US20040243842A1 - System server computer and method for monitoring the input rights of a user - Google Patents

System server computer and method for monitoring the input rights of a user Download PDF

Info

Publication number
US20040243842A1
US20040243842A1 US10489076 US48907604A US2004243842A1 US 20040243842 A1 US20040243842 A1 US 20040243842A1 US 10489076 US10489076 US 10489076 US 48907604 A US48907604 A US 48907604A US 2004243842 A1 US2004243842 A1 US 2004243842A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
document
control unit
address
field
assigning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10489076
Inventor
Michael Schlereth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0423Input/output
    • G05B19/0425Safety, monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24167Encryption, password, user access privileges
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • G05B2219/32Operator till task planning
    • G05B2219/32126Hyperlink, access to program modules and to hardware modules in www, web server, browser
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network

Abstract

Control system with at least one control unit, a server computer, a first document in a markup language and a second document in a markup language for loading through a client computer, whereby the first document contains at least one field and the second document contains data for directing the field to an address in a control unit.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is the US National Stage of International Application No. PCT/DE02/03103, filed Aug. 23, 2002 and claims the benefit thereof. The International Application claims the benefits of German application No. 10144332.3 filed Sep. 10, 2001, both of the applications are incorporated by reference herein in their entirety. [0001]
  • FIELD OF INVENTION
  • The invention relates to a method for transmission of a process value from a control unit to a client computer as well as to a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product. [0002]
  • BACKGROUND OF INVENTION
  • It is known per se from the prior art how to link a control system, for example a stored program control (SPC) or a programmable logic controller (PLC), with a system server which can be accessed by a client computer. The client computer can load HTML pages from the server computer, for example in order to display process values on a user interface. The link between an output field of the HTML page and the process value is permanently programmed, for example by means of a JAVA script or by means of OCX (OLE Control Extension). [0003]
  • A system for remotely accessing a control system via a commercial communications network is known from U.S. Pat. No. 6,061,603. [0004]
  • FIG. 1 shows a block diagram of this already known system. [0005]
  • The system comprises a personal computer [0006] 8 with a browser program 10. The browser 10 can be a commercially available Internet browser such as, for example, Netscape Communication Navigator or Microsoft Internet Explorer. The browser program 10 is used for accessing what is known as a website 4 via the Internet 14 in order to display the contents of the website 4 on the monitor 12 of the personal computer 8 for a user 2.
  • The website [0007] 4 includes a network interface 16 with a unique Internet address 18 as well as a server computer 20 and an application program 22. The server computer 20 serves to interpret HTTP protocols and uses TCP/IP by means of TCP/IP stack 24 in order to interact with the network interface 16 and the application program 22. This enables the data to be transferred between the application program 22 and the user 2 via the Internet 14.
  • The application program supplies data from a control system [0008] 6. This data can be used by the user 2 for monitoring the controller, since said data can be transferred by means of the TCP/IP stack 24 from the website 4 via the Internet 14 to the personal computer 8 of the user 2. By this means a human-machine interface is created on the personal computer 8.
  • The user [0009] 2 can set up a connection to the Internet 14 by way of what is termed an Internet Service Provider (ISP) and then enter the address of the website 4 into the browser program 10. Using the browser 10 the user 2 can then, for example, read a homepage of the website 4 and download information from said website 4. In response to an input by the user 2 the browser 10 sends commands to the website 4, which commands are used by the application program 22 in order to display information which is provided by the control system 6. A disadvantage with this already known system is in particular that the application program 22 has to be programmed specifically for a particular control system 6 and permits no flexibility of any kind.
  • The document XP 002163955, “c-Internet connector box miniwebserver”, Operating Instructions Rev 2.0 Internet Connector Box, Xx, Xx (Oct. 7, 1999), 1-121 discloses a device (ICB) with an embedded Internet server with which dynamic Internet pages can be generated from an HTML template. Up to three devices which support a special protocol can be connected to the ICB device. In order to communicate with such devices, the ICB device uses an information element which the devices sent to the device in their initialization phase. [0010]
  • XP010365709, Emerging Technologies And Factory Automation, 1999, Proceedings, Etfa '99, 1999 7[0011] th IEEE International Conference On [sic] Barcelona, Spain 18-21 Oct. 1999, Piscataway, Ni, Usa, ieee, Us (18-Oct.-1999), 823-830 discloses a method for accessing fieldbus devices using a client computer via the Internet. Here, a database or an XML document is used to provide a description of the fieldbus devices. The content of the HTML pages is then generated using the information from the database or the XML document.
  • SUMMARY OF INVENTION
  • The object of the invention is therefore to create an improved method for transmission of a process value from a control unit to a client computer as well as a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product. [0012]
  • The object underlying the invention is achieved by the features of the respective independent claims. [0013]
  • Preferred embodiments of the invention are specified in the dependent claims. [0014]
  • The invention permits the links between the fields of an HTML page and the process values on the server to be parameterized and transferred together with the HTML page from the server computer to the client computer. Elements on the HTML page can be identified in this case by means of an ID attribute, whereby the element type can be arbitrary. [0015]
  • A particular advantage is that the graphical layout of the HTML page can initially be independent of the actual engineering data, i.e. for example the actual addresses of the control system. The individual fields of the HTML page are then linked subsequently via a further document in a markup language, XML for example. [0016]
  • This permits the greatest possible flexibility also with regard to changes on the HTML page or changes with regard to the control system, for example if a control system is to be replaced by a control system of a new type which has different address ranges. In this case only the address ranges need to be re-assigned to the corresponding fields in the HTML page in the XML document. [0017]
  • Also of particular advantage is that this flexible access by the user to the system controller can also take place via what is termed a firewall. The user can therefore log in from any location initially for example into a corporate intranet via a corresponding firewall in order subsequently to enter into contact with the system server. What is particularly advantageous here is that the user can also make inputs in addition to being able to visualize process values.[0018]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A preferred exemplary embodiment of the invention will be explained in more detail in the following with reference to the drawings, in which: [0019]
  • FIG. 1 is a block diagram of a control system known from the prior art, [0020]
  • FIG. 2 is a block diagram of a first embodiment of the control system according to the invention, [0021]
  • FIG. 3 is a block diagram of a second embodiment of the control system according to the invention, [0022]
  • FIG. 4 is a flowchart of an embodiment of the method for transmission of a process value from a control unit to a client computer, [0023]
  • FIG. 5 shows an embodiment of the method for transmission of an input value from a client computer to a control unit, [0024]
  • FIG. 6 is a block diagram of a third embodiment of the control system according to the invention.[0025]
  • DETAILED DESCRIPTION OF INVENTION
  • FIG. 2 shows a block diagram of a control system for controlling a system [0026] 25. The system 25 is connected to one or more control units known as stored program controls (SPCs)—designated as SPS X and SPS Y in the example shown. The two control units SPS X and SPS Y each have different addresses, for accessing data for example. In particular, the control unit SPS X has the addresses a and c for storing process values; the control unit SPS Y has the address b.
  • The control units SPS X and SPS Y are connected to a system server computer [0027] 27 via a fieldbus 26. The system server computer 27 can execute read/write accesses to the storage addresses a, c of the SPS X and to the address b of the SPS Y via the fieldbus 26.
  • The system server computer[0028] 27 contains a document 28 in a markup language. In the example shown in FIG. 2, the markup language used for the document 28 is the hypertext markup language (HTML). The document 28 contains the fields A, B and C for displaying and/or graphically visualizing process values and/or for entering values. In addition, a script 29 is coded in the document 28. This can be a JAVA script for example. As an alternative to the script 29, a so-called applet can be provided.
  • Also coded in the document [0029] 28 is a pointer 30 to a document 31. The pointer 30 can consist, for example, of the Uniform Resource Locator (URL) of the document 31.
  • The document [0030] 31 is likewise available in a markup language, this being an Extended Markup Language (XML) in the example shown in FIG. 2. A table 32 is coded in the document 31.
  • Table [0031] 32 contains an assignment of the fields A, B and C of the document 28 to specific storage addresses of the control units SPS X and SPS Y. In table 32, for example, field A is assigned to SPS X, and more specifically to address a of SPS X, whereas field B is assigned to address b of SPS Y, and field C to address c of SPS X. Table 32 can contain further assignments of this kind for further fields of the document 28 to further addresses of the SPS X and Y, as well as of further control units where necessary.
  • By means of a browser [0032] 34 a client computer 33 can set up a connection to the system server computer 27 via a network 35. The client computer 33 can be a regular personal computer, an operator console, a portable computer, a mobile phone with WAP browser or also a so-called WAP pad.
  • The network [0033] 35 can be a corporate network or system-internal network, an intranet, extranet or the Internet itself. In the last-mentioned case the communication can also be set up via a so-called firewall between the client computer 33 and the system server computer 27. A commercially available browser program, for example Netscape Communication Navigator or Microsoft Internet Explorer, can be used as the browser.
