US20020107856A1 - System and method for identifying users in a distributed network - Google Patents

System and method for identifying users in a distributed network Download PDF

Info

Publication number
US20020107856A1
US20020107856A1 US10104726 US10472602A US2002107856A1 US 20020107856 A1 US20020107856 A1 US 20020107856A1 US 10104726 US10104726 US 10104726 US 10472602 A US10472602 A US 10472602A US 2002107856 A1 US2002107856 A1 US 2002107856A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
computer
processor
method
embedded
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10104726
Inventor
Robert Scheussler
David Sperling
Original Assignee
Scheussler Robert W.
Sperling David P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Abstract

A communications network includes several computers connected to a communications medium. In one embodiment, a client computer has a unique identification number that is embedded within a processor. The client computer includes a client module which generates a message that includes the identification number and sends the message over the communications medium. Another computer receives the message and retrieves the identification number from the message. In addition, the computer processes the identification number and updates an identification database. The processing of the identification number and the updating of the identification database is triggered when the message is received.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0001]
  • The invention generally relates to computer networks More particularly, the invention relates to a system and method for identifying users in a distributed network. [0002]
  • 2. Background [0003]
  • An example of a basic computer network includes two computers that are interconnected. A more sophisticated computer network includes a multiplicity of computers that form a distributed computer network such as the Internet. [0004]
  • The Internet is a global network of computers. The structure of the Internet is a network backbone with networks branching from the backbone. These branches, in turn, have networks branching from them, and so on. Routers move information packets from network to network, until the information packets reach their destination. For a more detailed description of the structure and operation of the Internet, please refer to “The Internet Complete Reference,” by Harley Hahn and Rick Stout, published by McGraw-Hill, 1994. [0005]
  • One popular part of the Internet is the World Wide Web. The World Wide Web contains computers that display graphical and textual information. Computers that provide information on the World Wide Web are typically called “websites.” A website is defined by an Internet address that has an associated electronic page, often called a “home page.” Generally, a home page is an electronic document that organizes the presentation of text, graphical images, audio and video into a desired display These websites are operated by a wide variety of entities that are typically called “content providers.” A user may access the Internet using a home personal computer (PC) equipped with a conventional modem. Special interface software is installed within the PC so that when the user wishes to access the Internet, an attached modem is automatically instructed to dial the telephone number associated with the local Internet host server. The user can then access information at any address accessible over the Internet. Two well-known software interfaces, for example, are the Netscape Navigator developed by Netscape, Inc. and the Microsoft Internet Explorer developed by Microsoft Corporation. [0006]
  • Information exchanged over the Internet is typically encoded in HyperText Mark-up Language (HTML) format. The HTML format is a scripting language that is used to generate the home pages for different content providers. In this setting, a content provider is an individual or company that places information (content) on the Internet so that it can be accessed by others. As is well known in the art, the HTML format is a set of conventions for marking different portions of a document so that each portion appears in a distinctive format. For example, the HTML format identifies or “tags” portions of a document to identify different categories of text (e.g., the title, header, body text, etc.). When a web browser accesses an HTML document, the web browser reads the embedded tags in the document so it appears formatted in the specified manner. [0007]
  • The structure of the Internet as such and the easy access to it are reasons why the Internet is considered to be an “untrusted” network. In view of the amount of transactions that occur over the Internet, secured transactions are of great importance. In addition, the parties involved in a transaction should be able to rely on the identity of the other party with whom personal and confidential data is exchanged. [0008]
  • Common methods of securing transactions and authentizising/identifying users occur via passwords and/or account numbers. This authentication information is in most cases coupled with personal user data such as credit card number, billing address, phone number, etc. While transmitted over the Internet, this information is exposed to a large number of users who may fraudulently intercept the information. [0009]
  • In addition to these security concerns, a further concern is that users can camouflage their real identity, for example, by regularly changing the screen name and/or their return address in an electronic mail message (email). [0010]
  • SUMMARY OF THE INVENTION
  • The present invention provides a system and a method of identifying computer users. In one embodiment, a communications network includes several computers connected to a communications medium. A client computer includes an identification module that provides a unique identification number. In the following description, a module includes, but is not limited to, software or hardware components that perform certain tasks. Thus, a module may include object-oriented software components, class components, methods, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, data structures, tables, arrays, variables, etc. For example, the identification number can be implemented in the computer's central processor or in read only memory, a smart card, etc. In one embodiment, the identification number is embedded within with a processor. [0011]
  • The client computer includes a client module that generates a message that includes the identification number and sends the message over the communications medium. Another computer receives the message and retrieves the identification number from the message. The computer also updates an identification database. The processing of the identification number and the updating of the identification database is triggered when the message is received. [0012]
  • An aspect of the invention involves a method of maintaining a user identification database that indicates when users are in communication with a network. The method includes the acts of associating in a computer accessible storage medium, electronic mail addresses, processor-embedded identifiers and status information. A first electronic message is received from a first computer. The first electronic message contains an electronic mail address and a copy of the processor-embedded identifier existing in the first computer. The first electronic mail address is used to access the corresponding processor-embedded identifier stored in the storage medium. The processor-embedded identifier from the first computer is compared with the processor-embedded identifiers of the storage medium. The status information in the storage medium is modified to indicate that the first electronic mail address is authentic when the processor-embedded identifier from the first computer matches a processor-embedded identifier of storage medium. [0013]
  • Another aspect of the invention involves a method of establishing a conferencing connection. A first processor-specific identifier embedded within a first computer is received by a second computer a when the first computer is in communication with a communications medium. A second processor-specific identifier embedded within the second computer is received by the first computer when the second computer is in communication with the communications medium. The first computer provides an indication that the second computer is in communication with the communications medium in responds to a request from the first computer to initiate a conferencing connection with the second computer. [0014]
  • A further aspect of the invention involves a method of identifying computer users by using processor-specific identifiers. The method includes the acts of receiving a first processor-specific identifier that is embedded within a computer processor, accessing a database that associates processor-specific identifiers with information about users of computer processors; and obtaining the information of a computer processor user that corresponds to the first processor-specific identifier. [0015]
  • Another aspect of the invention involves a method of identifying users by using manufacturer-embedded identifiers. The method includes the acts of associating a database of manufacturer-embedded identifiers with information about users, wherein each manufacturer-embedded identifier is associated with information about a user; and using the manufacturer-embedded identifier to access the user information that corresponds to the manufacturer-embedded identifier. [0016]
  • A still further aspect of the invention involves a method of monitoring when a processor accesses a communications medium by using a processor-specific identifiers that is embedded within the processor. The method includes the acts of receiving from a first processor a processor-specific identifier embedded therein when the first processor is in communication with a communications medium; and updating a database to indicate that the first processor is in communication with the communications medium. [0017]
  • A further aspect of the invention involves a computer system including first and second computers. The first computer is connectable to a communications medium and comprises an identification module that provides a computer-specific identification number. The first computer encloses the identification number to a message for sending over the communications medium. The second computer is connectable to the communications medium to receive the message and to retrieve the identification number from the message. The second computer comprises a database configured to process the identification number of the first computer to identify the first computer. [0018]
  • A further aspect of the invention involves a communications network that includes first and second computers and a server computer. The first computer is connectable to a communications medium and comprises a first identification module that provides a first identification number. The first computer generates a first message including the first identification number for sending over the communications medium. The second computer is connectable to the communications medium. The computer server is connectable to the communications medium and comprises an identification database. The computer server receives the first message and retrieves the first identification number from the first message. The computer server further processes the first identification and to update the identification database. [0019]
  • An additional aspect of the invention involves a computer that includes a communications module configured to receive and send electronic messages; and a database. The database stores electronic message addresses and corresponding processor-specific identifiers. The database is configured to be updated through a first electronic message containing a first electronic message address and a first processor-specific identifier. [0020]
  • For purposes of summarizing the invention, certain aspects, advantages and novel features of the invention have been described herein. Of course, it is to be understood that not necessarily all such advantages may be achieved in accordance with any particular embodiment of the invention. Thus, the invention may be embodied or carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other advantages as may be taught or suggested herein.[0021]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other features and advantages of the invention become more apparent upon reading the following detailed description and upon reference to the accompanying drawings: [0022]
  • FIG. 1 shows a block diagram of one embodiment of a computer network. [0023]
  • FIG. 2 shows a block diagram of a further embodiment of a computer network. [0024]
  • FIG. 3 shows an embodiment of a database structure. [0025]
  • FIG. 4 shows a flow chart of a registration procedure. [0026]
  • FIG. 5 shows a block diagram of a multiple user computer network. [0027]
