IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0480439
(2012-05-24)
|
등록번호 |
US-8631474
(2014-01-14)
|
발명자
/ 주소 |
- Brown, Ralph William
- Medin, Jr., Milo S.
- Keller, Robert
- Temkin, David
|
출원인 / 주소 |
- At Home Bondholders' Liquidating Trust
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
8 인용 특허 :
110 |
초록
▼
A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in communication with a walled garden proxy server (WGPS). The client sends a request to the WGPS to access a service
A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in communication with a walled garden proxy server (WGPS). The client sends a request to the WGPS to access a service provided by a site in the garden. The site sends the client a message containing code calling a function in the API. The WGPS traps the message from the site and looks up the site in a table to determine the access control list (ACL) for the site. The WGPS includes the ACL in the header of the hypertext transport protocol (HTTP) message to the client. The shell receives the message and extracts the ACL. If the code lacks permission, the shell stops execution.
대표청구항
▼
1. A non-transitory computer-readable storage medium having computer-executable code stored therein for passing messages from a service provided by a server in a first walled garden of a plurality of walled gardens to a client, wherein each of the plurality of walled gardens is identified by an affi
1. A non-transitory computer-readable storage medium having computer-executable code stored therein for passing messages from a service provided by a server in a first walled garden of a plurality of walled gardens to a client, wherein each of the plurality of walled gardens is identified by an affiliation value, the computer-executable code executable to perform steps comprising: receiving a message from the service intended for the client;examining a header of the message to determine whether the header represents a potential security violation;stripping the header from the message responsive to a determination that the header represents a potential security violation;determining permissions of the service with respect to the client, wherein the permissions are determined responsive at least in part to the service, the client, and an affiliation value of the first walled garden;including the determined permissions with the message in a second header; andpassing the message and the second header to the client. 2. The computer-readable storage medium of claim 1, wherein determining permissions of the service with respect to the client comprises: determining an identity of the server providing the service;determining a user agent of the client; andretrieving the permissions of the service from a permissions table using the determined identity of the server, the determined user agent, and the affiliation value of the first walled garden. 3. The computer-readable storage medium of claim 2, wherein the permissions table specifies access rights for a plurality of servers in the first walled garden and indicates which application programming interfaces (APIs) of the client can be accessed by each of the plurality of servers. 4. The computer-readable storage medium of claim 3, wherein each of the plurality of servers listed in the permissions table is identified according to uniform resource locator (URL) prefix. 5. The computer-readable storage medium of claim 1, wherein including the determined permissions with the message comprises: adding a hypertext transport protocol (HTTP) header specifying the determined permissions to the message. 6. A proxy server for passing messages from a service provided by a server in a first walled garden of a plurality of walled gardens to a client, wherein each of the plurality of walled gardens is identified by an affiliation value, the proxy server comprising: a processor for executing computer program code;a non-transitory computer-readable storage medium having computer-executable code stored therein, the computer-executable code executable to: receive a message from the service intended for the client;examine a header of the message to determine whether the header represents a potential security violation;strip the header from the message responsive to a determination that the header represents a potential security violation;determine permissions of the service with respect to the client, wherein the permissions are determined responsive at least in part to the service, the client, and an affiliation value of the first walled garden;include the determined permissions with the message in a second header; andpass the message and the second header to the client. 7. The proxy server of claim 6, wherein determining permissions of the service with respect to the client comprises: determining an identity of the server providing the service;determining a user agent of the client; andretrieving the permissions of the service from a permissions table using the determined identity of the server, the determined user agent, and the affiliation value of the first walled garden. 8. The proxy server of claim 7, wherein the permissions table specifies access rights for a plurality of servers in the first walled garden and indicates which application programming interfaces (APIs) of the client can be accessed by each of the plurality of servers. 9. The proxy server of claim 8, wherein each of the plurality of servers listed in the permissions table is identified according to uniform resource locator (URL) prefix. 10. The proxy server of claim 6, wherein including the determined permissions with the message comprises: adding a hypertext transport protocol (HTTP) header specifying the determined permissions to the message. 11. A computer-implemented method of passing messages from a service provided by a server in a first walled garden of a plurality of walled gardens to a client, wherein each of the plurality of walled gardens is identified by an affiliation value, comprising: receiving, using one or more computers, a message from the service intended for the client;examining, using one or more computers, a header of the message to determine whether the header represents a potential security violation;stripping, using one or more computers, the header from the message responsive to a determination that the header represents a potential security violation;determining, using one or more computers, permissions of the service with respect to the client, wherein the permissions are determined responsive at least in part to the service, the client, and an affiliation value of the first walled garden;including, using one or more computers, the determined permissions with the message in a second header; andpassing, using one or more computers, the message and the second header to the client. 12. The method of claim 11, wherein determining permissions of the service with respect to the client comprises: determining an identity of the server providing the service;determining a user agent of the client; andretrieving the permissions of the service from a permissions table using the determined identity of the server, the determined user agent, and the affiliation value of the first walled garden. 13. The method of claim 12, wherein the permissions table specifies access rights for a plurality of servers in the first walled garden and indicates which application programming interfaces (APIs) of the client can be accessed by each of the plurality of servers. 14. The method of claim 13, wherein each of the plurality of servers listed in the permissions table is identified according to uniform resource locator (URL) prefix. 15. The method of claim 11, wherein including the determined permissions with the message comprises: adding a hypertext transport protocol (HTTP) header specifying the determined permissions to the message.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.