WO1999015989A1 - Authentication and entitlement for users of web based data management programs - Google Patents
Authentication and entitlement for users of web based data management programsInfo
- Publication number
- WO1999015989A1 WO1999015989A1 PCT/US1998/020159 US9820159W WO1999015989A1 WO 1999015989 A1 WO1999015989 A1 WO 1999015989A1 US 9820159 W US9820159 W US 9820159W WO 1999015989 A1 WO1999015989 A1 WO 1999015989A1
- Authority
- WO
- Grant status
- Application
- Patent type
- Prior art keywords
- customer
- application
- server
- staroe
- user
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0769—Readable error formats, e.g. cross-platform generic formats, human understandable formats
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0775—Content or structure details of the error report, e.g. specific table structure, specific error fields
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0781—Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module, e.g. according to a severity level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0784—Routing of error reports, e.g. with a specific transmission path or data flow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor ; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/3089—Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
- G06F17/30893—Access to data in other repository systems, e.g. legacy data or dynamic Web page generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Metering, charging or billing arrangements specially adapted for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Metering, charging or billing arrangements specially adapted for data wireline or wireless communications
- H04L12/1428—Invoice generation, e.g. customization, lay-out, database processing, algorithms for calculating the bill or formatting invoices as WWW pages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
- H04L29/0602—Protocols characterised by their application
- H04L29/06027—Protocols for multimedia communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
- H04L41/0213—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization using standardized network management protocols, e.g. simple network management protocol [SNMP] or common management interface protocol [CMIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
- H04L41/0233—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization using object oriented techniques, e.g. common object request broker architecture [CORBA] for representation of network management data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
- H04L41/024—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization using relational databases for representation of network management data, e.g. managing via structured query language [SQL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/02—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization
- H04L41/0246—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization exchanging or transporting network management information using Internet, e.g. aspects relating to embedding network management web servers in network elements, web service for network management purposes, aspects related to Internet applications or services or web-based protocols, simple object access protocol [SOAP]
- H04L41/0253—Arrangements for maintenance or administration or management of packet switching networks involving integration or standardization exchanging or transporting network management information using Internet, e.g. aspects relating to embedding network management web servers in network elements, web service for network management purposes, aspects related to Internet applications or services or web-based protocols, simple object access protocol [SOAP] involving a browser or web-pages for accessing management information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0803—Configuration setting of network or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0879—Manual configuration through operator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
- H04L41/142—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/18—Arrangements involving CNM [Customer Network Management]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/22—Arrangements for maintenance or administration or management of packet switching networks using GUI [Graphical User Interface]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/28—Security in network management, e.g. restricting network management access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5019—Ensuring SLA
- H04L41/5022—Ensuring SLA by giving priorities, e.g. assigning classes of service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5035—Measuring contribution of individual network components to actual service level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5061—Customer care
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5061—Customer care
- H04L41/5064—Customer relationship management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5061—Customer care
- H04L41/5067—Customer-centric quality of service [QoS] measurement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5061—Customer care
- H04L41/5074—Handling of trouble tickets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/508—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer based on type of value added network service under agreement
- H04L41/5083—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer based on type of value added network service under agreement wherein the managed service relates to web hosting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/508—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer based on type of value added network service under agreement
- H04L41/5096—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer based on type of value added network service under agreement wherein the managed service relates to distributed or central networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/022—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using sampling of monitoring data, i.e. storing only a selection of packets
- H04L43/024—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using sampling of monitoring data, i.e. storing only a selection of packets using adaptive sampling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0805—Availability
- H04L43/0817—Availability functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0823—Errors
- H04L43/0829—Packet loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0807—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/162—Implementing security features at a particular protocol layer at the data link layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or paths for security, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
- H04L65/4007—Services involving a main real-time session and one or more additional parallel sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/80—QoS aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/41—Billing record details, i.e. parameters, identifiers, structure of call data record [CDR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/43—Billing software details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/44—Augmented, consolidated or itemized billing statement or bill presentation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/49—Connection to several service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/51—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for resellers, retailers or service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/58—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP based on statistics of usage or network monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/705—Account settings, e.g. limits or numbers or payment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/72—Administration or customization aspects; Counter-checking correct charges by the user
- H04M15/721—Administration or customization aspects; Counter-checking correct charges by the user using the Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/745—Customizing according to wishes of subscriber, e.g. friends or family
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8044—Least cost routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/835—Time or frequency of notifications, e.g. Advice of Charge [AoC]
- H04M15/8351—Time or frequency of notifications, e.g. Advice of Charge [AoC] before establishing a communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/84—Types of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/5175—Call or contact centers supervision arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/50—Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
- H04M3/51—Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
- H04M3/5183—Call or contact centers with computer-telephony arrangements
- H04M3/5191—Call or contact centers with computer-telephony arrangements interacting with the Internet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
- G06F11/0754—Error or fault detection not based on redundancy by exceeding limits
- G06F11/0757—Error or fault detection not based on redundancy by exceeding limits by exceeding a time limit, i.e. time-out, e.g. watchdogs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/202—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/328—Computer systems status display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/81—Threshold
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/875—Monitoring of systems including the internet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
- H04L41/0681—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms involving configuration of triggering conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/08—Configuration management of network or network elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5003—Managing service level agreement [SLA] or interaction between SLA and quality of service [QoS]
- H04L41/5009—Determining service level performance, e.g. measuring SLA quality parameters, determining contract or guarantee violations, response time or mean time between failure [MTBF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5029—Service quality level based billing, e.g. dependent on measured service level customer is charged more or less
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5032—Generating service level reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/04—Processing of captured monitoring data
- H04L43/045—Processing of captured monitoring data for graphical visualization of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/062—Report generation for traffic related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/065—Report generation for device related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/06—Report generation
- H04L43/067—Report generation for time frame related reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0805—Availability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0805—Availability
- H04L43/0811—Connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0823—Errors
- H04L43/0847—Transmission error
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0876—Network utilization
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0876—Network utilization
- H04L43/0888—Throughput
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
- H04L43/0876—Network utilization
- H04L43/0894—Packet rate
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/10—Arrangements for monitoring or testing packet switching networks using active monitoring, e.g. heartbeat protocols, polling, ping, trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/10—Arrangements for monitoring or testing packet switching networks using active monitoring, e.g. heartbeat protocols, polling, ping, trace-route
- H04L43/106—Arrangements for monitoring or testing packet switching networks using active monitoring, e.g. heartbeat protocols, polling, ping, trace-route by adding timestamps to packets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/16—Arrangements for monitoring or testing packet switching networks using threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0815—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0104—Augmented, consolidated or itemised billing statement, e.g. additional billing information, bill presentation, layout, format, e-mail, fax, printout, itemised bill per service or per account, cumulative billing, consolidated billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0108—Customization according to wishes of subscriber, e.g. customer preferences, friends and family, selecting services or billing options, Personal Communication Systems [PCS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0152—General billing plans, rate plans, e.g. charge rates, numbering plans, rate centers, customer accounts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0164—Billing record, e.g. Call Data Record [CDR], Toll Ticket[TT], Automatic Message Accounting [AMA], Call Line Identifier [CLI], details, i.e. parameters, identifiers, structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0168—On line or real-time flexible customization or negotiation according to wishes of subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0176—Billing arrangements using internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/018—On-line real-time billing, able to see billing information while in communication, e.g. via the internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0188—Network monitoring; statistics on usage on called/calling number
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/42—Least cost routing, i.e. provision for selecting the lowest cost tariff
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/46—Connection to several service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/54—Resellers-retail or service providers billing, e.g. agreements with telephone service operator, activation, charging/recharging of accounts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/70—Administration aspects, modify settings or limits or counter-check correct charges
- H04M2215/7009—Account settings, e.g. users, terminals, limits, numbers or payment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/70—Administration aspects, modify settings or limits or counter-check correct charges
- H04M2215/7036—Administer via user
- H04M2215/7045—Using Internet or WAP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/74—Rating aspects, e.g. rating parameters or tariff determination apects
- H04M2215/745—Least cost routing, e.g. Automatic or manual, call by call or by preselection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/81—Notifying aspects, e.g. notifications or displays to the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/81—Notifying aspects, e.g. notifications or displays to the user
- H04M2215/8104—Time or frequency of notification
- H04M2215/8108—Time or frequency of notification before establishing a communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/81—Notifying aspects, e.g. notifications or displays to the user
- H04M2215/8129—Type of notification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/82—Advice-of-Charge [AOC], i.e. notify subscriber of charges/cumulative charge; meter at the substation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S379/00—Telephonic communications
- Y10S379/90—Internet, e.g. Internet phone, webphone, internet-based telephony
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99937—Sorting
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99938—Concurrency, e.g. lock management in shared database
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S715/00—Data processing: presentation processing of document, operator interface processing, and screen saver display processing
- Y10S715/961—Operator interface with visual structure or function dictated by intended use
- Y10S715/965—Operator interface with visual structure or function dictated by intended use for process control and configuration
- Y10S715/969—Network layout and operation interface
Abstract
Description
AUTHENTICATION AND ENTITLEMENT FOR USERS OF WEB BASED DATA MANAGEMENT PROGRAMS
The present invention relates in general to application software, and more specifically to Web- based system administrative software servicing local and a remote suite of applications in a communications network .
System administrative software is generally known in the information systems industry. This type of software normally provides functions for adding and deleting users, file system management such as backups and version controls, and user security control. The system administrative functions provided by the known software, however, are usually limited to a specific computer platform or even a specific service product. For example, telecommunications service providers offer many different services which have been developed independently over time, and which operate on different computer platforms. Each of the applications associated with different services usually implements its own system administration functions for the related service product separately from the others. Thus, when a customer needs to order or perform administrative functions in more than one service product, the customer is forced to exit the first application before beginning an operation on the second application. Moreover, when using the second service product, the customer must then reenter some of the same information previously entered while using the first service product. Therefore, it is desirable to have a centralized order entry and system administrative infrastructure for handling common functions and associated data for a number of product services.
In addition, with the existing software, a customer support team interaction is usually necessary to complete the order entry and administrative process. Therefore, it is also desirable to have fully automated system administrative software, which automatically connects to the associated back-end systems and updates the back-end databases as necessary. Furthermore, the fully automated order entry system minimizes human intervention during the fulfillment processing for each order entry requested by a customer, resulting in cost and time savings. In conventional systems, a connection is made with a large legacy system via a dial-up connection from a customer owned personal computer or workstation. This connection frequently, although not always, emulates a terminal addressable by the legacy systems. The dial-up access requires custom software on the customer workstation to provide dial-up services, communication services, emulation and/or translation services and generally some resident custom form of the legacy application to interface with the midrange or mainframe computer running the legacy system.
There are several problems associated with the approach. First, the aforementioned software is very hardware dependent, requiring multiple versions of software compatible with each of a wide range of workstations customers generally have. Therefore, extensive inventory for distribution becomes necessary. If the customer hardware platform changes through an upgrade, the software licensing issues must be renegotiated. Moreover, installing the software generally requires an intensive effort on the customer and the software support team before any reliable and secure sessions are possible.
Secondly, dial-up, modem, and communications software interact with each other in many ways which are not always predictable to a custom application, requiring extensive trouble shooting and problem solving for an enterprise desiring to make the legacy system available to the customer, particularly where various telephone exchanges, dialing standards or signal standards are involved.
Thirdly, although more businesses are turning to the Internet to improve customer service and lower costs by providing Web-based support systems, when an enterprise desires to make more than one system available to the customer, the custom application for one legacy system is not able to connect to a different legacy system, and the customer must generally logoff and logon to switch from one to the other. The delivery technology used by the two legacy systems may be different, requiring different interface standards, and different machine level languages may be used by the two systems, as for example, the 96 character EBCDIC language used by IBM, and the 127 ASCII character language used by contemporary personal computers. Therefore, an integrated and unified Web-based system for providing an access to a number of different legacy systems in one session is desired.
Finally, the security and entitlement features of the various legacy systems may be completely different, and vary from system to system and platform to platform. It is therefore, desired to provide connectivity to enterprise legacy systems over the public Internet, as the Internet provides access connectivity world wide via the TCP/IP protocol, without need to navigate various telephone exchanges, dialing standards or signal standards.
The popularity of the public Internet provides a measure of platform independence for the customer, as the customer can run their own Internet Web browser and utilize their own platform connection to the Internet to enable services. This resolves many of the platform hardware and connectivity issues in the customers favor, and leaves the choice of platform and operating system to the customer. Web- based programs can minimize the need for training and support since they utilize existing client software, i.e., a browser, which the user has already installed and already knows how to use. Moreover, there is no longer a need to produce and distribute voluminous hard copies of documentation including software user guides. Further, if the customer later changes that platform, then, as soon as the new platform is Internet enabled, service is restored to the customer. The connectivity and communications software burden is thus resolved in favor of standard and readily available hardware and the browser and software used by the public Internet connection.
An Internet delivered paradigm obviates many of the installation and configuration problems involved with initial setup and configuration of a customer workstation, since the custom application required to interface with the legacy system can be delivered via the pubic Internet and run within a standard Web-browser, reducing application compatibility issues to browser compatibility issues. The Web-based fully automated order entry system simplifies many of the fulfillment issues since the customers need not be provided with additional software and software user guides, other then a web browser.
For the enterprise, the use of off-the-shelf Web browsers by the customer significantly simplifies the enterprise burden by limiting the client development side to screen layout designs and data presentation tools that use a common interface enabled by the Web browser. Software development and support resources are thus available for the delivery of the enterprise legacy services and are not consumed by a need for customer support at the workstation level.
The present invention is to provide a Web- based, on-line application system for processing system administrative and order entry functions for an integrated suite of services and products over the Internet. For example, a suite of products and services may include personal communications services such as pagers, cellular phones, and voice mail, traditional wireline services, and Internet access. Other services include Toll Free Number Network and conferencing. Integrating these products and services and providing an online system for order entry and administration over the Internet allow improved flexibility to a customer when managing their telecommunications accounts. For instance, the customer may effect desired changes in their accounts, in real time and instantaneously, by utilizing the system of the present invention. Moreover, the customer may instantaneously order additional services over the Internet via the system of the present invention .
The present invention also handles the security and authentication requests from both the client and the server side of the applications implementing the suite of products and services. In this way, a single security profile may be maintained for a given customer, the security profile being included in a centralized database servicing the suite of disparate products and services.
Furthermore, the present invention provides a real time transaction capabilities for notifying the client and server sides of applications implementing the suite of products and services, of the modificanions effected by the customer using the system of the present invention. Upon receiving the notifications, the applications may update their data with the modifications effected, such that all data maintained about the customer are kept synchronized at all times.
Additionally, the present invention includes a reconciliation process, which may be run periodically, for example, on a daily basis, for retrieving data from the mainframe database in order to refresh all data relating to customer information, such that the data stored in the present invention is kept up-to-date and synchronized with the mainframe system.
Moreover, the present invention provides a fulfillment process for notifying a fulfillment house of all new customers added to the system. The fulfillment house then may send a welcome package including subscription information to the new customers as necessary. The present invention also includes a billing process for directing billing information to different billing streams as desired by the customer.
The above features provided by the present invention are attained preferably with a Web-based centralized authentication and entitlement administration system for enabling a customer to enter orders over the Internet from a client terminal for one or more application services available at an enterprise Intranet. The system includes a client browser application running in a client workstation and providing an integrated interface to the one or more application services. The client browser application provides a graphical user interface for interacting with the customer. Additionally, an order entry server located at the enterprise Intranet is provided. The order entry server communicates over the Internet with the client browser application to provide authentication and entitlement information associated with the customer. The client browser application uses the authentication and entitlement information associated with the customer and applies the authentication information in validating the customer before enabling the customer to access the enterprise Intranet. The client browser application enables the customer to access only those application services to which the customer is entitled. An order entry object initiated via the client browser application is also included for enabling presentation of entry options for the customer, the entry options including adding a new order entry, modifying an existing order entry, and canceling an order entry. The order entry object further communicates customer entry of a specific entry option to the order entry server, thus allowing the customer to enter new orders, modify existing orders, and cancel orders for the application services within the customer entitlements via the integrated interface. Preferred embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which:
Figure 1 illustrates the software architecture component comprising a three- tiered structure;
Figure 2 is a diagrammatic overview of the software architecture of the networkMCI Interact system; Figure 3 is an illustrative example of a backplane architecture schematic;
Figure 4 illustrates an example client GUI presented to the client/customer as a browser web page; Figure 5 is a diagram depicting the physical networkMCI Interact system architecture;
Figures 6 and 7 illustrate an architectural overview for the system of the present invention; Figure 8 illustrates an example of a fulfillment letter sent to a customer;
Figure 9 illustrates message class diagram showing relationship among the classes utilized in the present invention;
Figure 10 is an illustrative example of an order entry process flow in the system of the present invention; Figure 11 is an input process flow diagram, illustrating inputs to the system of the present invention;
Figure 12 is an output process flow diagram, illustrating outputs from the system of the present invention;
Figure 13 illustrates message formats used in transaction requests and responses communicated to and from the client and server applications in the system of the present invention;
Figure 14 is a diagram illustrating data flow interface with the fulfillment house in the system of the present invention;
Figure 15 is a diagram illustrating data flow interface with the Reporting application;
Figure 16 is a diagram illustrating data flow interface with the Toll Free Network Manager application;
Figure 17 is a diagram illustrating data flow interface with the Broadband application;
Figure 18 is an example of a StarOE main window which is launched from the "networkMCI Interact" home page;
Figure 19 illustrates a dialog box presented to a user from the StarOE main window for selecting an enterprise;
Figure 20 illustrates an example of a new/modify users screen used for setting up new users or modifying options available to the existing users; Figure 21 illustrates a typical screen for setting up Toll Free Network Manager (TFNM) security;
Figure 22 is a sample StarOE screen for adding and modifying reporting options which are used by the StarWRS; Figure 23 is a sample of the StarOE access setup screen; and
Figure 24 illustrates a toll free network manager setup dialogue selected from the main window. An overview of the Web -enabled integrated system
The present invention is one component of an integrated suite of customer network management and report applications using a Web browser paradigm. Known as the networkMCI Interact system ( "nMCI
Interact") such an integrated suite of Web -based applications provides an invaluable tool for enabling customers to manage their telecommunication assets, quickly and securely, from anywhere in the world. The nMCI Interact system architecture is basically organized as a set of common components comprising the following: 1) an object-oriented software architecture detailing the client and server based aspect of nMCI Interact ;
2) a network architecture defining the physical network needed to satisfy the security and data volume requirements of the networkMCI System;
3) a data architecture detailing the application, back-end or legacy data sources available for networkMCI Interact; and 4) an infrastructure covering security, order entry, fulfillment, billing, self -monitoring, metrics and support.
Each of these common component areas will be generally discussed hereinbelow. Figure 1 is a diagrammatic illustration of the software architecture component in which the present invention functions. A first or client tier 10 of software services are resident on a customer workstation 10 and provides customer access to the enterprise system, having one or more downloadable application objects directed to front-end business logic, one or more backplane service objects for managing sessions, one or more presentation services objects for the presentation of customer options and customer requested data in a browser recognizable format and a customer supplied browser for presentation of customer options and data to the customer and for internet communications over the public Internet. Additional applications are directed to front -end services such as the presentation of data in the form of tables and charts, and data processing functions such as sorting and summarizing in a manner such that multiple programs are combined in a unified application suite. A second or middle tier 16, is provided having secure web servers and back-end services to provide applications that establish user sessions, govern user authentication and their entitlements, and communicate with adaptor programs to simplify the interchange of data across the network.
A third or back-end tier 18 having applications directed to legacy back-end services including database storage and retrieval systems and one or more database servers for accessing system resources from one or more legacy hosts.
Generally, the customer workstation includes client software capable of providing a platform- independent, browser-based, consistent user interface implementing objects programmed to provide a reusable and common GUI abstraction and problem- domain abstractions. More specifically, the client- tier software is created and distributed as a set of Java classes including the applet classes to provide an industrial strength, object-oriented environment over the Internet. Application- specific classes are designed to support the functionality and server interfaces for each application with the functionality delivered through the system being of two- types: 1) cross-product, for example, inbox and reporting functions, and 2) product specific, for example, toll free network management or call management functions. The system is capable of delivering to customers the f nctionality appropriate to their product mix.
Figure 2 is a diagrammatic overview of the software architecture of the networkMCI Interact system including: the Customer Browser (a.k.a. the Client) 20; the Demilitarized Zone (DMZ) 17 comprising a Web Servers cluster 24; the MCI Intranet Dispatcher Server 26; and the MCI Intranet Application servers 30, and the data warehouses, legacy systems, etc. 40. The Customer Browser 20, is browser enabled and includes client applications responsible for presentation and front -end services. Its functions include providing a user interface to various MCI services and supporting communications with MCI's Intranet web server cluster 24. As illustrated in Figure 3, the client tier software is responsible for presentation services to the customer and generally includes a web browser 14 and additional object- oriented programs residing in the client workstation platform 20. The client software is generally organized into a component architecture with each component generally comprising a specific application, providing an area of functionality. The applications generally are integrated using a "backplane" services layer 12 which provides a set of services to the application objects that provide the front -end business logic. The backplane services layer 12 also manages the launching of the application objects. The networkMCI Interact common set of objects provide a set of services to each of the applications. The set of services include: 1) session management; 2) application launch; 3) inter-application communications; 4) window navigation among applications; 5) log management; and 6) version management .
The primary common object services include: graphical user interface (GUI); communications; printing; user identity, authentication, and entitlements; data import and export; logging and statistics; error handling; and messaging services. Figure 3 is a diagrammatic example of a backplane architecture scheme illustrating the relationship among the common objects. In this example, the backplane services layer 12 is programmed as a Java applet which may be loaded and launched by the web browser 14. With reference to Figure 3, a typical user session starts with a web browser 14 creating a backplane 12, after a successful logon. The backplane 12, inter alia, presents a user with an interface for networkMCI Interact application management. A typical user display provided by the backplane 12 may show a number of applications the user is entitled to run, each application represented by buttons depicted in Figure 3 as buttons 58a, b,c selectable by the user. As illustrated in Figure 3, upon selection of an application, the backplane 12 launches that specific application, for example, Service Inquiry 54a or Event Monitor 54b, by creating the application object. In processing its functions, each application in turn, may utilize common object services provided by the backplane 12. Figure 3 shows graphical user interface objects 56a, b created and used by a respective application 54a, b for its own presentation purposes. Figure 4 illustrates an example client GUI presented to the client/customer as a browser web page 250 providing, for example, a suite 252 of network management reporting applications including: MCI Traffic Monitor 252c; Call Manager 252f; a Network Manager 252e and Online Invoice 252i. Access to network functionality is also provided through Report Requester 252b, which provides a variety of detailed reports for the client/customer and a Message Center 252a for providing enhancements and functionality to traditional e-mail communications.
As shown in Figures 3 and 4 , the browser resident GUI of the present invention implements a single object, COBackPlane which keeps track of all the client applications, and which has capabilities to start, stop, and provide references to any one of the client applications.
The backplane 12 and the client applications use a browser 14 such as the Microsoft Explorer versions 4.0.1 or higher for an access and distribution mechanism. Although the backplane is initiated with a browser 14, the client applications are generally isolated from the browser in that they typically present their user interfaces in a separate frame, rather than sitting inside a Web page. The backplane architecture is implemented with several primary classes. These classes include COBackPlane, COApp, COAppImpl, COParm. and COAppFrame classes. COBackPlane 12 is an application backplane which launches the applications 54a, 54b, typically implemented as COApp. COBackPlane 12 is generally implemented as a Java applet and is launched by the Web browser 14. This backplane applet is responsible for launching and closing the COApps . When the backplane is implemented as an applet, it overrides standard Applet methods init(), start (), stopO and run ( ) . In the init() method, the backplane applet obtains a COUser user context object. The COUser object holds information such as user profile, applications and their entitlements. The user's configuration and application entitlements provided in the COUser context are used to construct the application toolbar and Inbox applications. When an application toolbar icon is clicked, a particular
COApp is launched by launchAppO method. The launched application then may use the backplane for inter - application communications, including retrieving Inbox data. The COBackPlane 12 includes methods for providing a reference to a particular COApp, for interoperation. For example, the COBackPlane class provides a getAppO method which returns references to application objects by name. Once retrieved in this manner, the application object's public interface may be used directly.
As shown in Figure 2, the aforesaid objects will communicate the data by establishing a secure TCP messaging session with one of the DMZ networkMCI Interact Web servers 24 via an Internet secure communications path 22 established, preferably, with a secure sockets SSL version of HTTPS . The DMZ networkMCI Interact Web servers 24 function to decrypt the client message, preferably via the SSL implementation, and unwrap the session key and verify the users session. After establishing that the request has come from a valid user and mapping the request to its associated session, the DMZ Web servers 24 re -encrypt the request using symmetric encryption and forward it over a second socket connection 23 to the dispatch server 26 inside the enterprise Intranet. A networkMCI Interact session is designated by a logon, successful authentication, followed by use of server resources, and logoff. However, the world- wide web communications protocol uses HTTP, a stateless protocol, each HTTP request and reply is a separate TCP/IP connection, completely independent of all previous or future connections between the same server and client. The nMCI Interact system is implemented with a secure version of HTTP such as S- HTTP or HTTPS, and preferably utilizes the SSL implementation of HTTPS. The preferred embodiment uses SSL which provides a cipher spec message which provides server authentication during a session. The preferred embodiment further associates a given HTTPS request with a logical session which is initiated and tracked by a "cookie jar server" 28 to generate a "cookie" which is a unique server-generated key that is sent to the client along with each reply to a HTTPS request. The client holds the cookie and returns it to the server as part of each subsequent HTTPS request. As desired, either the Web servers 24, the cookie jar server 28 or the Dispatch Server 26, may maintain the "cookie jar" to map these keys to the associated session. A separate cookie jar server 28, as illustrated in Figure 2 has been found desirable to minimize the load on the dispatch server 26. This form of session management also functions as an authentication of each HTTPS request, adding an additional level of security to the overall process.
As illustrated in Figure 2, after one of the DMZ Web servers 24 decrypts and verifies the user session, it forwards the message through a firewall
25b over a TCP/IP connection 23 to the dispatch server 26 on a new TCP socket while the original socket 22 from the browser is blocking, waiting for a response. The dispatch server 26 unwraps an outer protocol layer of the message from the DMZ services cluster 24, and re -encrypts the message with symmetric encryption and forwards the message to an appropriate application proxy via a third TCP/IP socket 27. While waiting for the proxy response all three of the sockets 22, 23, 27 block on a receive. Specifically, once the message is decrypted, the wrappers are examined to reveal the user and the target middle- tier (Intranet application) service for the request. A first -level validation is performed, making sure that the user is entitled to communicate with the desired service. The user's entitlements in this regard are fetched by the dispatch server 26 from the StarOE server 49, the server component of the present invention, at logon time and cached. If the requestor is authorized to communicate with the target service, the message is forwarded to the desired service's proxy. Each application proxy is an application specific daemon which resides on a specific Intranet server, shown in Figure 2 as a suite of mid- range servers 30. Each
Intranet application server of suite 30 is generally responsible for providing a specific back-end service requested by the client, and, is additionally capable of requesting services from other Intranet application servers by communicating to the specific proxy associated with that other application server. Thus, an application server not only can offer its browser a client to server interface through the proxy, but also may offer all its services from its proxy to other application servers. In effect, the application servers requesting services are acting as clients to the application servers providing the services. Such mechanism increases the security of the overall system as well as reducing the number of interfaces.
