US20040243842A1 - System server computer and method for monitoring the input rights of a user - Google Patents
System server computer and method for monitoring the input rights of a user Download PDFInfo
- Publication number
- US20040243842A1 US20040243842A1 US10/489,076 US48907604A US2004243842A1 US 20040243842 A1 US20040243842 A1 US 20040243842A1 US 48907604 A US48907604 A US 48907604A US 2004243842 A1 US2004243842 A1 US 2004243842A1
- Authority
- US
- United States
- Prior art keywords
- document
- control unit
- address
- field
- assigning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0423—Input/output
- G05B19/0425—Safety, monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/24—Pc safety
- G05B2219/24167—Encryption, password, user access privileges
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/32—Operator till task planning
- G05B2219/32126—Hyperlink, access to program modules and to hardware modules in www, web server, browser
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
Control system with at least one control unit, a server computer, a first document in a markup language and a second document in a markup language for loading through a client computer, whereby the first document contains at least one field and the second document contains data for directing the field to an address in a control unit.
Description
- This application is the US National Stage of International Application No. PCT/DE02/03103, filed Aug. 23, 2002 and claims the benefit thereof. The International Application claims the benefits of German application No. 10144332.3 filed Sep. 10, 2001, both of the applications are incorporated by reference herein in their entirety.
- The invention relates to a method for transmission of a process value from a control unit to a client computer as well as to a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product.
- It is known per se from the prior art how to link a control system, for example a stored program control (SPC) or a programmable logic controller (PLC), with a system server which can be accessed by a client computer. The client computer can load HTML pages from the server computer, for example in order to display process values on a user interface. The link between an output field of the HTML page and the process value is permanently programmed, for example by means of a JAVA script or by means of OCX (OLE Control Extension).
- A system for remotely accessing a control system via a commercial communications network is known from U.S. Pat. No. 6,061,603.
- FIG. 1 shows a block diagram of this already known system.
- The system comprises a
personal computer 8 with abrowser program 10. Thebrowser 10 can be a commercially available Internet browser such as, for example, Netscape Communication Navigator or Microsoft Internet Explorer. Thebrowser program 10 is used for accessing what is known as a website 4 via the Internet 14 in order to display the contents of the website 4 on themonitor 12 of thepersonal computer 8 for a user 2. - The website4 includes a
network interface 16 with aunique Internet address 18 as well as aserver computer 20 and anapplication program 22. Theserver computer 20 serves to interpret HTTP protocols and uses TCP/IP by means of TCP/IP stack 24 in order to interact with thenetwork interface 16 and theapplication program 22. This enables the data to be transferred between theapplication program 22 and the user 2 via the Internet 14. - The application program supplies data from a
control system 6. This data can be used by the user 2 for monitoring the controller, since said data can be transferred by means of the TCP/IP stack 24 from the website 4 via the Internet 14 to thepersonal computer 8 of the user 2. By this means a human-machine interface is created on thepersonal computer 8. - The user2 can set up a connection to the Internet 14 by way of what is termed an Internet Service Provider (ISP) and then enter the address of the website 4 into the
browser program 10. Using thebrowser 10 the user 2 can then, for example, read a homepage of the website 4 and download information from said website 4. In response to an input by the user 2 thebrowser 10 sends commands to the website 4, which commands are used by theapplication program 22 in order to display information which is provided by thecontrol system 6. A disadvantage with this already known system is in particular that theapplication program 22 has to be programmed specifically for aparticular control system 6 and permits no flexibility of any kind. - The document XP 002163955, “c-Internet connector box miniwebserver”, Operating Instructions Rev 2.0 Internet Connector Box, Xx, Xx (Oct. 7, 1999), 1-121 discloses a device (ICB) with an embedded Internet server with which dynamic Internet pages can be generated from an HTML template. Up to three devices which support a special protocol can be connected to the ICB device. In order to communicate with such devices, the ICB device uses an information element which the devices sent to the device in their initialization phase.
- XP010365709, Emerging Technologies And Factory Automation, 1999, Proceedings, Etfa '99, 1999 7th IEEE International Conference On [sic] Barcelona, Spain 18-21 Oct. 1999, Piscataway, Ni, Usa, ieee, Us (18-Oct.-1999), 823-830 discloses a method for accessing fieldbus devices using a client computer via the Internet. Here, a database or an XML document is used to provide a description of the fieldbus devices. The content of the HTML pages is then generated using the information from the database or the XML document.
- The object of the invention is therefore to create an improved method for transmission of a process value from a control unit to a client computer as well as a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product.
- The object underlying the invention is achieved by the features of the respective independent claims.
- Preferred embodiments of the invention are specified in the dependent claims.
- The invention permits the links between the fields of an HTML page and the process values on the server to be parameterized and transferred together with the HTML page from the server computer to the client computer. Elements on the HTML page can be identified in this case by means of an ID attribute, whereby the element type can be arbitrary.
- A particular advantage is that the graphical layout of the HTML page can initially be independent of the actual engineering data, i.e. for example the actual addresses of the control system. The individual fields of the HTML page are then linked subsequently via a further document in a markup language, XML for example.
- This permits the greatest possible flexibility also with regard to changes on the HTML page or changes with regard to the control system, for example if a control system is to be replaced by a control system of a new type which has different address ranges. In this case only the address ranges need to be re-assigned to the corresponding fields in the HTML page in the XML document.
- Also of particular advantage is that this flexible access by the user to the system controller can also take place via what is termed a firewall. The user can therefore log in from any location initially for example into a corporate intranet via a corresponding firewall in order subsequently to enter into contact with the system server. What is particularly advantageous here is that the user can also make inputs in addition to being able to visualize process values.