  • FIG. 6 shows a flow chart of a look-up procedure. [0028]
  • FIG. 7 shows a block diagram of further embodiment of a computer network.[0029]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • FIG. 1 shows a block diagram of one embodiment of a computer network. The computer network includes two computers [0030] 2, 4 that communicate with each other by use of a communications medium 6. In one embodiment, each computer 2, 4 is in the domain of a different user. The communications medium 6 can be, for example, an individual coaxial cable or an individual telephone line, however, a wide range of communications media can be used. For instance, the communications medium 6 can be part of a telephone network, a cable television network, a wireless data transmission system, a customized computer network, and the like typically used in the field of data communications.
  • Both computers [0031] 2, 4 can be conventional computers each running an appropriate operating system such as, but not limited to, Microsoft Windows 3.1, Microsoft Windows 95 or Windows 98, Microsoft Windows NT, the Apple MacOS, UNIX, LINUX, or the like. As is conventional, the computers 2, 4 have appropriate hardware such as microprocessors, memory devices and communications devices. The microprocessors are in one embodiment Pentium III processors available from Intel Corporation. The communications devices are typically modems or network interface devices that handle incoming and outgoing message traffic passed over the communication medium 6.
  • The computer [0032] 2 includes an identification module 8 that provides a unique identification number or serial number for the microprocessor. In one embodiment, the identification module 8 is implemented within the microprocessor. The identification number, hereinafter referred to as the ID number, is permanently stored within the microprocessor and, thus, secured against unauthorized manipulation.
  • In another embodiment, the identification module [0033] 8 can be embedded in a separate hardware or software component. The components are closely associated with the microprocessor within the computer 2 so that the microprocessor can read the ID number from the components. For instance, the component can be implemented on an add-on board that the user can plug into the computer 2 to up-grade the computer 2. Generally, however, the component can be implemented with a hard disk, a ROM, a non-volatile memory, a smart card, a diskette, a compact disk, and an electrically erasable programmable ROM (EEPROM). The smart card stores an ID number that is unique for a specific user. The user can then use different computers and always have the same ID number.
  • As described below in greater detail, the computer [0034] 4 includes a database 7 that is stored in a computer accessible storage medium. The database 7 stores the ID number of the computer 2. The ID number can be input through the user of the computer 4, or through a registration procedure when the computer 2 communicates with the computer 4. For example, a computer manufacturer can input the ID numbers of all sold computers 2 into the database 7, for example, for purposes of future customer service. In the embodiments described hereinafter, however, the database stores and registers the computer 2 connected to the computer 4 through the registration procedure.
  • Although the computer [0035] 4 is connected to the computer 2, it is contemplated that the database 4 is configured to register any computer that communicates with the computer 4 and includes an identification module 8. As soon as the computer 2, or any additional computer, is registered, the computer 4 can identify and authorize the computer 2 during subsequent communications.
  • Further, the computer [0036] 2 can include an optional encoding module 10. The encoding module 10 can encrypt, encode, hash or scramble the ID number so that the ID number cannot be directly accessed. Furthermore, the same ID number can be encoded, hashed or scrambled in different manners with different client modules.
  • Besides the hardware components illustrated in FIG. 1, it is contemplated that each computer [0037] 2, 4 has appropriate application and communications software modules. The software modules include, for example, Internet access software, cable modem software, two-way communications software, point-to-point software, the hasher software, software to retrieve and process the ID number from the identification module 8, and the like.
  • The communications modules, for example, allows communications between the computers [0038] 2, 4 in accordance with preferable standardized communications protocols. In one typical application, the communications protocols support the exchange of emails. These communications protocols include a Transmission Control Protocol/Internet Protocol (TCP/IP), a Simple Mail Transfer Protocol (SMTP), a File Transfer protocol (FTP), a Hypertext Transfer Protocol (HTTP) and a Lightweight Directory Access Protocol (LDAP).
  • The TCP/IP is a protocol that specifies how computers exchange data over the Internet. The TCP!IP handles tasks such as packetization, packet addressing, handshaking and error correction. The SMTP is used to transfer email between computers. Generally, the SMTP is a server-to-server protocol, so other protocols are used to access the messages. The SMTP dialog usually happens in the background under the control of a message transport system. The FTP is a client-server protocol that allows a user on one computer to transfer files to and from another computer over a TCP/IP network. The HTTP is a client-server TCP/IP protocol used on the World-Wide Web for the exchange of HTML documents. The LDAP is a relatively simple protocol for updating and searching directories running over TCP/IP, as described below in greater detail. [0039]
  • In addition, the communications modules can support H.323, the standard for conferencing over the Internet and within intranets, H.245, the control standard for multimedia communications as well as a wide variety of communication standards such as H.261, H.263 and the like. Furthermore, the communication modules can support a wide range of networking standards such as Ethernet, frame relay, integrated digital services network (ISDN), ISDN digital subscriber network, T1 carrier system, E1, E2, E3, E4 and E5 carriers, digital subscriber lines, cable networking protocols, fiber-distributed-data interface, synchronous digital hierarchy, and the like. [0040]
  • Computers can communicate with each other, for example, over the Internet, because each computer can be addressed individually. In such embodiments, certain computers have an assigned Internet protocol address (IP address). The IP address is a 32-bit host address that is usually represented in dotted decimal notation, for example, 128.121.4.5. The decimal IP address is in most cases not known to the user. In addition, most users are not aware that this IP address exists. In addition, in many embodiments, a computer user has an assigned email address that specifies the source or destination of the message. The email address is typically in the form of “name@xyz.com”, for example, as known in the art. [0041]
  • In accordance with one embodiment of the present invention, the ID number serves to address, identify and authorize computers. As mentioned above, the ID number is unique to a computer and cannot be altered. This provides a higher degree of reliability and security, because the IP address and the email address can be altered. For instance, some users alter the email address or the address field to camouflage the return address and, thus, their real identity. [0042]
  • Returning to the embodiment illustrated in FIG. 1. The user of the computer [0043] 2 writes an email to be sent to the user of the computer 4. When the email is composed and the user initiates transmission to the computer 4 over the communications medium 6, the communications software (e.g., SMTP) automatically converts the email into an appropriate electronic data format. Besides the actual email message, the return email address and the return IP address, the data format includes, in accordance with the present invention, the microprocessor-specific ID number.
  • The computer [0044] 4 receives the electronic representation of the email and converts it back to a user-readable message. During the process of converting, the computer 4 extracts the received ID number and compares (looks-up) it with the ID number(s) stored in the data base 7. When the received ID number matches one of the stored ID numbers, the computer 4 accepts the email as one received from an authorized computer.
  • The look-up of the ID number is generally triggered by an event. That is, when the computer [0045] 4 receives the email message, the look-up procedure starts. It is contemplated that the user of the computer 4 can define the specifics of the event-triggered look-up. For instance, the user can define if a notification of the requested look-up shall occur or if a recording or display of the look-up is desired.
  • The user of the computer [0046] 4 can define how emails from computers whose ID numbers are not stored in the database need to be treated. Depending on user-specified settings of the computer 4, emails from unauthorized/unidentified computers can be, for example, blocked or rejected. For instance, the user can create a contact list in which all authorized users are listed. If the received ID number does not match to the ID number stored for an authorized user from the contact list, the email will be rejected.
  • These settings, for example, prevent the user from receiving undesired emails from individuals who frequently change their email address or camouflage the return address. These undesired emails cannot be blocked by conventional filters which can be defined in email applications because the filters are typically only sensitive to the field “From:” for the return address. [0047]
  • In addition, the settings prevent the user from receiving unsolicited emails from Internet marketing companies or so-called “spammers.” A “spammer” is an individual user or a service which post irrelevant or inappropriate messages to one or more users, send large amounts of unsolicited emails meant to promote a product or service, or intend to crash a program by overrunning a fixed-size buffer with excessively large input data. [0048]
  • Moreover, the computer [0049] 4 cannot only block or reject emails from unauthorized users, but also identify if the return email address that appears in the field “From:” is indeed the real email address. For example, the sender of the email could pretend to be an authorized user by changing the email address to one the sender believes the computer 4 accepts. However, because the ID number is included to the received email, the false identity of the sender of the email can be recognized.
  • Sending an e-mail from one user to another user is only one example of how the users can communicate with each other. Generally, the users of the computers [0050] 2, 4 can establish conferencing connections to communicate with each other. The conferencing connections can include video conferences, voice (audio) connections, chat connections, and data connections. It is contemplated that the various types of conferencing connections can be combined so that, for example, a data connection is parallel to a voice connection.
  • FIG. 2 shows a block diagram of a further embodiment of a computer network. The illustrated computer network includes (personal) computers [0051] 20, 22 and a server 26 which have access to the Internet, generally labeled with reference numeral 24. The server 26 and the computers 20, 22 are usually located at different remote locations. Individual users operate the computers 20, 22 that are similar to the computer 2 shown in FIG. 1 and described above. In one embodiment, the computers 20, 22 include client software modules 28, 30 (“client modules”), an application programming interface (API) modules 29, 31, and identification modules 33, 35. The modules are illustrated as individual modules within the computers 20, 22. However, those skilled in the art will appreciate that each of the modules are optional and can be distributed within the computers 20, 22 and perform various functions as described below.
  • The server [0052] 26 and the computers 20, 22 can connect to the Internet 24 by use of communications links 34, 36, 38, respectively. It is contemplated that a plurality of servers 26 and computers 20, 22 can connect to and access the Internet 24.
  • In the illustrated embodiment, the Internet [0053] 24 and the communications links 34, 36, 38 form the communications medium for the server 26 and the computers 20, 22. In addition, the communications medium may also encompass Internet access/service providers. Examples of Internet access/service providers include America Online, the Microsoft Network, Prodigy, CompuServe, and Network Intensive to name a few. Many users pay monthly access fees to the Internet access/service providers because the Internet providers provide local telephone connections, a variety of services and an organized format for accessing the Internet 24.
