$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Common session token system and protocol 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-013/14
출원번호 US-0796260 (1997-02-06)
발명자 / 주소
  • Kunzelman Kevin
  • Hutto Sterling
출원인 / 주소
  • Electric Classified, Inc.
대리인 / 주소
    Albert
인용정보 피인용 횟수 : 279  인용 특허 : 7

초록

An improved session control method and apparatus includes a client which establishes a session with a first server such that the first server can identify the client. When the client wishes to migrate from the first server to a second server, the client requests a session token from the first server

대표청구항

[ What is claimed is:] [1.] In a client-server network having multiple independent servers, a method of session migration from a session between a client and a first server to a session between the client and a second server;establishing a current session between the client and the first server afte

이 특허에 인용된 특허 (7)

  1. Aditham Radhakrishna ; Chang Philip ; Kramer Paul H., Authenticating remote users in a distributed environment.
  2. Hayashi Kensuke,JPX, Echo canceler.
  3. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  4. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  5. Sadovsky Vladimir (Kirkland WA), Method for providing access to independent network resources by establishing connection using an application programming.
  6. Montulli Lou, Persistent client state in a hypertext transfer protocol based client-server system.
  7. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Server entity that provides secure access to its resources through token validation.

이 특허를 인용한 특허 (279)

  1. Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
  2. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  5. de Jong,Eduard K., Accessing in a rights locker system for digital content access control.
  6. Nedderman, Scott; Taylor, Jonathan; Lenz, Christopher, Apparatus, system and method for maintaining a persistent data state on a communications network.
  7. Lenz, Christopher; Taylor, Jonathan; Nedderman, Scott, Apparatus, system, and method for maintaining a persistent data state on a communications network.
  8. Nedderman, Scott; Taylor, Jonathan; Lenz, Christopher, Apparatus, system, and method for maintaining a persistent data state on a communications network.
  9. Nedderman,Scott; Taylor,Jonathan; Lenz,Christopher, Apparatus, system, and method for maintaining a persistent data state on a communications network.
  10. Chen, Lee; Oshiba, Dennis; Chiong, John, Applying a network traffic policy to an application session.
  11. Chen, Lee; Oshiba, Dennis; Chiong, John, Applying security policy to an application session.
  12. Milenova, Boriana Lubomirova; Campos, Marcos M; Yarmus, Joseph, Approximating value densities.
  13. Barbour, Marc R.; Sedky, Khaled Salah; Mandadi, Srikanth; Praus, Slavka, Asymmetric session credentials.
  14. Brendel, Juergen, Atomic session-start operation combining clear-text and encrypted sessions to provide ID visibility to middleware such as load-balancers.
  15. Brendel, Juergen, Atomic session-start operation combining clear-text and encrypted sessions to provide id visibility to middleware such as load-balancers.
  16. Ahlberg, Axel H.; Becar, Allyn P.; Brand, Gregory L.; Fenley, Douglas B.; Jones, Chester L.; Wyrick, Robert E., Authentication and entitlement for users of web based data management programs.
  17. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  18. Bradley, II, Charles B., Authorized data access based on the rights of a user and a location.
  19. Souder, Benny; Stamos, James; Wong, Lik; Ciminski, John; Lakshminath, Anand; Downing, Alan, Automatic and dynamic provisioning of databases.
  20. Souder, Benny; Stamos, James; Wong, Lik; Ciminski, John; Lakshminath, Anand; Downing, Alan, Automatic and dynamic provisioning of databases.
  21. Ramacher, Mark C.; Grant, Cecilia Gervasio; Wood, Graham Stephen; Green, Konstantina Dialeris; Green, Russell John, Automatic performance statistical comparison between two periods.
  22. Chidambaran,Lakshminarayanan; Kantarjiev,Christopher A.; Stamos,James W.; Povinec,Peter, Calculation of service performance grades in a multi-node environment that hosts the services.
  23. Kasamsetty,Ravikanth; Koti,Ravi; Kaluskar,Sanjay H.; Liang,Chao, Capturing and re-creating the state of a queue when migrating a session.
