WO1999023568A1 - Method and apparatus to determine user identity and limit access to a communications network - Google Patents
Method and apparatus to determine user identity and limit access to a communications network Download PDFInfo
- Publication number
- WO1999023568A1 WO1999023568A1 PCT/US1998/022381 US9822381W WO9923568A1 WO 1999023568 A1 WO1999023568 A1 WO 1999023568A1 US 9822381 W US9822381 W US 9822381W WO 9923568 A1 WO9923568 A1 WO 9923568A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- user identity
- network address
- message
- access control
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Definitions
- the invention relates to the transmission of information in a communications network. More particularly, the invention relates to a method and apparatus to determine user identity and limit access to a communications network.
- a packet-based communications network can transmit a data stream of bits in the form of packets of fixed or variable length for the purpose of moving information between computers. Each packet can be routed by address information contained in the data stream. Typically, one accesses a packet network through a client program executing on a personal computer (PC) .
- PC personal computer
- the Internet (the largest and most well-known of the existing packet networks) connects millions of computers in countries across the world.
- the World Wide Web represents a portion of the information on the Internet accessible through graphical user interface software (typically called a Web browser or browser) .
- graphical user interface software typically called a Web browser or browser
- many companies use packet networks, locally or internally within the company, which are modeled in functionality based upon the Internet.
- IP Internet Protocol
- a communications network can transmit pages of information to a user's computer for display.
- One example of such an information page is used in the World Wide Web (also called simply the "Web") , which stores and transmits information pages over the Internet using the Hyper Text Markup Language (HTML) transmitted via Hyper Text Transfer Protocol (HTTP) .
- HTML Hyper Text Markup Language
- HTTP Hyper Text Transfer Protocol
- the information that comprises a Web page on the Internet typically resides on a computer known as a server, which is accessed through the Internet by a person utilizing a computer, such as a PC.
- a Web page can include combinations of text, graphics, sound, video and small application programs.
- a Web page can also include a "link" which, when selected by a user, results in the automatic display of another Web page.
- a group of related Web pages connected by these links is sometimes referred to as a Web "site.”
- Each file of information on the Web is given a name, called a Uniform Resource Locator (URL) , that a browser uses to request a file.
- the URL is essentially a location that can represent an entire Web page, an image file or any other type of file supported by HTML.
- the Netscape NavigatorTM browser available from Netscape Communications Corporation in Mountain View, California, is one example of a browser that can request URLs and display Web pages to a user.
- a user at a PC will access the Internet by establishing a communications link with, or "logging onto,” an Internet Service Provider (ISP), perhaps over a telephone line using a modem.
- ISP Internet Service Provider
- the user' s browser communicates with the Internet through the ISP to retrieve the information related to the requested URL.
- Web sites are establishing as a means of providing information to and attracting potential customers, and Web sites are emerging as an important tool for advertising.
- Web browsing takes place in the context of an interactive communication session, where one may, for example, direct the Web browsing session by choosing to follow hypertext links found in Web sites and/or may respond to information located at various Web sites.
- An ISP typically generates revenue by charging a fee for providing access to the Internet, and the fees, which can be quite substantial, have been beyond the reach of many consumers. Therefore, some consumers have not had access to the Internet and are unable to view an advertiser' s Web page.
- an advertiser might prefer to grant access to a particular Web advertisement based on the identity of a user, including, for example, the user's age and income.
- An advertiser might decide, for example, that different groups of users should see different advertisements, or that some groups should be allowed to view an advertisement for a longer period of time.
- the traditional browser/ISP interface does not let an ISP restrict access to URLs based on the user's identity, because, as explained below, the user's identity is not known.
- IP address is usually expressed as four decimal numbers separated by periods.
- the request will include the browser' s IP address and the recipient, such as an advertiser, can respond using the browser's IP address.
- a different IP address may be assigned to a computer on which the browser software is running each time the browser connects to the Internet, making the identity of the user invisible in the traditional browser/Web server arrangement.
- An advertiser could insist that a user provide personal information, such as demographic data or a password, when the user visits an advertisement Web page. Many users, however, are reluctant to provide this information over the Internet, and others will not bother to spend the time required by such a method.
- Advertisers might also be interested in other information about users visiting an advertisement Web page. For example, a demographic profile of the average user who visits a Web page, or the average number of times each user returns to a particular Web site, could help advertisers determine the effectiveness of the content. As explained above, however, there is no way for an advertiser to match the IP address of an HTTP request to a user's demographic information. Moreover, an advertiser has only a limited ability to determine if a particular user has visited a Web page before. It is possible, for example, for the advertiser to store the fact that a particular computer has visited a Web page in a small file, called a "cookie," placed on the computer's disk drive. This feature, however, is not available in all browsers. Furthermore, many users simply delete cookie files or decide to disable the feature entirely. In addition, cookie files cannot track a single person' s history when two different PCs are used, and similarly do not usually account for multiple people using a single PC.
- an advertiser might want to limit access to advertisement Web pages to a limited period of time. Alternately, an advertiser may wish to limit the number of times a user can visit, and re-visit, an advertisement Web page.
- a first message containing user identity information is received from a client computer in accordance with a first protocol.
- a first network address is determined from the first message.
- a second message containing an information request is also received from the client in accordance with a second protocol, and a second network address is determined from the second message.
- the requesting user identity is then determined based on the first network address, the user identity information and the second network address. Based on the requesting user identity, it can be decided whether to grant the information request. If access is granted, the requested information is retrieved using the communications network.
- An embodiment of the present invention includes a proxy controller in communication with an access control proxy.
- the proxy controller includes a user identity database and a proxy control processor in communication with a client computer.
- the proxy control processor can receive from a client a first message containing user identity information. A first network address is determined from the first message.
- the access control proxy includes a communications port capable of receiving information pages, such as Web pages, from the communications network.
- the access control proxy also includes a proxy processor able to receive a second message from the client including a request for an information page, such as a URL, and a second network address is determined from the second message. Based on the first network address, the user identity information and the second network address, the proxy processor in conjunction with the proxy control processor can decide whether to retrieve the requested URL from the Internet.
- FIG. 1A is a block diagram of a system including an embodiment of the present invention.
- FIG. IB is a more detailed block diagram of the system shown in FIG. 1A.
- FIG. 2 is a block diagram illustrating an embodiment of the present invention using an e-mail system.
- FIG. 3 is a flow diagram showing a process that can be used in an access control Web proxy according to an embodiment of the present invention.
- FIG. 4 is a block diagram showing functional components of an access control system according to an embodiment of the present invention.
- FIG. 5 is a block diagram showing communications involving a proxy control protocol daemon according to an embodiment of the present invention.
- FIG. 1A a block diagram of a system including an embodiment of the present invention.
- a user, or "client,” computer 200 such as a PC, accesses the Internet 100 through an access control system 300.
- client computer 200
- the present invention is capable of handling multiple clients.
- the user PC 200 access the Internet 100 through an access control "Web proxy" 310 having a connection 110 to the Internet 100.
- a proxy is a computer system that traditionally acts on behalf of other Web servers by gathering all Internet requests from a number of clients, obtaining the requested information from the Internet, and forwarding the requested information to the appropriate clients.
- a proxy can be used, for example, in a company having a number of client terminals and a single point of access to the Internet. Such a proxy can also be configured to reduce network traffic by locally storing, or "caching," commonly downloaded information.
- the user PC 200 also communicates with a proxy controller 320 in the access control system 300.
- the access control proxy 310 will only grant the user access to a limited set of Web pages. The set of Web pages that can be accessed will be based on information provided to the access control proxy 310 from the proxy controller 320.
- the client access control application 210 could be implemented using an electronic mail system that displays targeted advertisements to remote users when the users are off line, such as the one described in U.S. patent application Serial No. 08/636,739 entitled "Electronic Mail System with Advertising.”
- an electronic mail (e-mail) system 500 including a server e-mail application program 520, is shown in FIG. 2.
- the e-mail application program 520 could, for example, briefly communicate with the user PC 200 through a modem 230 connected to a telephone line in order to download e-mail and advertising information.
- An advertisement banner 240 could then be constructed from the received advertising information. This banner 240 could be displayed while the user is reading the e- mail information 250 - even if the user PC 200 is not in communication with the e-mail system 500.