  • The Internet access/service providers are optional, and in some cases, the computers [0054] 20, 22 may have direct access to the Internet 24. For example, the computers 20, 22 may be connected to a local area network that in turn is directly connected to the Internet 24. It should be understood that the local area network may also connect to the Internet 24 via a conventional telephone line; however, since local area networks typically have a higher volume of data traffic, it is advantageous to include a high-speed connection to support the volume of the information which the local area network will transfer to and from the Internet 24.
  • In one embodiment, the client modules [0055] 28, 30 interact with the API modules 29, 31. The client modules 28, 30 accesses the operating system and other services of the computer 20, 22 through the API modules 29, 31. The API modules 29, 31 are defined at source code level and provide a level of abstraction between the client module and other aspects of the computer system. In other embodiments, the client modules 28, 30 directly interact with the operating system or hardware components.
  • The API module [0056] 29, 31 can also provide an interface between a high level language and lower level utilities and services which were written without consideration for the calling conventions supported by compiled languages. In this case, the API module's 29, 31 main task may be the translation of parameter lists from one format to another and the interpretation of call-by-value and call-by-reference arguments in one or both directions.
  • For instance, the API modules [0057] 29, 31 receive requests “Get: ID number” from the client modules 28, 30 and retrieve the ID numbers from the identification modules 33, 35 (processors) of the computers 20, 22, respectively. Then, the API modules 29, 31 forward the retrieved ID number to the client modules 20, 22 where the ID numbers are available for further processing within the computers 20, 22. The further processing includes, for example, creating a hashed or encoded version of the actual ID number.
  • Associated with the client modules [0058] 28, 30 and the API modules are so-called Software Development Kits (SDK). An SDK is generally the software module provided by a software vendor to allow their products to be used with those of other software vendors. In one client application, the SDK module directs the API module to retrieve the ID number. The SDK modules and the client modules 28, 30 allow the users to perform various applications such as look-ups in database and sales transactions as described below in greater detail. For example, the SDK modules register the computers 20, 22 with the server 26, and contact the server 26 when the computers 20, 22 access the Internet 24.
  • In one embodiment, the server [0059] 26 includes an identification database 32, which stores the ID numbers of the computers 20, 22 that are registered with the server 26. The server 26 is a computer that provides services for the computers 20, 22 and other computers connected to it via the Internet 24. As a general function, the server 26 services requests from the remote computers 20, 22 (clients) to read from and write to the identification database 32. The server 26 is also referred to as the “directory server.”
  • The server [0060] 26 allows access to the identification database 32 by means of a database query language. With this language, users can (interactively) formulate requests and generate reports. A known example of a database query language is structured query language (SQL).
  • SQL is an industry-standard language for creating, updating and querying relational database management systems. In some applications, SQL is embedded in general purpose programming languages. SQL provides for a variety of functions to organize databases. To name a few functions: define and manipulate tables of data, generalize and specialize hierarchies, multiple inheritance, user defined data types, triggers and assertions, support for knowledge based systems, recursive query expressions, and additional data administration tools. SQL also includes the specification of abstract data types (ADTs), object identifiers, methods, inheritance, polymorphism, encapsulation, and all of the other facilities normally associated with object data management. [0061]
  • The server [0062] 26 and the computers 20, 22 use a common protocol, for example, TCP/IP, to encode the requests from the computers 20, 22 and the responses of the server 26. The server 26 may run continuously (as a daemon), waiting for requests to arrive or it may be invoked by some higher level daemon which controls a number of specific servers. Examples of servers that are associated with the Internet 24 include those for Network File System, Network Information Service (NIS), Domain Name System (DNS), FTP, and Network Time Protocol.
  • In one embodiment, the server [0063] 26 is further configured to operate as a server in accordance with the Lightweight Directory Access Protocol (LDAP) in addition to TCP/IP. In another embodiment, the server 26 can be configured to operate in accordance with Recommendation H.225.0 defined by the International Telecommunication Union (ITU). The Recommendation is entitled “Call signalling protocols and media stream packetization for packet-based multimedia communication systems.”
  • Referring to the server [0064] 26 applying LDAP, an entry into a LDAP directory is defined as a collection of attributes with a name, called a distinguished name (DN). The DN refers to the entry unambiguously. Each of the entry's attributes has a type and one or more values. The types are typically mnemonic strings, like “cn” for common name, or “mail” for e-mail address. The values depend on the type.
  • Generally, LDAP directory entries are arranged in a hierarchical structure that reflects political, geographic, and/or organizational boundaries. Entries representing countries appear at the top of the tree while other entries in the tree represent states or national organizations. Below them, there may be entries representing people, organizational units, printers, documents, or the like. [0065]
  • As mentioned above, the server [0066] 26 is referred to a directory server. An example of a directory server is a Netscape Directory Server available from Netscape, Inc. The Netscape Directory Server connects/hooks in one embodiment into Oracle8, a software module available from Oracle Inc. Briefly, Oracle8 includes a server software module configured for database applications, for example, online transaction processing (OLTP). The directory server implements a network-based registry, enabling applications to share data such as users, groups, and preferences. The server supports millions of entries and fast searches, for example, hundreds of queries per second.
  • FIG. 3 shows an exemplary data format as used in the identification database [0067] 32. The identification database 32 includes several fields 32A-32F of predetermined sizes. Each field 32A-32F includes an attribute. In the illustrated embodiment, the ID number is assigned to the field 32A which has a size of 44 bits. The user name and the email address are assigned to the fields 32B, 32D, respectively. The field 32B has a size of 128 bits and the field 32D has a size of 256 bits. The field 32C includes an attribute “activity status” and the field 32E includes an attribute “authentication statues.” The field 32F includes an attribute “ISP” defining the Internet service provider. It is contemplated that the identification database 32 can include additional fields, such as for the IP address, geographical data and other user information.
  • In one embodiment, only the email address and the ID number are indexed. As is known in the art, an index is a sequence of (key pointer) pairs where each pointer points to a record in the database that contains the key value in a particular field. The index is sorted on the key values to allow rapid searching for a particular key value. In one embodiment, the index can be “inverted” in the sense that the key value is used to find the record rather than the other way round. For databases in which the records may be searched based on more than one field, multiple indices may be created that are sorted on those keys. [0068]
  • When the client applications of the computers [0069] 20, 22 connect to the Internet 24, each computer 20, 22 has the option to register with the server 26. The registration of the computers 20, 22 is illustrated in FIG. 4 which shows a flow chart of one embodiment of a registration procedure.
  • The client module [0070] 28 prompts the user to input the email address. The user inputs the email address under which the user can receive emails. During a subroutine in state 202, the client module 28 retrieves the ID number from the processor and prepares a message to be sent to the server 26. The client module 28 includes as a default setting, the IP address of the server 26. In addition, the client module 28 may have a list of additional appropriate servers connected to the Internet 24.
  • Proceeding to state [0071] 204, the computer 20 waits, if not yet connected, until the user establishes a connection to the Internet 24, for example, by dialing the number of a Internet service provider. As indicated in state 206, the procedure returns along the NO branch to state 204 as long as the computer 20 waits for a connection to the Internet 24.
  • Upon connection to the Internet service provider, the procedure proceeds along the YES branch to state [0072] 208. In state 208, the client module 28 (e.g., via SMTP) initiates that the prepared message is sent to the server 26. The message includes the ID number, the user's email address and the IP address. It is contemplated that additional information can be added depending on the data format used, as described below with reference to FIG. 5.
  • Proceeding to state [0073] 210, the server 26 records and organizes the information received with the message within the identification database 32. When this registration procedure is finished, the computer 20 is registered and the server 26 is ready for look-up, as indicated in state 212 and the procedure ends in state 214. The registration procedure registers the computer 20 with the server 26 for future verification by retrieving the ID number from the computer 20 and sending it to the server 26. At the end of the registration procedure, the ID number is stored in the server 26.
  • Under certain circumstances, for example, to provide for increased security against unautorized access, the ID number can be modified within the computer [0074] 20. The computer 20 uses conventional authentication software which applies a hash function to the ID number. One example of such an authentication software is iGuard that uses iGuard Secured Agents. The iGuard software is available from Rainbow Technologies, Inc.
  • In one embodiment, the computer [0075] 20 applies a hash function to the ID number to convert it to a first hashed ID number. In one embodiment, first hashed ID number uses the ID number and a server-specific server identifier. The server 26 then stores the first bashed ID number.
  • Once the computer [0076] 20 is registered, the server 26 can authenticate the computer 20 during a connection. In one embodiment, the server 26 generates and sends a first random number to the computer 20 and requests a return message. In certain embodiments, the random number is called a session number. In addition, the server 26 sends a specific key to the computer 20. The specific key provides that a distinct authentication code is included in the return message from the computer 20.
  • The computer [0077] 20 applies the hash function to the first hashed number, the session number, the specific key, and a second random number to convert these numbers to a second hashed ID number. That is, the second hashed ID number is a function of the hashed number, the session number, the specific key and the second random number. The computer 20 generates the second random number so that the authentication code would be different even if the session number were a fixed value.
  • The server [0078] 26 receives the second hashed ID number and extracts the first hashed ID number. The server 26 retrieves the stored first hashed ID number and compares it with the extracted first hashed ID number. If the hashed ID numbers match, the computer 20 is authenticated.
  • The user of the computer [0079] 22 can register with the server 26 in the same way as the user of the computer 20. The identification database 32 includes then the unique ID numbers of the computers 20, 22. If both computers 20, 22 apply hash functions to their ID numbers, the server 26 stores two first hashed ID numbers during the registration procedure. As the their ID numbers are different, the computers 20, 22 generate different first hashed ID numbers.