- A preferred exemplary embodiment of the invention will be explained in more detail in the following with reference to the drawings, in which:
- FIG. 1 is a block diagram of a control system known from the prior art,
- FIG. 2 is a block diagram of a first embodiment of the control system according to the invention,
- FIG. 3 is a block diagram of a second embodiment of the control system according to the invention,
- FIG. 4 is a flowchart of an embodiment of the method for transmission of a process value from a control unit to a client computer,
- FIG. 5 shows an embodiment of the method for transmission of an input value from a client computer to a control unit,
- FIG. 6 is a block diagram of a third embodiment of the control system according to the invention.
- FIG. 2 shows a block diagram of a control system for controlling a
system 25. Thesystem 25 is connected to one or more control units known as stored program controls (SPCs)—designated as SPS X and SPS Y in the example shown. The two control units SPS X and SPS Y each have different addresses, for accessing data for example. In particular, the control unit SPS X has the addresses a and c for storing process values; the control unit SPS Y has the address b. - The control units SPS X and SPS Y are connected to a
system server computer 27 via afieldbus 26. Thesystem server computer 27 can execute read/write accesses to the storage addresses a, c of the SPS X and to the address b of the SPS Y via thefieldbus 26. - The system server computer27 contains a
document 28 in a markup language. In the example shown in FIG. 2, the markup language used for thedocument 28 is the hypertext markup language (HTML). Thedocument 28 contains the fields A, B and C for displaying and/or graphically visualizing process values and/or for entering values. In addition, ascript 29 is coded in thedocument 28. This can be a JAVA script for example. As an alternative to thescript 29, a so-called applet can be provided. - Also coded in the
document 28 is apointer 30 to adocument 31. Thepointer 30 can consist, for example, of the Uniform Resource Locator (URL) of thedocument 31. - The
document 31 is likewise available in a markup language, this being an Extended Markup Language (XML) in the example shown in FIG. 2. A table 32 is coded in thedocument 31. - Table32 contains an assignment of the fields A, B and C of the
document 28 to specific storage addresses of the control units SPS X and SPS Y. In table 32, for example, field A is assigned to SPS X, and more specifically to address a of SPS X, whereas field B is assigned to address b of SPS Y, and field C to address c of SPS X. Table 32 can contain further assignments of this kind for further fields of thedocument 28 to further addresses of the SPS X and Y, as well as of further control units where necessary. - By means of a browser34 a
client computer 33 can set up a connection to thesystem server computer 27 via anetwork 35. Theclient computer 33 can be a regular personal computer, an operator console, a portable computer, a mobile phone with WAP browser or also a so-called WAP pad. - The
network 35 can be a corporate network or system-internal network, an intranet, extranet or the Internet itself. In the last-mentioned case the communication can also be set up via a so-called firewall between theclient computer 33 and thesystem server computer 27. A commercially available browser program, for example Netscape Communication Navigator or Microsoft Internet Explorer, can be used as the browser. - During operation of the system according to FIG. 2, a user of the
client computer 33 navigates by means of thebrowser 34 via thenetwork 35 to theHTML document 28. The user does this for example by selecting a corresponding hypertext link or entering the URL of thedocument 28 into thebrowser 34. - The
document 28 is then transferred via thenetwork 35 to theclient computer 33. Thescript 29 of thedocument 28 is also launched automatically on theclient computer 33 and executed. The script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used. - The
script 29 reads thepointer 30 of thedocument 28 and access thedocument 31 on thesystem server computer 27 by means of the corresponding URL. Thedocument 31 is then transferred via thenetwork 35 to theclient computer 33. - The
script 29 then reads the assignments of the fields A, B and C of thedocument 28 to the addresses of the control units SPS X and SPS Y from table 32, for example for field A the address specification indicating that a corresponding process value is stored on SPS X under the address a. - The
script 29 then sends a command to thesystem server computer 27, which command contains the control units and addresses assigned to the fields A, B and C. Thesystem server computer 27 then accesses the control units SPS X and/or SPS Y via thefieldbus 26 in order to read the contents of the corresponding storage locations with the addresses a, b and c. - The corresponding process values stored at these storage addresses are then transferred by the
system server computer 27 via thenetwork 35 to theclient computer 33 and displayed by thescript 29 in the corresponding fields A, B and C of thedocument 28 for the user. - FIG. 3 shows an alternative embodiment of the embodiment according to FIG. 2, in which alternative embodiment corresponding elements are designated by the same reference characters.
- In contrast to the embodiment shown in FIG. 2, the
system server computer 27 according to FIG. 3 contains thefiles File 36 contains a table which assigns to the document 28 a pointer to thedocument 31 belonging to thedocument 28. This corresponds to thepointer 30 of the embodiment shown in FIG. 2, whereby thefile 36 does not belong to thedocument 28 of the embodiment shown in FIG. 3, but is stored separately on thesystem server computer 27. If further documents 28 are present on thesystem server computer 27, thefile 36 accordingly contains pointers for the assignment of thesefurther documents 28 to corresponding further documents 31. - The
document 31 contains a coded table 38 which corresponds to the table 32 of the embodiment shown in FIG. 2. In contrast to table 32 of the embodiment shown in FIG. 2, table 38 of the embodiment shown in FIG. 3 contains no actual addresses, but only the designation of parameter value designations assigned to the fields A, B, C of thedocument 28. Field A, for example, is assigned to a parameter value with the designation “boiler”, the boiler temperature for example; field B is assigned to a parameter value with the designation “engine”, an engine speed for example, and field C is assigned to a parameter value with the designation “pump”, a valve setting of the pump for example. -
File 37, which is stored separately from thedocument 28 on thesystem server computer 27, assigns each designation of this kind to an address on a control unit, for example the designation “boiler” to the control unit SPS X and its storage address a, the designation “engine” to the control unit SPS Y and its address b, etc. - During operation of the system shown in FIG. 3, the
document 28 is then loaded in turn by theclient computer 33 and thescript 29 executed. Thescript 29 then queries thefile 36 for the pointer to thedocument 31 which is assigned to thedocument 28 and then, by means of this pointer, loads thedocument 31. Using the designations assigned to the individual fields A, B and C in table 38 of thedocument 31, the script then queries thefile 37 in order to obtain the corresponding addresses or control units. - Using the addresses obtained in this way, the
script 29 again sends a command to thesystem server computer 27 in order to execute a query to obtain the corresponding parameter values of the specified addresses of the control units SPS X and SPS Y. - With this embodiment it is particularly advantageous that the assignments in the
document 31 are made abstractly, which means that thedocument 31 does not need to be changed in the event of a change of the control unit and/or the address. In this case only a change of the corresponding address entry in thefile 37 is required. - Both in the embodiment according to FIG. 2 and in the embodiment according to FIG. 3, it is also possible to transfer an input value from the
client computer 33 to a control unit. To do this, the user enters an input value in an input field of thedocument 28, in field A for example. Thescript 29 is activated by actuation of the entry key by the user of theclient computer 33. - The
script 29 then sends a command to thesystem server computer 27. This command contains as arguments the input value and also the address and control unit assigned to the input field. This was determined beforehand by thescript 29 on the occasion of the transfer of the process values from the control units to the client computer, as explained above. - The
system server computer 27 then executes a write access to the corresponding address of the corresponding control unit—in the example under consideration, for field A as the input field this is the SPS X with the address a—in order to store the input value there. - If only one control unit is present, table32 or file 37 contains only a corresponding address specification, since the specification of the control unit is superfluous in that case.