The network architecture of Figure 2 may also include a variety of application specific proxies having associated Intranet application servers including: a StarOE proxy for the StarOE application server 39 for handling authentication order entry/billing; an Inbox proxy for the Inbox application server 31, which functions as a container for completed reports, call detail data and marketing news messages; a Report Manager proxy capable of communicating with a system- specific Report Manager server 32 for generation, management and receipt notification of customized reports; a Report Scheduler proxy for performing the scheduling and requests of the customized reports. The customized reports include, for example: call usage analysis information provided from the StarODS server 33; network traffic analysis/monitor information provided from the Traffic view server 34; virtual data network alarms and performance reports provided by Broadband server 35; trouble tickets for switching, transmission and traffic faults provided by Service Inquiry server 36; and toll free routing information provided by Toll Free Network Manager server 37.
As partially shown in Figure 2, it is understood that each Intranet server of suite 30 communicates with one or several consolidated network databases which include each customer's network management information and data. For example, the
Services Inquiry server 36 includes communication with MCI's Customer Service Management legacy platform 40 (a) . Such network management and customer network data is additionally accessible by authorized MCI management personnel . As shown in Figure 2 , other legacy platforms 40(b), 40(c) and 40(d) may also communicate individually with the Intranet servers for servicing specific transactions initiated at the client browser. The illustrated legacy platforms 40 (a) -(d) are illustrative only and it is understood other legacy platforms may be interpreted into the network architecture illustrated in Figure 2 through an intermediate midrange server 30.
Each of the individual proxies may be maintained on the dispatch server 26, the related application server, or a separate proxy server situated between the dispatch server 26 and the midrange server 30. The relevant proxy waits for requests from an application client running on the customer's workstation 10 and then services the request, either by handling them internally or forwarding them to its associated Intranet application server 30. The proxies additionally receive appropriate responses back from an Intranet application server 30. Any data returned from the Intranet application server 30 is translated back to client format, and returned over the internet to the client workstation 10 via the Dispatch Server 26 and at one of the web servers in the DMZ Services cluster 24 and a secure sockets connection. When the resultant response header and trailing application specific data are sent back to the client browser from the proxy, the messages will cascade all the way back to the browser 14 in real time, limited only by the transmission latency speed of the network.
The networkMCI Interact middle tier software includes a communications component offering three (3) types of data transport mechanisms: 1) Synchronous; 2) Asynchronous; and 3) Bulk transfer. Synchronous transaction is used for situations in which data will be returned by the application server 40 quickly. Thus, a single TCP connection will be made and kept open until the full response has been retrieved.
Asynchronous transaction is supported generally for situations in which there may be a long delay in application server 40 response. Specifically, a proxy will accept a request from a customer or client 10 via an SSL connection and then respond to the client 10 with a unique identifier and close the socket connection. The client 10 may then poll repeatedly on a periodic basis until the response is ready. Each poll will occur on a new socket connection to the proxy, and the proxy will either respond with the resultant data or, respond that the request is still in progress. This will reduce the number of resource consuming TCP connections open at any time and permit a user to close their browser or disconnect a modem and return later to check for results .
Bulk transfer is generally intended for large data transfers and are unlimited in size. Bulk transfer permits cancellation during a transfer and allows the programmer to code resumption of a transfer at a later point in time.
Figure 5 is a diagram depicting the physical networkMCI Interact system architecture 10. As shown in Figure 5, the system is divided into three major architectural divisions including: 1) the customer workstation 20 which include those mechanisms enabling customer connection to the Secure web servers 24; 2) a secure network area 17, known as the DeMilitarized Zone "DMZ" set aside on MCI premises double firewalled between the both the public Internet 25 and the MCI Intranet to prevent potentially hostile customer attacks; and, 3) the MCI Intranet Midrange Servers 30 and Legacy Mainframe Systems 40 which comprise the back-end business logic applications.
As illustrated in Figure 5, the present invention includes a double or complex firewall system that creates a "demilitarized zone" (DMZ) between two firewalls 25a, 25b. In the preferred embodiment, one of the firewalls 29 includes port specific filtering routers, which may only connect with a designated port on a dispatch server within the DMZ. The dispatch server connects with an authentication server, and through a proxy firewall to the application servers. This ensures that even if a remote user ID and password are hijacked, the only access granted is to one of the web servers 24 or to intermediate data and privileges authorized for that user. Further, the hijacker may not directly connect to any enterprise server in the enterprise intranet, thus ensuring internal company system security and integrity. Even with a stolen password, the hijacker may not connect to other ports, root directories or applications within the enterprise system.
The DMZ acts as a double firewall for the enterprise intranet because the web servers located in the DMZ never store or compute actual customer sensitive data. The web servers only put the data into a form suitable for display by the customer's web browser. Since the DMZ web servers do not store customer data, there is a much smaller chance of any customer information being jeopardized in case of a security breach.
As previously described, the customer access mechanism is a client workstation 20 employing a Web browser 14 for providing the access to the networkMCI Interact system via the public Internet 15. When a subscriber connects to the networkMCI Interact Web site by entering the appropriate URL, a secure TCP/IP communications link 22 is established to one of several Web servers 24 located inside a first firewall 25a in the DMZ 17. Preferably at least two web servers are provided for redundancy and failover capability. In the preferred embodiment of the invention, the system employs SSL encryption so that communications in both directions between the subscriber and the networkMCI Interact system are secure.
In the preferred embodiment, all DMZ Secure Web servers 24 are preferably DEC 4100 systems having Unix or NT-based operating systems for running services such as HTTPS, FTP, and Telnet over TCP/IP. The web servers may be interconnected by a fast Ethernet LAN running at 100 Mbit/sec or greater, preferably with the deployment of switches within the Ethernet LANs for improved bandwidth utilization. One such switching unit included as part of the network architecture is a HydraWEB™ unit 45, manufactured by HydraWEB Technologies, Inc., which provides the DMZ with a virtual IP address so that subscriber HTTPS requests received over the Internet will always be received. The HydraWEB™ unit 45 implements a load balancing algorithm enabling intelligent packet routing and providing optimal reliability and performance by guaranteeing accessibility to the "most available" server. It particularly monitors all aspects of web server health from CPU usage, to memory utilization, to available swap space so that Internet/Intranet networks can increase their hit rate and reduce Web server management costs. In this manner, resource utilization is maximized and bandwidth (throughput) is improved. It should be understood that a redundant HydraWEB™ unit may be implemented in a Hot/Standby configuration with heartbeat messaging between the two units (not shown) . Moreover, the networkMCI Interact system architecture affords web server scaling, both in vertical and horizontal directions. Additionally, the architecture is such that new secure web servers 24 may be easily added as customer requirements and usage increases. The use of the HydraWEB™ enables better load distribution when needed to match performance requirements . As shown in Figure 5, the most available Web server 24 receives subscriber HTTPS requests, for example, from the HydraWEB™ 45 over a connection 44a and generates the appropriate encrypted messages for routing the request to the appropriate MCI Intranet midrange web server over connection 44b, router 55 and connection 23. Via the HydraWEB™ unit 45, a TCP/IP connection 38 links the Secure Web server 24 with the MCI Intranet Dispatcher server 26.
Further as shown in the DMZ 17 is a second RTM server 52 having its own connection to the public Internet via a TCP/IP connection 48. This RTM server provides real-time session management for subscribers of the networkMCI Interact Real Time Monitoring system. An additional TCP/IP connection 48 links the RTM Web server 52 with the MCI Intranet Dispatcher server 26.
With more particularity, as further shown in Figure 5, the networkMCI Interact physical architecture includes three routers: a first router 49 for routing encrypted messages from the Public Internet 15 to the HydraWEB™ 45 over a socket connection 44; a second router 55 for routing encrypted subscriber messages from a Secure Web server 24 to the Dispatcher server 26 located inside the second firewall 25b; and, a third router 65 for routing encrypted subscriber messages from the RTM Web server 52 to the Dispatcher server 26 inside the second firewall. Although not shown, each of the routers 55, 65 may additionally route signals through a series of other routers before eventually being routed to the nMCI Interact Dispatcher server 26. In operation, each of the Secure servers 24 function to decrypt the client message, preferably via the SSL implementation, and unwrap the session key and verify the users session from the COUser object authenticated at Logon.
After establishing that the request has come from a valid user and mapping the request to its associated session, the Secure Web servers 24 will re- encrypt the request using symmetric RSA encryption and forward it over a second secure socket connection 23 to the dispatch server 26 inside the enterprise Intranet . As described herein, the data architecture component of networkMCI Interact reporting system is focused on the presentation of real time (un-priced) call detail data, such as provided by MCI's TrafficView Server 34, and priced call detail data and reports, such as provided by MCI's StarODS Server 33 in a variety of user selected formats.
All reporting is provided through a Report Requestor GUI application interface which support spreadsheet, a variety of graph and chart type, or both simultaneously. For example, the spreadsheet presentation allows for sorting by any arbitrary set of columns. The report viewer may also be launched from the inbox when a report is selected.
A common database may be maintained to hold the common configuration data which may be used by the GUI applications and by the mid- range servers. Such common data includes but are not limited to: customer security profiles, billing hierarchies for each customer, general reference data (states, NPA's, Country codes), and customer specific pick lists: e.g., ANI's, calling cards, etc.. An MCI Internet StarOE server manages the data base for the common configuration of data.
Report management related data is also generated which includes 1) report profiles defining the types of reports that are available, fields for the reports, default sort options and customizations allowed; and 2) report requests defining customer specific report requests including report type, report name, scheduling criteria, and subtotal fields. This type of data is generally resident in a Report Manager server database and managed by the report manager. The Infrastructure component of the nMCI Reporting system includes mechanisms for providing secure communications regardless of the data content being communicated. The nMCI Interact system security infrastructure includes: 1) authentication, including the use of passwords and digital certificates; 2) public key encryption, such as employed by a secure sockets layer (SSL) encryption protocol; 3) firewalls, such as described above with reference to the network architecture component; and 4) non- repudiation techniques to guarantee that a message originating from a source is the actual identified sender. One technique employed to combat repudiation includes use of an audit trail with electronically signed one-way message digests included with each transaction.
Another component of the nMCI Interact infrastructure includes order entry, which is supported by the present invention, the Order Entry ("StarOE") service. The general categories of features to be ordered include: 1) Reporting, including inbound traffic standard, inbound traffic call detail, inbound traffic exception, inbound traffic real time monitor reports, priced reports, and priced call detail reports; 2) Broadband, including basic, standard, enhanced with SNMP, enhanced with adhoc, premium, dedicated SNMP, and dedicated SNMP with adhoc; 3) Toll Free Network Manager; and 4) Call Manager. The order entry functionality is extended to additionally support 5) Event Monitor; 6) Service
Inquiry; 7) Outbound Network Manager; and, 8) Online invoicing.
The self -monitoring infrastructure component for nMCI Interact is the employment of mid- range servers that support SNMP alerts at the hardware level. In addition, all software processes must generate alerts based on process health, connectivity, and availability of resources (e.g., disk usage, CPU utilization, database availability) . The Metrics infrastructure component for nMCI Interact is the employment of mechanisms to monitor throughput and volumes at the Web servers, dispatcher server, application proxies and mid- range servers. Metrics monitoring helps in the determination of hardware and network growth.
To provide the areas of functionality described above, the client tier 10 is organized into a component architecture, with each component providing one of the areas of functionality. The client -tier software is organized into a "component" architecture supporting such applications as inbox fetch and inbox management, report viewer and report requestor, TFNM, Event Monitor, Broadband, Real -Time Monitor, and system administration application. Further functionality integrated into the software architecture includes applications such as Outbound Network Manager, Call Manager, Service Inquiry and Online invoicing.
StarOE
The present invention is directed to a system administration and order entry component
(StarOE) of the above described integrated suite of customer network management and report application, referred to as the "networkMCI Interact" . The system of the present invention, the StarOE, is used to order, fulfill, and bill for, as well as administer, the suite of network applications, providing a horizontal service for use by all applications. The applications communicate to StarOE for all authentication, entitlement and system administration as well as order entry services. StarOE centrally processes these service requests for the individual applications by providing all order entry and security information for the "networkMCI Interact" suite of applications . The security information which the StarOE maintains and provides describes identification, authentication and access control used in the suite of applications. All access to the "networkMCI Interact" is controlled by userids and passwords. In addition, individual users are specifically granted access to only the necessary system objects, i.e., file, programs, menus, reports, etc. Access to these individual objects are based upon the customer privilege models, referred to as entitlements, stored in a StarOE database. Thus, all information regarding customers and their access levels for each product in the suite of network applications to which the customers have subscribed are stored in a customer security profile database local to the StarOE. Accordingly, StarOE provides the ability to prevent unauthorized, non- customer access to "networkMCI Interact" data and applications; ability to allow customers to access multiple enterprises with one userid; ability to restrict authorized users to specific Intranet applications and databases based on applications ordered by the customer; and the ability for users to restrict view and/or update capabilities within an application or data set, i.e., customers may provide or restrict views of their "enterprise" data to subgroups within their organization.
By utilizing the system of the present invention, customers no longer have to place manual calls to order entry hubs when requesting order transactions. For example, users may be added to the system without an enterprise's support team intervention. In sum, customers may manage their communications services in a secure environment and also, for example, monitor their network traffic via the Internet, as well as have a capability to add products and services to their account, in an automated fashion and all in one session without having to enter and exit the individual application services separately, and without having to contact a customer support representative.
Figures 6 and 7 illustrate an architectural overview of the administration and order entry system of the present invention, i.e., StarOE. The StarOE includes a server 202 typically resident in a midrange computer, and a client application 204 running in a user platform having a Web browser, hereinafter referred to as a StarOE client application. The StarOE processes a number of transaction requests relating to authentication and entitlements, from other application services, both from the client and the server 208 sides of the network. In addition, the StarOE server 202 receives transaction requests from the StarOE client. The transactions are typically message driven and comprise requesting transactions and response transactions. The transaction messages will be described in detail in reference to Figure 13. The StarOE server 202 responds to the requests by formulating transaction responses and transmitting them to the requesting servers and clients.
The StarOE client application
The StarOE client application 204 is typically a Web-based GUI interface running in a World Wide Web browser (Microsoft Internet Explorer 4.0.1 or higher) , and implemented accordingly and conforming to a standard defined for the GUI interface for the integrated suite of customer network management and report applications ("networkMCI Interact"). The client application's user interface is consistent with other products and services under the suite of network applications .
The client browser application 204 generally includes a Web browser and Java applications and applets for providing a common Web -based GUI for interacting with customers at the front -end side. A backplane unit, a backbone for applications running in the client platform is typically launched as a Java applet from a Web page, i.e., the "networkMCI Interact" home page (Figure 4) . The StarOE client application may then be invoked from the home page by the backplane unit at customer's initiation.
When a customer launches the StarOE application from the home page, the main window as illustrated in Figure 18, is presented. From this main window 500, a customer may select to order and fulfill application services, request user id's, and create user security profiles for the "networkMCI Interact" suite of applications. The main window 500 includes a menu bar 506 with options to perform various StarOE tasks. The main window also includes a toolbar 504, common to all "networkMCI Interact" applications. The toolbar 504 has buttons that also perform the various StarOE functions. Typically, the user list is presented, i.e., displayed as a tree 502, within the main window 500. The menu options 506 include: file menu options which includes a select enterprise option for allowing administrators to open a user list for a different enterprise, or add a new enterprise to their enterprise list, print option, and exit option which shuts down the StarOE application; edit menu option which includes add new application, modify, and delete options; options menu which enables a global security setup for the toll free manager application; view menu which includes options to refresh the screen by retrieving the latest user list for the opened enterprise from the StarOE server and displaying the list on the screen, to expand all nodes in the user list, and to collapse all nodes in the user list; and help menu option which launches the help engine with StarOE help text. The toolbar 504 also includes the options for a select enterprise, refresh, expand all, collapse all, print and help options.
A typical process flow logic for StarOE client application starts with the home page launching the StarOE client and passing a reference to a common user information object. This object includes the user id, and the default enterprise for that user. The main window 500 having the menu options 506 and the toolbar 504 is then presented. The StarOE client application then sends a "get StarOE security" message by including user id, enterprise id, and the StarOE application code in the message. The StarOE server 202 returns racf id, an access level representing whether the user is an external admin, a member of an account team, an internal admin, or a customer support admin, for example. If the user that launches the StarOE application is an external admin, the user list is displayed immediately since external administrators may view only one enterprise. For external administrators, an enterprise name is retrieved from the StarOE server 202 by sending and receiving a "get user enterprise list" transaction request and response.
If the user is not an external administrator, then a dialog is presented for the user to select which enterprise to view. When user selects an enterprise to view, a "get user list" message having enterprise id is sent to the StarOE server 202 to retrieve a list of user ids, a list of applications for each user, an access type for each application, and reporting types for StarWRS (e.g., Toll Free, Vnet, Vision, CVNS) . The client application also sends a "get application list" message to retrieve from the StarOE server 202 a list of application codes, description, and an application array position. The user list is then displayed within the main window as shown at 502. Every user list has a New User node 502a as the first node under an enterprise 502b. This node may be selected to order a new user. An existing user node 502c may be selected to edit and add new applications for that user. When an existing user node 502c is selected, the edit/add new application options on the menu 506 is enabled and disabled according to what applications the user already has. An existing user application node 502d may be selected to edit/modify/delete options within the application. Figure 19 illustrates a dialog box 510 presented to a user for selecting an enterprise. This dialog box is displayed when the user chooses the select enterprise menu option or toolbar button. It may also be displayed automatically when the StarOE client application determines that the user is not an external user who, therefore, may have access to multiple enterprises ids. The purpose of the dialog is to allow the administrator to work with a different enterprise, as well as add an enterprise to their enterprise list.
Typically, the dialog is presented with a list of enterprises to which that the user has access as shown at 510. An object constructor takes a user id as an argument and formats and sends a "get user enterprise list" message to the StarOE server 202.
The StarOE server 202 returns the list of enterprises for the user to the StarOE client application 204 which then displays the list as shown at 510. The select button allows the administrator to add an enterprise by causing the client application 204 to send an "add user enterprise" message to the StarOE server 202. The search button 514b allows the administrator to search for an enterprise by entering either an enterprise id or part of the enterprise name with wild card characters. A selection of the search button 514b also causes the client application 204 to send a "get enterprise list" to the StarOE server 202. The delete button 514c when pressed, removes the enterprise from the administrator's enterprise list. The cancel button 514d is used to return control to the main window 500.
Figure 20 illustrates an example of a new/modify users screen 520 used for setting up new users or modifying various options available to the existing users. The screen is typically presented as a modal dialog displayed on top of the main window when a user node 502c is selected and the modify option is chosen from the main window 500. It may also be presented when the new user node 502a and the add new application menu option is chosen. This screen 520 is generally presented by the client application 204 invoking a class object for handling the new/modify user functionality. On construction of this object, an add/modify flag is initialized. If an add flag is set, an empty screen is displayed with an empty user profile in memory and a new password is generated and displayed in the password field as shown at 522. If a modify flag is set, the client application 204 via the object it invoked, formats and sends a "get user info" message to the StarOE server 202. When a response to the message is received, the client application 204 stores user profile received with the response from the StarOE server 202 in memory, and populates the fields on the screen 520 accordingly. The application setup button 524a may be enabled during an add user process for presenting the appropriate application's security setup screen. The cancel button 524c generally prompts the user for confirmation to cancel, and returns control to the main window 500. When a submit button 524b is pressed, the user profile information is sent to the StarOE server 202 using the "set user info" message. This message is always sent during an add process.
During a modify process, this message is sent to the StarOE server 202 only if any changes were entered by the user. When the StarOE server 202 receives the message, it returns an acknowledgment message. The client application 204 then returns control to the main window 500.
During the StarOE add or modify procedure described above, security information regarding customer entitlements for application services may also be initialized. Figure 21 illustrates a typical screen for setting up Toll Free Network Manager (TFNM) security information. This screen 530 is typically displayed when TFNM is ordered or modified. The corp ids may be displayed in a tree format as shown at 532. If a corp id is part of the user's profile, a racf id may be displayed with the corp id in the tree. The user id is typically displayed in the title bar. A user's TFNM security profile includes at least one corp id, with each corp id having an associated racf id. The racf ids 534 are manually entered for each corp id. A default corp id is chosen for each user. A setup security object typically handles the process of setting up security for each application. A constructor for this object initializes the user id and a modify flag as passed in from the StarOE client application 204. The object retrieves the toll free hierarchy from the StarOE server 202 using the "get hierarchy" message. The client application 204 sends the enterprise id, and tollfree flag in the request, and the StarOE server 202 returns the list of tollfree corp ids for the enterprise. If the modify flag is set, a "get security" message is sent to the server 202 to retrieve the user's TFNM security profile. As the tree is loaded with each toll free corp id 532, racf id 534 is entered by a user. When the submit button is pressed, the setup security object calls its send security method which causes the formatting and sending of "setTFNM security" message to the StarOE server 202. When the StarOE server 202 receives the message, it sets the security accordingly for the TFNM application. The StarOE system is also utilized to order, for example, to add or modify, various reporting options used during report generation by the StarWRS. The StarWRS application is a reporting mechanism for the "networkMCI Interact" . Figure 22 is a sample StarOE screen 540 for adding and modifying reporting options which are used by the StarWRS. The StarOE displays the toll free hierarchy for security setup when toll free reporting is ordered or modified. The hierarchy includes a list of corp ids for a given enterprise, with each corp id 542 having a list of toll free numbers 544 under it. The list may be displayed in a tree format, similar to the TFNM security display 530. The reporting options at the toll free number level include unpriced reports, unpriced call detail, and real time monitor reports.
Typically, a user's toll free reporting security profile includes at least one toll free number with at least one reporting option associated. The client application 204 generally invokes an object to handle the reporting option changes and passes in the user id and a modify flag. This object then retrieves the toll free hierarchy from the StarOE server 202 using the "get hierarchy" message. The client application 204 sends the enterprise id, and toll free flag in the request, whereby, the server 202 returns the list of toll free corp ids for the enterprise. If a modify flag is set, a "get tollfree security" message is sent to the server to retrieve the user's toll free security profile.
As each corp id is expanded, a "get tollfree numbers" message is sent to the server 202 asking for all the numbers for the corp id selected. As each toll free number is added, a search in the user's profile for that number is conducted. If the number is found, the report options are added next to number text as shown at 546. Furthermore, if the number has been deactivated, a text "<inactive>" , for example, is added to the display as shown at 548. The inactive numbers are not modifiable. When the unpriced reports or unpriced call detail check boxes are changed, the text next to the toll free numbers selected reflects the state of the check box. The check boxes depict report options to which a user has access for toll free numbers. When more than one toll free number is selected, the check boxes are marked unchecked. When a submit button is pressed, the object calls its send security class method which causes the formatting and sending of a "set user tollfree security" message to the StarOE server 202.
In addition to handling the orders for the suite of applications in the "networkMCI Interact" , the order entry application, StarOE, may also be modified via the StarOE. Figure 23 is a sample of the StarOE access setup screen 550. The StarOE order object is created any time the StarOE node for an existing user is selected and the edit/modify menu option is selected from the main window 500. It may also be presented when the Application Setup button 524a is pressed on the new user screen 520.
Typically, the StarOE client application 204 invokes a class object for handling the StarOE order functionality. The object's constructor initializes the user id of the user being configured, a modify flag, and the StarOE level of the logged in administrator as passed in from the client application 204. User level options 552 may be set according to the administrator's StarOE access level. The administrator may not select an access level that is higher than the present level. For example, an account team may not change a user's access to an internal level. When a submit button 554 is pressed, the racf id is checked for a valid value, then the object calls the iSendSecurity ( ) method which formats and sends a "set StarOE Security" message to the StarOE server 202. The Racf id represents the user's mainframe id. The user level is used to determine the level of access the user has within StarOE. An administrator may have one of the following access levels: external, account, and internal. External administrators have access to view and update all users under their enterprise. They may be able to modify a user's security for the applications that they have permission for administration. These users may not be allowed to order applications, but may need to request their orders through their account team representative. An account administrator is used for account team members. This level of user may have the ability to view user lists for multiple enterprises, and configure a user's application access information. Internal users have the same privileges as account administrators, as well as the ability to order new applications for new and existing users. Internal administrators also have the ability to setup global security information for each application. The internal administrators have access to multiple enterprise ids.
The StarOE is also utilized to setup global security for corp ids. The purpose for setting up global security is to allow the administrator to make corp ids available for inclusion in users' profiles. Figure 24 illustrates a toll free network manager setup dialogue selected from the main window 500. Initially, the toll free corp id list is retrieved from the server 202 via a "get hierarchy list" message. The toll free numbers are placed in appropriate boxes 562a, b,c, based on the flag returned with the hierarchy list, i.e., ' ' for corp ids, '8' for TFNM, and 'E' for enterprise. Corp ids in the corp id box 562a are those toll free corp ids for a given enterprise which have not been made TFNM participants and TFNM enterprise participants. The TFNM list 562b includes all toll free corp ids for a given enterprise that have been made TFNM participants. The enterprise list 562c includes all toll free corp ids for a given enterprise that have been made an enterprise level TFNM participant. Once the corp ids in the list are placed in the appropriate boxes, a user may then move the corp ids among the list boxes. For example, if a corp id is in the "corp id" list 562a, it may be moved to the "TFNM" list box 562b. Corp ids in the "TFNM" list box 562b may be moved to the "enterprise" list box 562c. Pressing the submit button 564 causes a "set TFNM corpid" message to be sent to the StarOE server 202. The server 202 then notifies and sends any corp ids moved among the list boxes to the mainframe registry. The corp ids are then added to the user's profile. Figures 21, 22, and 24 illustrated screen displays for performing various order entry and administrative functions for the TFNM. Other application services, including reporting for VNET, Vision, Broadband, Call Manager, and invoice reporting may be ordered and the security information pertaining to each application may be modified in a similar manner.
The screens illustrated in Figures 18-24 and associated class objects are invoked from the StarOE client application 204, which is launched by the backplane unit as described above. The StarOE client application 204 employs a Java application program and is implemented by extending the COApp class, one of common objects provided and utilized in the present invention. Because the client program 204 is not implemented as an applet, and also because the client program 204 employs the container Frame for customer display windowing purposes, the client program 204 runs, to a degree, independent of the browser within which the backplane is deployed.
The StarOE client application interacts with the StarOE server in providing various order entry functions for all applications as described above and will be described below in reference to the back-end functionality of the StarOE. Communications between the StarOE client 204 and the server 202 typically use TCP/IP, running a UNIX process listening in on a known TCP port.
