MXPA98007557A - Remote authorizer system and method - Google Patents

Remote authorizer system and method

Info

Publication number
MXPA98007557A
MXPA98007557A MXPA/A/1998/007557A MX9807557A MXPA98007557A MX PA98007557 A MXPA98007557 A MX PA98007557A MX 9807557 A MX9807557 A MX 9807557A MX PA98007557 A MXPA98007557 A MX PA98007557A
Authority
MX
Mexico
Prior art keywords
authorizer
local
protocol
request
remote
Prior art date
Application number
MXPA/A/1998/007557A
Other languages
Spanish (es)
Inventor
Reid Hovey Richard
Kramer Michael
Wang Yangwei
Original Assignee
Bell Communications Research Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bell Communications Research Inc filed Critical Bell Communications Research Inc
Publication of MXPA98007557A publication Critical patent/MXPA98007557A/en

Links

Abstract

An interconnection between a computer network or protected computers (52) and the World Wide Web (WWW) (68). The interconnection comprises a separate authorized system (56, 66) that encapsulates TCP / IP transmissions between a written transmission which does not It is subject to problems in systems with a long waiting time, which greatly improves access to the WWW, by means of a wireless modulator-demodulator or another communication system with low bandwidth of the network. The interconnection of the separate authorizer (56, 66) also provides the capabilities of compressing, encoding and filtering and allowing the entry of unsolicited transmissions from the service provider for such purposes as updating or configuring the programming elements that give access to the WWW automaticmen

