IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0933878
(2001-08-21)
|
발명자
/ 주소 |
- Darago, Vincent S
- Jenkins, Christopher
|
출원인 / 주소 |
- Digital-Vending Services International, LLC
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
14 인용 특허 :
16 |
초록
▼
Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction
Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction content delivery method and system which does not exclude synchronous sharing but is focused on asynchronous sharing. Security means in the architecture provide content property holders with the ability to know how many minutes of use an individual made of licensed material and with increased certainty that their material cannot be used, copied, or sold in usable form unless and until a user site is connected or reconnected to a minute-by-minute counter which is located off the premises of the user. This security link helps protect software and other works which are being sold or licensed to an individual, organization, or entity, and creates income opportunities for owners of such content.
대표청구항
▼
Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction
Methods, devices, and systems are provided in a multi-level computer architecture which provides improved capabilities for managing courseware and other content in a shared use operating environment such as a computer network. In particular, the invention provides a commercial networked instruction content delivery method and system which does not exclude synchronous sharing but is focused on asynchronous sharing. Security means in the architecture provide content property holders with the ability to know how many minutes of use an individual made of licensed material and with increased certainty that their material cannot be used, copied, or sold in usable form unless and until a user site is connected or reconnected to a minute-by-minute counter which is located off the premises of the user. This security link helps protect software and other works which are being sold or licensed to an individual, organization, or entity, and creates income opportunities for owners of such content. enabling caching of credentials at a location accessible by an intermediary network node using a wireless user agent; intercepting a first request destined for a resource at a specified network locator on a wireline network transmitted by a client device over a wireless network, the first request including an associated credential; intercepting a subsequent request without the associated credential at the intermediary network node, the request transmitted by the client device over the wireless network and destined for a resource at a specified network locator on the wireline network; and, in response to the request: using the intermediary network node to locate a cached credential associated with the client device; and sending the request with the cached credential from the intermediary network node to the resource over the wireline network, the resource authenticating the client device using the credential. 14. A method as recited in claim 13, wherein the intermediary network node comprises a proxy server to proxy requests from the client device to resources on the wireless network. 15. A method as recited in claim 13, wherein the credential comprises a username and password. 16. A method as recited in claim 13, wherein the credential is not cached if the user specifies that the credential is not to be cached. 17. The method of claim 13 wherein the wireless user agent is a web browser. 18. An intermediary network node comprising: means for enabling caching of credentials at a location accessible by an intermediary network node using a wireless user agent; means for intercepting a first request including an associated credential from a mobile device over a wireless network, the first request destined for a resource at a specified network locator within a protected realm on a wireline network; means for intercepting a subsequent request without an associated credential at the intermediary network node from the mobile device over the wireless network, the request destined for a resource within the protected realm on the wireline network; means for using the intermediary network node to locate in a credential cache a credential associated with the mobile client device in response to the subsequent request; and means for sending the subsequent request with the credential from the intermediary network node to the resource at the specified network locator over the wireless network, the resource authenticating the client device using the credential. 19. An intermediary network node as recited in claim 18, wherein the intermediary network node operates as a proxy server for proxying requests from the mobile client device to resources on the wireline data network. 20. An intermediary network node as recited in claim 18, wherein the credential comprises a username and password. 21. An intermediary network node as recited in claim 18, wherein the credential is not cached if the user specifies that the credential is not to be cached. 22. The network node of claim 18 wherein the wireless user agent is a web browser. 23. A method comprising: receiving, at an intermediary network node enabled by a wireless user agent to store credentials, a credential from a client device over a wireless network, wherein the credential is associated with a first request by the client device destined for a first resource at a specified first network locator within a protected realm on a wireline network; caching the credential in a credential cache using the intermediary network node if the credential is not present in the cache; receiving, at the intermediary network node, a second request from the client device without an associated credential, the second request destined for a second resource at a specified second network locator within the protected realm on the wireline network; using the intermediary network node to locate the cached credential in the credential cache in response to the second request; and sending the cached
※ AI-Helper는 부적절한 답변을 할 수 있습니다.