  • In one example, the users of the computers [0080] 20, 22 have both registered with the server 26 through the procedure illustrated in FIG. 4. In addition, the computers 20, 22 defined contact lists so that the computers 20, 22 accept only emails from authorized computers.
  • FIG. 6 is a flow chart illustrating a procedure for establishing an authenticated communication between the users of the computers [0081] 20, 22. The procedure is initialized in state 300. For illustrative purposes, the registration procedure shown FIG. 4 is represented in state 302 to indicate that a registration is optional before the authenticating procedure can be successful. In addition, as soon as the computers 20, 22 are online, the computers 20, 22 are registered as “active” within the server 26. This registration as “active” is in this embodiment considered as being part of the state 302.
  • For example, when the computer [0082] 20 is online, the server 26 receives an automatic message from the computer 20 and compares the content of the identification database 32 with the ID number received with the message. The server 26 registers the computer 20 as active when its ID number matches an ID number stored in the identification database 32. In the same manner, the computer 22 is registered as “active” as soon as it is online.
  • In one embodiment, the registration as “active” can be used to notify the contacts of the contact list, that the computer [0083] 20 is online. For instance, as soon as the computer 20 is online, the computer 22 receives a message and displays the active state of the computer 20 through a highlighted contact name, an icon, or the like.
  • Proceeding to state [0084] 304, the user of the computer 20, or any other registered computer, can request a lookup of an email address from the server 26. Here, the user requests a look-up of the email address of the user of the computer 22. The user of the computer 20 prepares a message (email) to the server requesting the look-up of the email address included in the message. The message is sent over the Internet 24 to the server 26.
  • Proceeding to state [0085] 306, the server 26 receives the message from the Internet 24 and initiates processing the message. The processing includes starting a module to look-up the email address in the identification database 32. The subroutine uses known methods to access and retrieve data from a database. The subroutine extracts the look-up email from the received message and checks if the identification database 32 includes a matching entry.
  • Proceeding to state [0086] 308, the server 26 generates a second message that is a response to the first message received from the computer 20. If the look-up did not result in a matching address, the second message informs the user of the computer 20 that no matching entry has been found. If, however, the look-up was successful, the second message includes an authenticated email address, authenticated because the email address is correlated to the unique ID number. In addition, the second message can include data indicating, for example, if the computer 22 is currently registered as active, i.e., if the user of the computer 22 is online at the moment.
  • Proceeding to state [0087] 310, the computer 20 receives the second message and extracts the authenticated email address of the computer 22. As in a conventional email application, the user of the computer 20 can read the email upon receipt or at a later time.
  • Proceeding to state [0088] 312, the user of the computer 20 can directly communicate with the user of the computer 22 using the authentic email address. To communicate, the user of the computer 20 has several options. The user can send an email to the user of the computer 22 that will be recognized as coming from a known contact. Alternatively, the user can connect directly to the computer 22 to initiate an online conferencing connection, such as a chat connection, a video conference, or a voice connection, if the user of the computer 22 is currently online or available. The procedure ends at state 314.
  • The described look-up via email address is typically the only way for users to find one another. This makes the system a closed system and attractive to users who do not want their information published. In particular, the system provides improved security and confidentiality for transactions that involve financial or personal data. [0089]
  • FIG. 5 shows a further block diagram of a computer network. In the illustrated embodiment, the computer network comprises three computers [0090] 40, 42, 44, the server 26 and two service computers 46, 48 which are in the domain of two different Internet service providers. It is contemplated that a service computer can generally be interconnected within the Internet 24 and become part of the Internet 24. This is indicated through a service computer 49, located within the Internet 24 and shown with dashed lines for illustrative purposes. The Internet service providers are indicated in FIG. 5 as ISP-1 and ISP-2.
  • The server [0091] 26, the computers 40, 42, 44 and the service computers 46, 48 are connected to the Internet 24. The computers 40, 42, 44 are connected to the Internet 24 via communication links 62, 64, 66, respectively, and the server 26 is connected to the Internet 24 via a communications link 72. The service computers 46, 48 are connected to the Internet 24 via communications links 68, 70, respectively. In addition, the computer 44 has a direct communications link 60 to the service computer 48 of the ISP-2.
  • The computers [0092] 40, 42, 44 include client modules 50, 52, 54, respectively, and are assigned to different users, indicated as USER-1, USER-2, USER-3. It is contemplated that the computers 40, 42, 44 are similar to the computers 20, 22 shown in FIG. 2 and described above, and that the client modules 50, 52, 54 perform similar functions as the client modules 28, 30 also shown in FIG. 2 and described above.
  • The server [0093] 26 includes a directory module 74 and the identification database 32. In the illustrated embodiment, the identification database 32 includes a general database 56 and a database 58 for storing the information of active users, i.e., users which are currently online. The server 26 can access and modify the identification database 32 in response to a request of a Internet service provider or a client, for example, from one of the computers 40, 42, 44.
  • In the illustrated embodiment, the users USER-1, USER-2, USER-3 want to access the Internet [0094] 24 and the Internet service providers ISP-1, ISP-2 and perform secured transactions. For this example, it is assumed that the ID numbers of the computers 40, 48 are stored in the identification database 32.
  • As soon as the user USER-1 is online, the client module [0095] 50 API (SDK) automatically sends a message to the server 26, as indicated through a connection line L1. The message includes the ID number. The message may also include, but is not limited to, the IP address and email address as described above. The directory module 74 receives and processes the message and initiates an update of the identification database 32. The user USER-1 is then stored as an active user.
  • If the user USER-1 wants to communicate with the Internet service provider ISP-1, the user USER-1 requests a look-up of the email address of the Internet service provider ISP-1. The server [0096] 26 executes this look-up request and generates a response if the requested email address matches one of the stored and authenticated email addresses. The generated response includes the IP address of the Internet service provider ISP-1. The response sent to the user USER-1 is indicated through a connection line L2. Using the IP address, the user USER-1 can then directly connect to the Internet service provider ISP-1.
  • Similarly, the client modules [0097] 52, 54 of users USER-2, USER-3 register as active users when accessing the Internet 24. Regarding the user USER-2, the register and look-up procedure is indicated through connection lines L3, L4, and regarding the user USER-3, the register and look-up procedure is indicated through connection lines L5, L6.
  • If the user USER-2 requests a look-up of the email address of the user USER-3, the response includes the IP address of the computer [0098] 44 of the user USER-3. The user USER-2 can then directly connect to the user USER-3 to send an email, to chat, to have a video conference, or the like. The connection between the computers 42, 44 is indicated as connection line L8.
  • It is contemplated that the user USER-2 can look-up a variety of email addresses. A general connection with a computer connected to the Internet [0099] 24 is indicated through a connection line L9. Correspondingly, the user USER-3 can connect to the Internet service provider ISP-2 via the internet 24, as indicated through a connection line L10. Alternatively, the computer 22 and the service computer can be connected through the communications link 60, as described above.
  • FIG. 4 shows a further block diagram of a computer network. In the illustrated embodiment, the computer network comprises a client computer [0100] 84, the server 26 and a web computer 80. The web computer 80 can be in the domain of an Internet service provider and provides for a website, for example, for an Internet shop. The web computer 80 includes a software module 82 running interactive purchase software. As in the previous drawing, it is contemplated that the web computer 80 can generally be interconnected within the Internet 24 and become part of the Internet 24.
  • The server [0101] 26 and the computers 80, 84 are connected to the Internet 24 which provides for the communications medium. The client computer 84, is connected to the Internet 24 via a communication link 88, and the server 26 is connected to the Internet 24 via a communications link 90. The web computer 80 is connected to the Internet 24 via a communication link 86.
  • The client computer [0102] 84 includes the client module 28 and is assigned to a user interested in purchasing products over the Internet. Similar to the previous drawings (FIG. 1), the client computer 84 includes the identification module 8. It is contemplated that the computers 80, 84 are generally similar to the computers 40-48 shown in FIG. 2 and described above, and that the client module 28 performs similar functions as the client modules 28, 30, also shown in FIG. 2 and described above.
  • FIG. 4 illustrates an example for electronic commerce in which the Internet shop (web computer [0103] 80) offers goods and services over the Internet 24 and the user of the client computer 84 intends to order goods from the Internet shop.
  • In this example, the web computer [0104] 80 and the client computer 84 have registered with the server 26 according to the registration procedure illustrated in FIG. 4. Using a communications link C1, the user of the client computer 84 requests a look-up of the email address of the Internet shop. The server 26 performs the lookup in its database 92 and returns an authenticated email address if the look-up email address matches to an entry correlated to the ID number in the database 92.
  • The user of the client computer [0105] 84 can then establish a direct communications link C2 with the web computer 80 using the authenticated email address. This assures the user of the client computer 84 that the communication occurs directly with the Internet shop when the user places an order with the Internet shop. In some cases, the Internet shop requires that the order include consumer-specific data such as name, address and the number of the credit card.
  • Before the Internet shop confirms the order via a communications link C3, the Internet shop can request a look-up of the client's email address to ensure that the data of the order is correct. The look-up request and the resulting response occur via communications links C4, C5, respectively. [0106]
  • As described above, the ID numbers are unique within the identification database [0107] 32 as well as within the Internet 24. In contrast, user names and email addresses, for example, can appear more than once within continuously growing global Internet. Because of this, there may be two users that claim to have the same email address. If such a collision occurs on a lookup, both users will be returned from the query. The identification database 32 permits users to look up other users only by email address and not by the ID number. However, the index to the ID number is there, because the contact list may need to look up a specific ID number.
  • While certain preferred embodiments of the invention have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the present invention. Accordingly, the breadth and scope of the present invention should be defined only in accordance with the following claims and their equivalents. [0108]