Description

SYSTEM AND METHOD OF A REMOTE AUTHORIZER BACKGROUND OF THE INVENTION Related Patent Application U.S. Patent Application Serial No. 08 / 309,336, filed September 19, 1994 by David Mathew Pepe, Lisa B. Blitzer, James Joseph Brockman, William Cruz, D igth Omar Hakim, Michael Kramer, Dawn Dian Petr, Josefa Ramaroson, Gerardo Ramirez, Yang-Wei Wang, and Robert G. White, disclose the subject related to the present application and are hereby incorporated by reference.
Field of the Invention The present invention relates to an interconnection between private computers or private computer networks and the worldwide network (WWW) using both wired or wireless connections. More specifically, the REF 28260 invention relates to an improved interconnection of the global network with the translation protocol, security and automatic configuration features.
Description of the related art For fifty years, people have dreamed of a database of universal information-data that could not be accessible to people around the world, but organized so that related information is easily discovered and in order that the most relevant data for a need particular will be found quickly and accessed by a user.
In the 1960s this idea was explored further, giving rise to the visions of an "authorizer" who would revolutionize all aspects of the interaction of human information, particularly in the field of education. Only recently has technology begun to satisfy these visions, making it possible to implement these on a global scale.
The Internet has developed through strong cooperation from universities, corporations and government. Years ago the The US Department of Defense started by interconnecting the computer networks of universities, private organizations and sometimes corporations with whom it has been conducting the search. This network of networks, all the time, has been developed within a global network commonly referred to as the Internet or the World Wide Web (WWW). The official description for the WWW is an "initiative to recover hypermedia information in a large area that proposes to give universal access to a large universe of documents." While the WWW began to be more popular and was subject to broader public use, the US Department of Defense reduced its investigations. Today, many of the links established with the government on the Internet have been changed to commercial companies that maintain the interconnection of local area networks (LANs) between universities, companies, etc. Through the WWW an extremely valuable source for corporate corporates is provided (to communicate by electronic mail (e-mail), to have access to information online, etc.), corporations are concerned about the security of their properties intellectuals, registered secrets, financial records and other confidential information stored in their computer networks. There is also concern about electronic vandalism - unauthorized access to a computer network over the WWW for the purpose of destroying or distorting computerized information.
In response to these concerns, some connections to the WWW have been protected with "Network Security Protections". As shown in Fig. 1, a protection is commonly a specific piece of the set of devices and / or programming elements that have a derivative connection between a private computer or computer network (LAN) 10 and the WWW 12. The purpose The main purpose of a protection is to show the data traffic inside and outside the network you are protecting. If an intruder is detected in the network, the protection has the ability to separate through data traffic and the access of the intruder. In previous forms of protections on the Internet, it was usually difficult to determine which data traffic was good or bad, for example, that relates a built-in user or an intruder. This created a problem for built-in users (within built-in LANs) to Internet applications, such as the registry transfer protocol (FTP), because their applications could sometimes be blocked incorrectly by protection. The protection needed more intelligence about the application data that passes protection so that the desired traffic is not impeded.
Internet engineers designed "authorization" services on Internet protections to meet this need. These authorizers are computation processes that fully understand specific applications such as an FTP request. This became an uncomplicated issue for network administrators when adding multiple authorizers to the protection system based on the type of requests from the internally incorporated users they would like to execute. For example, search engines on the WWW (described below) use an authorizer for the Protocol for the transport of super text (HTTP) to transfer documents in the Language that increases the super text (HTML).
To facilitate the use of the WWW, the "search engine" programming elements were developed. 6. Search engines, such as the popular Netscape ™ and Mosaic ™ search engines, allow WWW users to search for information available on computers linked to the WWW. A related invention by the assignee, described in Patent Application No. 08 / 309,336 (hereinafter the '336 application), provides users in computer networks with a consistent means to access a variety of media in a form simplified Using search engine elements, the invention of the application '336 has changed the point of view of people and creates information - the first true hypermedia global network has been created.
One responsibility of an HTTP authorizer is to receive requests from the search engines or requests for the programming elements 6 within the protected network 10 and retransmit these requests to the WWW 12. The authorizer also monitors access to the computer or protected network 10 of the WWW 12. Thus, the authorizer 4 can allow an administrator to monitor the information system and requests that follow between the protected network 10 and the WWW 12. If illicit activity is discovered, the authorizer 4 can interrupt the connection with the WWW 12. Protection 2 managed by authorizer 4 allows corporations and companies with similar concerns to make use of valuable sources of the WWW 12 while maintaining a degree of security. the links made between the computers and the applications of the programming elements through the WWW, the protocols have been developed to govern the transmission of computerized data. A protocol organizes the data to be transmitted over the WWW in a standard medium recognizable by the receiving computer. There are seven presenters in the Open Systems Intercom (OSI) model of a computer protocol. Each presenter adds additional organizational capabilities that facilitate the transmission of data.
The Internet Protocol (IP) is the third presenter in the OSI model and the "basic" language that is spoken on the Internet. The fourth presenter, the Transmission Control Protocol (TCP), is a more specialized protocol contained in the IP. To use the WWW, a computer must be able to communicate using a protocol that incorporates IP and consecutively TPC.
The WWW and the access technology that surrounds the Internet has seen an explosive growth. Many companies have been developed to allow subscriber access to the WWW using standard telephony. A group called Internet Service Providers (ISP) represents many of these service providers.
A promising area for further expansion of Internet access is wireless networks of a wide area. Wireless networks include a small packet of cellular digital data (CDPD), provided by cellular carrier waves), cellular networks with changed circuit, such as the Mobitex ™ network (provided by Mobile RAM data in the United States of America), the Ardis ™ network and a multitude of emerging national wireless data providers.
All listed data network providers offer traditional Internet Protocol (IP) service and are capable of integrating with the WWW. Data speeds range from 4,800 to 28,8000 bps and have wait times from milliseconds to 10 seconds.
Despite the popularity of the WWW, there are still technical and security problems that must be overcome in accessing the Internet. Some of these problems are particularly serious for wireless systems trying to access the WWW.
Problem 1 The first problem is caused by the data waiting time (described in more detail below). The data wait refers to the delay time created by jumps and slow data links that travel through several nodes within the WWW. This particular problem is exacerbated when accessing the WWW using a wireless modulator-demodulator. Most of the large wireless area, and some of the lines, data networks were not originally designed to support the TCP / IP protocol. The waiting times were further increased by encapsulating the IP data within the original data protocols of the networks.
When TCP organizes data for transmission over the WWW, it separates the data into discrete "packets" of information. Each packet includes instructions to the receiving system to reassemble the packets in the complete data structure that was transmitted. Each packet also includes a cyclic redundant check that allows the receiving system to check that the packet was not corrupted or separated during transmission.
