user interface 810 operates in coordination with the client 165 components as described herein.
  • the locator modules 815 include routines for identifying the memory locations of the workspace elements in the workspace data 180 and the memory locations of the workspace elements in the workspace data 163 .
  • Workspace element memory location identification may be implemented using intelligent software, i.e., preset memory addresses or the system's registry, or using dialogue boxes to query a user. It will be appreciated that the locator modules 815 may perform workspace element memory location identification upon system boot-up or after each communication with the global server 115 to maintain updated memory locations of workspace elements.
  • the synchronization-start module 820 includes routines for determining when to initiate synchronization of workspace data 163 and workspace data 180 .
  • the synchronization-start module 820 may initiate data synchronization upon user request, at a particular time of day, after a predetermined time period passes, after a predetermined number of changes, after a user action such as user log-off or upon like criteria.
  • the synchronization-start module 820 initiates data synchronization by instructing the general synchronization module 825 to begin execution of its routines. It will be appreciated that communications with synchronization agent 145 preferably initiate from within the LAN 125 , because the typical LAN firewall 125 prevents in-bound communications and allows out-bound communications.
  • the general synchronization module 825 includes routines for requesting version information from the synchronization agent 145 ( FIG. 1 ) and routines for comparing the version information against a last synchronization signature 835 such as a last synchronization date and time to determine which versions have been modified.
  • the general synchronization module 825 further includes routines for comparing the local and remote versions to determine if only one or both versions of a particular workspace element have been modified and routines for performing an appropriate synchronizing responsive action.
  • Appropriate synchronizing responsive actions may include forwarding the modified version (as the preferred version) of a workspace element in workspace data 180 or forwarding just a compilation of the changes to the other store(s).
  • Other appropriate synchronizing responsive actions may include, if reconciliation between two modified versions is needed, then instructing the content-based synchronization module 830 to execute its routines (described below).
  • the synchronization agent 145 preferably examines the local version information 124 and forwards only the elements that have been modified since the last synchronization signature 835 . This technique makes efficient use of processor power and avoids transferring unnecessary data across the communications channel 712 .
  • the general synchronization module 825 in the LAN 135 accordingly compares the data elements to determine if reconciliation is needed. Upon completion of the data synchronization, the general synchronization module 825 updates the last synchronization signature 835 .
  • the content-based synchronization module 830 includes routines for reconciling two or more modified versions of workspace data 163 , 180 in the same workspace element. For example, if the original and the copy of a user workspace element have both been modified independently since the last synchronization, the content-based synchronization module 830 determines the appropriate responsive action.
  • the content-based synchronization module 830 may request a user to select the preferred one of the modified versions or, may respond based on preset preferences, i.e., by storing both versions in both stores or by integrating the changes into a single preferred version which replaces each modified version at both stores. When both versions are stored at both stores, each version may include a link to the other version so that the user may be advised to select the preferred version.
  • any client 165 that wants synchronization may have a base system 170 .
  • one base system 170 can manage multiple clients 165 .
  • all synchronization may be performed by the global server 115 .
  • components of the base system 170 such as the user interface module 810 , the locator modules 815 , the general synchronization module 825 and the content-based synchronization module 830 may be located on the global server 115 .
  • the client 165 includes the communications module 805 and the synch-start module 820 .
  • FIG. 9 illustrates an example list 900 of accessible services provided by a URL addressable HyperText Markup Language (HTML)-based web page, as maintained by the web page engine 398 of the global server 115 .
  • the list 900 includes a title 910 “Remote User's Home Page,” a listing of the provided services 615 and a pointer 970 for selecting one of the provided services 615 .
  • the provided services may include an e-mail service 920 , a calendaring service 930 , an internet access service 940 , a paging service 950 , a fax sending service 960 , a user authentication service 963 and a workspace data retrieval service 967 .
  • FIG. 10 is a flowchart illustrating a method 1000 for enabling a user to access the services 615 in the computer network system 100 .
  • Method 1000 begins by the remote terminal 105 in step 1005 creating a communications link with the global server 115 .
  • the global server 115 in step 1010 confirms that the user has privileges to access the functionality of the global server 115 . Confirming user access privileges may include examining a user certificate, obtaining a secret password, using digital signature technology, performing a challenge/response technique, etc.
  • the security engine 392 may cause the applet host engine 395 to forward via the communications channel 345 to the remote terminal 105 an authentication security applet 362 which when executed communicates with the global server 115 to authenticate the user.
  • the web page engine 398 of the global server 115 in step 1015 transmits web page data 368 and configuration and user data 356 to the remote terminal 105 .
  • the web engine 140 of the remote terminal 105 in step 1020 uses the web page data 368 and the configuration and user data 356 to display a web page service list 900 ( FIG. 9 ) on the output device 230 , and to enable access to the services 615 which the global server 115 offers.
  • An example service list 900 is shown and described with reference to FIG. 9 . Configuration of the remote terminal 105 and of the web page 700 is described in detail in the cross-referenced patent applications.
  • the user in step 1025 selects a service 615 via input device 220 .
  • the request-servicing engine (described with reference to FIG. 3 ) provides the selected service 615 .
  • the applet host engine 395 of the global server 115 in step 1030 may download to the remote terminal 105 a corresponding applet 359 and configuration and user data 356 for executing the requested service 615 .
  • the web page engine 398 may use, for example, HTTP and HTML to provide the selected service 615 .
  • the configuration and user data 356 may include user-specific preferences such as user-preferred fonts for configuring the selected service 615 .
  • Configuration and user data 356 may also include user-specific and service-specific information such as stored bookmarks, calendar data, pager numbers, etc.
  • the corresponding applet 359 and the configuration and user data 356 could have been downloaded instep 1015 . Providing access to the service by an applet 359 is described in greater detail below with reference to FIGS. 12-14 .
  • the applet engine 290 of the remote terminal 105 in step 1035 initiates execution of the corresponding downloaded applet.
  • the global server 115 in step 1040 initiates the selected service 615 and in step 1045 selects one of three modes described with reference to FIGS. 12-14 for accessing the service 615 . For example, if the user selects a service 615 on a service server (e.g., the client 165 ) that is not protected by a separate firewall, then the global server 115 may provide the user with direct access. If the user selects a service 615 provided by a service server within the LAN 125 , then the global server 115 may access the service 615 as a proxy for the user.
  • a service server e.g., the client 165
  • each firewall 130 and 135 may store policies establishing the proper mode of access the global server 115 should select. Other factors for selecting mode of access may include user preference, availability and feasibility.
  • the global server 115 in step 1050 uses the selected mode to provide the remote terminal 105 user with access to the selected service 615 .
  • FIG. 11 is a flowchart illustrating details of step 1005 , which begins by the remote terminal 105 in step 1105 using a known Uniform Resource Locator (URL) to call the global server 115 .
  • the global server 115 and the remote terminal 105 in step 1107 create a secure communications channel therebetween, possibly by applying Secure Sockets Layer (SSL) technology. That is, the security engine 392 of the global server 115 in step 1110 determines if in-bound secure communications are permitted and, if so, creates a communications channel with the remote terminal 105 .
  • the web engine 140 of the remote terminal 105 and the security engine 392 of the global server 115 in step 11 15 negotiate secure communications channel parameters, possibly using public key certificates.
  • An example secure communications channel is RSA with RC4 encryption.
  • Step 1115 thus may include selecting an encryption protocol which is known by both the global server 115 and the remote terminal 105 .
  • the encryption engine 283 of the remote terminal 105 and secure communications engine 392 of the global server 115 in step 1120 use the secure channel parameters to create the secure communications channel.
  • Method 505 then ends.
  • FIG. 12 is a flowchart illustrating details of step 1050 in a first embodiment, referred to as step 1050 a, wherein the global server 115 provides the remote terminal 105 with a direct connection to a service 615 .
  • Step 1050 a begins by the applet engine 290 in step 1205 running a configuration applet 359 for the selected service 615 that retrieves the service address 620 from data storage device 380 and the authentication information from the keysafe 365 .
  • the communications interface 340 in step 1210 creates a direct and secure connection with the communications interface 340 of the global server 115 at the retrieved service address 620 , and uses the authentication information to authenticate itself.
  • the applet in step 1215 acts as the I/O interface with the service 615 .
  • Step 1050 a then ends.
  • FIG. 13 is a flowchart illustrating details of step 1050 in a second embodiment, referred to as step 1050 b, wherein the global server 115 acts for the remote terminal 105 as a proxy to the service 615 .
  • Step 1050 b begins with a configuration applet 359 in step 1305 requesting the service address 620 for the selected service 615 , which results in retrieving the service address 620 directing the applet 359 to the global server 115 .
  • the applet 359 in step 1310 creates a connection with communications interface 340 of the global server 115 .
  • the global server 115 in step 1315 retrieves the service address 620 of the selected service 615 and the authentication information for the selected service 615 from the keysafe 365 .
  • the communications interface 340 of the global server 115 in step 1320 negotiates secure channel parameters for creating a secure channel with the service server 1014 .
  • the communications interface 340 in step 1320 also authenticates itself as the user.
  • the applet 359 in step 1325 acts as the I/O interface with the communications interface 340 of the global server 115 .
  • the global server 115 in step 1330 determines that it is unauthorized to perform a remote terminal 105 user's request, then the global server 115 in step 1345 determines whether the method 1050 b ends, e.g., whether the user has quit. If so, then method 1050 b ends. Otherwise, method 1050 b returns to step 1325 to obtain another request.
  • the global server 115 in step 1330 determines that it is authorized to perform the remote terminal 105 user's request, then the global server 115 in step 1340 acts as the proxy for the remote terminal 105 to the service 615 . As proxy, the global server 115 forwards the service request to the selected service 615 and forwards responses to the requesting applet 359 currently executing on the remote terminal 105 . Method 1050 b then jumps to step 1345 .
  • FIG. 14 is a flowchart illustrating details of step 1050 in a third embodiment, referred to as step 1050 c, wherein the service 615 being requested is located on the global server 115 .
  • Step 1050 begins with an applet in step 1405 retrieving the service address 620 for the selected service 615 , which results in providing the configuration applet 359 with the service address 620 of the service 615 on the global server 115 .
  • the applet in step 1410 creates a secure connection with the global server 115 . No additional step of identification and authentication is needed since the remote terminal 105 has already identified and authenticated itself to the global server 115 as described with reference to step 1010 of FIG. 10 .
  • step 1415 a determination is made whether the service 615 is currently running. If so, then in step 1425 a determination is made whether the service 615 can handle multiple users. If so, then the global server 115 in step 1430 creates an instance for the user, and the applet in step 1440 acts as the I/O interface with the service 615 on the global server 115 . Method 1050 c then ends. Otherwise, if the service 615 in, step 1425 determines that it cannot handle multiple users, then method 1050 c proceeds to step 1440 . Further, if in step 1415 the global server 115 determines that the service 615 is not currently running, then the global server 115 in step 1420 initializes the service 615 and proceeds to step 1425 .
  • FIG. 15 is a flowchart illustrating a method 1500 for using a global translator 150 to synchronize workspace data 163 and workspace data 180 in a secure network 100 .
  • Method 1500 begins with the user interface 900 in step 1505 enabling a user to select workspace elements of workspace data 163 and workspace data 180 for the synchronization means to synchronize.
  • the locator modules 815 in step 1510 identify the memory locations of the workspace elements in workspace data 163 and workspace data 180 . If a selected workspace element does not have a corresponding memory location, such as in the case of adding new workspace elements to the global server 115 , then one is selected.
  • the selected memory location may be a preexisting workspace element or a new workspace element.
  • workspace element memory location identification may be implemented using intelligent software or dialogue boxes.
  • the general synchronization module 825 in step 1515 sets the previous status of the workspace elements equal to the null set, which indicates that all information of the workspace element has been added.
  • the synchronization-start module 820 in step 1520 determines whether predetermined criteria have been met which indicate that synchronization of the workspace elements selected in step 1505 should start. If not, then the synchronization-start module 820 in step 1525 waits and loops back to step 1520 . Otherwise, the communications module 805 and the communications module 405 in step 1530 establish a secure communications channel therebetween.
  • the general synchronization module 825 in step 1535 determines whether any workspace elements have been modified. That is, the general synchronization module 825 in step 1535 examines the version information of each selected workspace element in the workspace data 180 against the last synchronization signature 435 to locate modified workspace elements. This comparison may include comparing the date of last modification with the date of last synchronization, or may include a comparison between the current status and the previous status as of the last interaction. Similarly, the general synchronization module 815 examines the version information of each corresponding workspace element in workspace data 163 and the last synchronization signature 435 to locate modified workspace elements.
  • step 1535 If in step 1535 no modified workspace elements or folders are located, then the general synchronization module 825 in step 1560 updates the last synchronization signature 435 and method 1500 ends. Otherwise, the general synchronization module 825 in step 1540 determines whether more than one version of a workspace element has been modified since the last synchronization.
  • the corresponding general synchronization module 825 in step 1545 determines the changes made. As stated above, determining the changes made may be implemented by comparing the current status of the workspace element against the previous status of the workspace element as of the last interaction therebetween. If the changes were made only to the version in the workspace data 163 , then the global translator 150 in step 1550 translates the changes to the format used by the other store, and the general synchronization module 410 in step 1555 forwards the translated changes to the general synchronization module 825 for updating the outdated workspace element in the workspace data 180 .
  • the general synchronization module 825 sends the changes to the updated version to the global translator 150 for translation and then to the general synchronization module 410 for updating the outdated workspace element in the workspace data 163 .
  • the general synchronization module 825 and the general synchronization module 410 in step 1557 update the previous state of the workspace element to reflect the current state as of this interaction.
  • Method 1500 then returns to step 1535 .
  • the general synchronization module 825 in step 1540 determines that multiple versions have been modified, then the general synchronization module 825 in step 1565 computes the changes to each version and in step 1570 instructs the content-based synchronization module 830 to examine content to determine if any conflicts exist. For example, the content-based synchronization module 830 may determine that a conflict exists if a user deletes a paragraph in one version and modified the same paragraph in another version. The content-based synchronization module 830 may determine that a conflict does not exist if a user deletes different paragraphs in each version. If no conflict is found, then method 1500 jumps to step 1550 for translating and forwarding the changes in each version to the other store.
  • step 1575 reconciles the modified versions.
  • reconciliation may include requesting instructions from the user or based on previously selected preferences performing responsive actions such as storing both versions at both stores. It will be appreciated that a link between two versions may be placed in each of the two versions, so that the user will recognize to examine both versions to select the preferred version. Method 1500 then proceeds to step 1550 .
  • step 1510 new workspace elements and preexisting workspace elements to which new workspace elements will be merged are set to “modified” and the previous status is set to the null set.
  • the general synchronization module 825 in step 1540 will determine that more that one version has been modified and the content-based synchronization module 830 in step 1570 will determine that no conflict exists.
  • the changes in each will be translated and forwarded to the other store. Accordingly, the two versions will be effectively merged and stored at each store.
  • the synchronization means will effectively merge the first and second folders. That is, the general synchronization module 825 on the client 165 will determine that the first folder has been modified and the previous status is equal to the null set. The general synchronization module 825 will determine and send the changes, i.e., all the workspace elements in the first folder, to a new global folder on the global server 115 .
  • the general synchronization module (not shown) on the remote terminal 105 will determine that, as of its last interaction, the previous status of each of the second and the global folders is the null set.
  • the general synchronization module 825 will instruct the content-based synchronization module 830 to examine the changes made to each folder to determine whether a conflict exists. Since no conflicts will exist, the general synchronization module 825 will forward the changes to the global folder and the general synchronization module 410 will forward its changes to the second store, thereby merging the workspace elements of the first and second folders in the global and second folders.
  • the general synchronization module 410 will inform the general synchronization module 825 that the global folder has been modified relative to the last interaction, and will forward the new changes to the first folder. Thus, the first and second folders will be merged and stored at each store.
  • a server can be any computer which is polled by a client.
  • the remote terminal 105 may be referred to as a type of client.
  • other downloadable executables such as JavaTM applets, JavaTM applications or ActiveXTM control developed by the Microsoft Corporation can alternatively be used.
  • Components of this invention may be implemented using a programmed general-purpose digital computer, using application specific integrated circuits, or using a network of interconnected conventional components and circuits.
  • the embodiments described herein have been presented for purposes of illustration and are not intended to be exhaustive or limiting. Many variations and modifications are possible in light of the foregoing teaching. The invention is limited only by the following claims.