  24. Liang, Chao; Cao, Feng; Pingte, Rajendra, Capturing and restoring database session state.
  25. Ling, Chao; Cao, Feng; Pingte, Rajendra, Capturing and restoring database session state.
  26. Northcutt,J. Duane; Hanko,James G.; Ruberg,Alan T.; Wall,Gerard A; Butcher,Lawrence L.; Wilhelm,Neil C., Computer architecture having a stateless human interface device and methods of use.
  27. Xia, Sharon; Muñoz, Eduardo; Brombaugh, Dan, Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys.
  28. Hoffman, James; Friskel, James, Computerized method, program, and apparatus for limited sharing of digital content.
  29. Colrain, Carol L.; Irudayaraj, Rajkumar A.; Surber, Douglas N., Connection pool use of runtime load balancing service performance advisories.
  30. Wentker, Dave; Wong, Erick; Shenker, Gavin; Deibert, Doug, Contactless transaction.
  31. Kini, Prashanth; Tauriello, Richard; Campos, Marcos M.; Milenova, Boriana; Lubomirsky, Andres V.; Sum, Charlie, Continuous system health indicator for managing computer system alerts.
  32. Motukuru, Vamsi; Chathoth, Vikas Pooven; Koottayi, Vipin Anaparakkal, Cookie based session management.
  33. Fresko, Nedim; Franco, Will D.; Sherkin, Alexander, Cookie verification methods and apparatus for use in providing application services to communication devices.
  34. Gershman, Greg; Miller, Michael J.; Dardamanis, George, Coordination of data received from one or more sources over one or more channels into a single context.
  35. Hu, Wei; Hwang, Alexander; Meng, Shen-Ban; Pareek, Alok; Potapov, Dmitry; Sanchez, Francisco, Cross platform transportable tablespaces.
  36. Mandadi, Srikanth; Sedky, Khaled Salah; Praus, Slavka; Barbour, Marc R., Cross-region roles.
  37. Kaluskar, Sanjay; Gollapudi, Sreenivas, Cursor pre-fetching.
  38. Devine,Carol Y.; Shoulberg,Richard W.; Shifrin,Gerald A.; Pfister,Robert A.; Fenley,Douglas B.; Suscheck,Charles A.; Delano,P. Alex; Kennington,W. Russell; Brandt,Andre R.; Pillai,Sajan J.; Schwarz,Edward; Shamash,Arieh, Customer interface system for managing communications services including toll free services.
  39. Lamla, Michael; Drexler, Hermann; Rankl, Wolfgang; Weikmann, Franz; Effing, Wolfgang, Data medium authentication method.
  40. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  41. Kaluskar,Sanjay; Frumkin,Dmitry; Gollapudi,Sreenivas; Krishnaswamy,Srinath, Database shutdown with session migration.
  42. Ciano, Giuseppe; Pichetti, Luigi; Salerno, Paolo, Detection and management of dynamic migration of virtual environments.
  43. Ciano, Giuseppe; Pichetti, Luigi; Salerno, Paolo, Detection and management of dynamic migration of virtual environments.
  44. Rothwein Thomas M. ; Coker John L., Determining the visibility to a remote database client.
  45. Khaladkar, Bhushan; Agarwal, Nipun; Tarachandani, Asha; Chandrasekar, Sivansankaran; Petride, Sabina, Efficient migration of binary XML across databases.
  46. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  47. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  48. Kasivajjula, Bhavan Kumar; Exton, Scott Anthony; Robinson, Keiran, Enabling different client contexts to share session information.
  49. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  50. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced privacy protection in identification in a data communications network.
  51. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced quality of identification in a data communications network.
  52. Downing, Alan; Meiyyappan, Krishnan; Stamos, James; Venkatesan, Ramkumar, Event locality using queue services.
  53. Kaluskar,Sanjay; Gollapudi,Sreenivas, Extensible framework for transferring session state.
  54. Jalan, Rajkumar; Kamat, Gurudeep, Facilitating secure network traffic by an application delivery controller.
  55. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  56. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  57. Lund, Craig; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  58. Belote, Thomas M.; Karaa, Hassen; Wang, Christine; Jayaraman, Vinoth, Facilitating single sign-on to software applications.