- FIG. 4 shows a flowchart of an embodiment of the method for transmission of a process value. In
step 40, a document in a markup language, for example HTML, is first loaded by the client computer. Instep 41, a script coded in the HTML page is launched and, instep 42, loads a further document in a markup language, for example XML, assigned to the HTML page from the system server computer. - Using the address specifications in the XML document, in
step 43 the script queries the corresponding data for the fields of the HTML document from the system server computer. Instep 44, the system server computer then queries the corresponding data from the control unit or control units. Instep 45, this data is then transferred from the system server computer to the client computer, and instep 46 it is displayed in the corresponding fields of the HTML page. - FIG. 5 shows an embodiment of the method according to the invention for transmission of an input value from a client computer to a control unit. In
step 50, the input value is entered in one of the fields of the HTML document, for example field A (compare FIGS. 2 and 3). Instep 51, this input value is assigned to a specific address, i.e. a particular control unit if a plurality of control units are present, and to a storage address on the control unit in question. This assignment of the input value to an address is made via the corresponding assignment of the input field to the address which is provided by means of a further document in a markup language (comparedocument 31 of FIGS. 2 and 3). - In
step 52, the input value is transferred together with the address to the server and from there stored at the corresponding address. - FIG. 6 shows a further preferred embodiment of a control system for controlling a
system 25. Elements of the control systems of FIG. 6 which correspond to elements of the control system from FIG. 2 are designated by the same reference characters. - In contrast to the control system from FIG. 2, table32 is not part of the
document 31, but is stored separately in thesystem server computer 27. Instead of that, thedocument 31 contains a table 36 for assigning current display values to the fields A, B, C, . . . - The
system server computer 27 also includes aprogram 37. Theprogram 37 generates thedocument 31 with the table 36 automatically by means of corresponding accesses to the SPS X, SPS Y, . . . using the table 32. A separate table 32 exists for eachpage 28. - Compared to the embodiment shown in FIG. 2, it is advantageous with the embodiment shown in FIG. 6 that the display values are transferred directly to the client and not the addresses which permit these values to be queried. Compared to the embodiment shown in FIG. 2, therefore, with the embodiment shown in FIG. 6 the load on the
network 35 is reduced. This is achieved in particular in that theprogram 37 generates table 36 indocument 31 on the server side by accessing table 32. - During operation of the system shown in FIG. 6, a user of the
client computer 33 navigates by means of thebrowser 34 via thenetwork 35 to theHTML document 28; for example the user selects a corresponding hypertext link or enters the URL of thedocument 28 into thebrowser 34. - The
document 28 is then transferred via thenetwork 35 to theclient computer 33. Thescript 29 of thedocument 28 is also launched automatically on theclient computer 33 and executed. The script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used. - The
script 29 reads thepointer 30 of thedocument 28 and accesses thedocument 31 on thesystem server computer 27 by means of the corresponding URL. Theprogram 37 then determines the addresses of the required values in the SPSs from table 32 and fetches the values via thefieldbus 26. Theprogram 37 then generates thedocument 31, in which the table 36 is coded with field/value assignment. Thedocument 31 is then transferred via thenetwork 35 to theclient computer 33. - The
script 29 then reads out the assignments of the fields A, B and C to the values in table 36 and modifies the displayed elements of theHTML page 28 in thebrowser 34. The values can be displayed here for example as numeric values in HTML fields or a value can also be translated for example into a color change of an HTML element. - User inputs in the
browser 34 can also be transferred from theclient 33 to thesystem 25 in the same way. If a user has modified HTML fields of theHTML page 28 displayed in thebrowser 34, thescript 29 generates adocument 31 on theclient 33, in which document 31 the table 36 is coded with the field/value assignment. - This
document 31 is transferred from theclient 33 to thesystem server 27. There, theprogram 37 interprets/translates the field names from table 36 into SPS addresses with the aid of table 32 and sends the values from table 37 via thefieldbus 26 to the corresponding SPSs. - Accordingly, it is also possible to vary the embodiment shown in FIG. 3 in such a way that the
document 31 contains a table 36 with the field values. For this purpose the table 38 (cf. FIG. 3) is stored on thesystem server 27, and acorresponding program 37 generates the field values. - To sum up, the invention pertains to a control system with at least one control unit SPS X, SPS Y, . . . , a server computer, a first document in a markup language and a second document in a markup language for loading by a client computer, whereby the first document contains at least a field A, B, C, . . . and the second document contains data for assigning the field to an address of a control unit.