Abstract

A client stores a first set of workspace data, and is coupled via a computer network to a global server. The client may be configured to synchronize portions of the first set of workspace data with the global server, which stores independently modifiable copies of the portions. The global server may also store workspace data which is not downloaded from the client, and thus stores a second set of workspace data. The global server may be configured to identify and authenticate a user seeking global server access from a remote terminal, and is configured to provide access to the first set or to the second set. Further, services may be stored anywhere in the computer network. The global server may be configured to provide the user with access to the services. The system may further include a synchronization-start module at the client site (which may be protected by a firewall) that initiates interconnection and synchronization with the global server when predetermined criteria have been satisfied.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation and claims the benefit of priority under 35 U.S.C. § 120 from U.S. application Ser. No. 12/480,500, filed Jun. 8, 2009, which is a continuation of U.S. application Ser. No. 11/340,083, filed Jan. 25, 2006, which is a continuation of U.S. application Ser. No. 10/741,113, filed Dec. 19, 2003, which is a continuation of U.S. application Ser. No. 09/666,877 filed Sep. 20, 2000, which is a continuation of U.S. application Ser. No. 08/903,118 filed Jul. 30, 1997, which is a continuation-in-part of co-pending U.S. application Ser. No. 08/766,307, filed on Dec. 13, 1996, and of co-pending U.S. application Ser. No. 08/841,950, filed on Apr. 8, 1997 and of co-pending U.S. application Ser. No. 08/835,997, filed on Apr. 11, 1997, and of co-pending U.S. application Ser. No. 08/865,075, filed on May 29, 1997. The entire contents of these applications are incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • This invention relates generally to computer networks, and more particularly provides a system and method for globally and securely accessing unified information in a computer network.
  • 2. Description of the Background Art
  • The internet currently interconnects about 100,000 computer networks and several million computers. Each of these computers stores numerous application programs for providing numerous services, such as generating, sending and receiving e-mail, accessing World Wide Web sites, generating and receiving facsimile documents, storing and retrieving data, etc.
  • A roaming user, i.e., a user who travels and accesses a workstation remotely, is faced with several problems. Program designers have developed communication techniques for enabling the roaming user to establish a communications link and to download needed information and needed service application programs from the remote workstation to a local computer. Using these techniques, the roaming user can manipulate the data on the remote workstation and, when finished, can upload the manipulated data back from the remote workstation to the local computer. However, slow computers and slow communication channels make downloading large files and programs a time-consuming process. Further, downloading files and programs across insecure channels severely threatens the integrity and confidentiality of the downloaded data.
  • Data consistency is also a significant concern for the roaming user. For example, when maintaining multiple independently modifiable copies of a document, a user risks using an outdated version. By the time the user notices an inconsistency, interparty miscommunication or data loss may have already resulted. The user must then spend more time attempting to reconcile the inconsistent versions and addressing any miscommunications.
  • The problem of data inconsistency is exacerbated when multiple copies of a document are maintained at different network locations. For example, due to network security systems such as conventional firewall technology, a user may have access only to a particular one of these network locations. Without access to the other sites, the user cannot confirm that the version on the accessible site is the most recent draft.
  • Data consistency problems may also arise when using application programs from different vendors. For example, the Netscape Navigatorm web engine and the Internet Explorerm web engine each store bookmarks for quick reference to interesting web sites. However, since each web engine uses different formats and stores bookmarks in different files, the bookmarks are not interchangeable. In addition, one web engine may store a needed bookmark, and the other may not. A user who, for example, runs the Internet Explorer™web engine at home and runs the Netscape Navigator™ web engine at work risks having inconsistent bookmarks at each location.
  • Therefore, a system and method are needed to enable multiple users to access computer services remotely without consuming excessive user time, without severely threatening the integrity and confidentiality of the data, and without compromising data consistency.
  • SUMMARY OF THE INVENTION
  • The present invention provides a system and methods for providing global and secure access to services and to unified (synchronized) workspace elements in a computer network. A user can gain access to a global server using any terminal, which is connected via a computer network such as the Internet to the global server and which is enabled with a web engine.
  • A client stores a first set of workspace data, and is coupled via a computer network to a global server. The client is configured to synchronize selected portions of the first set of workspace data (comprising workspace elements) with the global server, which stores independently modifiable copies of the selected portions. The global server may also store workspace data not received from the client, such as e-mail sent directly to the global server. Accordingly, the global server stores a second set of workspace data. The global server is configured to identify and authenticate a user attempting to access it from a remote terminal, and is configured to provide access based on the client configuration either to the first set of workspace data stored on the client or to the second set of workspace data stored on the global server. It will be appreciated that the global server can manage multiple clients and can synchronize workspace data between clients.
  • Service engines for managing services such as e-mail management, accessing bookmarks, calendaring, network access, etc. may be stored anywhere in the computer network, including on the client, on the global server or on any other computer. The global server is configured to provide the user with access to services, which based on level of authentication management or user preferences may include only a subset of available services. Upon receiving a service request from the client, the global server sends configuration information to enable access to the service.
  • Each client includes a base system and the global server includes a synchronization agent. The base system and synchronization agent automatically establish a secure connection therebetween and synchronize the selected portions of the first set of workspace data stored on the client and the second set of workspace data stored on the global server. The base system operates on the client and examines the selected portions to determine whether any workspace elements have been modified since last synchronization. The synchronization agent operates on the global server and informs the base system whether any of the workspace elements in the second set have been modified. Modified version may then be exchanged so that an updated set of workspace elements may be stored at both locations, and so that the remote user can access an updated database. If a conflict exists between two versions, the base system then performs a responsive action such as examining content and generating a preferred version, which may be stored at both locations. The system may further include a synchronization-start module at the client site (which may be protected by a firewall) that initiates interconnection and synchronization when predetermined criteria have been satisfied.
  • A method of the present invention includes establishing a communications link between the client and the global server. The method includes establishing a communications link between the client and a service based upon user requests. The method receives configuration data and uses the configuration data to configure the client components such as the operating system, the web engine and other components. Configuring client components enables the client to communicate with the service and provides a user-and-service-specific user interface on the client. Establishing a communications link may also include confirming access privileges.
  • Another method uses a global translator to synchronize workspace elements. The method includes the steps of selecting workspace elements for synchronization, establishing a communications link between a client and a global server, examining version information for each of the workspace elements on the client and on the global server to determine workspace elements which have been modified since last synchronization. The method continues by comparing the corresponding versions and performing a responsive action. Responsive actions may include storing the preferred version at both stores or reconciling the versions using content-based analysis.
  • The system and methods of the present invention advantageously provide a secure globally accessible third party, i.e. the global server. The system and methods provide a secure technique for enabling a user to access the global server and thus workspace data remotely and securely. Because of the global firewall and the identification and security services performed by the global server, corporations can store relatively secret information on the global server for use by authorized clients. Yet, the present invention also enables corporations to maintain only a portion of their secret information on the global server, so that there would be only limited loss should the global server be compromised. Further, the global server may advantageously act as a client proxy for controlling access to services, logging use of keys and logging access of resources.
  • A client user who maintains a work site, a home site, an off-site and the global server site can securely synchronize the workspace data or portions thereof among all four sites. Further, the predetermined criteria (which control when the synchronization-start module initiates synchronization) may be set so that the general synchronization module synchronizes the workspace data upon user request, at predetermined times during the day such as while the user is commuting, or after a predetermined user action such as user log-off or user log-on. Because the system and method operate over the Internet, the system is accessible using any connected terminal having a web engine such as an internet-enabled smart phone, television settop (e.g., web TV), etc. and is accessible over any distance. Since the system and method include format translation, merging of workspace elements between different application programs and different platforms is possible. Further, because synchronization is initiated from within the firewall, the typical firewall, which prevents in-bound communications and only some protocols of out-bound communications, does not act as an impediment to workspace element synchronization.
  • Further, a roaming user may be enabled to access workspace data from the global server or may be enabled to access a service for accessing workspace data from a client. For example, a user may prefer not to store personal information on the global server but may prefer to have remote access to the information. Further, the user may prefer to store highly confidential workspace elements on the client at work as added security should the global server be compromised.
  • The present invention may further benefit the roaming user who needs emergency access to information. The roaming user may request a Management Information Systems (MIS) director controlling the client to provide the global server with the proper keys to enable access to the information on the client. If only temporary access is desired, the keys can then be later destroyed either automatically or upon request. Alternatively, the MIS director may select the needed information as workspace elements to be synchronized and may request immediate synchronization with the global server. Accordingly, the global server and the client can synchronize the needed information, and the user can access the information from the global server after it has completed synchronization.
  • The present invention also enables the system and methods to synchronize keys, available services and corresponding service addresses to update accessibility of workspace data and services. For example, if the user of a client accesses a site on the Internet which requires a digital certificate and the user obtains the certificate, the system and methods of the present invention may synchronize this newly obtained certificate with the keys stored on the global server. Thus, the user need not contact the global server to provide it with the information. The synchronization means will synchronize the information automatically.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram illustrating a secure data-synchronizing remotely accessible network in accordance with the present invention;
  • FIG. 2 is a block diagram illustrating details of a FIG. 1 remote terminal;
  • FIG. 3 is a block diagram illustrating details of a FIG. 1 global server;
  • FIG. 4 is a block diagram illustrating details of a FIG. 1 synchronization agent;
  • FIG. 5 is a graphical representation of an example bookmark in global format;
  • FIG. 6 is a graphical representation of the FIG. 3 configuration data;
  • FIG. 7 is a block diagram illustrating the details of a FIG. 1 client;
  • FIG. 8 is a block diagram illustrating the details of a FIG. 1 base system;
  • FIG. 9 illustrates an example services list;
  • FIG. 10 is a flowchart illustrating a method for remotely accessing a secure server;
  • FIG. 11 is a flowchart illustrating details of the FIG. 10 step of creating a link between a client and global server;
  • FIG. 12 is a flowchart illustrating details of the FIG. 10 step of providing access to a service in a first embodiment;
  • FIG. 13 is a flowchart illustrating details of the FIG. 10 step of providing access to a service in a second embodiment,
  • FIG. 14 is a flowchart illustrating details of the FIG. 10 step of providing access to a service in a third embodiment; and
  • FIG. 15 is a flowchart illustrating a method for synchronizing multiple copies of a workspace element over a secure network.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • FIG. 1 is a block diagram illustrating a network 100, comprising a first site such as a remote computer terminal 105 coupled via a communications channel 110 to a global server 115. The global server 115 is in turn coupled via a communications channel 120 to a second site such as a Local Area Network (LAN) 125 and via a communications channel 122 to a third site such as client 167. Communications channel 110, communications channel 120 and communications channel 122 may be referred to as components of a computer network such as the Internet. The global server 115 is protected by a global firewall 130, and the LAN 125 is protected by a LAN firewall 135.
  • The LAN 125 comprises a client 165, which includes a base system 170 for synchronizing workspace data 180 (e-mail data, file data, calendar data, user data, etc.) with the global server 115 and may include a service engine 175 for providing computer services such as scheduling, e-mail, paging, word-processing or the like. Those skilled in the art will recognize that workspace data 180 may include other types of data such as application programs. It will be further appreciated that workspace data 180 may each be divided into workspace elements, wherein each workspace element may be identified by particular version information 782 (FIG. 7). For example, each e-mail, file, calendar, etc. may be referred to as “a workspace element in workspace data.” For simplicity, each workspace element on the client 165 is referred to herein as being stored in format A. It will be further appreciated that the workspace data 180 or portions thereof may be stored at different locations such as locally on the client 165, on other systems in the LAN 125 or on other systems (not shown) connected to the global server 115.
  • The client 167 is similar to the client 165. However, workspace data stored on the client 167 is referred to as being stored in format B, which may be the same as or different than format A. All aspects described above and below with reference to the client 165 are also possible with respect to the client 167. For example, client 167 may include services (not shown) accessible from remote terminal 105, may include a base system (not shown) for synchronizing workspace elements with the global server 115, etc.
  • The global server 115 includes a security system 160 for providing only an authorized user with secure access through firewalls to services. The security system 160 may perform identification and authentication services and may accordingly enable multiple levels of access based on the level of identification and authentication. The global server 115 further includes a configuration system 155 that downloads configuration data 356 (FIGS. 3 and 6) to the remote terminal 105 to configure remote terminal 105 components such as the operating system 270 (FIG. 2), the web engine 283 (FIG. 2), the applet engine 290 (FIG. 2), etc. The configuration system 155 uses the configuration data 356 to enable the remote terminal 105 to access the services provided by the service engine 175 and to provide a user-and-service-specific user interface.
  • The global server 115 stores workspace data 163, which includes an independently modifiable copy of each selected workspace element in the selected portions of the workspace data 180. Accordingly, the workspace data 163 includes an independently modifiable copy of each corresponding version information 782 (FIG. 7). The workspace data 163 may also include workspace elements which originate on the global server 115 such as e-mails sent directly to the global server 115 or workspace elements which are downloaded from another client (not shown). The global server 115 maintains the workspace data 163 in a format, referred to as a “global format,” which is selected to be easily translatable by the global translator 150 to and from format A and to and from format B. As with format A and format B, one skilled in the art knows that the global format actually includes a global format for each information type. For example, there may be a global format for bookmarks (FIG. 5), a global format for files, a global format for calendar data, a global format for e-mails, etc.
  • The global server 115 also includes a synchronization agent 145 for examining the workspace elements of workspace data 163. More particularly, the base system 170 and the synchronization agent 145, collectively referred to herein as “synchronization means,” cooperate to synchronize the workspace data 163 with the selected portions of the workspace data 180. The synchronization means may individually synchronize workspace elements (e.g., specific word processor documents) or may synchronize workspace element folders (e.g., a bookmark folder). Generally, the base system 170 manages the selected portions of the workspace data 180 within the LAN 125 and the synchronization agent 145 manages the selected portions of workspace data 163 within the global server 115. It will be appreciated that the global translator 150 cooperates with the synchronization means to translate between format A (or format B) and the global format. It will be further appreciated that the global server 115 may synchronize the workspace data 163 with workspace data 180 and with the workspace data (not shown) on the client 167. Accordingly, the workspace data 163 can be easily synchronized with the workspace data (not shown) on the client 167.
  • The remote terminal 105 includes a web engine 140, which sends requests to the global server 115 and receives information to display from the global server 115. The web engine 140 may use HyperText Transfer Protocol (HTTP) and HyperText Markup Language (HTML) to interface with the global server 115. The web engine 140 may be enabled to run applets, which when executed operate as the security interface for providing access to the global server 115 and which operate as the application interface with the requested service. Using the present invention, a user can operate any remote client 105 connected to the Internet to access the global server 115, and thus to access the services and the workspace data on or accessible by the global server 115.
  • FIG. 2 is a block diagram illustrating details of the remote terminal 105, which includes a Central Processing Unit (CPU) 210 such as a Motorola Power PC™ microprocessor or an Intel Pentium™ microprocessor. An input device 220 such as a keyboard and mouse, and an output device 230 such as a Cathode Ray Tube (CRT) display are coupled via a signal bus 235 to CPU 210. A communications interface 240, a data storage device 250 such as Read Only Memory (ROM) and a magnetic disk, and a Random-Access Memory (RAM) 260 are further coupled via signal bus 235 to CPU 210. The communications interface 240 is coupled to a communications channel 110 as shown in FIG. 1.
  • An operating system 270 includes a program for controlling processing by CPU 210, and is typically stored in data storage device 250 and loaded into RAM 260 (as shown) for execution. Operating system 270 further includes a communications engine 275 for generating and transferring message packets via the communications interface 240 to and from the communications channel 110. Operating system 270 further includes an Operating System (OS) configuration module 278, which configures the operating system 270 based on OS configuration data 356 (FIG. 3) such as Transmission Control Protocol (TCP) data, Domain Name Server (DNS) addresses, etc. received from the global server 115.
  • Operating system 270 further includes the web engine 140 for communicating with the global-server 115. The web engine 140 may include a web engine (WE) configuration module 286 for configuring elements of the webengine 140 such as home page addresses, bookmarks, caching data, user preferences, etc. based on the configuration data 356 received from the global server 115. The web engine 140 may also include an encryption engine 283 for using encryption techniques to communicate with the global server 115. The web engine 140 further may include an applet engine 290 for handling the execution of downloaded applets including applets for providing security. The applet engine 290 may include an Applet Engine (AE) configuration module 295 for configuring the elements of the applet engine 290 based on configuration data 356 received from the global server 115.
  • FIG. 3 is a block diagram illustrating details of the global server 115, which includes a Central Processing Unit (CPU) 310 such as a Motorola Power PC™ microprocessor or an Intel Pentium™ microprocessor. An input device 320 such as a keyboard and mouse, and an output device 330 such as a Cathode Ray Tube (CRT) display are coupled via a signal bus 335 to CPU 310. A communications interface 340, a data storage device 350 such as Read Only Memory (ROM) and a magnetic disk, and a Random-Access Memory (RAM) 370 are further coupled via signal bus 335 to CPU 310. As shown in FIG. 1, the communications interface 340 is coupled to the communication: channel 110 and to the communications channel 120.
  • An operating system 380 includes a program for controlling processing by CPU 310, and is typically stored in data storage device 350 and loaded into RAM 370 (as illustrated) for execution. The operating system 380 further includes a communications engine 382 for generating and transferring message packets via the communications interface 340 to and from the communications channel 345. The operating system 380 also includes a web page engine 398 for transmitting web page data 368 to the remote terminal 105, so that the remote terminal 105 can display a web page 900 (FIG. 9) listing functionality offered by the global server 115. Other web page data 368 may include information for displaying security method selections.
  • The operating system 380 may include an applet host engine 395 for transmitting applets to the remote terminal 105. A configuration engine 389 operates in conjunction with the applet host engine 395 for transmitting configuration applets 359 and configuration and user data 356 to the remote terminal 105. The remote terminal 105 executes the configuration applets 359 and uses the configuration and user data 356 to configure the elements (e.g., the operating system 270, the web engine 140 and the applet engine 290) of the remote terminal 105. Configuration and user data 356 is described in greater detail with reference to FIG. 6.
  • The operating system 380 also includes the synchronization agent 145 described with reference to FIG. 1. The synchronization agent 145 synchronizes the workspace data 163 on the global server 115 with the workspace data 180 on the client 165. As stated above with reference to FIG. 1, the global translator 150 translates between format A used by the client 165 and the global format used by the global server 115.
  • The operating system 380 may also includes a security engine 392 for determining whether to instruct a communications engine 382 to create a secure communications link with a client 165 or terminal 105, and for determining the access rights of the user. For example, the security engine 392 forwards to the client 165 or remote terminal 105 security applets 362, which when executed by the receiver poll the user and respond back to the global server 115. The global server 115 can examine the response to identify and authenticate the user.
  • For example when a client 165 attempts to access the global server 115 the security engine 384 determines whether the global server 115 accepts in-bound communications from a particular port. If so, the security engine 392 allows the communications engine 382 to open a communications channel 345 to the client 165. Otherwise, no channel will be opened. After a channel is opened, the security engine 392 forwards an authentication security applet 362 to the remote terminal 105 to poll the user for identification and authentication information such as for a user ID and a password. The authentication security applet 362 will generate and forward a response back to the global server 115, which will use the information to verify the identity of the user and provide access accordingly.
  • It will be appreciated that a “request-servicing engine” may be the configuration engine 389 and the applet host engine 395 when providing services to a remote terminal 105 or client 165. The request-servicing engine may be the web page engine 398 when performing workspace data 163 retrieval operations directly from the global server 115. The request-servicing engine may be the configuration engine 389 and the applet host engine 395 when performing workspace data 180 retrieval operations from the client 165 or from any other site connected, to the global server 115. The request-servicing engine may be security engine 392 when performing security services such as user identification and authentication. The request-servicing engine may be the synchronization agent when the performing synchronization with the client 165. Further, the request-servicing engine may be any combination of these components.
  • FIG. 4 is a block diagram illustrating details of the synchronization agent 145, which includes a communications module 405 and a general synchronization module 410. The communications module 405 includes routines for compressing data and routines for communicating via the communications channel 120 with the base system 170. The communications module 405 may further include routines for communicating securely channel through the global firewall 130 and through the LAN firewall 125.
  • The general synchronization module 410 includes routines for determining whether workspace elements have been synchronized and routines for forwarding to the base system 170 version information (not shown) of elements determined to be modified after last synchronization. The general synchronization module 410 may either maintain its own last synchronization signature (not shown), receive a copy of the last synchronization signature with the request to synchronize from the base system 170, or any other means for insuring that the workspace data has been synchronized. The general synchronization module 410 further includes routines for receiving preferred versions of workspace data 180 workspace elements from the base system 170, and routines for forwarding preferred versions of workspace data 180 workspace elements to the base system 170.
  • FIG. 5 illustrates an example bookmark workspace element in the global format. The translator 150 incorporates all the information needed to translate between all incorporated formats. For example, if for a first client a bookmark in format A needs elements X, Y and Z and for a second client a bookmark in format B needs elements W, X and Y, the global translator 150 incorporates elements W, X, Y and Z to generate a bookmark in the global format. Further, the translator 150 incorporates the information which is needed by the synchronization means (as described below in FIG. 4) such as the last modified date. Accordingly, a bookmark in the Global Format may include a user identification (ID) 505, an entry ID 510, a parent ID 515, a folder ID flag 520, a name 525, a description 530, the Uniform Resource Locator (URL) 535, the position 540, a deleted ID flag 545, a last modified date 550, a created date 555 and a separation ID flag 560.
  • FIG. 6 is a block diagram illustrating details of the configuration and user data 356. Configuration data 356 includes settings 605 such as TCP data and the DNS address, web browser settings such as home page address, bookmarks and caching data, applet engine settings, and applet configuration data such as the user's e-mail address, name and signature block. It will be appreciated that applet-specific configuration and user data 356 is needed, since the service may not be located on the user's own local client 165. Configuration and user data 356 further includes predetermined user preferences 610 such as font, window size, text size, etc.
  • Configuration data 356 further includes the set of services 615, which will be provided to the user. Services 615 include a list of registered users and each user's list of user-preferred available services 615. Services may also include a list of authentication levels needed to access the services 615. Configuration and user data 137 further includes service addresses 620 specifying the location of each of the services 615 accessible via the global server 115.
  • FIG. 7 is a block diagram illustrating details of the client 165, which includes a CPU 705, an input device 710, an output device 725, a communications interface 710, a data storage device 720 and RAM 730, each coupled to a signal bus 740.
  • An operating system 735 includes a program for controlling processing by the CPU 705, and is typically stored in the data storage device 720 and loaded into the RAM 730 (as illustrated) for execution. A service engine 175 includes a service program for managing workspace data 180 that includes version information (not shown). The service engine 175 maybe also stored in the data storage device 720 and loaded into the RAM 730 (as illustrated) for execution. The workspace data 180 may be stored in the data storage device 330. As stated above with reference to FIG. 1, the base system 170 operates to synchronize the workspace data 180 on the client 165 with the workspace data 163 on the global server 115. The base system 170 may be also stored in the data storage device 720 and loaded into the RAM 730 (as shown) for execution. The base system 170 is described in greater detail with reference to FIG. 8.
  • FIG. 8 is a block diagram illustrating details of the base system 170, which includes a communications module 805, a user interface module 810, locator modules 815, a synchronization-start (“synch-start”) module 820, a general synchronization module 825 and a content-based synchronization module 830. For simplicity, each module is illustrated as communicating with one another via a signal bus 840. It will be appreciated that the base system 170 includes the same components as included in the synchronization agent 145.
  • The communications module 805 includes routines for compressing data, and routines for communicating via the communications interface 710 (FIG. 7) with the synchronization agent 145 (FIG. 1). The communications module 805 may include routines for applying Secure Socket Layer (SSL) technology and user identification and authentication techniques (i.e., digital certificates) to establish a secure communication channel through the LAN firewall 135 and through the global firewall 130. Because synchronization is initiated from within the LAN firewall 135 and uses commonly enabled protocols such as HyperText Transfer Protocol (HTTP), the typical firewall 135 which prevents in-bound communications in general and some outbound protocols does not act as an impediment to e-mail synchronization. Examples of communications modules 805 may include TCP/IP stacks or the AppleTalk™ protocol.
  • The user interface 810 includes routines for communicating with a user, and may include a conventional Graphical User Interface (GUI). The user interface 810 operates in coordination with the client 165 components as described herein.
  • The locator modules 815 include routines for identifying the memory locations of the workspace elements in the workspace data 180 and the memory locations of the workspace elements in the workspace data 163. Workspace element memory location identification may be implemented using intelligent software, i.e., preset memory addresses or the system's registry, or using dialogue boxes to query a user. It will be appreciated that the locator modules 815 may perform workspace element memory location identification upon system boot-up or after each communication with the global server 115 to maintain updated memory locations of workspace elements.
  • The synchronization-start module 820 includes routines for determining when to initiate synchronization of workspace data 163 and workspace data 180. For example, the synchronization-start module 820 may initiate data synchronization upon user request, at a particular time of day, after a predetermined time period passes, after a predetermined number of changes, after a user action such as user log-off or upon like criteria. The synchronization-start module 820 initiates data synchronization by instructing the general synchronization module 825 to begin execution of its routines. It will be appreciated that communications with synchronization agent 145 preferably initiate from within the LAN 125, because the typical LAN firewall 125 prevents in-bound communications and allows out-bound communications.
  • The general synchronization module 825 includes routines for requesting version information from the synchronization agent 145 (FIG. 1) and routines for comparing the version information against a last synchronization signature 835 such as a last synchronization date and time to determine which versions have been modified. The general synchronization module 825 further includes routines for comparing the local and remote versions to determine if only one or both versions of a particular workspace element have been modified and routines for performing an appropriate synchronizing responsive action. Appropriate synchronizing responsive actions may include forwarding the modified version (as the preferred version) of a workspace element in workspace data 180 or forwarding just a compilation of the changes to the other store(s). Other appropriate synchronizing responsive actions may include, if reconciliation between two modified versions is needed, then instructing the content-based synchronization module 830 to execute its routines (described below).
  • It will be appreciated that the synchronization agent 145 preferably examines the local version information 124 and forwards only the elements that have been modified since the last synchronization signature 835. This technique makes efficient use of processor power and avoids transferring unnecessary data across the communications channel 712. The general synchronization module 825 in the LAN 135 accordingly compares the data elements to determine if reconciliation is needed. Upon completion of the data synchronization, the general synchronization module 825 updates the last synchronization signature 835.
  • The content-based synchronization module 830 includes routines for reconciling two or more modified versions of workspace data 163, 180 in the same workspace element. For example, if the original and the copy of a user workspace element have both been modified independently since the last synchronization, the content-based synchronization module 830 determines the appropriate responsive action. The content-based synchronization module 830 may request a user to select the preferred one of the modified versions or, may respond based on preset preferences, i.e., by storing both versions in both stores or by integrating the changes into a single preferred version which replaces each modified version at both stores. When both versions are stored at both stores, each version may include a link to the other version so that the user may be advised to select the preferred version.
  • It will be appreciated that any client 165 that wants synchronization may have a base system 170. Alternatively, one base system 170 can manage multiple clients 165. It will be further appreciated that for a thin client 165 of limited computing power such as a smart telephone, all synchronization may be performed by the global server 115. Accordingly, components of the base system 170 such as the user interface module 810, the locator modules 815, the general synchronization module 825 and the content-based synchronization module 830 may be located on the global server 115. To initiate synchronization from the client 165, the client 165 includes the communications module 805 and the synch-start module 820.
  • FIG. 9 illustrates an example list 900 of accessible services provided by a URL addressable HyperText Markup Language (HTML)-based web page, as maintained by the web page engine 398 of the global server 115. The list 900 includes a title 910 “Remote User's Home Page,” a listing of the provided services 615 and a pointer 970 for selecting one of the provided services 615. As illustrated, the provided services may include an e-mail service 920, a calendaring service 930, an internet access service 940, a paging service 950, a fax sending service 960, a user authentication service 963 and a workspace data retrieval service 967. Although not shown, other services 615 such as bookmarking, QuickCard™, etc. may be included in the list 900. Although the web page provides the services 615 in a list 900, other data structures such as a pie chart or table may alternatively be used.
  • FIG. 10 is a flowchart illustrating a method 1000 for enabling a user to access the services 615 in the computer network system 100. Method 1000 begins by the remote terminal 105 in step 1005 creating a communications link with the global server 115. The global server 115 in step 1010 confirms that the user has privileges to access the functionality of the global server 115. Confirming user access privileges may include examining a user certificate, obtaining a secret password, using digital signature technology, performing a challenge/response technique, etc. It will be appreciated that the security engine 392 may cause the applet host engine 395 to forward via the communications channel 345 to the remote terminal 105 an authentication security applet 362 which when executed communicates with the global server 115 to authenticate the user.
  • After user access privileges are confirmed, the web page engine 398 of the global server 115 in step 1015 transmits web page data 368 and configuration and user data 356 to the remote terminal 105. The web engine 140 of the remote terminal 105 in step 1020 uses the web page data 368 and the configuration and user data 356 to display a web page service list 900 (FIG. 9) on the output device 230, and to enable access to the services 615 which the global server 115 offers. An example service list 900 is shown and described with reference to FIG. 9. Configuration of the remote terminal 105 and of the web page 700 is described in detail in the cross-referenced patent applications.
  • From the options listed on the web page 900, the user in step 1025 selects a service 615 via input device 220. In response, the request-servicing engine (described with reference to FIG. 3) provides the selected service 615. For example, the applet host engine 395 of the global server 115 in step 1030 may download to the remote terminal 105 a corresponding applet 359 and configuration and user data 356 for executing the requested service 615. Alternatively, the web page engine 398 may use, for example, HTTP and HTML to provide the selected service 615. As described above with reference to FIG. 6, the configuration and user data 356 may include user-specific preferences such as user-preferred fonts for configuring the selected service 615. Configuration and user data 356 may also include user-specific and service-specific information such as stored bookmarks, calendar data, pager numbers, etc. Alternatively, the corresponding applet 359 and the configuration and user data 356 could have been downloaded instep 1015. Providing access to the service by an applet 359 is described in greater detail below with reference to FIGS. 12-14.
  • The applet engine 290 of the remote terminal 105 in step 1035 initiates execution of the corresponding downloaded applet. The global server 115 in step 1040 initiates the selected service 615 and in step 1045 selects one of three modes described with reference to FIGS. 12-14 for accessing the service 615. For example, if the user selects a service 615 on a service server (e.g., the client 165) that is not protected by a separate firewall, then the global server 115 may provide the user with direct access. If the user selects a service 615 provided by a service server within the LAN 125, then the global server 115 may access the service 615 as a proxy for the user. It will be appreciated that each firewall 130 and 135 may store policies establishing the proper mode of access the global server 115 should select. Other factors for selecting mode of access may include user preference, availability and feasibility. The global server 115 in step 1050 uses the selected mode to provide the remote terminal 105 user with access to the selected service 615.
  • FIG. 11 is a flowchart illustrating details of step 1005, which begins by the remote terminal 105 in step 1105 using a known Uniform Resource Locator (URL) to call the global server 115. The global server 115 and the remote terminal 105 in step 1107 create a secure communications channel therebetween, possibly by applying Secure Sockets Layer (SSL) technology. That is, the security engine 392 of the global server 115 in step 1110 determines if in-bound secure communications are permitted and, if so, creates a communications channel with the remote terminal 105. The web engine 140 of the remote terminal 105 and the security engine 392 of the global server 115 in step 11 15 negotiate secure communications channel parameters, possibly using public key certificates. An example secure communications channel is RSA with RC4 encryption. Step 1115 thus may include selecting an encryption protocol which is known by both the global server 115 and the remote terminal 105. The encryption engine 283 of the remote terminal 105 and secure communications engine 392 of the global server 115 in step 1120 use the secure channel parameters to create the secure communications channel. Method 505 then ends.
  • FIG. 12 is a flowchart illustrating details of step 1050 in a first embodiment, referred to as step 1050 a, wherein the global server 115 provides the remote terminal 105 with a direct connection to a service 615. Step 1050 a begins by the applet engine 290 in step 1205 running a configuration applet 359 for the selected service 615 that retrieves the service address 620 from data storage device 380 and the authentication information from the keysafe 365. The communications interface 340 in step 1210 creates a direct and secure connection with the communications interface 340 of the global server 115 at the retrieved service address 620, and uses the authentication information to authenticate itself. The applet in step 1215 acts as the I/O interface with the service 615. Step 1050 a then ends.
  • FIG. 13 is a flowchart illustrating details of step 1050 in a second embodiment, referred to as step 1050 b, wherein the global server 115 acts for the remote terminal 105 as a proxy to the service 615. Step 1050 b begins with a configuration applet 359 in step 1305 requesting the service address 620 for the selected service 615, which results in retrieving the service address 620 directing the applet 359 to the global server 115. The applet 359 in step 1310 creates a connection with communications interface 340 of the global server 115. The global server 115 in step 1315 retrieves the service address 620 of the selected service 615 and the authentication information for the selected service 615 from the keysafe 365. The communications interface 340 of the global server 115 in step 1320 negotiates secure channel parameters for creating a secure channel with the service server 1014. The communications interface 340 in step 1320 also authenticates itself as the user.
  • Thereafter, the applet 359 in step 1325 acts as the I/O interface with the communications interface 340 of the global server 115. If the global server 115 in step 1330 determines that it is unauthorized to perform a remote terminal 105 user's request, then the global server 115 in step 1345 determines whether the method 1050 b ends, e.g., whether the user has quit. If so, then method 1050 b ends. Otherwise, method 1050 b returns to step 1325 to obtain another request. If the global server 115 in step 1330 determines that it is authorized to perform the remote terminal 105 user's request, then the global server 115 in step 1340 acts as the proxy for the remote terminal 105 to the service 615. As proxy, the global server 115 forwards the service request to the selected service 615 and forwards responses to the requesting applet 359 currently executing on the remote terminal 105. Method 1050 b then jumps to step 1345.
  • FIG. 14 is a flowchart illustrating details of step 1050 in a third embodiment, referred to as step 1050 c, wherein the service 615 being requested is located on the global server 115. Step 1050 begins with an applet in step 1405 retrieving the service address 620 for the selected service 615, which results in providing the configuration applet 359 with the service address 620 of the service 615 on the global server 115. Thus, the applet in step 1410 creates a secure connection with the global server 115. No additional step of identification and authentication is needed since the remote terminal 105 has already identified and authenticated itself to the global server 115 as described with reference to step 1010 of FIG. 10.
  • In step 1415, a determination is made whether the service 615 is currently running. If so, then in step 1425 a determination is made whether the service 615 can handle multiple users. If so, then the global server 115 in step 1430 creates an instance for the user, and the applet in step 1440 acts as the I/O interface with the service 615 on the global server 115. Method 1050 c then ends. Otherwise, if the service 615 in, step 1425 determines that it cannot handle multiple users, then method 1050 c proceeds to step 1440. Further, if in step 1415 the global server 115 determines that the service 615 is not currently running, then the global server 115 in step 1420 initializes the service 615 and proceeds to step 1425.
  • FIG. 15 is a flowchart illustrating a method 1500 for using a global translator 150 to synchronize workspace data 163 and workspace data 180 in a secure network 100. Method 1500 begins with the user interface 900 in step 1505 enabling a user to select workspace elements of workspace data 163 and workspace data 180 for the synchronization means to synchronize. The locator modules 815 in step 1510 identify the memory locations of the workspace elements in workspace data 163 and workspace data 180. If a selected workspace element does not have a corresponding memory location, such as in the case of adding new workspace elements to the global server 115, then one is selected. The selected memory location may be a preexisting workspace element or a new workspace element. As stated above, workspace element memory location identification may be implemented using intelligent software or dialogue boxes. The general synchronization module 825 in step 1515 sets the previous status of the workspace elements equal to the null set, which indicates that all information of the workspace element has been added.
  • The synchronization-start module 820 in step 1520 determines whether predetermined criteria have been met which indicate that synchronization of the workspace elements selected in step 1505 should start. If not, then the synchronization-start module 820 in step 1525 waits and loops back to step 1520. Otherwise, the communications module 805 and the communications module 405 in step 1530 establish a secure communications channel therebetween.
  • The general synchronization module 825 in step 1535 determines whether any workspace elements have been modified. That is, the general synchronization module 825 in step 1535 examines the version information of each selected workspace element in the workspace data 180 against the last synchronization signature 435 to locate modified workspace elements. This comparison may include comparing the date of last modification with the date of last synchronization, or may include a comparison between the current status and the previous status as of the last interaction. Similarly, the general synchronization module 815 examines the version information of each corresponding workspace element in workspace data 163 and the last synchronization signature 435 to locate modified workspace elements.
  • If in step 1535 no modified workspace elements or folders are located, then the general synchronization module 825 in step 1560 updates the last synchronization signature 435 and method 1500 ends. Otherwise, the general synchronization module 825 in step 1540 determines whether more than one version of a workspace element has been modified since the last synchronization.
  • If only one version has been modified, then the corresponding general synchronization module 825 in step 1545 determines the changes made. As stated above, determining the changes made may be implemented by comparing the current status of the workspace element against the previous status of the workspace element as of the last interaction therebetween. If the changes were made only to the version in the workspace data 163, then the global translator 150 in step 1550 translates the changes to the format used by the other store, and the general synchronization module 410 in step 1555 forwards the translated changes to the general synchronization module 825 for updating the outdated workspace element in the workspace data 180. If the updated version is a workspace element in the workspace data 180, then the general synchronization module 825 sends the changes to the updated version to the global translator 150 for translation and then to the general synchronization module 410 for updating the outdated workspace element in the workspace data 163. The general synchronization module 825 and the general synchronization module 410 in step 1557 update the previous state of the workspace element to reflect the current state as of this interaction. Method 1500 then returns to step 1535.
  • If the general synchronization module 825 in step 1540 determines that multiple versions have been modified, then the general synchronization module 825 in step 1565 computes the changes to each version and in step 1570 instructs the content-based synchronization module 830 to examine content to determine if any conflicts exist. For example, the content-based synchronization module 830 may determine that a conflict exists if a user deletes a paragraph in one version and modified the same paragraph in another version. The content-based synchronization module 830 may determine that a conflict does not exist if a user deletes different paragraphs in each version. If no conflict is found, then method 1500 jumps to step 1550 for translating and forwarding the changes in each version to the other store. However, if a conflict is found, then the content-based synchronization module 830 in step 1575 reconciles the modified versions. As stated above, reconciliation may include requesting instructions from the user or based on previously selected preferences performing responsive actions such as storing both versions at both stores. It will be appreciated that a link between two versions may be placed in each of the two versions, so that the user will recognize to examine both versions to select the preferred version. Method 1500 then proceeds to step 1550.
  • It will be further appreciated that in step 1510 new workspace elements and preexisting workspace elements to which new workspace elements will be merged are set to “modified” and the previous status is set to the null set. Thus, the general synchronization module 825 in step 1540 will determine that more that one version has been modified and the content-based synchronization module 830 in step 1570 will determine that no conflict exists. The changes in each will be translated and forwarded to the other store. Accordingly, the two versions will be effectively merged and stored at each store.
  • For example, if a first bookmark folder was created by the web engine 140 on the client 165, a second folder was created by a web engine 140 on the remote terminal 105, no preexisting folder existed on the global server 115 and the user selected each of these folders for synchronization, then the synchronization means will effectively merge the first and second folders. That is, the general synchronization module 825 on the client 165 will determine that the first folder has been modified and the previous status is equal to the null set. The general synchronization module 825 will determine and send the changes, i.e., all the workspace elements in the first folder, to a new global folder on the global server 115. Similarly, the general synchronization module (not shown) on the remote terminal 105 will determine that, as of its last interaction, the previous status of each of the second and the global folders is the null set. The general synchronization module 825 will instruct the content-based synchronization module 830 to examine the changes made to each folder to determine whether a conflict exists. Since no conflicts will exist, the general synchronization module 825 will forward the changes to the global folder and the general synchronization module 410 will forward its changes to the second store, thereby merging the workspace elements of the first and second folders in the global and second folders. The general synchronization module 410 will inform the general synchronization module 825 that the global folder has been modified relative to the last interaction, and will forward the new changes to the first folder. Thus, the first and second folders will be merged and stored at each store.
  • The foregoing description of the preferred embodiments of the invention is by way of example only, and other variations of the above-described embodiments and methods are provided by the present invention. For example, a server can be any computer which is polled by a client. Thus, the remote terminal 105 may be referred to as a type of client. Although the system and method have been described with reference to applets, other downloadable executables such as Java™ applets, Java™ applications or ActiveX™ control developed by the Microsoft Corporation can alternatively be used. Components of this invention may be implemented using a programmed general-purpose digital computer, using application specific integrated circuits, or using a network of interconnected conventional components and circuits. The embodiments described herein have been presented for purposes of illustration and are not intended to be exhaustive or limiting. Many variations and modifications are possible in light of the foregoing teaching. The invention is limited only by the following claims.

