摘要:
An apparatus and method for searching a database of web site functional characteristics to identify web sites that are compatible with designated functions are provided. With the apparatus and method, a database of functional characteristics is compiled and a search interface is provided. The database may be compiled in an automatic, manual, or semiautomatic manner by, for example, retrieving web site content with various functions of a web browser disabled and analyzing the resultant output through the web browser. With the search interface, a user may enter designations of the functional characteristics that the user is either interested in having or not having in the resultant list of web sites. Based on the user's designation of functional characteristics, the search engine associated with the search interface searches the database of web sites and identifies the web site entries in the database that are compatible with the designated functional characteristics. The search engine then provides a listing of these web site entries through a search output interface which may then be used by the user that requested the search.
摘要:
A method, system, apparatus, and computer program product for using radio-frequency identification (RFID) technology to store product information in tags attached to items of merchandise is disclosed. The RFID tagging scheme of the present invention prevents tampering with stored information, global tracking of customers and their purchased items, and pricing mistakes made at the point of sale.
摘要:
The invention is a system combining a Global Positioning Satellite (GPS) receiver, an electronic compass and a two-way wireless communication system wherein a plurality of hunters each carry such a device. The device is adapted to determine its location using GPS, report that location to a base station or directly to other such devices, receive the location of the other hunters from the base station or directly from other of such devices, and to warn the hunter when aiming his weapon in the direction of another hunter that is within an unsafe distance.
摘要:
A method, system, and computer program product for resolving address information in an ad-hoc networking environment. Two indicators are defined to indicate whether (1) a device has a self-assigned (i.e. auto-configured) IP (Internet Protocol) address and (2) the device has an administered IP address (i.e. an IP address configured by an administrator or assigned by a service such as a Dynamic Host Configuration Protocol service). These indicators are communicated, along with a device's IP host name, IP address, subnet, and subnet mask, preferably as augmented information of existing protocol messages. The information may be communicated during establishment of the data link layer connection between two devices, or it may be communicated during service discovery protocol exchanges between two devices, or in a combination thereof.
摘要:
A method, system and program product are presented for enabling a session, as defined by a series of related transactions to perform a unit of work, to be created between a client and a particular server where the server is managed by a dispatcher. Modifications to the Uniform Resource Locator (URL) are used to create a method of transferring information form the client to the server. The server implements a server-side storage area (cookie jar) to temporarily store information about the client and the session so that the client is routed to the same server for successive messages in the same session and no reliance is made upon an ability by the client to store or return cookies.
摘要:
Methods, systems and computer program products are provided for determining if a packet has a spoofed source Internet Protocol (IP) address. A source media access control (MAC) address of the packet and the source IP address are evaluated to determine if the source IP address of the packet has been bound to the source MAC address at a source device of the packet. The packet is determined to have a spoofed source IP address if the evaluation indicates that the source IP address is not bound to the source MAC address. Such an evaluation may be made for packets having a subnet of the source IP address which matches a subnet from which the packet originated.
摘要:
A method, system, computer program product, and method of doing business by digitally notarizing a collection of data streams, thereby improving security of the contents of the data streams. Preferably, public key cryptography is used, wherein the collection of data streams is digitally signed (i.e. notarized) using a private cryptographic key of a digital notary, such that an associated public cryptographic key can be used to verify the authenticity and integrity of the collection of data streams. One or more components which are involved in creating the data streams are preferably authenticated, and a unique identifier of each such component is included within cryptographically-protected information that is provided for the digital notarization. The authenticated identities of the components can therefore be determined from the digital notarization.
摘要:
Methods, systems, computer program products, and methods of doing business by improving collection of clickstream data in network exchanges comprising a plurality of related request and response messages. A clickstream cookie is created by an application, and contains a clickstream data collection correlator for messages of a particular transaction. A Uniform Resource Locator (“URL”) token is created, and is used both in URLs of messages and in cookies downstream of a cookie jar for locating the application-generated correlator. In preferred embodiments, this application-generated correlator is a unique value which is used to identify related clickstream data once it is collected. A flag may also be used to indicate whether data collection is enabled. No changes are required on client devices or in client software, and there is no dependency on a client to support cookies. Using the disclosed techniques, a particular application may specify varying clickstream data collection requirements for the transactions it generates.
摘要:
A method, system, computer program product, and method of doing business by providing improved audio compression wherein an audio stream is securely transformed to an encoded text stream (such as an ASCII, EBCDIC, or Unicode text stream). One or more components which are involved in the transformation process are authenticated. A unique identifier of each such component is included within cryptographically-protected information that is provided for the encoded text stream. A digital signature is preferably used for the cryptographic protection, thereby digitally notarizing the encoded text stream. The authenticity and integrity of the encoded text stream can therefore be verified. In preferred embodiments, the authenticated identities of components performing the transformation can also be determined from the cryptographically-protected information. The encoded text stream will typically require much less storage space than the audio stream, and providing the digital notarization along with the encoded text stream serves to reliably establish evidence of the contents of the audio stream (even though a perfect speech-to-text transformation might not be achieved).
摘要:
A device certificate identifies a particular device using a globally-unique device identifier and contains a public key associated therewith. A private key stored in protected storage of the device is used to digitally sign outbound messages, enabling the message receiver to authenticate the message originator. Devices requesting address assignment from a service such as a Boot Protocol or Dynamic Host Configuration Protocol service can be authenticated by that service before an address is assigned. The device of the service providing the address assignment may also digitally sign the requested address, using its own private key, enabling the address receiver to verify that the address provider is authentic before accepting and using the assigned address. A device requesting an update to address information stored in a Domain Name System (DNS) server can be authenticated and/or can ensure that a legitimate DNS has been contacted.