Claims (37)

    What is claimed is:
  1. 1. A method of maintaining a user identification database that indicates when users are in communication with a network, the method comprising the acts of:
    associating in a computer accessible storage medium electronic mail addresses, processor-embedded identifiers and status information;
    receiving a first electronic message from a first computer, the first electronic message containing an electronic mail address and a copy of the processor-embedded identifier existing in the first computer;
    using the first electronic mail address to access the corresponding processor-embedded identifier stored in the storage medium;
    comparing the processor-embedded identifier from the first computer with the processor-embedded identifiers of the storage medium; and
    modifying the status information in the storage medium to indicate that the first electronic mail address is authentic when the processor-embedded identifier from the first computer matches a processor-embedded identifier of storage medium.
  2. 2. The method of claim 1, further comprising the acts of:
    receiving a second electronic message from a second computer, the second electronic message requesting authentication of the first electronic mail address;
    comparing the first electronic mail address with the electronic mail addresses stored in the storage medium;
    sending a third message to the second computer that indicates whether the first electronic mail address is authentic.
  3. 3. The method of claim 2, further comprising the acts of:
    obtaining the status information that corresponds to the first electronic mail address; and
    including the status information to the third message.
  4. 4. The method of claim 2, further comprising the act of using the authenticated first electronic mail address to establish a communications link between the first and second computers.
  5. 5. The method of claim 1, wherein the act of modifying the status information includes indicating the first computer as active.
  6. 6. The method of claim 2, wherein the act of receiving the second electronic mail includes indicating the second computer as active in the storage medium.
  7. 7. The method of claim 1, wherein the act of associating electronic mail addresses includes registering the first and second computers in a computer accessible database.
  8. 8. The method of claim 7, wherein the act of registering includes storing each processor-embedded identifier in the database together with the electronic mail address of the registering computer.
  9. 9. The method of claim 1, further comprising the act of altering the processor-embedded identifier in the first computer.
  10. 10. The method of claim 9, wherein the act of altering includes encoding the processor-embedded identifier.
  11. 11. The method of claim 9, wherein the act of altering includes hashing the processor-embedded identifier.
  12. 12. The method of claim 1, further comprising the act of using the communications link to initiate sending an order from the first computer to the second computer as part of a sales transaction
  13. 13. A method of establishing a conferencing connection comprising the acts of:
    receiving a first processor-specific identifier embedded within a first computer when the first computer is in communication with a communications medium;
    receiving a second processor-specific identifier embedded within a second computer when the second computer is in communication with the communications medium; and
    providing to the first computer indication that the second computer is in communication with the communications medium in response to a request from the first computer to initiate a conferencing connection with the second computer.
  14. 14. The method of claim 13, further comprising the act of maintaining a contact list in the first computer, the contact list indicating a status of the second computer.
  15. 15. The method of claim 14, wherein the contact list indicates the status of the second computer as active when the second computer is in communication with the communications medium.
  16. 16. The method of claim 13, wherein the conferencing connection is selected from a group including a video conference, an electronic mail connection, a chat connection, a data connection, and a voice connection.
  17. 17. The method of claim 13, further comprising the act of sending a connect request from the first computer to the second computer.
  18. 18. The method of claim 17, wherein the request includes an electronic mail address of the second computer.
  19. 19. The method of claim 13, wherein the act of providing includes comparing the electronic mail address with computer specific data stored in an identification database.
  20. 20. The method of claim 13, wherein the acts of receiving include registering the first and second computers as active in the identification database.
  21. 21. A method of identifying computer users by using processor-specific identifiers, the method comprising the acts of:
    receiving a first processor-specific identifier that is embedded within a computer processor;
    accessing a database that associates processor-specific identifiers with information about users of computer processors; and
    obtaining the information of a computer processor user that corresponds to the first processor-specific identifier.
  22. 22. The method of claim 21, wherein the act of receiving includes receiving an altered processor-specific identifier.
  23. 23. The method of claim 22, wherein the processor-specific identifier is altered through encoding.
  24. 24. The method of claim 22, wherein the processor-specific identifier is altered through hashing.
  25. 25. A method of identifying users by using manufacturer-embedded identifiers, the method comprising the acts of:
    associating a database of manufacturer-embedded identifiers with information about users, wherein each manufacturer-embedded identifier is associated with information about a user; and
    using the manufacturer-embedded identifier to access the user information that corresponds to the manufacturer-embedded identifier.
  26. 26. The method of claim 25, wherein the database further includes electronic mail addresses, user names and billing data.
  27. 27. The method of claim 25, further comprising the acts of:
    receiving a first manufacturer-embedded identifier of a first computer when the first computer is in communication with a communications medium;
    receiving a second manufacturer-embedded identifier of a second computer when the second computer is in communication with the communications medium; and
    providing to the first computer indication that the second computer is authentic in responds to a request from the first computer to authenticate the second computer.
  28. 28. A method of monitoring when a processor accesses a communications medium by using a processor-specific identifier that is embedded within the processor, the method comprising the acts of:
    receiving from a first processor a processor-specific identifier embedded therein when the first processor is in communication with a communications medium; and
    updating a database to indicate that the first processor is in communication with the communications medium.
  29. 29. The method of claim 28, wherein the act of updating includes registering the first processor as active.
  30. 30. The method of claim 29, wherein the act of registering includes transferring the processor-specific identifier to an active user database.
  31. 31. A method of identifying a computer user comprising the act of associating user information with a processor-embedded identifier.
  32. 32. A computer system, comprising:
    a first computer connectable to a communications medium and comprising an identification module which provides a computer-specific identification number, the first computer configured to enclose the identification number to a message for sending over the communications medium; and
    a second computer connectable to the communications medium to receive the message and to retrieve the identification number from the message, the second computer comprising a database configured to process the identification number of the first computer to identify the first computer.
  33. 33. A communications network, comprising:
    a first computer connectable to a communications medium and comprising a first identification module which provides a first identification number, the first computer configured to generate a first message including the first identification number for sending over the communications medium;
    a second computer connectable to the communications medium;
    a computer server connectable to the communications medium and comprising an identification database, the computer server configured to receive the first message and to retrieve the first identification number from the first message, the computer server further configured to process the first identification and to update the identification database.
  34. 34. The network of claim 33, wherein the second computer comprises a second identification module which provides a second identification number.
  35. 35. The network of claim 34, wherein the second computer is configured to generate a second message including the second identification number for sending over the communications medium.
  36. 36. A computer, comprising:
    a communications module configured to receive and send electronic messages; and
    a database storing electronic message addresses and corresponding processor-specific identifiers, the database configured to be updated through a first electronic message containing a first electronic message address and a first processor-specific identifier.
  37. 37. The computer of claim 36, wherein the database is configured to generate a second message including an authenticated first electronic message address.
US10104726 1999-04-02 2002-03-21 System and method for identifying users in a distributed network Abandoned US20020107856A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US09285309 US6366950B1 (en) 1999-04-02 1999-04-02 System and method for verifying users' identity in a network using e-mail communication
US10104726 US20020107856A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10104726 US20020107856A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09285309 Division US6366950B1 (en) 1999-04-02 1999-04-02 System and method for verifying users' identity in a network using e-mail communication