Claims (80)

1. A smartphone comprising:
a communications interface to communicate via one or more Internet communications channels;
a service engine configured to contact a global server via an Internet communications channel using the communications interface to retrieve configuration data to configure the service engine with a selectable set of downloadable executables, the selectable set of downloadable executables including at least one service access downloadable executable;
a display to present at least some of the selectable set of downloadable executables on the smartphone; and
an input device to select a service access downloadable executable from the selectable set of downloadable executables,
wherein the service engine is configured to download the selected service access downloadable executable via an Internet communications channel using the communications interface, the downloaded service access downloadable executable being operative to access a service server from the smartphone via an Internet communications channel using the communications interface.
2. The smartphone of claim 1, wherein said service server is located on a computing device remote from said global server.
3. The smartphone of claim 1, wherein said service server provides a workspace retrieval service enabling retrieval of a workspace element of a selected type.
4. The smartphone of claim 1, wherein the selectable set of downloadable executables is presented as a list on said smartphone.
5. The smartphone of claim 1, wherein the selectable set of downloadable executables includes one or more downloadable executables enabling retrieval of workspace elements of two or more types.
6. The smartphone of claim 1, wherein the smartphone is arranged to communicate via the Internet to synchronize, with a locally stored workspace element, a workspace element of a selected type which has been transmitted from another computing device via an Internet communications channel using the communications interface.
7. The smartphone of claim 6, wherein the smartphone is configured using the selected service access downloadable executable to access a service provided by the other computing device via an Internet communications channel using the communications interface.
8. The smartphone of claim 1, wherein the selected service access downloadable executable is downloaded from the global server.
9. The smartphone of claim 1, wherein the smartphone is further configured to access said service server on the basis of further configuration data provided by said global server.
10. The smartphone of claim 1, wherein said service server is a component of the global server.
11. The smartphone of claim 1, wherein said service server is a component of a computing device remote from said global server.
12. The smartphone of claim 1, wherein said service server provides a user authentication service.
13. The smartphone of claim 1, wherein the selectable set of downloadable executables includes at least a subset of available downloadable executables, said subset being selected based on user identity.
14. The smartphone of claim 1, wherein the smartphone is configured to receive responses from said service server via the global server acting as a proxy for the smartphone.
15. The smartphone of claim 1, wherein the smartphone is configured to access said service server by retrieving a service address of the service server from the global server.
16. The smartphone of claim 1, wherein the smartphone is configured to access said service server by sending service requests, and receiving responses to said service requests, via an Internet communications channel using the communications interface.
17. The smartphone of claim 1, wherein the smartphone is configured to synchronize with a further computing device at a third site via an Internet communications channel using the communications interface.
18. The smartphone of claim 17, wherein the smartphone is configured to synchronize with the further computing device in relation to e-mail workspace data.
19. The smartphone of claim 17, wherein the smartphone is configured to synchronize with the further computing device at the third site in relation to calendar workspace data.
20. The smartphone of claim 17, wherein the smartphone is configured to access the further computing device in a LAN protected by a firewall when the smartphone is outside the protection of the firewall.
21. A method of accessing services using a smartphone, the method comprising:
contacting a global server via an Internet communications channel using a communications interface to retrieve configuration data to configure the smartphone with a selectable set of downloadable executables, the selectable set of downloadable executables including at least one service access downloadable executable;
presenting at least some of the selectable set of downloadable executables on a display on the smartphone;
selecting a service access downloadable executable from the selectable set; and
downloading the selected service access downloadable executable via an Internet communications channel using the communications interface, the downloaded service access downloadable executable being operative to access a service server from the smartphone via an Internet communications channel using the communications interface.
22. The method of claim 21, wherein said service server is located on a computing device remote from the global server.
23. The method of claim 21, wherein said service server provides a workspace retrieval service enabling retrieval of a workspace element of a selected type.
24. The method of claim 21, wherein the selectable set of downloadable executables is presented as a list on said smartphone.
25. The method of claim 21, wherein the selectable set of downloadable executables includes one or more downloadable executables enabling retrieval of workspace elements of two or more types.
26. The method of claim 21, comprising communicating via the Internet to synchronize, with a workspace element stored locally on the smartphone, a workspace element of a selected type which has been transmitted from another computing device via an Internet communications channel using the communications interface.
27. The method of claim 26, comprising using the selected service access downloadable executable to access a service provided by the other computing device via an Internet communications channel using the communications interface.
28. The method of claim 21, comprising downloading the selected service access downloadable executable from the global server.
29. The method of claim 21, comprising accessing said service server via the selected service access downloadable executable on the basis of further configuration data provided by said global server.
30. The method of claim 21, wherein said service server is comprised in said global server.
31. The method of claim 21, wherein said service server is comprised in a computing device remote from said global server.
32. The method of claim 21, wherein said service server provides a user authentication service.
33. The method of claim 21, wherein the selectable set of downloadable executables includes at least a subset of available downloadable executables, said subset being based on user identity.
34. The method of claim 21, comprising receiving responses from said service server via the global server acting as a proxy for the smartphone.
35. The method of claim 21, comprising accessing said service server by retrieving a service address of the service server from the global server.
36. The method of claim 21, comprising sending service requests to said service server, and receiving responses to said service requests, via an Internet communications channel using the communications interface.
37. The method of claim 21, further comprising conducting synchronization at said smartphone with respect to a further computing device at a third site via an Internet communications channel using the communications interface.
38. The method of claim 37, comprising conducting synchronization of e-mail workspace data on said smartphone with respect to said further computing device.
39. The method of claim 37, comprising conducting synchronization of calendar data with respect to said further computing device.
40. The method of claim 37, comprising the smartphone accessing the further computing device in a LAN protected by a firewall when the smartphone is outside the protection of the firewall.
41. A computer readable storage medium storing computer readable instructions thereon for execution on a smartphone computing device to implement a method of accessing services by the smartphone computing device, the computer readable instructions, when executed on a processor in the smartphone, causing the processor to perform the method comprising:
contacting a global server via an Internet communications channel using a communications interface to retrieve configuration data to configure the smartphone with a selectable set of downloadable executables, the selectable set of downloadable executables including at least one service access downloadable executable;
presenting at least some of the selectable set of downloadable executables on a display on the smartphone;
selecting a service access downloadable executable from the selectable set; and
downloading the selected service access downloadable executable via an Internet communications channel using the communications interface, the downloaded service access downloadable executable being operative to access a service server from the smartphone via an Internet communications channel using the communications interface.
42. The computer readable storage medium of claim 41, wherein said service server is located on a computing device remote from the global server.
43. The computer readable storage medium of claim 41, wherein said service server provides a workspace retrieval service enabling retrieval of a workspace element of a selected type.
44. The computer readable storage medium of claim 41, wherein the selectable set of downloadable executables is presented as a list on said smartphone.
45. The computer readable storage medium of claim 41, wherein the selectable set of downloadable executables includes one or more downloadable executables enabling retrieval of workspace elements of two or more types.
46. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to communicate via the Internet to synchronize, with a workspace element stored locally on the smartphone, a workspace element of a selected type which has been transmitted from another computing device via an Internet communications channel using the communications interface.
47. The computer readable storage medium of claim 46, wherein the computer readable instructions cause the processor to use the selected service access downloadable executable to access a service provided by the other computing device via an Internet communications channel using the communications interface.
48. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to download the selected service access downloadable executable from the global server.
49. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to access said service server via the selected service access downloadable executable on the basis of further configuration data provided by said global server.
50. The computer readable storage medium of claim 41, wherein said service server is comprised in said global server.
51. The computer readable storage medium of claim 41, wherein said service server is comprised in a computing device remote from said global server.
52. The computer readable storage medium of claim 41, wherein said service server provides a user authentication service.
53. The computer readable storage medium of claim 41, wherein the selectable set of downloadable executables includes at least a subset of available downloadable executables, said subset being selected based on user identity.
54. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to receive responses from said service server via the global server acting as a proxy for the smartphone.
55. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to access said service server by retrieving a service address of the service server from the global server.
56. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to send service requests to said service server, and to receive responses to said service requests, via an Internet communications channel using the communications interface.
57. The computer readable storage medium of claim 41, wherein the computer readable instructions cause the processor to conduct synchronization at said smartphone with respect to a further computing device at a third site via an Internet communications channel using the communications interface.
58. The computer readable storage medium of claim 57, wherein the computer readable instructions cause the processor to conduct synchronization of e-mail workspace data on said smartphone with respect to said further computing device.
59. The computer readable storage medium of claim 57, wherein the computer readable instructions cause the processor to conduct synchronization of calendar data with respect to said further computing device.
60. The computer readable storage medium of claim 57, wherein the computer readable instructions cause the processor to access the further computing device in a LAN protected by a firewall when the smartphone is outside the protection of the firewall.
61. A service access system comprising a global server and one or more smartphones, the global server providing access to downloadable executables by each of said smartphones, wherein each of said smartphones comprises:
a communications interface to communicate via one or more Internet communications channels;
a service engine configured to contact the global server via an Internet communications channel using the communications interface to retrieve configuration data to configure the service engine with a selectable set of downloadable executables, the selectable set of downloadable executables including at least one service access downloadable executable;
a display to present at least some of the selectable set of downloadable executables on the smartphone; and
an input device to select a service access downloadable executable from the selectable set,
wherein the service engine is configured to download the selected service access downloadable executable via an Internet communications channel using the communications interface, the downloaded service access downloadable executable being operative to access a service server from the smartphone via an Internet communications channel using the communications interface.
62. The service access system of claim 61, wherein said service server is located on a computing device remote from said global server.
63. The service access system of claim 61, wherein said service server provides a workspace retrieval service enabling retrieval of a workspace element of a selected type.
64. The service access system of claim 61, wherein the selectable set of downloadable executables is presented as a list on said smartphone.
65. The service access system of claim 61, wherein the selectable set of downloadable executables includes one or more downloadable executables enabling retrieval of workspace elements of two or more types.
66. The service access system of claim 61, wherein the smartphone is arranged to communicate via the Internet to synchronize, with a locally stored workspace element, a workspace element of a selected type which has been transmitted from another computing device via an Internet communications channel using the communications interface.
67. The service access system of claim 66, wherein the smartphone is configured using the selected service access downloadable executable to access a service provided by the other computing device via an Internet communications channel using the communications interface.
68. The service access system of claim 61, wherein the global server stores a plurality of service access downloadable executables, each being operative to access a service server from the smartphone via the Internet communications channel, and wherein the selected service access downloadable executable is downloaded from the global server.
69. The service access system of claim 61, wherein the smartphone is further configured to access said service server on the basis of further configuration data provided by said global server.
70. The service access system of claim 61, wherein said service server is a component of the global server.
71. The service access system of claim 61, wherein said service server is a component of a computing device remote from said global server.
72. The service access system of claim 61, wherein said service server provides a user authentication service.
73. The service access system of claim 61, wherein the selectable set of downloadable executables includes at least a subset of available downloadable executables, said subset being selected based on user identity.
74. The service access system of claim 61, wherein the smartphone is configured to receive responses from said service server via the global server acting as a proxy for the smartphone.
75. The service access system of claim 61, wherein the smartphone is configured to access said service server by retrieving a service address of the service server from the global server.
76. The service access system of claim 61, wherein the smartphone is configured to access said service server by sending service requests, and receiving responses to said service requests, via an Internet communications channel using the communications interface.
77. The service access system of claim 61, wherein the smartphone is configured to synchronize with a further computing device at a third site via an Internet communications channel using the communications interface.
78. The service access system of claim 77, wherein the smartphone is configured to synchronize with the further computing device in relation to e-mail workspace data.
79. The service access system of claim 77, wherein the smartphone is configured to synchronize with the further computing device at the third site in relation to calendar workspace data.
80. The service access system of claim 77, wherein the smartphone is configured to access the further computing device in a LAN protected by a firewall when the smartphone is outside the protection of the firewall.
US12/575,387 1996-12-13 2009-10-07 System and method for globally and securely accessing unified information in a computer network Abandoned US20100023630A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/575,387 US20100023630A1 (en) 1996-12-13 2009-10-07 System and method for globally and securely accessing unified information in a computer network
US13/038,801 US9361603B2 (en) 1996-12-13 2011-03-02 System and method for globally and securely accessing unified information in a computer network

Applications Claiming Priority (10)

Application Number Priority Date Filing Date Title
US08/766,307 US6131116A (en) 1996-12-13 1996-12-13 System and method for globally accessing computer services
US08/841,950 US7287271B1 (en) 1997-04-08 1997-04-08 System and method for enabling secure access to services in a computer network
US08/835,997 US6085192A (en) 1997-04-11 1997-04-11 System and method for securely synchronizing multiple copies of a workspace element in a network
US08/865,075 US6023708A (en) 1997-05-29 1997-05-29 System and method for using a global translator to synchronize workspace elements across a network
US90311897A 1997-07-30 1997-07-30
US09/666,877 US6708221B1 (en) 1996-12-13 2000-09-20 System and method for globally and securely accessing unified information in a computer network
US10/741,113 US7039679B2 (en) 1996-12-13 2003-12-19 System and method for globally and securely accessing unified information in a computer network
US11/340,083 US20060195595A1 (en) 2003-12-19 2006-01-25 System and method for globally and securely accessing unified information in a computer network
US12/480,500 US8745167B2 (en) 1996-12-13 2009-06-08 System and method for globally and securely accessing unified information in a computer network
US12/575,387 US20100023630A1 (en) 1996-12-13 2009-10-07 System and method for globally and securely accessing unified information in a computer network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/480,500 Continuation US8745167B2 (en) 1996-12-13 2009-06-08 System and method for globally and securely accessing unified information in a computer network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/038,801 Continuation US9361603B2 (en) 1996-12-13 2011-03-02 System and method for globally and securely accessing unified information in a computer network

Publications (1)

Publication Number Publication Date
US20100023630A1 true US20100023630A1 (en) 2010-01-28

Family

ID=36933085

Family Applications (6)

Application Number Title Priority Date Filing Date
US11/340,083 Abandoned US20060195595A1 (en) 1996-12-13 2006-01-25 System and method for globally and securely accessing unified information in a computer network
US12/480,500 Expired - Fee Related US8745167B2 (en) 1996-12-13 2009-06-08 System and method for globally and securely accessing unified information in a computer network
US12/489,326 Expired - Fee Related US8117344B2 (en) 1996-12-13 2009-06-22 Global server for authenticating access to remote services
US12/489,318 Expired - Fee Related US8812702B2 (en) 1996-12-13 2009-06-22 System and method for globally and securely accessing unified information in a computer network
US12/575,387 Abandoned US20100023630A1 (en) 1996-12-13 2009-10-07 System and method for globally and securely accessing unified information in a computer network
US13/038,801 Expired - Fee Related US9361603B2 (en) 1996-12-13 2011-03-02 System and method for globally and securely accessing unified information in a computer network

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US11/340,083 Abandoned US20060195595A1 (en) 1996-12-13 2006-01-25 System and method for globally and securely accessing unified information in a computer network
US12/480,500 Expired - Fee Related US8745167B2 (en) 1996-12-13 2009-06-08 System and method for globally and securely accessing unified information in a computer network
US12/489,326 Expired - Fee Related US8117344B2 (en) 1996-12-13 2009-06-22 Global server for authenticating access to remote services
US12/489,318 Expired - Fee Related US8812702B2 (en) 1996-12-13 2009-06-22 System and method for globally and securely accessing unified information in a computer network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/038,801 Expired - Fee Related US9361603B2 (en) 1996-12-13 2011-03-02 System and method for globally and securely accessing unified information in a computer network

Country Status (1)

Country Link
US (6) US20060195595A1 (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090307362A1 (en) * 1996-12-13 2009-12-10 Visto Corporation System and method for globally and securely accessing unified information in a computer network
USRE42694E1 (en) * 1999-11-24 2011-09-13 Writeback Technologies, L.L.C. Method and systems for providing communications services
US20120311189A1 (en) * 2011-06-01 2012-12-06 Kazuhiro Yamada Information processing apparatus, information processing system, and recording medium
US20140016816A1 (en) * 2012-07-10 2014-01-16 Ricoh Company, Ltd. Service providing system, service providing method, and non-transitory computer readable information recording medium
US8713646B2 (en) 2011-12-09 2014-04-29 Erich Stuntebeck Controlling access to resources on a network
US8756426B2 (en) 2013-07-03 2014-06-17 Sky Socket, Llc Functionality watermarking and management
US8775815B2 (en) 2013-07-03 2014-07-08 Sky Socket, Llc Enterprise-specific functionality watermarking and management
US8806217B2 (en) 2013-07-03 2014-08-12 Sky Socket, Llc Functionality watermarking and management
US8826432B2 (en) 2012-12-06 2014-09-02 Airwatch, Llc Systems and methods for controlling email access
US8832785B2 (en) 2012-12-06 2014-09-09 Airwatch, Llc Systems and methods for controlling email access
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US8914013B2 (en) 2013-04-25 2014-12-16 Airwatch Llc Device management macros
US8924608B2 (en) 2013-06-25 2014-12-30 Airwatch Llc Peripheral device management
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US8997187B2 (en) 2013-03-15 2015-03-31 Airwatch Llc Delegating authorization to applications on a client device in a networked environment
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
US9058495B2 (en) 2013-05-16 2015-06-16 Airwatch Llc Rights management services integration with mobile device management
US9112749B2 (en) 2013-07-25 2015-08-18 Airwatch Llc Functionality management via application modification
US9123031B2 (en) 2013-04-26 2015-09-01 Airwatch Llc Attendance tracking via device presence
US9148416B2 (en) 2013-03-15 2015-09-29 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US9185099B2 (en) 2013-09-23 2015-11-10 Airwatch Llc Securely authorizing access to remote resources
US9203820B2 (en) 2013-03-15 2015-12-01 Airwatch Llc Application program as key for authorizing access to resources
US9219741B2 (en) 2013-05-02 2015-12-22 Airwatch, Llc Time-based configuration policy toggling
US9226155B2 (en) 2013-07-25 2015-12-29 Airwatch Llc Data communications management
US9246918B2 (en) 2013-05-10 2016-01-26 Airwatch Llc Secure application leveraging of web filter proxy services
US9247432B2 (en) 2012-10-19 2016-01-26 Airwatch Llc Systems and methods for controlling network access
US9258301B2 (en) 2013-10-29 2016-02-09 Airwatch Llc Advanced authentication techniques
US9270777B2 (en) 2013-06-06 2016-02-23 Airwatch Llc Social media and data sharing controls for data security purposes
US9275245B2 (en) 2013-03-15 2016-03-01 Airwatch Llc Data access sharing
US9378350B2 (en) 2013-03-15 2016-06-28 Airwatch Llc Facial capture managing access to resources by a device
US9401915B2 (en) 2013-03-15 2016-07-26 Airwatch Llc Secondary device as key for authorizing access to resources
US9413754B2 (en) 2014-12-23 2016-08-09 Airwatch Llc Authenticator device facilitating file security
US9473417B2 (en) 2013-03-14 2016-10-18 Airwatch Llc Controlling resources used by computing devices
US9516005B2 (en) 2013-08-20 2016-12-06 Airwatch Llc Individual-specific content management
US9535857B2 (en) 2013-06-25 2017-01-03 Airwatch Llc Autonomous device interaction
US9544306B2 (en) 2013-10-29 2017-01-10 Airwatch Llc Attempted security breach remediation
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US9584437B2 (en) 2013-06-02 2017-02-28 Airwatch Llc Resource watermarking and management
US9665723B2 (en) 2013-08-15 2017-05-30 Airwatch, Llc Watermarking detection and management
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US9705813B2 (en) 2012-02-14 2017-07-11 Airwatch, Llc Controlling distribution of resources on a network
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
US9819682B2 (en) 2013-03-15 2017-11-14 Airwatch Llc Certificate based profile confirmation
US9900261B2 (en) 2013-06-02 2018-02-20 Airwatch Llc Shared resource watermarking and management
US9916446B2 (en) 2016-04-14 2018-03-13 Airwatch Llc Anonymized application scanning for mobile devices
US9917862B2 (en) 2016-04-14 2018-03-13 Airwatch Llc Integrated application scanning and mobile enterprise computing management system
US10129242B2 (en) 2013-09-16 2018-11-13 Airwatch Llc Multi-persona devices and management
US10257194B2 (en) 2012-02-14 2019-04-09 Airwatch Llc Distribution of variably secure resources in a networked environment
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US10515334B2 (en) 2013-06-04 2019-12-24 Airwatch Llc Item delivery optimization
US10652242B2 (en) 2013-03-15 2020-05-12 Airwatch, Llc Incremental compliance remediation
US10754966B2 (en) 2013-04-13 2020-08-25 Airwatch Llc Time-based functionality restrictions
US11824644B2 (en) 2013-03-14 2023-11-21 Airwatch, Llc Controlling electronically communicated resources

