摘要:
Procedure to facilitate communication between different participants in an infrastructure for communication, which participants act in communication networks which at least partly are utilizing different administrative and technical principles, at which the infrastructure for communication is divided into a number of logical layers, a number of participants are defined in each of the logical layers, and each of the participants in a logical layer are linked to one or more participants in the same or adjacent logical layer. Further are for each of the participants defined attributes with regard to the other participants to which this is linked.
摘要:
A computer system provides authenticated access for a client computer (18) over an insecure, public network (26) to one of a plurality of destination servers (28) on private, secure network, through the use of a client-side X.509 digital certificate. A firewall (32) is disposed between the insecure, public network (26) and the private network. A demilitarized zone (DMZ) proxy server (34) intercepts messages destined for the destination servers (28), and forwards the intercepted messages through the firewall (32) to a gateway (38) on the private network. The gateway (38) is configured to create a cookie, based on the selection of one of several applications (30) available on the private network. The cookie contains an identifier sufficient to identify the destination server (28) corresponding to the selected application (30). Messages from the client computer include the cookie. The gateway (38) processes the cookie and appends the identifier on a destination URL portion of the messages for routing. An alternate computer system authenticates a user of a remote client computer on the insecure network site (26) of the firewall (32) using a user identification and password.
摘要:
A file specifying a "donut" of dynamic, hierarchical, shared user-profile information is maintained. The donut contains a user-profile, or acts as a key to a data repository containing such a user-profile, and the donut specifies user-profile information such as user characteristics, viewing preferences, hobbies, and spending habits. The donut may be stored in a network server or in a user's machine which is connectible to the network. The donut is accessed by browser programs, associated web server programs, and other applications for use in routing content to the user associated with the donut. The donut implements a dynamic store of user profile-data which may be exchanged between the user and the server. This enables, for example, advertising to be tailored to the user based on the users responses to specific questions and/or on the user profile.
摘要:
A method for monitoring client (12) interaction with a resource downloaded from a server (10) in a computer network includes the steps of using a client (12) to specify an address of a resource located on a first server (10), downloading a file corresponding to the resource from the first server (10) in response to specification of the address, using the client (12) to specify an address of a first executable program located on a second server (10), the address of the first executable program being embedded in the file downloaded from the first server (10), the first executable program including a software timer for monitoring the amount of time the client (12) spends interacting with and displaying the file downloaded from the first server (10), downloading the first executable program from the second server to run on the client (12) so as to determine the amount of time the client (12) interacts with the file downloaded from the first server (10). A server (10) for use in analysis and automatically serving out files assembled according to user interests and preferences.
摘要:
A method and apparatus for conducting a multimedia telephone call. The apparatus carries out the method by establishing a telephone call between first and second customer premises equipment and generating, at the first customer premises equipment, a frequency shift keyed message containing a network resource locator. The FSK message is then transmitted from the first customer premises equipment to the second customer premises equipment during the telephone call and is received at the second customer premises equipment.
摘要:
A network browser is provided with working list maintenance and creation facility which contains an indicator for each URL's listing duration level of permanence for controlling how long a URL will be kept or maintained in the working list and also includes an activity duration permanence level indicator for controlling how long the URL will be kept active. This enables the browser to maintain multiple, concurrently active URLs and thereby enable the browser to provide the functional emulation of a desktop working environment to the user.
摘要:
Apparatus, methods, and computer program products are disclosed to simplify a computer user's navigation through a distributed information space. The invention provides the computer user with information identifying the server that provides access to data or services of interest to the user.
摘要:
A content delivery method including the operations of receiving a uniform resource locator resolution request at an authoritative name server for a domain where the uniform resource resolution request is received based, at least in part, on a host name of the uniform resource resolution request where the host name is uniquely related to a resource associated with the uniform resource resolution request. The method further including the operation of tracking a popularity of the resource based on the host name uniquely related to the resource and providing a location within a network capable of delivering the resource where the provided location is based on the popularity of the resource.
摘要:
Various systems and processes may be used to manage Internet Protocol (IP) addresses that are dynamically assigned. In particular implementations, systems and processes for managing IP addresses that are dynamically assigned may include the ability to determine whether an identifier for a web service has been received from a customer having one or more virtual machines in a service provider network, the web service being accessible by the customer's virtual machines over an external communication network. The systems and processes may also include the ability to determine a number of IP addresses for the web service, identify virtual machines of the customer that are allowed to communicate with the web service, generate one or more IP address lists for the identified virtual machines, and update security tables for the identified virtual machines with the IP address lists at server computers hosting the identified virtual machines.
摘要:
The present disclosure relates to a BlueTooth (BT)-based identity recognition method and device, and belongs to the technical field of network security. The method includes that: a BT connection is established with a first terminal; a first user account of the first terminal is acquired through the BT connection; a first preset mapping table is searched for a first Identifier (ID) corresponding to the first user account, the first mapping table including a mapping relationship between at least one user account and at least one ID, each ID corresponding to a respective user account, and the mapping relationship being determined and sent to the smart equipment by a server; and a user identity corresponding to the first terminal is determined according to the first ID.