IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0058338
(2002-01-30)
|
등록번호 |
US-7325065
(2008-01-29)
|
발명자
/ 주소 |
|
출원인 / 주소 |
- AOL LLC, a Delaware Limited Liability Company
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
9 인용 특허 :
70 |
초록
▼
An authorized client communication system seeking access to a host communication system may be identified by performing a mathematical computation on a client communication system-specific identifier and an access password. Communications from the client communication system are terminated if the re
An authorized client communication system seeking access to a host communication system may be identified by performing a mathematical computation on a client communication system-specific identifier and an access password. Communications from the client communication system are terminated if the result of the mathematical computation does not correspond to an authorized client communication system. Another aspect involves storing information about an authorized client communication system.
대표청구항
▼
What is claimed is: 1. A method for determining whether a client communication system seeking access to a host communication system is authorized to do so, the method comprising: receiving, at the host, from the client communication system, a user-independent client-communication-system-specific id
What is claimed is: 1. A method for determining whether a client communication system seeking access to a host communication system is authorized to do so, the method comprising: receiving, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on a first user-dependent access identifier and the user-independent client-communication-system-specific identifier; accessing, at the host and based on the receipt of the user-independent client communication-system-specific identifier, a second user dependent access identifier; performing a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; comparing results of the first and second mathematical computations; and designating a client communication system as unauthorized based on the comparison of the results of the first and second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. 2. The method of claim 1, wherein either the first or second mathematical computations comprises a hashing algorithm. 3. The method of claim 1, wherein the first mathematical computation is performed when a communication is initiated. 4. The method of claim 1, wherein the first and second user-dependent access identifiers comprise a subscriber password. 5. The method of claim 1, wherein the first and second user-dependent access identifiers comprise a user password. 6. The method of claim 1, wherein the first and second user-dependent access identifiers comprise an account password. 7. The method of claim 1, wherein the user-independent client-communication-system-specific identifier comprises a device-specific identifier. 8. The method of claim 7, wherein the device-specific identifier comprises a hard disk identifier. 9. The method of claim 7, wherein the device-specific identifier comprises an Ethernet address. 10. The method of claim 7, wherein the device-specific identifier comprises a central processing unit serial number. 11. The method of claim 7, wherein the device-specific identifier comprises a description of the storage characteristics of the hard disk. 12. The method of claim 1, further comprising sending a notification to the client communication system indicating the designation of the client communication system as an unauthorized client communication system if the result of the first mathematical computation does not correspond to the result of the second mathematical computation. 13. The method of claim 1, further comprising terminating communications from the client communication system if the result of the first mathematical computation does not correspond to result of the second mathematical computation. 14. The method of claim 13, wherein terminating communications is performed after a predetermined delay if the result of the first mathematical computation does not correspond to the result of the second mathematical computation. 15. A method for handling information about an authorized client communication system, the method comprising: storing a version of a user-dependent access identifier; storing a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed, at a client communication system, on the user-dependent access identifier and the user-independent client-communication-system-specific identifier; performing a second mathematical computation on the stored version of the user-dependent access identifier and the retrieved user-independent client-communication-system-specific identifier, and storing the results of the second mathematical computation, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. 16. The method of claim 15, wherein: storing the result of the first mathematical computation comprises storing the result on the client communication system, storing the version of the user-dependent access identifier comprises storing the version of the user-dependent access identifier on the host communication system. 17. The method of claim 15, wherein either the first or second mathematical computations comprises a hashing algorithm. 18. The method of claim 15, wherein the user-dependent access identifier and the stored version of the user-dependent access identifier comprises a subscriber password. 19. The method of claim 15, wherein the user-dependent access identifier and the stored version of the user-dependent access identifier comprises a user password. 20. The method of claim 15, wherein the user-dependent access identifier and the stored version of the user-dependent access identifier comprises an account password. 