The StarOE server
The StarOE server 202 includes a number of processes for performing a number of specific functions. For example, a fulfillment process monitors new customers being added to the system and notifies a fulfillment house accordingly. The fulfillment house then may send appropriate subscription packages according to the information received from the fulfillment process to the new customer. Another process, a reconciliation process, may handle synchronization of data with a mainframe system database and also with databases associated with the individual fulfilling systems. Yet another process, a billing process, may handle directing billing information to different billing streams. The OE server 202 stores all the "networkMCI
Interact" users and their security information such as passwords, application entitlements and hierarchies which may be requested by other application servers and clients in the network. Each user or customer is given a username and a password for accessing the
"networkMCI Interact". In addition, during the order entry process, each user in the "networkMCI Interact" is provided with entitlement and hierarchies describing the user's access privileges to specific application services and also to various sub -services available within the applications.
Generally, the hierarchies are customer- defined during the order entry process, and describe the subdivision of calls into nodes arranged in a n- way tree. The "networkMCI Interact" back-end servers apply the hierarchy definitions to their data at report time when generating reports, typically as queries on a node-by-node basis to the result data set which was extracted using any other criteria supplied. The trees of the hierarchies have essentially arbitrary complexity, i.e., the number of nodes is unlimited. Each node is assigned calls according to a template of conditions. Conditions may be defined as a combination of one or more ANIs, corp IDs, ID codes, Card numbers, account codes, location/node ids, etc. These filters may be applied at any node in the tree. The hierarchies may be applied as both selection criteria (e.g., "report on all calls at these nodes or their descendants", in combination with other criteria) and roll-up targets (e.g., group the results in this report at this level in the tree) . These entitlement and hierarchies may be modified via the StarOE client application executed in the customer workstation 204.
An example of a service provided by the StarOE is an authentication process during a "networkMCI Interact" customer login procedure. As described above with reference to the StarOE client application, an initial access to the suite of network applications ("networkMCI Interact") is obtained through the Web pages invoking a login process and a backplane logic. The login process typically begins with a customer entering a username and password pair on an initial Web page retrieved from the Web site providing the suite of network applications. Referring to Figures 6 and 7, a process running in a client platform sends transaction request messages via the Dispatcher 206 to the OE server 202. The StarOE server 202 generally responds to requests by searching the security profile for the information requested, formulating appropriate transaction response messages and transmitting them back to the requesting process. More particularly, during the login procedure, the client login process formulates a transaction message including a user name/password and a validation request for a given customer. The StarOE server 202 looks for the matching name/password pair in the security profile for the customer, and if the name/password pair is found, the server 202 formulates a valid user message response for the login process running in the client platform, including in the message the enterprise id, time zone, and user id information, and transmits the response via TCP/IP back to the login process. In addition, each user password maintained in StarOE is set to expire at a predefined interval, e.g., every 90 days.
Accordingly, when the StarOE server 202 detects that the password has expired, the server 202 notifies the customer, via the client application 204 to change the password. The changed password is sent to the StarOE server 202 formatted in a message interface, "change password request," for example. The server 202 upon receiving the message updates the password for the given user in its user profile typically stored in the database 314, and responds with appropriate return codes to the StarOE client 204. The login process, upon receiving the response may then continue with its normal course of processing.
Another example of a service provided by the StarOE is retrieving an application entitlement list for a given customer. As described briefly above, an entitlement describes a privilege or authorization that a customer has. It is akin to the access levels in UNIX which are granted when a customer belongs to certain user groups. It describes what applications a customer may access. It also describes what the customer may be allowed to do within that application. In addition, it describes what back-end services that application and customer combination may access. For example, a customer may be entitled to use or access many applications and for each application, the customer may have a different set of entitlements. These entitlements may come in two different sets. The first specifies what the customer may do with this application. For example, it may allow the customer to have update access to a particular view and only read-only access in a different view. The second set of entitlements specify what back-end services this particular application and customer may access.
As described previously, all the information relating to entitlements for a given customer is stored in customer profile database 314 located with the StarOE server. When the backplane requests via TCP/IP the entitlement transaction, for example, in a get application list request message, the security module retrieves and transmits back via TCP/IP to the backplane the list of authorized applications accessible by a given customer in a transaction response. The backplane uses the list to determine which buttons on the "networkMCI Interact" home page should be activated, thus controlling access to products. Similarly, individual back-end application servers 208 may make a request for entitlements within that application for a given customer. For example, the StarWRS, a "networkMCI Interact" reporting system, generates a request for hierarchy data for VNET, VISION, and Toll-free customers whenever reports need be generated. In response, the StarOE retrieves the corresponding hierarchy data and transmits them in real time to StarWRS.
The Outbound Network Manager (ONM) , for managing the customer's private networks such as VNET and Vision networks, is another example of an application service having application specific customer entitlements defined and maintained in the StarOE database 314. For instance, the customers ordering ONM sign up at the corp id level. Each user may be associated with multiple corp ids. In addition, each user may have one or more of the entitlement features within ONM, including: CPN Order, Calling Card Order, Dialing Plan Order, ID Code Set Order to which orders a user's access may be permitted or restricted; Approve Order signifying approval authority in creating orders; Modify Order for defining user's authority to modify/delete orders.
In providing the authentication, entitlement, and hierarchy information, including those described above, the StarOE server 202 includes the StarOE database 314 for storing user profiles locally. Additional data needed are typically accessed from the enterprise host systems 320. The StarOE server 202 may be implemented as a concurrent server allowing simultaneous multiple client connections. The server 202 listens on a known port, and when a client connects, the server 202 forks a new process to handle the client connection. The server 202 may also implement a thread to handle each client connection . The StarOE server 202 may be implemented utilizing the object oriented programming (OOP) . At startup the oe_serv process instantiates an OEServ object, an OEConfig object, and a Logger object. The OEserv object is an instance of a main server class for starting the server processing including reading in the configuration and setting up the listening sockets. The OEConfig object is used to read specific StarOE configuration values, and the Logger object logs informational, warning, and/or error messages to a file. The OEConfig and Logger objects are typically set to Global so that all classes may access configuration values and log messages. The OEServ object then creates a Rogue Wave RWServerSocket object which creates a server socket connection and begins listening for client connections. The Rogue Wave Net++ library is typically used for socket communications . The OEServ object includes a RWServerSocket object which waits to accept a connection from a client. When a client connects, a ClientHdlr object may be instantiated to handle the client connection. The ClientHdlr inherits from the Child class which when constructed, forks a new process for handling the client connection.
The ClientHdlr object reads the message header and determines how much to read for the following message request which includes message request header and body. The message request is read and the message id is interrogated. A switch statement on the message id determines how the message may be processed. The proper classes may then be instantiated to handle the request and determine the response. When the response is determined by the proper class, the ClientHdlr then may create a message header and response header including a return code and/or an error code. The ClientHdlr then sends the message back to the client with the response. The
ClientHdlr typically need not know the contents of the request or the response message, instead, the ClientHdlr may act as a conduit for passing messages from the client to a proper class to handle the request, and relay the response from the proper class back to the client.
Some examples of the proper classes include the TollfreeSecurity class, the Application class, and the Hierarchy class. In addition, the server includes many other classes for processing specific functions. The TollfreeSecurity class encapsulates Tollfree security and access into the database tables having tollfree security detail information. When the ClientHdlr receives a Get User Tollfree Security request from the client, the TollfreeSecurity class is instantiated. The Get ( ) method in this class access the database tables and returns the list of corp ids and tollfree numbers for this user. The ClientHdlr formats the data into a reponse message and returns the message back to the client.
The Application class encapsulates the interface into the database table having applications information. Any reading or writing to this table may be handled by the methods within this class. When the ClientHdlr receives a Get Application Request, the Application class is typically instantiated. The Get ( ) method in this class accesses the Applications table in the database and return the list of application codes and their descriptions. The ClientHdlr then formats the data into a reponse message and returns the message back to the client.
The Hierarchy class encapsulates all hierarchy information and the methods to access this data in the database. When the ClientHdlr receives a Get Hierarchy List request, the Hierarchy class is instantiated. The Get ( ) method in this class determines which Hierarchy product is to be retrieved (e.g., Tollfree, Vnet/CVNS, or Vision) and returns the appropriate information. The ClientHdlr then formats the data into a response message and returns the message back to the client. The details of the message format, including request and response messages, are described with reference to Figure 13.
Order entry process via StarOE
Figure 10 is an illustrative example of an order entry process flow in the system of the present invention involving the functionalities described above. This process flow is used whenever a customer needs to interact with the StarOE system, whether it be as a new customer, or existing customer adding application services, or an existing customer changing individual passwords or work assignments for a specific application. The order entry process begins when a customer places an order for addition, modification or deletion of services, as shown in step 220. In step 222, an accounting team uses a new Web- based interface to enter the customer information. Typically, on a nightly basis, one or more e-mails may be generated to OEHub for Internet MCI access as shown in step 224, and to networkMCI Interact OEHubs as shown in step 232. At step 226, if the order is for a new customer, or if the existing customer needs a new browser package, then the OEHub handling Internet MCI service enters information from the e-mail to add or delete the customer. StarOE server then passes on mailing information to the fulfillment house, as indicated at step 228, which mails a package including the browser to the new customer to complete the process. The customer typically receives the browser package in 7-10 days. The fulfillment processing will be described in more detail with reference to Figure 14.
In step 234, the OEHubs enter data received from the e-mail. In step 236, if a new customer was added, the OEHubs add the customer information into the mainframe system via a direct interface as shown in steps 238 and 240. In steps 242 and 244, the new customer and service application information is added into the StarOE server database.
In step 246, additional steps are performed by StarOE if necessary for each application. For example, if an added service is a Toll Free Network Manager (TFNM) , additional flags are tagged and stored in the application's server as shown in steps 248 to 258. In step 260, when the process of adding a new customer is complete, a fulfillment process, another component of the StarOE sends a welcome letter to the customer's inbox created as part of the addition process and transmits the new customer information to a fulfillment house as shown in steps 262 and 264. In step 266, the OEHub notifies account team that the order is complete.
In response to the transmission from the fulfillment process, the fulfillment house, in step
268, produces and mails a welcome letter that includes the user ID, a password to be used for the first logon and a list of applications the customer ordered. In step 270, if for any reason, the fulfillment process did not complete, a fulfillment representative contacts customer services, in step 272. In step 274, the customer services resolves issues by manually performing the fulfillment functions.
In step 276, if new services were added by an existing customer, the services added are updated to the mainframe system. In step 278, the StarOE database is also updated with the additional services. In step 280, if a service application requires specific added processing, for example, the TFNM, the additional processing are performed in step 248 through 266, as described previously.
Figure 11 is a high level input process flow diagram, illustrating inputs to the system of the present invention. The present invention handles a wide variety of key function for the suite of network applications. Each application will, herein forth, be also referred to as a fulfilling system, having a fulfilling client and a fulfilling server. The system of the present invention handles security and authentication requests from both the client and server sides of each fulfilling system as shown in 282a-d and 284. These requests are automatically generated whenever the customer makes a request of the server. For example, they are generated when a customer clicks on the icon for a service such as TFNM.
In addition, when a customer first logs on, the customer is presented with a dialog box prompting for user ID and password. When the customer clicks a submit button, for example, the backplane (or platform) verifies the customer is valid by inquiring with the StarOE system as shown in 286. The return response is either "invalid user/password" or "valid user". When the customer has been authenticated, the customer is then presented with a list of authorized applications. This list determines which buttons, for example, representing each application are active, thus controlling customer access to products and services .
In addition, also shown in 286, the customer is issued a temporary password with the customer's fulfillment package. This temporary password is used to log into the system the first time. During the initial logon process, the customer is prompted to create a new password, which replaces the temporary password in the database. Moreover, the customer may be required to change the password every 30 days, for example, for security reasons.
Information may also be entered and requested by a number of sites other than a user platform. For example, OE Hubs 288 may enter information directly into the StarOE database to register new customers to the integrated suite of network applications. They may also access the data in StarOE directly to modify customer information, and to add or remove subscribed services. Other inputs to the StarOE server may include entitlement data from the individual fulfilling systems 290a, 290b. For example, the mainframe 290a may send the appropriate hierarchy of tollfree numbers for a specific customer in response to registry message registering the new customer to the mainframe 290a. The hierarchy of tollfree numbers describes the new customer's entitlements to the TFNM services. This hierarchy may be used by other services in the integrated suite of network applications, for example, a Reporting application.
As described above, the StarOE is a repository for customer authentication and entitlement information. These authentication and entitlement data are usually transmitted from mainframe systems 292, 292a, 292b. For example, the mainframe system 292 generates two sets of hierarchy files on a daily basis. One set comprises deltas only, the other comprises a full hierarchy. Notification is made to the StarOE when these are available. At a set time each day, for example, 6:00 A.M., the StarOE, the reconciliation process more specifically, picks up the files via FTP and either replaces the previous day's hierarchy file with the new information (full file) or updates the previous day's file using the files having the updated data only. During this process, the reconciliation process first locks the database so that no other requests for data services may be made.
Figure 12 is an output process flow diagram, illustrating outputs from the system of the present invention. The StarOE outputs various responses to the requesting systems and processes. An example of an output is an authentication response to the client side of the individual applications 292a- c as well as the backplane platform 294. In addition, a list of accessible applications for a given customer, is output to the backplane platform 294. The StarOE also outputs various updated data to database systems associated with specific individual applications 296a- c in the suite of network applications. In addition, the individual fulfilling systems 302a-d receive messages from the StarOE regarding modifications effected by a customer interaction. For example, as part of the reconciliation process, the StarOE may pass a list of toll free numbers to be deleted from Traffic View. These numbers represent the services which are discontinued. Upon receipt of this information, the Traffic View server sends another message to a system responsible for collecting call detail information which system then discontinues collection of call data for the numbers deleted. Another example output to individual fulfilling system is hierarchy data to Reporting fulfilling system 203c when a customer requests reports. The customer hierarchy data is sent in real time by the StarOE for up-to-date report information.
Additionally, the fulfillment house receives transactions from the StarOE. The StarOE, for example, by a fulfillment process, pushes a file including new customers to the fulfillment house 298, for instance, via FTP. This file includes customer mailing information, user name and password. The fulfillment house 298 creates a welcome package including the customer's user name and temporary password, and sends the package. The customer receives this package and uses the temporary password to logon to the system of integrated suite of network applications the first time. During the initial logon process, the user may be prompted to create a new password, which replaces the temporary password in the StarOE database. Upon logon, the user may find another welcome letter which lists the subscribed applications. This welcome letter was generated by StarOE server via e-mail when the order entry process was completed, and went to the Inbox 300 at that time.
StarOE transaction messages
Figure 13 illustrates message formats used in transaction requests and responses communicated to and from the client and server applications in the system of the present invention. As described with reference to Figure 6, the client applications typically send messages to the StarOE via the dispatcher 206 Figure 6. The messages are generally a stream of bytes including characters and each message typically has an order and format. The messages may also include fields of primitive types such as int or short .
The client applications, typically implemented in languages such as Java, encapsulate the message structures into class object. The application server programs including the StarOE, typically implemented using low level compiler languages such as C or C++, receives the message objects from the client applications as a stream of bytes and map the message objects into appropriate C structures. Typically, all the structures are aligned on byte boundary, byte aligned and in network byte order, so that Java objects may be mapped correctly into the C structures on the StarOE.
The StarOE messages have fixed formats. For example, for a request transaction, the request message 308 is preceded by a message header 304a and a request header 306. A response message 312 is preceded by a message header 304b and a response header 310.
The message header 304a, 304b is sent as the first part of all messages sent to or from the StarOE so that the receiver may know the size of the message being sent. This mechanism allows the server or client to read the proper number of bytes. When the OE server receives a message, a communications layer of the StarOE strips off the message header structure and adds it to all responses associated with this message.
The request header 306 follows the message header 304a on all messages sent to the StarOE. The StarOE examines the request header 306 for determining the type and version of message. It allows the StarOE to map the message to the correct C structure for subsequent processing. Similarly, response header 310 follows the message header 304b on all messages sent from the StarOE. The response header 310 precedes all response messages. The StarOE client program typically implements message transactions using class objects. Figure 9 illustrates messages class diagram utilized in the present invention. The messaging classes 570 hide the complexities involved in issuing a transaction to the StarOE. Common functions are implemented in the base message classes encapsulating much of the effort required to build message classes. Message classes are created generally for requests and responses distinctly.
The request and response classes derive from the common base class OEMsg 572. The class OEMsg 572 encapsulates the common message header required by the StarOE. The classes OERqstMsg 574 and OERspMsg 576 serve as common base classes for the request and response messages respectively. All request messages also implement the COMessage interface. COMessage functions provide the necessary hooks to send and receive messages from the client platform to the back- end application servers. All StarOE messages use the synchronous transaction mechanism, wherein the transactions block until a response is received.
The following codes illustrates retrieval of user information using the order entry message classes .
OEUsrlnfoRqst usrlnfo = new
OEUsrlnfoRqst ( "abecar" , session) ; if (usrlnfo.dolt () == true) { OEUsrlnfoRsp uinfo =
(OEUsrlnfoRsp) usrln fo.getResponseObj ()
OEUsrlnfo info = uinfo .getϋsrlnfoObj ( ) ; System. out .println ( "First name:"
+info. firstName) ;
} else
System. out .println ( "Failed to retrieve user information");
Once a request object is built, the method doIt() on the OERqstMsg 574 class must be invoked to initiate the transaction. The method doIt() may block until a response is received. A boolean return code is returned by doIt() . To obtain the response data or detailed error code information the method getResponseObj ( ) must be invoked to return the built response object.
Specific transaction messages communicated in the system of the present invention include "validate user message" for authenticating the customer's username/password pair, "get user application list message" for retrieving a list of applications to which the customer is entitled, and "update password message" for changing the customer's password. These transaction messages are typically communicated between the StarOE and the backplane unit. These messages may also be used by other application services to verify entitlements in the event an extra level of security is desired.
Examples of transaction messages communicated between the StarOE server and the StarOE client include "get user info" for retrieving customer's information such as name, address, timezone for the location of the customer. Another example of a transaction message communicated to the StarOE system by all the application clients and servers may be a "get user security message" for retrieving customer's security information including the userid, usertype which describes whether the customer is a regular user or an administrator, and access id for describing the customer's access level. The system of the present invention includes a number of such transaction messages described above for specific type of requests and responses communicated to and from the OE system and, moreover, additional message specific transactions may be added as necessary.
StarOE interface to fulfillment house
Figure 14 is a diagram illustrating data flow interface with the fulfillment house in the system of the present invention. Generally, customers are added by Order Entry, via StarOE client program 316. A fulfillment process typically sends information on new customers to the fulfillment house 298 on a nightly basis and also sends a news message comprising welcome letters to each new customer via the Inbox 300. If a new application is added to an existing customer then only a message is sent to the customer via the Inbox 300.
The fulfillment kit comprises a welcome letter and an inbox message. The fulfillment process in the StarOE server 202 typically runs on a daily basis. The information needed for the fulfillment process is generally stored in a database 314, Informix for example, in table forms. Such tables may include a user, configuration, and enterprise user application tables. The information or data is retrieved, configured and computed from the tables and put into a temporary fulfillment table which is used for the collection of the fulfillment information. From the fulfillment table the process creates the inbox letters and records for the fulfillment file. The enterprise user application table usually includes the status of whether the requested applications have been fulfilled. The fulfillment file is transferred, using file transfer protocol (FTP) , for example, to the fulfillment group 298 for creation of the welcome letters . Figure 8 illustrates an example of a welcome letter 80. The welcome letter 80, which is in a language that the customer requested, comprises the customer's id and password, URLs pointing to a language specific Web page where a customer may typically start up the system of the present invention which the customer has ordered.
StarOE interface to StarWRS
Figure 15 is a diagram illustrating data flow interface with the Reporting application. The Reporting application is one of the applications available as part of the integrated suite of network applications. Figure 15 shows StarOE server's interface to various systems in order to provide the Reporting application the appropriate information for producing reports. The reconciliation process generally loads data, such as the toll free hierarchies and pick list information in the StarOE database from the mainframe systems 320. The data are required to setup the security profile for the Reporting application. The loading may be performed periodically, for example, on a nightly basis. The StarOE client 316 may modify a customer's Reporting Application security profile and add, update, or delete the application and hierarchy access. The hierarchy and security are stored in StarOE database 314. When a customer modifies the customer's Reporting Application security profile, a select set of data are sent to appropriate servers for real time processing. For example, if the modified security profile includes Un-priced Reports, then the records in the security profile with these reports are sent in realtime to the Traffic View Server 322, such that the Traffic View Server 322 may begin collecting data as soon as the customer makes the modification.
A Reporting application's client program, report requester 324a as well as the servers 324b, 324c also retrieves a customer's profile for reporting purposes. For example, a report scheduler 324b, a part of the reporting servers, verifies via a direct connection with the StarOE database 314, the customer's access level to the hierarchy before scheduling report requests. The Inbox server 300a also requests paging and e-mail information from StarOE server 202 for optional report notifications. StarOE interface to TFNM
Figure 16 is a diagram illustrating the data flow interface with the Toll Free Network Manager application. The Toll Free Network Manager is one of the applications available as part of the integrated suite of network applications. Figure 16 shows StarOE server's interface to various systems in order to provide the Toll Free Network Manager application the appropriate information toll free servicing. The data hierarchies necessary for the Toll Free Network Manager are retrieved by the reconciliation process via FTP nightly, for example, from the mainframe system 320 and stored in the StarOE database 314. The data hierarchies retrieved are used to setup the security profile for the Toll Free Network Manager application 326a, 326b. Information setup in the security profile are sent to the mainframe systems 320 by the StarOE server 202. For example, the corp ids that are setup at a global level in StarOE database 314 for use by the Toll Free Network Manager application represent participants of the Toll Free Network Manager and are flagged as such in the mainframe system when the information is received. Therefore, upon receiving the ids the mainframe system 320, for any reason, may not delete these corp ids while they are flagged. Additionally, the Toll Free Network Manager server 326a sends requests to the StarOE server 314 to get a Toll Free Network Manager customer's security. This is done by formulating a get user security message in a transaction request as described in reference to Figure 13.
StarOE interface to Broadband Figure 17 is a diagram illustrating data flow interface with the Broadband application. The Broadband is one of the applications available as part of the integrated suite of network applications. Figure 17 shows the StarOE server's interface to various systems in order to provide the Broadband application the appropriate information for broadband servicing. Customer's user and security profile for the Broadband application is added by Order Entry 330. When a Broadband customer's profile is added, changed, or deleted, the Broadband server 328a needs to be notified of the operation so that the server 328a can either begin or stop collecting data for the specific customer's bill ids. Typically the notification is done by a message in the form of a file. The file is typically placed in a known directory and is transferred to the Broadband server 328a via FTP process. The file transferred generally includes all the current Broadband customers with their bill ids. While the invention has been particularly shown and described with respect to preferred embodiments thereof, it will be understood by those skilled in the art that the foregoing and other changes in form and details may be made therein without departing from the spirit and scope of the invention. More specifically, the system administrative and order entry system described may apply to any generic applications available via the Web and is not limited to the telecommunications applications explained above for exemplary purposes.