  59. Jalan, Rajkumar; Kamat, Gurudeep; Sankar, Swaminathan; Karampurwala, Hasnain, Forwarding data packets using a service-based forwarding policy.
  60. Jalan, Rajkumar; Kamat, Gurudeep, Forwarding policies on a virtual service network.
  61. Mathew, Stephen; Koottayi, Vipin Anaparakkal; Subramanya, Ramya Kukehalli, Global unified session identifier across multiple data centers.
  62. Evans, James; Walsh, Richard J., Group licenses for virtual objects in a distributed virtual world.
  63. Milenova, Boriana Lubomirova; Campos, Marcos M., Grouping interdependent fields.
  64. Davis, Ian E., Hardware-based packet editor.
  65. Davis, Ian E., Hardware-based packet editor.
  66. Souder, Benny; Chatterjee, Debashish; Chidambaran, Lakshminarayanan; Brower, David; Colrain, Carol; Semler, Daniel; Kantarjiev, Christopher A.; Stamos, James W., Hierarchical management of the dynamic allocation of resources in a multi-node system.
  67. Idicula, Sam; Sthanikam, Balasubramanyam; Agarwal, Nipun, Hybrid binary XML storage model for efficient XML processing.
  68. Idicula, Sam; Sthanikam, Balasubramanyam; Agarwal, Nipun, Hybrid binary XML storage model for efficient XML processing.
  69. Colrain, Carol L.; Roesch, Stefan Heinrich; Neel, Kevin S., Idempotence for database transactions.
  70. Colrain, Carol L.; Roesch, Stefan Heinrich; Neel, Kevin S., Idempotence for database transactions.
  71. Colrain, Carol L.; Roesch, Stefan Heinrich; Neel, Kevin S., Idempotence for database transactions.
  72. Villavicencio, Francisco J., Impersonation in an access system.
  73. Villavicencio,Francisco J., Impersonation in an access system.
  74. Chidambaran, Lakshminarayanan; Chatterjee, Debashish; Stamos, James W., Incremental run-time session balancing in a multi-node system.
  75. Koehler, Yannick, Indication of URL prerequisite to network communication.
  76. Felsher, David Paul, Information record infrastructure, system and method.
  77. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Devine, Carol Y.; Studness, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated business system for web based telecommunications management.
  78. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  79. Devine, Carol Y.; Shoulberg, Richard W.; Shifrin, Gerald A.; Pfister, Robert A.; Fenley, Douglas B.; Suscheck, Charles A.; Delano, P. Alex; Kennington, W. Russell; Brandt, Andre R.; Pillai, Sajan J.;, Integrated customer interface system for communications network management.
  80. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  81. Baker,Thomas E.; Chaffee,Susan L.; Chen,Yuchien; Gruber,Charles J.; Fishman,Howard P., Integrated customer web station for web based call management.
  82. Cogger, Timothy John; Kunkel, III, Isaac A.; Miller, David Todd; Patil, Suma P., Integrated interface for web based customer care and trouble management.
  83. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  84. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  85. Combar,Curtis T.; Devine,Carol Y.; Flentje,William P.; Pfister,Robert A., Integrated proxy interface for web based data management reports.
  86. Devine, Carol Y.; Dollar, Tammy E.; Munguia, Wayne J.; Schwarz, Edward, Integrated proxy interface for web based report requester tool set.
  87. Delano, P. Alex; Devine, Carol Y.; Hall, Robert W.; Pfister, Robert A.; Venn, Garrison M., Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client.
  88. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  89. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  90. Chan, Wilson; Pruscino, Angelo; Wang, Tak Fung; Hsu, Cheng-Lu, Intelligent flood control management.
  91. Bonefas, Rudy G.; Sobchak, Richard K.; Zombek, James M., Intelligent messaging network server interconnection.
  92. Roskind, James; Belshe, Michael, Latency reduction via adaptive speculative preconnection.
  93. Skene, Bryan D., Link load balancer that controls a path for a client to connect to a resource.
  94. Madany,Peter; Chu,Eric, Low cost, stateless, full-featured information appliance.
  95. Worthen, Bill; Ford, Corey; McClure, Andy; Hillesheim, Dean; Kost, Tim, Managed rich media system and method.
  96. Wray, John Clay Richard, Managing secure sessions.
  97. Colrain, Carol; Semler, Daniel, Managing workload by service.
  98. Neel, Kevin S.; Colrain, Carol L.; Surber, Douglas N.; Ikeda, Nancy R.; Roesch, Stefan Heinrich; Zhou, Tong; De Lavarene, Jean, Masking database outages from clients and applications.