Claims (33)
1.-15. (cancelled)
16. A method for transmission of a process value from a control unit to a client computer, comprising:
providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the process value;
providing at least one access to a second document in a markup language, with the second document having data for assigning the field to an address of the control unit;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning;
querying the process value from the address; and
transmitting the process value from the server computer to the client computer.
17. A method for transmission of an input value from a client computer to a control unit, comprising:
providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the input value;
providing at least one access to a second document in a markup language, the second document containing data for assigning the field to an address of the control unit;
entering the input value into the field;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning; and
transmitting the input value from the server computer to the control unit.
18. A method according to claim 16 , wherein the first document comprises a script.
19. A method according to claim 16 , wherein a script of the first document executes a query of the database to determine the assignment of the first document to a second document.
20. A method according to claim 16 , wherein the first document comprises a pointer to the second document.
21. A method according to claims 16, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
22. A method according to claims 16, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, the database containing an assignment of the designation to an address of the control unit.
23. A computer program product comprising computer-readable means for performing a method for transmission of a process value from a control unit to a client computer, the method comprising:
providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the process value;
providing at least one access to a second document in a markup language, with the second document having data for assigning the field to an address of the control unit;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning;
querying the process value from the address; and
transmitting the process value from the server computer to the client computer.
24. A control system comprising:
at least one control unit;
a server computer;
a first document in a markup language and a second document in a markup language for loading by a client computer, the first document comprising at least one field; and
a first database for assigning the first and the second document on the server computer, the second document comprising data for assigning the field to an address of the control unit.
25. A control system according to claim 24 , wherein the first document comprises a script.
26. A control system according to claim 24 , wherein the first document has a pointer to the second document.
27. A control system according to claim 24 , wherein the data for assigning the field to an address of the control unit has an address of the control unit.
28. A control system according to claim 24 , wherein the data for assigning the field to an address of the control unit assigns a designation to the field and having a second database on the server computer for assigning the designation to the address of the control unit.
29. A method according to claim 17 , wherein the first document comprises a script.
30. A method according to claim 17 , wherein a script of the first document executes a query of the database to determine the assignment of the first document to a second document.
31. A method according to claim 29 , wherein the script of the first document executes a query of the database to determine the assignment of the first document to a second document.
32. A method according to claim 18 , wherein the script of the first document executes a query of the database in order to determine the assignment of the first document to a second document.
33. A method according to claim 17 , wherein the first document contains a pointer to the second document.
34. A method according to claim 33 , wherein the pointer to the second document is a URL.
35. A method according to claim 18 , wherein the first document contains a pointer to the second document.
36. A method according to claim 17 , wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
37. A method according to claim 29 , wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
38. A method according to claim 18 , wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
39. A method according to claim 17 , wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
40. A method according to claim 29 , wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
41. A method according to claim 18 , wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
42. A computer program product comprising computer-readable means for performing a method for transmission of an input value from a client computer to a control unit, comprising:
providing at least one access to a first document in a markup language of a server computer, with the first document having at least one field for the input value;
providing at least one access to a second document in a markup language, the second document containing data for assigning the field to an address of the control unit;
entering the input value into the field;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning; and
transmitting the input value from the server computer to the control unit.
43. A computer program product according to claim 23 , wherein the program for performing the method is executed on a control system.
44. A computer program product according to claim 42 , wherein the program for performing the method is executed on a control system.
45. A control system according to claim 25 , wherein the first document has a pointer to the second document.
46. A control system according to claim 45 , wherein the pointer is a URL.
47. A control system according to claim 26 , wherein the pointer is a URL.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/489,076 US20040243842A1 (en) | 1999-08-23 | 2002-08-23 | System server computer and method for monitoring the input rights of a user |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15039299P | 1999-08-23 | 1999-08-23 | |
