The present invention comprises a method of and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties and minimizes the possibility of improper disseminatio
The present invention comprises a method of and apparatus for simplifying the process of access to a network for a roaming computer user, divides the responsibility of servicing a given user wanting to access the network between multiple parties and minimizes the possibility of improper dissemination of email header data as well as improper use of network resources (including server systems) by non-clients.
대표청구항▼
1. A method for accessing a digital network using a network access device, the method comprising: sending, using a first network service provider entity to access the network, a message through the network to an access service provider entity;in response to sending the message, receiving from the ac
1. A method for accessing a digital network using a network access device, the method comprising: sending, using a first network service provider entity to access the network, a message through the network to an access service provider entity;in response to sending the message, receiving from the access service provider entity through the network at least one credential provided by the access service provider, wherein the at least one credential access information of a second network service provider not in contact with the network access device;in response to receiving the at least one credential, and without further contacting the first network service provider entity, contacting, by the network access device, the second network service provider entity in accordance with the credential received from the access service provider entity while using the first network service provider entity: andin response to contacting the second network service provider entity, receiving a temporarily assigned network address from the second network service provider entity. 2. The method of claim 1, wherein the message comprises a geographic indicator associated with the network access device. 3. The method of claim 1, wherein the at least one credential includes network access information for accessing multiple Internet service providers (ISPs). 4. The method of claim 1, wherein the temporarily assigned network address is an internet protocol (IP) address. 5. The method of claim 1, wherein the access service provider entity authenticates the network access device using a password or user identification in the message. 6. The method of claim 1, wherein the network access device and the first network service provider entity are communicatively connected through a point-to-point network connection. 7. The method of claim 1, wherein the login credentials include access information includes at least a PAP identifier and a PAP password. 8. A method for accessing a digital network using a network access device comprising: transmitting access information to a first service entity;establishing a network connection with the first service entity after transmitting the access information to the first service entity;receiving a network address of an access service provider not in contact with the network access device, wherein the network address is provided through the network connection by the first service entity;severing the network connection with the first service entity;instantiating the network connection to the access service provider and transmitting a data message to the access service provider located at the network address provided by the first service entity, the data message including at least one credential associated with a computing device;receiving, at the computing device, network access information from the access service provider for communicatively connecting to a network access provider;storing the network access information;severing the network connection after receipt of the network access information: and using the network access information to establish a second network connection with the network access provider. 9. The method of claim 8, wherein the access information comprises a second network address for the first service entity. 10. The method of claim 8, wherein the network address comprises a uniform resource locator (URL) related to a web domain of the access service provider. 11. The method of claim 8, wherein the network access information comprises a geographic identifier identifying a location of the computing device. 12. The method of claim 8, wherein the network access information comprises a public or private key. 13. The method of claim 8, wherein the network access information comprises gateway address information. 14. The method of claim 8, wherein the network connection between the service entity and the computing device is a point-to-point connection. 15. The method of claim 8, wherein the login credentials include access information includes at least a PAP identifier and a PAP password. 16. A computing device, comprising: memory embodied with computer-executable instructions executable for allowing a network access device to establish a data network connection; anda processor executing the computer-executable instructions for: receiving a network address for a first service provider,using the network address to establish a connection with the first service provider,receiving access information from the first service provider wherein the access information is provided by the first service provider and is for an access service provider,using access information to contact the access service provider;retrieving second access information from the access service provider for a second service provider not in contact with the computing device, andusing the second access information to establish a data connection with the second service provider. 17. The computing device of claim 16, wherein the connection with the first service provider is a point-to-point network connection. 18. The computing device of claim 16, wherein the processor is configured to further perform: maintaining the connection with the first service provider while establishing the data connection with the second service provider; andsevering the connection with the first service provider after establishing the data connection with the second service provider. 19. The method of claim 16, wherein the login credentials include second access information includes at least a PAP identifier and a PAP password.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (269)
Walker Jay ; Schneier Bruce, 900 number billing and collection system and method for on-line computer services.
Murthy V. Devarakonda ; Daniel Manuel Dias ; German Sergio Goldszmidt ; Guerney Douglass Holloway Hunt ; Arun Kwangil Iyengar ; Richard Pervin King ; Rajat Mukherjee, Affinity-based router and routing method.