Publications (1)

Publication Number Publication Date
US20020107856A1 true true US20020107856A1 (en) 2002-08-08

Family

ID=23093681

Family Applications (5)

Application Number Title Priority Date Filing Date
US09285309 Active US6366950B1 (en) 1999-04-02 1999-04-02 System and method for verifying users' identity in a network using e-mail communication
US10104968 Abandoned US20020099781A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network
US10104726 Abandoned US20020107856A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network
US10104868 Abandoned US20020099779A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network
US10104872 Abandoned US20020099780A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US09285309 Active US6366950B1 (en) 1999-04-02 1999-04-02 System and method for verifying users' identity in a network using e-mail communication
US10104968 Abandoned US20020099781A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network

Family Applications After (2)

Application Number Title Priority Date Filing Date
US10104868 Abandoned US20020099779A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network
US10104872 Abandoned US20020099780A1 (en) 1999-04-02 2002-03-21 System and method for identifying users in a distributed network

Country Status (1)

Country Link
US (5) US6366950B1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6711683B1 (en) * 1998-05-29 2004-03-23 Texas Instruments Incorporated Compresses video decompression system with encryption of compressed data stored in video buffer
WO2004068819A1 (en) * 2003-01-31 2004-08-12 Axalto Sa Communication between a smart card and a server
US20050125667A1 (en) * 2003-12-09 2005-06-09 Tim Sullivan Systems and methods for authorizing delivery of incoming messages
US20050193130A1 (en) * 2004-01-22 2005-09-01 Mblx Llc Methods and systems for confirmation of availability of messaging account to user
US20050198171A1 (en) * 2004-02-11 2005-09-08 Landsman Richard A. Managing electronic messages using contact information
US20060212520A1 (en) * 2005-03-15 2006-09-21 America Online, Inc., Electronic message system with federation of trusted senders
US20070116195A1 (en) * 2005-10-28 2007-05-24 Brooke Thompson User interface for integrating diverse methods of communication
US20080208984A1 (en) * 2007-02-23 2008-08-28 Rosenberg Greg A User interface for transitioning between chat and email
US20080222256A1 (en) * 2007-03-08 2008-09-11 Rosenberg Greg A Autocomplete for intergrating diverse methods of electronic communication
US20080235773A1 (en) * 2007-03-22 2008-09-25 Wistron Corp. Method of irrugalar password configuration and verification
US7496727B1 (en) 2005-12-06 2009-02-24 Transmeta Corporation Secure memory access system and method
US7516182B2 (en) 2002-06-18 2009-04-07 Aol Llc Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses
US7590695B2 (en) 2003-05-09 2009-09-15 Aol Llc Managing electronic messages
US7617286B2 (en) 2003-04-18 2009-11-10 Aol Llc Sorting electronic messages using attributes of the sender address
US7627635B1 (en) 2003-07-28 2009-12-01 Aol Llc Managing self-addressed electronic messages
US7647381B2 (en) 2005-04-04 2010-01-12 Aol Llc Federated challenge credit system
US20100017625A1 (en) * 2003-11-20 2010-01-21 Johnson Richard C Architecure, system, and method for operating on encrypted and/or hidden information
US7681046B1 (en) 2003-09-26 2010-03-16 Andrew Morgan System with secure cryptographic capabilities using a hardware specific digital secret
US7882360B2 (en) 2003-12-19 2011-02-01 Aol Inc. Community messaging lists for authorization to deliver electronic messages
US20110265074A1 (en) * 2010-04-27 2011-10-27 Seth Kelby Vidal Systems and methods for generating exportable encoded identifications of networked machines based on installed package profiles
US20130136263A1 (en) * 2011-11-29 2013-05-30 American Megatrends, Inc. System and method for registering a personal computing device to a service processor
US8726036B2 (en) 2011-09-20 2014-05-13 Wallrust, Inc. Identifying peers by their interpersonal relationships