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US6065597 true | 1997-09-26 | 1997-09-26 | |
US60/060,655 | 1997-09-26 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999015989A1 true true WO1999015989A1 (en) | 1999-04-01 |
WO1999015989A9 true WO1999015989A9 (en) | 1999-08-26 |
Family
ID=22030944
Family Applications (21)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/020146 WO1999016198A1 (en) | 1997-09-26 | 1998-09-25 | Integrated interface for real time web based viewing of telecommunications network call traffic |
PCT/US1998/020148 WO1999016207A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based data management reports |
PCT/US1998/020159 WO1999015989A9 (en) | 1997-09-26 | 1998-09-25 | Authentication and entitlement for users of web based data management programs |
PCT/US1998/020095 WO1999015984A1 (en) | 1997-09-26 | 1998-09-25 | Graphical user interface for web enabled applications |
PCT/US1998/020155 WO1999016002A1 (en) | 1997-09-26 | 1998-09-25 | Web based integrated customer interface for invoice reporting |
PCT/US1998/020157 WO1999016218A1 (en) | 1997-09-26 | 1998-09-25 | Integrated customer web station for web-based call management |
PCT/US1998/020171 WO1999016202A2 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based telecommunications management tools |
PCT/US1998/020136 WO1999015960A3 (en) | 1997-09-26 | 1998-09-25 | Integrated customer interface for web-based data management |
PCT/US1998/020173 WO1999019803A1 (en) | 1997-09-26 | 1998-09-25 | Integrated customer interface for web based communications network management |
PCT/US1998/020158 WO1999016099A3 (en) | 1997-09-26 | 1998-09-25 | Secure customer interface for web-based data management |
PCT/US1998/020149 WO1999015988A3 (en) | 1997-09-26 | 1998-09-25 | Secure server architecture for web based data management |
PCT/US1998/020138 WO1999015974A1 (en) | 1997-09-26 | 1998-09-25 | Integrated interface for web based customer care and trouble management |
PCT/US1998/020137 WO1999016230A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based telecommunication toll-free network management |
PCT/US1998/020170 WO1999015979A9 (en) | 1997-09-26 | 1998-09-25 | Integrated business system for web based telecommunications management |
PCT/US1998/020141 WO1999016206A1 (en) | 1997-09-26 | 1998-09-25 | Data warehousing infrastructure for web based reporting tool |
PCT/US1998/020150 WO1999015996A3 (en) | 1997-09-26 | 1998-09-25 | Multi-threaded web based user inbox for report management |
PCT/US1998/020160 WO1999015978A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based broadband telecommunications management |
PCT/US1998/020147 WO1999015977A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based telecommunications network management |
PCT/US1998/020180 WO1999016203A3 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based data management reports |
PCT/US1998/020156 WO1999015950A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based alarm management tools |
PCT/US1998/020139 WO1999015975A1 (en) | 1997-09-26 | 1998-09-25 | Integrated interface for web based customer care and trouble management |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/020146 WO1999016198A1 (en) | 1997-09-26 | 1998-09-25 | Integrated interface for real time web based viewing of telecommunications network call traffic |
PCT/US1998/020148 WO1999016207A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based data management reports |
Family Applications After (18)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1998/020095 WO1999015984A1 (en) | 1997-09-26 | 1998-09-25 | Graphical user interface for web enabled applications |
PCT/US1998/020155 WO1999016002A1 (en) | 1997-09-26 | 1998-09-25 | Web based integrated customer interface for invoice reporting |
PCT/US1998/020157 WO1999016218A1 (en) | 1997-09-26 | 1998-09-25 | Integrated customer web station for web-based call management |
PCT/US1998/020171 WO1999016202A2 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based telecommunications management tools |
PCT/US1998/020136 WO1999015960A3 (en) | 1997-09-26 | 1998-09-25 | Integrated customer interface for web-based data management |
PCT/US1998/020173 WO1999019803A1 (en) | 1997-09-26 | 1998-09-25 | Integrated customer interface for web based communications network management |
PCT/US1998/020158 WO1999016099A3 (en) | 1997-09-26 | 1998-09-25 | Secure customer interface for web-based data management |
PCT/US1998/020149 WO1999015988A3 (en) | 1997-09-26 | 1998-09-25 | Secure server architecture for web based data management |
PCT/US1998/020138 WO1999015974A1 (en) | 1997-09-26 | 1998-09-25 | Integrated interface for web based customer care and trouble management |
PCT/US1998/020137 WO1999016230A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based telecommunication toll-free network management |
PCT/US1998/020170 WO1999015979A9 (en) | 1997-09-26 | 1998-09-25 | Integrated business system for web based telecommunications management |
PCT/US1998/020141 WO1999016206A1 (en) | 1997-09-26 | 1998-09-25 | Data warehousing infrastructure for web based reporting tool |
PCT/US1998/020150 WO1999015996A3 (en) | 1997-09-26 | 1998-09-25 | Multi-threaded web based user inbox for report management |
PCT/US1998/020160 WO1999015978A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based broadband telecommunications management |
PCT/US1998/020147 WO1999015977A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based telecommunications network management |
PCT/US1998/020180 WO1999016203A3 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based data management reports |
PCT/US1998/020156 WO1999015950A1 (en) | 1997-09-26 | 1998-09-25 | Integrated proxy interface for web based alarm management tools |
PCT/US1998/020139 WO1999015975A1 (en) | 1997-09-26 | 1998-09-25 | Integrated interface for web based customer care and trouble management |
Country Status (5)
Country | Link |
---|---|
US (22) | US6490620B1 (en) |
EP (3) | EP1015970A4 (en) |
JP (3) | JP2003526126A (en) |
CA (3) | CA2304543A1 (en) |
WO (21) | WO1999016198A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1037155A2 (en) * | 1999-03-18 | 2000-09-20 | Siemens Aktiengesellschaft | Method for mediating between communication participants and device for implementing the method |
US7113960B2 (en) | 2002-08-22 | 2006-09-26 | International Business Machines Corporation | Search on and search for functions in applications with varying data types |
US7478435B2 (en) | 2001-10-30 | 2009-01-13 | Sony Corporation | Version management system for multiple application elements |
US8510440B2 (en) | 2002-08-22 | 2013-08-13 | International Business Machines Corporation | Simulation of computer application function to assist a user |
Families Citing this family (2381)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7865567B1 (en) * | 1993-12-02 | 2011-01-04 | Discovery Patent Holdings, Llc | Virtual on-demand electronic book |
US7849393B1 (en) | 1992-12-09 | 2010-12-07 | Discovery Communications, Inc. | Electronic book connection to world watch live |
US7835989B1 (en) | 1992-12-09 | 2010-11-16 | Discovery Communications, Inc. | Electronic book alternative delivery systems |
US7509270B1 (en) | 1992-12-09 | 2009-03-24 | Discovery Communications, Inc. | Electronic Book having electronic commerce features |
CA2151456C (en) | 1992-12-09 | 2004-03-02 | John S. Hendricks | Reprogrammable terminal for suggesting programs offered on a television program delivery system |
US8073695B1 (en) | 1992-12-09 | 2011-12-06 | Adrea, LLC | Electronic book with voice emulation features |
US9053640B1 (en) | 1993-12-02 | 2015-06-09 | Adrea, LLC | Interactive electronic book |
US8095949B1 (en) | 1993-12-02 | 2012-01-10 | Adrea, LLC | Electronic book with restricted access features |
US7861166B1 (en) | 1993-12-02 | 2010-12-28 | Discovery Patent Holding, Llc | Resizing document pages to fit available hardware screens |
US7036019B1 (en) | 1994-04-01 | 2006-04-25 | Intarsia Software Llc | Method for controlling database copyrights |
JPH07271865A (en) | 1994-04-01 | 1995-10-20 | Mitsubishi Corp | Method for managing copyright of data base |
US6744894B1 (en) * | 1994-04-01 | 2004-06-01 | Mitsubishi Corporation | Data management system |
US7302415B1 (en) | 1994-09-30 | 2007-11-27 | Intarsia Llc | Data copyright management system |
US8595502B2 (en) | 1995-09-29 | 2013-11-26 | Intarsia Software Llc | Data management system |
US7801817B2 (en) | 1995-10-27 | 2010-09-21 | Makoto Saito | Digital content management system and apparatus |
US6424715B1 (en) | 1994-10-27 | 2002-07-23 | Mitsubishi Corporation | Digital content management system and apparatus |
EP0715241B1 (en) | 1994-10-27 | 2004-01-14 | Mitsubishi Corporation | Apparatus for data copyright management system |
DE69535013D1 (en) | 1994-10-27 | 2006-07-06 | Intarsia Software Llc | Copyright data management system |
US6515968B1 (en) | 1995-03-17 | 2003-02-04 | Worldcom, Inc. | Integrated interface for real time web based viewing of telecommunications network call traffic |
US6240450B1 (en) * | 1995-10-16 | 2001-05-29 | British Telecommunications Public Limited Company | Network data visualization system and method for downloading visualization software to a user station after user authentication |
US6473407B1 (en) | 1997-09-05 | 2002-10-29 | Worldcom, Inc. | Integrated proxy interface for web based alarm management tools |
CN1543611A (en) * | 2001-03-02 | 2004-11-03 | 电脑联合想象公司 | Method and apparatus for generating context-descriptive messages |
US7668781B2 (en) | 1996-10-31 | 2010-02-23 | Citicorp Development Center, Inc. | Global method and system for providing enhanced transactional functionality through a customer terminal |
US7502752B1 (en) | 1997-08-07 | 2009-03-10 | Citicorp Development Center, Inc. | System and method for delivering financial services |
US8112330B1 (en) | 1997-08-07 | 2012-02-07 | Citibank Development Center, Inc. | System and method for delivering financial services |
US7249344B1 (en) | 1996-10-31 | 2007-07-24 | Citicorp Development Center, Inc. | Delivery of financial services to remote devices |
US7272627B2 (en) * | 1997-02-06 | 2007-09-18 | Genesys Telecommunications Laboratories, Inc. | System and apparatus for pre-routing network events |
US6104802A (en) | 1997-02-10 | 2000-08-15 | Genesys Telecommunications Laboratories, Inc. | In-band signaling for routing |
USRE46243E1 (en) | 1997-02-10 | 2016-12-20 | Genesys Telecommunications Laboratories, Inc. | In-band signaling for routing |
US7031442B1 (en) | 1997-02-10 | 2006-04-18 | Genesys Telecommunications Laboratories, Inc. | Methods and apparatus for personal routing in computer-simulated telephony |
USRE46528E1 (en) | 1997-11-14 | 2017-08-29 | Genesys Telecommunications Laboratories, Inc. | Implementation of call-center outbound dialing capability at a telephony network level |
US6480600B1 (en) | 1997-02-10 | 2002-11-12 | Genesys Telecommunications Laboratories, Inc. | Call and data correspondence in a call-in center employing virtual restructuring for computer telephony integrated functionality |
US7366900B2 (en) * | 1997-02-12 | 2008-04-29 | Verizon Laboratories, Inc. | Platform-neutral system and method for providing secure remote operations over an insecure computer network |
US7062781B2 (en) * | 1997-02-12 | 2006-06-13 | Verizon Laboratories Inc. | Method for providing simultaneous parallel secure command execution on multiple remote hosts |
ES2290986T3 (en) | 1997-03-12 | 2008-02-16 | Nomadix, Inc. | Nomada transmitter or router. |
US6778651B1 (en) * | 1997-04-03 | 2004-08-17 | Southwestern Bell Telephone Company | Apparatus and method for facilitating service management of communications services in a communications network |
US20010048738A1 (en) | 1997-04-03 | 2001-12-06 | Sbc Technology Resourses, Inc. | Profile management system including user interface for accessing and maintaining profile data of user subscribed telephony services |
US7290288B2 (en) * | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
US6052726A (en) * | 1997-06-30 | 2000-04-18 | Mci Communications Corp. | Delay calculation for a frame relay network |
US6453352B1 (en) * | 1997-07-14 | 2002-09-17 | Electronic Data Systems Corporation | Integrated electronic commerce system and method |
JPH1185651A (en) * | 1997-09-01 | 1999-03-30 | Yamatake Honeywell Co Ltd | Communication interface device, object equipment and communication method |
CA2246130C (en) * | 1997-09-04 | 2003-01-14 | Debbie Pinard | Web based help desk |
US6782087B1 (en) | 1997-09-19 | 2004-08-24 | Mci Communications Corporation | Desktop telephony application program for a call center agent |
US7225249B1 (en) * | 1997-09-26 | 2007-05-29 | Mci, Llc | Integrated systems for providing communications network management services and interactive generating invoice documents |
US6745229B1 (en) | 1997-09-26 | 2004-06-01 | Worldcom, Inc. | Web based integrated customer interface for invoice reporting |
US6490620B1 (en) | 1997-09-26 | 2002-12-03 | Worldcom, Inc. | Integrated proxy interface for web based broadband telecommunications management |
US7058600B1 (en) * | 1997-09-26 | 2006-06-06 | Mci, Inc. | Integrated proxy interface for web based data management reports |
US6381644B2 (en) * | 1997-09-26 | 2002-04-30 | Mci Worldcom, Inc. | Integrated proxy interface for web based telecommunications network management |
US6763376B1 (en) * | 1997-09-26 | 2004-07-13 | Mci Communications Corporation | Integrated customer interface system for communications network management |
US6714979B1 (en) | 1997-09-26 | 2004-03-30 | Worldcom, Inc. | Data warehousing infrastructure for web based reporting tool |
US20040193512A1 (en) * | 1998-09-24 | 2004-09-30 | Parmeshwar Gobin | Web based integrated customer interface for invoice reporting |
US6466663B1 (en) | 1997-09-30 | 2002-10-15 | Don Ravenscroft | Monitoring system client for a call center |
US6490350B2 (en) * | 1997-09-30 | 2002-12-03 | Mci Communications Corporation | Monitoring system for telephony resources in a call center |
JP4312954B2 (en) * | 1997-10-21 | 2009-08-12 | ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニーBritish Telecommunications Public Limited Company | Information management system |
US6097887A (en) * | 1997-10-27 | 2000-08-01 | Kla-Tencor Corporation | Software system and method for graphically building customized recipe flowcharts |
US20020194084A1 (en) * | 1997-11-14 | 2002-12-19 | Anita Surles | Method and use of point-of sale terminal, which receives, transmits, stores, authorizes, reconciles, and calculates transactions electronically |
US6789080B1 (en) * | 1997-11-14 | 2004-09-07 | Adobe Systems Incorporated | Retrieving documents transitively linked to an initial document |
US6415278B1 (en) * | 1997-11-14 | 2002-07-02 | Adobe Systems Incorporated | Retrieving documents transitively linked to an initial document |
US6681227B1 (en) * | 1997-11-19 | 2004-01-20 | Ns Solutions Corporation | Database system and a method of data retrieval from the system |
EP1031105A2 (en) * | 1997-11-20 | 2000-08-30 | Xacct Technologies, Inc. | Network accounting and billing system and method |
US6065120A (en) * | 1997-12-09 | 2000-05-16 | Phone.Com, Inc. | Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices |
US7055173B1 (en) | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch |
US6038597A (en) * | 1998-01-20 | 2000-03-14 | Dell U.S.A., L.P. | Method and apparatus for providing and accessing data at an internet site |
US6363077B1 (en) * | 1998-02-13 | 2002-03-26 | Broadcom Corporation | Load balancing in link aggregation and trunking |
US9008075B2 (en) | 2005-12-22 | 2015-04-14 | Genesys Telecommunications Laboratories, Inc. | System and methods for improving interaction routing performance |
US7907598B2 (en) | 1998-02-17 | 2011-03-15 | Genesys Telecommunication Laboratories, Inc. | Method for implementing and executing communication center routing strategies represented in extensible markup language |
US7194757B1 (en) | 1998-03-06 | 2007-03-20 | Starguide Digital Network, Inc. | Method and apparatus for push and pull distribution of multimedia |
JPH11261556A (en) * | 1998-03-16 | 1999-09-24 | Fujitsu Ltd | Information distribution receiving system, information distributing device, information receiver and information distribution/receiving method |
US7584505B2 (en) * | 2001-10-16 | 2009-09-01 | Microsoft Corporation | Inspected secure communication protocol |
US6434619B1 (en) * | 1998-04-29 | 2002-08-13 | Alcatel Canada Inc. | Internet-enabled service management system and method |
US6339826B2 (en) | 1998-05-05 | 2002-01-15 | International Business Machines Corp. | Client-server system for maintaining a user desktop consistent with server application user access permissions |
US7389284B1 (en) | 2000-02-29 | 2008-06-17 | Oracle International Corporation | Method and mechanism for efficient processing of remote-mapped queries |
US7089331B1 (en) | 1998-05-29 | 2006-08-08 | Oracle International Corporation | Method and mechanism for reducing client-side memory footprint of transmitted data |
US6363421B2 (en) * | 1998-05-31 | 2002-03-26 | Lucent Technologies, Inc. | Method for computer internet remote management of a telecommunication network element |
US6892300B2 (en) * | 1998-06-04 | 2005-05-10 | International Business Machines Corporation | Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller |
US6718470B1 (en) * | 1998-06-05 | 2004-04-06 | Entrust Technologies Limited | System and method for granting security privilege in a communication system |
US20030191717A1 (en) * | 1998-06-05 | 2003-10-09 | Johnson Teddy C. | High performance server data delivery system and method |
US6650342B1 (en) * | 1998-06-30 | 2003-11-18 | Samsung Electronics Co., Ltd. | Method for operating network management system in a graphic user interface enviroment and network management system |
US6829242B2 (en) * | 1998-06-30 | 2004-12-07 | Cisco Technology, Inc. | Method and apparatus for associating PVC identifiers with domain names of home gateways |
US7870239B1 (en) * | 1998-06-30 | 2011-01-11 | Emc Corporation | Method and system for securing network access to dynamically updateable data stored in a data storage system |
US6490624B1 (en) * | 1998-07-10 | 2002-12-03 | Entrust, Inc. | Session management in a stateless network system |
US6665702B1 (en) | 1998-07-15 | 2003-12-16 | Radware Ltd. | Load balancing |
US20020138640A1 (en) * | 1998-07-22 | 2002-09-26 | Uri Raz | Apparatus and method for improving the delivery of software applications and associated data in web-based systems |
US6311221B1 (en) * | 1998-07-22 | 2001-10-30 | Appstream Inc. | Streaming modules |
US20010044850A1 (en) | 1998-07-22 | 2001-11-22 | Uri Raz | Method and apparatus for determining the order of streaming modules |
US7197570B2 (en) | 1998-07-22 | 2007-03-27 | Appstream Inc. | System and method to send predicted application streamlets to a client device |
US20010037400A1 (en) * | 1998-07-22 | 2001-11-01 | Uri Raz | Method and system for decreasing the user-perceived system response time in web-based systems |
DE69937242T2 (en) * | 1998-08-10 | 2008-06-26 | British Telecommunications P.L.C. | Anrufleitweglenklung in an intelligent network |
US6332154B2 (en) | 1998-09-11 | 2001-12-18 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for providing media-independent self-help modules within a multimedia communication-center customer interface |
US6711611B2 (en) | 1998-09-11 | 2004-03-23 | Genesis Telecommunications Laboratories, Inc. | Method and apparatus for data-linking a mobile knowledge worker to home communication-center infrastructure |
USRE46153E1 (en) | 1998-09-11 | 2016-09-20 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus enabling voice-based management of state and interaction of a remote knowledge worker in a contact center environment |
US6985943B2 (en) | 1998-09-11 | 2006-01-10 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center |
US6874119B2 (en) * | 1998-09-11 | 2005-03-29 | Genesys Telecommunications Laboratories, Inc. | Stored-media interface engine providing an abstract record of stored multimedia files within a multimedia communication center |
US6401111B1 (en) * | 1998-09-11 | 2002-06-04 | International Business Machines Corporation | Interaction monitor and interaction history for service applications |
USRE46387E1 (en) | 1998-09-11 | 2017-05-02 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center |
US6324569B1 (en) * | 1998-09-23 | 2001-11-27 | John W. L. Ogilvie | Self-removing email verified or designated as such by a message distributor for the convenience of a recipient |
US6711608B1 (en) | 1998-09-23 | 2004-03-23 | John W. L. Ogilvie | Method for including a self-removing code in a self-removing message |
US7478142B1 (en) * | 1998-09-29 | 2009-01-13 | Netscape Communications Corporation | Self-contained applications that are applied to be received by and processed within a browser environment and that have a first package that includes a manifest file and an archive of files including a markup language file and second package |
US7882247B2 (en) * | 1999-06-11 | 2011-02-01 | Netmotion Wireless, Inc. | Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments |
US6560611B1 (en) * | 1998-10-13 | 2003-05-06 | Netarx, Inc. | Method, apparatus, and article of manufacture for a network monitoring system |
US6341352B1 (en) * | 1998-10-15 | 2002-01-22 | International Business Machines Corporation | Method for changing a security policy during processing of a transaction request |
JP3935276B2 (en) * | 1998-10-21 | 2007-06-20 | キヤノン株式会社 | Network device management method, apparatus, storage medium, and delivery device |
US7131069B1 (en) * | 1998-10-22 | 2006-10-31 | Made2 Manage Systems, Inc. | Navigational interface for ERP system |
US6981222B2 (en) * | 1998-10-22 | 2005-12-27 | Made2Manage Systems, Inc. | End-to-end transaction processing and statusing system and method |
JP4545317B2 (en) | 1998-10-28 | 2010-09-15 | ヤフー! インコーポレイテッド | Method of controlling the Internet browser interface, and can be controlled browser interface |
US7188180B2 (en) * | 1998-10-30 | 2007-03-06 | Vimetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US7418504B2 (en) | 1998-10-30 | 2008-08-26 | Virnetx, Inc. | Agile network protocol for secure communications using secure domain names |
US6502135B1 (en) | 1998-10-30 | 2002-12-31 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US7010604B1 (en) | 1998-10-30 | 2006-03-07 | Science Applications International Corporation | Agile network protocol for secure communications with assured system availability |
US6360269B1 (en) * | 1998-11-02 | 2002-03-19 | Nortel Networks Limited | Protected keepalive message through the internet |
US6453348B1 (en) * | 1998-11-06 | 2002-09-17 | Ameritech Corporation | Extranet architecture |
US7031963B1 (en) * | 1998-11-09 | 2006-04-18 | Unisys Corporation | Green ice printout sorting and delivery program |
US6691165B1 (en) * | 1998-11-10 | 2004-02-10 | Rainfinity, Inc. | Distributed server cluster for controlling network traffic |
US7506033B2 (en) * | 1998-11-12 | 2009-03-17 | International Business Machines Corporation | System and method for remotely accessing a client in a client server environment |
US6886047B2 (en) * | 1998-11-13 | 2005-04-26 | Jp Morgan Chase Bank | System and method for managing information retrievals for integrated digital and analog archives on a global basis |
US8554932B1 (en) | 1999-11-12 | 2013-10-08 | Jpmorgan Chase Bank, N.A. | Data exchange management system and method |
US6980631B1 (en) * | 1998-11-17 | 2005-12-27 | Callvision, Inc. | System and method for reporting calls |
JP2002531890A (en) | 1998-11-30 | 2002-09-24 | シーベル システムズ,インコーポレイティド | Development tools, methods and systems in a client-server application |
US6985953B1 (en) * | 1998-11-30 | 2006-01-10 | George Mason University | System and apparatus for storage and transfer of secure data on web |
US6266661B1 (en) * | 1998-11-30 | 2001-07-24 | Platinum Technology Ip, Inc. | Method and apparatus for maintaining multi-instance database management systems with hierarchical inheritance and cross-hierarchy overrides |
US6532463B1 (en) * | 1998-12-01 | 2003-03-11 | University Of Florida | Web page accessing of data bases and mainframes |
US6571245B2 (en) * | 1998-12-07 | 2003-05-27 | Magically, Inc. | Virtual desktop in a computer network |
US8713641B1 (en) | 1998-12-08 | 2014-04-29 | Nomadix, Inc. | Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device |
US6477565B1 (en) * | 1999-06-01 | 2002-11-05 | Yodlee.Com, Inc. | Method and apparatus for restructuring of personalized data for transmission from a data network to connected and portable network appliances |
US7194554B1 (en) | 1998-12-08 | 2007-03-20 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization authentication and accounting |
US6636894B1 (en) * | 1998-12-08 | 2003-10-21 | Nomadix, Inc. | Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability |
US8266266B2 (en) | 1998-12-08 | 2012-09-11 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization, authentication and accounting |
US20030191832A1 (en) * | 1999-06-01 | 2003-10-09 | Ramakrishna Satyavolu | Method and apparatus for controlled establishment of a turnkey system providing a centralized data aggregation and summary capability to third party entities |
US7752535B2 (en) | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US7085997B1 (en) | 1998-12-08 | 2006-08-01 | Yodlee.Com | Network-based bookmark management and web-summary system |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US6324578B1 (en) | 1998-12-14 | 2001-11-27 | International Business Machines Corporation | Methods, systems and computer program products for management of configurable application programs on a network |
US6510466B1 (en) * | 1998-12-14 | 2003-01-21 | International Business Machines Corporation | Methods, systems and computer program products for centralized management of application programs on a network |
US6523172B1 (en) * | 1998-12-17 | 2003-02-18 | Evolutionary Technologies International, Inc. | Parser translator system and method |
US7356482B2 (en) * | 1998-12-18 | 2008-04-08 | Alternative Systems, Inc. | Integrated change management unit |
US6269395B1 (en) * | 1998-12-21 | 2001-07-31 | Nortel Networks Limited | Method and system in a computer-based system for providing access to services associated with different access points |
US7152070B1 (en) * | 1999-01-08 | 2006-12-19 | The Regents Of The University Of California | System and method for integrating and accessing multiple data sources within a data warehouse architecture |
JP2003526230A (en) * | 1999-01-09 | 2003-09-02 | ヒート タイマー コーポレーション | Electronic message delivery system and method that can be used when monitoring device |
US20020023207A1 (en) * | 1999-01-14 | 2002-02-21 | Olik Zbigniew T. | Secure data transfer between a client and a back-end resource via an intermediary |
US7007029B1 (en) * | 1999-01-15 | 2006-02-28 | Metaedge Corporation | System for visualizing information in a data warehousing environment |
US7320001B1 (en) * | 1999-01-15 | 2008-01-15 | Hon Hai Precision Industry, Ltd. | Method for visualizing information in a data warehousing environment |
US6442600B1 (en) * | 1999-01-15 | 2002-08-27 | Micron Technology, Inc. | Method and system for centralized storage and management of electronic messages |
US7233952B1 (en) * | 1999-01-15 | 2007-06-19 | Hon Hai Precision Industry, Ltd. | Apparatus for visualizing information in a data warehousing environment |
US6807632B1 (en) * | 1999-01-21 | 2004-10-19 | Emc Corporation | Content addressable information encapsulation, representation, and transfer |
US20010012346A1 (en) * | 1999-01-29 | 2001-08-09 | Alex Terry | Interactive billing system utilizing a thin web client interface |