  99. Thomas,C. Douglass, Method and apparatus for customization of information content provided to a requestor over a network using anonymous demographic data stored on a demographic server.
  100. Thomas C. Douglass, Method and apparatus for customization of information content provided to a requestor over a network using demographic information yet the user remains anonymous to the server.
  101. Ng, Joanna; Kapoor, Rohit; Nigul, Leho, Method and apparatus for enabling associated portlets of a web portlet to collaborate for synchronized content display.
  102. Ng, Joanna; Kapoor, Rohit; Nigul, Leho, Method and apparatus for enabling associated portlets of a web portlet to collaborate for synchronized content display.
  103. Dharmarajan, Baskaran, Method and apparatus for encoding and storing session data.
  104. Dharmarajan, Baskaran, Method and apparatus for encoding and storing session data.
  105. Dharmarajan,Baskaran, Method and apparatus for encoding and storing session data.
  106. Mann, Joseph F.; Deng, Mingqi; Roden, Thomas Anthony, Method and apparatus for identifying a data communications session.
  107. Lerner, Jack Lawrence, Method and apparatus for integrating distributed shared services system.
  108. Kuehr-McLaren, David G., Method and apparatus for managing session information in a data processing system.
  109. Squire, Matthew B.; Luciani, James V., Method and apparatus for network caching and load balancing.
  110. Samar, Vipin, Method and apparatus for sharing a secure connection between a client and multiple server nodes.
  111. Megiddo, Nimrod; Modha, Dharmendra Shantilal, Method and program product for maintaining security of publicly distributed information.
  112. Dharmarajan,Baskaran, Method and system for authorizing a client computer to access a server computer.
  113. Patel,Baiju V., Method and system for correlating data from multiple sources without compromising confidentiality requirements.
  114. Bonefas, Rudy G.; Miller, Michael; Shelton, Dale; Wantz, Jay, Method and system for deploying content to wireless devices.
  115. Bonefas, Rudy G.; Miller, Michael; Shelton, Dale; Wantz, Jay L., Method and system for deploying content to wireless devices.
  116. Bonefas, Rudy; Miller, Michael J.; Shelton, Dale; Wantz, L. Jay, Method and system for deploying content to wireless devices.
  117. Bonefas, Rudy; Miller, Michael; Shelton, Dale; Wantz, L. Jay, Method and system for deploying content to wireless devices.
  118. Benantar Messaoud ; High ; Jr. Robert Howard ; Rathi Mahesh Kumar, Method and system for maintaining client server security associations in a distributed computing system.
  119. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  120. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  121. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  122. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for recording and using a traveler's travel preferences.
  123. Williams, Ronald B., Method and system for secure server-based session management using single-use HTTP cookies.
  124. Williams, Ronald B., Method and system for secure server-based session management using single-use HTTP cookies.
  125. Lemaster, Robert K; Pillai, Duleep G., Method and system of a secure access gateway.
  126. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  127. Ng, Joanna; Kapoor, Rohit; Nigul, Leho, Method for enabling associated portlets of a web portlet to collaborate for synchronized content display.
  128. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  129. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  130. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  131. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  132. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  133. Satyavolu,Ramakrishna; Gamboa Pani,Joaquin, Method for verifying the identity of a user for session authentication purposes during Web navigation.
  134. Evans, James; Kandekar, Kunal; Walsh, Richard, Methods for providing peer negotiation in a distributed virtual environment and related systems and computer program products.
  135. Tsukerman, Alex; Colrain, Carol Lyndall; Wood, Graham; Chen, Jane X.; Chidambaran, Luxi; Dageville, Benoit; Ngai, Gary; Ramacher, Mark, Methods, systems and software for identifying and managing database work.