TCP is typically configured to transmit several packets and then wait for a configuration from the receiving system that has received the packets appropriately. The amount of time required to transmit a data packet and receive confirmation of its arrival is known as the "wait time" of the system.
If the TCP does not receive information that the data packet was received properly, it will assume that the packet was lost during the transmission and retransmission of the packet. If the waiting time of the system is very large, the TCP will assume, prematurely, that the packet was lost and flooded the network with the retransmissions of the same data packet before the original packet reaches its destination. This is also a problem because many service providers load users by transmitted data packet. If TCP floods the system with duplicates of unnecessary packets even in transmission, the cost to the user will increase. Thus, TCP can not properly operate on a connection with a large waiting time. If the system timeout exceeds approximately 3 to 5 seconds, the TCP will start a malfunction.
When the WWW has access by standard telephone lines that. do not support TCP, TCP written data must be encapsulated (for example, translated) in a form that can be sent over the telephone line. The written data is then downloaded and used by the receiving computer. While this work is being carried out, this increases to the waiting time of the transmission.
Another problem in accessing the WWW using a wireless modulator-demodulator is the increase in the waiting times that are introduced by the wireless network. A general trend is to widen the area served by a wireless data network, decreasing the bandwidth (in bps) of the transmission. For example, the current wireless communication systems in use in the United States of America are capable of transmitting 4,800 bits of data per second. This result in waiting times of up to as much as 10 seconds.
The technique related to access to wireless WWW exists in: 1. The Information Network Institute of Carnegie Mellon University, with the Wireless Andrew Initiative. 2. The Winlab of Rutgers University with the Dataman project. 3. The CS &E of the University of Washington with Mobisaic. 4. The Palo Alto Research Center of Xerox, with concepts of PDA and virtual office computing. d.Computers Networks & ISDN Sistems Volume 00.28, Issue 1-2 ISSN: 0169-7552, Dec '95, "PDAs as Mobile WWW Browsers", Gassler S., Kottulla A. 6. Magicap OS version of a WWW search engine with improvements for technology of the General Magic Telescript agent.
All these projects and articles require the modification of a search engine, the specification of new protocols (even based on TCP), generically define the specifications of inter-networks to connect wireless networks and low bandwidth to the Internet with access to the WWW.
Thus, there is a need for a method to transmit TCP over connections over long-delay wireless networks and cabling lines.
Problem 2 A second problem is that the current WWW access programming elements do not provide standard mechanisms for compression, encoding, or filtering. Compression involves reducing the size of data transmissions over the network without changing the content of the information. More purposes to support the understanding require external utilities of the search engines to decompress the data and when the usable output returns to the search engine through the use of the writing of the Extension of the Internet Mail Mil tipropos i tos (MIME, Nathaniel Borestein et al RFC 1521).
Coding is the coding of transmission data. Encryption helps provide security since encoded data transmissions are much more difficult for an unauthorized party to interpret and access. Unfortunately, it is unlikely that standard, generic openings for these desirable services could be created to support all customer requests on the WWW. The standards are developed for coding in the programming elements of the WWW (for example, Secret Setter Presenter (SSL)). However, at current levels of computer separation, it is unlikely that any standard opening for encoding will be able to maintain integrity for long.
Most search engine technologies, therefore, have installed their own coding projects and are only able to work between a server on the WWW that supports the coding projects. This option goes against the standard open designs of the WWW.
Filtering refers to the global control of a WWW response based on the size of the data, the type, or some other characteristic by which a user can prepare the reception of the data to his liking. The work that is being done in this area through the search engines of the WWW, hidden utilities specialized in advanced search engines, etc.
The filtering referred to here is a global safety net for unsuspecting users who could potentially misuse a low / wireless bandwidth data network by also requiring a lot of data, spurious information that is retrieved, or some other collateral effects that result of a request from the WWW. For example, a user may request a data object from the WWW that a user is not aware that is extremely large, and perhaps expensive, to transmit. As a secure network, the user can configure a filter automatically prevents a request that has been executed.
Thus, there is a need for the implementation of compression, coding and filtering features in the connection with the WWW.
Example 3 A third problem exists in that there is no standard means for programming elements accessing the WWW to receive updated asynchronous or unsolicited information from the network. There is search engine technology based on customers. The most popular search engine, such as Netscape ™ search engines, Mosaic ™, Lynix ™, as well as - also other less popular search engines, users need to initiate some form for the request before the data response is sent to the respective search engine.
For example, it is desired for a company to provide access to the WWW to be able to remotely configure a system of access to the WWW of a subscriber within the network. Since regular search engines do not offer these features, subscribers must configure and update their own access programming elements manually. This may require the support of the service provider through the traditional voice line of customer support in the user's guest system (referring to "ISG: Integrated Services Pathway", Bellcore TM-24856, for a more complete description of the problem) .
Thus, a need for an interconnection with the WWW that can receive and implement unsolicited transmissions from the network or service provider, particularly to the configuration programming elements automatically to give access to the network.
Brief Description of the Invention It is thus an object of the present invention to satisfy the needs and others described above. It is an object of the present invention to provide a method and system for interfacing with the WWW that supports TCP / IP in a medium of long waiting time, which provides compression, coding and filtering of services and accepting and implementing unsolicited messages. from the WWW or the service provider.
Further objectives, advantages and novel features of the invention will be set forth in the description that follows, and will be apparent to those skilled in the art upon reading this description or practicing with the invention. The objects and advantages of the invention can be realized and attained by the appended claims.
In order to achieve the foregoing and other objects and in accordance with the purpose of the present invention, as incorporated herein and amply described herein, the system and method of the present invention can utilize a host computer that has a search engine and a local authorizer in a first, a remote authorizer in a second place in communication with the local authorizer through a network of low bandwidth, means to initiate a question in the search engine and send the question to the local authorizer who uses a protocol presenter of the application, means to cover the protocol presenting the application of the question within the transport protocol suitable for transmission over the network with low bandwidth, means to transmit over the network with low bandwidth from the local authorizer to the remote authorizer, and means for converting the transport protocol into the protocol presenting the appropriate request for the execution of the pre gunta in the computer network.
It is also preferred that the system and the method of the present invention include means for communicating the question to a server of the network, executing the question and returning a rejection of the data in a transport protocol suitable for transmission over the network with width low band, means for transmitting the rejection of data over the network with low bandwidth from the remote authorizer to the local authorizer, means for converting the protocol of transport of the output data into a protocol of a request presenter in the authorizer local, and means to communicate the output data in the search engine using the requesting protocol.