Families Citing this family (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7110984B1 (en) * 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
US6418472B1 (en) * 1999-01-19 2002-07-09 Intel Corporation System and method for using internet based caller ID for controlling access to an object stored in a computer
US6496822B2 (en) * 1999-04-12 2002-12-17 Micron Technology, Inc. Methods of providing computer systems with bundled access to restricted-access databases
US7120927B1 (en) * 1999-06-09 2006-10-10 Siemens Communications, Inc. System and method for e-mail alias registration
US6640301B1 (en) * 1999-07-08 2003-10-28 David Way Ng Third-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents
US7058683B1 (en) * 1999-07-20 2006-06-06 Sun Microsystems, Inc. Methods and apparatus for providing a virtual host in electronic messaging servers
US7120590B1 (en) * 1999-08-23 2006-10-10 User Trencis, Inc. Electronically distributing promotional and advertising material based upon consumer internet usage
US7853989B2 (en) 2000-02-08 2010-12-14 Katsikas Peter L System for eliminating unauthorized electronic mail
US7822977B2 (en) * 2000-02-08 2010-10-26 Katsikas Peter L System for eliminating unauthorized electronic mail
US6990514B1 (en) * 1999-09-03 2006-01-24 Cisco Technology, Inc. Unified messaging system using web based application server for management of messages using standardized servers
JP2001077993A (en) * 1999-09-03 2001-03-23 Ricoh Co Ltd Communication terminal device, facsimile machine and method for controlling them
US7493497B1 (en) 2000-02-03 2009-02-17 Integrated Information Solutions Digital identity device
FR2805108B1 (en) * 2000-02-10 2002-04-05 Bull Cp8 Method for a user registration on a directory server of a network of Internet type and / or location of a user on this network, and chip card for carrying out the method
FR2805059A1 (en) * 2000-02-10 2001-08-17 Bull Cp8 Charging Method for a software piece in a smart card, especially the type called "applet"
US7644124B1 (en) * 2000-02-15 2010-01-05 Porter Swain W Privacy enhanced methods and apparatuses for conducting electronic communications
US20020023134A1 (en) * 2000-04-03 2002-02-21 Roskowski Steven G. Method and computer program product for establishing real-time communications between networked computers
US9100221B2 (en) 2000-05-04 2015-08-04 Facebook, Inc. Systems for messaging senders and recipients of an electronic message
US9356894B2 (en) 2000-05-04 2016-05-31 Facebook, Inc. Enabled and disabled menu choices based on presence state
US9043418B2 (en) * 2000-05-04 2015-05-26 Facebook, Inc. Systems and methods for instant messaging persons referenced in an electronic message
US7979802B1 (en) * 2000-05-04 2011-07-12 Aol Inc. Providing supplemental contact information corresponding to a referenced individual
US8132110B1 (en) 2000-05-04 2012-03-06 Aol Inc. Intelligently enabled menu choices based on online presence state in address book
US8122363B1 (en) 2000-05-04 2012-02-21 Aol Inc. Presence status indicator
US6714930B1 (en) * 2000-05-31 2004-03-30 International Business Machines Corporation Lightweight directory access protocol, (LDAP) trusted processing of unique identifiers
JP2002007290A (en) * 2000-06-20 2002-01-11 Sharp Corp Mail transmission and reception system, mail generating and transmitting device, mail-receiving and reproducing device, mail-transmitting and receiving device, internet- access device, and recording medium
US8001190B2 (en) 2001-06-25 2011-08-16 Aol Inc. Email integrated instant messaging
US6560318B1 (en) * 2000-09-07 2003-05-06 Cisco Technology, Inc. Arrangement for managing notification preferences for notification delivery messages in an IP-based notification architecture
US6978419B1 (en) * 2000-11-15 2005-12-20 Justsystem Corporation Method and apparatus for efficient identification of duplicate and near-duplicate documents and text spans using high-discriminability text fragments
US7225219B2 (en) * 2000-11-29 2007-05-29 Broadspider Networks, Inc. Distributed caching architecture for computer networks
US20030182182A1 (en) * 2000-12-18 2003-09-25 Kocher Robert W. Biometrics-based voting
JP3624167B2 (en) * 2001-03-23 2005-03-02 コニカミノルタビジネステクノロジーズ株式会社 E-mail transmitting device, e-mail transmission method, program and recording medium
US7124173B2 (en) * 2001-04-30 2006-10-17 Moriarty Kathleen M Method and apparatus for intercepting performance metric packets for improved security and intrusion detection
JP4319791B2 (en) * 2001-06-08 2009-08-26 パナソニック コミュニケーションズ株式会社 Data communication devices and the Internet facsimile machine
DE10139745A1 (en) * 2001-08-13 2003-02-27 Siemens Ag Method and apparatus for establishing a communication link
US7287057B2 (en) * 2001-11-15 2007-10-23 International Business Machines Corporation Accessing information using an instant messaging system
GB0129672D0 (en) * 2001-12-12 2002-01-30 Ibm Method and system for preserving message order when parallel processing messages
US20090254994A1 (en) 2002-02-18 2009-10-08 David Lynch Waterson Security methods and systems
US20050120230A1 (en) * 2002-02-18 2005-06-02 Waterson David L. System for preventing a computer virus accessing email addresses
US7779062B2 (en) * 2004-08-18 2010-08-17 Ripple Effects Holdings Limited System for preventing keystroke logging software from accessing or identifying keystrokes
US20030236847A1 (en) * 2002-06-19 2003-12-25 Benowitz Joseph C. Technology enhanced communication authorization system
US20030236698A1 (en) * 2002-06-20 2003-12-25 Praisedepot, Llc Method and system for collecting, storing, managing and distributing references using networked computer devices
US7185086B2 (en) * 2002-06-26 2007-02-27 Hewlett-Packard Development Company, L.P. Method for electronic tracking of an electronic device
US7139825B2 (en) * 2002-09-30 2006-11-21 Microsoft Corporation Source-specific electronic message addressing
US7373497B2 (en) * 2003-01-23 2008-05-13 Hewlett-Packard Development Company, L.P. Methods and apparatus for rapidly activating previously inactive components in a computer system
US7562229B2 (en) * 2003-01-23 2009-07-14 Hewlett-Packard Development Company, L.P. Codeword-based auditing of computer systems and methods therefor
US7620691B1 (en) 2003-02-10 2009-11-17 Aol Llc Filtering electronic messages while permitting delivery of solicited electronics messages
US20040177120A1 (en) * 2003-03-07 2004-09-09 Kirsch Steven T. Method for filtering e-mail messages
JP4380198B2 (en) * 2003-03-31 2009-12-09 株式会社日立製作所 Computer system that performs access control on the storage device
US7606788B2 (en) * 2003-08-22 2009-10-20 Oracle International Corporation Method and apparatus for protecting private information within a database
US20050055404A1 (en) * 2003-09-04 2005-03-10 Information Processing Corporation E-mail server registry and method
US7206814B2 (en) * 2003-10-09 2007-04-17 Propel Software Corporation Method and system for categorizing and processing e-mails
US7366761B2 (en) * 2003-10-09 2008-04-29 Abaca Technology Corporation Method for creating a whitelist for processing e-mails
US20050091320A1 (en) * 2003-10-09 2005-04-28 Kirsch Steven T. Method and system for categorizing and processing e-mails
US20050091319A1 (en) * 2003-10-09 2005-04-28 Kirsch Steven T. Database for receiving, storing and compiling information about email messages
US20050080857A1 (en) * 2003-10-09 2005-04-14 Kirsch Steven T. Method and system for categorizing and processing e-mails
US7715059B2 (en) * 2003-10-22 2010-05-11 International Business Machines Corporation Facsimile system, method and program product with junk fax disposal
GB2438273B (en) * 2003-11-04 2008-02-13 Ntt Comm Corp Method,apparatus and program for establishing encrypted communication channel between apparatuses
WO2005043281A3 (en) * 2003-11-04 2005-08-18 Ntt Comm Corp Method, apparatus and program for establishing encrypted communication channel between apparatuses
US7734708B1 (en) 2003-12-22 2010-06-08 Aol Inc. Enabling identification of online identities between different messaging services
US7647375B1 (en) 2003-12-22 2010-01-12 Aol Llc Enabling mapping identification of online identities between different messaging services
US7430720B2 (en) * 2004-03-05 2008-09-30 America Online, Inc. System and method for preventing screen-scrapers from extracting user screen names
US20060059183A1 (en) * 2004-09-16 2006-03-16 Pearson Malcolm E Securely publishing user profile information across a public insecure infrastructure
DE102004055331A1 (en) * 2004-11-16 2006-08-17 Jochen Schumacher A method for providing an address in a data network
US20070088793A1 (en) * 2005-10-17 2007-04-19 Landsman Richard A Filter for instant messaging
CA2524536A1 (en) * 2005-10-26 2007-04-26 Bce Inc Method, system and apparatus for controlling the establishment of a data connection from an originating data device
US8601160B1 (en) * 2006-02-09 2013-12-03 Mcafee, Inc. System, method and computer program product for gathering information relating to electronic content utilizing a DNS server
US7805489B2 (en) * 2006-06-27 2010-09-28 Research In Motion Limited Electronic mail communications system with client email internet service provider (ISP) polling application and related methods
US8775521B2 (en) * 2006-06-30 2014-07-08 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting zombie-generated spam
US8307114B2 (en) 2007-05-22 2012-11-06 International Business Machines Corporation High availability message transmission
CN101079849B (en) * 2007-06-29 2010-07-14 腾讯科技(深圳)有限公司 Method and system for sending offline messages in instant communication system
US8438596B2 (en) * 2009-04-08 2013-05-07 Tivo Inc. Automatic contact information transmission system
US8775448B2 (en) * 2012-04-24 2014-07-08 Responsys, Inc. High-throughput message generation
CN103929350B (en) * 2013-01-16 2018-05-22 阿里巴巴集团控股有限公司 The method of push type information, device and system
US9218468B1 (en) 2013-12-16 2015-12-22 Matthew B. Rappaport Systems and methods for verifying attributes of users of online systems

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5259692A (en) * 1992-09-04 1993-11-09 Beller Larry D Ground breaking apparatus