Families Citing this family (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6219694B1 (en) 1998-05-29 2001-04-17 Research In Motion Limited System and method for pushing information from a host system to a mobile data communication device having a shared electronic address
US9374435B2 (en) 1998-05-29 2016-06-21 Blackberry Limited System and method for using trigger events and a redirector flag to redirect messages
EP1266321A4 (en) * 2000-02-25 2003-05-21 Telecomm Systems Inc Prepaid short messaging
US7739334B1 (en) 2000-03-17 2010-06-15 Visto Corporation System and method for automatically forwarding email and email events via a computer network to a server computer
AU2001271707A1 (en) * 2000-06-29 2002-01-14 Ching-Yi Lin Phone appliance with display screen and methods of using the same
US7225231B2 (en) * 2000-09-20 2007-05-29 Visto Corporation System and method for transmitting workspace elements across a network
EP1451718B1 (en) * 2001-10-23 2012-08-08 Beechwood Limited Partnership System and method for merging remote and local data in a single user interface
US7752166B2 (en) * 2001-11-15 2010-07-06 Visto Corporation System and methods for asynchronous synchronization
WO2006018843A2 (en) * 2004-08-16 2006-02-23 Beinsync Ltd. A system and method for the synchronization of data across multiple computing devices
WO2007113836A2 (en) * 2006-04-03 2007-10-11 Beinsync Ltd. Peer to peer syncronization system and method
US10769686B2 (en) 2008-01-31 2020-09-08 Bill.Com Llc Enhanced invitation process for electronic billing and payment system
US10043201B2 (en) 2008-01-31 2018-08-07 Bill.Com, Inc. Enhanced invitation process for electronic billing and payment system
US8645511B2 (en) * 2009-10-13 2014-02-04 Google Inc. Pre-configuration of a cloud-based computer
US8521697B2 (en) * 2010-05-19 2013-08-27 Cleversafe, Inc. Rebuilding data in multiple dispersed storage networks
US9455946B1 (en) * 2010-07-16 2016-09-27 Shoretel, Inc. Server for providing unified communications
US9397861B1 (en) 2010-07-16 2016-07-19 Shoretel, Inc. Unified communication
US9021108B2 (en) * 2010-09-27 2015-04-28 Blackberry Limited Method, system and apparatus for enabling access of a first mobile electronic device to at least one network accessible by a second mobile electronic device
US8918467B2 (en) * 2010-10-01 2014-12-23 Clover Leaf Environmental Solutions, Inc. Generation and retrieval of report information
US8516062B2 (en) 2010-10-01 2013-08-20 @Pay Ip Holdings Llc Storage, communication, and display of task-related data
US20140096092A1 (en) * 2011-03-20 2014-04-03 William J. Johnson System and Method for Indirect Manipulation of User Interface Object(s)
US9037977B1 (en) 2011-03-22 2015-05-19 Shoretel, Inc. Simulated communication
US9230243B2 (en) * 2011-10-13 2016-01-05 Dassault Systemes Collaborative design using duplicated workspaces
US9787655B2 (en) 2011-12-09 2017-10-10 Airwatch Llc Controlling access to resources on a network
US9766906B2 (en) 2011-12-29 2017-09-19 International Business Machines Corporation Efficient sharing of artifacts between collaboration applications
US8819789B2 (en) 2012-03-07 2014-08-26 Bill.Com, Inc. Method and system for using social networks to verify entity affiliations and identities
US9535755B2 (en) * 2012-03-09 2017-01-03 Google Inc. Tiers of data storage for web applications and browser extensions
US8769631B2 (en) 2012-06-18 2014-07-01 Intel Corporation Creating a web proxy inside a browser
US8504519B1 (en) * 2012-06-27 2013-08-06 Dropbox, Inc. Determining a preferred modified version from among multiple modified versions for synchronized files
US9277028B2 (en) 2013-02-06 2016-03-01 Sap Portals Israel Ltd Synchronizing user relationship across computer systems implementing workspaces
US20150012489A1 (en) * 2013-03-14 2015-01-08 Bill.Com, Inc. System and method for enhanced synchronization of record organized data between disparate applications
US10417674B2 (en) 2013-03-14 2019-09-17 Bill.Com, Llc System and method for sharing transaction information by object tracking of inter-entity transactions and news streams
US20150012442A1 (en) 2013-03-14 2015-01-08 Bill.Com, Inc. Enhanced system and method for scanning and processing of payment documentation
US10115137B2 (en) 2013-03-14 2018-10-30 Bill.Com, Inc. System and method for enhanced access and control for connecting entities and effecting payments in a commercially oriented entity network
US9049169B1 (en) * 2013-05-30 2015-06-02 Trend Micro Incorporated Mobile email protection for private computer networks
US10572921B2 (en) 2013-07-03 2020-02-25 Bill.Com, Llc System and method for enhanced access and control for connecting entities and effecting payments in a commercially oriented entity network
US9641344B1 (en) 2013-09-20 2017-05-02 Mobile Iron, Inc. Multiple factor authentication in an identity certificate service
US9756047B1 (en) 2013-10-17 2017-09-05 Mobile Iron, Inc. Embedding security posture in network traffic
US9548982B1 (en) 2013-11-26 2017-01-17 Mobile Iron, Inc. Secure controlled access to authentication servers
US9973380B1 (en) 2014-07-10 2018-05-15 Cisco Technology, Inc. Datacenter workload deployment using cross-domain global service profiles and identifiers
US10298588B2 (en) 2014-07-29 2019-05-21 BlackSands, Inc. Secure communication system and method
US9591022B2 (en) 2014-12-17 2017-03-07 The Boeing Company Computer defenses and counterattacks
US10333908B2 (en) 2015-02-03 2019-06-25 SecuritiNet Inc. Transaction-based secure information delivery and assessment
US10740297B2 (en) * 2015-12-17 2020-08-11 Box, Inc. Adaptive tool selection for conflict resolution in a multi-session collaboration setting
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US10922070B2 (en) * 2017-09-21 2021-02-16 Western Digital Technologies, Inc. Hardware assisted firmware download syncing
US11372987B1 (en) 2020-12-17 2022-06-28 Alan Rodriguez System and method for controlling data using containers
US11795908B2 (en) * 2021-12-02 2023-10-24 Carl Almond Fausett Vertical-axis renewable-power generator
US11842190B2 (en) * 2022-01-18 2023-12-12 Lemon Inc. Synchronizing multiple instances of projects

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US349522A (en) * 1886-09-21 Cash-register
US376590A (en) * 1888-01-17 Yarn-reel
US5541986A (en) * 1993-07-27 1996-07-30 Bell Communications Research, Inc. Method and system for automated telecommunications service script consolidation and downloading
US5590334A (en) * 1994-03-30 1996-12-31 Apple Computer, Inc Object oriented message passing system and method
US5666553A (en) * 1992-04-10 1997-09-09 Puma Technology, Inc. Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5666530A (en) * 1992-12-02 1997-09-09 Compaq Computer Corporation System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between
US5734903A (en) * 1994-05-13 1998-03-31 Apple Computer, Inc. System and method for object oriented message filtering
US6006274A (en) * 1997-01-30 1999-12-21 3Com Corporation Method and apparatus using a pass through personal computer connected to both a local communication link and a computer network for indentifying and synchronizing a preferred computer with a portable computer
US6195678B1 (en) * 1996-09-03 2001-02-27 Fujitsu Limited Remote resource management system for automatically downloading required files from application server depending on contents of selected files on requesting computer
US6226677B1 (en) * 1998-11-25 2001-05-01 Lodgenet Entertainment Corporation Controlled communications over a global computer network
US6401112B1 (en) * 1997-01-29 2002-06-04 Palm, Inc. Method and apparatus for synchronizing an Email client on a portable computer system with an Email client on a desktop computer
US6457062B1 (en) * 1999-04-08 2002-09-24 Palm, Inc. System and method for synchronizing multiple calendars over wide area network
US6466981B1 (en) * 1998-06-30 2002-10-15 Microsoft Corporation Method using an assigned dynamic IP address and automatically restoring the static IP address
US6591095B1 (en) * 1999-05-21 2003-07-08 Motorola, Inc. Method and apparatus for designating administrative responsibilities in a mobile communications device
US7228330B2 (en) * 2002-03-05 2007-06-05 Cegetel Groupe Method for the optimization of network traffic, and associated implementation device