21. The method of claim 15, wherein the user-independent client-communication-system-specific identifier comprises a device-specific identifier. 22. The method of claim 21, wherein the device-specific identifier comprises a hard disk identifier. 23. The method of claim 21, wherein the device-specific identifier comprises an Ethernet address. 24. The method of claim 21, wherein the device-specific identifier comprises a central processing unit serial number. 25. The method of claim 21, wherein the device-specific identifier comprises a description of the storage characteristics of the hard disk. 26. A computer readable medium or propagated signal having embodied thereon a computer program for identifying an unauthorized client communication system seeking access to a host communication system, the computer program comprising: a performing code segment for performing a first mathematical computation on a first user-dependent access identifier and a user-independent client-communication-system-specific identifier; a receiving code segment for receiving, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on the first user-dependent access identifier and the user-independent client-communication-system-specific identifier; a receiving code segment for retrieving, at the host, a second user-dependent access identifier; a performing code segment for performing a second mathematical computation using the received second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; comparing results of the first and second mathematical computations; and a designating code segment for designating a client communication system as unauthorized based on a results of the first and second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. 27. The medium of claim 26, wherein either the first or second mathematical computations comprises a hashing algorithm. 28. The medium of claim 26, wherein the performing code segment performs the first mathematical computation when a communication is initiated. 29. The medium of claim 26, wherein the first and second user-dependent access identifiers comprise a subscriber password. 30. The medium of claim 26, wherein the first and second user-dependent access identifiers comprise a user password. 31. The medium of claim 26, wherein the first and second user-dependent access identifiers comprise an account password. 32. The medium of claim 26, wherein the user-independent client-communication-system-specific identifier comprises a device-specific identifier. 33. The medium of claim 32, wherein the device-specific identifier comprises a hard disk identifier. 34. The medium of claim 32, wherein the device-specific identifier comprises an Ethernet address. 35. The medium of claim 32, wherein the device-specific identifier comprises a central processing unit serial number. 36. The medium of claim 32, wherein the device-specific identifier comprises a description of the storage characteristics of the hard disk. 37. The medium of claim 26, further comprising a notification code segment for sending a notification to the client communication system indicating the designation of the client communication system as an unauthorized client communication system if the result of the first mathematical computation does not correspond to the result of the second mathematical computation. 38. The medium of claim 26, further comprising a terminating code segment for terminating communications from the client communication system if the result of the first mathematical computation does not correspond to result of the second mathematical computation. 39. The medium of claim 38, wherein the terminating code segment terminates communications after a predetermined delay if the result of the first mathematical computation does not correspond to the result of the host-based mathematical computation. 40. A computer readable medium or propagated signal having embodied thereon a computer program for handling information about an authorized client communication system, the computer program comprising: a user-dependent access identifier storing code segment for storing a version of a user-dependent access identifier; a storing code segment for storing, at the host, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed on the user-dependent access identifier and the user-independent client-communication-system-specific identifier; a performing code segment for performing a second mathematical computation on the stored version of the user-dependent access identifier and the retrieved user-independent client-communication-system-specific identifier; and a computation storing code segment for storing the results of the second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. 41. The medium of claim 40, wherein the performing code segment includes: a computation storing code segment for storing the result of the first mathematical computation comprises storing the result on the client communication system, a user-dependent access identifier storing code segment to store the version of the user-dependent access identifier comprises a code segment for storing the result on the host communication system. 42. The medium of claim 40, wherein either the first or second mathematical computations comprises a hashing algorithm. 43. The medium of claim 40, wherein the user-dependent access identifier and the stored version of the user-dependent access identifier comprises a subscriber password. 44. The medium of claim 40, wherein the user-dependent access identifier and the stored version of the user-dependent access identifier comprises a user password. 45. The medium of claim 40, wherein the user-dependent access identifier and the stored version of the user-dependent access identifier comprises an account password. 