  136. Calo, Seraphin B.; Dilmaghani, Raheleh B.; Ko, Bong Jun; Lee, Kang-Won; Pappas, Vasileios; Raghavendra, Ramya; Song, Yang; Verma, Dinesh C., Migration of network connection under mobility.
  137. Calo, Seraphin B.; Dilmaghani, Raheleh B.; Ko, Bong Jun; Lee, Kang-Won; Pappas, Vasileios; Raghavendra, Ramya; Song, Yang; Verma, Dinesh C., Migration of network connection under mobility.
  138. Calo, Seraphin B.; Dilmaghani, Raheleh B.; Ko, Bong Jun; Lee, Kang-Won; Pappas, Vasileios; Raghavendra, Ramya; Song, Yang; Verma, Dinesh C., Migration of network connection under mobility.
  139. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  140. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  141. Deibert, Doug; Wong, Erick; Shenker, Gavin; Wentker, David, Mobile phone payment with disabling feature.
  142. Arsenault, David, Modifying browser requests to track browsing activities.
  143. Gong, Yu, Modularized extraction, transformation, and loading for a database.
  144. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  145. Hoffberg, Steven M., Multifactorial optimization system and method.
  146. Chidambaran,Lakshminarayanan; Stamos,James W.; Pingte,Rajendra; Lu,Edwina, On demand node and server instance allocation and de-allocation.
  147. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online electronic health record.
  148. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  149. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online personal library.
  150. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  151. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information and access of information stored therein.
  152. Hansmann, Uwe; Rindtorff, Klaus; Stober, Thomas, Password-free, token-based wireless access.
  153. Hoffman, James; Friskel, James, Personal digital server (PDS).
  154. Isaac, Tomy K.; Kasiraja, Mark, Personalized account migration system and method.
  155. Isaac,Tomy K.; Kasiraja,Mark, Personalized account migration system and method.
  156. Praus, Slavka; Sedky, Khaled Salah; Mandadi, Srikanth; Barbour, Marc R., Personalizing global session identifiers.
  157. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  158. Colrain, Carol L.; Hung, Hochak; Neel, Kevin S., Preserving server-client session context.
  159. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Privacy and identification in a data communications network.
  160. Arsenault, David, Processing browser requests based on trap lists.
  161. Arsenault, David, Processing browser requests to provide multiple portions of content having a consistent appearance.
  162. Jalan, Rajkumar; Kamat, Gurudeep, Processing data packets using a policy based network path.
  163. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Processing data using information embedded in a data request.
  164. Arsenault, David, Processing selected browser requests.
  165. Arsenault, David, Processing selected browser requests.
  166. Yoakum, John H.; Edholm, Philip, Providing additional information with session requests.
  167. Xia, Sharon (Hong); Brombaugh, Dan, Proxy server security token authorization.
  168. Surlaker, Kapil; Bhatt, Neerja; Mishra, Shailendra, Publisher flow control and bounded guaranteed delivery for message queues.
  169. Surlaker, Kapil; Bhatt, Neerja; Mishra, Shailendra, Publisher flow control and bounded guaranteed delivery for message queues.
  170. Crosbie, Tanya M. Mastin; Knouse, Charles W., Query string processing.
  171. Zoll, Michael; Chan, Wilson Wai Shun; Pruscino, Angelo; Wang, Tak Fung, Real-time database exception monitoring tool using instance eviction data.
  172. Chidambaran, Lakshminarayanan; Chatterjee, Debashish, Recoverable asynchronous message driven processing in a multi-node system.
  173. Colrain, Carol L.; Neel, Kevin S.; Zhou, Tong; Surber, Douglas N.; Roesch, Stefan Heinrich; Ikeda, Nancy R., Recovering stateful read-only database sessions.
  174. Colrain, Carol L.; Neel, Kevin S.; Zhou, Tong; Surber, Douglas N.; Roesch, Stefan Heinrich; Ikeda, Nancy R.; Parkinson, Paul, Recovering stateful read-only database sessions.
  175. Roskind, James, Reduction in redirect navigation latency via speculative preconnection.
  176. Roskind, James, Reduction in redirect navigation latency via speculative preconnection.
  177. Surlaker, Kapil; Meiyyappan, Krishnan; Bhatt, Neerja; Mishra, Shailendra, Repeatable message streams for message queues in distributed systems.