Family Cites Families (421)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US624542A (en) * 1899-05-09 Heebert t
US2292387A (en) 1941-06-10 1942-08-11 Markey Hedy Kiesler Secret communication system
US4106060A (en) 1975-12-15 1978-08-08 Rca Corporation Electronic mail box
US4417349A (en) 1979-11-08 1983-11-22 Digital Broadcasting Corporation SCA Data transmission system with a raised cosine filter
US4438433A (en) * 1981-09-29 1984-03-20 Motorola, Inc. Multiaddress pager with a call storage and priority paging option
US4532588A (en) 1982-11-09 1985-07-30 International Business Machines Corporation Electronic document distribution network with uniform data stream
US4558454A (en) 1983-04-11 1985-12-10 National Information Utilities Corporation Digital partial response filter
EP0158633A4 (en) 1983-10-07 1986-07-24 Nat Information Utilities Corp Education utility.
US4558413A (en) 1983-11-21 1985-12-10 Xerox Corporation Software version management system
US4644351A (en) * 1984-05-08 1987-02-17 Motorola, Inc. Two way personal message system with extended coverage
US4652698A (en) * 1984-08-13 1987-03-24 Ncr Corporation Method and system for providing system security in a remote terminal environment
US4697281A (en) 1986-03-14 1987-09-29 Spectrum Cellular Communications Corporation, Inc. Cellular telephone data communication system and method
US4882674A (en) 1985-03-05 1989-11-21 Wang Laboratories, Inc. Apparatus and method for control of one computer system by another computer system
DE3508873C1 (en) * 1985-03-13 1986-06-05 Sartorius GmbH, 3400 Göttingen Upper pan scales
JPS61214646A (en) * 1985-03-19 1986-09-24 Hashimoto Corp Automatic answering telephone set with paging function
US4713780A (en) 1985-04-15 1987-12-15 Express Communications, Inc. Electronic mail
JPS6223773A (en) 1985-07-24 1987-01-31 Touou Denki Kk Manuscript base
US4695880A (en) 1985-07-30 1987-09-22 Postron Corp. Electronic information dissemination system
US4714995A (en) 1985-09-13 1987-12-22 Trw Inc. Computer integration system
US4665519A (en) * 1985-11-04 1987-05-12 Electronic Systems Technology, Inc. Wireless computer modem
US4714996A (en) 1985-11-26 1987-12-22 International Business Machines Corporation Impact calculation for version management in a distributed information service
US4837797A (en) 1985-11-27 1989-06-06 Advanced Service Development Corporation Electronic message unit and methods using same
US4837798A (en) 1986-06-02 1989-06-06 American Telephone And Telegraph Company Communication system having unified messaging
US4698839A (en) 1986-06-03 1987-10-06 Devaney David B Mobile telephone switching office
US4882752A (en) 1986-06-25 1989-11-21 Lindman Richard S Computer security system
US5008926A (en) * 1986-07-17 1991-04-16 Efrat Future Technology Ltd. Message management system
US4916738A (en) * 1986-11-05 1990-04-10 International Business Machines Corp. Remote access terminal security
US4831582A (en) * 1986-11-07 1989-05-16 Allen-Bradley Company, Inc. Database access machine for factory automation network
US4845658A (en) 1986-12-01 1989-07-04 Massachusetts Institute Of Technology Information method and apparatus using simplex and duplex communications
US4887204A (en) * 1987-02-13 1989-12-12 International Business Machines Corporation System and method for accessing remote files in a distributed networking environment
US4897781A (en) * 1987-02-13 1990-01-30 International Business Machines Corporation System and method for using cached data at a local node after re-opening a file at a remote node in a distributed networking environment
JPS63209263A (en) 1987-02-25 1988-08-30 Nec Corp Telephone set with electronic computer originated mail function
US4856047A (en) 1987-04-29 1989-08-08 Bd Systems, Inc. Automated remote telemetry paging system
JPS6448534A (en) 1987-08-18 1989-02-23 Hashimoto Corp Pocket bell automatic call system
JPH01108830A (en) * 1987-10-21 1989-04-26 Hitachi Ltd Electronic mail system for sysout data
US4928096A (en) * 1987-11-16 1990-05-22 Motorola, Inc. Paging terminal apparatus with message storage and retransmission capability and method therefor
US4853843A (en) 1987-12-18 1989-08-01 Tektronix, Inc. System for merging virtual partitions of a distributed database
US4875159A (en) 1987-12-22 1989-10-17 Amdahl Corporation Version management system using plural control fields for synchronizing two versions of files in a multiprocessor system
US4825456A (en) * 1988-01-07 1989-04-25 Maury Rosenberg Telephone system/paging system interface
US4837811A (en) 1988-01-25 1989-06-06 Communication Manufacturing Co. Telephone technician's terminals
US4875039A (en) 1988-02-22 1989-10-17 Telefind Corp. Paging system with transmission protocol compatible with analog and digital transmitters
US4942598A (en) 1988-03-04 1990-07-17 Motorola, Inc. Telephone answering machine in paging systems with automatic number identification based message operations
US4837800A (en) 1988-03-18 1989-06-06 Motorola, Inc. Cellular data telephone system and cellular data telephone therefor
US5485370A (en) * 1988-05-05 1996-01-16 Transaction Technology, Inc. Home services delivery system with intelligent terminal emulator
US5155847A (en) 1988-08-03 1992-10-13 Minicom Data Corporation Method and apparatus for updating software at remote locations
US5008814A (en) * 1988-08-15 1991-04-16 Network Equipment Technologies, Inc. Method and apparatus for updating system software for a plurality of data processing units in a communication network
CA2002912A1 (en) 1988-11-14 1990-05-14 William A. Clough Portable computer with touch screen and computer system employing same
US4961216A (en) 1988-12-30 1990-10-02 Baehr G Geoffrey Telephone answering and paging system
US4972457A (en) 1989-01-19 1990-11-20 Spectrum Information Technologies, Inc. Portable hybrid communication system and methods
US4951044A (en) 1989-03-21 1990-08-21 Motorola, Inc. Paging terminal apparatus with user selectable page forwarding capability and methodology therefor
US5649114A (en) 1989-05-01 1997-07-15 Credit Verification Corporation Method and system for selective incentive point-of-sale marketing in response to customer shopping histories
US5113519A (en) * 1989-05-15 1992-05-12 International Business Machines Corporation Maintenance of file attributes in a distributed data processing system
US5128981A (en) 1989-05-24 1992-07-07 Hitachi, Ltd. Radio communication system and a portable wireless terminal
GB8915875D0 (en) * 1989-07-11 1989-08-31 Intelligence Quotient United K A method of operating a data processing system
GB8918553D0 (en) 1989-08-15 1989-09-27 Digital Equipment Int Message control system
US5146486A (en) 1989-08-31 1992-09-08 Lebowitz Mayer M Cellular network data transmission system
US6044205A (en) * 1996-02-29 2000-03-28 Intermind Corporation Communications system for transferring information between memories according to processes transferred with the information
US5333152A (en) 1989-09-22 1994-07-26 Wilber James G Electronic mail remote data transfer system
JPH03109848A (en) 1989-09-25 1991-05-09 Hitachi Ltd Communication system
US5048085A (en) 1989-10-06 1991-09-10 International Business Machines Corporation Transaction system security method and apparatus
US5495610A (en) * 1989-11-30 1996-02-27 Seer Technologies, Inc. Software distribution system to build and distribute a software release
US5220501A (en) 1989-12-08 1993-06-15 Online Resources, Ltd. Method and system for remote delivery of retail banking services
US4980907A (en) 1989-12-15 1990-12-25 Telefonaktiebolaget L M Ericsson Telecommunication combination comprising a telepoint and a portable radio terminal
US5043721A (en) 1989-12-18 1991-08-27 Hewlett-Packard Company Paging accessory for portable information/computing devices
US5130993A (en) 1989-12-29 1992-07-14 Codex Corporation Transmitting encoded data on unreliable networks
US5537097A (en) 1990-02-02 1996-07-16 Televerket Method for transferring messages in a one-way communication system
US5263157A (en) 1990-02-15 1993-11-16 International Business Machines Corporation Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles
US5263165A (en) 1990-02-15 1993-11-16 International Business Machines Corporation System for providing user access control within a distributed data processing system having multiple resource managers
US5299255A (en) * 1990-03-12 1994-03-29 Fujitsu Limited Electronic mail system for transmitting information via communication network
US5307059A (en) * 1990-03-26 1994-04-26 Motorola, Inc. Selective call receiver having customized voice alerts
JPH0831928B2 (en) 1990-03-30 1996-03-27 株式会社田村電機製作所 Telephone device
US5274806A (en) 1990-05-02 1993-12-28 Electronic Data Systems Corporation Hierarchical data encyclopedia
US5682379A (en) 1993-12-23 1997-10-28 Norand Corporation Wireless personal local area network
FR2662831B1 (en) 1990-05-29 1992-08-07 Cit Alcatel METHOD FOR MANAGING A DATABASE NETWORK.
US5127041A (en) 1990-06-01 1992-06-30 Spectrum Information Technologies, Inc. System and method for interfacing computers to diverse telephone networks
US5032979A (en) 1990-06-22 1991-07-16 International Business Machines Corporation Distributed security auditing subsystem for an operating system
US5440730A (en) 1990-08-09 1995-08-08 Bell Communications Research, Inc. Time index access structure for temporal databases having concurrent multiple versions
US5166931A (en) 1990-09-04 1992-11-24 At&T Bell Laboratories Communications network dynamic addressing arrangement
US5317729A (en) * 1990-10-24 1994-05-31 International Business Machines Corporation Method for the storage of multi-versioned data with retrieval based on searched query
US5917629A (en) 1990-10-29 1999-06-29 International Business Machines Corporation Transceiver for extending a CSMA/CD network for wireless communication
US5159592A (en) 1990-10-29 1992-10-27 International Business Machines Corporation Network address management for a wired network supporting wireless communication to a plurality of mobile users
US5068916A (en) 1990-10-29 1991-11-26 International Business Machines Corporation Coordination of wireless medium among a plurality of base stations
US5181200A (en) * 1990-10-29 1993-01-19 International Business Machines Corporation Handoff method and apparatus for mobile wireless workstation
EP0483437A1 (en) * 1990-10-31 1992-05-06 International Business Machines Corporation Processing system having device for testing the correct execution of instructions
JPH04175461A (en) 1990-11-07 1992-06-23 Nippondenso Co Ltd Fuel injection valve
US5136291A (en) 1990-11-30 1992-08-04 Unisys Corporation Transmitting binary data files using electronic mail
US5283887A (en) * 1990-12-19 1994-02-01 Bull Hn Information Systems Inc. Automatic document format conversion in an electronic mail system based upon user preference
US5113041A (en) 1990-12-28 1992-05-12 At&T Bell Laboratories Information processing
CA2105570C (en) 1991-03-04 2002-05-21 Alan D. Wittstein Mobile telephone, system and method
GB9104909D0 (en) 1991-03-08 1991-04-24 Int Computers Ltd Access control in a distributed computer system
JP3177684B2 (en) * 1991-03-14 2001-06-18 株式会社日立製作所 Email system
US5148479A (en) 1991-03-20 1992-09-15 International Business Machines Corp. Authentication protocols in communication networks
US5424724A (en) 1991-03-27 1995-06-13 International Business Machines Corporation Method and apparatus for enhanced electronic mail distribution
WO1992017943A1 (en) 1991-04-04 1992-10-15 Motorola, Inc. Communication unit with over the air programming
US5313582A (en) * 1991-04-30 1994-05-17 Standard Microsystems Corporation Method and apparatus for buffering data within stations of a communication network
US5436960A (en) 1991-05-20 1995-07-25 Campana, Jr.; Thomas J. Electronic mail system with RF communications to mobile processors and method of operation thereof
US5438611A (en) 1991-05-20 1995-08-01 Ntp Incorporated Electronic mail system with RF communications to mobile processors originating from outside of the electronic mail system and method of operation thereof
US5479472A (en) 1991-05-20 1995-12-26 Ntp Incorporated System for interconnecting electronic mail systems by RF communications and method of operation thereof
US5237614A (en) 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system
US5265033A (en) 1991-09-23 1993-11-23 Atm Communications International, Inc. ATM/POS based electronic mail system
CA2078246C (en) * 1991-09-23 1998-02-03 Randolph J. Pilc Improved method for secure access control
US5481700A (en) * 1991-09-27 1996-01-02 The Mitre Corporation Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system
JPH07112198B2 (en) 1991-10-19 1995-11-29 株式会社シーエスケイ Data transmission system by portable wireless terminal
US5150407A (en) 1991-12-16 1992-09-22 Chan Steve S C Secured data storage devices
US5388255A (en) * 1991-12-19 1995-02-07 Wang Laboratories, Inc. System for updating local views from a global database using time stamps to determine when a change has occurred
US5519606A (en) 1992-01-21 1996-05-21 Starfish Software, Inc. System and methods for appointment reconciliation
US8081968B2 (en) * 2000-10-11 2011-12-20 Gogo Llc System for creating an air-to-ground IP tunnel in an airborne wireless cellular network to differentiate individual passengers
JP3213766B2 (en) 1992-03-16 2001-10-02 株式会社日立製作所 Replicate file update system
US5333266A (en) 1992-03-27 1994-07-26 International Business Machines Corporation Method and apparatus for message handling in computer systems
US5265159A (en) 1992-06-23 1993-11-23 Hughes Aircraft Company Secure file erasure
EP0651935B1 (en) * 1992-07-20 2001-09-26 Motorola, Inc. Radio data interface device
US5432999A (en) 1992-08-20 1995-07-18 Capps; David F. Integrated circuit lamination process
ATE239337T1 (en) * 1992-09-30 2003-05-15 Motorola Inc ELECTRONIC MESSAGE DELIVERY SYSTEM
US5315635A (en) * 1992-09-30 1994-05-24 Motorola, Inc. Reliable message communication system
US5644354A (en) 1992-10-09 1997-07-01 Prevue Interactive, Inc. Interactive video system
US5590403A (en) 1992-11-12 1996-12-31 Destineer Corporation Method and system for efficiently providing two way communication between a central network and mobile unit
US5404508A (en) * 1992-12-03 1995-04-04 Unisys Corporation Data base backup and recovery system and method
US5726893A (en) * 1992-12-17 1998-03-10 Stanford Telecommunications, Inc. Cellular telephone with voice-in-data modem
US5581749A (en) 1992-12-21 1996-12-03 Thedow Chemical Company System and method for maintaining codes among distributed databases using a global database
US5752059A (en) 1992-12-29 1998-05-12 Apple Computer, Inc. Apparatus and method for representing electronic mail
US5410543A (en) * 1993-01-04 1995-04-25 Apple Computer, Inc. Method for connecting a mobile computer to a computer network by using an address server
US5544320A (en) 1993-01-08 1996-08-06 Konrad; Allan M. Remote information service access system based on a client-server-service model
JPH06319005A (en) 1993-01-13 1994-11-15 Canon Inf Syst Inc Method and equipment for alloting message
US5416473A (en) * 1993-02-01 1995-05-16 Motorola, Inc. Calendar driven selective call messaging system and operating method
US5406557A (en) * 1993-02-01 1995-04-11 National Semiconductor Corporation Interenterprise electronic mail hub
US5481255A (en) 1993-02-10 1996-01-02 Data Critical Corp. Paging transmission system
JP3168756B2 (en) * 1993-02-24 2001-05-21 ミノルタ株式会社 Email management method of email system
US5386564A (en) * 1993-02-24 1995-01-31 Hewlett-Packard Company Conversion of data and objects across classes in an object management system
JP2557192B2 (en) 1993-03-15 1996-11-27 インターナショナル・ビジネス・マシーンズ・コーポレイション Transaction processing synchronization method, transaction processing monitoring method, and transaction commit processing method
US5491752A (en) * 1993-03-18 1996-02-13 Digital Equipment Corporation, Patent Law Group System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
JP3399010B2 (en) 1993-03-23 2003-04-21 株式会社デンソー Digital mobile phone demodulator
JPH06290099A (en) 1993-03-24 1994-10-18 Internatl Business Mach Corp <Ibm> Method for storage management and subsystem therefor
JPH06290118A (en) 1993-03-31 1994-10-18 Hitachi Software Eng Co Ltd Electronic mail management system
US5799318A (en) 1993-04-13 1998-08-25 Firstfloor Software Method and apparatus for collecting and displaying information from diverse computer resources
JPH06324928A (en) * 1993-05-14 1994-11-25 Mitsubishi Electric Corp Log generating device, device for arbitrating versions different in file and device for arbitrating version different in computer file being at different places
JPH06332858A (en) 1993-05-21 1994-12-02 Casio Comput Co Ltd File network system
US5710922A (en) * 1993-06-02 1998-01-20 Apple Computer, Inc. Method for synchronizing and archiving information between computer systems
US5754306A (en) 1993-06-15 1998-05-19 Hewlett-Packard Company System and method for a communication system
US5446736A (en) 1993-10-07 1995-08-29 Ast Research, Inc. Method and apparatus for connecting a node to a wireless network using a standard protocol
DE69432503T2 (en) * 1993-10-08 2003-12-24 Ibm Information archiving system with object-dependent functionality
US5557724A (en) * 1993-10-12 1996-09-17 Intel Corporation User interface, method, and apparatus selecting and playing channels having video, audio, and/or text streams
US5495484A (en) * 1993-10-12 1996-02-27 Dsc Communications Corporation Distributed telecommunications switching system
US6279029B1 (en) * 1993-10-12 2001-08-21 Intel Corporation Server/client architecture and method for multicasting on a computer network
US5771354A (en) 1993-11-04 1998-06-23 Crawford; Christopher M. Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
US5555376A (en) * 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
US5493692A (en) * 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
JPH07162454A (en) 1993-12-03 1995-06-23 Fujitsu Ltd Method and device for electronic mail linkage
US5434918A (en) 1993-12-14 1995-07-18 Hughes Aircraft Company Method for providing mutual authentication of a user and a server on a network
NZ329891A (en) 1994-01-13 2000-01-28 Certco Llc Method of upgrading firmware of trusted device using embedded key
US5446888A (en) 1994-01-14 1995-08-29 Pyne; Charles F. Remote file transfer method and apparatus
US5483596A (en) * 1994-01-24 1996-01-09 Paralon Technologies, Inc. Apparatus and method for controlling access to and interconnection of computer system resources
US5533019A (en) 1994-01-31 1996-07-02 Motorola, Inc. Packet data in an analog cellular radiotelephone system
US5420927B1 (en) * 1994-02-01 1997-02-04 Silvio Micali Method for certifying public keys in a digital signature scheme
US5787172A (en) 1994-02-24 1998-07-28 The Merdan Group, Inc. Apparatus and method for establishing a cryptographic link between elements of a system
US5560005A (en) 1994-02-25 1996-09-24 Actamed Corp. Methods and systems for object-based relational distributed databases
US5835601A (en) 1994-03-15 1998-11-10 Kabushiki Kaisha Toshiba File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
US5495533A (en) * 1994-04-29 1996-02-27 International Business Machines Corporation Personal key archive
US5544322A (en) 1994-05-09 1996-08-06 International Business Machines Corporation System and method for policy-based inter-realm authentication within a distributed processing system
US5675507A (en) 1995-04-28 1997-10-07 Bobo, Ii; Charles R. Message storage and delivery system
US5561795A (en) 1994-05-13 1996-10-01 Unisys Corporation Method and apparatus for audit trail logging and data base recovery
US5434994A (en) 1994-05-23 1995-07-18 International Business Machines Corporation System and method for maintaining replicated data coherency in a data processing system
US5818511A (en) * 1994-05-27 1998-10-06 Bell Atlantic Full service network
US5694546A (en) 1994-05-31 1997-12-02 Reisman; Richard R. System for automatic unattended electronic information transport between a server and a client by a vendor provided transport software with a manifest list
US6182052B1 (en) * 1994-06-06 2001-01-30 Huntington Bancshares Incorporated Communications network interface for user friendly interactive access to online services
US5627997A (en) 1994-06-07 1997-05-06 Microsoft Corporation Method and system for converting computer mail messages using an extensible set of conversion routines
US5425102A (en) 1994-06-09 1995-06-13 Datasonix Corporation Computer security apparatus with password hints
US5416842A (en) * 1994-06-10 1995-05-16 Sun Microsystems, Inc. Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5897640A (en) 1994-08-08 1999-04-27 Microsoft Corporation Method and system of associating, synchronizing and reconciling computer files in an operating system
US5598536A (en) * 1994-08-09 1997-01-28 Shiva Corporation Apparatus and method for providing remote users with the same unique IP address upon each network access
DE69522874T2 (en) 1994-08-18 2002-03-28 Hewlett Packard Co Method and apparatus for establishing bidirectional communication between a pager and a paging service provider
GB2292821A (en) * 1994-09-03 1996-03-06 Ibm Sorting method.
US5740231A (en) * 1994-09-16 1998-04-14 Octel Communications Corporation Network-based multimedia communications and directory system and method of operation
US5742905A (en) * 1994-09-19 1998-04-21 Bell Communications Research, Inc. Personal communications internetworking
US5684984A (en) 1994-09-29 1997-11-04 Apple Computer, Inc. Synchronization and replication of object databases
US5678039A (en) 1994-09-30 1997-10-14 Borland International, Inc. System and methods for translating software into localized versions
US5588132A (en) 1994-10-20 1996-12-24 Digital Equipment Corporation Method and apparatus for synchronizing data queues in asymmetric reflective memories
US5579472A (en) 1994-11-09 1996-11-26 Novalink Technologies, Inc. Group-oriented communications user interface
JPH08137732A (en) 1994-11-10 1996-05-31 Hitachi Ltd Information processor
US5652884A (en) 1994-11-14 1997-07-29 Object Technology Licensing Corp. Method and apparatus for dynamic update of an existing object in an object editor
US5623601A (en) * 1994-11-18 1997-04-22 Milkway Networks Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
WO1996017306A2 (en) 1994-11-21 1996-06-06 Oracle Corporation Media server
US5715403A (en) * 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5758257A (en) 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5627658A (en) 1994-12-14 1997-05-06 Xerox Corporation Automatic networked facsimile queuing system
US5664207A (en) 1994-12-16 1997-09-02 Xcellenet, Inc. Systems and methods for automatically sharing information among remote/mobile nodes
US5691974A (en) * 1995-01-04 1997-11-25 Qualcomm Incorporated Method and apparatus for using full spectrum transmitted power in a spread spectrum communication system for tracking individual recipient phase, time and energy
US5878230A (en) * 1995-01-05 1999-03-02 International Business Machines Corporation System for email messages wherein the sender designates whether the recipient replies or forwards to addresses also designated by the sender
US5684990A (en) 1995-01-11 1997-11-04 Puma Technology, Inc. Synchronization of disparate databases
US5596318A (en) * 1995-01-12 1997-01-21 Microsoft Corporation Method for operating a two-way messaging system to extend battery life
US5682478A (en) 1995-01-19 1997-10-28 Microsoft Corporation Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a client and network server
US5590274A (en) 1995-01-23 1996-12-31 Tandem Computers Incorporated Multi-volume audit trails for fault tolerant computers
US5794252A (en) 1995-01-24 1998-08-11 Tandem Computers, Inc. Remote duplicate database facility featuring safe master audit trail (safeMAT) checkpointing
US5729735A (en) * 1995-02-08 1998-03-17 Meyering; Samuel C. Remote database file synchronizer
US5991410A (en) 1995-02-15 1999-11-23 At&T Wireless Services, Inc. Wireless adaptor and wireless financial transaction system
US5706211A (en) * 1995-03-02 1998-01-06 Motorola, Inc. Message communications system
US5701400A (en) 1995-03-08 1997-12-23 Amado; Carlos Armando Method and apparatus for applying if-then-else rules to data sets in a relational data base and generating from the results of application of said rules a database of diagnostics linked to said data sets to aid executive analysis of financial data
US5608865A (en) * 1995-03-14 1997-03-04 Network Integrity, Inc. Stand-in Computer file server providing fast recovery from computer file server failures
US5604788A (en) * 1995-03-16 1997-02-18 Motorola, Inc. Wireless messaging system with electronic mail replication
JPH08256216A (en) 1995-03-16 1996-10-01 Fujitsu Ltd Incoming call transfer system and electronic mail transfer system
US5572528A (en) 1995-03-20 1996-11-05 Novell, Inc. Mobile networking method and apparatus
IL117072A (en) 1995-04-06 2001-11-25 Rooster Ltd Mail notification system and method
US5677955A (en) 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5604491A (en) * 1995-04-24 1997-02-18 Motorola, Inc. Pager with user selectable priority
US5966714A (en) * 1995-04-28 1999-10-12 Intel Corporation Method and apparatus for scaling large electronic mail databases for devices with limited storage
US5758354A (en) 1995-04-28 1998-05-26 Intel Corporation Application independent e-mail synchronization
US6006017A (en) 1995-05-02 1999-12-21 Motorola Inc. System for determining the frequency of repetitions of polling active stations relative to the polling of inactive stations
JPH08305662A (en) 1995-05-02 1996-11-22 Fujitsu Ltd Method and system for client authentication
WO1996035994A1 (en) * 1995-05-08 1996-11-14 Compuserve Incorporated Rules based electronic message management system
GB2315200B (en) 1995-05-08 2000-06-21 Compuserve Inc System for electronic messaging via wireless devices
JP3262689B2 (en) 1995-05-19 2002-03-04 富士通株式会社 Remote control system
US5649195A (en) 1995-05-22 1997-07-15 International Business Machines Corporation Systems and methods for synchronizing databases in a receive-only network
US5632011A (en) 1995-05-22 1997-05-20 Sterling Commerce, Inc. Electronic mail management system for operation on a host computer system
US5682524A (en) 1995-05-26 1997-10-28 Starfish Software, Inc. Databank system with methods for efficiently storing non-uniform data records
US5757669A (en) 1995-05-31 1998-05-26 Netscape Communications Corporation Method and apparatus for workgroup information replication
US5675782A (en) 1995-06-06 1997-10-07 Microsoft Corporation Controlling access to objects on multiple operating systems
US5628005A (en) * 1995-06-07 1997-05-06 Microsoft Corporation System and method for providing opportunistic file access in a network environment
US5752246A (en) 1995-06-07 1998-05-12 International Business Machines Corporation Service agent for fulfilling requests of a web browser
US5956489A (en) * 1995-06-07 1999-09-21 Microsoft Corporation Transaction replication system and method for supporting replicated transaction-based services
US5721908A (en) * 1995-06-07 1998-02-24 International Business Machines Corporation Computer network for WWW server data access over internet
US5680542A (en) 1995-06-07 1997-10-21 Motorola, Inc. Method and apparatus for synchronizing data in a host memory with data in target MCU memory
US5710918A (en) * 1995-06-07 1998-01-20 International Business Machines Corporation Method for distributed task fulfillment of web browser requests
JP3453459B2 (en) 1995-06-19 2003-10-06 キヤノン株式会社 E-mail system and control method thereof, and communication terminal device and control method thereof
US5737531A (en) * 1995-06-27 1998-04-07 International Business Machines Corporation System for synchronizing by transmitting control packet to omit blocks from transmission, and transmitting second control packet when the timing difference exceeds second predetermined threshold
KR100192766B1 (en) 1995-07-05 1999-06-15 황인길 Solder ball planarization method of ball grid array semiconductor package using solder ball as an input/output electrode and its circuit structure