- the off-line user could select an advertisement from the banner 240 to automatically initiate the limited access to the Internet 100.
- the user PC 200 would request and receive Web page information through a Web proxy 510 and proxy control processor 530, and the Web page associated with the selected advertisement would be displayed. Although the user would be allowed to view a pre-determined list of related Web pages, other Web page requests would be rejected by the system 510, 530.
- a user's access to the Web will be restricted to a subset of the total number of information pages available.
- the subset can be different for each user, and can change over time.
- FIG. IB which shows the system of FIG. 1A in greater detail, it is not practical to impose this restriction using software residing on the user PC 200.
- a user might alter software residing on the user PC 200, perhaps gaining unlimited access to the Internet 100.
- This risk is reduced with the use of the access control system 300, including an access control proxy 310 and a proxy controller 320.
- the access control proxy 310 will control all communication between the browser application 220 and the Internet 100.
- the present invention can handle any number of clients.
- the user PC 200 includes a browser application 220.
- the browser application 220 can be a standard off-the-shelf browser program, such as Netscape NavigatorTM, configured to access the Internet 100 through a proxy acting on behalf of other Web servers.
- a client access control application 210 also resides on the user PC 200.
- the client access control application 210 can be used to initiate a Web browsing session.
- the client access control application 210 can display an index of advertisements to a user.
- the client access control application 210 can activate the browser application 220 and obtain a Web page associated with that advertisement.
- the user will only be allowed to access the Web page, or group of Web pages, associated with that advertisement. If desired, the user can then select a different advertisement from the index and view its associated Web page or pages.
- proxy technology As a "choke point" to limit access to the Web.
- a proxy such as an access control proxy 310, can selectively filter out portions of the Web by examining every Web request from the browser application 220 and applying decision logic based on the IP address of the user and the URL being requested. Only requests approved by the access control proxy 310 are retrieved from the Internet 100 through connection 110 and forwarded to the browser 220.
- a standard IP network connection such as one established using Point to Point Protocol (PPP)
- PPP Point to Point Protocol
- the PPP account can have an IP address filter, making it impossible for the user PC 200 to connect to any service besides the access control proxy 310 and the proxy controller 320.
- the access control proxy 310 decides if a particular URL request from the browser application 220 will be granted based on information from the proxy controller 320.
- the client access control application 210 communicates with the proxy controller 320.
- the client access control application 210 communicates with a Proxy Control Protocol Daemon (PCPD) 330 residing in the proxy controller 320, which also includes a user database system 350 and a daemon system 340.
- PCPD Proxy Control Protocol Daemon
- a "daemon” is a program that handles service requests by forwarding them to other programs, or processes, as appropriate.
- the user database system 350 and the daemon system 340 can easily be replaced by any database containing, for example, usage information, demographics and authentication information about individual users.
- the only distinguishing piece of information regarding a request's origin that is carried with every Web request from the browser application 220 to the access control proxy 310 is the IP address assigned to the client by the ISP.
- This information is sufficient to identify related "hits" from a browsing "session," but the identity of the user remains concealed to the access control proxy 310 because a different IP address is assigned to each single client for each new session.
- This anonymity makes dynamic proxy access restrictions impossible to enact using a traditional Web client/proxy or client/server model.
- an out-of-band protocol called Proxy Control Protocol is used to exchange information between the client access control application 210 and the PCPD 330, which operates in parallel with the access control proxy 310.
- the PCP information can be used to determine the identity of a user associated with an IP address.
- a user's password can be authenticated by the PCPD 330 during the start of every Web browsing session, perhaps with the aide of the user database system 350 which includes a user database server 352 with access to a user identity database 355.
- the IP address associated with the authenticated user can then be used by the access control proxy 310 to associate that user with future Web page requests having the same IP address.
- the client access control application 210 can send a request to PCPD 330, through the out-of-band PCP, to "add" the appropriate Web page, or Web pages, to an Access Control List (ACL) maintained by the access control proxy 310.
- the PCPD 330 informs the access control proxy of the change to the ACL for the IP address.
- the ACL can then be used to decide whether a Web page request from the browser application 220 with a particular IP address should be granted. Because of the dynamic nature of the ACL for each user, an access control proxy 310 which bases access decisions on a static table is inadequate. Instead, an ACL can be maintained by the access control proxy 310 for each browsing session, which is identified by both the access control proxy 310 and the PCPD 330 using the IP address.
- the access control proxy 310 can limit a user's Web access based on, for example, the identity of the user or the specific advertisement being requested.
- One type of restriction that may be imposed is based on the number of times, or the "frequency" that, a user may connect to a given site. For example, a user may be allocated a fixed number of connections for their lifetime, or over a fixed period of time. Thus, e.g., a user could be allocated a maximum of ten connections for each advertisement in the advertisement index.
- the user's demographics, such as age, income and residence, and the user' s Web browsing history, such as how many times the user has visited a particular Web page or group of Web pages, can also be used to impose such a frequency restriction.
- the amount of time, or "duration,” a user can stay at any one site, or group of sites, is another type of restriction that may be imposed.
- a user could be allocated, for example, a fixed period of time for the user's lifetime, or for each browsing session. Thus, a user could be allocated a maximum of ten minutes for each advertisement in the advertisement index.
- the time restriction could also be modified, for example, to extend the fixed period of time, or to avoid an abrupt end to a session, when the user is downloading a large software file or is involved in another transaction which should be extended. For example, the user may be midway through the completion of an order form.
- a user' s demographics and history can be used to impose a duration restriction.
- the time of day, or day of the week, when a request is made can also be taken into account for either restriction.
- Client specific data including the version of client access control application software, the Point-of-Presence (POP) location of the Internet connection and the version of browser application software being used could all be considered.
- POP Point-of-Presence
- a user's allocation could be periodically "reset,” such as at the beginning of every month.
- a combination of both frequency and duration, as well as other restrictions are possible. For example, users between the ages of 25 and 35 could be allocated four visits, with each visit lasting no more than 10 minutes.
- Such limits can be applied to a single Web page, or a group of Web pages and different advertisers can impose different types of restrictions.
- the limitations are implemented by the PCPD 330 in conjunction with information, such as demographic or access history information for the particular user, stored in the user database 345.
- the access control system 300 can compile information about a user, or a group of users, and associated Web requests. Such information could be useful because advertisement rates could be based on the number of visitors to the URLs associated with the advertisement. Some advertisers will be interested in the number of visitors and their related demographic information. Other information about a particular user, or a group of users, that can be recorded and supplied to advertisers can include, for example, the times of all connections and the total time spent at each Web site. Reports to advertisers based on the information recorded by the access control system 300 can also include demographic information about users or groups of user, such as the information that can be contained in the user database 345.
- This type of information could include, for example: gender; education; income; age; marital status; and number of children.
- the present invention also allows the total number of users who have requested a URL to be tracked. As some users may visit a site more than once, the total number of visits to a site can also be monitored, along with the average time spent at each site during each visit.
- the access control proxy 310 can cache content to reduce the amount of network traffic. This function is performed by a Web proxy cache 312, described in detail below with respect to FIG. 4, in communication with a cache database 315.
- FIG. 3 is a flow diagram showing a process that can be used for these functions according to an embodiment of the present invention. After beginning at step 400, the access control proxy receives a request from the browser application including an IP address and a requested URL at step 410. If the URL is not in the ACL associated with that IP address at step 420, an error page is sent to the user at step 430 and the denial is logged at step 435 before the process continues at step 490.
- the system determines if the requested content has already been cached at step 440.
- the access control proxy gets a request from the browser application, such as for a Web page or graphic, the information generally must be retrieved from the Internet and sent back to the browser application.
- the access control proxy can create twice as much network communication as a simple direct (non-proxy) HTTP transaction. To reduce this extra traffic, the access control proxy can save cacheable content on disk, skip the step of retrieving the information from the Internet, and respond immediately to a request from the browser application.
- the content has been cached, it is provided to the user at step 470 and the successful request is logged at step 480 before the process continues at step 490.
- the system determines whether the requested information is "cacheable" at step 405. Although some content may not be cacheable, it can be expected that much of the information used in advertisement Web pages will be cacheable. If the information is not cacheable, it is simply retrieved and sent to the user as before. If the information is cacheable, the retrieved information is saved in the cache at step 460 before being sent to the user.