46. The medium of claim 40, wherein the user-independent client-communication system-specific identifier comprises a device-specific identifier. 47. The medium of claim 46, wherein the device-specific identifier comprises a hard disk identifier. 48. The medium of claim 46, wherein the device-specific identifier comprises an Ethernet address. 49. The medium of claim 46, wherein the device-specific identifier comprises a central processing unit serial number. 50. The medium of claim 46, wherein the device-specific identifier comprises a description of the storage characteristics of the hard disk. 51. An apparatus for identifying an unauthorized client communication system seeking access to a host communication system, the apparatus comprising: a performing device structured and arranged to perform, at a client, a first mathematical computation on a first user-dependent access identifier and a user-independent client-communication-system-specific identifier; a receiving device structured and arranged to receive, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on the first user-dependent access identifier and the user-independent client-communication-system-specific identifier; an accessing device structured and arranged to access, at the host, a second user-dependent access identifier; a performing device structured and arranged to perform a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; a comparing device structured and arranged to compare results of the first and second mathematical computations; and a designating device structured and arranged to designate a client communication system as unauthorized based on the results of the first and second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. 52. The apparatus of claim 51, wherein either the first or second mathematical computations comprises a hashing algorithm. 53. The apparatus of claim 51, wherein the first mathematical computation is performed when a communication is initiated. 54. The apparatus of claim 51, wherein the first and second user-dependent access identifiers comprise a subscriber password. 55. The apparatus of claim 51, wherein the first and second user-dependent access identifiers comprise a user password. 56. The apparatus of claim 51, wherein the first and second user-dependent access identifiers comprise an account password. 57. The apparatus of claim 51, wherein the user-independent client-communication-system-specific identifier comprises a device-specific identifier. 58. The apparatus of claim 57, wherein the device-specific identifier comprises a hard disk identifier. 59. The apparatus of claim 57, wherein the device-specific identifier comprises an Ethernet address. 60. The apparatus of claim 57, wherein the device-specific identifier comprises a central processing unit serial number. 61. The apparatus of claim 57, wherein the device-specific identifier comprises a description of the storage characteristics of the hard disk. 62. The apparatus of claim 51, further comprising a device structured and arranged to terminate communications from the client communication system if the result of the first mathematical computation does not correspond to result of the second mathematical computation. 63. An apparatus for handling information about an authorized client communication system, the apparatus comprising: a user-dependent access identifier device structured and arranged to store a version of a first user-dependent access identifier; a receiving device structured and arranged to receive, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on the first user-dependent access identifier and the user-independent client-communication-system-specific identifier; an accessing device structured and arranged to access, at the host, a second user-dependent access identifier; a performing device structured and arranged to perform a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; a comparing device structured and arranged to compare results of the first and second mathematical computations; and a designation device structured and arranged to designate a client communication system as unauthorized based on the comparison of the results of the first and second mathematical computations, and wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. 64. The apparatus of claim 63, wherein the performing device includes: a device for storing the result of the first mathematical computation comprises storing the result on the client communication system, a user-dependent access identifier storing device for storing the version of the first user-dependent access identifier comprises storing the result on the host communication system. 65. The apparatus of claim 63, wherein either the first or second mathematical computations comprises a hashing algorithm. 66. The apparatus of claim 63, wherein the first and second user-dependent access identifiers comprise a subscriber password. 67. The apparatus of claim 63, wherein the first and second user-dependent access identifiers comprise a user password. 68. The apparatus of claim 63, wherein the first and second user-dependent access identifiers comprise an account password. 69. The apparatus of claim 63, wherein the user-independent client-communication-system-specific identifier comprises a device-specific identifier. 70. The apparatus of claim 69, wherein the device-specific identifier comprises a hard disk identifier. 71. The apparatus of claim 69, wherein the device-specific identifier comprises an Ethernet address. 72. The apparatus of claim 69, wherein the device-specific identifier comprises a central processing unit serial number. 73. The apparatus of claim 69, wherein the device-specific identifier comprises a description of the storage characteristics of the hard disk.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.