US6020885A (en) * 1995-07-11 2000-02-01 Sony Corporation Three-dimensional virtual reality space sharing method and system using local and global object identification codes
US5751971A (en) 1995-07-12 1998-05-12 Cabletron Systems, Inc. Internet protocol (IP) work group routing
AU6678096A (en) 1995-07-20 1997-02-18 Novell, Inc. Transaction synchronization in a disconnectable computer and network
US5845282A (en) 1995-08-07 1998-12-01 Apple Computer, Inc. Method and apparatus for remotely accessing files from a desktop computer using a personal digital assistant
US5664228A (en) 1995-08-09 1997-09-02 Microsoft Corporation Portable information device and system and method for downloading executable instructions from a computer to the portable information device
US5745360A (en) * 1995-08-14 1998-04-28 International Business Machines Corp. Dynamic hypertext link converter system and process
US5657390A (en) 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US5721779A (en) * 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
US5634053A (en) 1995-08-29 1997-05-27 Hughes Aircraft Company Federated information management (FIM) system and method for providing data site filtering and translation for heterogeneous databases
US5647002A (en) 1995-09-01 1997-07-08 Lucent Technologies Inc. Synchronization of mailboxes of different types
JPH0981519A (en) * 1995-09-08 1997-03-28 Kiyadeitsukusu:Kk Authentication method on network
JPH0981560A (en) 1995-09-11 1997-03-28 Hitachi Ltd Delivery method for document data
US5721914A (en) * 1995-09-14 1998-02-24 Mci Corporation System and method for hierarchical data distribution
US6185184B1 (en) * 1995-09-25 2001-02-06 Netspeak Corporation Directory server for providing dynamically assigned network protocol addresses
US5978813A (en) * 1995-09-25 1999-11-02 International Business Machines Corporation System for providing synchronization between a local area network and a distributing computer environment
US5717863A (en) * 1995-09-27 1998-02-10 Intel Corporation Method and apparatus for managing pc conference connection addresses
US5764902A (en) 1995-09-29 1998-06-09 Intel Corporation Conditional insert or merge in a data conference
US5825840A (en) 1996-04-23 1998-10-20 Eastman Kodak Company Interline sensor employing photocapacitor gate
US5757916A (en) 1995-10-06 1998-05-26 International Series Research, Inc. Method and apparatus for authenticating the location of remote users of networked computing systems
US5758150A (en) 1995-10-06 1998-05-26 Tele-Communications, Inc. System and method for database synchronization
US5790800A (en) * 1995-10-13 1998-08-04 Digital Equipment Corporation Client application program mobilizer
US5819020A (en) * 1995-10-16 1998-10-06 Network Specialists, Inc. Real time backup system
US5727202A (en) * 1995-10-18 1998-03-10 Palm Computing, Inc. Method and apparatus for synchronizing information on two different computer systems
US5572643A (en) 1995-10-19 1996-11-05 Judson; David H. Web browser with dynamic display of information objects during linking
US5713019A (en) * 1995-10-26 1998-01-27 Keaten; Timothy M. Iconic access to remote electronic monochrome raster data format document repository
CN1119772C (en) * 1995-11-06 2003-08-27 摩托罗拉公司 Message storage in selective call receiver
JP3459149B2 (en) 1995-11-06 2003-10-20 シャープ株式会社 Email transfer system
US7555529B2 (en) * 1995-11-13 2009-06-30 Citrix Systems, Inc. Interacting with software applications displayed in a web page
US6088515A (en) * 1995-11-13 2000-07-11 Citrix Systems Inc Method and apparatus for making a hypermedium interactive
JP3688830B2 (en) 1995-11-30 2005-08-31 株式会社東芝 Packet transfer method and packet processing apparatus
EP0777394A1 (en) 1995-12-01 1997-06-04 ALCATEL BELL Naamloze Vennootschap Method and apparatus for electronic mail transmission as short messages towards a mobile radio terminal
US5754782A (en) 1995-12-04 1998-05-19 International Business Machines Corporation System and method for backing up and restoring groupware documents
US5664354A (en) 1995-12-06 1997-09-09 Mobile Billboard Advertising Inc. Wall and vehicle graphic assemblies
US5822539A (en) * 1995-12-08 1998-10-13 Sun Microsystems, Inc. System for adding requested document cross references to a document by annotation proxy configured to merge and a directory generator and annotation server
US6473609B1 (en) * 1995-12-11 2002-10-29 Openwave Systems Inc. Method and architecture for interactive two-way communication devices to interact with a network
US5633810A (en) 1995-12-14 1997-05-27 Sun Microsystems, Inc. Method and apparatus for distributing network bandwidth on a media server
US5774717A (en) * 1995-12-15 1998-06-30 International Business Machines Corporation Method and article of manufacture for resynchronizing client/server file systems and resolving file system conflicts
US5832483A (en) 1995-12-15 1998-11-03 Novell, Inc. Distributed control interface for managing the interoperability and concurrency of agents and resources in a real-time environment
US5781908A (en) * 1995-12-18 1998-07-14 J.D. Edwards World Source Company File data synchronizer in a distributed data computer network
US5826039A (en) 1995-12-29 1998-10-20 Lucent Technologies Inc. Universal connection point for resources and communication unrelated to a physical endpoint
US5765171A (en) 1995-12-29 1998-06-09 Lucent Technologies Inc. Maintaining consistency of database replicas
US5787441A (en) 1996-01-11 1998-07-28 International Business Machines Corporation Method of replicating data at a field level
JPH09252323A (en) 1996-01-11 1997-09-22 Sony Corp Communication system and communication equipment
US6442616B1 (en) 1997-01-16 2002-08-27 Kabushiki Kaisha Toshiba Method and apparatus for communication control of mobil computers in communication network systems using private IP addresses
US6023779A (en) 1996-01-18 2000-02-08 Pocketscience, Inc. Electronic, acoustical tone generating communications system and method
US6463270B1 (en) 1996-01-26 2002-10-08 Telcordia Technologies, Inc. Method and apparatus supporting non-geographic telephone numbers
US6411807B1 (en) 1996-02-05 2002-06-25 At&T Wireless Service, Inc. Roaming authorization system
US5826014A (en) 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
JP3472014B2 (en) 1996-02-20 2003-12-02 ブラザー工業株式会社 Email transfer device
FI102869B (en) * 1996-02-26 1999-02-26 Nokia Mobile Phones Ltd A device, method, and system for transmitting and receiving information relating to various applications
JPH09237234A (en) 1996-02-29 1997-09-09 Toshiba Corp Television mail system
US5862325A (en) * 1996-02-29 1999-01-19 Intermind Corporation Computer-based communication system and method using metadata defining a control structure
AU706931B2 (en) 1996-03-06 1999-07-01 Access Co., Ltd. Personal communications internetworking
US6587681B1 (en) 1996-03-13 2003-07-01 Ntt Docomo, Inc. Mail reception notifying system and mail reception notifying method
US5818936A (en) * 1996-03-15 1998-10-06 Novell, Inc. System and method for automically authenticating a user in a distributed network system
JP2000507375A (en) 1996-03-19 2000-06-13 シーベル システムズ,インコーポレイティド Network maintenance method of partially replicated database system
US5684951A (en) 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
US5673322A (en) 1996-03-22 1997-09-30 Bell Communications Research, Inc. System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US5706502A (en) * 1996-03-25 1998-01-06 Sun Microsystems, Inc. Internet-enabled portfolio manager system and method
US6343313B1 (en) * 1996-03-26 2002-01-29 Pixion, Inc. Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability
US5754830A (en) 1996-04-01 1998-05-19 Openconnect Systems, Incorporated Server and web browser terminal emulator for persistent connection to a legacy host system and method of operation
JP3487070B2 (en) * 1996-04-10 2004-01-13 ソニー株式会社 Optical device
US5815573A (en) 1996-04-10 1998-09-29 International Business Machines Corporation Cryptographic key recovery system
US6049671A (en) * 1996-04-18 2000-04-11 Microsoft Corporation Method for identifying and obtaining computer software from a network computer
JP3370526B2 (en) * 1996-04-24 2003-01-27 富士通株式会社 Mobile communication system and mobile terminal and information center used in the mobile communication system
US6829484B1 (en) * 1996-04-24 2004-12-07 Fujitsu Limited Mobile communicating system, and a mobile terminal, an information center and a storage medium used therein
AUPN955096A0 (en) 1996-04-29 1996-05-23 Telefonaktiebolaget Lm Ericsson (Publ) Telecommunications information dissemination system
US5790974A (en) 1996-04-29 1998-08-04 Sun Microsystems, Inc. Portable calendaring device having perceptual agent managing calendar entries
US5742769A (en) 1996-05-06 1998-04-21 Banyan Systems, Inc. Directory with options for access to and display of email addresses
JP2000516053A (en) * 1996-05-07 2000-11-28 ウェブライン コミュニケーションズ コーポレーション Method and apparatus for integrating Internet multimedia content with telephone and audio communications
JP3471523B2 (en) 1996-05-21 2003-12-02 インターナショナル・ビジネス・マシーンズ・コーポレーション Communication method and communication terminal
US5745689A (en) * 1996-05-23 1998-04-28 Electronic Data Systems Corporation System and method for providing pager services to users of a computer network
CA2256417A1 (en) 1996-05-24 1997-11-27 Gregory T. White Computer method and apparatus for object streaming
US5768528A (en) * 1996-05-24 1998-06-16 V-Cast, Inc. Client-server system for delivery of online information
US5940074A (en) 1996-06-03 1999-08-17 Webtv Networks, Inc. Remote upgrade of software over a network
US6151643A (en) 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US5812398A (en) 1996-06-10 1998-09-22 Sun Microsystems, Inc. Method and system for escrowed backup of hotelled world wide web sites
TW313642B (en) 1996-06-11 1997-08-21 Ibm A uniform mechanism for using signed content
US5812668A (en) 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
CA2179349C (en) 1996-06-18 2000-01-11 Roger Yiu Ming Cheung Method and apparatus for providing a 3-way connection between a mobile computing device, a stationary computing device and a computer network
US5857201A (en) * 1996-06-18 1999-01-05 Wright Strategies, Inc. Enterprise connectivity to handheld devices
US5862346A (en) * 1996-06-28 1999-01-19 Metadigm Distributed group activity data network system and corresponding method
US6035104A (en) 1996-06-28 2000-03-07 Data Link Systems Corp. Method and apparatus for managing electronic documents by alerting a subscriber at a destination other than the primary destination
US5802530A (en) 1996-07-01 1998-09-01 Sun Microsystems, Inc. Web document based graphical user interface
US5768510A (en) 1996-07-01 1998-06-16 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server application enabler system
US5835724A (en) * 1996-07-03 1998-11-10 Electronic Data Systems Corporation System and method for communication information using the internet that receives and maintains information concerning the client and generates and conveys the session data to the client
US5812773A (en) 1996-07-12 1998-09-22 Microsoft Corporation System and method for the distribution of hierarchically structured data
US5862330A (en) 1996-07-16 1999-01-19 Lucent Technologies Inc. Technique for obtaining and exchanging information on wolrd wide web
US5760771A (en) * 1996-07-17 1998-06-02 At & T Corp System and method for providing structured tours of hypertext files
US5828840A (en) 1996-08-06 1998-10-27 Verifone, Inc. Server for starting client application on client if client is network terminal and initiating client application on server if client is non network terminal
US5758355A (en) 1996-08-07 1998-05-26 Aurum Software, Inc. Synchronization of server database with client database using distribution tables
US5974238A (en) * 1996-08-07 1999-10-26 Compaq Computer Corporation Automatic data synchronization between a handheld and a host computer using pseudo cache including tags and logical data elements
US5959543A (en) 1996-08-22 1999-09-28 Lucent Technologies Inc. Two-way wireless messaging system with flexible messaging
US5772779A (en) * 1996-09-03 1998-06-30 Eastman Kodak Company Photoconductor cleaning brush for elimination of photoconductor scum
FI103546B (en) * 1996-09-16 1999-07-15 Nokia Telecommunications Oy Data service in a mobile telephone network
US6012083A (en) * 1996-09-24 2000-01-04 Ricoh Company Ltd. Method and apparatus for document processing using agents to process transactions created based on document content
US6055637A (en) * 1996-09-27 2000-04-25 Electronic Data Systems Corporation System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential
US5893116A (en) * 1996-09-30 1999-04-06 Novell, Inc. Accessing network resources using network resource replicator and captured login script for use when the computer is disconnected from the network
JPH10111727A (en) 1996-10-03 1998-04-28 Toshiba Corp Information equipment having telephone function and security rearising method therefor
US5870765A (en) * 1996-10-09 1999-02-09 Oracle Corporation Database synchronizer
US5870759A (en) * 1996-10-09 1999-02-09 Oracle Corporation System for synchronizing data between computers using a before-image of data
US5944823A (en) * 1996-10-21 1999-08-31 International Business Machines Corporations Outside access to computer resources through a firewall
US5745884A (en) * 1996-10-21 1998-04-28 Mobile Area Networks, Inc. System and method for billing data grade network use on a per connection basis
TW400487B (en) 1996-10-24 2000-08-01 Tumbleweed Software Corp Electronic document delivery system
US5790790A (en) 1996-10-24 1998-08-04 Tumbleweed Software Corporation Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof
US7536324B2 (en) * 1996-10-25 2009-05-19 Ipf, Inc. Internet-based system for managing and delivering consumer product brand information to consumers at points of presence along the world wide web (WWW)
US6785708B1 (en) * 1996-10-30 2004-08-31 Avaya Inc. Method and apparatus for synchronizing browse and chat functions on a computer network
US7249344B1 (en) * 1996-10-31 2007-07-24 Citicorp Development Center, Inc. Delivery of financial services to remote devices
US7236173B2 (en) * 1996-10-30 2007-06-26 Autodesk, Inc. Method and apparatus for providing access to maps on a thin client
US5815683A (en) 1996-11-05 1998-09-29 Mentor Graphics Corporation Accessing a remote cad tool server
US6233318B1 (en) * 1996-11-05 2001-05-15 Comverse Network Systems, Inc. System for accessing multimedia mailboxes and messages over the internet and via telephone
US6154844A (en) 1996-11-08 2000-11-28 Finjan Software, Ltd. System and method for attaching a downloadable security profile to a downloadable
WO1998021911A1 (en) 1996-11-12 1998-05-22 Telefonaktiebolaget Lm Ericsson (Publ) Device for routing information updates
US6212529B1 (en) * 1996-11-13 2001-04-03 Puma Technology, Inc. Synchronization of databases using filters
US6330568B1 (en) 1996-11-13 2001-12-11 Pumatech, Inc. Synchronization of databases
US5943676A (en) 1996-11-13 1999-08-24 Puma Technology, Inc. Synchronization of recurring records in incompatible databases
FI964621A (en) 1996-11-19 1998-05-20 Ericsson Telefon Ab L M Procedures and devices for accessing telephone numbers
US5784463A (en) 1996-12-04 1998-07-21 V-One Corporation Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US8225089B2 (en) * 1996-12-04 2012-07-17 Otomaku Properties Ltd., L.L.C. Electronic transaction systems utilizing a PEAD and a private key
US6131116A (en) 1996-12-13 2000-10-10 Visto Corporation System and method for globally accessing computer services
US6708221B1 (en) 1996-12-13 2004-03-16 Visto Corporation System and method for globally and securely accessing unified information in a computer network
US20060195595A1 (en) * 2003-12-19 2006-08-31 Mendez Daniel J System and method for globally and securely accessing unified information in a computer network
US6085192A (en) 1997-04-11 2000-07-04 Roampage, Inc. System and method for securely synchronizing multiple copies of a workspace element in a network
US6023708A (en) * 1997-05-29 2000-02-08 Visto Corporation System and method for using a global translator to synchronize workspace elements across a network
US6496704B2 (en) 1997-01-07 2002-12-17 Verizon Laboratories Inc. Systems and methods for internetworking data networks having mobility management functions
JPH10257201A (en) 1997-01-09 1998-09-25 Matsushita Electric Ind Co Ltd Electronic mail terminal and electronic mail delivery system
US6125281A (en) 1997-01-31 2000-09-26 Nokia Mobile Phones Limited Real-time SMS application messaging using an SMSC-linked server
JPH10240637A (en) 1997-02-26 1998-09-11 Internatl Business Mach Corp <Ibm> Data transmission device having alternate transmission function, data transmission method and storage medium storing data transmission program
US5982898A (en) 1997-03-07 1999-11-09 At&T Corp. Certification process
US5818935A (en) 1997-03-10 1998-10-06 Maa; Chia-Yiu Internet enhanced video system
US5924103A (en) 1997-03-12 1999-07-13 Hewlett-Packard Company Works-in-progress in an information management system
US6253228B1 (en) * 1997-03-31 2001-06-26 Apple Computer, Inc. Method and apparatus for updating and synchronizing information between a client and a server
US5961590A (en) 1997-04-11 1999-10-05 Roampage, Inc. System and method for synchronizing electronic mail between a client site and a central site
US5958007A (en) 1997-05-13 1999-09-28 Phase Three Logic, Inc. Automatic and secure system for remote access to electronic mail and the internet
US6021427A (en) * 1997-05-22 2000-02-01 International Business Machines Corporation Method and system for preventing routing maelstrom loops of automatically routed electronic mail
US5999947A (en) 1997-05-27 1999-12-07 Arkona, Llc Distributing database differences corresponding to database change events made to a database table located on a server computer
US5903881A (en) 1997-06-05 1999-05-11 Intuit, Inc. Personal online banking with integrated online statement and checkbook user interface
US6023700A (en) * 1997-06-17 2000-02-08 Cranberry Properties, Llc Electronic mail distribution system for integrated electronic communication
CA2210763C (en) 1997-07-17 2000-02-29 Weidong Kou Key generation from a given string for entity authentication
US6073165A (en) 1997-07-29 2000-06-06 Jfax Communications, Inc. Filtering computer network messages directed to a user's e-mail box based on user defined filters, and forwarding a filtered message to the user's receiver
AU7843498A (en) 1997-07-30 1999-02-11 Pagergate Communications Ltd A messaging system
US6249805B1 (en) 1997-08-12 2001-06-19 Micron Electronics, Inc. Method and system for filtering unauthorized electronic mail messages
US5909689A (en) 1997-09-18 1999-06-01 Sony Corporation Automatic update of file versions for files shared by several computers which record in respective file directories temporal information for indicating when the files have been created
JP3439330B2 (en) 1997-09-25 2003-08-25 日本電気株式会社 Email server
US6138146A (en) 1997-09-29 2000-10-24 Ericsson Inc. Electronic mail forwarding system and method
US5951652A (en) 1997-10-06 1999-09-14 Ncr Corporation Dependable data element synchronization mechanism
US5870544A (en) * 1997-10-20 1999-02-09 International Business Machines Corporation Method and apparatus for creating a secure connection between a java applet and a web server
US6052735A (en) * 1997-10-24 2000-04-18 Microsoft Corporation Electronic mail object synchronization between a desktop computer and mobile device
US6034621A (en) * 1997-11-18 2000-03-07 Lucent Technologies, Inc. Wireless remote synchronization of data between PC and PDA
US6169686B1 (en) * 1997-11-20 2001-01-02 Hewlett-Packard Company Solid-state memory with magnetic storage cells
US6295541B1 (en) 1997-12-16 2001-09-25 Starfish Software, Inc. System and methods for synchronizing two or more datasets
US5999932A (en) 1998-01-13 1999-12-07 Bright Light Technologies, Inc. System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing
US6151606A (en) 1998-01-16 2000-11-21 Visto Corporation System and method for using a workspace data manager to access, manipulate and synchronize network data
US6311186B1 (en) 1998-02-20 2001-10-30 Priority Call Management, Inc. Telecommunications switching system utilizing a channelized database access mechanism
US6304881B1 (en) 1998-03-03 2001-10-16 Pumatech, Inc. Remote data access and synchronization
WO1999045482A1 (en) 1998-03-03 1999-09-10 Siebel Systems, Inc. Method, apparatus, system, and program product for attaching files and other objects to a partially replicated database
JP2000003314A (en) 1998-06-12 2000-01-07 Nec Corp Electronic mail receiver, electronic mail reception method and recording medium with electronic mail reception program recorded thereon
US6006225A (en) 1998-06-15 1999-12-21 Amazon.Com Refining search queries by the suggestion of correlated terms from prior searches
US6477545B1 (en) 1998-10-28 2002-11-05 Starfish Software, Inc. System and methods for robust synchronization of datasets
IL141493A0 (en) 1998-08-21 2002-03-10 Visto Corp System and method for using a global translator to synchronize workspace elements across a network
US6389455B1 (en) 1998-09-22 2002-05-14 Richard C. Fuisz Method and apparatus for bouncing electronic messages
US6131096A (en) 1998-10-05 2000-10-10 Visto Corporation System and method for updating a remote database in a network
US7136645B2 (en) 1998-10-09 2006-11-14 Netmotion Wireless, Inc. Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
CN1144136C (en) 1998-10-09 2004-03-31 爱捷特系统有限公司 Method and system for interrogating the internet
US6564218B1 (en) 1998-12-10 2003-05-13 Premitech Aps Method of checking the validity of a set of digital information, and a method and an apparatus for retrieving digital information from an information source
US6118856A (en) 1998-12-28 2000-09-12 Nortel Networks Corporation Method and apparatus for automatically forwarding an email message or portion thereof to a remote device
US6112529A (en) * 1998-12-30 2000-09-05 Curbow; Jeffery L. Carbon dioxide vaporizer
US7469381B2 (en) * 2007-01-07 2008-12-23 Apple Inc. List scrolling and document translation, scaling, and rotation on a touch-screen display
US6697942B1 (en) * 1999-02-04 2004-02-24 Earthlink, Inc. Method for remotely managing a remote device using an electronic mail message
US6463493B1 (en) * 1999-03-24 2002-10-08 Dell Products L.P. Adaptive card-sensitive bus slot method and system
US6438583B1 (en) 1999-06-23 2002-08-20 Re-Route Corporation System and method for re-routing of e-mail messages
US6510455B1 (en) * 1999-09-01 2003-01-21 Inventec Corporation Electronic mail message checking system
US6446090B1 (en) 1999-10-08 2002-09-03 Unisys Corporation Tracker sensing method for regulating synchronization of audit files between primary and secondary hosts
EP1130511A3 (en) 2000-01-25 2004-04-07 FusionOne, Inc. Data transfer and synchronization system
US6631416B2 (en) 2000-04-12 2003-10-07 Openreach Inc. Methods and systems for enabling a tunnel between two computers on a network
US7225231B2 (en) 2000-09-20 2007-05-29 Visto Corporation System and method for transmitting workspace elements across a network
US6813487B1 (en) 2000-10-18 2004-11-02 David Alan Trommelen Method and apparatus for securing data stored in a remote electronic device
US20040068721A1 (en) 2000-11-17 2004-04-08 O'neill Patrick Network for updating firmware and / or software in wireless communication devices
US8402129B2 (en) 2001-03-21 2013-03-19 Alcatel Lucent Method and apparatus for efficient reactive monitoring
JP3511171B2 (en) 2001-03-30 2004-03-29 富士通カンタムデバイス株式会社 High frequency semiconductor device
US20020174372A1 (en) 2001-05-18 2002-11-21 Buvana Venkataraman Method and apparatus for providing synchronized data
JP2003005905A (en) 2001-06-22 2003-01-10 Matsushita Electric Ind Co Ltd Electronic equipment
EP1451718B1 (en) 2001-10-23 2012-08-08 Beechwood Limited Partnership System and method for merging remote and local data in a single user interface
US7752166B2 (en) 2001-11-15 2010-07-06 Visto Corporation System and methods for asynchronous synchronization
US7496957B2 (en) 2002-01-02 2009-02-24 Hewlett-Packard Development Company, L.P. System and method for preventing use of a wireless device
US8012219B2 (en) 2002-08-09 2011-09-06 Visto Corporation System and method for preventing access to data on a compromised remote device
US20040098715A1 (en) 2002-08-30 2004-05-20 Parixit Aghera Over the air mobile device software management
US7480907B1 (en) 2003-01-09 2009-01-20 Hewlett-Packard Development Company, L.P. Mobile services network for update of firmware/software in mobile handsets
JP2006526327A (en) 2003-04-03 2006-11-16 ノキア コーポレイション System for managing context related information, mobile station, method and computer program product
US7987449B1 (en) 2003-05-22 2011-07-26 Hewlett-Packard Development Company, L.P. Network for lifecycle management of firmware and software in electronic devices
WO2005001665A2 (en) 2003-06-27 2005-01-06 Bitfone Corporation System and method for downloading update packages into a mobile handset in a carrier network
US7624393B2 (en) 2003-09-18 2009-11-24 International Business Machines Corporation Computer application and methods for autonomic upgrade maintenance of computer hardware, operating systems and application software
US7844964B2 (en) 2004-09-23 2010-11-30 Hewlett Packard Development Company, L.P. Network for mass distribution of configuration, firmware and software updates
CN100552629C (en) 2005-04-18 2009-10-21 捷讯研究有限公司 Realization is based on the version scheme of data compatibility
US8532633B2 (en) * 2005-09-14 2013-09-10 Jumptap, Inc. System for targeting advertising content to a plurality of mobile communication facilities
US20070093243A1 (en) 2005-10-25 2007-04-26 Vivek Kapadekar Device management system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US349522A (en) * 1886-09-21 Cash-register
US376590A (en) * 1888-01-17 Yarn-reel
US5666553A (en) * 1992-04-10 1997-09-09 Puma Technology, Inc. Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5666530A (en) * 1992-12-02 1997-09-09 Compaq Computer Corporation System for automatic synchronization of common file between portable computer and host computer via communication channel selected from a plurality of usable channels there between
US5541986A (en) * 1993-07-27 1996-07-30 Bell Communications Research, Inc. Method and system for automated telecommunications service script consolidation and downloading
US5590334A (en) * 1994-03-30 1996-12-31 Apple Computer, Inc Object oriented message passing system and method
US5734903A (en) * 1994-05-13 1998-03-31 Apple Computer, Inc. System and method for object oriented message filtering
US6195678B1 (en) * 1996-09-03 2001-02-27 Fujitsu Limited Remote resource management system for automatically downloading required files from application server depending on contents of selected files on requesting computer
US6401112B1 (en) * 1997-01-29 2002-06-04 Palm, Inc. Method and apparatus for synchronizing an Email client on a portable computer system with an Email client on a desktop computer
US6006274A (en) * 1997-01-30 1999-12-21 3Com Corporation Method and apparatus using a pass through personal computer connected to both a local communication link and a computer network for indentifying and synchronizing a preferred computer with a portable computer
US6466981B1 (en) * 1998-06-30 2002-10-15 Microsoft Corporation Method using an assigned dynamic IP address and automatically restoring the static IP address
US6226677B1 (en) * 1998-11-25 2001-05-01 Lodgenet Entertainment Corporation Controlled communications over a global computer network
US6457062B1 (en) * 1999-04-08 2002-09-24 Palm, Inc. System and method for synchronizing multiple calendars over wide area network
US6591095B1 (en) * 1999-05-21 2003-07-08 Motorola, Inc. Method and apparatus for designating administrative responsibilities in a mobile communications device
US7228330B2 (en) * 2002-03-05 2007-06-05 Cegetel Groupe Method for the optimization of network traffic, and associated implementation device