  • During operation of the system according to FIG. 2, a user of the client computer [0034] 33 navigates by means of the browser 34 via the network 35 to the HTML document 28. The user does this for example by selecting a corresponding hypertext link or entering the URL of the document 28 into the browser 34.
  • The document [0035] 28 is then transferred via the network 35 to the client computer 33. The script 29 of the document 28 is also launched automatically on the client computer 33 and executed. The script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used.
  • The script [0036] 29 reads the pointer 30 of the document 28 and access the document 31 on the system server computer 27 by means of the corresponding URL. The document 31 is then transferred via the network 35 to the client computer 33.
  • The script [0037] 29 then reads the assignments of the fields A, B and C of the document 28 to the addresses of the control units SPS X and SPS Y from table 32, for example for field A the address specification indicating that a corresponding process value is stored on SPS X under the address a.
  • The script [0038] 29 then sends a command to the system server computer 27, which command contains the control units and addresses assigned to the fields A, B and C. The system server computer 27 then accesses the control units SPS X and/or SPS Y via the fieldbus 26 in order to read the contents of the corresponding storage locations with the addresses a, b and c.
  • The corresponding process values stored at these storage addresses are then transferred by the system server computer [0039] 27 via the network 35 to the client computer 33 and displayed by the script 29 in the corresponding fields A, B and C of the document 28 for the user.
  • FIG. 3 shows an alternative embodiment of the embodiment according to FIG. 2, in which alternative embodiment corresponding elements are designated by the same reference characters. [0040]
  • In contrast to the embodiment shown in FIG. 2, the system server computer [0041] 27 according to FIG. 3 contains the files 36 and 37. File 36 contains a table which assigns to the document 28 a pointer to the document 31 belonging to the document 28. This corresponds to the pointer 30 of the embodiment shown in FIG. 2, whereby the file 36 does not belong to the document 28 of the embodiment shown in FIG. 3, but is stored separately on the system server computer 27. If further documents 28 are present on the system server computer 27, the file 36 accordingly contains pointers for the assignment of these further documents 28 to corresponding further documents 31.
  • The document [0042] 31 contains a coded table 38 which corresponds to the table 32 of the embodiment shown in FIG. 2. In contrast to table 32 of the embodiment shown in FIG. 2, table 38 of the embodiment shown in FIG. 3 contains no actual addresses, but only the designation of parameter value designations assigned to the fields A, B, C of the document 28. Field A, for example, is assigned to a parameter value with the designation “boiler”, the boiler temperature for example; field B is assigned to a parameter value with the designation “engine”, an engine speed for example, and field C is assigned to a parameter value with the designation “pump”, a valve setting of the pump for example.
  • File [0043] 37, which is stored separately from the document 28 on the system server computer 27, assigns each designation of this kind to an address on a control unit, for example the designation “boiler” to the control unit SPS X and its storage address a, the designation “engine” to the control unit SPS Y and its address b, etc.
  • During operation of the system shown in FIG. 3, the document [0044] 28 is then loaded in turn by the client computer 33 and the script 29 executed. The script 29 then queries the file 36 for the pointer to the document 31 which is assigned to the document 28 and then, by means of this pointer, loads the document 31. Using the designations assigned to the individual fields A, B and C in table 38 of the document 31, the script then queries the file 37 in order to obtain the corresponding addresses or control units.
  • Using the addresses obtained in this way, the script [0045] 29 again sends a command to the system server computer 27 in order to execute a query to obtain the corresponding parameter values of the specified addresses of the control units SPS X and SPS Y.
  • With this embodiment it is particularly advantageous that the assignments in the document [0046] 31 are made abstractly, which means that the document 31 does not need to be changed in the event of a change of the control unit and/or the address. In this case only a change of the corresponding address entry in the file 37 is required.
  • Both in the embodiment according to FIG. 2 and in the embodiment according to FIG. 3, it is also possible to transfer an input value from the client computer [0047] 33 to a control unit. To do this, the user enters an input value in an input field of the document 28, in field A for example. The script 29 is activated by actuation of the entry key by the user of the client computer 33.
  • The script [0048] 29 then sends a command to the system server computer 27. This command contains as arguments the input value and also the address and control unit assigned to the input field. This was determined beforehand by the script 29 on the occasion of the transfer of the process values from the control units to the client computer, as explained above.
  • The system server computer [0049] 27 then executes a write access to the corresponding address of the corresponding control unit—in the example under consideration, for field A as the input field this is the SPS X with the address a—in order to store the input value there.
  • If only one control unit is present, table [0050] 32 or file 37 contains only a corresponding address specification, since the specification of the control unit is superfluous in that case.
  • FIG. 4 shows a flowchart of an embodiment of the method for transmission of a process value. In step [0051] 40, a document in a markup language, for example HTML, is first loaded by the client computer. In step 41, a script coded in the HTML page is launched and, in step 42, loads a further document in a markup language, for example XML, assigned to the HTML page from the system server computer.
  • Using the address specifications in the XML document, in step [0052] 43 the script queries the corresponding data for the fields of the HTML document from the system server computer. In step 44, the system server computer then queries the corresponding data from the control unit or control units. In step 45, this data is then transferred from the system server computer to the client computer, and in step 46 it is displayed in the corresponding fields of the HTML page.
  • FIG. 5 shows an embodiment of the method according to the invention for transmission of an input value from a client computer to a control unit. In step [0053] 50, the input value is entered in one of the fields of the HTML document, for example field A (compare FIGS. 2 and 3). In step 51, this input value is assigned to a specific address, i.e. a particular control unit if a plurality of control units are present, and to a storage address on the control unit in question. This assignment of the input value to an address is made via the corresponding assignment of the input field to the address which is provided by means of a further document in a markup language (compare document 31 of FIGS. 2 and 3).
  • In step [0054] 52, the input value is transferred together with the address to the server and from there stored at the corresponding address.
  • FIG. 6 shows a further preferred embodiment of a control system for controlling a system [0055] 25. Elements of the control systems of FIG. 6 which correspond to elements of the control system from FIG. 2 are designated by the same reference characters.
  • In contrast to the control system from FIG. 2, table [0056] 32 is not part of the document 31, but is stored separately in the system server computer 27. Instead of that, the document 31 contains a table 36 for assigning current display values to the fields A, B, C, . . .
  • The system server computer [0057] 27 also includes a program 37. The program 37 generates the document 31 with the table 36 automatically by means of corresponding accesses to the SPS X, SPS Y, . . . using the table 32. A separate table 32 exists for each page 28.
  • Compared to the embodiment shown in FIG. 2, it is advantageous with the embodiment shown in FIG. 6 that the display values are transferred directly to the client and not the addresses which permit these values to be queried. Compared to the embodiment shown in FIG. 2, therefore, with the embodiment shown in FIG. 6 the load on the network [0058] 35 is reduced. This is achieved in particular in that the program 37 generates table 36 in document 31 on the server side by accessing table 32.
  • During operation of the system shown in FIG. 6, a user of the client computer [0059] 33 navigates by means of the browser 34 via the network 35 to the HTML document 28; for example the user selects a corresponding hypertext link or enters the URL of the document 28 into the browser 34.
  • The document [0060] 28 is then transferred via the network 35 to the client computer 33. The script 29 of the document 28 is also launched automatically on the client computer 33 and executed. The script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used.
  • The script [0061] 29 reads the pointer 30 of the document 28 and accesses the document 31 on the system server computer 27 by means of the corresponding URL. The program 37 then determines the addresses of the required values in the SPSs from table 32 and fetches the values via the fieldbus 26. The program 37 then generates the document 31, in which the table 36 is coded with field/value assignment. The document 31 is then transferred via the network 35 to the client computer 33.
  • The script [0062] 29 then reads out the assignments of the fields A, B and C to the values in table 36 and modifies the displayed elements of the HTML page 28 in the browser 34. The values can be displayed here for example as numeric values in HTML fields or a value can also be translated for example into a color change of an HTML element.
  • User inputs in the browser [0063] 34 can also be transferred from the client 33 to the system 25 in the same way. If a user has modified HTML fields of the HTML page 28 displayed in the browser 34, the script 29 generates a document 31 on the client 33, in which document 31 the table 36 is coded with the field/value assignment.
  • This document [0064] 31 is transferred from the client 33 to the system server 27. There, the program 37 interprets/translates the field names from table 36 into SPS addresses with the aid of table 32 and sends the values from table 37 via the fieldbus 26 to the corresponding SPSs.
  • Accordingly, it is also possible to vary the embodiment shown in FIG. 3 in such a way that the document [0065] 31 contains a table 36 with the field values. For this purpose the table 38 (cf. FIG. 3) is stored on the system server 27, and a corresponding program 37 generates the field values.
  • To sum up, the invention pertains to a control system with at least one control unit SPS X, SPS Y, . . . , a server computer, a first document in a markup language and a second document in a markup language for loading by a client computer, whereby the first document contains at least a field A, B, C, . . . and the second document contains data for assigning the field to an address of a control unit. [0066]