US60150392 | 1999-08-23 | ||
US09535080 | 2000-03-23 | ||
US09/535,080 US6339423B1 (en) | 1999-08-23 | 2000-03-23 | Multi-domain access control |
PCT/DE2002/003105 WO2003025714A2 (en) | 2001-09-10 | 2002-08-23 | System server computer and method for monitoring the input rights of a user |
US10/489,076 US20040243842A1 (en) | 1999-08-23 | 2002-08-23 | System server computer and method for monitoring the input rights of a user |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040243842A1 true US20040243842A1 (en) | 2004-12-02 |
Family
ID=26847603
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/535,080 Expired - Lifetime US6339423B1 (en) | 1999-08-23 | 2000-03-23 | Multi-domain access control |
US10/489,076 Abandoned US20040243842A1 (en) | 1999-08-23 | 2002-08-23 | System server computer and method for monitoring the input rights of a user |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/535,080 Expired - Lifetime US6339423B1 (en) | 1999-08-23 | 2000-03-23 | Multi-domain access control |
Country Status (4)
Country | Link |
---|---|
US (2) | US6339423B1 (en) |
EP (1) | EP1216533B1 (en) |
ES (1) | ES2409629T3 (en) |
WO (1) | WO2001015377A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060112020A1 (en) * | 2004-11-19 | 2006-05-25 | Karlheinz Dorn | Generation and management of a rights context for order handling in technical processes |
US20080289021A1 (en) * | 2007-05-17 | 2008-11-20 | Ashok Chandrasekhar | Software application access method and system |
Families Citing this family (217)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7403922B1 (en) * | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US7096192B1 (en) * | 1997-07-28 | 2006-08-22 | Cybersource Corporation | Method and system for detecting fraud in a credit card transaction over a computer network |
US6965999B2 (en) * | 1998-05-01 | 2005-11-15 | Microsoft Corporation | Intelligent trust management method and system |
US7155605B1 (en) * | 1999-03-31 | 2006-12-26 | Lenovo (Singapore) Pte. Ltd. | Data processing system and method for maintaining secure data blocks |
US7013296B1 (en) | 1999-06-08 | 2006-03-14 | The Trustees Of Columbia University In The City Of New York | Using electronic security value units to control access to a resource |
US7140039B1 (en) * | 1999-06-08 | 2006-11-21 | The Trustees Of Columbia University In The City Of New York | Identification of an attacker in an electronic system |
US7272855B1 (en) | 1999-06-08 | 2007-09-18 | The Trustees Of Columbia University In The City Of New York | Unified monitoring and detection of intrusion attacks in an electronic system |
US6745332B1 (en) * | 1999-06-29 | 2004-06-01 | Oracle International Corporation | Method and apparatus for enabling database privileges |
US7058817B1 (en) | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
US7058683B1 (en) | 1999-07-20 | 2006-06-06 | Sun Microsystems, Inc. | Methods and apparatus for providing a virtual host in electronic messaging servers |
US6778653B1 (en) * | 1999-11-09 | 2004-08-17 | Nortel Networks Limited | Storing information about a telephony session |
US8571975B1 (en) | 1999-11-24 | 2013-10-29 | Jpmorgan Chase Bank, N.A. | System and method for sending money via E-mail over the internet |
US7137009B1 (en) * | 2000-01-06 | 2006-11-14 | International Business Machines Corporation | Method and apparatus for securing a cookie cache in a data processing system |
US20010047397A1 (en) * | 2000-02-18 | 2001-11-29 | Jameson David H. | Method and system for using pervasive device to access webpages |
US20020138728A1 (en) * | 2000-03-07 | 2002-09-26 | Alex Parfenov | Method and system for unified login and authentication |
JP3641590B2 (en) * | 2000-03-13 | 2005-04-20 | ヤフー株式会社 | Access authentication system |
US8239445B1 (en) * | 2000-04-25 | 2012-08-07 | International Business Machines Corporation | URL-based sticky routing tokens using a server-side cookie jar |
US7039699B1 (en) * | 2000-05-02 | 2006-05-02 | Microsoft Corporation | Tracking usage behavior in computer systems |
CA2409280A1 (en) * | 2000-05-15 | 2001-11-22 | Communicator, Inc. | Method and system for providing an online industry hub |
US7200863B2 (en) * | 2000-05-16 | 2007-04-03 | Hoshiko Llc | System and method for serving content over a wide area network |
JP2001338062A (en) * | 2000-05-26 | 2001-12-07 | Nec Corp | System for controlling electronic medical record and method for the same |
US7426530B1 (en) | 2000-06-12 | 2008-09-16 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US10185936B2 (en) * | 2000-06-22 | 2019-01-22 | Jpmorgan Chase Bank, N.A. | Method and system for processing internet payments |
US7194764B2 (en) * | 2000-07-10 | 2007-03-20 | Oracle International Corporation | User authentication |
US7134137B2 (en) * | 2000-07-10 | 2006-11-07 | Oracle International Corporation | Providing data to applications from an access system |
US9038170B2 (en) | 2000-07-10 | 2015-05-19 | Oracle International Corporation | Logging access system events |
US7464162B2 (en) * | 2000-07-10 | 2008-12-09 | Oracle International Corporation | Systems and methods for testing whether access to a resource is authorized based on access information |
US7249369B2 (en) * | 2000-07-10 | 2007-07-24 | Oracle International Corporation | Post data processing |
US7124203B2 (en) * | 2000-07-10 | 2006-10-17 | Oracle International Corporation | Selective cache flushing in identity and access management systems |
US8661539B2 (en) * | 2000-07-10 | 2014-02-25 | Oracle International Corporation | Intrusion threat detection |
US7080077B2 (en) * | 2000-07-10 | 2006-07-18 | Oracle International Corporation | Localized access |
US7711798B1 (en) * | 2000-07-12 | 2010-05-04 | Paltalk Holdings, Inc. | Method and computer program for offering products and services by examining user activity |
US7200869B1 (en) * | 2000-09-15 | 2007-04-03 | Microsoft Corporation | System and method for protecting domain data against unauthorized modification |
US6925497B1 (en) * | 2000-09-26 | 2005-08-02 | Microsoft Corporation | Systems and methods for controlling the number of clients that access a server |
US7051069B2 (en) * | 2000-09-28 | 2006-05-23 | Bea Systems, Inc. | System for managing logical process flow in an online environment |