Cited By (114)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090307362A1 (en) * 1996-12-13 2009-12-10 Visto Corporation System and method for globally and securely accessing unified information in a computer network
US8745167B2 (en) * 1996-12-13 2014-06-03 Good Technology Corporation System and method for globally and securely accessing unified information in a computer network
US9361603B2 (en) 1996-12-13 2016-06-07 Good Technology Corporation System and method for globally and securely accessing unified information in a computer network
USRE42694E1 (en) * 1999-11-24 2011-09-13 Writeback Technologies, L.L.C. Method and systems for providing communications services
US20120311189A1 (en) * 2011-06-01 2012-12-06 Kazuhiro Yamada Information processing apparatus, information processing system, and recording medium
US9053126B2 (en) * 2011-06-01 2015-06-09 Ricoh Company, Ltd. Information processing apparatus, information processing system, and recording medium
US20150249724A1 (en) * 2011-06-01 2015-09-03 Kazuhiro Yamada Information processing apparatus, information processing system, and recording medium
US8713646B2 (en) 2011-12-09 2014-04-29 Erich Stuntebeck Controlling access to resources on a network
US11082355B2 (en) 2012-02-14 2021-08-03 Airwatch, Llc Controllng distribution of resources in a network
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US9705813B2 (en) 2012-02-14 2017-07-11 Airwatch, Llc Controlling distribution of resources on a network
US10257194B2 (en) 2012-02-14 2019-04-09 Airwatch Llc Distribution of variably secure resources in a networked environment
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US10951541B2 (en) 2012-02-14 2021-03-16 Airwatch, Llc Controlling distribution of resources on a network
US11483252B2 (en) 2012-02-14 2022-10-25 Airwatch, Llc Controlling distribution of resources on a network
US20140016816A1 (en) * 2012-07-10 2014-01-16 Ricoh Company, Ltd. Service providing system, service providing method, and non-transitory computer readable information recording medium
US9247432B2 (en) 2012-10-19 2016-01-26 Airwatch Llc Systems and methods for controlling network access
US10986095B2 (en) 2012-10-19 2021-04-20 Airwatch Llc Systems and methods for controlling network access
US10681017B2 (en) 2012-12-06 2020-06-09 Airwatch, Llc Systems and methods for controlling email access
US9853928B2 (en) 2012-12-06 2017-12-26 Airwatch Llc Systems and methods for controlling email access
US9391960B2 (en) 2012-12-06 2016-07-12 Airwatch Llc Systems and methods for controlling email access
US9021037B2 (en) 2012-12-06 2015-04-28 Airwatch Llc Systems and methods for controlling email access
US8978110B2 (en) 2012-12-06 2015-03-10 Airwatch Llc Systems and methods for controlling email access
US11050719B2 (en) 2012-12-06 2021-06-29 Airwatch, Llc Systems and methods for controlling email access
US10243932B2 (en) 2012-12-06 2019-03-26 Airwatch, Llc Systems and methods for controlling email access
US9426129B2 (en) 2012-12-06 2016-08-23 Airwatch Llc Systems and methods for controlling email access
US9882850B2 (en) 2012-12-06 2018-01-30 Airwatch Llc Systems and methods for controlling email access
US10666591B2 (en) 2012-12-06 2020-05-26 Airwatch Llc Systems and methods for controlling email access
US9813390B2 (en) 2012-12-06 2017-11-07 Airwatch Llc Systems and methods for controlling email access
US8862868B2 (en) 2012-12-06 2014-10-14 Airwatch, Llc Systems and methods for controlling email access
US8832785B2 (en) 2012-12-06 2014-09-09 Airwatch, Llc Systems and methods for controlling email access
US8826432B2 (en) 2012-12-06 2014-09-02 Airwatch, Llc Systems and methods for controlling email access
US9325713B2 (en) 2012-12-06 2016-04-26 Airwatch Llc Systems and methods for controlling email access
US9450921B2 (en) 2012-12-06 2016-09-20 Airwatch Llc Systems and methods for controlling email access
US9473417B2 (en) 2013-03-14 2016-10-18 Airwatch Llc Controlling resources used by computing devices
US11824644B2 (en) 2013-03-14 2023-11-21 Airwatch, Llc Controlling electronically communicated resources
US10116583B2 (en) 2013-03-14 2018-10-30 Airwatch Llc Controlling resources used by computing devices
US10412081B2 (en) 2013-03-15 2019-09-10 Airwatch, Llc Facial capture managing access to resources by a device
US10965658B2 (en) 2013-03-15 2021-03-30 Airwatch Llc Application program as key for authorizing access to resources
US11824859B2 (en) 2013-03-15 2023-11-21 Airwatch Llc Certificate based profile confirmation
USRE49585E1 (en) 2013-03-15 2023-07-18 Airwatch Llc Certificate based profile confirmation
US9378350B2 (en) 2013-03-15 2016-06-28 Airwatch Llc Facial capture managing access to resources by a device
US9438635B2 (en) 2013-03-15 2016-09-06 Airwatch Llc Controlling physical access to secure areas via client devices in a network environment
US9275245B2 (en) 2013-03-15 2016-03-01 Airwatch Llc Data access sharing
US11689516B2 (en) 2013-03-15 2023-06-27 Vmware, Inc. Application program as key for authorizing access to resources
US11283803B2 (en) 2013-03-15 2022-03-22 Airwatch Llc Incremental compliance remediation
US11069168B2 (en) 2013-03-15 2021-07-20 Airwatch, Llc Facial capture managing access to resources by a device
US10972467B2 (en) 2013-03-15 2021-04-06 Airwatch Llc Certificate based profile confirmation
US9401915B2 (en) 2013-03-15 2016-07-26 Airwatch Llc Secondary device as key for authorizing access to resources
US8997187B2 (en) 2013-03-15 2015-03-31 Airwatch Llc Delegating authorization to applications on a client device in a networked environment
US10652242B2 (en) 2013-03-15 2020-05-12 Airwatch, Llc Incremental compliance remediation
US10560453B2 (en) 2013-03-15 2020-02-11 Airwatch Llc Certificate based profile confirmation
US9148416B2 (en) 2013-03-15 2015-09-29 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US10127751B2 (en) 2013-03-15 2018-11-13 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US9203820B2 (en) 2013-03-15 2015-12-01 Airwatch Llc Application program as key for authorizing access to resources
US10108808B2 (en) 2013-03-15 2018-10-23 Airwatch Llc Data access sharing
US9686287B2 (en) 2013-03-15 2017-06-20 Airwatch, Llc Delegating authorization to applications on a client device in a networked environment
US9847986B2 (en) 2013-03-15 2017-12-19 Airwatch Llc Application program as key for authorizing access to resources
US9819682B2 (en) 2013-03-15 2017-11-14 Airwatch Llc Certificate based profile confirmation
US10116662B2 (en) 2013-04-12 2018-10-30 Airwatch Llc On-demand security policy activation
US11902281B2 (en) 2013-04-12 2024-02-13 Airwatch Llc On-demand security policy activation
US9787686B2 (en) 2013-04-12 2017-10-10 Airwatch Llc On-demand security policy activation
US10785228B2 (en) 2013-04-12 2020-09-22 Airwatch, Llc On-demand security policy activation
US11880477B2 (en) 2013-04-13 2024-01-23 Airwatch Llc Time-based functionality restrictions
US10754966B2 (en) 2013-04-13 2020-08-25 Airwatch Llc Time-based functionality restrictions
US8914013B2 (en) 2013-04-25 2014-12-16 Airwatch Llc Device management macros
US10402789B2 (en) 2013-04-26 2019-09-03 Airwatch Llc Attendance tracking via device presence
US9123031B2 (en) 2013-04-26 2015-09-01 Airwatch Llc Attendance tracking via device presence
US9219741B2 (en) 2013-05-02 2015-12-22 Airwatch, Llc Time-based configuration policy toggling
US9703949B2 (en) 2013-05-02 2017-07-11 Airwatch, Llc Time-based configuration profile toggling
US11204993B2 (en) 2013-05-02 2021-12-21 Airwatch, Llc Location-based configuration profile toggling
US9426162B2 (en) 2013-05-02 2016-08-23 Airwatch Llc Location-based configuration policy toggling
US10303872B2 (en) 2013-05-02 2019-05-28 Airwatch, Llc Location based configuration profile toggling
US9246918B2 (en) 2013-05-10 2016-01-26 Airwatch Llc Secure application leveraging of web filter proxy services
US9516066B2 (en) 2013-05-16 2016-12-06 Airwatch Llc Rights management services integration with mobile device management
US9825996B2 (en) 2013-05-16 2017-11-21 Airwatch Llc Rights management services integration with mobile device management
US9058495B2 (en) 2013-05-16 2015-06-16 Airwatch Llc Rights management services integration with mobile device management
US9584437B2 (en) 2013-06-02 2017-02-28 Airwatch Llc Resource watermarking and management
US9900261B2 (en) 2013-06-02 2018-02-20 Airwatch Llc Shared resource watermarking and management
US11651325B2 (en) 2013-06-04 2023-05-16 Airwatch Llc Item delivery optimization
US10515334B2 (en) 2013-06-04 2019-12-24 Airwatch Llc Item delivery optimization
US10824757B2 (en) 2013-06-06 2020-11-03 Airwatch Llc Social media and data sharing controls
US9270777B2 (en) 2013-06-06 2016-02-23 Airwatch Llc Social media and data sharing controls for data security purposes
US9535857B2 (en) 2013-06-25 2017-01-03 Airwatch Llc Autonomous device interaction
US8924608B2 (en) 2013-06-25 2014-12-30 Airwatch Llc Peripheral device management
US9514078B2 (en) 2013-06-25 2016-12-06 Airwatch Llc Peripheral device management
US8775815B2 (en) 2013-07-03 2014-07-08 Sky Socket, Llc Enterprise-specific functionality watermarking and management
US9699193B2 (en) 2013-07-03 2017-07-04 Airwatch, Llc Enterprise-specific functionality watermarking and management
US8756426B2 (en) 2013-07-03 2014-06-17 Sky Socket, Llc Functionality watermarking and management
US9552463B2 (en) 2013-07-03 2017-01-24 Airwatch Llc Functionality watermarking and management
US8806217B2 (en) 2013-07-03 2014-08-12 Sky Socket, Llc Functionality watermarking and management
US9195811B2 (en) 2013-07-03 2015-11-24 Airwatch Llc Functionality watermarking and management
US9202025B2 (en) 2013-07-03 2015-12-01 Airwatch Llc Enterprise-specific functionality watermarking and management
US9585016B2 (en) 2013-07-25 2017-02-28 Airwatch Llc Data communications management
US9112749B2 (en) 2013-07-25 2015-08-18 Airwatch Llc Functionality management via application modification
US9226155B2 (en) 2013-07-25 2015-12-29 Airwatch Llc Data communications management
US9800454B2 (en) 2013-07-25 2017-10-24 Airwatch Llc Functionality management via application modification
US9665723B2 (en) 2013-08-15 2017-05-30 Airwatch, Llc Watermarking detection and management
US9516005B2 (en) 2013-08-20 2016-12-06 Airwatch Llc Individual-specific content management
US11070543B2 (en) 2013-09-16 2021-07-20 Airwatch, Llc Multi-persona management and devices
US10129242B2 (en) 2013-09-16 2018-11-13 Airwatch Llc Multi-persona devices and management
US10798076B2 (en) 2013-09-23 2020-10-06 Airwatch, Llc Securely authorizing access to remote resources
US11570160B2 (en) 2013-09-23 2023-01-31 Airwatch, Llc Securely authorizing access to remote resources
US9185099B2 (en) 2013-09-23 2015-11-10 Airwatch Llc Securely authorizing access to remote resources
US10257180B2 (en) 2013-09-23 2019-04-09 Airwatch Llc Securely authorizing access to remote resources
US9769141B2 (en) 2013-09-23 2017-09-19 Airwatch Llc Securely authorizing access to remote resources
US9544306B2 (en) 2013-10-29 2017-01-10 Airwatch Llc Attempted security breach remediation
US9258301B2 (en) 2013-10-29 2016-02-09 Airwatch Llc Advanced authentication techniques
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US10194266B2 (en) 2014-12-22 2019-01-29 Airwatch Llc Enforcement of proximity based policies
US9813247B2 (en) 2014-12-23 2017-11-07 Airwatch Llc Authenticator device facilitating file security
US9413754B2 (en) 2014-12-23 2016-08-09 Airwatch Llc Authenticator device facilitating file security
US9916446B2 (en) 2016-04-14 2018-03-13 Airwatch Llc Anonymized application scanning for mobile devices
US9917862B2 (en) 2016-04-14 2018-03-13 Airwatch Llc Integrated application scanning and mobile enterprise computing management system