- the basic purpose of the access control proxy 310 is to provide and record, or "audit,” limited access to Web pages, such as advertisements, in response to requests from the browser application 210. According to an embodiment of the present invention, these and other tasks are performed using the functional components shown in FIG. 4.
- the access control proxy 310 can filter requests from a browser application 220 based on the advertisement that has been selected from the advertisement index.
- a different ACL 360 can be associated with each advertisement, and only URLs contained in the ACL 360 will be retrieved from Web servers 120, 130, 140 on the Internet.
- a successful request can be stored in a log 370 and the information can be supplied to the browser application 220 for display to the user. All other URL requests can simply be denied, and the denials can also be stored in a log 370.
- the PCPD 330 Because the client access control application communicates with the PCPD 330, the PCPD 330 knows which advertisement has been selected by a user from the advertisement index, and therefore which ACL 360 is appropriate. The PCPD 330 also knows the IP address of that user. This information is provided to the access control proxy 310. In summary, the PCPD 330 tells the proxy each user's name, IP address and the ACL that contains the URLs the user is allowed to browse.
- the access control proxy 310 correlates each Web request from the browser application 220 with an appropriate user, and an appropriate ACL 360, based on the IP address contained in the Web request. If there is no match between the URL requested by the user and the ACL 360 for that user, the request is denied and logged. Otherwise, the request is served, and the corresponding user and advertisement information are logged. Eventually, timers or other restrictions maintained by the PCPD 330 may instruct the access control proxy 310 to reject all further requests from that user, i.e. from a specific IP address.
- An embodiment of the present invention employs a Web proxy cache which can process Internet data while transparently streaming the data from Web servers 120, 130, 140 to the browser application 220.
- the Web proxy cache also handles connections to the PCPD and reads information from either a database or a file associating each advertiser with a corresponding ACL.
- the ACL can include the IP address, mask, and port-range of approved Web pages and can be stored in a hash table keyed on the advertiser.
- the access control proxy 310 keeps track of users as "sessions" and stores a hash table of sessions, keyed on the IP address associated with a user. Each session also has an ACL listing permissible URLs. An administrative Web page URL, which could permit a user to visit certain Web pages related to system errors, etc., can be included in every ACL.
- the PCPD 330 will now be described in detail with respect to FIG. 5, a block diagram showing communications involving the PCPD 330 according to an embodiment of the present invention.
- the client access control application 210 communicates 332 with the PCPD 330 to start a new session, transferring state information about the current connection such as machine identification number, user name, Point of Presence (POP) number, advertisement identification number, connection media type, etc.
- the PCPD 330 communicates 334 with a user database to authenticate the person using, for example, a time stamp, session unique identifiers and the user' s password, which can be queried from a User Database (UDB) server 350.
- UDB User Database
- a message 331 is sent to the Web proxy cache 312 telling it to grant access to the URLs associated with the selected advertisement for the IP address in use by the client, by instantiating appropriate ACLs for the session.
- the URLs allowed for a particular advertiser are predetermined by the access control proxy from a database of advertisers and associated ACLs.
- An advertisement startup procedure can be run and the time remaining that a user may spend at the current advertiser's URLs is sent back to the client.
- An example PCPD 330 startup procedure will now be described.
- a user selects an advertisement from the advertisement index, that user is queried from a user database to find any data describing previous interactions with that particular advertisement.
- the information is stored in the user database and variables such as the number of visits and total time viewing an advertisement are set in an advertiser specific startup procedure. The remaining time left for the current user for the selected advertisement can then be calculated.
- An example PCPD 330 shutdown procedure will now be described.
- the client access control application 210 shuts down a session by sending a shutdown message to the PCPD 330, which is authenticated in a similar fashion to the session start message. Once a shutdown message has been authenticated, the access control proxy 310 is told to clear all ACLs for the client's IP address.
- All traces of the session being shutdown are removed from PCPD after an advertisement specific shut down procedure is run.
- the same variables that were used in the startup procedure can be updated in the shutdown procedure. These variables can then be written back to a user database for future reference.
- the shutdown procedure also calculates whether an advertisement should be permanently removed from that client's advertisement index. If required, the PCPD 330 can instruct the client access control application 210 to disable the particular advertisement in the index.
- the following lines of software code implement a sample advertisement startup and shutdown function suitable for use by the PCPD 330 with respect to a user allowed to visit an ACL a maximum of 5 times, for 5 minutes at a time:
- the following lines of software code implement a sample advertisement startup and shutdown function suitable for use by the PCPD 330 with respect to a user allowed to visit an ACL an unlimited number of times, for a total of 20 minutes:
- the client access control application 210 sends a message to the PCPD 330, which essentially runs the ad related shutdown and startup procedures for the old and new advertisements respectively.
- the PCPD 330 then sends messages to the access control proxy to remove and install the proper ACLs.
- the PCPD 330 also has the ability to tear down the client' s connection at any time by telling the access control proxy 310 to remove all ACLs for the client's IP address, and going through the advertiser shutdown sequence. This can happen from either the initial advertisement or any subsequent advertisement.
- the user PC 200 can be notified of the tear down via a message from the PCPD 330 to the client access control application 210.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU11953/99A AU747269B2 (en) | 1997-10-30 | 1998-10-23 | Method and apparatus to determine user identity and limit access to a communications network |
CA002307051A CA2307051C (en) | 1997-10-30 | 1998-10-23 | Method and apparatus to determine user identity and limit access to a communications network |
IL13584598A IL135845A0 (en) | 1997-10-30 | 1998-10-23 | Method and apparatus to determine user identity and limit access to a communications network |
EP98955055A EP1034481A1 (en) | 1997-10-30 | 1998-10-23 | Method and apparatus to determine user identity and limit access to a communications network |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US6436597P | 1997-10-30 | 1997-10-30 | |
US60/064,365 | 1997-10-30 | ||
US08/980,313 | 1997-11-26 | ||
US08/980,313 US6256739B1 (en) | 1997-10-30 | 1997-11-26 | Method and apparatus to determine user identity and limit access to a communications network |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999023568A1 true WO1999023568A1 (en) | 1999-05-14 |
Family
ID=26744436
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/022381 WO1999023568A1 (en) | 1997-10-30 | 1998-10-23 | Method and apparatus to determine user identity and limit access to a communications network |
Country Status (6)
Country | Link |
---|---|
US (1) | US6256739B1 (en) |