It also relates that the system and method of the present invention includes means for creating a written question that has been prepared for compression, filtering and coding, means for encapsulating the encoded question for transmission over the network with bandwidth under the local authorizer to the remote authorizer, means to compress, filter and code the rejection of data according to the preparation of the written question, and means to place the output data in a written replica for transmission over the network with width of low band of the remote authorizer to the local authorizer.
In another aspect of the present invention, according to its objectives and purposes, the system of the present invention may also comprise a system for communicating with a computer network, comprising a host computer that has a search engine for an interconnection with the user means of the local authorizer to communicate with the searcher using a request presenter protocol, the means of the local authorizer having means to convert the request presenter protocol into a transport protocol, and remote authorizer means to communicate with the media of the local authorizer using the transport protocol. The remote authorizer means includes means for converting the transport protocol into the request presenter protocol, and means for communicating with the computer network using the request submitter protocol.
Brief Description of the Drawings The present invention will be more clearly appreciated as the disclosure of the present invention is made with reference to the accompanying drawings here: Fig. 1 is a block diagram showing the connection protection of the related art between a network of private computers and the WWW.
Fig. 2. is a block diagram showing the separate interconnection of the authorizer of the present invention.
Fig. 3 is a schematic diagram of the translation of the protocol developed by the local authorizer connection of the present invention.
Fig. 4 is a schematic diagram of the translation of the protocol developed by the remote authorizer connection of the present invention.
Fig. 5 is a flow diagram showing the implementation of the interconnection of the authorizer of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED MODALITY Reference will now be made in detail to a preferred embodiment of the invention, an example of which is illustrated in the accompanying drawings.
The creation of the WWW is a computational revolution that also offers a potential catalyst for wireless data networks to initiate direct participation in exploiting the popularity of the Internet. The present invention provides a method and a system for interconnecting a private computer or a private computer network with the WWW which provides TCP / IP support in a large delay time environment; compression, coding and filtering services; and the reception and implementation of unsolicited messages transmitted by the service provider. The present invention also allows a direct access to a Laptop or Personal Digital Assistant (PDA) to the WWW of a mobile (wireless) terminal.
For example, the interconnection with the WWW of the present invention can be implemented by modifying an authorizer, Fig. 1, item 4, to perform the required functions. The modified authorizer would begin to be a separate authorizing system (sometimes referred to as a Technology Agent, as described in the North American Application Series No. 08/309, 336) that is usually implemented in a protection, or may be a current application in the background on a single computer, even a personalized digital assistant, which can access the WWW via a wireless network or wired line.
Referring to Figure 2, the interconnection of the present invention is a modified separate authorizer. A separate authorizer comprises a local authorizer 56 and a remote authorizer 66, which are modules of programming elements that allow translation and re-storage of the requests of the WWW.
A user operating a mobile terminal 52 uses a network browser 54 which communicates with the WWW using TCP / IP. The local authorizer 56 is a packet of programming elements that runs at the bottom of the user terminal 52. Where the delay time is a problem, the local authorizer 56, according to the principles of the present invention, will translate the request / transmission data between the TCP / IP protocol used by the browser and a protocol strengthens the transport of data through the communication network to the remote authorizer.
In the illustrated embodiment of Figure 2, the user has access to the WWW through a wireless network. By. example, a wireless modulator-demodulator 58 uses an optimized low bandwidth protocol, such as the AirBoss ™ Wireless Transport Protocol, to communicate with the base station 60. Thus, the local authorizer 56 translates the optimized bandwidth protocol low to TCP / IP.
The encapsulated written request of the local authorizer (see Fig. 5- the use of the general flow finder) is transmitted through a wireless network 62 to the remote authorizer 66. The remote authorizer 66 makes the necessary translation of the protocol between the TCP / IP and the optimized protocol of low bandwidth, such as the Transport Protocol Wireless AirBoss ™ to connect the user with WWW 68.
The present invention provides several methods which standard network browsers that support authorization services can be adapted for the search of low bandwidth in the network. The present invention will be explained by describing three groups of methods, which relate to the first, second and third problems described above, respectively.
Group 1 method The first problem to overcome is the transmission of data using TCP / IP in networks that experience a long waiting time, for example, greater than approximately 3 to 5 seconds. The method and system used to solve problem 1 involves the translation of the protocol. The translation of the protocol refers to encapsulate the requests of the TCP request that has a simple request / response pair (for example, HTTP, SMTP, Gopher and WAIS) in a protocol oriented for an adequate connection that strengthens the function in the large Waiting times encountered over communication networks, particularly low bandwidth wireless networks and others, that transmit data.
The translation of the protocol is achieved by a separate authorizer. The local authorizer starts at a guest where a user also starts a standard network browser. The network browser is configured, by the user or by the local authorizer, to communicate with the local authorizer. The later configuration option is preferred because it reasonably conceals the sophisticated authorizer settings of the user's output. However, the authorizer must know which browser is being used.
Once the local authorizer and the web browser are started and configured correctly, the browser then directs all the requests of the WWW through the local authorizer. The local authorizer then takes the requests from the WWW search engine and converts them into an optimized protocol with low bandwidth appropriate for the network that is being used (for example, the Protocol Wireless AirBoss ™ transport, based on UDP / IP).
The remote authorizer is able to receive the converted encoded form of the local authorizer and complete the operation on behalf of the original request made by the search engine. Once the data is received in the remote authorizer of the converted request, the data is encoded, compressed, filtered based on the original coding, and / or encapsulated within the optimized protocol and returned to the local authorizer (these services will be described in more detail in Methods 2 &3 described later). The local authorizer receives the encapsulated response, unloading it, and returning the final response to the search engine.
Referring to Figure 3, the example of a data request on the WWW will be described. The network finder 54 outputs a request which is undertaken by the presenters of the advanced OSI protocol or the request presenter protocols 70 comprising TCP / IP. The request is transmitted to the local authorizer 56 which translates the request into an optimized protocol with low bandwidth 72, such as the AirBoss ™ Wireless Transport Protocol, which is based on UDP / IP. The encapsulated request is then subjected through the network access apparatus 58 (eg, modulator-demodulator) to the network with low bandwidth.
Referring to Figure 4, the request crosses the network with low bandwidth to reach the generic service node 74. The encapsulated request is then submitted to the remote authorizer 66 which translates the encapsulated request of the optimized protocol with low bandwidth (for example, AirBoss ™ Transport Protocol) to the application presenter protocols created by the web browser and to comply with the Internet browser's request.
With respect to the communication between the remote and local authorizers, it is important that the multiple load referred to a paradigm of the program / operate system allows the requests to appear to make several operations at the same time. During the development of the present invention, it was discovered that the separate authorizer must be able to multi-load the request / response pairs. Since the WWW search engines support the multiple load of the requests / responses of the client, the separate authorizer can do the same to facilitate without overflowing the integration in the access regime of the WWW.