Claims (33)

  1. 1.-15. (cancelled)
  2. 16. A method for transmission of a process value from a control unit to a client computer, comprising:
    providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the process value;
    providing at least one access to a second document in a markup language, with the second document having data for assigning the field to an address of the control unit;
    assigning the field to the address of the control unit;
    assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning;
    querying the process value from the address; and
    transmitting the process value from the server computer to the client computer.
  3. 17. A method for transmission of an input value from a client computer to a control unit, comprising:
    providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the input value;
    providing at least one access to a second document in a markup language, the second document containing data for assigning the field to an address of the control unit;
    entering the input value into the field;
    assigning the field to the address of the control unit;
    assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning; and
    transmitting the input value from the server computer to the control unit.
  4. 18. A method according to claim 16, wherein the first document comprises a script.
  5. 19. A method according to claim 16, wherein a script of the first document executes a query of the database to determine the assignment of the first document to a second document.
  6. 20. A method according to claim 16, wherein the first document comprises a pointer to the second document.
  7. 21. A method according to claims 16, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
  8. 22. A method according to claims 16, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, the database containing an assignment of the designation to an address of the control unit.
  9. 23. A computer program product comprising computer-readable means for performing a method for transmission of a process value from a control unit to a client computer, the method comprising:
    providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the process value;
    providing at least one access to a second document in a markup language, with the second document having data for assigning the field to an address of the control unit;
    assigning the field to the address of the control unit;
    assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning;
    querying the process value from the address; and
    transmitting the process value from the server computer to the client computer.
  10. 24. A control system comprising:
    at least one control unit;
    a server computer;
    a first document in a markup language and a second document in a markup language for loading by a client computer, the first document comprising at least one field; and
    a first database for assigning the first and the second document on the server computer, the second document comprising data for assigning the field to an address of the control unit.
  11. 25. A control system according to claim 24, wherein the first document comprises a script.
  12. 26. A control system according to claim 24, wherein the first document has a pointer to the second document.
  13. 27. A control system according to claim 24, wherein the data for assigning the field to an address of the control unit has an address of the control unit.
  14. 28. A control system according to claim 24, wherein the data for assigning the field to an address of the control unit assigns a designation to the field and having a second database on the server computer for assigning the designation to the address of the control unit.
  15. 29. A method according to claim 17, wherein the first document comprises a script.
  16. 30. A method according to claim 17, wherein a script of the first document executes a query of the database to determine the assignment of the first document to a second document.
  17. 31. A method according to claim 29, wherein the script of the first document executes a query of the database to determine the assignment of the first document to a second document.
  18. 32. A method according to claim 18, wherein the script of the first document executes a query of the database in order to determine the assignment of the first document to a second document.
  19. 33. A method according to claim 17, wherein the first document contains a pointer to the second document.
  20. 34. A method according to claim 33 , wherein the pointer to the second document is a URL.
  21. 35. A method according to claim 18, wherein the first document contains a pointer to the second document.
  22. 36. A method according to claim 17, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
  23. 37. A method according to claim 29, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
  24. 38. A method according to claim 18, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
  25. 39. A method according to claim 17, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
  26. 40. A method according to claim 29, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
  27. 41. A method according to claim 18, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
  28. 42. A computer program product comprising computer-readable means for performing a method for transmission of an input value from a client computer to a control unit, comprising:
    providing at least one access to a first document in a markup language of a server computer, with the first document having at least one field for the input value;
    providing at least one access to a second document in a markup language, the second document containing data for assigning the field to an address of the control unit;
    entering the input value into the field;
    assigning the field to the address of the control unit;
    assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning; and
    transmitting the input value from the server computer to the control unit.
  29. 43. A computer program product according to claim 23, wherein the program for performing the method is executed on a control system.
  30. 44. A computer program product according to claim 42, wherein the program for performing the method is executed on a control system.
  31. 45. A control system according to claim 25, wherein the first document has a pointer to the second document.
  32. 46. A control system according to claim 45, wherein the pointer is a URL.
  33. 47. A control system according to claim 26, wherein the pointer is a URL.
US10489076 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user Abandoned US20040243842A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US15039299 true 1999-08-23 1999-08-23
US60150392 1999-08-23
US09535080 2000-03-23
US09535080 US6339423B1 (en) 1999-08-23 2000-03-23 Multi-domain access control
PCT/DE2002/003105 WO2003025714A3 (en) 2001-09-10 2002-08-23 System server computer and method for monitoring the input rights of a user
US10489076 US20040243842A1 (en) 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10489076 US20040243842A1 (en) 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user

Publications (1)

Publication Number Publication Date
US20040243842A1 true true US20040243842A1 (en) 2004-12-02

Family

ID=26847603

Family Applications (2)

Application Number Title Priority Date Filing Date
US09535080 Active US6339423B1 (en) 1999-08-23 2000-03-23 Multi-domain access control
US10489076 Abandoned US20040243842A1 (en) 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09535080 Active US6339423B1 (en) 1999-08-23 2000-03-23 Multi-domain access control

Country Status (4)

Country Link
US (2) US6339423B1 (en)
EP (1) EP1216533B1 (en)
ES (1) ES2409629T3 (en)
WO (1) WO2001015377A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060112020A1 (en) * 2004-11-19 2006-05-25 Karlheinz Dorn Generation and management of a rights context for order handling in technical processes
US20080289021A1 (en) * 2007-05-17 2008-11-20 Ashok Chandrasekhar Software application access method and system