EP (1) | EP1034481A1 (en) |
AU (1) | AU747269B2 (en) |
CA (1) | CA2307051C (en) |
IL (1) | IL135845A0 (en) |
WO (1) | WO1999023568A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002013025A1 (en) * | 2000-08-07 | 2002-02-14 | Sharinga Networks Inc. | An access system for use with lans |
WO2002013026A1 (en) * | 2000-08-07 | 2002-02-14 | Sharinga Networks Inc. | A method for controlling data at a client device |
EP2324449A1 (en) * | 2008-07-30 | 2011-05-25 | EOVENDO ApS | A system for targeted advertising |
USRE44323E1 (en) | 1996-01-19 | 2013-06-25 | Beneficial Innovations, Inc. | Method and system for playing games on a network |
USRE44566E1 (en) | 1996-01-19 | 2013-10-29 | Beneficial Innovations, Inc. | Advertising system for the internet and local area networks |
EP2759115A4 (en) * | 2011-09-23 | 2015-05-20 | Ericsson Telefon Ab L M | Caching in a telecommunication network |
WO2015068040A3 (en) * | 2013-10-15 | 2015-10-08 | Whisbi Technologies, S.L. | System and method for telephone communications on the internet |
US9530150B2 (en) | 1996-01-19 | 2016-12-27 | Adcension, Llc | Compensation model for network services |
Families Citing this family (247)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6418324B1 (en) * | 1995-06-01 | 2002-07-09 | Padcom, Incorporated | Apparatus and method for transparent wireless communication between a remote device and host system |
US7047302B1 (en) * | 1999-12-02 | 2006-05-16 | Sony Corporation Entertainment America Inc. | Method and system for enabling optional customer election of auxiliary content provided on detachable local storage media during access of primary content over a network and for collecting data concerning viewed auxiliary content |
US6438578B1 (en) * | 1996-06-12 | 2002-08-20 | Education Networks Of America | System and method for generating a modified web page in response to an information request from a client computer |
US8601050B2 (en) * | 1996-06-12 | 2013-12-03 | Michael Carringer | System and method for generating a modified web page by inline code insertion in response to an information request from a client computer |
US9130765B1 (en) | 1996-06-12 | 2015-09-08 | Michael Carringer | System and method for generating a modified web page by inline code insertion in response to an information request from a client computer |
US6760746B1 (en) | 1999-09-01 | 2004-07-06 | Eric Schneider | Method, product, and apparatus for processing a data request |
US20020007411A1 (en) * | 1998-08-10 | 2002-01-17 | Shvat Shaked | Automatic network user identification |
US7240022B1 (en) * | 1998-05-19 | 2007-07-03 | Mypoints.Com Inc. | Demographic information gathering and incentive award system and method |
US6141010A (en) * | 1998-07-17 | 2000-10-31 | B. E. Technology, Llc | Computer interface method and apparatus with targeted advertising |
US6839741B1 (en) * | 1998-09-29 | 2005-01-04 | Mci, Inc. | Facility for distributing and providing access to electronic mail message attachments |
US6546425B1 (en) * | 1998-10-09 | 2003-04-08 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US7136645B2 (en) * | 1998-10-09 | 2006-11-14 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US7293107B1 (en) * | 1998-10-09 | 2007-11-06 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US7778260B2 (en) * | 1998-10-09 | 2010-08-17 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US8060656B2 (en) * | 1998-10-09 | 2011-11-15 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
US8078727B2 (en) | 1998-10-09 | 2011-12-13 | Netmotion Wireless, Inc. | Method and apparatus for providing mobile and other intermittent connectivity in a computing environment |
GB2343529B (en) * | 1998-11-07 | 2003-06-11 | Ibm | Filtering incoming e-mail |
US7328405B1 (en) | 1998-12-09 | 2008-02-05 | Netscape Communications Corporation | Smart browsing providers |
US7493553B1 (en) | 1998-12-29 | 2009-02-17 | Intel Corporation | Structured web advertising |
US7353234B2 (en) | 1998-12-30 | 2008-04-01 | Aol Llc, A Delaware Limited Liability Company | Customized user interface based on user record information |
US7555721B2 (en) * | 1998-12-30 | 2009-06-30 | Aol Llc, A Delaware Limited Liability Company | Customized user interface |
US6601171B1 (en) * | 1999-02-18 | 2003-07-29 | Novell, Inc. | Deputization in a distributed computing system |
US8037168B2 (en) | 1999-07-15 | 2011-10-11 | Esdr Network Solutions Llc | Method, product, and apparatus for enhancing resolution services, registration services, and search services |
USRE43690E1 (en) | 1999-03-22 | 2012-09-25 | Esdr Network Solutions Llc | Search engine request method, product, and apparatus |
US7188138B1 (en) | 1999-03-22 | 2007-03-06 | Eric Schneider | Method, product, and apparatus for resource identifier registration and aftermarket services |
US9141717B2 (en) | 1999-03-22 | 2015-09-22 | Esdr Network Solutions Llc | Methods, systems, products, and devices for processing DNS friendly identifiers |
US6338082B1 (en) | 1999-03-22 | 2002-01-08 | Eric Schneider | Method, product, and apparatus for requesting a network resource |
US7831689B2 (en) * | 1999-04-02 | 2010-11-09 | Nortel Networks Corporation | Virtual private network manager GUI with links for use in configuring a virtual private network |
US6701358B1 (en) | 1999-04-02 | 2004-03-02 | Nortel Networks Limited | Bulk configuring a virtual private network |
US7000014B2 (en) | 1999-04-02 | 2006-02-14 | Nortel Networks Limited | Monitoring a virtual private network |
US6765591B2 (en) * | 1999-04-02 | 2004-07-20 | Nortel Networks Limited | Managing a virtual private network |
US6393484B1 (en) * | 1999-04-12 | 2002-05-21 | International Business Machines Corp. | System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks |
US6651096B1 (en) * | 1999-04-20 | 2003-11-18 | Cisco Technology, Inc. | Method and apparatus for organizing, storing and evaluating access control lists |
US6446035B1 (en) * | 1999-05-05 | 2002-09-03 | Xerox Corporation | Finding groups of people based on linguistically analyzable content of resources accessed |
US6910180B1 (en) * | 1999-05-10 | 2005-06-21 | Yahoo! Inc. | Removing cookies from web page response headers and storing the cookies in a repository for later use |
US7882247B2 (en) | 1999-06-11 | 2011-02-01 | Netmotion Wireless, Inc. | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments |
US6715075B1 (en) * | 1999-07-08 | 2004-03-30 | Intel Corporation | Providing a configuration file to a communication device |
AUPQ206399A0 (en) * | 1999-08-06 | 1999-08-26 | Imr Worldwide Pty Ltd. | Network user measurement system and method |
US7627507B1 (en) * | 1999-08-10 | 2009-12-01 | Fmr Llc | Providing one party access to an account of another party |
US7734591B1 (en) | 1999-08-16 | 2010-06-08 | Netapp, Inc. | Coherent device to device data replication |
US6539379B1 (en) * | 1999-08-23 | 2003-03-25 | Oblix, Inc. | Method and apparatus for implementing a corporate directory and service center |
USRE44207E1 (en) | 1999-09-01 | 2013-05-07 | Esdr Network Solutions Llc | Network resource access method, product, and apparatus |
US7263558B1 (en) * | 1999-09-15 | 2007-08-28 | Narus, Inc. | Method and apparatus for providing additional information in response to an application server request |
US20080082446A1 (en) * | 1999-10-01 | 2008-04-03 | Hicks Christian B | Remote Authorization for Unlocking Electronic Data System and Method |
US6983311B1 (en) * | 1999-10-19 | 2006-01-03 | Netzero, Inc. | Access to internet search capabilities |
US6662230B1 (en) * | 1999-10-20 | 2003-12-09 | International Business Machines Corporation | System and method for dynamically limiting robot access to server data |
US6704787B1 (en) * | 1999-12-03 | 2004-03-09 | Intercard Payments, Inc. | Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party |
US7035896B1 (en) * | 1999-12-13 | 2006-04-25 | Eric Schneider | Homepage access method, product, and apparatus |
US6389467B1 (en) | 2000-01-24 | 2002-05-14 | Friskit, Inc. | Streaming media search and continuous playback system of media resources located by multiple network addresses |
US6606659B1 (en) * | 2000-01-28 | 2003-08-12 | Websense, Inc. | System and method for controlling access to internet sites |