Implementing the multi-load in the separate authorizer of the present invention requires a transaction system between the local and remote authorizers to match the internal writings encapsulating a request with the response brief intended for a search engine. The precise transaction system implemented between the authorizer is not important, and this will be obvious to a person skilled in the art such as a transaction system can be structured based on the discussion of the present invention. The protocol and transaction mechanism described in the Group 1 and 2 Method is based on the Personal Communications on the Internet (PCI) work system described in the '336 application.
The most sophisticated transaction system, the best system and method of the present invention begins by authorizing the end user to search the WWW in networks with low bandwidth. The following methods of the present invention are based on this discovery.
One benefit to support the multicast of request / response pairs is that multiple search engines can be supported on a host computer by a simple local authorizer.
Group 2 method As the WWW developed and the protocols that exist are stratified on top of each other to satisfy the need for data transmission by users, the network searchers are created to make use of the protocols that exist. In the current WWW access programming elements, the need for secure and compact data was largely ignored. As a result, the search engines of the TCP / IP network do not provide coding, compression and filtering for the transmission data.
The main consortium of the WWW, W3C, has considered standards to ensure the transmission of data on the WWW. However, the problem with such broad network standards is that, once they are announced, the cutters begin to work their means through the specification of the protocol to find ways to overcome the security measures.
Accordingly, it is an object of the present invention that the authoring programming elements include compression, coding and filtering tools in a patented regime that still make use of the entire opening nature of the WWW. Thus, the transaction system between the local and remote authorizers includes compression and coding algorithms, which can be a system patented by a service provider for the use of its consumers.
A filtering tool can also be implemented by the separate authorizer. Filtering, in the context of the present invention, refers to a global control in the network with low bandwidth. For example, when search engines comply with a request for information, they generally do not know how much information is to be recovered. In accordance with the principles of the present invention, the local authorizer receives instructions on the filtering configuration from the user which are then transmitted and implemented by the remote authorizer. The remote authorizer can then develop such functions as examining the response to a request: - data processing by the user and stopping a large amount of rejection data inappropriately, for example, from the immense user system.
In general, the coding and compression algorithms are best placed between the local authorizer and the remote authorizer opposite to place such capabilities in a new browser of the network. As noted, such algorithms can then be protected in a patented regime. A person skilled in the art could easily design coding and compression algorithms based on well-known principles for service providers desiring a unique group of algorithms.
On the other hand, despite their vulnerability, openness, standards widely known for such algorithms, which as has been considered by W3C, have advantages, such as, for example, internal operability. Internal operability allows authorizing producers to make remote and local authorizers work together. This also allows manufacturers of different computer platforms to link to each other's platforms.
A writing to implement compression, coding and filtering, whether it is proprietary or public, must include fields to do at least as follows: A. Coding support. For example, the algorithms for calculating MD5 to ensure the monetary transaction of the electronic data.
B. The support of multiple compression types (the choice of compression should be based on the type of data contained in the writing). For example, LZW compression algorithms can be used in textual data.
C. Support of at least negative filters or positive filters. For example, one or more of the following filtering algorithms may be used: Negative filters - A response document must not include any binary data or a response document must not be greater than this size. Positive filters - A response should include all lines of the text with "wireless" in it.
If at any point along the way between the remote and local authorizers there is a failure, particularly in the wireless medium, the system transaction between the remote and local authorizers must be able to respond appropriately. For example, if the writing can not be applied to the wireless network, or the writing fails to reach the remote authorizer, or the local authorizer is unable to give access to the Internet, the transaction system must respond appropriately.
Group 3 method The final problem arises due to the programming elements of access to the WWW, the search engine of the network, was originally designed to act as a client. Your own client programming elements are generally not able to receive asynchronous or unsolicited updated data from the network. This is a problem if a service provider would like to provide encoders with access to the programming elements and then remotely manage (from within the network) the configuration of these programming elements by the user. This feature of the present invention provides a means for large service providers to offer access to the WWW that is scalable to the needs of the consumer.
As noted, the search engines of the network currently in use are not designed to receive and implement such updated data. The service provider may instead distribute new updated programming elements. If the user is operating on a large scale, implementing an update may even require the work of a service technician to install the programming elements again, configure the programming elements again, and eliminate the problems of these. Alternatively, the consumer may have to call a consumer support line and wait for verbal instructions to confirm the installation of the update.
In accordance with the principles of the present invention, a simple and more efficient solution is provided by a service provider using the interconnection of the separate authorizer. Using the coding and security protocols designed for a service provider's system, the service provider can access the programming elements of the user's WWW access on the user's own system and immediately install configure and update these user elements. programming. This method can also incorporate messages to the user to indicate the action taken by the service provider.
The solution of the present invention is to configure the local authorizer to be able to receive asynchronous / unsolicited writings that are designed to modify an end user host system for things like updating the programming elements, configuration changes, or advertising again service. Ideally, the local authorizer should be constantly in operation in the user's clandestine system to receive and implement such communications, even if the network's search engine programming elements are not in operation.
Since the local authorizer is not part of the search engine and should always be in operation to receive these asynchronous discharges from the network, the present invention was designed to be small and modular to limit the number of system sources. This feature protects against undesirable interaction with other installed programming elements (for example, memory allocation, IP input allocation, etc.).
The preferred application Referring to Fig. 5 of the drawings, a flow diagram of the present invention will be described. The flow chart of Fig. 5 has a series of entities listed in the upper part corresponding to the main compounds of the present invention, including the network searcher 54, the local authorizer 56, the remote authorizer 66, and the external server of the WWW 68 network. The flow diagram illustrates the interaction of these components during the start-up of the process, the general search engine that uses the process, the process update service, respectively.
The network searcher 54 and the local authorizer 56 are designed to be in resident shared operation on the same host computer or user terminal 52. The remote authorizer 66 and the external network server, however, do not necessarily need to be shared residents. The remote authorizer 66 should only be able to access and communicate with the external server of the network.
The arrows in Fig. 5 represent the communication or transfer of data from one entity to another. The head of the arrow specifies the direction in which the action is directed. The lines from the top to the bottom represent the line time and the sequence with which the process steps occur.