Families Citing this family (200)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7403922B1 (en) 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US7096192B1 (en) * 1997-07-28 2006-08-22 Cybersource Corporation Method and system for detecting fraud in a credit card transaction over a computer network
US6965999B2 (en) * 1998-05-01 2005-11-15 Microsoft Corporation Intelligent trust management method and system
US7350226B2 (en) * 2001-12-13 2008-03-25 Bea Systems, Inc. System and method for analyzing security policies in a distributed computer network
US7155605B1 (en) * 1999-03-31 2006-12-26 Lenovo (Singapore) Pte. Ltd. Data processing system and method for maintaining secure data blocks
US7272855B1 (en) 1999-06-08 2007-09-18 The Trustees Of Columbia University In The City Of New York Unified monitoring and detection of intrusion attacks in an electronic system
US7140039B1 (en) * 1999-06-08 2006-11-21 The Trustees Of Columbia University In The City Of New York Identification of an attacker in an electronic system
US7013296B1 (en) 1999-06-08 2006-03-14 The Trustees Of Columbia University In The City Of New York Using electronic security value units to control access to a resource
US6745332B1 (en) * 1999-06-29 2004-06-01 Oracle International Corporation Method and apparatus for enabling database privileges
US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
US7058683B1 (en) 1999-07-20 2006-06-06 Sun Microsystems, Inc. Methods and apparatus for providing a virtual host in electronic messaging servers
US6778653B1 (en) * 1999-11-09 2004-08-17 Nortel Networks Limited Storing information about a telephony session
US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
US7137009B1 (en) * 2000-01-06 2006-11-14 International Business Machines Corporation Method and apparatus for securing a cookie cache in a data processing system
US20010047397A1 (en) * 2000-02-18 2001-11-29 Jameson David H. Method and system for using pervasive device to access webpages
US20020138728A1 (en) * 2000-03-07 2002-09-26 Alex Parfenov Method and system for unified login and authentication
JP3641590B2 (en) * 2000-03-13 2005-04-20 ヤフー株式会社 Access authentication system
US8239445B1 (en) * 2000-04-25 2012-08-07 International Business Machines Corporation URL-based sticky routing tokens using a server-side cookie jar
US7039699B1 (en) * 2000-05-02 2006-05-02 Microsoft Corporation Tracking usage behavior in computer systems
JP2003536128A (en) * 2000-05-15 2003-12-02 コミュニケーター インコーポレイテッド Method and system for providing an online industry hub
US7200863B2 (en) * 2000-05-16 2007-04-03 Hoshiko Llc System and method for serving content over a wide area network
JP2001338062A (en) * 2000-05-26 2001-12-07 Nec Corp System for controlling electronic medical record and method for the same
US7426530B1 (en) * 2000-06-12 2008-09-16 Jpmorgan Chase Bank, N.A. System and method for providing customers with seamless entry to a remote server
US20020077978A1 (en) * 2000-06-22 2002-06-20 The Chase Manhattan Bank Method and system for processing internet payments
US9038170B2 (en) 2000-07-10 2015-05-19 Oracle International Corporation Logging access system events
US8661539B2 (en) * 2000-07-10 2014-02-25 Oracle International Corporation Intrusion threat detection
US7134137B2 (en) * 2000-07-10 2006-11-07 Oracle International Corporation Providing data to applications from an access system
US7124203B2 (en) * 2000-07-10 2006-10-17 Oracle International Corporation Selective cache flushing in identity and access management systems
US7080077B2 (en) * 2000-07-10 2006-07-18 Oracle International Corporation Localized access
US7194764B2 (en) * 2000-07-10 2007-03-20 Oracle International Corporation User authentication
US7464162B2 (en) * 2000-07-10 2008-12-09 Oracle International Corporation Systems and methods for testing whether access to a resource is authorized based on access information
US7249369B2 (en) * 2000-07-10 2007-07-24 Oracle International Corporation Post data processing
US7711798B1 (en) * 2000-07-12 2010-05-04 Paltalk Holdings, Inc. Method and computer program for offering products and services by examining user activity
US7200869B1 (en) * 2000-09-15 2007-04-03 Microsoft Corporation System and method for protecting domain data against unauthorized modification
US6925497B1 (en) * 2000-09-26 2005-08-02 Microsoft Corporation Systems and methods for controlling the number of clients that access a server
US7051069B2 (en) * 2000-09-28 2006-05-23 Bea Systems, Inc. System for managing logical process flow in an online environment
US6898633B1 (en) * 2000-10-04 2005-05-24 Microsoft Corporation Selecting a server to service client requests
US6823391B1 (en) * 2000-10-04 2004-11-23 Microsoft Corporation Routing client requests to back-end servers
WO2002031702A1 (en) * 2000-10-09 2002-04-18 Enic Corporation Registering and using multilingual domain names
US7103556B2 (en) * 2000-11-02 2006-09-05 Jpmorgan Chase Bank, N.A. System and method for aggregate portfolio client support
US7093019B1 (en) * 2000-11-21 2006-08-15 Hewlett-Packard Development Company, L.P. Method and apparatus for providing an automated login process
US6718331B2 (en) * 2000-12-14 2004-04-06 International Business Machines Corporation Method and apparatus for locating inter-enterprise resources using text-based strings
US8095624B2 (en) * 2000-12-28 2012-01-10 CenterBeam Inc. Architecture for serving and managing independent access devices
US7171411B1 (en) 2001-02-28 2007-01-30 Oracle International Corporation Method and system for implementing shared schemas for users in a distributed computing system
US7062563B1 (en) * 2001-02-28 2006-06-13 Oracle International Corporation Method and system for implementing current user links
US7440962B1 (en) 2001-02-28 2008-10-21 Oracle International Corporation Method and system for management of access information
FR2821685A1 (en) * 2001-03-01 2002-09-06 Couponet S A Controlling access to web sites by issuing access tokens to regular site users to speed their access, while blocking access to other users, and so encouraging user loyalty
US7185364B2 (en) 2001-03-21 2007-02-27 Oracle International Corporation Access system interface
US7499948B2 (en) 2001-04-16 2009-03-03 Bea Systems, Inc. System and method for web-based personalization and ecommerce management
US20030217333A1 (en) * 2001-04-16 2003-11-20 Greg Smith System and method for rules-based web scenarios and campaigns
US20030041050A1 (en) * 2001-04-16 2003-02-27 Greg Smith System and method for web-based marketing and campaign management
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
US7020705B2 (en) * 2001-04-26 2006-03-28 Intel Corporation De-authenticating in security environments only providing authentication
US20030005308A1 (en) * 2001-05-30 2003-01-02 Rathbun Paul L. Method and system for globally restricting client access to a secured web site
WO2002099598A3 (en) 2001-06-07 2004-03-25 First Usa Bank Na System and method for rapid updating of credit information
US7392546B2 (en) * 2001-06-11 2008-06-24 Bea Systems, Inc. System and method for server security and entitlement processing
JP4301482B2 (en) * 2001-06-26 2009-07-22 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation Server, the information processing apparatus and the access control system and method thereof
US7421411B2 (en) * 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
US7266839B2 (en) * 2001-07-12 2007-09-04 J P Morgan Chase Bank System and method for providing discriminated content to network users
GB0118439D0 (en) * 2001-07-27 2001-09-19 Hewlett Packard Co Multi-domain authorisation and authentication
US20030037131A1 (en) * 2001-08-17 2003-02-20 International Business Machines Corporation User information coordination across multiple domains
US7920682B2 (en) * 2001-08-21 2011-04-05 Byrne William J Dynamic interactive voice interface
DE10144336A1 (en) * 2001-09-10 2003-04-03 Siemens Ag System server computer and method for verifying the rights for a user's input
US6976068B2 (en) * 2001-09-13 2005-12-13 Mcafee, Inc. Method and apparatus to facilitate remote software management by applying network address-sorting rules on a hierarchical directory structure
JP2003108520A (en) * 2001-09-28 2003-04-11 Canon Inc Information providing server, terminal device, its control method and information providing system
US7069581B2 (en) * 2001-10-04 2006-06-27 Mcafee, Inc. Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment
US20030074455A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Context aware server devices
US7240280B2 (en) * 2001-10-24 2007-07-03 Bea Systems, Inc. System and method for application flow integration in a portal framework
CA2919269A1 (en) * 2001-11-01 2003-05-08 Jpmorgan Chase Bank, N.A. System and method for establishing or modifying an account with user selectable terms
US7225256B2 (en) * 2001-11-30 2007-05-29 Oracle International Corporation Impersonation in an access system
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US7783765B2 (en) * 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US7260555B2 (en) * 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7565683B1 (en) * 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
USRE43906E1 (en) 2001-12-12 2013-01-01 Guardian Data Storage Llc Method and apparatus for securing digital assets
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US7661129B2 (en) * 2002-02-26 2010-02-09 Citrix Systems, Inc. Secure traversal of network components
US7725560B2 (en) 2002-05-01 2010-05-25 Bea Systems Inc. Web service-enabled portlet wizard
US7496687B2 (en) 2002-05-01 2009-02-24 Bea Systems, Inc. Enterprise application platform
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US20030226037A1 (en) * 2002-05-31 2003-12-04 Mak Wai Kwan Authorization negotiation in multi-domain environment
US8544084B2 (en) * 2002-08-19 2013-09-24 Blackberry Limited System and method for secure control of resources of wireless mobile communication devices
US7512810B1 (en) * 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
EP1552484B1 (en) * 2002-10-17 2013-03-13 Vodafone Group PLC Facilitating and authenticating transactions
US7568218B2 (en) * 2002-10-31 2009-07-28 Microsoft Corporation Selective cross-realm authentication
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US8301493B2 (en) * 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US7451217B2 (en) * 2002-12-19 2008-11-11 International Business Machines Corporation Method and system for peer-to-peer authorization
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US20040128559A1 (en) * 2002-12-31 2004-07-01 Zurko Mary Ellen Trusting security attribute authorities that are both cooperative and competitive
US8831966B2 (en) 2003-02-14 2014-09-09 Oracle International Corporation Method for delegated administration
US7653930B2 (en) 2003-02-14 2010-01-26 Bea Systems, Inc. Method for role and resource policy management optimization