Also Published As

Publication number Publication date
US9361603B2 (en) 2016-06-07
US20100005125A1 (en) 2010-01-07
US8812702B2 (en) 2014-08-19
US8745167B2 (en) 2014-06-03
US8117344B2 (en) 2012-02-14
US20060195595A1 (en) 2006-08-31
US20100005195A1 (en) 2010-01-07
US20110153779A1 (en) 2011-06-23
US20090307362A1 (en) 2009-12-10

Similar Documents

Publication Publication Date Title
US9361603B2 (en) System and method for globally and securely accessing unified information in a computer network
US6708221B1 (en) System and method for globally and securely accessing unified information in a computer network
EP2224673B1 (en) System and method for globally and securely accessing unified information in a computer network
EP1785927B1 (en) System and Method for synchronizing electronic mail across a network
US20100005157A1 (en) System and method for using a global translator to synchronize workspace elements across a network
US6085192A (en) System and method for securely synchronizing multiple copies of a workspace element in a network
EP0986225A1 (en) System and method for securely synchronizing multiple copies of a workspace element in a network
WO2000011567A1 (en) System and method for using a global translator to synchronize workspace elements across a network
CA2616759A1 (en) System and method for globally and securely accessing unified information in a computer network
CA2340711A1 (en) System and method for using a global translator to synchronize workspace elements across a network

Legal Events

Date Code Title Description
AS Assignment

Owner name: GOOD TECHNOLOGY CORPORATION, DELAWARE

Free format text: CHANGE OF NAME;ASSIGNOR:VISTO CORPORATION;REEL/FRAME:029347/0783

Effective date: 20120919

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MALIKIE INNOVATIONS LIMITED, IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLACKBERRY LIMITED;REEL/FRAME:064104/0103

Effective date: 20230511