The first flow shown in Fig. 5 is the start-up flow. This is basically how the system is activated on the host computer of the end user. It is assumed that the remote authorizer and the external server of the network are already in operation in all these flow descriptions (these systems can be maintained and initiated by a system administrator without interaction from the end user's point of view). The first action that occurs is that the user starts the local authorizer. This simply means to undertake a request that starts and is activated in the background of the system that operates a multi-log. The operating system can be, for example, the Windows ™ Version 3.1 that operates the system.
After the local authorizer has been started, the local authorizer has two responsibilities. If the type of search engine is specified on the user's host computer, the local authorizer must configure and start the search engine. Some search engines must be configured before these are undertaken, while other search engines must be undertaken first and then configured. This depends on what type of search engine is being used. The search engine can be of any type of conventional search engine that supports the services of the authorizer.
If the type of search engine is not known, the end user will have to start and configure the search engine manually for the local authorizer. In this case, the end user must know enough information about the browser of the network that he is using to be able to configure this manually for authorization services.
The second flow shown in Fig. 5 is a general searcher that uses a flow. This flow shows the steps of the process of the present invention after the browser has been started and configured. This basically means that the user points and performs the execution with the mouse button of the computer in a hyperlink or a dialog box opens and enters what is typically called a universal source locator (URL). For example, this is like the Internet community that identifies and gives access to objective data on the WWW.
The new step in the flow for the general use of the search engine is that the search undertaken by the search engine obeys the local authorizer. The local authorizer creates a search script, and sets the page where it is placed in this script that defines the type of compressions that are appropriate. The local authorizer also sets the page where it is placed in the script for the filters and the type of coding to be applied to the target data. Fixing provides security and also gives the user control over the information that will return in response to the search.
After the writing was created, it is supplied to the remote authorizer. The remote authorizer separates the searched writings and extracts the searches and loads the searches that were originally accepted by the search engine. The remote authorizer then executes the searches on a standard request of the target data of the network.
The external server of the network, after receiving the searches, returns the appropriate data associated with the searches. This is just a traditional request from the client to the server in the computer network that can use any appropriate protocol of the WWW. For example, the hyper text transfer protocol, the transport registration protocol, the simple mail transport protocol, or the post office protocol can be used.
After the target data has returned to the remote authorizer, the remote authorizer applies the compression, filtering, and encoding specified in the original search brief. These include the actions to be in operation on the objective data to put the objective data in the correct form to supply the local authorizer. Compression, filtering and coding are formulated within a written response.
After the actions have been completed and provided to the local authorizer, the local authorizer matches the response with the petition brief. Once the response document is matched with the petition brief, the appropriate and fixed search engine will be known to supply this information to the search engine. The local authorizer then separates through the response brief and extracts the internal objective data. Thus, two things are necessary that occur with the response document in the local authorizer. The response document must be matched with the request, and the local authorizer must extract the objective data and it is supplied to the appropriate place in the operating system so that the search engine can show the objective in its viewer.
The third flow shown in Fig. 5 is an updated service or a written service flow. This is a situation where a network administrator who is interested in implementing updated services will be able to configure a user's guest system remotely from within the network. The remote authorizer creates a write service. For example, if a new home HTML page is provided and configured on the remote end user system, a write service can create these instructions the local authorizer to write an HTML record within the distribution. The writing service can contain the HTML page as the target data and once the writing is completed in an appropriate form, it can be provided to the local authorizer.
The local locator has a responsibility to separate through the writing service, removing both the action and any target data group associated with this action, and completing the requested action.
Thus, to finalize the example, the local authorizer will separate completely to discover what action was requested (writing a new HTML home page), the extraction of objective data (a new HTML home page), and then write the target data for the distribution of the local registry. The arrow indicates that this sometimes appropriate shows information in the search engine. Sometimes this will not be possible, and the local authorizer will show boxes or other notifications of interconnection with the user of appropriate actions. Searchers that are able to receive updated asynchronous information can be notified at this point, and the local authorizer will initiate this action and send any appropriate interconnection control from the user to the search engine to show the user the actions that have been running on the local guest system .
The interconnection between a user and the WWW provided by the present invention provides translation of the protocol, compression, encoding, filtering and updating of automatic services resulting in an even more improved interconnection with this extremely valuable source. With respect to compression, this may be a direct saving for an end user in demanding the authorization services of the present invention in a wireless network medium. More wireless network providers have fixed charges or fixed charges for use in large quantities (for example, fixed interest for up to 1 MB of data). A direct saving can be made when data in this link is compressed. Empirical measurements show that standard HTML data can be regularly compressed to 50-60% of the original payload, which include general expenses writings. This means that a consumer can recover as much as twice the data on the WWW for the same price.
The present invention provides a means for a network administrator to directly handle a consumer guest configuration, in the past less technical support lines were available to solve the problems or requiring the consumer to learn to assemble sophisticated equipment of programming elements . Also, new deployment services were automated by the present invention.
The technology incorporated in the present invention is more suitable for use by ISPs, manufacturers of PDAs and Personal Digital Assistants, Wireless Network Providers, Wireless System Integrators and Telephony providers wish to become ISPs. The technology can also be integrated with other product lines to improve projects that have strong links with the WWW and that have mobile compounds.
It will be appreciated that the present invention is not limited to the exact construction or process steps that have been described above and illustrated with the accompanying drawings, and that various modifications and changes can be made without departing from the scope and perspective thereof. It is intended that the scope and perspective of the invention will be limited only by the appended claims.
It is noted that in relation to this date, the best method known to the applicant to carry out the aforementioned invention, is that which is clear from the present description of the invention.
Having described the invention as above, the content of the following is claimed as property.
APPENDIX A CDPD FTP Cellular Digital Data Package Registry Transfer Protocol HTML Language Hiper Text Mark HTTP Protocol. Hiper Text Transport IP Internet Protocol ISDN Integrated Services Digital Network ISG Integrated Services Connection ISP Internet Service Providers LAN Local Area Network LP Local Authorizer LZW Lev-Zempel-Welch OSI Open Systems Interconnections PCI Personal communications of work on the Internet PDA Digital Personal Assistant RP Remote Authorization SMTP Simple Protocol for the Transfer of SSL Mail Presenter of the secure connection TCP Protocol of Control of the Transmission UDP Protocol of the Grammar Data of the User URL Universal source locator WAIS Information Search of a large area WWW World Network