US7591000B2 (en) * 2003-02-14 2009-09-15 Oracle International Corporation System and method for hierarchical role-based entitlements
US20040167871A1 (en) * 2003-02-20 2004-08-26 Bea Systems, Inc. Content mining for virtual content repositories
US20040167868A1 (en) * 2003-02-20 2004-08-26 Bea Systems, Inc. System and method for a virtual content repository
US7483904B2 (en) * 2003-02-20 2009-01-27 Bea Systems, Inc. Virtual repository content model
US20040167880A1 (en) * 2003-02-20 2004-08-26 Bea Systems, Inc. System and method for searching a virtual repository content
US7840614B2 (en) 2003-02-20 2010-11-23 Bea Systems, Inc. Virtual content repository application program interface
US7415478B2 (en) * 2003-02-20 2008-08-19 Bea Systems, Inc. Virtual repository complex content model
US7562298B2 (en) 2003-02-20 2009-07-14 Bea Systems, Inc. Virtual content repository browser
US7293286B2 (en) * 2003-02-20 2007-11-06 Bea Systems, Inc. Federated management of content repositories
US7941840B2 (en) * 2003-02-25 2011-05-10 Hewlett-Packard Development Company, L.P. Secure resource access
US7810036B2 (en) * 2003-02-28 2010-10-05 Bea Systems, Inc. Systems and methods for personalizing a portal
US8224887B2 (en) * 2003-03-26 2012-07-17 Authenticatid, Llc System, method and computer program product for authenticating a client
US7454786B2 (en) * 2003-03-27 2008-11-18 International Business Machines Corporation Method for integrated security roles
US8108920B2 (en) * 2003-05-12 2012-01-31 Microsoft Corporation Passive client single sign-on for web applications
US8108939B2 (en) * 2003-05-29 2012-01-31 Oracle International Corporation Method and apparatus to facilitate security-enabled content caching
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US20040268139A1 (en) * 2003-06-25 2004-12-30 Microsoft Corporation Systems and methods for declarative client input security screening
US7730543B1 (en) * 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US7472184B2 (en) * 2003-09-19 2008-12-30 International Business Machines Corporation Framework for restricting resources consumed by ghost agents
US8127366B2 (en) * 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
US7882132B2 (en) * 2003-10-09 2011-02-01 Oracle International Corporation Support for RDBMS in LDAP system
GB2406925B (en) * 2003-10-09 2007-01-03 Vodafone Plc Facilitating and authenticating transactions
US7904487B2 (en) * 2003-10-09 2011-03-08 Oracle International Corporation Translating data access requests
US20050097352A1 (en) * 2003-10-10 2005-05-05 Bea Systems, Inc. Embeddable security service module
US20050081055A1 (en) * 2003-10-10 2005-04-14 Bea Systems, Inc. Dynamically configurable distributed security system
US20050262362A1 (en) * 2003-10-10 2005-11-24 Bea Systems, Inc. Distributed security system policies
US20050086531A1 (en) * 2003-10-20 2005-04-21 Pss Systems, Inc. Method and system for proxy approval of security changes for a file security system
US20050138371A1 (en) * 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US7702909B2 (en) * 2003-12-22 2010-04-20 Klimenty Vainstein Method and system for validating timestamps
KR101058002B1 (en) * 2004-02-02 2011-08-19 삼성전자주식회사 The data recording and reproducing method under the domain management system
US7752322B2 (en) * 2004-03-19 2010-07-06 Sony Corporation System for ubiquitous network presence and access without cookies
US8613102B2 (en) * 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US7774601B2 (en) 2004-04-06 2010-08-10 Bea Systems, Inc. Method for delegated administration
US7236989B2 (en) * 2004-04-13 2007-06-26 Bea Systems, Inc. System and method for providing lifecycles for custom content in a virtual content repository
US7240076B2 (en) * 2004-04-13 2007-07-03 Bea Systems, Inc. System and method for providing a lifecycle for information in a virtual content repository
US7236990B2 (en) * 2004-04-13 2007-06-26 Bea Systems, Inc. System and method for information lifecycle workflow integration
US7475091B2 (en) * 2004-04-13 2009-01-06 Bea Systems, Inc. System and method for viewing a virtual content repository
US7580953B2 (en) * 2004-04-13 2009-08-25 Bea Systems, Inc. System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories
DE602005027061D1 (en) * 2004-04-23 2011-05-05 Panasonic Corp Server device, the client device and network system
US7707427B1 (en) 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US8689276B2 (en) * 2004-08-25 2014-04-01 Adobe Systems Incorporated System and method for controlling access to files
JP4737974B2 (en) * 2004-11-26 2011-08-03 株式会社東芝 Online shopping system and its user management equipment, net shop apparatus and the user terminal equipment
US8887233B2 (en) * 2005-04-08 2014-11-11 Netapp, Inc. Cookie-based acceleration of an authentication protocol
US8078740B2 (en) * 2005-06-03 2011-12-13 Microsoft Corporation Running internet applications with low rights
US8583926B1 (en) 2005-09-19 2013-11-12 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US20070073784A1 (en) * 2005-09-26 2007-03-29 Bea Systems, Inc. System and method for type inheritance for content management
US20070073673A1 (en) * 2005-09-26 2007-03-29 Bea Systems, Inc. System and method for content management security
US20070073674A1 (en) * 2005-09-26 2007-03-29 Bea Systems, Inc. System and method for providing federated events for content management systems
US7953734B2 (en) 2005-09-26 2011-05-31 Oracle International Corporation System and method for providing SPI extensions for content management system
US7752205B2 (en) * 2005-09-26 2010-07-06 Bea Systems, Inc. Method and system for interacting with a virtual content repository
US7818344B2 (en) * 2005-09-26 2010-10-19 Bea Systems, Inc. System and method for providing nested types for content management
US7483893B2 (en) * 2005-09-26 2009-01-27 Bae Systems, Inc. System and method for lightweight loading for managing content
US7917537B2 (en) * 2005-09-26 2011-03-29 Oracle International Corporation System and method for providing link property types for content management
CA2527550A1 (en) * 2005-11-24 2007-05-24 Oz Communications Method for securely associating data with https sessions
US7673135B2 (en) * 2005-12-08 2010-03-02 Microsoft Corporation Request authentication token
US8688813B2 (en) * 2006-01-11 2014-04-01 Oracle International Corporation Using identity/resource profile and directory enablers to support identity management
US20070226338A1 (en) * 2006-03-23 2007-09-27 Novell, Inc. Registration of peer-to-peer services
US8185737B2 (en) * 2006-06-23 2012-05-22 Microsoft Corporation Communication across domains
US8463852B2 (en) * 2006-10-06 2013-06-11 Oracle International Corporation Groupware portlets for integrating a portal with groupware systems
US8312507B2 (en) 2006-10-17 2012-11-13 A10 Networks, Inc. System and method to apply network traffic policy to an application session
US8584199B1 (en) 2006-10-17 2013-11-12 A10 Networks, Inc. System and method to apply a packet routing policy to an application session
CA2585808A1 (en) * 2007-03-26 2008-09-26 David Ker Method and system for implementing a secured and centrally managed virtual ip network on a common ip network infrastructure
JP4946564B2 (en) * 2007-03-27 2012-06-06 富士通株式会社 Authentication processing method and system
US7926095B1 (en) 2007-05-04 2011-04-12 Avaya Inc. Efficient authentication system for primary and secondary servers
US8473735B1 (en) 2007-05-17 2013-06-25 Jpmorgan Chase Systems and methods for managing digital certificates
US9769177B2 (en) * 2007-06-12 2017-09-19 Syracuse University Role-based access control to computing resources in an inter-organizational community
US10019570B2 (en) * 2007-06-14 2018-07-10 Microsoft Technology Licensing, Llc Protection and communication abstractions for web browsers
US9015279B2 (en) * 2007-06-15 2015-04-21 Bryte Computer Technologies Methods, systems, and computer program products for tokenized domain name resolution
US7924810B2 (en) * 2007-06-21 2011-04-12 Hewlett-Packard Development Company, L.P. Method and computing system for controlling access
KR20090067551A (en) * 2007-12-21 2009-06-25 삼성전자주식회사 Method and apparatus for using and limiting cluster-based contents, method and apparatus for authenticating access right of contents, and computer readable medium thereof
US7970939B1 (en) * 2007-12-31 2011-06-28 Symantec Corporation Methods and systems for addressing DNS rebinding
US8627493B1 (en) * 2008-01-08 2014-01-07 Juniper Networks, Inc. Single sign-on for network applications
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
KR100997802B1 (en) * 2008-10-20 2010-12-01 한국전자통신연구원 Apparatus and method for security managing of information terminal
US9288210B2 (en) * 2009-01-26 2016-03-15 Microsoft Technology Licensing, Llc Revocable object access
US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management
US9407959B2 (en) 2009-09-21 2016-08-02 Adobe Systems Incorporated Monitoring behavior with respect to a software program
US8584221B2 (en) 2009-10-23 2013-11-12 Microsoft Corporation Authenticating using cloud authentication
US8838962B2 (en) * 2010-09-24 2014-09-16 Bryant Christopher Lee Securing locally stored Web-based database data
EP2453631B1 (en) 2010-11-15 2016-06-22 BlackBerry Limited Data source based application sandboxing
US8875243B1 (en) * 2011-01-27 2014-10-28 Sprint Communications Company L.P. Identity abstraction providing limited cross-domain access
DE102011077218A1 (en) * 2011-06-08 2012-12-13 Siemens Aktiengesellschaft Access to data stored in a cloud
EP2575315A1 (en) * 2011-09-30 2013-04-03 British Telecommunications Public Limited Company Controlled access
US9386105B2 (en) * 2011-11-02 2016-07-05 Microsoft Technology Licensing, Llc Techniques for dynamic domain-based isolation
US9118619B2 (en) * 2011-11-07 2015-08-25 Qualcomm Incorported Prevention of cross site request forgery attacks by conditional use cookies
US9191405B2 (en) 2012-01-30 2015-11-17 Microsoft Technology Licensing, Llc Dynamic cross-site request forgery protection in a web-based client application
US9118618B2 (en) 2012-03-29 2015-08-25 A10 Networks, Inc. Hardware-based packet editor
US8887260B2 (en) 2012-10-25 2014-11-11 Facebook, Inc. Token-based access control
US9338225B2 (en) 2012-12-06 2016-05-10 A10 Networks, Inc. Forwarding policies on a virtual service network
US9286465B1 (en) * 2012-12-31 2016-03-15 Emc Corporation Method and apparatus for federated single sign on using authentication broker
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
US9992107B2 (en) 2013-03-15 2018-06-05 A10 Networks, Inc. Processing data packets using a policy based network path
US9942152B2 (en) 2014-03-25 2018-04-10 A10 Networks, Inc. Forwarding data packets using a service-based forwarding policy
US20170034172A1 (en) * 2015-07-30 2017-02-02 Cisco Technology, Inc. Token scope reduction