  178. Kogan, David; Pingte, Rajendra S.; Liang, Chao; Cao, Yujie, Replication and mapping mechanism for recreating memory durations.
  179. de Jong, Eduard; Cooley, Aaron; Bostrom, Jon, Repositing for digital content access control.
  180. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Repositing for digital content access control.
  181. Wray, John Clay Richard, Restoring secure sessions.
  182. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Restricting use of a digital item stored in a client computer by sending an instruction from a server computer via a network.
  183. de Jong,Eduard K., Rights locker for digital content access control.
  184. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for Web based data management.
  185. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  186. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  187. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange.
  188. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange based on request destination.
  189. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S.; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  190. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange between data processing systems.
  191. Harada, Larry T.; Dolecki, Mark A.; Purdum, Christopher S; Hendren, III, C. Hudson, Secure data exchange for processing requests.
  192. Knowles, Michael; Tapuska, David; Kalougina, Tatiana, Secure method of synchronizing cache contents of a mobile browser with a server.
  193. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  194. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  195. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  196. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  197. Slick, Royce E.; Iwamoto, Neil Y.; Martinez, Martin, Security against replay attacks of messages.
  198. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  199. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  200. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  201. Chiang, Hiang Swee, Server side web browsing and multiple lens system, method and apparatus.
  202. Chiang, Hiang-Swee, Server side web browsing and multiple lens system, methods and apparatus.
  203. Chidambaran,Lakshminarayanan; Kantarjiev,Christopher A., Service placement for enforcing performance and availability levels in a multi-node system.
  204. Guo, Wei-Quiang Michael; Dharmarajan, Baskaran; Battle, Ryan W., Service routing and web integration in a distributed, multi-site user authentication system.
  205. Mathew, Stephen; Koottayi, Vipin Anaparakkal, Session activity tracking for session adoption across multiple data centers.
  206. Allen, Joshua, Session-state manager.
  207. Allen,Joshua, Session-state manager.
  208. Mathew, Stephen; Motukuru, Vamsi; Martin, Madhu; Chathoth, Vikas Pooven, Single sign-on between multiple data centers.
  209. Mathew, Stephen; Motukuru, Vamsi; Martin, Madhu; Chathoth, Vikas Pooven, Single sign-on between multiple data centers.
  210. Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
  211. Scavo, David Francis; Whiteside, Barbara Wilson, Single sign-on processing for associated mobile applications.
  212. Scavo, David Francis; Whiteside, Barbara Wilson, Single sign-on processing for associated mobile applications.
  213. Scavo, David Francis; Whiteside, Barbara Wilson, Single sign-on processing for associated mobile applications.
  214. Scavo, David Francis; Whiteside, Barbara Wilson, Single sign-on processing for associated mobile applications.
  215. Poder, James, Stateful home phone service.
  216. Hunt, Galen C., Stateless distributed computer architecture with server-oriented state-caching objects maintained on network or client.
  217. Hunt,Galen C., Stateless distributed computer architecture with server-oriented state-caching objects maintained on network or client.
  218. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  219. Kaluskar, Sanjay; Gollapudi, Sreenivas, Suspending and resuming of sessions.
  220. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Synchronizing for digital content access control.
  221. Gorty, Suryanarayana Murthy, System and method for authenticating a user for accessing an email account using authentication token.
  222. Knowles, Michael; Tapuska, David; Kalougina, Tatiana, System and method for communicating state management between a browser user-agent and a server.
  223. Akolkar, Rahul P.; Boyer, John M.; Wiecha, Charles F., System and method for data-driven web page navigation control.
  224. Hoffberg, Steven M., System and method for determining contingent relevance.
  225. Lund, Craig; Grajek, Garret; Moore, Stephen, System and method for facilitating secure online transactions.
  226. Morimoto, Nobuyoshi, System and method for identifying individual users accessing a web site.
  227. Morimoto, Nobuyoshi, System and method for identifying individual users accessing a web site.
  228. Morimoto, Nobuyoshi, System and method for identifying individual users accessing a web site.
  229. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  230. Hampel, K. Georg; Klein, Thierry E., System and method for mobility and multi-homing content retrieval applications.