Claims (29)

RE IVINDICATIONS
1. A method for communication between a host computer with the request of a client in the first place and a server of the application in a second place on the means of communication, characterized in that said method comprises: placing a local authorizer in said first place; placing a remote authorizer in said second place through said means of communication; initiate a search on said client request and send said search to said local authorizer using a requesting protocol presenter; transmitting said search in said transport protocol on said means of communication of said local authorizer to said remote authorizer; and converting said transmitted transport protocol of the search into a request submitter protocol for execution of said search on said server request.
2. The method according to claim 1, characterized in that said communication means is a means of communication with a long waiting time.
3. The method according to claim 1, characterized in that said communication means is a wireless network.
4. The method according to claim 1, characterized in that it further comprises the steps of: executing said search in said request of the server and returning the objective data to said remote authorizer.
5. The method according to claim 4, characterized in that it further comprises the steps of: converting said objective data into a transport protocol; transmitting said objective data in said transport protocol on said communication means from said remote authorizer to said local authorizer; converting said transport protocol of the transmitted objective data into a request presenting protocol in said local authorizer; and communicating said objective data in said request of the client using said application presenting protocol.
6. The method according to claim 1, characterized in that it also comprises a start of the operation comprises the steps of: initiating said local authorizer on said host computer; and configure and initiate said client request using said local authorizer.
7. The method according to claim 1, characterized in that said step of converting said request submitter protocol from said other search comprises the steps of: creating a search script that has to point to the page for compression, filtering and coding; and encapsulating said search document for transmission over said means of communication from said local authorizer to said remote authorizer.
8. The method according to claim 7, characterized in that said step of converting said request presenting protocol from said other objective data comprises the steps of: compressing, filtering and coding said objective data in accordance with said placement in the pages in said brief of search; and placing said objective data in a response search for transmission over said means of communication from said remote authorizer to said local authorizer.
9. The method according to claim 8, characterized in that it further comprises the steps of: matching said response document with said search writing upon receipt of said response document in said local authorizer; provide said response letter to the client's request; download said objective data from said response document; and displaying said objective data in said first place.
10. The method according to claim 1, characterized in that it also comprises the steps of: creating a write service in said remote authorizer; transmitting said writing service from said remote authorizer to said local authorizer; separating said writing service and extracting a requested action and the objective data of said writing service; and execute a service action in said local authorizer.
11. A system for communication between a host computer with the request of a client in the first place and a server of the application in a second place through the means of communication, characterized in that said system comprises: a local authorizer in said first place; a remote authorizer in said second place in communication with said second local authorizer through said means of communication; means for initiating a search on said customer request and sending said search to said local authorizer using a requesting protocol; means for converting said transmitted request request presenter protocol into a transport protocol; means for transmitting said search in said transport protocol on said communication means from said local authorizer to said remote authorizer; and means for converting said transport protocol into a question presenting protocol for executing said search in said server application.
12. The system according to claim 10, characterized in that it also comprises means for executing said search and means for returning objective data to said remote authorizer.
13. The system according to claim 12, characterized in that it further comprises: means for converting said objective data into a transport protocol; means for transmitting said objective data on said communication means from said local authorizer to said local authorizer; means for converting said transport protocol of said target data into a request presenting protocol in said local authorizer; and means for communicating said objective data in said customer request using said application submitting protocol.
14. The system according to claim 11, characterized in that it further comprises: means for initiating said local authorizer in said client application; and means for configuring and initiating said client application using said local authorizer.
15. The system according to claim 11, characterized in that said means for converting said application presenting protocol from said other search comprises: means for creating a search script having the current page for compression, filtering and coding; and means for encapsulating said search for transmission over said means of communication from said local authorizer to said remote authorizer.
16. The system according to claim 15, characterized in that said means for converting said request presenting protocol from said other objective data comprises: means for compressing, filtering and coding said objective data according to said current page in said response brief; and means for placing said objective data in a response document for transmission over said means of communication from said remote authorizer to said local authorizer.
17. The system according to the rei indication 16, characterized in that it further comprises: means for equaling said response document with said search writing upon receipt of said response document in said local authorizer; means for supplying said response letter to said client's request; means for downloading said objective data from said response document; and means for displaying said objective data in said first place.
13. The system according to claim 1, which is launched because it also comprises: H for a service of «? T.x.1 Luid Cll said car, i x ^ du remlo; means for transmitting said service from said remote authorizer to said local authorizer; means "to separate said service from e; 3cri t. u'ra and xtr? n action soli ita a y dalos objective from said service of (!) and means to implement a service action eri. said au Lori zador local.
10. F. The system according to claim 11, characterized in that the communication path has a long waiting time.
20. The: i? I (iiaa cn conformi ad to claim 19, characterized in that said communication path comprises a wireless network.
21. A system for communication with a remote server, said system comprises: a host computer that has a client request for an interconnection with the user; a local author for communicating with said application of the c IX entity using a request submitting protocol, said means of the local operator has means to convert the protocol requesting a cn transport protocol presenter; and an a? top zador remoted pdirf the communication with said local aalorizador using a transport protocol, said remote r i-litor includes means for converting said protocol to transp? r in said protocol request presenter and said remote authorizer includes means for communicating with said remote server using said protocol present S licitud side.
22. The system according to claim 21, characterized in that said local authorizer and said remote authorizer communicate through a means of communication with a specific time.
23. The system according to the vindication tei 21, characterized because said local a torizador and said author: remote zador communicate to Lravés of the wireless network.
24. The system according to claim 21, characterized in that said sputtering is provided with at least one coding algorithm for encoding the transmissions of da. 2 5.
The method according to claim 1, characterized in that it further comprises providing said? Raters with at least one coding algorithm to encode the t c apsm.i data s. G.
The s loma according to. claim 21, characterized in that said remoter authorizes filtering the data transmissions to said host computer.
7. 1 . The method according to the claim 1, characterized in that it also comprises filtering the data of the transmission from said application of the server to said host computer with said remote processor.
20. The system according to claim 1, characterized in that said authorities compress the transmissions of the data between said application of the server and said computer.
29. The method according to the rei indication 1, termed face because it also comprises the steps of compressing the data transmissions between said request of the server and said host computer with said authorizers. SUMMARY OF THE INVENTION An interconnection between. a network of computers or protected computers (52) and the World Wide Web (WWW) (68). The interconnection comprises a separate authorizing system (56, 66) that encapsulates TCP / IP transmissions between a written transmission which is not subject to problems in systems with a long waiting time, thereby greatly improving access to the WWW , by means of a wireless modulator-demodulator or other communication system with low bandwidth of the network. The interconnection of the separate authorizer (56, 66) also provides the capabilities to compress, encode and filter and allow the entry of unsolicited transmissions from the service provider for such purposes as updating or configuring the programming elements that give access to the WWW automatically.
MXPA/A/1998/007557A 1996-03-22 1998-09-17 Remote authorizer system and method MXPA98007557A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08614612 1996-03-22