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6182142B2 (en) *
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US5968119A (en) * 1996-12-09 1999-10-19 Wall Data Incorporated Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation
US6061603A (en) * 1997-09-10 2000-05-09 Schneider Automation Inc. System for remotely accessing an industrial control system over a commercial communications network
US6073241A (en) * 1996-08-29 2000-06-06 C/Net, Inc. Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state
US6098093A (en) * 1998-03-19 2000-08-01 International Business Machines Corp. Maintaining sessions in a clustered server environment
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6185567B1 (en) * 1998-05-29 2001-02-06 The Trustees Of The University Of Pennsylvania Authenticated access to internet based research and data services
US6199113B1 (en) * 1998-04-15 2001-03-06 Sun Microsystems, Inc. Apparatus and method for providing trusted network security
US20010037469A1 (en) * 1999-05-11 2001-11-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US6393468B1 (en) * 1997-01-20 2002-05-21 British Telecommunications Public Limited Company Data access control
US20020072980A1 (en) * 2000-12-07 2002-06-13 Rabindranath Dutta System, method, and program for managing electronic shopping carts
US20020083178A1 (en) * 2000-08-11 2002-06-27 Brothers John David West Resource distribution in network environment
US20020109717A1 (en) * 2001-02-13 2002-08-15 International Business Machines Corporation Customizing a graphical user interface of a host application
US20020143861A1 (en) * 2001-04-02 2002-10-03 International Business Machines Corporation Method and apparatus for managing state information in a network data processing system
US20030023752A1 (en) * 2001-07-12 2003-01-30 International Business Machines Corporation Pluggable URL providers in a J2EE server
US6539424B1 (en) * 1999-11-12 2003-03-25 International Business Machines Corporation Restricting deep hyperlinking on the World Wide Web
US6985953B1 (en) * 1998-11-30 2006-01-10 George Mason University System and apparatus for storage and transfer of secure data on web
US7233997B1 (en) * 1997-06-26 2007-06-19 British Telecommunications Plc Data communications