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5459584A (en) 1988-09-22 1995-10-17 Audiofax, Inc. Facsimile telecommunications system and method
US4994926C1 (en) 1988-09-22 2001-07-03 Audiofax Ip L L C Facsimile telecommunications system and method
US5774544A (en) 1996-03-28 1998-06-30 Advanced Micro Devices, Inc. Method an apparatus for encrypting and decrypting microprocessor serial numbers
US5838790A (en) * 1996-04-19 1998-11-17 Juno Online Services, L.P. Advertisement authentication system in which advertisements are downloaded for off-line display
US5937160A (en) * 1997-05-01 1999-08-10 Reedy Creek Technologies, Inc. Systems, methods and computer program products for updating hypertext documents via electronic mail
US6021427A (en) * 1997-05-22 2000-02-01 International Business Machines Corporation Method and system for preventing routing maelstrom loops of automatically routed electronic mail
US6085321A (en) * 1998-08-14 2000-07-04 Omnipoint Corporation Unique digital signature

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5259692A (en) * 1992-09-04 1993-11-09 Beller Larry D Ground breaking apparatus

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6711683B1 (en) * 1998-05-29 2004-03-23 Texas Instruments Incorporated Compresses video decompression system with encryption of compressed data stored in video buffer
US7516182B2 (en) 2002-06-18 2009-04-07 Aol Llc Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses
WO2004068819A1 (en) * 2003-01-31 2004-08-12 Axalto Sa Communication between a smart card and a server
US7945633B2 (en) 2003-04-18 2011-05-17 Aol Inc. Sorting electronic messages using attributes of the sender address
US7617286B2 (en) 2003-04-18 2009-11-10 Aol Llc Sorting electronic messages using attributes of the sender address
US8601111B2 (en) 2003-04-18 2013-12-03 Aol Inc. Sorting electronic messages using attributes of the sender address
US9667583B2 (en) 2003-04-18 2017-05-30 Aol Inc. Sorting electronic messages using attributes of the sender address
US9100358B2 (en) 2003-04-18 2015-08-04 Aol Inc. Sorting electronic messages using attributes of the sender address
US8285803B2 (en) 2003-04-18 2012-10-09 Aol Inc. Sorting electronic messages using attributes of the sender address
US9037660B2 (en) 2003-05-09 2015-05-19 Google Inc. Managing electronic messages
US7590695B2 (en) 2003-05-09 2009-09-15 Aol Llc Managing electronic messages
US8073916B2 (en) 2003-05-09 2011-12-06 Aol Inc. Managing electronic messages
US7627635B1 (en) 2003-07-28 2009-12-01 Aol Llc Managing self-addressed electronic messages
US7681046B1 (en) 2003-09-26 2010-03-16 Andrew Morgan System with secure cryptographic capabilities using a hardware specific digital secret
US20100017625A1 (en) * 2003-11-20 2010-01-21 Johnson Richard C Architecure, system, and method for operating on encrypted and/or hidden information
US7694151B1 (en) 2003-11-20 2010-04-06 Johnson Richard C Architecture, system, and method for operating on encrypted and/or hidden information
US8335930B2 (en) 2003-11-20 2012-12-18 Johnson Richard C Architecture, system, and method for operating on encrypted and/or hidden information
US20050125667A1 (en) * 2003-12-09 2005-06-09 Tim Sullivan Systems and methods for authorizing delivery of incoming messages
US8281146B2 (en) 2003-12-19 2012-10-02 Facebook, Inc. Messaging systems and methods
US8949943B2 (en) 2003-12-19 2015-02-03 Facebook, Inc. Messaging systems and methods
US7882360B2 (en) 2003-12-19 2011-02-01 Aol Inc. Community messaging lists for authorization to deliver electronic messages
US20050193130A1 (en) * 2004-01-22 2005-09-01 Mblx Llc Methods and systems for confirmation of availability of messaging account to user
US20050198171A1 (en) * 2004-02-11 2005-09-08 Landsman Richard A. Managing electronic messages using contact information
US7469292B2 (en) 2004-02-11 2008-12-23 Aol Llc Managing electronic messages using contact information
US7650383B2 (en) 2005-03-15 2010-01-19 Aol Llc Electronic message system with federation of trusted senders
US8359360B2 (en) 2005-03-15 2013-01-22 Facebook, Inc. Electronic message system with federation of trusted senders
US20060212520A1 (en) * 2005-03-15 2006-09-21 America Online, Inc., Electronic message system with federation of trusted senders
US8713175B2 (en) 2005-04-04 2014-04-29 Facebook, Inc. Centralized behavioral information system
US8234371B2 (en) 2005-04-04 2012-07-31 Aol Inc. Federated challenge credit system
US7647381B2 (en) 2005-04-04 2010-01-12 Aol Llc Federated challenge credit system
US7729481B2 (en) 2005-10-28 2010-06-01 Yahoo! Inc. User interface for integrating diverse methods of communication
US20070116195A1 (en) * 2005-10-28 2007-05-24 Brooke Thompson User interface for integrating diverse methods of communication
US7496727B1 (en) 2005-12-06 2009-02-24 Transmeta Corporation Secure memory access system and method
US7966467B1 (en) 2005-12-06 2011-06-21 Christian Ludloff Secure memory access system and method
US8359443B2 (en) 2005-12-06 2013-01-22 Christian Ludloff Secure memory access system and method
US8601229B2 (en) 2005-12-06 2013-12-03 Intellectual Venture Funding Llc Secure memory access system and method
US7756936B2 (en) * 2007-02-23 2010-07-13 Yahoo! Inc. User interface for transitioning between chat and email
US20080208984A1 (en) * 2007-02-23 2008-08-28 Rosenberg Greg A User interface for transitioning between chat and email
US20080222256A1 (en) * 2007-03-08 2008-09-11 Rosenberg Greg A Autocomplete for intergrating diverse methods of electronic communication
US20080235773A1 (en) * 2007-03-22 2008-09-25 Wistron Corp. Method of irrugalar password configuration and verification
US20110265074A1 (en) * 2010-04-27 2011-10-27 Seth Kelby Vidal Systems and methods for generating exportable encoded identifications of networked machines based on installed package profiles
US9772834B2 (en) * 2010-04-27 2017-09-26 Red Hat, Inc. Exportable encoded identifications of networked machines
US8726036B2 (en) 2011-09-20 2014-05-13 Wallrust, Inc. Identifying peers by their interpersonal relationships
US8532302B2 (en) * 2011-11-29 2013-09-10 American Megatrends, Inc. System and method for registering a personal computing device to a service processor
US20130136263A1 (en) * 2011-11-29 2013-05-30 American Megatrends, Inc. System and method for registering a personal computing device to a service processor
US8904507B2 (en) 2011-11-29 2014-12-02 American Megatrends, Inc. System and method for controlling user access to a service processor

Also Published As

Publication number Publication date Type
US20020099781A1 (en) 2002-07-25 application
US20020099780A1 (en) 2002-07-25 application
US6366950B1 (en) 2002-04-02 grant
US20020099779A1 (en) 2002-07-25 application

Similar Documents

Publication Publication Date Title
US6173407B1 (en) Method of authenticating and charging a client using a web infoshop service system
US7587499B1 (en) Web-based security and filtering system with proxy chaining
US6085321A (en) Unique digital signature
US5708780A (en) Internet server access control and monitoring systems
US6272492B1 (en) Front-end proxy for transparently increasing web server functionality
US6947991B1 (en) Method and apparatus for exposing network administration stored in a directory using HTTP/WebDAV protocol
US7039656B1 (en) Method and apparatus for synchronizing data records between a remote device and a data server over a data-packet-network
US6779022B1 (en) Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients
US7089246B1 (en) Overriding content ratings and restricting access to requested resources
US6023684A (en) Three tier financial transaction system with cache memory
US6064666A (en) Cross service common user image association
US6463418B1 (en) Secure and stateful electronic business transaction system
US5812776A (en) Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a redirect command by server
US20040122863A1 (en) Apparatus, method and system for directory quality assurance
US6546392B1 (en) Self service gateway
US20040064445A1 (en) Wireless access to a database by a short message system query
US20040054887A1 (en) Method and system for selective email acceptance via encoded email identifiers
US5845068A (en) Multilevel security port methods, apparatuses, and computer program products
US7185361B1 (en) System, method and computer program product for authenticating users using a lightweight directory access protocol (LDAP) directory server
US20040122958A1 (en) Method and system for peer-to-peer authorization
US20040117456A1 (en) System and method for transmitting a file associated with an e-mail
US7200636B2 (en) Method and apparatus for applying personalized rules to e-mail messages at an e-mail server
US7058683B1 (en) Methods and apparatus for providing a virtual host in electronic messaging servers
US6609138B1 (en) E-mail list archiving and management
US20030055652A1 (en) Private network exchange with multiple service providers, having a portal, collaborative applications, and a directory service