AU2001230474A1 (en) * | 2000-01-31 | 2001-08-14 | Trivnet Ltd. | Applications of automatic internet identification methods |
US6883032B1 (en) * | 2000-02-02 | 2005-04-19 | Lucent Technologies Inc. | Method and system for collecting data on the internet |
US6944668B1 (en) * | 2000-04-03 | 2005-09-13 | Targian Ab | System operable to identify and access information about a user |
US7209959B1 (en) | 2000-04-04 | 2007-04-24 | Wk Networks, Inc. | Apparatus, system, and method for communicating to a network through a virtual domain providing anonymity to a client communicating on the network |
US6970942B1 (en) * | 2000-05-08 | 2005-11-29 | Crossroads Systems, Inc. | Method of routing HTTP and FTP services across heterogeneous networks |
US7673329B2 (en) * | 2000-05-26 | 2010-03-02 | Symantec Corporation | Method and apparatus for encrypted communications to a secure server |
US7509490B1 (en) * | 2000-05-26 | 2009-03-24 | Symantec Corporation | Method and apparatus for encrypted communications to a secure server |
TW501014B (en) * | 2000-05-29 | 2002-09-01 | Toshiba Corp | Supply system for web pages with limited usage |
US6839760B1 (en) * | 2000-06-02 | 2005-01-04 | International Business Machines Corporation | Method for preventing deep linking into a web site |
US9444785B2 (en) | 2000-06-23 | 2016-09-13 | Cloudshield Technologies, Inc. | Transparent provisioning of network access to an application |
US7114008B2 (en) * | 2000-06-23 | 2006-09-26 | Cloudshield Technologies, Inc. | Edge adapter architecture apparatus and method |
US7003555B1 (en) | 2000-06-23 | 2006-02-21 | Cloudshield Technologies, Inc. | Apparatus and method for domain name resolution |
US7032031B2 (en) * | 2000-06-23 | 2006-04-18 | Cloudshield Technologies, Inc. | Edge adapter apparatus and method |
US6829654B1 (en) * | 2000-06-23 | 2004-12-07 | Cloudshield Technologies, Inc. | Apparatus and method for virtual edge placement of web sites |
US7194764B2 (en) | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
US7134137B2 (en) * | 2000-07-10 | 2006-11-07 | Oracle International Corporation | Providing data to applications from an access system |
US7249369B2 (en) * | 2000-07-10 | 2007-07-24 | Oracle International Corporation | Post data processing |
US7340518B1 (en) * | 2000-07-10 | 2008-03-04 | Jenkins Gerald L | Method and system to enable contact with unknown internet account holders |
US7080077B2 (en) * | 2000-07-10 | 2006-07-18 | Oracle International Corporation | Localized access |
US8204999B2 (en) * | 2000-07-10 | 2012-06-19 | Oracle International Corporation | Query string processing |
US8661539B2 (en) * | 2000-07-10 | 2014-02-25 | Oracle International Corporation | Intrusion threat detection |
US9038170B2 (en) | 2000-07-10 | 2015-05-19 | Oracle International Corporation | Logging access system events |
US7124203B2 (en) | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US7464162B2 (en) * | 2000-07-10 | 2008-12-09 | Oracle International Corporation | Systems and methods for testing whether access to a resource is authorized based on access information |
JP2002032340A (en) * | 2000-07-14 | 2002-01-31 | Nec Corp | System and method for single sign-on web site and recording medium |
WO2002014991A2 (en) * | 2000-08-11 | 2002-02-21 | Incanta, Inc. | Resource distribution in network environment |
US7725587B1 (en) * | 2000-08-24 | 2010-05-25 | Aol Llc | Deep packet scan hacker identification |
EP1334587A1 (en) * | 2000-08-31 | 2003-08-13 | Padcom Inc. | Method and apparatus for routing data over multiple wireless networks |
US6985947B1 (en) * | 2000-09-14 | 2006-01-10 | Microsoft Corporation | Server access control methods and arrangements |
US6925497B1 (en) * | 2000-09-26 | 2005-08-02 | Microsoft Corporation | Systems and methods for controlling the number of clients that access a server |
US7444587B1 (en) | 2000-09-29 | 2008-10-28 | Microsoft Corporation | Selection services component for an extensible editor |
US7069507B1 (en) * | 2000-09-29 | 2006-06-27 | Microsoft Corporation | Event routing model for an extensible editor |
US7036078B1 (en) * | 2000-09-29 | 2006-04-25 | Microsoft Corporation | Highlight rendering services component for an extensible editor |
US7016953B2 (en) * | 2000-10-03 | 2006-03-21 | Sun Microsystems, Inc. | HTTP transaction monitor |
ITMI20002390A1 (en) * | 2000-11-06 | 2002-05-06 | Safety World Wide Web Associaz | PROCEDURE TO CONTROL ACCESS TO A TELEMATIC NETWORK WITH USER IDENTIFICATION |
US20020059463A1 (en) * | 2000-11-10 | 2002-05-16 | Leonid Goldstein | Method and system for accelerating internet access through data compression |
US7260622B2 (en) * | 2000-11-29 | 2007-08-21 | Ncr Corporation | Method of limiting access to network sites for a network kiosk |
US20020075844A1 (en) * | 2000-12-15 | 2002-06-20 | Hagen W. Alexander | Integrating public and private network resources for optimized broadband wireless access and method |
GB2370192A (en) * | 2000-12-15 | 2002-06-19 | Nokia Mobile Phones Ltd | Mobile phone with electronic trash can |
US7581011B2 (en) | 2000-12-22 | 2009-08-25 | Oracle International Corporation | Template based workflow definition |
US7475151B2 (en) | 2000-12-22 | 2009-01-06 | Oracle International Corporation | Policies for modifying group membership |
US7380008B2 (en) * | 2000-12-22 | 2008-05-27 | Oracle International Corporation | Proxy system |
US8015600B2 (en) * | 2000-12-22 | 2011-09-06 | Oracle International Corporation | Employing electronic certificate workflows |
US7085834B2 (en) * | 2000-12-22 | 2006-08-01 | Oracle International Corporation | Determining a user's groups |
US6968385B1 (en) | 2000-12-22 | 2005-11-22 | Bellsouth Intellectual Property | Systems and methods for limiting web site access |
US6816871B2 (en) * | 2000-12-22 | 2004-11-09 | Oblix, Inc. | Delivering output XML with dynamically selectable processing |
US7363339B2 (en) | 2000-12-22 | 2008-04-22 | Oracle International Corporation | Determining group membership |
US7711818B2 (en) * | 2000-12-22 | 2010-05-04 | Oracle International Corporation | Support for multiple data stores |
US6782379B2 (en) * | 2000-12-22 | 2004-08-24 | Oblix, Inc. | Preparing output XML based on selected programs and XML templates |
US7937655B2 (en) | 2000-12-22 | 2011-05-03 | Oracle International Corporation | Workflows with associated processes |
US7349912B2 (en) * | 2000-12-22 | 2008-03-25 | Oracle International Corporation | Runtime modification of entries in an identity system |
US7802174B2 (en) * | 2000-12-22 | 2010-09-21 | Oracle International Corporation | Domain based workflows |
US7213249B2 (en) | 2000-12-22 | 2007-05-01 | Oracle International Corporation | Blocking cache flush requests until completing current pending requests in a local server and remote server |
US7415607B2 (en) | 2000-12-22 | 2008-08-19 | Oracle International Corporation | Obtaining and maintaining real time certificate status |
ITMI20010113A1 (en) * | 2001-01-22 | 2002-07-22 | Gestweb Spa | PROCEDURE AND DEVICE FOR THE CONTROL OF THE TIME OF CONNECTION OF A USER TO A TELEMATIC NETWORK |
US7185364B2 (en) * | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
US20020143963A1 (en) * | 2001-03-15 | 2002-10-03 | International Business Machines Corporation | Web server intrusion detection method and apparatus |
US6842321B2 (en) * | 2001-03-27 | 2005-01-11 | Texas Instruments Incorporated | Supply independent low quiescent current undervoltage lockout circuit |
WO2002093393A1 (en) * | 2001-05-11 | 2002-11-21 | Sap Portals, Inc. | Browser with messaging capability and other persistent connections |
US7730528B2 (en) * | 2001-06-01 | 2010-06-01 | Symantec Corporation | Intelligent secure data manipulation apparatus and method |
US20050198379A1 (en) | 2001-06-13 | 2005-09-08 | Citrix Systems, Inc. | Automatically reconnecting a client across reliable and persistent communication sessions |
US7231661B1 (en) | 2001-06-21 | 2007-06-12 | Oracle International Corporation | Authorization services with external authentication |
US20020198609A1 (en) * | 2001-06-21 | 2002-12-26 | Baron Carl N. | Method and apparatus for regulating network access to functions of a controller |