  231. Masters, Richard R., System and method for performing application level persistence.
  232. Masters, Richard R., System and method for performing application level persistence.
  233. Masters, Richard Roderick, System and method for performing application level persistence.
  234. Masters, Richard Roderick, System and method for performing application level persistence.
  235. Masters,Richard R., System and method for performing application level persistence.
  236. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  237. Norris, Charles Leslie, System and method for providing controlled and secured access to network resources.
  238. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  239. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  240. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  241. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communication over non-IP based networks.
  242. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  243. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  244. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  245. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  246. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  247. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  248. Ferguson, Donald F.; Byrappagari, Anand; Dixon, Graeme, System and method for upgrading software in a distributed computer system.
  249. Ferguson,Donald F.; Byrappagari,Anand; Dixon,Graeme, System and method for upgrading software in a distributed computer system.
  250. Steven J. Linsk, System and server for providing customized web information based on attributes of the requestor.
  251. Royer,Barry Lynn; Heil,John Andrew, System and user interface supporting concurrent application initiation and interoperability.
  252. Royer, Barry Lynn; Heil, John Andrew, System and user interface supporting context sharing between concurrently operating applications.
  253. Miller, Michael J., System for automated device-to-device transfer.
  254. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, System for digital content access control.
  255. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  256. Abrahams, Marc David; Gragossian, Seda, System for ubiquitous network presence and access without cookies.
  257. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  258. Venkatasamy, Satishkumar; Rana, Rima; Panda, Durga Harini; Ramadoss, Lakshmi, Techniques for access management based on multi-factor authentication including knowledge-based authentication.
  259. Burch, Lloyd Leon; Mukkara, Prakash Umasankar; Earl, Douglas Garry, Techniques for secure access management in virtual environments.
  260. Burch, Lloyd Leon; Mukkara, Prakash Umasankar; Earl, Douglas Garry, Techniques for secure access management in virtual environments.
  261. Soulios, Dimitrios, Token-based authentication using middle tier.
  262. Soulios, Dimitrios, Token-based authentication using middle tier.
  263. Neel, Kevin S.; Colrain, Carol L.; Surber, Douglas N.; Ikeda, Nancy R.; Roesch, Stefan Heinrich; Zhou, Tong; De Lavarene, Jean, Transactional and non-transactional data for maintaining session state.
  264. Neel, Kevin S.; Colrain, Carol L.; Surber, Douglas N.; Ikeda, Nancy R.; Roesch, Stefan Heinrich; Zhou, Tong; De Lavarene, Jean, Transactional and non-transactional data for maintaining session state.
  265. Fox, Gregory A.; Tye, Timothy T., Transferring session state information between two or more web-based applications of a server system.
  266. Kaluskar, Sanjay; Gollapudi, Sreenivas, Transparent migration of stateless sessions across servers.
  267. Kaluskar, Sanjay; Gollapudi, Sreenivas; Chatterjee, Debashish, Transparent session migration across servers.
  268. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  269. Gage, Christopher A. S.; Hind, John R.; Peters, Marcia L., URL-based sticky routing tokens using a server-side cookie jar.
  270. Gage, Christopher A. S.; Hind, John; Peters, Marcia L., URL-based sticky routing tokens using a server-side cookie jar.
  271. Squier,Anthony C.; Austin,Calvin J., Universal session sharing.
  272. Kim,Joohae; Danknick,Dan; Kodimer,Marianne, Upload and retrieval by an image device of a scanned image to and from a web file server.
  273. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  274. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  275. Yoakum,John H.; Edholm,Philip, Using additional information provided in session requests.
  276. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  277. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  278. Hay, Brian Robert; Hibberd, Timothy Winston; Leenders, Ronald George; Kinder, Richard David, Virtual token.
  279. Gobin, Parmeshwar; Hall, Henry Huntington; Hauryluck, Carla Reale; Kanze, Daniel Robert; Liburd, Steven William; Sandt, Kirk Van; Swei, Jia Huei, Web based integrated customer interface for invoice reporting.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로