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8916586D0 (en) 1989-07-20 1989-09-06 Int Computers Ltd Distributed data processing system
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
JP2977476B2 (en) * 1995-11-29 1999-11-15 株式会社日立製作所 Security method
WO1997026729A2 (en) * 1995-12-27 1997-07-24 Robinson Gary B Automated collaborative filtering in world wide web advertising
US6088016A (en) * 1996-12-30 2000-07-11 S3 Incorporated Dithering method and apparatus using ramp probability logic
US6006334A (en) * 1997-05-01 1999-12-21 International Business Machines Corp. Method and system for authentication over a distributed service to limit password compromise
US6170017B1 (en) * 1997-05-08 2001-01-02 International Business Machines Corporation Method and system coordinating actions among a group of servers
JP3180054B2 (en) 1997-05-16 2001-06-25 インターナショナル・ビジネス・マシーンズ・コーポレ−ション Network security system
US5999971A (en) * 1997-06-25 1999-12-07 Inforonics, Inc. Apparatus and method for identifying clients accessing network sites
CA2295150A1 (en) * 1997-06-26 1999-01-07 Michael John Kenning Data communications
US6065120A (en) * 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6145084A (en) * 1998-10-08 2000-11-07 Net I Trust Adaptive communication system enabling dissimilar devices to exchange information over a network