Rosenow Peter D. (Edmonds WA) Trafton Roger M. (Kirkland WA), Apparatus and method for controlling access to and interconnection of computer system resources.
Silverstein Alan ; Golson William G. ; Mallal Munir, Apparatus for parallel client/server communication having data structures which stored values indicative of connection.
Stupek ; Jr. Richard A. (Houston TX) Shaffer David S. (Cypress TX) Jones Curtis R. (Cypress TX) Davis Steve (Houston TX) Justice ; Jr. William D. (Houston TX), Automatic computer upgrading.
Burner Michael G. ; Gilliat Bruce C. ; Jaquith Eric W. ; Marvit David L. ; Kahle Brewster ; O'Driscoll Niall ; Smith Z E. ; Tanenbaum Ronna C., Automatically generate and displaying metadata as supplemental information concurrently with the web page, there being no link between web page and metadata.
Perlman Stephen G. ; Bucher Tim, Automatically selecting and downloading device drivers from a server system to a client system that includes one or more devices.
Bubien ; Jr. Walter J. (Prescott AZ) Learish Donald B. (Roselle Park NJ), Best rate telecommunication access code and data transceiver/facilitator (BRTF).
Harwood Jonathan P. ; Kimmeth Thomas ; Nusbaum Kurt, Bifurcated transaction system in which nonsensitive information is exchanged using a public network connection and sensitive information is exchanged after automatically configuring a private network.
Bonnaure Patrick P. ; Ziola Tom J. ; Herman William C., Client connects to an internet access provider using algorithm downloaded from a central server based upon client's des.
Hickman Paul L. (27140 Moody Rd. Los Altos Hills CA 94022) Stephens Lawrence K. (1250 Mildred Ave. San Jose CA 95125), Communication configurator and method for implementing same.
Blumer Thomas P. ; Stefanik Theodore, Computer system and computer-implemented method for interpreting hypertext links in a document when including the docu.
Blumer Thomas P. ; Amstein Peter R. ; Drellishak Scott F. ; Forgaard Randy J. ; Schulert Andrew J., Computer system and computer-implemented process for remote editing of computer files.
Malamud Mark A. ; Marceau Renee ; Grauman Joyce A. ; Levien Royce A. ; Oran Daniel P. ; Bolnick David A. ; Barnes ; Jr. David A. ; Johnson Russell Scott, Continuously accessible computer system interface.
Willner Barry E. ; Block Marc A. ; Brady Stephen ; Foulger Davis ; Ganek Alan G. ; Harrison Colin G. ; Marks Barry ; Newman Thomas E. ; Soora Gopalaswamy ; Stern Edith H. ; Tantawi Asser N., Cross service common user image association.
Michael E. See ; John W. Bailey ; Charles L. Panza ; Yuri Pikover ; Geoffrey C. Stone, Deterministic user authentication service for communication network.
See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
Doyle, Michael; Martin, David; Ang, Cheong, Distributed hypermedia method and system for automatically invoking external application providing interaction and display of embedded objects within a hypermedia document.
Doyle Michael D. ; Martin David C. ; Ang Cheong S., Distributed hypermedia method for automatically invoking external application providing interaction and display of embe.
Shaw David E. ; Ardai Charles E. ; Marsh Brian D. ; Moraes Mark A. ; Rudolph Dana B. ; Mc Auliffe Jon D., Electronic mail system for displaying advertisement at local computer received from remote system while the local compu.
Clanton ; III Charles H. (San Francisco CA) Young Emilie (Boulder CO) Palrang Joseph M. (Sunnyvale CA) Janssens Marcel D. (Sunnyvale CA), Graphical user interface for interactive television with an animated agent.
Carlin Richard K. ; Frantz ; II Joseph F., Interactive system for remoting creating, editing and administrating an online communcation system for a plurality of on.
Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
Cagle John M. ; Potter Mark R. ; Mullapudi Mohana Rao ; Simpson Mark ; Neubauer Wolfgang M.,DEX, Method and apparatus for configuring communications settings in a computer system.
Thomas C. Douglass, Method and apparatus for customization of information content provided to a requestor over a network using demographic information yet the user remains anonymous to the server.