US7054939B2 (en) | 2001-06-28 | 2006-05-30 | Bellsouth Intellectual Property Corportion | Simultaneous visual and telephonic access to interactive information delivery |
US7188085B2 (en) * | 2001-07-20 | 2007-03-06 | International Business Machines Corporation | Method and system for delivering encrypted content with associated geographical-based advertisements |
US20030074434A1 (en) * | 2001-10-11 | 2003-04-17 | Jason James L. | Determination of message source in network communications |
US20030084343A1 (en) * | 2001-11-01 | 2003-05-01 | Arun Ramachandran | One protocol web access to usage data in a data structure of a usage based licensing server |
US7225256B2 (en) | 2001-11-30 | 2007-05-29 | Oracle International Corporation | Impersonation in an access system |
US7984157B2 (en) | 2002-02-26 | 2011-07-19 | Citrix Systems, Inc. | Persistent and reliable session securely traversing network components using an encapsulating protocol |
US7661129B2 (en) | 2002-02-26 | 2010-02-09 | Citrix Systems, Inc. | Secure traversal of network components |
US7461262B1 (en) * | 2002-03-19 | 2008-12-02 | Cisco Technology, Inc. | Methods and apparatus for providing security in a caching device |
US7525949B1 (en) * | 2002-05-07 | 2009-04-28 | Cisco Technology, Inc. | Forwarding for network devices |
US7840658B2 (en) | 2002-05-15 | 2010-11-23 | Oracle International Corporation | Employing job code attributes in provisioning |
US7216163B2 (en) | 2002-05-15 | 2007-05-08 | Oracle International Corporation | Method and apparatus for provisioning tasks using a provisioning bridge server |
AU2003261124A1 (en) * | 2002-07-02 | 2004-01-23 | America Online Incorporated | Seamless cross-site user authentication status detection and automatic login |
US7428523B2 (en) | 2002-07-11 | 2008-09-23 | Oracle International Corporation | Portal bridge |
US7512585B2 (en) * | 2002-07-11 | 2009-03-31 | Oracle International Corporation | Support for multiple mechanisms for accessing data stores |
US7206851B2 (en) * | 2002-07-11 | 2007-04-17 | Oracle International Corporation | Identifying dynamic groups |
US7447701B2 (en) * | 2002-07-11 | 2008-11-04 | Oracle International Corporation | Automatic configuration of attribute sets |
US8375113B2 (en) | 2002-07-11 | 2013-02-12 | Oracle International Corporation | Employing wrapper profiles |
US7467142B2 (en) * | 2002-07-11 | 2008-12-16 | Oracle International Corporation | Rule based data management |
US7478407B2 (en) | 2002-07-11 | 2009-01-13 | Oracle International Corporation | Supporting multiple application program interfaces |
US7114037B2 (en) * | 2002-07-11 | 2006-09-26 | Oracle International Corporation | Employing local data stores to maintain data during workflows |
US7428592B2 (en) * | 2002-07-11 | 2008-09-23 | Oracle International Corporation | Securely persisting network resource identifiers |
US7237024B2 (en) * | 2002-10-15 | 2007-06-26 | Aol Llc | Cross-site timed out authentication management |
JP2004164077A (en) * | 2002-11-11 | 2004-06-10 | Nec Infrontia Corp | Internet access service providing method, and system for the same |
US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US7962931B2 (en) * | 2002-12-23 | 2011-06-14 | Coupons.Com Incorporated | Method and system for integrating television brand advertising with promotional marketing |
JP3940356B2 (en) * | 2002-12-27 | 2007-07-04 | 日本アイ・ビー・エム株式会社 | Proxy server, access control method, access control program |
US7185015B2 (en) * | 2003-03-14 | 2007-02-27 | Websense, Inc. | System and method of monitoring and controlling application files |
US7529754B2 (en) | 2003-03-14 | 2009-05-05 | Websense, Inc. | System and method of monitoring and controlling application files |
US7437457B1 (en) * | 2003-09-08 | 2008-10-14 | Aol Llc, A Delaware Limited Liability Company | Regulating concurrent logins associated with a single account |
US20050076220A1 (en) * | 2003-10-02 | 2005-04-07 | Xiao Quan Zhang | Method and System for Using a Point System to Deliver Advertisement Emails and to Stop Spam |
US7904487B2 (en) | 2003-10-09 | 2011-03-08 | Oracle International Corporation | Translating data access requests |
US7882132B2 (en) | 2003-10-09 | 2011-02-01 | Oracle International Corporation | Support for RDBMS in LDAP system |
US7340447B2 (en) * | 2003-10-09 | 2008-03-04 | Oracle International Corporation | Partitioning data access requests |
US7949682B2 (en) * | 2003-11-05 | 2011-05-24 | Novell, Inc. | Method for providing a flat view of a hierarchical namespace without requiring unique leaf names |
US8527541B2 (en) * | 2003-11-05 | 2013-09-03 | Emc Corporation | Method for mapping a flat namespace onto a hierarchical namespace using locality of reference cues |
US20060026286A1 (en) * | 2004-07-06 | 2006-02-02 | Oracle International Corporation | System and method for managing user session meta-data in a reverse proxy |
US7600230B2 (en) * | 2004-07-06 | 2009-10-06 | Oracle International Corporation | System and method for managing security meta-data in a reverse proxy |
US8312530B2 (en) * | 2004-07-12 | 2012-11-13 | Cisco Technology, Inc. | System and method for providing security in a network environment using accounting information |
US20060149730A1 (en) * | 2004-12-30 | 2006-07-06 | Curtis James R | Client authenticated web browser with access approval mechanism |
US7461338B2 (en) * | 2005-01-07 | 2008-12-02 | Essociate, Inc. | Advertising markup language |
US8584194B1 (en) * | 2005-08-29 | 2013-11-12 | Crimson Corporation | Network access control using a quarantined server |
US10592930B2 (en) | 2005-09-14 | 2020-03-17 | Millenial Media, LLC | Syndication of a behavioral profile using a monetization platform |
US8229914B2 (en) | 2005-09-14 | 2012-07-24 | Jumptap, Inc. | Mobile content spidering and compatibility determination |
US8660891B2 (en) | 2005-11-01 | 2014-02-25 | Millennial Media | Interactive mobile advertisement banners |
US10038756B2 (en) | 2005-09-14 | 2018-07-31 | Millenial Media LLC | Managing sponsored content based on device characteristics |
US8131271B2 (en) | 2005-11-05 | 2012-03-06 | Jumptap, Inc. | Categorization of a mobile user profile based on browse behavior |
US7769764B2 (en) | 2005-09-14 | 2010-08-03 | Jumptap, Inc. | Mobile advertisement syndication |
US9201979B2 (en) * | 2005-09-14 | 2015-12-01 | Millennial Media, Inc. | Syndication of a behavioral profile associated with an availability condition using a monetization platform |
US8812526B2 (en) | 2005-09-14 | 2014-08-19 | Millennial Media, Inc. | Mobile content cross-inventory yield optimization |
US8195133B2 (en) | 2005-09-14 | 2012-06-05 | Jumptap, Inc. | Mobile dynamic advertisement creation and placement |
US7912458B2 (en) | 2005-09-14 | 2011-03-22 | Jumptap, Inc. | Interaction analysis and prioritization of mobile content |
US8364540B2 (en) | 2005-09-14 | 2013-01-29 | Jumptap, Inc. | Contextual targeting of content using a monetization platform |
US7752209B2 (en) | 2005-09-14 | 2010-07-06 | Jumptap, Inc. | Presenting sponsored content on a mobile communication facility |
US10911894B2 (en) | 2005-09-14 | 2021-02-02 | Verizon Media Inc. | Use of dynamic content generation parameters based on previous performance of those parameters |
US8311888B2 (en) | 2005-09-14 | 2012-11-13 | Jumptap, Inc. | Revenue models associated with syndication of a behavioral profile using a monetization platform |
US8532633B2 (en) | 2005-09-14 | 2013-09-10 | Jumptap, Inc. | System for targeting advertising content to a plurality of mobile communication facilities |
US8238888B2 (en) | 2006-09-13 | 2012-08-07 | Jumptap, Inc. | Methods and systems for mobile coupon placement |
US7660581B2 (en) | 2005-09-14 | 2010-02-09 | Jumptap, Inc. | Managing sponsored content based on usage history |
US9076175B2 (en) | 2005-09-14 | 2015-07-07 | Millennial Media, Inc. | Mobile comparison shopping |
US7676394B2 (en) | 2005-09-14 | 2010-03-09 | Jumptap, Inc. | Dynamic bidding and expected value |
US8615719B2 (en) | 2005-09-14 | 2013-12-24 | Jumptap, Inc. | Managing sponsored content for delivery to mobile communication facilities |
US7577665B2 (en) | 2005-09-14 | 2009-08-18 | Jumptap, Inc. | User characteristic influenced search results |