US6898636B1 (en) * | 1999-02-04 | 2005-05-24 | Intralinks, Inc. | Methods and systems for interchanging documents between a sender computer, a server and a receiver computer |
JP3833409B2 (en) * | 1999-02-05 | 2006-10-11 | 株式会社日立製作所 | The proxy server device |
US6658571B1 (en) * | 1999-02-09 | 2003-12-02 | Secure Computing Corporation | Security framework for dynamically wrapping software applications executing in a computing system |
US6687877B1 (en) | 1999-02-17 | 2004-02-03 | Siemens Corp. Research Inc. | Web-based call center system with web document annotation |
CA2264321A1 (en) * | 1999-03-02 | 2000-09-02 | Cognos Incorporated | Method and apparatus for generating reports |
US20030208641A1 (en) * | 1999-03-09 | 2003-11-06 | Wesemann Darren L. | Software components as virtual processors |
US6388682B1 (en) * | 1999-03-18 | 2002-05-14 | International Business Machines Corporation | Adaptive computer display screen window accommodating user or human factor input |
US6907566B1 (en) | 1999-04-02 | 2005-06-14 | Overture Services, Inc. | Method and system for optimum placement of advertisements on a webpage |
US7317787B2 (en) * | 2000-11-21 | 2008-01-08 | At&T Knowledge Ventures, L.P. | Voice enhancing for advance intelligent network services |
US6801949B1 (en) | 1999-04-12 | 2004-10-05 | Rainfinity, Inc. | Distributed server cluster with graphical user interface |
DE19916490A1 (en) * | 1999-04-13 | 2000-10-26 | Alcatel Sa | Monitoring the transmission quality in a digital transmission network |
US6278694B1 (en) * | 1999-04-16 | 2001-08-21 | Concord Communications Inc. | Collecting and reporting monitoring data from remote network probes |
CA2301435C (en) * | 1999-04-16 | 2006-10-10 | At&T Corp. | Method for reducing congestion in packet-switched networks |
EP1186184B1 (en) * | 1999-04-20 | 2006-07-12 | Telenokia Oy | Information collection method and system |
US7756967B1 (en) | 1999-04-26 | 2010-07-13 | Mainstream Scientific, Llc | Apparatus and method of hosting internet content |
US6701368B1 (en) * | 1999-04-26 | 2004-03-02 | Cisco Technology, Inc. | Providing a stream of data to a browser to update properties on a page |
US20040111471A1 (en) * | 1999-04-27 | 2004-06-10 | Worldcom, Inc. | Alarm monitoring system for a telecommunications network |
JP3451981B2 (en) * | 1999-04-30 | 2003-09-29 | 日本電気株式会社 | Home data collection method of the Internet |
US7016951B1 (en) * | 1999-04-30 | 2006-03-21 | Mantech Ctx Corporation | System and method for network security |
US6684248B1 (en) * | 1999-05-03 | 2004-01-27 | Certifiedmail.Com, Inc. | Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist |
FI107488B (en) * | 1999-05-10 | 2001-08-15 | Nokia Networks Oy | The method and system of the telephone exchange system, |
EP1183617A4 (en) * | 1999-05-11 | 2007-11-14 | Newsnet Ltd | Signalling apparatus and method |
WO2000070838A3 (en) * | 1999-05-14 | 2002-01-10 | Pivia Inc | Client-server independent intermediary mechanism |
US6718388B1 (en) * | 1999-05-18 | 2004-04-06 | Jp Morgan Chase Bank | Secured session sequencing proxy system and method therefor |
US7421648B1 (en) * | 1999-05-21 | 2008-09-02 | E-Numerate Solutions, Inc. | Reusable data markup language |
US9262384B2 (en) | 1999-05-21 | 2016-02-16 | E-Numerate Solutions, Inc. | Markup language system, method, and computer program product |
US6920608B1 (en) | 1999-05-21 | 2005-07-19 | E Numerate Solutions, Inc. | Chart view for reusable data markup language |
US9268748B2 (en) | 1999-05-21 | 2016-02-23 | E-Numerate Solutions, Inc. | System, method, and computer program product for outputting markup language documents |
US9262383B2 (en) | 1999-05-21 | 2016-02-16 | E-Numerate Solutions, Inc. | System, method, and computer program product for processing a markup document |
US7249328B1 (en) * | 1999-05-21 | 2007-07-24 | E-Numerate Solutions, Inc. | Tree view for reusable data markup language |
WO2000071321A3 (en) * | 1999-05-21 | 2002-01-17 | Microsoft Corp | Shared views for browsing content |
US6282544B1 (en) * | 1999-05-24 | 2001-08-28 | Computer Associates Think, Inc. | Method and apparatus for populating multiple data marts in a single aggregation process |
US7730172B1 (en) * | 1999-05-24 | 2010-06-01 | Computer Associates Think, Inc. | Method and apparatus for reactive and deliberative service level management (SLM) |
US20050080799A1 (en) * | 1999-06-01 | 2005-04-14 | Abb Flexible Automaton, Inc. | Real-time information collection and distribution system for robots and electronically controlled machines |
US6463468B1 (en) * | 1999-06-01 | 2002-10-08 | Netzero, Inc. | Targeted network video download interface |
US20020023057A1 (en) * | 1999-06-01 | 2002-02-21 | Goodwin Johnathan David | Web-enabled value bearing item printing |
US7146505B1 (en) | 1999-06-01 | 2006-12-05 | America Online, Inc. | Secure data exchange between date processing systems |
US6807549B2 (en) | 1999-06-03 | 2004-10-19 | B.I.S. Advanced Software Systems Ltd. | General purpose interpreter and database for accessing enterprise servers over an internet protocol network |
US6889260B1 (en) * | 1999-06-10 | 2005-05-03 | Ec Enabler, Ltd | Method and system for transferring information |
JP4150131B2 (en) * | 1999-06-10 | 2008-09-17 | 東芝テック株式会社 | Image processing system |
EP1264223A4 (en) * | 1999-06-11 | 2004-04-07 | Honeywell Ltd | Method and system for remotely monitoring time variant data |
US6560609B1 (en) * | 1999-06-14 | 2003-05-06 | International Business Machines Corporation | Delegating instance management functions to underlying resource managers |
US7065785B1 (en) * | 1999-06-15 | 2006-06-20 | Siemens Communications, Inc. | Apparatus and method for TOL client boundary protection |
US7606760B2 (en) * | 1999-06-18 | 2009-10-20 | Echarge Corporation | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US7249097B2 (en) * | 1999-06-18 | 2007-07-24 | Echarge Corporation | Method for ordering goods, services, and content over an internetwork using a virtual payment account |
US6606657B1 (en) * | 1999-06-22 | 2003-08-12 | Comverse, Ltd. | System and method for processing and presenting internet usage information |
US6601088B1 (en) * | 1999-06-23 | 2003-07-29 | International Business Machines Corporation | User controlled e-mail deletion |
GB2368692B (en) * | 1999-06-25 | 2003-02-12 | Jacobs Rimell Ltd | Automated provisioning system |
US7539749B2 (en) * | 2000-04-20 | 2009-05-26 | Amdocs (Israel) Ltd. | Method and apparatus for session reconstruction |
US7356390B2 (en) | 1999-06-29 | 2008-04-08 | Space Data Corporation | Systems and applications of lighter-than-air (LTA) platforms |
US6670973B1 (en) * | 1999-06-29 | 2003-12-30 | Electronic Data Systems Corporation | System and method for representing the information technology infrastructure of an organization |
US9643706B2 (en) | 2001-04-18 | 2017-05-09 | Space Data Corporation | Systems and applications of lighter-than-air (LTA) platforms |
US9632503B2 (en) | 2001-04-18 | 2017-04-25 | Space Data Corporation | Systems and applications of lighter-than-air (LTA) platforms |
US6470390B1 (en) * | 1999-06-29 | 2002-10-22 | Cisco Technology, Inc. | Method and apparatus for a dual connection communication session |
US9908608B2 (en) | 2001-04-18 | 2018-03-06 | Space Data Corporation | Systems and applications of lighter-than-air (LTA) platforms |
US6938081B1 (en) * | 1999-06-30 | 2005-08-30 | Level 3 Communications, Inc. | Methods and systems for managing network infrastructure change including obtaining approval for the network infrastructure changes |
US9053500B2 (en) * | 1999-06-30 | 2015-06-09 | Blackboard Inc. | Internet-based education support system and method with multi-language capability |
WO2001002964A1 (en) * | 1999-06-30 | 2001-01-11 | Suntory Limited | Web application system having session management/distributed management function and mechanism for operating the same |
US20040181668A1 (en) * | 1999-06-30 | 2004-09-16 | Blew Edwin O. | Methods for conducting server-side encryption/decryption-on-demand |
US6662223B1 (en) * | 1999-07-01 | 2003-12-09 | Cisco Technology, Inc. | Protocol to coordinate network end points to measure network latency |
US6628654B1 (en) * | 1999-07-01 | 2003-09-30 | Cisco Technology, Inc. | Dispatching packets from a forwarding agent using tag switching |
US7058817B1 (en) | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
US7346695B1 (en) | 2002-10-28 | 2008-03-18 | F5 Networks, Inc. | System and method for performing application level persistence |
US7644366B1 (en) * | 1999-07-30 | 2010-01-05 | Computer Associates Think, Inc. | Method and system for displaying a plurality of discrete files in a compound file |
US7100195B1 (en) * | 1999-07-30 | 2006-08-29 | Accenture Llp | Managing user information on an e-commerce system |
US6880126B1 (en) | 1999-08-03 | 2005-04-12 | International Business Machines Corporation | Controlling presentation of a GUI, using view controllers created by an application mediator, by identifying a destination to access a target to retrieve data |
US6286104B1 (en) * | 1999-08-04 | 2001-09-04 | Oracle Corporation | Authentication and authorization in a multi-tier relational database management system |
US7929978B2 (en) | 1999-12-01 | 2011-04-19 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for providing enhanced communication capability for mobile devices on a virtual private network |
US7130879B1 (en) | 1999-08-10 | 2006-10-31 | Alexandre Dayon | System for publishing, organizing, accessing and distributing information in a computer network |
US6859834B1 (en) * | 1999-08-13 | 2005-02-22 | Sun Microsystems, Inc. | System and method for enabling application server request failover |
US6879995B1 (en) * | 1999-08-13 | 2005-04-12 | Sun Microsystems, Inc. | Application server message logging |
US6779016B1 (en) | 1999-08-23 | 2004-08-17 | Terraspring, Inc. | Extensible computing system |
US7146233B2 (en) * | 2000-02-11 | 2006-12-05 | Sun Microsystems, Inc. | Request queue management |
US7142530B1 (en) * | 1999-08-27 | 2006-11-28 | Bellsouth Intellectual Property Corp. | Methods and systems of network management |
US7483967B2 (en) * | 1999-09-01 | 2009-01-27 | Ximeta Technology, Inc. | Scalable server architecture based on asymmetric 3-way TCP |
US6772333B1 (en) * | 1999-09-01 | 2004-08-03 | Dickens Coal Llc | Atomic session-start operation combining clear-text and encrypted sessions to provide id visibility to middleware such as load-balancers |
US6493745B1 (en) * | 1999-09-03 | 2002-12-10 | Microsoft Corporation | Message processing technique to improve client computer response to user input |
WO2001018714A8 (en) * | 1999-09-08 | 2001-11-15 | Wizard Technologies Inc | Transaction and account management system |
US6687745B1 (en) * | 1999-09-14 | 2004-02-03 | Droplet, Inc | System and method for delivering a graphical user interface of remote applications over a thin bandwidth connection |
US6360221B1 (en) | 1999-09-21 | 2002-03-19 | Neostar, Inc. | Method and apparatus for the production, delivery, and receipt of enhanced e-mail |
US9092535B1 (en) | 1999-09-21 | 2015-07-28 | Google Inc. | E-mail embedded textual hyperlink object |
US7840639B1 (en) * | 1999-09-21 | 2010-11-23 | G&H Nevada-Tek | Method and article of manufacture for an automatically executed application program associated with an electronic message |
FI109165B (en) * | 1999-09-24 | 2002-05-31 | Elisa Comm Oyj | A method for controlling computer network traffic |
US6877036B1 (en) * | 1999-09-24 | 2005-04-05 | Akamba Corporation | System and method for managing connections between a client and a server |
US6922722B1 (en) | 1999-09-30 | 2005-07-26 | Intel Corporation | Method and apparatus for dynamic network configuration of an alert-based client |
US7318089B1 (en) | 1999-09-30 | 2008-01-08 | Intel Corporation | Method and apparatus for performing network-based control functions on an alert-enabled managed client |
US7206833B1 (en) * | 1999-09-30 | 2007-04-17 | Intel Corporation | Platform independent alert detection and management |
WO2001025964A3 (en) | 1999-10-01 | 2001-11-29 | Accenture Llp | Base service architectures for netcentric computing systems |
US6988249B1 (en) | 1999-10-01 | 2006-01-17 | Accenture Llp | Presentation service architectures for netcentric computing systems |
US7020697B1 (en) * | 1999-10-01 | 2006-03-28 | Accenture Llp | Architectures for netcentric computing systems |
US6874010B1 (en) | 1999-10-01 | 2005-03-29 | Accenture Llp | Base service architectures for netcentric computing systems |
US6633851B1 (en) | 1999-10-01 | 2003-10-14 | B-50.Com, Llc | Systems and methods for generating custom reports based on point-of-sale data |
US7068680B1 (en) | 1999-10-01 | 2006-06-27 | Accenture Llp | Communication service architectures for netcentric computing systems |
US7610289B2 (en) * | 2000-10-04 | 2009-10-27 | Google Inc. | System and method for monitoring and analyzing internet traffic |
US7904569B1 (en) * | 1999-10-06 | 2011-03-08 | Gelvin David C | Method for remote access of vehicle components |
US7366696B1 (en) * | 1999-10-08 | 2008-04-29 | Checkfree Corporation | Electronic billing with flexible biller controlled electronic bill presentment |
US6522333B1 (en) * | 1999-10-08 | 2003-02-18 | Electronic Arts Inc. | Remote communication through visual representations |
WO2001028212A1 (en) * | 1999-10-08 | 2001-04-19 | Nortel Networks Limited | Method, apparatus, and article of manufacture for web-based control of a call server |
US7519905B2 (en) * | 1999-10-12 | 2009-04-14 | Webmd Corp. | Automatic formatting and validating of text for a markup language graphical user interface |
JP3274441B2 (en) * | 1999-10-13 | 2002-04-15 | エヌ・ティ・ティ・コムウェア株式会社 | Call detail collection device, call detail processing apparatus, call detail processor, call detail management device, call detail processing system, call detail collection method, call detail processing method, call detail processing method and call detail managing |
US6798753B1 (en) * | 1999-10-14 | 2004-09-28 | International Business Machines Corporation | Automatically establishing conferences from desktop applications over the Internet |
WO2001029779A1 (en) * | 1999-10-18 | 2001-04-26 | Stamps.Com | Secure and recoverable database for on-line value-bearing item system |
US7233929B1 (en) | 1999-10-18 | 2007-06-19 | Stamps.Com | Postal system intranet and commerce processing for on-line value bearing system |
US7216110B1 (en) * | 1999-10-18 | 2007-05-08 | Stamps.Com | Cryptographic module for secure processing of value-bearing items |
US7467211B1 (en) * | 1999-10-18 | 2008-12-16 | Cisco Technology Inc. | Remote computer system management through an FTP internet connection |
EP1224629A1 (en) | 1999-10-18 | 2002-07-24 | Stamps.Com | Role assignments in a cryptographic module for secure processing of value-bearing items |
US6633312B1 (en) | 1999-10-19 | 2003-10-14 | Nortel Networks Limited | Method and apparatus for selecting network entities |
US6496977B1 (en) * | 1999-10-21 | 2002-12-17 | International Business Machines Corporation | Method and system for implementing network filesystem-based aid for computer operating system upgrades |
WO2001031885A3 (en) * | 1999-10-22 | 2002-01-17 | Nomadix Inc | Gateway device having an xml interface and associated method |
US6851089B1 (en) * | 1999-10-25 | 2005-02-01 | Amazon.Com, Inc. | Software application and associated methods for generating a software layer for structuring semistructured information |
US6978381B1 (en) * | 1999-10-26 | 2005-12-20 | International Business Machines Corporation | Enhancement to a system for automated generation of file access control system commands |
US8271626B2 (en) | 2001-01-26 | 2012-09-18 | American Power Conversion Corporation | Methods for displaying physical network topology and environmental status by location, organization, or responsible party |
US6714977B1 (en) * | 1999-10-27 | 2004-03-30 | Netbotz, Inc. | Method and system for monitoring computer networks and equipment |
US6779177B1 (en) | 1999-10-28 | 2004-08-17 | International Business Machines Corporation | Mechanism for cross channel multi-server multi-protocol multi-data model thin clients |
US6886103B1 (en) * | 1999-10-28 | 2005-04-26 | Lucent Technologies Inc. | Method and apparatus for extending network address translation for unsupported protocols |
WO2001031874A3 (en) * | 1999-10-28 | 2002-01-24 | Chase Manhattan Bank Nat Ass | Secured session sequencing proxy system supporting multiple applications and method therefor |
US6862686B1 (en) | 1999-10-29 | 2005-03-01 | International Business Machines Corporation | Method and apparatus in a data processing system for the separation of role-based permissions specification from its corresponding implementation of its semantic behavior |
US6675193B1 (en) * | 1999-10-29 | 2004-01-06 | Invensys Software Systems | Method and system for remote control of a local system |
US7181686B1 (en) | 1999-10-29 | 2007-02-20 | International Business Machines Corporation | Selecting screens in a GUI using events generated by a set of view controllers |
US20050149559A1 (en) * | 1999-11-01 | 2005-07-07 | Oppedahl & Larson Llp | Status monitoring system |
WO2002041597A3 (en) * | 2000-11-17 | 2002-11-21 | Ipwireless Inc | Use of internet web technology for wireless internet access |
US7571131B1 (en) * | 1999-11-05 | 2009-08-04 | Ford Motor Company | Method of conducting online competitive price quoting events |
JP3565490B2 (en) * | 1999-11-09 | 2004-09-15 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Maschines Corporation | Client-server system, a server, a client, a proxy server control method, proxy server function provides a method and storage medium |
US20040193695A1 (en) * | 1999-11-10 | 2004-09-30 | Randy Salo | Secure remote access to enterprise networks |
US7370004B1 (en) * | 1999-11-15 | 2008-05-06 | The Chase Manhattan Bank | Personalized interactive network architecture |
US6948175B1 (en) * | 1999-11-16 | 2005-09-20 | Ricoh Company, Ltd. | Method and system of remote diagnostic, control and information collection using a dynamic linked library |
US6931111B1 (en) * | 1999-11-24 | 2005-08-16 | Netgen Communications, Inc. | Methods and systems for providing communications services |
US6782425B1 (en) * | 1999-11-24 | 2004-08-24 | Unisys Corporation | Session based security profile for internet access of an enterprise server |
JP3395896B2 (en) * | 1999-11-25 | 2003-04-14 | 株式会社ジャストシステム | Information providing system and method, the client device and the intermediary device |
JP2001216226A (en) * | 1999-11-26 | 2001-08-10 | Mitsubishi Electric Corp | Inter-application data transmission/reception system and method threfor, and computer-readable recording medium having program for making computer operate inter-application data transmission/reception method recording thereon |
US6836803B1 (en) | 1999-11-30 | 2004-12-28 | Accenture Llp | Operations architecture to implement a local service activation management system |
US6813278B1 (en) * | 1999-11-30 | 2004-11-02 | Accenture Llp | Process for submitting and handling a service request in a local service management system |
US6961778B2 (en) * | 1999-11-30 | 2005-11-01 | Accenture Llp | Management interface between a core telecommunication system and a local service provider |
US6732167B1 (en) * | 1999-11-30 | 2004-05-04 | Accenture L.L.P. | Service request processing in a local service activation management environment |
US7966259B1 (en) | 1999-12-09 | 2011-06-21 | Amazon.Com, Inc. | System and methods for facilitating transactions on, and personalizing web pages of, third party web sites |
US7506358B1 (en) * | 1999-12-09 | 2009-03-17 | Cisco Technology, Inc. | Method and apparatus supporting network communications through a firewall |
US6970941B1 (en) | 1999-12-10 | 2005-11-29 | Sun Microsystems, Inc. | System and method for separating addresses from the delivery scheme in a virtual private network |
DE20020773U1 (en) * | 1999-12-10 | 2001-04-19 | Firstgate Internet Ag | Server means for transmitting electronic data sets |
US7765581B1 (en) * | 1999-12-10 | 2010-07-27 | Oracle America, Inc. | System and method for enabling scalable security in a virtual private network |
US6977929B1 (en) | 1999-12-10 | 2005-12-20 | Sun Microsystems, Inc. | Method and system for facilitating relocation of devices on a network |
US7336790B1 (en) | 1999-12-10 | 2008-02-26 | Sun Microsystems Inc. | Decoupling access control from key management in a network |
US6938169B1 (en) | 1999-12-10 | 2005-08-30 | Sun Microsystems, Inc. | Channel-specific file system views in a private network using a public-network infrastructure |
US20010044840A1 (en) * | 1999-12-13 | 2001-11-22 | Live Networking, Inc. | Method and system for real-tme monitoring and administration of computer networks |
US6668275B1 (en) * | 1999-12-17 | 2003-12-23 | Honeywell International Inc. | System and method for multiprocessor management |
US6823452B1 (en) * | 1999-12-17 | 2004-11-23 | International Business Machines Corporation | Providing end-to-end user authentication for host access using digital certificates |
US6775658B1 (en) * | 1999-12-21 | 2004-08-10 | Mci, Inc. | Notification by business rule trigger control |
US7447509B2 (en) | 1999-12-22 | 2008-11-04 | Celeritasworks, Llc | Geographic management system |
US8452776B2 (en) * | 1999-12-22 | 2013-05-28 | Celeritasworks, Llc | Spatial data portal |
US6343290B1 (en) * | 1999-12-22 | 2002-01-29 | Celeritas Technologies, L.L.C. | Geographic network management system |
US7523190B1 (en) * | 1999-12-23 | 2009-04-21 | Bickerstaff Cynthia L | Real-time performance assessment of large area network user experience |
US6934723B2 (en) * | 1999-12-23 | 2005-08-23 | International Business Machines Corporation | Method for file system replication with broadcasting and XDSM |
US6912567B1 (en) * | 1999-12-27 | 2005-06-28 | International Business Machines Corp. | Broadband multi-service proxy server system and method of operation for internet services of user's choice |
US20010034842A1 (en) * | 1999-12-30 | 2001-10-25 | Chacko Matthew Kochumalayil | Common network security |
US20010047385A1 (en) * | 1999-12-30 | 2001-11-29 | Jeffrey Tuatini | Passthru to shared service funtionality |
US6721786B1 (en) * | 2000-01-06 | 2004-04-13 | International Business Machines Corporation | Method and apparatus for balancing bandwidth usage in a browser |
US20050207444A1 (en) * | 2001-01-12 | 2005-09-22 | Eci Telecom Ltd. | Hybrid network element for a multi-protocol layered transmissions network and a graphical representation of the network |
DE60140499D1 (en) * | 2000-01-14 | 2009-12-31 | Eci Telecom Ltd | A method for generating a client / server model in a layered multi - protocol transmission network |
US7188176B1 (en) * | 2000-01-20 | 2007-03-06 | Priceline.Com Incorporated | Apparatus, system, and method for maintaining a persistent data state on a communications network |
US6795859B2 (en) * | 2000-01-21 | 2004-09-21 | Dennis Parker | Scalable server architecture systems and methods |
US20010047261A1 (en) * | 2000-01-24 | 2001-11-29 | Peter Kassan | Partially automated interactive dialog |
US20040205473A1 (en) * | 2000-01-27 | 2004-10-14 | Gwyn Fisher | Method and system for implementing an enterprise information portal |
EP1250637A1 (en) * | 2000-01-27 | 2002-10-23 | Hummingbird Ltd. | A method and system for implementing a common user logon to multiple applications |
US6877023B1 (en) * | 2000-01-28 | 2005-04-05 | Softwired, Inc. | Messaging system for delivering data in the form of portable message formats between message clients |
GB0002019D0 (en) * | 2000-01-29 | 2000-03-22 | Ibm | Data migration tool |
US7379981B2 (en) * | 2000-01-31 | 2008-05-27 | Kenneth W. Garrard | Wireless communication enabled meter and network |
US7003571B1 (en) * | 2000-01-31 | 2006-02-21 | Telecommunication Systems Corporation Of Maryland | System and method for re-directing requests from browsers for communication over non-IP based networks |
US8019836B2 (en) * | 2002-01-02 | 2011-09-13 | Mesh Comm, Llc | Wireless communication enabled meter and network |
US6883032B1 (en) * | 2000-02-02 | 2005-04-19 | Lucent Technologies Inc. | Method and system for collecting data on the internet |
US7739362B1 (en) * | 2000-02-02 | 2010-06-15 | Cisco Technology, Inc. | Method and apparatus for browsing a management information base |
US6647392B1 (en) * | 2000-02-04 | 2003-11-11 | International Business Machines Corporation | Method and apparatus for the request brokering of standardized reports |
US8392578B1 (en) * | 2000-02-09 | 2013-03-05 | Charles Schwab & Co., Inc. | Method and apparatus for controlling access to a website |
US7249155B1 (en) * | 2000-02-09 | 2007-07-24 | International Business Machines Corporation | Method for processing a request to multiple instances of a server program |
US6931419B1 (en) * | 2000-02-11 | 2005-08-16 | Hallmark Cards Incorporated | Data management system for automatically accessing, maintaining, propagating user data among plurality of communities, each of which contains plurality of members |
US8290809B1 (en) | 2000-02-14 | 2012-10-16 | Ebay Inc. | Determining a community rating for a user using feedback ratings of related users in an electronic environment |
US7257542B2 (en) * | 2000-02-16 | 2007-08-14 | Stamps.Com | Secure on-line ticketing |
US7024457B1 (en) * | 2000-02-17 | 2006-04-04 | J2 Global Communications, Inc. | E-mail synchronization between heterogeneous mail servers |
WO2001061568A9 (en) | 2000-02-17 | 2002-04-11 | Numerate Solutions Inc E | Rdl search engine |
US6671728B1 (en) * | 2000-02-18 | 2003-12-30 | G.E. Information Services, Inc. | Abstract initiator |
JP2001237991A (en) * | 2000-02-23 | 2001-08-31 | Kansai Nippon Denki Tsushin System Kk | Caller no-charge communication system and method |
WO2001063946A1 (en) * | 2000-02-23 | 2001-08-30 | Nexterna, Inc. | System and method for dynamically routing messages transmitted from mobile platforms |
US20020156860A1 (en) * | 2000-02-25 | 2002-10-24 | Finke Alan D. | Personal server system |
US6584465B1 (en) * | 2000-02-25 | 2003-06-24 | Eastman Kodak Company | Method and system for search and retrieval of similar patterns |
JP2001243182A (en) * | 2000-02-29 | 2001-09-07 | Nec Corp | Server system, and method for interlocking web contents with the server system |
US9614934B2 (en) | 2000-02-29 | 2017-04-04 | Paypal, Inc. | Methods and systems for harvesting comments regarding users on a network-based facility |
US7428505B1 (en) | 2000-02-29 | 2008-09-23 | Ebay, Inc. | Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility |
US8843617B2 (en) * | 2000-03-01 | 2014-09-23 | Printeron Inc. | Multi-stage polling mechanism and system for the transmission and processing control of network resource data |
US6760750B1 (en) * | 2000-03-01 | 2004-07-06 | Polycom Israel, Ltd. | System and method of monitoring video and/or audio conferencing through a rapid-update web site |
CA2299824C (en) * | 2000-03-01 | 2012-02-21 | Spicer Corporation | Network resource control system |
US7139686B1 (en) * | 2000-03-03 | 2006-11-21 | The Mathworks, Inc. | Report generator for a mathematical computing environment |
JP3926963B2 (en) * | 2000-03-03 | 2007-06-06 | 富士通株式会社 | State setting system and method |
WO2001067355A2 (en) | 2000-03-07 | 2001-09-13 | American Express Travel Related Services Company, Inc. | System for facilitating a transaction |
US7281040B1 (en) | 2000-03-07 | 2007-10-09 | Cisco Technology, Inc. | Diagnostic/remote monitoring by email |
WO2001067304A1 (en) * | 2000-03-07 | 2001-09-13 | Hotlens.Com Inc. | Server-side web browsing and multiple lens system, method and apparatus |
US7340532B2 (en) * | 2000-03-10 | 2008-03-04 | Akamai Technologies, Inc. | Load balancing array packet routing system |