Brown Daniel P. (Elmhurst IL) Finkelstein Louis D. (Wheeling IL) Smolinske Jeffrey C. (Hoffman Estates IL), Method and apparatus for efficient real-time authentication and encryption in a communication system.
Brown Daniel Peter (Elmhurst IL) Finkelstein Louis David (Wheeling IL) Smolinske Jeffrey Charles (Hoffman Estates IL), Method and apparatus for efficient real-time authentication and encryption in a communication system.
Morten Richard M. (Gaithersburg MD) Smith Ted P. (Frederick MD), Method and apparatus for linking an SNA host to a remote SNA host over a packet switched communications network.
Agre Daniel H. ; Spartz Michael K. ; Quick Roy F., Method and apparatus for performing position-and preference-based service selection in a mobile telephone system.
White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
Lu Gin-Pao ; Jordan Hank ; Chu Paul, Method and apparatus for re-assigning network addresses to network servers by re-configuring a client host connected thereto.
Borman Gilbert ; Bhatnagar Rajat ; Sebastian Arul ; Mathur Anup ; Wadhwa Vinay,INX ; Kumar Mukesh,INX ; Kumar Singh C. Vinay,INX, Method and apparatus for retrieving data from a network using linked location identifiers.
Borman Gilbert ; Bhatnagar Rajat ; Sebastian Arul ; Mathur Anup ; Wadhwa Vinay,INX ; Kumar Mukesh ; Singh C. Vinay Kumar,INX, Method and apparatus for retrieving data from a network using location identifiers.
Cole Bruce A. ; Forster James Ronald, Method and apparatus for serverless internet protocol address discovery using source address of broadcast or unicast pac.
Kirouac Donald L. (Thornhill CAX) Porrett William A. (Unionville CAX) Czerwinski Marek J. (Scarborough CAX), Method and apparatus for updating software at remote locations.
Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
Dare Timothy S. (Damascus MD) Ek Eric B. (New Market MD) Luckenbaugh Gary L. (Gaithersburg MD), Method and system for authenticating users to multiple computer servers via a single sign-on.
Reisman, Richard R., Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user station.
Tuniman David Charles (Redmond WA) Anantharaman Vinod (Redmond WA) Jansson Michael Halvar (Bellevue WA), Method and system for stacking toolbars in a computer display.
Goldman Phillip Y. ; Leak Bruce A. ; Matheny John, Method for automatically regenerating information at a client system in the event of power or communication disruption b.
Seitz Gregory W. (San Jose CA) Findley Sean J. (Gilroy CA) Beisel Philipp W. (Sunnyvale CA), Method for connecting a mobile computer to a computer network by using an address server.
Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method for downloading a web page to a client for efficient display on a television screen.
Sadovsky Vladimir (Kirkland WA), Method for providing access to independent network resources by establishing connection using an application programming.
Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method for reducing delivery latency of an image or other secondary information associated with a file.
Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method of transcoding documents in a network environment using a proxy server.
Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method of using electronic tickets containing privileges for improved security.
Mighdoll, Lee S.; Leak, Bruce A.; Perlman, Stephen G.; Goldman, Phillip Y., Method of using electronic tickets containing privileges for improved security.
House Daniel Edward ; Owings Brian Joseph ; Pei Shiau-Shiau, Method, apparatus, and program storage device for sharing objects with a network server and a database server using a co.
Schiebe Lowell H. (Brooklyn Center MN) Russo Bruce E. (Minneapolis MN) Urness Edward V. (Shoreview MN) Hohn William C. (St. Paul MN), Network access device.
Grimm Stephen M. ; Rothschild Jeffrey J. ; Samuel Daniel J. ; Wolf Michael A., Network match maker matching requesters based on communication attribute between the requesters.
Grimm Stephen M. ; Rothschild Jeffrey J. ; Samuel Daniel J. ; Wolf Michael A., Object-oriented method for matching clients together with servers according to attributes included in join request.
Oran Daniel P. (Cambridge MA) Serrador Teresa A. (Kirkland WA) Belfiore Joseph D. (Redmond WA) Pitt ; III George H. (Redmond WA), Operating system provided notification area for displaying visual notifications from application programs.
White Patrick E. ; Farris Robert D., Overload protection for on-demand access to the internet that redirects calls from overloaded internet service provider.
Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password in a particular remote server.
Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server.
Sokal Wayne G.,CAX ; Carthy Kevin R.,CAX, Public accessible terminal capable of opening an account for allowing access to the internet and E-mail by generating I.
Filepp Robert (Springfield NJ) Gordon Michael L. (Dobbs Ferry NY) Bidwell Alexander W. (New York NY) Young Francis C. (Pearl River NY) Wolf Allan M. (Ridgefield CT) Meo Sam (New York NY) Tiemann Duan, Reception system for an interactive computer network and method of operation.
Rodwin Andrew S. ; Wenocur Jonathan H. ; Feinstein Michael G., Remote access apparatus and method which allow dynamic internet protocol (IP) address management.
Hrastar, Scott E.; Smith, George Horkan, Router for which a logical network address which is not unique to the router is the gateway address in default routing table entries.
Tso Michael Man-Hak ; Jing Jin ; Knauerhase Robert Conrad ; Romrell David Alfred ; Gillespie Daniel Joshua ; Bakshi Bikram Singh ; Sathyanarayan Seshardi, Scaling proxy server sending to the client a graphical user interface for establishing object encoding preferences after receiving the client's request for the object.
Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Supporting authentication across multiple network access servers.
Sabina Nawaz ; Steven Alfred Isaac ; Jay Franklin McLain ; Michael H. Tuchen ; Eric George Jakstadt, System and method for displaying data items in a ticker display pane on a client computer.
Wolf Richard J. ; Koppolu Srinivasa R. ; Raman Suryanarayanan ; Rayson Steven J., System and method for in-place editing of an electronic mail message using a separate program.
Holmes Keith (Dublin IEX) Cunningham Connel G. (Dublin IEX) Gleeson Fiona (Dublin IEX), System and method for installing software and updating configuration files.
Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
Kavalam Jude Jacob ; Sandeno Shawna Rae ; Bogdan Jeffrey L. ; Brown Christopher R. ; Blume Arthur E., System and method for resizing and rearranging a composite toolbar by direct manipulation.
Lavey ; Jr. Anthony M. ; Loftin Rex Lavon ; Murray Sean T. ; Pisello John M., System and method for transparently registering and updating information over the internet.
Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, System and method of accessing a network by way of different service providers.
Reisman Richard R. (20 E. 9th St. #14K New York NY 10003), System for automatic unattended electronic information transport between a server and a client by a vendor provided tran.
Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
Janis Frederick L. (Keller TX), System for providing user access control within a distributed data processing system having multiple resource managers.
Gell Michael Anthony,GB2 ; Manning Michael Robert Wistow,GB2 ; Martin Jose-Luis Fernandez-Villacanas,GB2, System for selective communication connection based on transaction pricing signals.
Raynak Randy W. (Columbus OH) Kushnir Viktor (Columbus OH), System for transferring network connections from first to second program where the first enters an inactive state and re.
Reisman Richard R., System for transporting information objects between a user station and multiple remote sources based upon user modifiable object manifest stored in the user station.
Brewer Jason M. ; Linn John C. ; Perrin Keith L. ; Tonsing Robert E., System with program for automating protocol assignments when newly connected to varing computer network configurations.
Heath Clifford,AUX ; Port Graeme,AUX ; Klos Steven ; Greenhill Graeme, Systems and methods for automatic application version upgrading and maintenance.
Bruno Richard F. (Morristown NJ) Markowitz Robert E. (Glen Rock NJ), Systems, methods and articles of manufacture for performing distributed telecommunications.
Perlman Stephen G. ; Yundt William H. ; Schneck Stuart, Transmitting high bandwidth network content on a low bandwidth communications channel during off peak hours.
Kralowetz Joseph D. (Germantown MD) Ortega Douglas F. (Laytonsville MD), Transparent support of protocol and data compression features for data communication.
Ensor Myra L. ; Kowalski Thaddeus Julius ; Primatic Agesino, User-transparent security method and apparatus for authenticating user terminal access to a network.
White Christopher M. ; Goldman Phillip Y. ; Anderson David R. ; Ohlfs Keith R. ; Leak Bruce A., Web browser allowing navigation between hypertext objects using remote control.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.