US8688671B2 (en) | 2005-09-14 | 2014-04-01 | Millennial Media | Managing sponsored content based on geographic region |
US8666376B2 (en) | 2005-09-14 | 2014-03-04 | Millennial Media | Location based mobile shopping affinity program |
US8364521B2 (en) | 2005-09-14 | 2013-01-29 | Jumptap, Inc. | Rendering targeted advertisement on mobile communication facilities |
US8503995B2 (en) | 2005-09-14 | 2013-08-06 | Jumptap, Inc. | Mobile dynamic advertisement creation and placement |
US20110313853A1 (en) | 2005-09-14 | 2011-12-22 | Jorey Ramer | System for targeting advertising content to a plurality of mobile communication facilities |
US9471925B2 (en) | 2005-09-14 | 2016-10-18 | Millennial Media Llc | Increasing mobile interactivity |
US9058406B2 (en) | 2005-09-14 | 2015-06-16 | Millennial Media, Inc. | Management of multiple advertising inventories using a monetization platform |
US8989718B2 (en) | 2005-09-14 | 2015-03-24 | Millennial Media, Inc. | Idle screen advertising |
US20110145076A1 (en) * | 2005-09-14 | 2011-06-16 | Jorey Ramer | Mobile Campaign Creation |
US7702318B2 (en) | 2005-09-14 | 2010-04-20 | Jumptap, Inc. | Presentation of sponsored content based on mobile transaction event |
US8209344B2 (en) * | 2005-09-14 | 2012-06-26 | Jumptap, Inc. | Embedding sponsored content in mobile applications |
US9703892B2 (en) | 2005-09-14 | 2017-07-11 | Millennial Media Llc | Predictive text completion for a mobile communication facility |
US20110106614A1 (en) * | 2005-11-01 | 2011-05-05 | Jumptap, Inc. | Mobile User Characteristics Influenced Search Results |
US20110153428A1 (en) * | 2005-09-14 | 2011-06-23 | Jorey Ramer | Targeted advertising to specified mobile communication facilities |
US8819659B2 (en) | 2005-09-14 | 2014-08-26 | Millennial Media, Inc. | Mobile search service instant activation |
US8302030B2 (en) | 2005-09-14 | 2012-10-30 | Jumptap, Inc. | Management of multiple advertising inventories using a monetization platform |
US8805339B2 (en) | 2005-09-14 | 2014-08-12 | Millennial Media, Inc. | Categorization of a mobile user profile based on browse and viewing behavior |
US8156128B2 (en) | 2005-09-14 | 2012-04-10 | Jumptap, Inc. | Contextual mobile content placement on a mobile communication facility |
US8832100B2 (en) | 2005-09-14 | 2014-09-09 | Millennial Media, Inc. | User transaction history influenced search results |
US8103545B2 (en) | 2005-09-14 | 2012-01-24 | Jumptap, Inc. | Managing payment for sponsored content presented to mobile communication facilities |
US8175585B2 (en) | 2005-11-05 | 2012-05-08 | Jumptap, Inc. | System for targeting advertising content to a plurality of mobile communication facilities |
US8756326B1 (en) | 2005-11-08 | 2014-06-17 | Rockstar Consortium Us Lp | Using interactive communication session cookies in web sessions |
US20070106670A1 (en) * | 2005-11-08 | 2007-05-10 | Nortel Networks Limited | Interactive communication session cookies |
US20070118496A1 (en) * | 2005-11-21 | 2007-05-24 | Christof Bornhoevd | Service-to-device mapping for smart items |
US8005879B2 (en) * | 2005-11-21 | 2011-08-23 | Sap Ag | Service-to-device re-mapping for smart items |
US7860968B2 (en) * | 2005-11-21 | 2010-12-28 | Sap Ag | Hierarchical, multi-tiered mapping and monitoring architecture for smart items |
US8156208B2 (en) | 2005-11-21 | 2012-04-10 | Sap Ag | Hierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items |
US8688813B2 (en) | 2006-01-11 | 2014-04-01 | Oracle International Corporation | Using identity/resource profile and directory enablers to support identity management |
US8543637B2 (en) * | 2006-01-18 | 2013-09-24 | At&T Intellectual Property I, L.P. | Distributed web publishing |
US9129285B2 (en) * | 2006-01-27 | 2015-09-08 | International Business Machines Corporation | Previewing in live electronic commerce environment |
US7768543B2 (en) * | 2006-03-09 | 2010-08-03 | Citrix Online, Llc | System and method for dynamically altering videoconference bit rates and layout based on participant activity |
US8224695B2 (en) * | 2006-03-31 | 2012-07-17 | Google Inc. | Monetizing service calls through advertising |
US8522341B2 (en) * | 2006-03-31 | 2013-08-27 | Sap Ag | Active intervention in service-to-device mapping for smart items |
US7685630B2 (en) * | 2006-05-04 | 2010-03-23 | Citrix Online, Llc | Methods and systems for providing scalable authentication |
US7895639B2 (en) * | 2006-05-04 | 2011-02-22 | Citrix Online, Llc | Methods and systems for specifying and enforcing access control in a distributed system |
US8296413B2 (en) * | 2006-05-31 | 2012-10-23 | Sap Ag | Device registration in a hierarchical monitor service |
US8131838B2 (en) | 2006-05-31 | 2012-03-06 | Sap Ag | Modular monitor service for smart item monitoring |
US8065411B2 (en) * | 2006-05-31 | 2011-11-22 | Sap Ag | System monitor for networks of nodes |
US8020206B2 (en) | 2006-07-10 | 2011-09-13 | Websense, Inc. | System and method of analyzing web content |
US8615800B2 (en) | 2006-07-10 | 2013-12-24 | Websense, Inc. | System and method for analyzing web content |
US8396788B2 (en) * | 2006-07-31 | 2013-03-12 | Sap Ag | Cost-based deployment of components in smart item environments |
US9654495B2 (en) | 2006-12-01 | 2017-05-16 | Websense, Llc | System and method of analyzing web addresses |
JP4405503B2 (en) * | 2006-12-28 | 2010-01-27 | キヤノンItソリューションズ株式会社 | Information processing apparatus, information processing apparatus control method, program, and recording medium |
US8015174B2 (en) | 2007-02-28 | 2011-09-06 | Websense, Inc. | System and method of controlling access to the internet |
US8527622B2 (en) * | 2007-10-12 | 2013-09-03 | Sap Ag | Fault tolerance framework for networks of nodes |
US7925694B2 (en) | 2007-10-19 | 2011-04-12 | Citrix Systems, Inc. | Systems and methods for managing cookies via HTTP content layer |
US8082179B2 (en) * | 2007-11-01 | 2011-12-20 | Microsoft Corporation | Monitoring television content interaction to improve online advertisement selection |
US20090182897A1 (en) * | 2008-01-10 | 2009-07-16 | Zachary Edward Britton | Method and apparatus that provides targeted http deliveries for users within a private network |
US8090877B2 (en) | 2008-01-26 | 2012-01-03 | Citrix Systems, Inc. | Systems and methods for fine grain policy driven cookie proxying |
US8208375B2 (en) * | 2008-03-17 | 2012-06-26 | Microsoft Corporation | Selective filtering of network traffic requests |
US8073959B2 (en) * | 2008-03-28 | 2011-12-06 | Microsoft Corporation | Automatically detecting whether a computer is connected to a public or private network |
CN101635622B (en) * | 2008-07-24 | 2013-06-12 | 阿里巴巴集团控股有限公司 | Method, system and equipment for encrypting and decrypting web page |
US8793774B1 (en) * | 2009-03-31 | 2014-07-29 | Juniper Networks, Inc. | Methods and apparatus for accessing a secure network segment |
CN102598007B (en) | 2009-05-26 | 2017-03-01 | 韦伯森斯公司 | Effective detection fingerprints the system and method for data and information |
CN102024224A (en) * | 2009-09-11 | 2011-04-20 | 阿里巴巴集团控股有限公司 | E-commerce system and method for getting commodities on and/or off shelves at optimal time |
US20110131503A1 (en) * | 2009-09-14 | 2011-06-02 | Cbs Interactive, Inc. | Apparatus and methods for providing targeted advertising from user behavior |
US20110066608A1 (en) * | 2009-09-14 | 2011-03-17 | Cbs Interactive, Inc. | Systems and methods for delivering targeted content to a user |
US20110145841A1 (en) * | 2009-12-15 | 2011-06-16 | Cbs Interactive, Inc. | System and method for generating pages of content |
US9183560B2 (en) | 2010-05-28 | 2015-11-10 | Daniel H. Abelow | Reality alternate |
US9514637B2 (en) | 2013-01-24 | 2016-12-06 | L & P Property Management Company | Wireless two-way communication protocol for automated furniture accessory integration |
US9412262B2 (en) * | 2013-01-24 | 2016-08-09 | L&P Property Management Company | Wireless two-way communication protocol for automated furniture accessory integration |
US9247273B2 (en) | 2013-06-25 | 2016-01-26 | The Nielsen Company (Us), Llc | Methods and apparatus to characterize households with media meter data |
DE102014101174A1 (en) * | 2014-01-30 | 2015-07-30 | Netzwelt Gmbh | System and method for preventing the delivery of advertising content |