CA2301996A1 (en) * | 2000-03-13 | 2001-09-13 | Spicer Corporation | Wireless attachment enabling |
JP4290309B2 (en) * | 2000-03-13 | 2009-07-01 | シャープ株式会社 | Information communication apparatus, information communication method, and remote management system |
US8645137B2 (en) | 2000-03-16 | 2014-02-04 | Apple Inc. | Fast, language-independent method for user authentication by voice |
US6971086B2 (en) * | 2000-03-16 | 2005-11-29 | Silicon Graphics, Inc. | Common user interface development toolkit for a system administration program |
US9736209B2 (en) | 2000-03-17 | 2017-08-15 | Facebook, Inc. | State change alerts mechanism |
US7739334B1 (en) * | 2000-03-17 | 2010-06-15 | Visto Corporation | System and method for automatically forwarding email and email events via a computer network to a server computer |
US7624172B1 (en) * | 2000-03-17 | 2009-11-24 | Aol Llc | State change alerts mechanism |
US20060288212A1 (en) * | 2001-03-20 | 2006-12-21 | Gutenberg Printing Llc | Transparent user and session management for web applications |
WO2001071523A1 (en) * | 2000-03-20 | 2001-09-27 | Hotlens.Com Inc. | Transparent user and session management for web applications |
US7080035B1 (en) * | 2000-03-20 | 2006-07-18 | Bellsouth Intellectual Property Corp. | System and method for notifying an electronic billing vendor of a customer status change |
US7082471B2 (en) * | 2000-03-20 | 2006-07-25 | International Business Machines Corporation | Method and system of dispatching socks traffic using type of service (TOS) field of IP datagrams |
WO2001071992A3 (en) * | 2000-03-22 | 2002-04-04 | Omnipod Inc | Integrated system and method of providing online access to files and information |
US6963875B2 (en) * | 2000-03-23 | 2005-11-08 | General Atomics | Persistent archives |
US7177901B1 (en) * | 2000-03-27 | 2007-02-13 | International Business Machines Corporation | Method, system, and computer program product to redirect requests from content servers to load distribution servers and to correct bookmarks |
US20020004850A1 (en) * | 2000-03-29 | 2002-01-10 | Krishna Sudarshan | System and method of providing a messaging engine for an enterprise javabeans enabled server to achieve container managed asynchronous functionality |
US8621001B2 (en) | 2000-03-30 | 2013-12-31 | Ebay Inc. | System and method for dynamically changing the content of an information display |
US6965880B2 (en) * | 2000-03-30 | 2005-11-15 | Fujitsu Limited | Transaction number management method in network commodity sales |
CA2404014A1 (en) * | 2000-03-30 | 2001-10-11 | Cygent, Inc. | System and method for establishing electronic business systems for supporting communications services commerce |
US6917961B2 (en) * | 2000-03-30 | 2005-07-12 | Kettera Software, Inc. | Evolving interactive dialog box for an internet web page |
US6738811B1 (en) * | 2000-03-31 | 2004-05-18 | Supermicro Computer, Inc. | Method and architecture for monitoring the health of servers across data networks |
US20020059216A1 (en) * | 2000-03-31 | 2002-05-16 | Gowen Richard C. | Decision support system and method |
US6880089B1 (en) * | 2000-03-31 | 2005-04-12 | Avaya Technology Corp. | Firewall clustering for multiple network servers |
US6950857B1 (en) * | 2000-03-31 | 2005-09-27 | Palmsource, Inc. | Secure server-based indentification for simplified online transaction processing with palmtop computer |
US6779039B1 (en) | 2000-03-31 | 2004-08-17 | Avaya Technology Corp. | System and method for routing message traffic using a cluster of routers sharing a single logical IP address distinct from unique IP addresses of the routers |
US6970931B1 (en) * | 2000-04-03 | 2005-11-29 | International Business Machines Corporation | Method for translucent online interaction |
JP4654407B2 (en) * | 2000-04-08 | 2011-03-23 | オラクル・アメリカ・インコーポレイテッド | A method and apparatus for dealing with the events received by the server socket |
US7814208B2 (en) * | 2000-04-11 | 2010-10-12 | Science Applications International Corporation | System and method for projecting content beyond firewalls |
WO2001080114A1 (en) * | 2000-04-13 | 2001-10-25 | Worldlink Information Technology Systems Limited | Apparatus and a method for supplying information |
WO2001080033A3 (en) * | 2000-04-17 | 2002-10-03 | Circadence Corp | System and method for implementing application -independent functionality within a network infrastructure |
US6732115B2 (en) * | 2000-04-27 | 2004-05-04 | Hyperion Solutions Corporation | Chameleon measure and metric calculation |
US7080090B2 (en) | 2000-04-27 | 2006-07-18 | Hyperion Solutions Corporation | Allocation measures and metric calculations in star schema multi-dimensional data warehouse |
US6941311B2 (en) | 2000-04-27 | 2005-09-06 | Hyperion Solutions Corporation | Aggregate navigation system |
US7072897B2 (en) * | 2000-04-27 | 2006-07-04 | Hyperion Solutions Corporation | Non-additive measures and metric calculation |
US6748394B2 (en) | 2000-04-27 | 2004-06-08 | Hyperion Solutions Corporation | Graphical user interface for relational database |
US6662174B2 (en) * | 2000-04-17 | 2003-12-09 | Brio Software, Inc. | Analytical server including metrics engine |
EP1410248A2 (en) * | 2000-04-17 | 2004-04-21 | Medical Software Solutions, Inc. | Method and apparatus for applet-generated screen displays using computer database and programming language |
CA2404258A1 (en) * | 2000-04-17 | 2001-10-25 | Marketocracy Inc. | Internet-based system for identification, measurement and ranking of investment portfolio management, and operation of a fund supermarket, including "best investor" managed funds |
US7167859B2 (en) * | 2000-04-27 | 2007-01-23 | Hyperion Solutions Corporation | Database security |
US7509274B2 (en) | 2000-04-17 | 2009-03-24 | Kam Kendrick W | Internet-based system for identification, measurement and ranking of investment portfolio management, and operation of a fund supermarket, including “best investor” managed funds |
US7478403B1 (en) * | 2000-04-21 | 2009-01-13 | Sun Microsystems, Inc. | Secure access to managed network objects using a configurable platform-independent gateway providing individual object-level access control |
US6615201B1 (en) * | 2000-04-25 | 2003-09-02 | Lucent Technologies | Computer network management |
US8239445B1 (en) * | 2000-04-25 | 2012-08-07 | International Business Machines Corporation | URL-based sticky routing tokens using a server-side cookie jar |
US7716059B1 (en) * | 2000-04-27 | 2010-05-11 | Accenture Global Services Gmbh | Network-based child support framework |
WO2001081829A9 (en) * | 2000-04-27 | 2003-01-30 | Brio Technology Inc | Method and apparatus for processing jobs on an enterprise-wide computer system |
US7814011B1 (en) * | 2000-04-27 | 2010-10-12 | Accenture Llp | System for calculating a support payment in a network-based child support framework |
JP2001312509A (en) * | 2000-04-28 | 2001-11-09 | Fujitsu Ltd | System and recording medium for distributing electronic data |
US20020065673A1 (en) * | 2000-04-28 | 2002-05-30 | Rooke William Armstrong | Business intelligence system |
US7343310B1 (en) | 2000-04-28 | 2008-03-11 | Travelers Property Casualty Corp. | System and method for providing web-based user interface to legacy, personal-lines insurance applications |
JP2001318897A (en) * | 2000-05-02 | 2001-11-16 | Nec Corp | User authentication method, network system to be used for the method, and recording medium recorded with its control program |
US7016858B1 (en) * | 2000-05-02 | 2006-03-21 | Ford Motor Company | Integrated supplier secondary characteristic reporting method |
US6874084B1 (en) * | 2000-05-02 | 2005-03-29 | International Business Machines Corporation | Method and apparatus for establishing a secure communication connection between a java application and secure server |
US20020057803A1 (en) * | 2000-05-05 | 2002-05-16 | Loos Michael T. | System and method for communicating in a mobile domain across non-persistent data links |
US6785713B1 (en) | 2000-05-08 | 2004-08-31 | Citrix Systems, Inc. | Method and apparatus for communicating among a network of servers utilizing a transport mechanism |
US6789112B1 (en) * | 2000-05-08 | 2004-09-07 | Citrix Systems, Inc. | Method and apparatus for administering a server having a subsystem in communication with an event channel |
US6883019B1 (en) * | 2000-05-08 | 2005-04-19 | Intel Corporation | Providing information to a communications device |
US6785726B1 (en) | 2000-05-08 | 2004-08-31 | Citrix Systems, Inc. | Method and apparatus for delivering local and remote server events in a similar fashion |
US7426558B1 (en) | 2000-05-11 | 2008-09-16 | Thomson Licensing | Method and system for controlling and auditing content/service systems |
US7421541B2 (en) * | 2000-05-12 | 2008-09-02 | Oracle International Corporation | Version management of cached permissions metadata |
GB0011599D0 (en) * | 2000-05-15 | 2000-07-05 | Ridgeway Systems & Software Lt | Direct slave addressing to indirect slave addressing |
US7640580B1 (en) * | 2000-05-17 | 2009-12-29 | F5 Networks, Inc. | Method and apparatus for accessing a computer behind a firewall |
US7490050B2 (en) * | 2000-05-19 | 2009-02-10 | Travelers Property Casualty Corp. | Method and system for furnishing an on-line quote for an insurance product |
US20020046064A1 (en) * | 2000-05-19 | 2002-04-18 | Hector Maury | Method and system for furnishing an on-line quote for an insurance product |
US8176145B1 (en) | 2000-05-19 | 2012-05-08 | The Travelers Indemnity Company | System and method for providing insurance data processing services via a user interface |
US6934749B1 (en) * | 2000-05-20 | 2005-08-23 | Ciena Corporation | Tracking distributed data retrieval in a network device |
US7693976B2 (en) * | 2000-07-11 | 2010-04-06 | Ciena Corporation | Granular management of network resources |
US7266595B1 (en) * | 2000-05-20 | 2007-09-04 | Ciena Corporation | Accessing network device data through user profiles |
US20020116282A1 (en) * | 2000-05-23 | 2002-08-22 | Martin Jeffrey W. | Methods and systems for correlating consumption information with distribution entities |
US7003517B1 (en) * | 2000-05-24 | 2006-02-21 | Inetprofit, Inc. | Web-based system and method for archiving and searching participant-based internet text sources for customer lead data |
US7096220B1 (en) | 2000-05-24 | 2006-08-22 | Reachforce, Inc. | Web-based customer prospects harvester system |
US7082427B1 (en) | 2000-05-24 | 2006-07-25 | Reachforce, Inc. | Text indexing system to index, query the archive database document by keyword data representing the content of the documents and by contact data associated with the participant who generated the document |
US7120629B1 (en) * | 2000-05-24 | 2006-10-10 | Reachforce, Inc. | Prospects harvester system for providing contact data about customers of product or service offered by business enterprise extracting text documents selected from newsgroups, discussion forums, mailing lists, querying such data to provide customers who confirm to business profile data |
US7650314B1 (en) | 2001-05-25 | 2010-01-19 | American Express Travel Related Services Company, Inc. | System and method for securing a recurrent billing transaction |
CN1878180A (en) * | 2000-05-29 | 2006-12-13 | 诺基亚有限公司 | Synchronization method |
US7103664B1 (en) * | 2000-05-31 | 2006-09-05 | International Business Machines Corporation | Method, system and program products for ordering lists of service addresses to provide load balancing of a clustered environment |
US6870331B2 (en) * | 2000-05-31 | 2005-03-22 | Sarnoff Corporation | Space-saving cathode ray tube employing a non-self-converging deflection yoke |
US7136913B2 (en) * | 2000-05-31 | 2006-11-14 | Lab 7 Networks, Inc. | Object oriented communication among platform independent systems across a firewall over the internet using HTTP-SOAP |
US20030229524A1 (en) * | 2000-06-01 | 2003-12-11 | Eran Reuveni | System for workflow analysis and response |
US7523191B1 (en) * | 2000-06-02 | 2009-04-21 | Yahoo! Inc. | System and method for monitoring user interaction with web pages |
US6539384B1 (en) | 2000-06-02 | 2003-03-25 | Bellsouth Intellectual Property Corporation | Browser on test equipment |
JP2001350720A (en) * | 2000-06-06 | 2001-12-21 | Sony Corp | System, device and method for providing information and program storage medium |
US7130853B2 (en) * | 2000-06-06 | 2006-10-31 | Fair Isaac Corporation | Datamart including routines for extraction, accessing, analyzing, transformation of data into standardized format modeled on star schema |
US7962603B1 (en) | 2000-06-06 | 2011-06-14 | Nobuyoshi Morimoto | System and method for identifying individual users accessing a web site |
US7280971B1 (en) * | 2000-06-09 | 2007-10-09 | At&T Bls Intellectual Property, Inc. | Method and system for server-based error processing in support of legacy-based usage and billing systems |
US20020087884A1 (en) * | 2000-06-12 | 2002-07-04 | Hovav Shacham | Method and apparatus for enhancing network security protection server performance |
US7426530B1 (en) * | 2000-06-12 | 2008-09-16 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
GB0014325D0 (en) * | 2000-06-12 | 2000-08-02 | Koninkl Philips Electronics Nv | Computer profile update system |
US20020039420A1 (en) * | 2000-06-12 | 2002-04-04 | Hovav Shacham | Method and apparatus for batched network security protection server performance |
US7069434B1 (en) * | 2000-06-13 | 2006-06-27 | Hewlett-Packard Development Company, L.P. | Secure data transfer method and system |
WO2001097452A1 (en) * | 2000-06-13 | 2001-12-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Authentication process for an event management system |
US7673045B1 (en) * | 2000-06-15 | 2010-03-02 | Microsoft Corporation | Multiple site automated logout |
DE10028842A1 (en) * | 2000-06-15 | 2002-01-03 | Ralf Mimoun | Operation surface generating method involves converting position and function of individual components on operation surface into standard code so that browser will return inputs of user in demanded format |
US8972717B2 (en) * | 2000-06-15 | 2015-03-03 | Zixcorp Systems, Inc. | Automatic delivery selection for electronic content |
US6732101B1 (en) * | 2000-06-15 | 2004-05-04 | Zix Corporation | Secure message forwarding system detecting user's preferences including security preferences |
US7917647B2 (en) | 2000-06-16 | 2011-03-29 | Mcafee, Inc. | Method and apparatus for rate limiting |
US20020093527A1 (en) * | 2000-06-16 | 2002-07-18 | Sherlock Kieran G. | User interface for a security policy system and method |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US9444785B2 (en) * | 2000-06-23 | 2016-09-13 | Cloudshield Technologies, Inc. | Transparent provisioning of network access to an application |
US6768984B2 (en) * | 2000-06-27 | 2004-07-27 | Metapower Llc | Method and apparatus for process design |
CA2312656A1 (en) * | 2000-06-27 | 2001-12-27 | Raymond Morin | Real time management software with alarm and interactive dashboard |
US20020078131A1 (en) * | 2000-06-28 | 2002-06-20 | Qwest Communications International Inc. | Method and system for presenting operational data by geographical location |
US8447967B1 (en) | 2000-06-29 | 2013-05-21 | Datamotion, Inc. | Controlled message distribution |
US7051209B1 (en) * | 2000-06-29 | 2006-05-23 | Intel Corporation | System and method for creation and use of strong passwords |
WO2002003604A3 (en) * | 2000-06-29 | 2002-08-01 | Cachestream Corp | Digital rights management |
US6882730B1 (en) * | 2000-06-29 | 2005-04-19 | Intel Corporation | Method for secure distribution and configuration of asymmetric keying material into semiconductor devices |
US7281046B1 (en) * | 2000-06-30 | 2007-10-09 | Covad Communications Company | Application program interface for automating high speed network access ordering and provisioning processes |
US6978232B1 (en) * | 2000-06-30 | 2005-12-20 | Interland, Inc. | Method and system of demonstrating a service that provides computerized transactions using a computer network |
US7076534B1 (en) * | 2000-06-30 | 2006-07-11 | Microsoft Corporation | Server-side scripting that enables creation of customized documents for clients |
US7032110B1 (en) | 2000-06-30 | 2006-04-18 | Landesk Software Limited | PKI-based client/server authentication |
US20020007382A1 (en) * | 2000-07-06 | 2002-01-17 | Shinichi Nojima | Computer having character input function,method of carrying out process depending on input characters, and storage medium |
US7249369B2 (en) * | 2000-07-10 | 2007-07-24 | Oracle International Corporation | Post data processing |
US7194764B2 (en) | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
US7124203B2 (en) | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US9038170B2 (en) * | 2000-07-10 | 2015-05-19 | Oracle International Corporation | Logging access system events |
JP4386634B2 (en) * | 2000-07-10 | 2009-12-16 | 富士通株式会社 | Network integrated management system |
US6766353B1 (en) * | 2000-07-11 | 2004-07-20 | Motorola, Inc. | Method for authenticating a JAVA archive (JAR) for portable devices |
US7234060B1 (en) * | 2000-07-11 | 2007-06-19 | Amdur Eugene | Generation and use of digital signatures |
US7099933B1 (en) * | 2000-07-11 | 2006-08-29 | Nortel Networks Limited | System and method for regulating web site access |
US6986039B1 (en) * | 2000-07-11 | 2006-01-10 | International Business Machines Corporation | Technique for synchronizing security credentials using a trusted authenticating domain |
US6986038B1 (en) * | 2000-07-11 | 2006-01-10 | International Business Machines Corporation | Technique for synchronizing security credentials from a master directory, platform, or registry |
US6785666B1 (en) * | 2000-07-11 | 2004-08-31 | Revenue Science, Inc. | Method and system for parsing navigation information |
US7774790B1 (en) * | 2000-07-18 | 2010-08-10 | Apple Inc. | Event logging and performance analysis system for applications |
US6839745B1 (en) * | 2000-07-19 | 2005-01-04 | Verizon Corporate Services Group Inc. | System and method for generating reports in a telecommunication system |
JP2002032216A (en) * | 2000-07-19 | 2002-01-31 | Fujitsu Ltd | Hosting device for application |
US6891940B1 (en) * | 2000-07-19 | 2005-05-10 | Sbc Technology Resources, Inc. | System and method for providing remote access to telecommunications services |
US6976164B1 (en) * | 2000-07-19 | 2005-12-13 | International Business Machines Corporation | Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session |
US6934848B1 (en) * | 2000-07-19 | 2005-08-23 | International Business Machines Corporation | Technique for handling subsequent user identification and password requests within a certificate-based host session |
US7085927B1 (en) * | 2000-07-20 | 2006-08-01 | Ge Medical Systems, Inc. | Secure data report preparation and delivery |
US7333939B1 (en) | 2000-07-21 | 2008-02-19 | Travelers Property Casualty Corp. | Method for providing web-based insurance data processing services to users |
GB0018547D0 (en) | 2000-07-28 | 2000-09-13 | Ridgeway Systems & Software Lt | Audio-video telephony with port address translation |
US7130822B1 (en) * | 2000-07-31 | 2006-10-31 | Cognos Incorporated | Budget planning |
US20060031456A1 (en) * | 2000-07-31 | 2006-02-09 | Marcos Della | Method and apparatus for transmitting data between devices in a web networking environment |
US7287095B2 (en) * | 2000-08-03 | 2007-10-23 | Fujitsu Limited | Processing method, processing apparatus and storage medium |
US7137143B2 (en) | 2000-08-07 | 2006-11-14 | Ingrian Systems Inc. | Method and system for caching secure web content |
WO2002013035A1 (en) * | 2000-08-07 | 2002-02-14 | Active Data Exchange, Inc. | Syndication methodology to dynamically place digital assets on non-related web sites |
US20040015725A1 (en) * | 2000-08-07 | 2004-01-22 | Dan Boneh | Client-side inspection and processing of secure content |
US6948174B2 (en) * | 2000-08-08 | 2005-09-20 | International Business Machines Corporation | IMS MFS (message format service) metamodel |
US6915523B2 (en) * | 2000-08-08 | 2005-07-05 | International Business Machines Corporation | PL/I metamodel |
US6904598B2 (en) * | 2000-08-08 | 2005-06-07 | International Business Machines Corporation | COBOL metamodel |
US7559066B2 (en) * | 2000-08-08 | 2009-07-07 | International Business Machines Corporation | CICS BMS (basic message service) meta model |
US6910216B2 (en) * | 2000-08-08 | 2005-06-21 | International Business Machines Corporation | IMS transaction messages metamodel |
US6912719B2 (en) * | 2000-08-08 | 2005-06-28 | International Business Machines Corporation | Type descriptor metamodel |
US7275079B2 (en) * | 2000-08-08 | 2007-09-25 | International Business Machines Corporation | Common application metamodel including C/C++ metamodel |
WO2002015080A2 (en) * | 2000-08-10 | 2002-02-21 | Lumenos | Managing health care resources |
US7617114B1 (en) | 2000-08-10 | 2009-11-10 | Wellpoint Inc. | Health care reimbursement |
GB2408368B (en) * | 2000-08-18 | 2005-07-06 | Smart Media Ltd | Apparatus, system and method for enhancing data security |
US7711790B1 (en) | 2000-08-24 | 2010-05-04 | Foundry Networks, Inc. | Securing an accessible computer system |
US6785729B1 (en) * | 2000-08-25 | 2004-08-31 | International Business Machines Corporation | System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful |
US7035912B2 (en) * | 2000-08-28 | 2006-04-25 | Abaco.P.R., Inc. | Method and apparatus allowing a limited client device to use the full resources of a networked server |
US6957257B1 (en) * | 2000-08-29 | 2005-10-18 | At&T Corp. | Customer service maintenance automation |
US20020026507A1 (en) * | 2000-08-30 | 2002-02-28 | Sears Brent C. | Browser proxy client application service provider (ASP) interface |
WO2002019642A1 (en) * | 2000-08-30 | 2002-03-07 | Citibank, N.A. | Method and system for internet hosting and security |
WO2002019097A1 (en) * | 2000-09-01 | 2002-03-07 | International Interactive Commerce, Ltd. | System and method for collaboration using web browsers |
US6754470B2 (en) * | 2000-09-01 | 2004-06-22 | Telephia, Inc. | System and method for measuring wireless device and network usage and performance metrics |
US6745011B1 (en) * | 2000-09-01 | 2004-06-01 | Telephia, Inc. | System and method for measuring wireless device and network usage and performance metrics |
US7149798B2 (en) * | 2000-09-06 | 2006-12-12 | Xanboo, Inc. | Method and system for adaptively setting a data refresh interval |
US20020052913A1 (en) * | 2000-09-06 | 2002-05-02 | Teruhiro Yamada | User support apparatus and system using agents |
US6965938B1 (en) * | 2000-09-07 | 2005-11-15 | International Business Machines Corporation | System and method for clustering servers for performance and load balancing |
DE10044246A1 (en) * | 2000-09-07 | 2002-04-04 | Siemens Ag | Managing messages relating to operating states e.g. of alarm system by selecting budget after number of valid messages output has reached threshold |
US20020032793A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic |
US20020032871A1 (en) * | 2000-09-08 | 2002-03-14 | The Regents Of The University Of Michigan | Method and system for detecting, tracking and blocking denial of service attacks over a computer network |
US8037492B2 (en) * | 2000-09-12 | 2011-10-11 | Thomson Licensing | Method and system for video enhancement transport alteration |
US7574495B1 (en) | 2000-09-13 | 2009-08-11 | Fortinet, Inc. | System and method for managing interworking communications protocols |
US7272643B1 (en) | 2000-09-13 | 2007-09-18 | Fortinet, Inc. | System and method for managing and provisioning virtual routers |
US7389358B1 (en) | 2000-09-13 | 2008-06-17 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US7444398B1 (en) * | 2000-09-13 | 2008-10-28 | Fortinet, Inc. | System and method for delivering security services |
US7487232B1 (en) * | 2000-09-13 | 2009-02-03 | Fortinet, Inc. | Switch management system and method |
US8972590B2 (en) * | 2000-09-14 | 2015-03-03 | Kirsten Aldrich | Highly accurate security and filtering software |
US6757262B1 (en) * | 2000-09-15 | 2004-06-29 | Motorola, Inc. | Service framework supporting remote service discovery and connection |
US7099620B2 (en) * | 2000-09-22 | 2006-08-29 | Medical Council Of Canada | Method and apparatus for administering an internet based examination to remote sites |
US7165097B1 (en) * | 2000-09-22 | 2007-01-16 | Oracle International Corporation | System for distributed error reporting and user interaction |
US7171487B2 (en) * | 2000-09-22 | 2007-01-30 | International Business Machines Corporation | Method and system for application specific packet forwarding |
US7406427B1 (en) * | 2000-09-22 | 2008-07-29 | Accenture Llp | Capture highly refined claim evaluation information across multiple web interfaces |
US20020078173A1 (en) * | 2000-09-25 | 2002-06-20 | Horn Paul H. | Data acquisition system and method |
US7051315B2 (en) | 2000-09-26 | 2006-05-23 | Appstream, Inc. | Network streaming of multi-application program code |
US7774455B1 (en) * | 2000-09-26 | 2010-08-10 | Juniper Networks, Inc. | Method and system for providing secure access to private networks |
US7627665B2 (en) | 2000-09-28 | 2009-12-01 | Barker Geoffrey T | System and method for providing configurable security monitoring utilizing an integrated information system |
US8392552B2 (en) | 2000-09-28 | 2013-03-05 | Vig Acquisitions Ltd., L.L.C. | System and method for providing configurable security monitoring utilizing an integrated information system |
WO2002027438A3 (en) * | 2000-09-28 | 2002-06-27 | Vigilos Inc | Method and process for configuring a premises for monitoring |
US6650890B1 (en) * | 2000-09-29 | 2003-11-18 | Postini, Inc. | Value-added electronic messaging services and transparent implementation thereof using intermediate server |
DE10048731A1 (en) * | 2000-09-29 | 2002-04-11 | Deutsche Telekom Ag | Billing procedures with the use of SSL / TLS |
US7139792B1 (en) * | 2000-09-29 | 2006-11-21 | Intel Corporation | Mechanism for locking client requests to a particular server |
US7457948B1 (en) * | 2000-09-29 | 2008-11-25 | Lucent Technologies Inc. | Automated authentication handling system |
US6999992B1 (en) | 2000-10-04 | 2006-02-14 | Microsoft Corporation | Efficiently sending event notifications over a computer network |
US7043531B1 (en) | 2000-10-04 | 2006-05-09 | Inetprofit, Inc. | Web-based customer lead generator system with pre-emptive profiling |
US7330850B1 (en) | 2000-10-04 | 2008-02-12 | Reachforce, Inc. | Text mining system for web-based business intelligence applied to web site server logs |
DE10049610A1 (en) * | 2000-10-05 | 2002-04-18 | Alcatel Sa | Network Management Client |
US7007092B2 (en) * | 2000-10-05 | 2006-02-28 | Juniper Networks, Inc. | Connection management system and method |
US7263550B1 (en) | 2000-10-10 | 2007-08-28 | Juniper Networks, Inc. | Agent-based event-driven web server architecture |
US6871213B1 (en) * | 2000-10-11 | 2005-03-22 | Kana Software, Inc. | System and method for web co-navigation with dynamic content including incorporation of business rule into web document |
US8127132B2 (en) * | 2000-10-12 | 2012-02-28 | Abb Ab | Method and apparatus for executing industrial manufacture |
US7254619B2 (en) * | 2000-10-13 | 2007-08-07 | Matsushita Electric Industrial Co., Ltd. | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network |
US7685036B1 (en) * | 2000-10-13 | 2010-03-23 | Ubs Financial Services, Inc. | System and method for delivering a financial message |
EP1199643A1 (en) * | 2000-10-17 | 2002-04-24 | Sun Microsystems, Inc. | Method and apparatus for providing data adapted to a user environment |
GB2368930B (en) * | 2000-10-17 | 2005-04-06 | Hewlett Packard Co | Establishment of a deferred network communication session |
US8799463B1 (en) * | 2000-10-19 | 2014-08-05 | Ariba, Inc. | Method and apparatus for processing information related to interactive web sites |