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6182142B2 (en) *
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US6073241A (en) * 1996-08-29 2000-06-06 C/Net, Inc. Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state
US5968119A (en) * 1996-12-09 1999-10-19 Wall Data Incorporated Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation
US6393468B1 (en) * 1997-01-20 2002-05-21 British Telecommunications Public Limited Company Data access control
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US7233997B1 (en) * 1997-06-26 2007-06-19 British Telecommunications Plc Data communications
US6061603A (en) * 1997-09-10 2000-05-09 Schneider Automation Inc. System for remotely accessing an industrial control system over a commercial communications network
US6098093A (en) * 1998-03-19 2000-08-01 International Business Machines Corp. Maintaining sessions in a clustered server environment
US6199113B1 (en) * 1998-04-15 2001-03-06 Sun Microsystems, Inc. Apparatus and method for providing trusted network security
US6185567B1 (en) * 1998-05-29 2001-02-06 The Trustees Of The University Of Pennsylvania Authenticated access to internet based research and data services
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6985953B1 (en) * 1998-11-30 2006-01-10 George Mason University System and apparatus for storage and transfer of secure data on web
US20010037469A1 (en) * 1999-05-11 2001-11-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US6539424B1 (en) * 1999-11-12 2003-03-25 International Business Machines Corporation Restricting deep hyperlinking on the World Wide Web
US20020083178A1 (en) * 2000-08-11 2002-06-27 Brothers John David West Resource distribution in network environment
US20020072980A1 (en) * 2000-12-07 2002-06-13 Rabindranath Dutta System, method, and program for managing electronic shopping carts
US20020109717A1 (en) * 2001-02-13 2002-08-15 International Business Machines Corporation Customizing a graphical user interface of a host application
US20020143861A1 (en) * 2001-04-02 2002-10-03 International Business Machines Corporation Method and apparatus for managing state information in a network data processing system
US20030023752A1 (en) * 2001-07-12 2003-01-30 International Business Machines Corporation Pluggable URL providers in a J2EE server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060112020A1 (en) * 2004-11-19 2006-05-25 Karlheinz Dorn Generation and management of a rights context for order handling in technical processes
US20080289021A1 (en) * 2007-05-17 2008-11-20 Ashok Chandrasekhar Software application access method and system
US7987516B2 (en) 2007-05-17 2011-07-26 International Business Machines Corporation Software application access method and system

Also Published As

Publication number Publication date Type
EP1216533A1 (en) 2002-06-26 application
ES2409629T3 (en) 2013-06-27 grant
EP1216533B1 (en) 2013-03-06 grant
WO2001015377A1 (en) 2001-03-01 application
US6339423B1 (en) 2002-01-15 grant
EP1216533A4 (en) 2007-10-24 application

Similar Documents

Publication Publication Date Title
US5961601A (en) Preserving state information in a continuing conversation between a client and server networked via a stateless protocol
US6456308B1 (en) Embedded web server
US6853867B1 (en) Interface to a programmable logic controller
US6209036B1 (en) Management of and access to information and other material via the world wide web in an LDAP environment
US6389422B1 (en) Method of relaying file object, distributed file system, computer readable medium recording a program of file object relay method and gateway computer, allowing reference of one same file object among networks
US6799195B1 (en) Method and apparatus for remote process control using applets
US7216298B1 (en) System and method for automatic generation of HTML based interfaces including alternative layout modes
US5790977A (en) Data acquisition from a remote instrument via the internet
US6819343B1 (en) Dynamic controls for use in computing applications
US7464381B1 (en) Content update proxy method
US6311101B1 (en) Method of operating an injection molding machine
US20020078102A1 (en) Method and system for customized modification and presentation of remotely saved web content
US20020103933A1 (en) Internet-access enabled device personalization
US20010009016A1 (en) Computer-based presentation manager and method for individual user-device data representation
US6647305B1 (en) Product design system and method
US20060168115A1 (en) Method and system of encapsulating web site transactions for computer-aided generation of web services
US7043537B1 (en) System and method for remote device management
US20020049831A1 (en) System for generating a web document
US6201996B1 (en) Object-oriented programmable industrial controller with distributed interface architecture
US20030083952A1 (en) Web-based imaging service providing the ability to specify a charge-back account
US20030050964A1 (en) Method and system for context manager proxy
US6567863B1 (en) Programmable controller coupler
US6480882B1 (en) Method for control and communication between computer systems linked through a network
US20050021839A1 (en) Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites
US20030140095A1 (en) Mechanism and method for sharing imaging information from an enterprise resource planning computing environment

Legal Events

Date Code Title Description
AS Assignment

Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHLERETH, MICHAEL;REEL/FRAME:015705/0654

Effective date: 20040226