US6898633B1 (en) * | 2000-10-04 | 2005-05-24 | Microsoft Corporation | Selecting a server to service client requests |
US6823391B1 (en) * | 2000-10-04 | 2004-11-23 | Microsoft Corporation | Routing client requests to back-end servers |
WO2002031702A1 (en) * | 2000-10-09 | 2002-04-18 | Enic Corporation | Registering and using multilingual domain names |
US7103556B2 (en) * | 2000-11-02 | 2006-09-05 | Jpmorgan Chase Bank, N.A. | System and method for aggregate portfolio client support |
WO2002045316A2 (en) * | 2000-11-10 | 2002-06-06 | Full Audio Corporation | Digital content distribution and subscription system |
US7093019B1 (en) * | 2000-11-21 | 2006-08-15 | Hewlett-Packard Development Company, L.P. | Method and apparatus for providing an automated login process |
US6718331B2 (en) * | 2000-12-14 | 2004-04-06 | International Business Machines Corporation | Method and apparatus for locating inter-enterprise resources using text-based strings |
US8095624B2 (en) * | 2000-12-28 | 2012-01-10 | CenterBeam Inc. | Architecture for serving and managing independent access devices |
US7185364B2 (en) | 2001-03-21 | 2007-02-27 | Oracle International Corporation | Access system interface |
US7440962B1 (en) | 2001-02-28 | 2008-10-21 | Oracle International Corporation | Method and system for management of access information |
US7171411B1 (en) | 2001-02-28 | 2007-01-30 | Oracle International Corporation | Method and system for implementing shared schemas for users in a distributed computing system |
US7062563B1 (en) * | 2001-02-28 | 2006-06-13 | Oracle International Corporation | Method and system for implementing current user links |
FR2821685A1 (en) * | 2001-03-01 | 2002-09-06 | Couponet S A | Controlling access to web sites by issuing access tokens to regular site users to speed their access, while blocking access to other users, and so encouraging user loyalty |
US7499948B2 (en) | 2001-04-16 | 2009-03-03 | Bea Systems, Inc. | System and method for web-based personalization and ecommerce management |
US20030041050A1 (en) * | 2001-04-16 | 2003-02-27 | Greg Smith | System and method for web-based marketing and campaign management |
US20030217333A1 (en) * | 2001-04-16 | 2003-11-20 | Greg Smith | System and method for rules-based web scenarios and campaigns |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US7020705B2 (en) * | 2001-04-26 | 2006-03-28 | Intel Corporation | De-authenticating in security environments only providing authentication |
US20030005308A1 (en) * | 2001-05-30 | 2003-01-02 | Rathbun Paul L. | Method and system for globally restricting client access to a secured web site |
WO2002099598A2 (en) | 2001-06-07 | 2002-12-12 | First Usa Bank, N.A. | System and method for rapid updating of credit information |
US7392546B2 (en) * | 2001-06-11 | 2008-06-24 | Bea Systems, Inc. | System and method for server security and entitlement processing |
JP4301482B2 (en) * | 2001-06-26 | 2009-07-22 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Server, information processing apparatus, access control system and method thereof |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US7266839B2 (en) * | 2001-07-12 | 2007-09-04 | J P Morgan Chase Bank | System and method for providing discriminated content to network users |
GB2378010A (en) * | 2001-07-27 | 2003-01-29 | Hewlett Packard Co | Mulit-Domain authorisation and authentication |
US20030037131A1 (en) * | 2001-08-17 | 2003-02-20 | International Business Machines Corporation | User information coordination across multiple domains |
US7920682B2 (en) * | 2001-08-21 | 2011-04-05 | Byrne William J | Dynamic interactive voice interface |
DE10144336A1 (en) * | 2001-09-10 | 2003-04-03 | Siemens Ag | Plant server computer and method for checking the rights for a user input |
US6976068B2 (en) * | 2001-09-13 | 2005-12-13 | Mcafee, Inc. | Method and apparatus to facilitate remote software management by applying network address-sorting rules on a hierarchical directory structure |
JP2003108520A (en) * | 2001-09-28 | 2003-04-11 | Canon Inc | Information providing server, terminal device, its control method and information providing system |
US7069581B2 (en) * | 2001-10-04 | 2006-06-27 | Mcafee, Inc. | Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment |
US20030074455A1 (en) * | 2001-10-11 | 2003-04-17 | International Business Machines Corporation | Context aware server devices |
US7367014B2 (en) * | 2001-10-24 | 2008-04-29 | Bea Systems, Inc. | System and method for XML data representation of portlets |
WO2003038561A2 (en) * | 2001-11-01 | 2003-05-08 | First Usa Bank, N.A. | System and method for establishing or modifying an account with user selectable terms |
US7225256B2 (en) * | 2001-11-30 | 2007-05-29 | Oracle International Corporation | Impersonation in an access system |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US10033700B2 (en) * | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7565683B1 (en) * | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7478418B2 (en) * | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US8065713B1 (en) * | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US7260555B2 (en) * | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7350226B2 (en) * | 2001-12-13 | 2008-03-25 | Bea Systems, Inc. | System and method for analyzing security policies in a distributed computer network |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US7661129B2 (en) * | 2002-02-26 | 2010-02-09 | Citrix Systems, Inc. | Secure traversal of network components |
US20180165441A1 (en) | 2002-03-25 | 2018-06-14 | Glenn Cobourn Everhart | Systems and methods for multifactor authentication |
US7748045B2 (en) * | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
US8613102B2 (en) | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US7725560B2 (en) | 2002-05-01 | 2010-05-25 | Bea Systems Inc. | Web service-enabled portlet wizard |
WO2003093964A1 (en) | 2002-05-01 | 2003-11-13 | Bea Systems, Inc. | Enterprise application platform |
US20030226037A1 (en) * | 2002-05-31 | 2003-12-04 | Mak Wai Kwan | Authorization negotiation in multi-domain environment |
JP4932154B2 (en) * | 2002-06-06 | 2012-05-16 | ドルマーク アセッツ リミティド ライアビリティー カンパニー | Method and system for providing user authentication to a member site in an identity management network, method for authenticating a user at a home site belonging to the identity management network, computer readable medium, and system for hierarchical distributed identity management |