US9277265B2 (en) | 2014-02-11 | 2016-03-01 | The Nielsen Company (Us), Llc | Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability |
US10219039B2 (en) | 2015-03-09 | 2019-02-26 | The Nielsen Company (Us), Llc | Methods and apparatus to assign viewers to media meter data |
US10021069B1 (en) * | 2015-04-02 | 2018-07-10 | Aunigma Network Security Corp. | Real time dynamic client access control |
US9674202B1 (en) | 2015-12-29 | 2017-06-06 | Imperva, Inc. | Techniques for preventing large-scale data breaches utilizing differentiated protection layers |
US9674201B1 (en) | 2015-12-29 | 2017-06-06 | Imperva, Inc. | Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets |
GB2546304B (en) * | 2016-01-14 | 2020-04-08 | Avecto Ltd | Computer device and method for controlling access to a web resource |
US10791355B2 (en) | 2016-12-20 | 2020-09-29 | The Nielsen Company (Us), Llc | Methods and apparatus to determine probabilistic media viewing metrics |
US10447807B1 (en) * | 2017-09-21 | 2019-10-15 | Sprint Communications Company L.P. | Dynamic middleware source selection for optimizing data retrieval from network nodes |
CN112511569B (en) * | 2021-02-07 | 2021-05-11 | 杭州筋斗腾云科技有限公司 | Method and system for processing network resource access request and computer equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5072441A (en) * | 1990-08-07 | 1991-12-10 | Nynex Corporation | Packet switched information network with universal access to enhanced network services |
US5241594A (en) * | 1992-06-02 | 1993-08-31 | Hughes Aircraft Company | One-time logon means and methods for distributed computing systems |
US5499297A (en) * | 1992-04-17 | 1996-03-12 | Secure Computing Corporation | System and method for trusted path communications |
US5781623A (en) * | 1995-03-08 | 1998-07-14 | Alcatel N.V. | Method of controlling an access network as well as exchange and access network |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS5920057A (en) | 1982-07-23 | 1984-02-01 | Toshiba Corp | Failure diagnostic method of remote supervisory and controlling system |
US4799153A (en) * | 1984-12-14 | 1989-01-17 | Telenet Communications Corporation | Method and apparatus for enhancing security of communications in a packet-switched data communications system |
US5560008A (en) * | 1989-05-15 | 1996-09-24 | International Business Machines Corporation | Remote authentication and authorization in a distributed data processing system |
US5257369A (en) * | 1990-10-22 | 1993-10-26 | Skeen Marion D | Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes |
US5577209A (en) * | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
US5715823A (en) * | 1996-02-27 | 1998-02-10 | Atlantis Diagnostics International, L.L.C. | Ultrasonic diagnostic imaging system with universal access to diagnostic information and images |
US5809242A (en) * | 1996-04-19 | 1998-09-15 | Juno Online Services, L.P. | Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system |
-
1997
- 1997-11-26 US US08/980,313 patent/US6256739B1/en not_active Expired - Lifetime
-
1998
- 1998-10-23 AU AU11953/99A patent/AU747269B2/en not_active Ceased
- 1998-10-23 CA CA002307051A patent/CA2307051C/en not_active Expired - Lifetime
- 1998-10-23 WO PCT/US1998/022381 patent/WO1999023568A1/en active IP Right Grant
- 1998-10-23 IL IL13584598A patent/IL135845A0/en unknown
- 1998-10-23 EP EP98955055A patent/EP1034481A1/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5072441A (en) * | 1990-08-07 | 1991-12-10 | Nynex Corporation | Packet switched information network with universal access to enhanced network services |
US5499297A (en) * | 1992-04-17 | 1996-03-12 | Secure Computing Corporation | System and method for trusted path communications |
US5241594A (en) * | 1992-06-02 | 1993-08-31 | Hughes Aircraft Company | One-time logon means and methods for distributed computing systems |
US5781623A (en) * | 1995-03-08 | 1998-07-14 | Alcatel N.V. | Method of controlling an access network as well as exchange and access network |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE44323E1 (en) | 1996-01-19 | 2013-06-25 | Beneficial Innovations, Inc. | Method and system for playing games on a network |
USRE44566E1 (en) | 1996-01-19 | 2013-10-29 | Beneficial Innovations, Inc. | Advertising system for the internet and local area networks |
US9530150B2 (en) | 1996-01-19 | 2016-12-27 | Adcension, Llc | Compensation model for network services |
WO2002013025A1 (en) * | 2000-08-07 | 2002-02-14 | Sharinga Networks Inc. | An access system for use with lans |
WO2002013026A1 (en) * | 2000-08-07 | 2002-02-14 | Sharinga Networks Inc. | A method for controlling data at a client device |
EP2324449A1 (en) * | 2008-07-30 | 2011-05-25 | EOVENDO ApS | A system for targeted advertising |
EP2759115A4 (en) * | 2011-09-23 | 2015-05-20 | Ericsson Telefon Ab L M | Caching in a telecommunication network |
WO2015068040A3 (en) * | 2013-10-15 | 2015-10-08 | Whisbi Technologies, S.L. | System and method for telephone communications on the internet |
Also Published As
Publication number | Publication date |
---|---|
EP1034481A1 (en) | 2000-09-13 |
AU747269B2 (en) | 2002-05-09 |
US6256739B1 (en) | 2001-07-03 |
CA2307051C (en) | 2002-11-12 |
CA2307051A1 (en) | 1999-05-14 |
IL135845A0 (en) | 2001-05-20 |
AU1195399A (en) | 1999-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2307051C (en) | Method and apparatus to determine user identity and limit access to a communications network | |
US7181488B2 (en) | System, method and computer program product for presenting information to a user utilizing historical information about the user | |
US7149704B2 (en) | System, method and computer program product for collecting information about a network user | |
AU725748B2 (en) | Monitoring of remote file access on a public computer network | |
US7257546B2 (en) | System and method for correlating user data from a content provider and user data from an advertising provider that is stored on autonomous systems | |
US7039699B1 (en) | Tracking usage behavior in computer systems | |
US8478862B2 (en) | Method and apparatus for internet traffic monitoring by third parties using monitoring implements | |
US20140372176A1 (en) | Method and apparatus for anonymous data profiling | |
US20090077163A1 (en) | Approach for identifying and providing targeted content to a network client with reduced impact to the service provider | |
US20090216882A1 (en) | Method and apparatus for internet traffic monitoring by third parties using monitoring implements transmitted via piggybacking http transactions | |
US20020029267A1 (en) | Target information generation and ad server | |
US20060075019A1 (en) | Method and system for providing content to users based on frequency of interaction | |
WO2009073214A2 (en) | Advertisement insertion module and advertisement replacement module | |
US20020065920A1 (en) | Host site based internet traffic meter | |
US20040117400A1 (en) | Method and apparatus for requesing information | |
JP2002183092A (en) | Personalized service providing system | |
KR20000036686A (en) | Method for advertising ads centerally in web hosting server | |
Nelte et al. | Cookies: weaving the Web into a state | |
JP2001282653A (en) | Internet connection system, internet user information providing system, preference information providing method for internet user, and method for distributing digital contents using the internet | |
WO2001009779A1 (en) | A messaging method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 135845 Country of ref document: IL |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
ENP | Entry into the national phase |
Ref document number: 2307051 Country of ref document: CA Kind code of ref document: A Ref document number: 2307051 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998955055 Country of ref document: EP Ref document number: 11953/99 Country of ref document: AU |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWP | Wipo information: published in national office |
Ref document number: 1998955055 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998955055 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 11953/99 Country of ref document: AU |