US7401115B1 (en) | 2000-10-23 | 2008-07-15 | Aol Llc | Processing selected browser requests |
US6886038B1 (en) | 2000-10-24 | 2005-04-26 | Microsoft Corporation | System and method for restricting data transfers and managing software components of distributed computers |
US6907395B1 (en) * | 2000-10-24 | 2005-06-14 | Microsoft Corporation | System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model |
US7606898B1 (en) | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US6915338B1 (en) * | 2000-10-24 | 2005-07-05 | Microsoft Corporation | System and method providing automatic policy enforcement in a multi-computer service application |
US7093288B1 (en) | 2000-10-24 | 2006-08-15 | Microsoft Corporation | Using packet filters and network virtualization to restrict network communications |
US9143477B2 (en) * | 2000-10-25 | 2015-09-22 | Syniverse Icx Corporation | Address recognition database |
US7330830B1 (en) * | 2000-10-25 | 2008-02-12 | Thomson Financial Inc. | Distributed commerce system |
US7606733B2 (en) * | 2000-10-27 | 2009-10-20 | Sandisk Il Ltd. | Account portability for computing |
US20020162009A1 (en) * | 2000-10-27 | 2002-10-31 | Shimon Shmueli | Privacy assurance for portable computing |
US20020106070A1 (en) * | 2000-10-27 | 2002-08-08 | Elsey Nicholas J. | Technique for effectively capturing and processing event data |
US7127492B1 (en) * | 2000-10-31 | 2006-10-24 | International Business Machines Corporation | Method and apparatus for distributed application acceleration |
US7353289B2 (en) | 2000-11-06 | 2008-04-01 | Telecommunication Systems, Inc. | System for an open architecture development platform with centralized synchronization |
US7299259B2 (en) | 2000-11-08 | 2007-11-20 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for intelligent routing of instant messaging presence protocol (IMPP) events among a group of customer service representatives |
US7929562B2 (en) | 2000-11-08 | 2011-04-19 | Genesis Telecommunications Laboratories, Inc. | Method and apparatus for optimizing response time to events in queue |
US7254833B1 (en) * | 2000-11-09 | 2007-08-07 | Accenture Llp | Electronic security system and scheme for a communications network |
EP1734722A3 (en) * | 2000-11-09 | 2007-03-07 | Accenture LLP | Electronic security system and scheme for a communication network |
US7206804B1 (en) * | 2000-11-10 | 2007-04-17 | Sharp Laboratories Of America, Inc. | Methods and systems for transmitting digital images |
JP2002157202A (en) * | 2000-11-17 | 2002-05-31 | Square Co Ltd | Information processor, message communication method, recording medium and computer program |
US6910128B1 (en) * | 2000-11-21 | 2005-06-21 | International Business Machines Corporation | Method and computer program product for processing signed applets |
US7957509B2 (en) * | 2002-04-30 | 2011-06-07 | At&T Intellectual Property I, L.P. | Voice enhancing for advance intelligent network services |
JP3692290B2 (en) * | 2000-11-24 | 2005-09-07 | 株式会社エヌ・ティ・ティ・ドコモ | Data acquisition method and terminal |
GB0029179D0 (en) * | 2000-11-30 | 2001-01-17 | Ridgeway Systems & Software Lt | Communications system |
JP4600709B2 (en) * | 2000-11-30 | 2010-12-15 | ソニー株式会社 | Network management device, a network management method, an information processing apparatus, information processing method, and recording medium |
CA2327078C (en) * | 2000-11-30 | 2005-01-11 | Ibm Canada Limited-Ibm Canada Limitee | Secure session management and authentication for web sites |
US7093008B2 (en) * | 2000-11-30 | 2006-08-15 | Intel Corporation | Communication techniques for simple network management protocol |
JP2002170158A (en) * | 2000-12-01 | 2002-06-14 | Koshin Shoji Kk | Information service system |
US20040168100A1 (en) * | 2000-12-04 | 2004-08-26 | Thottan Marina K. | Fault detection and prediction for management of computer networks |
US7062486B2 (en) * | 2000-12-05 | 2006-06-13 | International Business Machines Corporation | Method, system and program product for enabling authorized access and request-initiated translation of data files |
US20020073048A1 (en) * | 2000-12-07 | 2002-06-13 | Ibm Corporation | Account charge approval system |
US7085744B2 (en) * | 2000-12-08 | 2006-08-01 | International Business Machines Corporation | Method and system for conducting a transaction over a network |
EP2138945A3 (en) * | 2000-12-11 | 2011-08-31 | NTT DoCoMo, Inc. | Terminal device |
DE60131683D1 (en) | 2000-12-11 | 2008-01-10 | Microsoft Corp | A method and system for managing a plurality of network resources |
WO2002048830A9 (en) * | 2000-12-11 | 2003-04-24 | Phlair Inc | System and method for detecting and reporting online activity using real-time content-based network monitoring |
US20020073211A1 (en) * | 2000-12-12 | 2002-06-13 | Raymond Lin | System and method for securely communicating between application servers and webservers |
US8099669B2 (en) | 2000-12-14 | 2012-01-17 | Nortel Networks Limited | Enhanced unified messaging system with a quick view facility |
US20020078165A1 (en) * | 2000-12-14 | 2002-06-20 | International Business Machines Corporation | System and method for prefetching portions of a web page based on learned preferences |
US20020120841A1 (en) * | 2000-12-15 | 2002-08-29 | International Business Machines Corporation | Dynamic PKI architecture |
US7305461B2 (en) * | 2000-12-15 | 2007-12-04 | International Business Machines Corporation | Method and system for network management with backup status gathering |
US7099834B2 (en) * | 2000-12-15 | 2006-08-29 | International Business Machines Corporation | Method, system, and program for transferring data between servers through a client computer over a network |
US6760772B2 (en) | 2000-12-15 | 2004-07-06 | Qualcomm, Inc. | Generating and implementing a communication protocol and interface for high data rate signal transfer |
US7480713B2 (en) * | 2000-12-15 | 2009-01-20 | International Business Machines Corporation | Method and system for network management with redundant monitoring and categorization of endpoints |
US6912563B1 (en) * | 2000-12-19 | 2005-06-28 | Digi-Net Technologies | Methods and systems for proactive on-line communications |
US20020078152A1 (en) | 2000-12-19 | 2002-06-20 | Barry Boone | Method and apparatus for providing predefined feedback |
WO2002051113A1 (en) * | 2000-12-19 | 2002-06-27 | British Telecommunications Public Limited Company | Call distribution |
US20020116454A1 (en) * | 2000-12-21 | 2002-08-22 | William Dyla | System and method for providing communication among legacy systems using web objects for legacy functions |
US6785678B2 (en) * | 2000-12-21 | 2004-08-31 | Emc Corporation | Method of improving the availability of a computer clustering system through the use of a network medium link state function |
US20010054097A1 (en) * | 2000-12-21 | 2001-12-20 | Steven Chafe | Monitoring and reporting of communications line traffic information |
US6961776B1 (en) * | 2000-12-22 | 2005-11-01 | Nortel Networks Limited | Architecture for multiple channel access to applications |
US6874025B2 (en) * | 2000-12-22 | 2005-03-29 | Intel Corporation | System and method of application input validation |
US7660754B1 (en) | 2000-12-26 | 2010-02-09 | At&T Delaware Intellectual Property Inc. | Technician communications system with automated claims processing |
US7286994B1 (en) | 2000-12-26 | 2007-10-23 | At&T Bls Intellectual Property, Inc. | System for facilitating technician sales referrals |
US6745185B2 (en) * | 2000-12-26 | 2004-06-01 | Hon Hai Precision Ind. Co., Ltd. | System and method for online agency service of data mining and analyzing |
US6643747B2 (en) * | 2000-12-27 | 2003-11-04 | Intel Corporation | Processing requests to efficiently access a limited bandwidth storage area |
US6779033B1 (en) * | 2000-12-28 | 2004-08-17 | Networks Associates Technology, Inc. | System and method for transacting a validated application session in a networked computing environment |
US7028033B2 (en) * | 2001-01-02 | 2006-04-11 | Hall Aluminum Llc | Method and apparatus for simplified access to online services |
US7757278B2 (en) * | 2001-01-04 | 2010-07-13 | Safenet, Inc. | Method and apparatus for transparent encryption |
US6965939B2 (en) * | 2001-01-05 | 2005-11-15 | International Business Machines Corporation | Method and apparatus for processing requests in a network data processing system based on a trust association between servers |
US20020089716A1 (en) * | 2001-01-05 | 2002-07-11 | David Funk | Network management |
US8495728B2 (en) | 2001-01-11 | 2013-07-23 | International Business Machines Corporation | Internet appliance integrating telephone function security and guidance features |
US20050138398A1 (en) * | 2001-01-11 | 2005-06-23 | Igor Hansen | System of databases of personal data and a method of governing access to databases of personal data |
US7580971B1 (en) | 2001-01-11 | 2009-08-25 | Oracle International Corporation | Method and apparatus for efficient SQL processing in an n-tier architecture |
US7127608B2 (en) * | 2001-01-12 | 2006-10-24 | Siemens Medical Solutions Health Services Corporation | System and user interface supporting URL processing and concurrent application operation |
US7043752B2 (en) * | 2001-01-12 | 2006-05-09 | Siemens Medical Solutions Health Services Corporation | System and user interface supporting concurrent application initiation and interoperability |
US7103666B2 (en) * | 2001-01-12 | 2006-09-05 | Siemens Medical Solutions Health Services Corporation | System and user interface supporting concurrent application operation and interoperability |
US7062649B2 (en) * | 2001-01-12 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | System and method for categorizing security profile rules within a computer system |
US7334031B2 (en) * | 2001-01-12 | 2008-02-19 | Siemens Medical Solutions Health Services Corporation | System and user interface supporting processing and activity management for concurrently operating applications |
US7127609B2 (en) * | 2001-01-12 | 2006-10-24 | Siemens Medical Solutions Health Services Corporation | System and user interface for adaptively processing and communicating URL data between applications |
US7254237B1 (en) * | 2001-01-12 | 2007-08-07 | Slt Logic, Llc | System and method for establishing a secure connection |
US7143437B2 (en) | 2001-01-12 | 2006-11-28 | Siemens Medical Solutions Health Services Corporation | System and user interface for managing user access to network compatible applications |
US20020133624A1 (en) * | 2001-01-16 | 2002-09-19 | Tony Hashem | System and process for routing information in a data processing system |
US6842706B1 (en) * | 2001-01-17 | 2005-01-11 | Smart Disaster Response Technologies, Inc. | Methods, apparatus, media, and signals for managing utility usage |
US6961773B2 (en) | 2001-01-19 | 2005-11-01 | Esoft, Inc. | System and method for managing application service providers |
US20140089185A1 (en) * | 2005-10-06 | 2014-03-27 | C-Sam, Inc. | Isolating distinct service provider widgets within a wallet container |
GB2386726B (en) * | 2001-01-24 | 2005-06-15 | Ericsson Telefon Ab L M | An arrangement and a method relating to session management in a portal structure |
US9600842B2 (en) | 2001-01-24 | 2017-03-21 | E-Numerate Solutions, Inc. | RDX enhancement of system and method for implementing reusable data markup language (RDL) |
FR2819967B1 (en) * | 2001-01-24 | 2003-03-14 | Bull Sa | Method and communication system of a certificate from a securisation module and a server |
US6965994B1 (en) * | 2001-01-30 | 2005-11-15 | Microsoft Corporation | Security mechanism for computer processing modules |
US7089311B2 (en) * | 2001-01-31 | 2006-08-08 | International Business Machines Corporation | Methods, systems and computer program products for resuming SNA application-client communications after loss of an IP network connection |
US7171681B1 (en) * | 2001-01-31 | 2007-01-30 | Secure Computing Corporation | System and method for providing expandable proxy firewall services |
US20020123996A1 (en) * | 2001-02-06 | 2002-09-05 | O'brien Christopher | Data mining system, method and apparatus for industrial applications |
GB2377784B (en) * | 2001-02-12 | 2003-11-05 | Altio Ltd | A presentation server which enables a client device to run a network based application |
US7277878B2 (en) * | 2001-02-13 | 2007-10-02 | Ariba, Inc. | Variable length file header apparatus and system |
CA2372647C (en) * | 2001-02-20 | 2010-05-04 | Research In Motion Limited | System and method for administrating a wireless communication network |
JP3631681B2 (en) * | 2001-02-23 | 2005-03-23 | 株式会社ビーコンインフォメーションテクノロジー | Data management system, data management method and computer program |
US20020120743A1 (en) * | 2001-02-26 | 2002-08-29 | Lior Shabtay | Splicing persistent connections |
US8472606B2 (en) | 2001-02-27 | 2013-06-25 | Verizon Data Services Llc | Methods and systems for directory information lookup |
US8774380B2 (en) | 2001-02-27 | 2014-07-08 | Verizon Patent And Licensing Inc. | Methods and systems for call management with user intervention |
US8488761B2 (en) | 2001-02-27 | 2013-07-16 | Verizon Data Services Llc | Methods and systems for a call log |
US8472428B2 (en) | 2001-02-27 | 2013-06-25 | Verizon Data Services Llc | Methods and systems for line management |
US6976017B1 (en) | 2001-02-27 | 2005-12-13 | Verizon Data Services Inc. | Method and apparatus for context based querying |
US7912193B2 (en) | 2001-02-27 | 2011-03-22 | Verizon Data Services Llc | Methods and systems for call management with user intervention |
US8503650B2 (en) | 2001-02-27 | 2013-08-06 | Verizon Data Services Llc | Methods and systems for configuring and providing conference calls |
US8467502B2 (en) | 2001-02-27 | 2013-06-18 | Verizon Data Services Llc | Interactive assistant for managing telephone communications |
US8761363B2 (en) | 2001-02-27 | 2014-06-24 | Verizon Data Services Llc | Methods and systems for automatic forwarding of communications to a preferred device |
US8503639B2 (en) | 2001-02-27 | 2013-08-06 | Verizon Data Services Llc | Method and apparatus for adaptive message and call notification |
US8798251B2 (en) | 2001-02-27 | 2014-08-05 | Verizon Data Services Llc | Methods and systems for computer enhanced conference calling |
US7903796B1 (en) | 2001-02-27 | 2011-03-08 | Verizon Data Services Llc | Method and apparatus for unified communication management via instant messaging |
US8751571B2 (en) | 2001-02-27 | 2014-06-10 | Verizon Data Services Llc | Methods and systems for CPN triggered collaboration |
US9392120B2 (en) | 2002-02-27 | 2016-07-12 | Verizon Patent And Licensing Inc. | Methods and systems for call management with user intervention |
US8873730B2 (en) | 2001-02-27 | 2014-10-28 | Verizon Patent And Licensing Inc. | Method and apparatus for calendared communications flow control |
US8494135B2 (en) | 2001-02-27 | 2013-07-23 | Verizon Data Services Llc | Methods and systems for contact management |
US8750482B2 (en) | 2001-02-27 | 2014-06-10 | Verizon Data Services Llc | Methods and systems for preemptive rejection of calls |
US8488766B2 (en) | 2001-02-27 | 2013-07-16 | Verizon Data Services Llc | Methods and systems for multiuser selective notification |
US7243077B2 (en) | 2001-03-02 | 2007-07-10 | International Business Machines Corporation | Method and computer program product for managing an internet trading network |
US6961938B1 (en) * | 2001-03-03 | 2005-11-01 | Brocade Communications Systems, Inc. | Management of multiple network devices using unsigned Java applets |
US7296066B2 (en) * | 2001-03-04 | 2007-11-13 | Adomo, Inc. | Mobile communication system for a network |
US7400879B2 (en) * | 2001-03-04 | 2008-07-15 | Adomo, Inc. | Method for conducting mobile communications for a network |
JP4700204B2 (en) * | 2001-03-07 | 2011-06-15 | 株式会社日立製作所 | Storage management data control system |
WO2002086768A3 (en) * | 2001-03-08 | 2004-04-01 | Tririga Inc | Data storage and access system employing clustering of servers |
US7720958B2 (en) * | 2001-03-09 | 2010-05-18 | International Business Machines Corporation | Method and system for embedding correlated performance measurements for distributed application performance decomposition |
JP2002271356A (en) * | 2001-03-12 | 2002-09-20 | Oki Electric Ind Co Ltd | Network communication system |
US20020133473A1 (en) * | 2001-03-15 | 2002-09-19 | International Business Machines Corporation | System and method for on-demand pricing for differentiated services computer networks |
US7882555B2 (en) * | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US8200577B2 (en) * | 2001-03-20 | 2012-06-12 | Verizon Business Global Llc | Systems and methods for retrieving and modifying data records for rating and billing purposes |
US8195738B2 (en) * | 2001-03-20 | 2012-06-05 | Verizon Business Global Llc | Systems and methods for communicating from an integration platform to a profile management server |
US7185364B2 (en) * | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
US6782421B1 (en) * | 2001-03-21 | 2004-08-24 | Bellsouth Intellectual Property Corporation | System and method for evaluating the performance of a computer application |
US6760694B2 (en) * | 2001-03-21 | 2004-07-06 | Hewlett-Packard Development Company, L.P. | Automatic information collection system using most frequent uncommon words or phrases |
JP4254071B2 (en) * | 2001-03-22 | 2009-04-15 | コニカミノルタビジネステクノロジーズ株式会社 | Printer, server, monitoring apparatus, printing system, and monitoring program |
US7155403B2 (en) | 2001-03-22 | 2006-12-26 | International Business Machines Corporation | System and method for leveraging procurement across companies and company groups |
US7386495B2 (en) | 2001-03-23 | 2008-06-10 | International Business Machines Corporation | System and method for processing tax codes by company group |
US8095687B1 (en) * | 2001-03-26 | 2012-01-10 | Microsoft Corporation | Systems and methods for managing state in a cluster of servers |
US7051319B1 (en) * | 2001-03-27 | 2006-05-23 | Siebel Systems, Inc. | Method, system, and product for upgrading software objects using inherency |
US7082465B1 (en) * | 2001-03-27 | 2006-07-25 | Cisco Technology, Inc. | Web based management of host computers in an open protocol network |
US8027892B2 (en) | 2001-03-28 | 2011-09-27 | International Business Machines Corporation | System and method for automating invoice processing with positive confirmation |
JP2002297900A (en) * | 2001-03-30 | 2002-10-11 | Ibm Japan Ltd | Control system for reception by businesses, user side terminal device, reception side terminal device, management server queue monitoring device, method of allocating reception side terminals, and storage medium |
US6912582B2 (en) * | 2001-03-30 | 2005-06-28 | Microsoft Corporation | Service routing and web integration in a distributed multi-site user authentication system |
US20030074400A1 (en) * | 2001-03-30 | 2003-04-17 | David Brooks | Web user profiling system and method |
US20020143523A1 (en) * | 2001-03-30 | 2002-10-03 | Lakshmi Balaji | System and method for providing a file in multiple languages |
US7007169B2 (en) * | 2001-04-04 | 2006-02-28 | International Business Machines Corporation | Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access |
FI20010724A (en) * | 2001-04-06 | 2002-10-07 | Ajatuspaja Oy | Method and apparatus for distributed database and the application utilizing the use of the terminal device independently |
US6959336B2 (en) * | 2001-04-07 | 2005-10-25 | Secure Data In Motion, Inc. | Method and system of federated authentication service for interacting between agent and client and communicating with other components of the system to choose an appropriate mechanism for the subject from among the plurality of authentication mechanisms wherein the subject is selected from humans, client applications and applets |
CA2417178C (en) * | 2001-04-09 | 2007-10-30 | Ntt Docomo, Inc. | Communication data amount measurement system |
US7237257B1 (en) * | 2001-04-11 | 2007-06-26 | Aol Llc | Leveraging a persistent connection to access a secured service |
US7015949B1 (en) | 2001-04-12 | 2006-03-21 | Ipix Corporation | Method and apparatus for hosting a network camera with refresh degradation |
US7177448B1 (en) | 2001-04-12 | 2007-02-13 | Ipix Corporation | System and method for selecting and transmitting images of interest to a user |
US8026944B1 (en) | 2001-04-12 | 2011-09-27 | Sony Corporation | Method and apparatus for hosting a network camera with image degradation |
US7024488B1 (en) | 2001-04-12 | 2006-04-04 | Ipix Corporation | Method and apparatus for hosting a network camera |
US7076085B1 (en) * | 2001-04-12 | 2006-07-11 | Ipix Corp. | Method and apparatus for hosting a network camera including a heartbeat mechanism |
US7200679B2 (en) * | 2001-04-13 | 2007-04-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Creating distributed proxy configurations |
WO2002084507A1 (en) * | 2001-04-13 | 2002-10-24 | Netiq Corporation | User-side tracking of multimedia application usage within a web page |
US7000008B2 (en) * | 2001-04-16 | 2006-02-14 | Sun Microsystems, Inc. | Method, system, and program for providing data updates to a page including multiple regions of dynamic content |
WO2002087112A3 (en) | 2001-04-18 | 2003-02-06 | Eric A Frische | Unmanned lighter-than-air safe termination and recovery methods |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
EP1384351B1 (en) * | 2001-04-20 | 2011-05-18 | General Instrument Corporation | Graphical user interface for a transport multiplexer |
US20020154635A1 (en) * | 2001-04-23 | 2002-10-24 | Sun Microsystems, Inc. | System and method for extending private networks onto public infrastructure using supernets |
US6961766B2 (en) * | 2001-04-24 | 2005-11-01 | Oracle International Corp. | Method for extracting personalization information from web activity |
US20020194217A1 (en) * | 2001-04-26 | 2002-12-19 | International Business Machnies Corporation | Metadata graphial user interface |
US6782350B1 (en) * | 2001-04-27 | 2004-08-24 | Blazent, Inc. | Method and apparatus for managing resources |
WO2002088998A1 (en) * | 2001-04-27 | 2002-11-07 | W. Quinn, Inc. | System for active reports with drill down capability |
US20030078949A1 (en) * | 2001-04-30 | 2003-04-24 | Scholz Bernhard J. | Automatic generation of forms with input validation |
US20020198931A1 (en) * | 2001-04-30 | 2002-12-26 | Murren Brian T. | Architecture and process for presenting application content to clients |
US20030009433A1 (en) * | 2001-04-30 | 2003-01-09 | Murren Brian T. | Automatic identification of computer program attributes |
US20020191014A1 (en) * | 2001-04-30 | 2002-12-19 | Hsieh Vivian G. | Graphical user interfaces for software management in an automated provisioning environment |
US7519546B2 (en) * | 2001-04-30 | 2009-04-14 | General Electric Company | Maintaining synchronization of information published to multiple subscribers |
US20020194263A1 (en) * | 2001-04-30 | 2002-12-19 | Murren Brian T. | Hierarchical constraint resolution for application properties, configuration, and behavior |
US7346921B2 (en) * | 2001-04-30 | 2008-03-18 | Ge Capital Corporation | Definition of low-level security rules in terms of high-level security concepts |
US20020165902A1 (en) * | 2001-05-03 | 2002-11-07 | Robb Mary Thomas | Independent log manager |
US7543328B2 (en) * | 2001-05-08 | 2009-06-02 | At&T Corp. | Method and system for providing an efficient use of broadband network resources |
US20040060073A1 (en) * | 2001-05-08 | 2004-03-25 | Bialk Harvey R. | Method and system for provisioning broadband network resources |
US7802287B2 (en) * | 2001-05-08 | 2010-09-21 | At&T Intellectual Property Ii, L.P. | Method and system for generating geographic visual displays of broadband network data |
US20020169863A1 (en) * | 2001-05-08 | 2002-11-14 | Robert Beckwith | Multi-client to multi-server simulation environment control system (JULEP) |
US6952729B2 (en) * | 2001-05-08 | 2005-10-04 | At&T Corp. | Network management method and system for managing a broadband network providing multiple services |
US20020169984A1 (en) * | 2001-05-09 | 2002-11-14 | Kumar Gopikrishna T. | Session management for wireless E-commerce |
US20020169967A1 (en) * | 2001-05-14 | 2002-11-14 | Sangeeta Varma | Method and apparatus for multiple token access to thin client architecture session |
US20030051142A1 (en) * | 2001-05-16 | 2003-03-13 | Hidalgo Lluis Mora | Firewalls for providing security in HTTP networks and applications |
US20020174039A1 (en) * | 2001-05-18 | 2002-11-21 | Mitac International Corp. | Virtual hub |
US20020184337A1 (en) * | 2001-05-21 | 2002-12-05 | Anders Hyldahl | Method and computer system for constructing references to virtual data |
FI112140B (en) * | 2001-05-23 | 2003-10-31 | Nokia Corp | information communication |
US6704406B1 (en) * | 2001-05-29 | 2004-03-09 | Cisco Technology, Inc. | Automated route plan generation |
US20030005308A1 (en) * | 2001-05-30 | 2003-01-02 | Rathbun Paul L. | Method and system for globally restricting client access to a secured web site |
US7072957B2 (en) * | 2001-05-31 | 2006-07-04 | International Business Machines Corporation | Remote administration and monitoring of a service component in a service logic execution environment |
US20020184319A1 (en) * | 2001-05-31 | 2002-12-05 | Willner Barry E. | Systems and methods for facilitating access to an information address |
US7428752B2 (en) * | 2001-06-01 | 2008-09-23 | Applications In Internet Time, Llc | Secure data accessing system and method |
US8392527B2 (en) * | 2001-06-04 | 2013-03-05 | Hewlett-Packard Development Company L.P. | System and method for requesting computer resources |
US7231519B2 (en) * | 2001-06-06 | 2007-06-12 | International Business Machines Corporation | Secure inter-node communication |
WO2002099598A3 (en) | 2001-06-07 | 2004-03-25 | First Usa Bank Na | System and method for rapid updating of credit information |
US7072810B2 (en) * | 2001-06-08 | 2006-07-04 | Tata Consultancy Services Limited | Method and apparatus for pattern based generation of graphical user interfaces (GUI) |
US7392546B2 (en) * | 2001-06-11 | 2008-06-24 | Bea Systems, Inc. | System and method for server security and entitlement processing |
US20020188730A1 (en) * | 2001-06-12 | 2002-12-12 | Wenting Tang | Method and system for a modular transmission control protocol (TCP) frequent-handoff design in a streams based transmission control protocol internet protocol (TCP/IP) implementation |
US20050198379A1 (en) | 2001-06-13 | 2005-09-08 | Citrix Systems, Inc. | Automatically reconnecting a client across reliable and persistent communication sessions |
US20020194289A1 (en) * | 2001-06-18 | 2002-12-19 | Engel Glenn R. | Configuring devices using server responses |
US20020191020A1 (en) * | 2001-06-18 | 2002-12-19 | International Business Machines Corporation | Method and apparatus for removing confindential information from a history |
US6996602B2 (en) * | 2001-06-18 | 2006-02-07 | Ford Global Technologies, Llc | Server-side page table framework for client application definition and execution |
US7103606B2 (en) * | 2001-06-18 | 2006-09-05 | International Business Machines Corporation | Method and apparatus for removing information from a server |
US7356758B1 (en) | 2001-06-19 | 2008-04-08 | Microstrategy Incorporated | System and method for run-time report resolution of reports that include prompt objects |
US7925616B2 (en) | 2001-06-19 | 2011-04-12 | Microstrategy, Incorporated | Report system and method using context-sensitive prompt objects |
US7861161B1 (en) * | 2001-06-19 | 2010-12-28 | Microstrategy, Inc. | Report system and method using prompt objects |
US7302639B1 (en) | 2001-06-19 | 2007-11-27 | Microstrategy, Inc. | Report system and method using prompt in prompt objects |