ES2420758T3 (en) | 2002-08-19 | 2013-08-26 | Research In Motion Limited | System and method for secure control of the resources of wireless mobile communication devices |
US7512810B1 (en) * | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US7058660B2 (en) | 2002-10-02 | 2006-06-06 | Bank One Corporation | System and method for network-based project management |
AU2003271926A1 (en) * | 2002-10-17 | 2004-05-04 | Vodafone Group Plc. | Facilitating and authenticating transactions |
US7568218B2 (en) * | 2002-10-31 | 2009-07-28 | Microsoft Corporation | Selective cross-realm authentication |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US8301493B2 (en) * | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US7451217B2 (en) * | 2002-12-19 | 2008-11-11 | International Business Machines Corporation | Method and system for peer-to-peer authorization |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US20040128559A1 (en) * | 2002-12-31 | 2004-07-01 | Zurko Mary Ellen | Trusting security attribute authorities that are both cooperative and competitive |
US7653930B2 (en) | 2003-02-14 | 2010-01-26 | Bea Systems, Inc. | Method for role and resource policy management optimization |
US8831966B2 (en) | 2003-02-14 | 2014-09-09 | Oracle International Corporation | Method for delegated administration |
US7591000B2 (en) * | 2003-02-14 | 2009-09-15 | Oracle International Corporation | System and method for hierarchical role-based entitlements |
US20040167871A1 (en) * | 2003-02-20 | 2004-08-26 | Bea Systems, Inc. | Content mining for virtual content repositories |
US20040167868A1 (en) * | 2003-02-20 | 2004-08-26 | Bea Systems, Inc. | System and method for a virtual content repository |
US20040167880A1 (en) * | 2003-02-20 | 2004-08-26 | Bea Systems, Inc. | System and method for searching a virtual repository content |
US7293286B2 (en) * | 2003-02-20 | 2007-11-06 | Bea Systems, Inc. | Federated management of content repositories |
US7483904B2 (en) * | 2003-02-20 | 2009-01-27 | Bea Systems, Inc. | Virtual repository content model |
US7415478B2 (en) * | 2003-02-20 | 2008-08-19 | Bea Systems, Inc. | Virtual repository complex content model |
US7840614B2 (en) | 2003-02-20 | 2010-11-23 | Bea Systems, Inc. | Virtual content repository application program interface |
US7562298B2 (en) | 2003-02-20 | 2009-07-14 | Bea Systems, Inc. | Virtual content repository browser |
US7941840B2 (en) * | 2003-02-25 | 2011-05-10 | Hewlett-Packard Development Company, L.P. | Secure resource access |
US7810036B2 (en) * | 2003-02-28 | 2010-10-05 | Bea Systems, Inc. | Systems and methods for personalizing a portal |
US8224887B2 (en) * | 2003-03-26 | 2012-07-17 | Authenticatid, Llc | System, method and computer program product for authenticating a client |
US7454786B2 (en) * | 2003-03-27 | 2008-11-18 | International Business Machines Corporation | Method for integrated security roles |
US8108920B2 (en) * | 2003-05-12 | 2012-01-31 | Microsoft Corporation | Passive client single sign-on for web applications |
US8108939B2 (en) * | 2003-05-29 | 2012-01-31 | Oracle International Corporation | Method and apparatus to facilitate security-enabled content caching |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US20040268139A1 (en) * | 2003-06-25 | 2004-12-30 | Microsoft Corporation | Systems and methods for declarative client input security screening |
US7730543B1 (en) * | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US7472184B2 (en) * | 2003-09-19 | 2008-12-30 | International Business Machines Corporation | Framework for restricting resources consumed by ghost agents |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7703140B2 (en) * | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
GB2406925B (en) * | 2003-10-09 | 2007-01-03 | Vodafone Plc | Facilitating and authenticating transactions |
US7882132B2 (en) * | 2003-10-09 | 2011-02-01 | Oracle International Corporation | Support for RDBMS in LDAP system |
US7904487B2 (en) * | 2003-10-09 | 2011-03-08 | Oracle International Corporation | Translating data access requests |
US20050262362A1 (en) * | 2003-10-10 | 2005-11-24 | Bea Systems, Inc. | Distributed security system policies |
US20050102536A1 (en) * | 2003-10-10 | 2005-05-12 | Bea Systems, Inc. | Dynamically configurable distributed security system |
US20050097352A1 (en) * | 2003-10-10 | 2005-05-05 | Bea Systems, Inc. | Embeddable security service module |
US20050086531A1 (en) * | 2003-10-20 | 2005-04-21 | Pss Systems, Inc. | Method and system for proxy approval of security changes for a file security system |
US20050138371A1 (en) * | 2003-12-19 | 2005-06-23 | Pss Systems, Inc. | Method and system for distribution of notifications in file security systems |
US7702909B2 (en) * | 2003-12-22 | 2010-04-20 | Klimenty Vainstein | Method and system for validating timestamps |
KR101058002B1 (en) * | 2004-02-02 | 2011-08-19 | 삼성전자주식회사 | How to record and play back data under a domain management system |
US7752322B2 (en) * | 2004-03-19 | 2010-07-06 | Sony Corporation | System for ubiquitous network presence and access without cookies |
US7774601B2 (en) | 2004-04-06 | 2010-08-10 | Bea Systems, Inc. | Method for delegated administration |
US7236990B2 (en) * | 2004-04-13 | 2007-06-26 | Bea Systems, Inc. | System and method for information lifecycle workflow integration |
US7475091B2 (en) * | 2004-04-13 | 2009-01-06 | Bea Systems, Inc. | System and method for viewing a virtual content repository |
US7236989B2 (en) * | 2004-04-13 | 2007-06-26 | Bea Systems, Inc. | System and method for providing lifecycles for custom content in a virtual content repository |
US7580953B2 (en) * | 2004-04-13 | 2009-08-25 | Bea Systems, Inc. | System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories |
US7240076B2 (en) * | 2004-04-13 | 2007-07-03 | Bea Systems, Inc. | System and method for providing a lifecycle for information in a virtual content repository |
CN1934844B (en) * | 2004-04-23 | 2010-12-01 | 松下电器产业株式会社 | Server apparatus, client apparatus and network system |
US7707427B1 (en) * | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US8689276B2 (en) * | 2004-08-25 | 2014-04-01 | Adobe Systems Incorporated | System and method for controlling access to files |