Publications (1)

Publication Number Publication Date
MXPA98007557A true MXPA98007557A (en) 1999-04-06

Family

ID=

Similar Documents

Publication Publication Date Title
US5673322A (en) System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US10491575B2 (en) Secure dynamic communication network and protocol
CN101567889B (en) System and method for providing protection for networks
JP4170317B2 (en) Method for receiving transcoded information data and receiver
CA2598227C (en) Mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server
WO2002019133A1 (en) Reduction of meta data in a network
CN107016074B (en) Webpage loading method and device
US20030046374A1 (en) Bidirectional remote communication VIA browser plug-in
Steinberg et al. A web middleware architecture for dynamic customization of content for wireless clients
MXPA98007557A (en) Remote authorizer system and method
EP3151519B1 (en) An intelligent system of unified content posting
JP2003198561A5 (en)
Andersson et al. Very Low Bandwidth (Marine) Web Surfing A Fault-Tolerant Content Streaming Web Browsing Solution
Hougland et al. Essential WAP for Web professionals
JP2002359646A (en) Transmission reception system for electronic mail
US7257838B2 (en) Information processing system and information processing method capable of communicating with impermissible protocol
Matsui et al. Development of Communication Software for Mobile Computing
WO2023223106A1 (en) Method and system to transmit electronic messages securely over networks
Cook Standards and Protocols in Data Communications
Form et al. dret’s XML and Web Service Glossary
Shah Wireless Access Protocol set to take over—WAP addresses the shortcomings of other protocols
JP2002247648A (en) Video system for personal communication equipment