US20020198965A1 (en) * | 2001-06-26 | 2002-12-26 | Kraft Matthew J. | Method and apparatus to facilitate establishing a distributed internet application platform |
US20020198850A1 (en) * | 2001-06-26 | 2002-12-26 | International Business Machines Corporation | System and method for dynamic price determination in differentiated services computer networks |
US7401144B1 (en) * | 2001-06-28 | 2008-07-15 | At&T Delaware Intellectual Property, Inc. | Technician intranet access via systems interface to legacy systems |
US7219137B1 (en) | 2001-06-28 | 2007-05-15 | Bellsouth Intellectual Property Corp | Technician wireline and wireless intranet access via systems interface to legacy systems |
US7606712B1 (en) | 2001-06-28 | 2009-10-20 | At&T Intellectual Property Ii, L.P. | Speech recognition interface for voice actuation of legacy systems |
US8831949B1 (en) | 2001-06-28 | 2014-09-09 | At&T Intellectual Property I, L.P. | Voice recognition for performing authentication and completing transactions in a systems interface to legacy systems |
US7181547B1 (en) * | 2001-06-28 | 2007-02-20 | Fortinet, Inc. | Identifying nodes in a ring network |
US7295522B2 (en) * | 2001-06-29 | 2007-11-13 | Microsoft Corporation | System and method for continuously provisioning a mobile device |
US6961758B2 (en) * | 2001-06-29 | 2005-11-01 | Hewlett-Packard Development Company, L.P. | Personalized internet content server system |
US20030069982A1 (en) * | 2001-07-03 | 2003-04-10 | Colby Harper | Method and system for generating privacy-specified internet session content records in a communications network |
US20030078890A1 (en) * | 2001-07-06 | 2003-04-24 | Joachim Schmidt | Multimedia content download apparatus and method using same |
US8200818B2 (en) * | 2001-07-06 | 2012-06-12 | Check Point Software Technologies, Inc. | System providing internet access management with router-based policy enforcement |
US7228412B2 (en) * | 2001-07-06 | 2007-06-05 | Juniper Networks, Inc. | Bufferless secure sockets layer architecture |
US7149892B2 (en) | 2001-07-06 | 2006-12-12 | Juniper Networks, Inc. | Secure sockets layer proxy architecture |
US7590684B2 (en) * | 2001-07-06 | 2009-09-15 | Check Point Software Technologies, Inc. | System providing methodology for access control with cooperative enforcement |
US7908472B2 (en) * | 2001-07-06 | 2011-03-15 | Juniper Networks, Inc. | Secure sockets layer cut through architecture |
US7853781B2 (en) * | 2001-07-06 | 2010-12-14 | Juniper Networks, Inc. | Load balancing secure sockets layer accelerator |
US9454752B2 (en) | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US20040236699A1 (en) | 2001-07-10 | 2004-11-25 | American Express Travel Related Services Company, Inc. | Method and system for hand geometry recognition biometrics on a fob |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US7746215B1 (en) | 2001-07-10 | 2010-06-29 | Fred Bishop | RF transactions using a wireless reader grid |
US7889052B2 (en) * | 2001-07-10 | 2011-02-15 | Xatra Fund Mx, Llc | Authorizing payment subsequent to RF transactions |
US7735725B1 (en) | 2001-07-10 | 2010-06-15 | Fred Bishop | Processing an RF transaction using a routing number |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
USRE45416E1 (en) | 2001-07-10 | 2015-03-17 | Xatra Fund Mx, Llc | Processing an RF transaction using a routing number |
US7239226B2 (en) | 2001-07-10 | 2007-07-03 | American Express Travel Related Services Company, Inc. | System and method for payment using radio frequency identification in contact and contactless transactions |
US8548927B2 (en) | 2001-07-10 | 2013-10-01 | Xatra Fund Mx, Llc | Biometric registration for facilitating an RF transaction |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US8284025B2 (en) | 2001-07-10 | 2012-10-09 | Xatra Fund Mx, Llc | Method and system for auditory recognition biometrics on a FOB |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US6950847B2 (en) * | 2001-07-12 | 2005-09-27 | Sun Microsystems, Inc. | Service provider system for delivering services in a distributed computing environment |
US7266839B2 (en) | 2001-07-12 | 2007-09-04 | J P Morgan Chase Bank | System and method for providing discriminated content to network users |
EP1276062A1 (en) * | 2001-07-12 | 2003-01-15 | Hewlett-Packard Company, A Delaware Corporation | A method of providing user-specific data to an information source, a data carrier and a method of personalising a user's internet experience |
US7409420B2 (en) * | 2001-07-16 | 2008-08-05 | Bea Systems, Inc. | Method and apparatus for session replication and failover |
US20030033379A1 (en) * | 2001-07-20 | 2003-02-13 | Lemur Networks | Intelligent central directory for soft configuration of IP services |
US20030020753A1 (en) * | 2001-07-25 | 2003-01-30 | Asa Kling | Product cost control graphical user interface |
US7406524B2 (en) * | 2001-07-26 | 2008-07-29 | Avaya Communication Isael Ltd. | Secret session supporting load balancer |
US6996601B1 (en) * | 2001-07-26 | 2006-02-07 | Sprint Communications Company L.P. | Process for managing change within an enterprise |
US20030023717A1 (en) * | 2001-07-26 | 2003-01-30 | Lister Michael L. | Method and apparatus to reveal the usability of an internet web site |
US7584425B2 (en) * | 2001-07-31 | 2009-09-01 | Verizon Business Global Llc | Systems and methods for generating reports |
US7051046B2 (en) * | 2001-08-01 | 2006-05-23 | Roy F. Weston, Inc. | System for managing environmental audit information |
US7426553B1 (en) * | 2001-08-02 | 2008-09-16 | At&T Intellectual Property I, L.P. | Provisioning data link connection identifiers in a communications network |
EP1283466A1 (en) * | 2001-08-06 | 2003-02-12 | Hewlett-Packard Company (a Delaware corporation) | Management system for a cluster |
US7243374B2 (en) | 2001-08-08 | 2007-07-10 | Microsoft Corporation | Rapid application security threat analysis |
WO2003015330A3 (en) * | 2001-08-08 | 2003-10-09 | Flash Networks Ltd | A system and a method for accelerating communication of tcp/ip based content |
US20030055668A1 (en) * | 2001-08-08 | 2003-03-20 | Amitabh Saran | Workflow engine for automating business processes in scalable multiprocessor computer platforms |
US20030074448A1 (en) * | 2001-08-10 | 2003-04-17 | Tadashi Kinebuchi | Multimedia information system and computer program |
US20030030664A1 (en) * | 2001-08-13 | 2003-02-13 | Parry Travis J. | Customizable control panel software |
US7113999B2 (en) * | 2001-08-14 | 2006-09-26 | International Business Machines Corporation | Method, computer readable media and apparatus for the selection and rendering of audio files in a networked environment |
US20030054806A1 (en) * | 2001-08-15 | 2003-03-20 | Raymond Ho | System and method for defining, creating and deploying wireless applications |
US8346848B2 (en) * | 2001-08-16 | 2013-01-01 | Juniper Networks, Inc. | System and method for maintaining statefulness during client-server interactions |
US7356558B2 (en) * | 2001-08-21 | 2008-04-08 | Hbi Branded Apparel Enterprises, Llc | Systems and methods for manufacturing |
EP1419441A2 (en) * | 2001-08-23 | 2004-05-19 | Sphera Corporation | A method and system for balancing the load of a computer resource among computers |
US7103590B1 (en) | 2001-08-24 | 2006-09-05 | Oracle International Corporation | Method and system for pipelined database table functions |
US7005441B2 (en) * | 2001-08-24 | 2006-02-28 | Ohio University | Compositions that bind antiterminator RNA and assay for screening such compositions |
US7219109B1 (en) * | 2001-08-27 | 2007-05-15 | Palmsource, Inc. | Time zone management |
US8090617B1 (en) * | 2001-08-27 | 2012-01-03 | Renesas Electronics America Inc. | Determining if a potential customer is a desirable customer |
US7003090B2 (en) * | 2001-08-28 | 2006-02-21 | International Business Machines Corporation | Method of establishing a communication channel to intelligent support for ebusiness applications |
US7089304B2 (en) * | 2001-08-30 | 2006-08-08 | Microsoft Corporation | Metered Internet usage |
US7031979B2 (en) * | 2001-08-31 | 2006-04-18 | Hewlett-Packard Development Company, L.P. | Report generation system and method |
US7327673B1 (en) * | 2001-08-31 | 2008-02-05 | At&T Delaware Intellectual Property, Inc. | Asymmetric digital subscriber line provision flow control on digital subscriber line access multiplexer switches |
US6990495B1 (en) * | 2001-09-05 | 2006-01-24 | Bellsouth Intellectual Property Corporation | System and method for finding persons in a corporate entity |
US8812706B1 (en) | 2001-09-06 | 2014-08-19 | Qualcomm Incorporated | Method and apparatus for compensating for mismatched delays in signals of a mobile display interface (MDDI) system |
US20030074606A1 (en) * | 2001-09-10 | 2003-04-17 | Udi Boker | Network-based control center for conducting performance tests of server systems |
JP2003087693A (en) * | 2001-09-11 | 2003-03-20 | Sony Corp | Processor, method, and program for information processing |
US6973567B1 (en) * | 2001-09-14 | 2005-12-06 | Cisco Technology, Inc. | Early authentication during modem training |
US20030055911A1 (en) * | 2001-09-17 | 2003-03-20 | Peterson Erik Lawrence | System and method for retrieving data over a network |
US7155439B2 (en) * | 2001-09-20 | 2006-12-26 | Wellogix, Inc. | Modular and customizable process and system for capturing field documentation data in a complex project workflow system |
US20030074358A1 (en) * | 2001-09-24 | 2003-04-17 | Siamak Sarbaz | Integration, management and processing of network data from disparate sources |
US7552056B2 (en) | 2001-09-25 | 2009-06-23 | Emc Corporation | Scalable storage service registration application |
US8055555B2 (en) * | 2001-09-25 | 2011-11-08 | Emc Corporation | Mediation device for scalable storage service |
US8255989B2 (en) | 2001-09-26 | 2012-08-28 | General Instrument Corporation | Access control and key management system for streaming media |
US20030059053A1 (en) * | 2001-09-26 | 2003-03-27 | General Instrument Corporation Motorola, Inc. | Key management interface to multiple and simultaneous protocols |
US7237108B2 (en) | 2001-09-26 | 2007-06-26 | General Instrument Corporation | Encryption of streaming control protocols and their headers |
US20030065727A1 (en) * | 2001-09-28 | 2003-04-03 | Capital One Financial Corporation | Systems and methods for providing secured electronic messaging |
US6724399B1 (en) * | 2001-09-28 | 2004-04-20 | Siebel Systems, Inc. | Methods and apparatus for enabling keyboard accelerators in applications implemented via a browser |
US7313617B2 (en) | 2001-09-28 | 2007-12-25 | Dale Malik | Methods and systems for a communications and information resource manager |
US7472187B2 (en) * | 2001-09-28 | 2008-12-30 | At&T Intellectual Property I, L.P. | Communications and information resource manager |
US7941520B1 (en) * | 2001-09-28 | 2011-05-10 | Bellsouth Intellectual Property Corp. | System and method for tracking telephone network capacity and equipment |
US8359335B2 (en) | 2001-09-29 | 2013-01-22 | Siebel Systems, Inc. | Computing system and method to implicitly commit unsaved data for a world wide web application |
US6907451B1 (en) * | 2001-09-29 | 2005-06-14 | Siebel Systems, Inc. | Method, apparatus, and system for immediate posting of changes in a client server environment |
US7203948B2 (en) * | 2001-09-29 | 2007-04-10 | Siebel Systems, Inc. | Method, apparatus, and system for implementing caching of view custom options in a framework to support web-based applications |
US7146617B2 (en) | 2001-09-29 | 2006-12-05 | Siebel Systems, Inc. | Method, apparatus, and system for implementing view caching in a framework to support web-based applications |
US7885996B2 (en) * | 2001-09-29 | 2011-02-08 | Siebel Systems, Inc. | Method, apparatus, and system for implementing notifications in a framework to support web-based applications |
US20040268214A1 (en) * | 2001-10-01 | 2004-12-30 | Gabriele Zinssmeister | Transaction monitoring system |
US20030065949A1 (en) * | 2001-10-01 | 2003-04-03 | Madeleine Le | International trade system |
US7870492B2 (en) | 2001-10-02 | 2011-01-11 | Siebel Systems, Inc. | Method, apparatus, and system for managing commands in a client server environment |
JP2003108558A (en) * | 2001-10-02 | 2003-04-11 | Ricoh Co Ltd | Data retrieving system |
US7287274B1 (en) * | 2001-10-04 | 2007-10-23 | Perot Systems Corporation | Method and system for providing security to a client server operating a browser |
JP3864743B2 (en) * | 2001-10-04 | 2007-01-10 | 株式会社日立製作所 | Firewall apparatus, communication method information devices and information equipment |
US20030069956A1 (en) * | 2001-10-05 | 2003-04-10 | Gieseke Eric James | Object oriented SNMP agent |
US20030070087A1 (en) * | 2001-10-05 | 2003-04-10 | Dmitry Gryaznov | System and method for automatic updating of multiple anti-virus programs |
JP3901484B2 (en) * | 2001-10-05 | 2007-04-04 | 株式会社ジェイテクト | Electric power steering system |
US7457883B2 (en) * | 2001-10-12 | 2008-11-25 | Cisco Technology, Inc. | Mechanism for implementing network discovery in a cable network |
US20040049655A1 (en) * | 2001-10-12 | 2004-03-11 | Allison David S. | Method and apparatus for communication to threads of control through streams |
US20030088714A1 (en) * | 2001-10-15 | 2003-05-08 | Scott Madlener | User internet interface |
US7003575B2 (en) * | 2001-10-15 | 2006-02-21 | First Hop Oy | Method for assisting load balancing in a server cluster by rerouting IP traffic, and a server cluster and a client, operating according to same |
US20030074579A1 (en) * | 2001-10-16 | 2003-04-17 | Microsoft Corporation | Virtual distributed security system |
US7676540B2 (en) * | 2001-10-16 | 2010-03-09 | Microsoft Corporation | Scoped referral statements |
US7899047B2 (en) | 2001-11-27 | 2011-03-01 | Microsoft Corporation | Virtual network with adaptive dispatcher |
EP1303097A3 (en) | 2001-10-16 | 2005-11-30 | Microsoft Corporation | Virtual distributed security system |
US20030074482A1 (en) * | 2001-10-16 | 2003-04-17 | Christensen Erik B. | Composable messaging protocol |
US7536712B2 (en) * | 2001-10-16 | 2009-05-19 | Microsoft Corporation | Flexible electronic message security mechanism |
US20030079039A1 (en) * | 2001-10-16 | 2003-04-24 | Forkner Damien R. | Web server utilizing a state machine and user token |
US7194553B2 (en) | 2001-10-16 | 2007-03-20 | Microsoft Corporation | Resolving virtual network names |
US8015204B2 (en) * | 2001-10-16 | 2011-09-06 | Microsoft Corporation | Scoped access control metadata element |
US7552203B2 (en) * | 2001-10-17 | 2009-06-23 | The Boeing Company | Manufacturing method and software product for optimizing information flow |
US7403986B1 (en) * | 2001-10-18 | 2008-07-22 | Network Equipment Technologies, Inc. | Method for synchronizing circuit related objects between network management systems and network control processors |
US7047484B1 (en) * | 2001-10-18 | 2006-05-16 | Microsoft Corporation | Method, system, and apparatus for providing access to asynchronous data in a spreadsheet application program |
US7080092B2 (en) | 2001-10-18 | 2006-07-18 | Bea Systems, Inc. | Application view component for system integration |
US7552222B2 (en) | 2001-10-18 | 2009-06-23 | Bea Systems, Inc. | Single system user identity |
US7454750B2 (en) * | 2001-10-19 | 2008-11-18 | Amberpoint, Inc. | Integrator adaptor and proxy based composite application provisioning method and apparatus |
US7337220B2 (en) * | 2001-10-24 | 2008-02-26 | At&T Labs, Inc. | Unified interface for managing DSL services |
US7155001B2 (en) | 2001-10-24 | 2006-12-26 | Sbc Properties, L.P. | System and method for restricting and monitoring telephone calls |
US20030084423A1 (en) * | 2001-10-26 | 2003-05-01 | Dai Clegg | Automatic source code generation |
US7216160B2 (en) * | 2001-10-31 | 2007-05-08 | Sun Microsystems, Inc. | Server-based application monitoring through collection of application component and environmental statistics |
US20030140089A1 (en) * | 2001-11-01 | 2003-07-24 | Hines Kenneth J. | Inter-applet communication using an applet agent |
US20030093435A1 (en) * | 2001-11-05 | 2003-05-15 | Bandekar Vijay R. | Method and system for application level data object synchronization between two or more processes |
GB0126908D0 (en) * | 2001-11-09 | 2002-01-02 | Ibm | Method and system for display of activity of users |
US7149809B2 (en) * | 2001-11-13 | 2006-12-12 | One Touch Systems | System for reducing server loading during content delivery |
EP1456752A1 (en) * | 2001-11-14 | 2004-09-15 | Exegesys, Inc. | Method and system for software application development and customizable runtime environment |
US7243366B2 (en) * | 2001-11-15 | 2007-07-10 | General Instrument Corporation | Key management protocol and authentication system for secure internet protocol rights management architecture |
US20030097445A1 (en) * | 2001-11-20 | 2003-05-22 | Stephen Todd | Pluggable devices services and events for a scalable storage service architecture |
EP1315064A1 (en) * | 2001-11-21 | 2003-05-28 | Sun Microsystems, Inc. | Single authentication for a plurality of services |
US20030101269A1 (en) * | 2001-11-26 | 2003-05-29 | Eastman Kodak Company | Device interface agent |
US7734793B2 (en) * | 2001-11-27 | 2010-06-08 | Accenture Global Services Gmbh | Service control framework for seamless transfer of a multimedia conference over different media |
EP1461688A4 (en) * | 2001-11-27 | 2006-02-08 | Accenture Llp | Service control architecture |
US7072881B1 (en) * | 2001-11-27 | 2006-07-04 | Bellsouth Intellectual Property Corporation | Method and system for managing telecommunications reports |
WO2003046790A1 (en) * | 2001-11-27 | 2003-06-05 | Accenture Llp | Context sensitive advertisement delivery framework |
US7225256B2 (en) | 2001-11-30 | 2007-05-29 | Oracle International Corporation | Impersonation in an access system |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US7155608B1 (en) * | 2001-12-05 | 2006-12-26 | Bellsouth Intellectual Property Corp. | Foreign network SPAM blocker |
US7240089B2 (en) * | 2001-12-10 | 2007-07-03 | International Business Machines Corporation | Message queuing method, system, and program product with reusable pooling component |
US7092378B1 (en) * | 2001-12-10 | 2006-08-15 | At & T Corp. | System for utilizing a genetic algorithm to provide constraint-based routing of packets in a communication network |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
USRE43906E1 (en) | 2001-12-12 | 2013-01-01 | Guardian Data Storage Llc | Method and apparatus for securing digital assets |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7672249B2 (en) * | 2001-12-13 | 2010-03-02 | Cisco Technology, Inc. | Configurable network appliance |
FI114428B (en) | 2001-12-13 | 2004-10-15 | Nokia Corp | A method and a system to collect counter data network element, |
US6814842B1 (en) | 2001-12-14 | 2004-11-09 | Networks Associates Technology, Inc. | System and method for organizing objects of a voice call in a tree representation |
US6970823B1 (en) | 2001-12-14 | 2005-11-29 | Networks Associates Technology, Inc. | System, method and computer program product for monitoring voice application calls over a network |
US6604139B1 (en) | 2001-12-14 | 2003-08-05 | Networks Associates Technology, Inc. | Voice protocol filtering system and method |
US7054923B2 (en) * | 2001-12-14 | 2006-05-30 | International Business Machines Corporation | Access control repository for providing access control of service profiles for web based solutions |
US20030115329A1 (en) * | 2001-12-18 | 2003-06-19 | Pascal Joly | Stacked approach to service provider Architecture |
US8549048B2 (en) * | 2001-12-19 | 2013-10-01 | Emc Corporation | Workflow database for scalable storage service |
US6950872B2 (en) * | 2001-12-19 | 2005-09-27 | Sun Microsystems, Inc. | Methods and systems for facilitating message exchange between networked computing entities |
US7146387B1 (en) * | 2001-12-19 | 2006-12-05 | Emc Corporation | System and method for configuring and performing application backups and restores in diverse environments |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US7099664B1 (en) * | 2001-12-28 | 2006-08-29 | Bellsouth Intellectual Property Corporation | Script building method and system for wireline and wireless telephone switches |
US7325237B2 (en) * | 2001-12-29 | 2008-01-29 | Hewlett-Packard Development Company, L.P. | System having customization modules to provide customizations |
US7149702B1 (en) | 2001-12-31 | 2006-12-12 | Bellsouth Intellectual Property Corp. | System and method for document delays associated with a project |
US7167917B2 (en) * | 2002-01-03 | 2007-01-23 | International Business Machines Corporation | Visual tool for developing service components for use in advanced intelligent networks |
US6725576B2 (en) * | 2002-01-04 | 2004-04-27 | Atlas Snowshoe Company | Snowshoe with molded tail piece |
US20030135500A1 (en) * | 2002-01-07 | 2003-07-17 | Henri Chevrel | Integrated gas supply system and computer network for enhanced user service |
US6965668B2 (en) * | 2002-01-08 | 2005-11-15 | Sbc Services, Inc. | Method and system for presenting billing information according to a customer-defined hierarchal structure |
US6976244B2 (en) * | 2002-01-09 | 2005-12-13 | International Business Machines Corporation | Method, system, and product for storage of attribute data in an object oriented environment |
US7640335B1 (en) * | 2002-01-11 | 2009-12-29 | Mcafee, Inc. | User-configurable network analysis digest system and method |
US7523127B2 (en) * | 2002-01-14 | 2009-04-21 | Testout Corporation | System and method for a hierarchical database management system for educational training and competency testing simulations |
US20030139962A1 (en) * | 2002-01-23 | 2003-07-24 | Nobrega Francis H. | Web based sevice request and approval system |
US7480715B1 (en) | 2002-01-25 | 2009-01-20 | Vig Acquisitions Ltd., L.L.C. | System and method for performing a predictive threat assessment based on risk factors |
US20030145046A1 (en) * | 2002-01-31 | 2003-07-31 | Keller S. Brandon | Generating a list of addresses on a proxy server |
CN1208732C (en) * | 2002-02-01 | 2005-06-29 | 上海贝尔阿尔卡特移动通信系统有限公司 | Concurrent event processing method and application system based on Web thereby |
US20030163544A1 (en) * | 2002-02-04 | 2003-08-28 | Wookey Michael J. | Remote service systems management interface |
US20030149740A1 (en) * | 2002-02-04 | 2003-08-07 | Wookey Michael J. | Remote services delivery architecture |
US20030149889A1 (en) * | 2002-02-04 | 2003-08-07 | Wookey Michael J. | Automatic communication and security reconfiguration for remote services |
US7167448B2 (en) * | 2002-02-04 | 2007-01-23 | Sun Microsystems, Inc. | Prioritization of remote services messages within a low bandwidth environment |
JP3797937B2 (en) * | 2002-02-04 | 2006-07-19 | 株式会社日立製作所 | Networked system, a network connection method, and a network connection device used in their |
US20030177259A1 (en) * | 2002-02-04 | 2003-09-18 | Wookey Michael J. | Remote services systems data delivery mechanism |
US20030149771A1 (en) * | 2002-02-04 | 2003-08-07 | Wookey Michael J. | Remote services system back-channel multicasting |
US7363360B2 (en) * | 2002-02-06 | 2008-04-22 | Adiran, Inc. | System and method for managing elements of a communication network |
US20030229516A1 (en) * | 2002-02-07 | 2003-12-11 | Christian Nickerson | System and method for rapid claims submission and adjudication |
US20040006739A1 (en) * | 2002-02-07 | 2004-01-08 | Craig Mulligan | Method and system for converting legacy data |
US6839852B1 (en) * | 2002-02-08 | 2005-01-04 | Networks Associates Technology, Inc. | Firewall system and method with network mapping capabilities |
US7389240B2 (en) * | 2002-02-08 | 2008-06-17 | Etalk Corporation | System and method for implementing recording plans using a presence-based manager |
US7536314B2 (en) * | 2002-02-08 | 2009-05-19 | Etalk Corporation | System and method for processing work according to an active work model |
US7237258B1 (en) | 2002-02-08 | 2007-06-26 | Mcafee, Inc. | System, method and computer program product for a firewall summary interface |
US8818833B2 (en) * | 2002-02-14 | 2014-08-26 | International Business Machines Corporation | Method and system for managing service requests across multiple systems |
CA2371985C (en) * | 2002-02-15 | 2015-12-29 | Teranet Enterprises Inc. | Method and system for constructing price structures of complex products and services |
US20060265459A1 (en) * | 2003-02-19 | 2006-11-23 | Postini, Inc. | Systems and methods for managing the transmission of synchronous electronic messages |
US7603472B2 (en) * | 2003-02-19 | 2009-10-13 | Google Inc. | Zero-minute virus and spam detection |
US6941348B2 (en) * | 2002-02-19 | 2005-09-06 | Postini, Inc. | Systems and methods for managing the transmission of electronic messages through active message date updating |
US7958187B2 (en) * | 2003-02-19 | 2011-06-07 | Google Inc. | Systems and methods for managing directory harvest attacks via electronic messages |
US7516447B2 (en) | 2002-02-22 | 2009-04-07 | Bea Systems, Inc. | Methods and apparatus for building, customizing and using software abstractions of external entities |
JP3698698B2 (en) * | 2002-02-26 | 2005-09-21 | 富士通株式会社 | Establishment of a call on the intranet and the external network through the Dmz |
US7661129B2 (en) | 2002-02-26 | 2010-02-09 | Citrix Systems, Inc. | Secure traversal of network components |
US7984157B2 (en) | 2002-02-26 | 2011-07-19 | Citrix Systems, Inc. | Persistent and reliable session securely traversing network components using an encapsulating protocol |
US7024459B2 (en) * | 2002-02-28 | 2006-04-04 | Microsoft Corporation | Scalable notification delivery service |
US7502457B2 (en) | 2002-02-28 | 2009-03-10 | At&T Intellectual Property I, L.P. | Outbound call rules routing |
US20030167335A1 (en) * | 2002-03-04 | 2003-09-04 | Vigilos, Inc. | System and method for network-based communication |
US20030171961A1 (en) * | 2002-03-06 | 2003-09-11 | International Business Machines Corporation | System and method for dynamically routing an object through an organization's workflow system |
US20030172141A1 (en) * | 2002-03-06 | 2003-09-11 | Adtran, Inc. | Element management system and method utilizing provision templates |
US6697811B2 (en) * | 2002-03-07 | 2004-02-24 | Raytheon Company | Method and system for information management and distribution |
JP2003263255A (en) * | 2002-03-11 | 2003-09-19 | Digital Creation Inc | Program for performing communication |
US6813637B2 (en) * | 2002-03-15 | 2004-11-02 | Sun Microsystems, Inc. | System and method for automatically partitioning an application between a web server and an application server |
US7308579B2 (en) * | 2002-03-15 | 2007-12-11 | Noel Abela | Method and system for internationally providing trusted universal identification over a global communications network |
US20030177390A1 (en) * | 2002-03-15 | 2003-09-18 | Rakesh Radhakrishnan | Securing applications based on application infrastructure security techniques |
EP1488577B1 (en) * | 2002-03-18 | 2007-04-18 | Nortel Networks Limited | Resource allocation using an auto-discovery mechanism for provider-provisioned layer-2 and layer-3 virtual private networks |
US6993533B1 (en) * | 2002-03-25 | 2006-01-31 | Bif Technologies Corp. | Relational database drill-down convention and reporting tool |
US20030191677A1 (en) * | 2002-03-27 | 2003-10-09 | Akkiraju Rama K. | Method and system for integrating e-Logistics processes into a user/provider interface using Web Services |
US7350149B1 (en) * | 2002-03-28 | 2008-03-25 | Emc Corporation | Backup reporting framework graphical user interface |
US7404145B1 (en) * | 2002-03-28 | 2008-07-22 | Emc Corporation | Generic mechanism for reporting on backups |
US7228353B1 (en |