JP4737974B2 (en) * | 2004-11-26 | 2011-08-03 | 株式会社東芝 | ONLINE SHOPPING SYSTEM AND USER MANAGEMENT DEVICE, NET STORE DEVICE, AND USER TERMINAL DEVICE |
US9438683B2 (en) * | 2005-04-04 | 2016-09-06 | Aol Inc. | Router-host logging |
US8887233B2 (en) * | 2005-04-08 | 2014-11-11 | Netapp, Inc. | Cookie-based acceleration of an authentication protocol |
US8078740B2 (en) * | 2005-06-03 | 2011-12-13 | Microsoft Corporation | Running internet applications with low rights |
US8583926B1 (en) | 2005-09-19 | 2013-11-12 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US20070073674A1 (en) * | 2005-09-26 | 2007-03-29 | Bea Systems, Inc. | System and method for providing federated events for content management systems |
US7752205B2 (en) * | 2005-09-26 | 2010-07-06 | Bea Systems, Inc. | Method and system for interacting with a virtual content repository |
US20070073673A1 (en) * | 2005-09-26 | 2007-03-29 | Bea Systems, Inc. | System and method for content management security |
US20070073784A1 (en) * | 2005-09-26 | 2007-03-29 | Bea Systems, Inc. | System and method for type inheritance for content management |
US7818344B2 (en) * | 2005-09-26 | 2010-10-19 | Bea Systems, Inc. | System and method for providing nested types for content management |
US7483893B2 (en) * | 2005-09-26 | 2009-01-27 | Bae Systems, Inc. | System and method for lightweight loading for managing content |
US7953734B2 (en) | 2005-09-26 | 2011-05-31 | Oracle International Corporation | System and method for providing SPI extensions for content management system |
US7917537B2 (en) * | 2005-09-26 | 2011-03-29 | Oracle International Corporation | System and method for providing link property types for content management |
CA2527550A1 (en) * | 2005-11-24 | 2007-05-24 | Oz Communications | Method for securely associating data with https sessions |
US7673135B2 (en) * | 2005-12-08 | 2010-03-02 | Microsoft Corporation | Request authentication token |
US8688813B2 (en) * | 2006-01-11 | 2014-04-01 | Oracle International Corporation | Using identity/resource profile and directory enablers to support identity management |
US20070226338A1 (en) * | 2006-03-23 | 2007-09-27 | Novell, Inc. | Registration of peer-to-peer services |
US8185737B2 (en) * | 2006-06-23 | 2012-05-22 | Microsoft Corporation | Communication across domains |
US8463852B2 (en) * | 2006-10-06 | 2013-06-11 | Oracle International Corporation | Groupware portlets for integrating a portal with groupware systems |
US8312507B2 (en) | 2006-10-17 | 2012-11-13 | A10 Networks, Inc. | System and method to apply network traffic policy to an application session |
US8584199B1 (en) | 2006-10-17 | 2013-11-12 | A10 Networks, Inc. | System and method to apply a packet routing policy to an application session |
CA2585808A1 (en) * | 2007-03-26 | 2008-09-26 | David Ker | Method and system for implementing a secured and centrally managed virtual ip network on a common ip network infrastructure |
JP4946564B2 (en) * | 2007-03-27 | 2012-06-06 | 富士通株式会社 | Authentication processing method and system |
US7926095B1 (en) | 2007-05-04 | 2011-04-12 | Avaya Inc. | Efficient authentication system for primary and secondary servers |
US8473735B1 (en) | 2007-05-17 | 2013-06-25 | Jpmorgan Chase | Systems and methods for managing digital certificates |
US9769177B2 (en) * | 2007-06-12 | 2017-09-19 | Syracuse University | Role-based access control to computing resources in an inter-organizational community |
US10019570B2 (en) * | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US9015279B2 (en) * | 2007-06-15 | 2015-04-21 | Bryte Computer Technologies | Methods, systems, and computer program products for tokenized domain name resolution |
US7924810B2 (en) * | 2007-06-21 | 2011-04-12 | Hewlett-Packard Development Company, L.P. | Method and computing system for controlling access |
KR20090067551A (en) * | 2007-12-21 | 2009-06-25 | 삼성전자주식회사 | Method and apparatus for using and limiting cluster-based contents, method and apparatus for authenticating access right of contents, and computer readable medium thereof |
US7970939B1 (en) * | 2007-12-31 | 2011-06-28 | Symantec Corporation | Methods and systems for addressing DNS rebinding |
US8627493B1 (en) * | 2008-01-08 | 2014-01-07 | Juniper Networks, Inc. | Single sign-on for network applications |
US8321682B1 (en) | 2008-01-24 | 2012-11-27 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
KR100997802B1 (en) * | 2008-10-20 | 2010-12-01 | 한국전자통신연구원 | Apparatus and method for security managing of information terminal |
US9288210B2 (en) * | 2009-01-26 | 2016-03-15 | Microsoft Technology Licensing, Llc | Revocable object access |
US9608826B2 (en) | 2009-06-29 | 2017-03-28 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US9407959B2 (en) | 2009-09-21 | 2016-08-02 | Adobe Systems Incorporated | Monitoring behavior with respect to a software program |
US8584221B2 (en) | 2009-10-23 | 2013-11-12 | Microsoft Corporation | Authenticating using cloud authentication |
US8838962B2 (en) * | 2010-09-24 | 2014-09-16 | Bryant Christopher Lee | Securing locally stored Web-based database data |
EP2453631B1 (en) | 2010-11-15 | 2016-06-22 | BlackBerry Limited | Data source based application sandboxing |
EP2656297A4 (en) | 2010-12-20 | 2014-05-21 | Nielsen Co Us Llc | Methods and apparatus to determine media impressions using distributed demographic information |
US8875243B1 (en) * | 2011-01-27 | 2014-10-28 | Sprint Communications Company L.P. | Identity abstraction providing limited cross-domain access |
DE102011077218B4 (en) * | 2011-06-08 | 2023-12-14 | Servicenow, Inc. | Access to data stored in a cloud |
EP2575315A1 (en) * | 2011-09-30 | 2013-04-03 | British Telecommunications Public Limited Company | Controlled access |
US9386105B2 (en) * | 2011-11-02 | 2016-07-05 | Microsoft Technology Licensing, Llc | Techniques for dynamic domain-based isolation |
US9118619B2 (en) * | 2011-11-07 | 2015-08-25 | Qualcomm Incorported | Prevention of cross site request forgery attacks by conditional use cookies |
US9191405B2 (en) | 2012-01-30 | 2015-11-17 | Microsoft Technology Licensing, Llc | Dynamic cross-site request forgery protection in a web-based client application |
US9118618B2 (en) | 2012-03-29 | 2015-08-25 | A10 Networks, Inc. | Hardware-based packet editor |
US10382202B1 (en) * | 2012-09-28 | 2019-08-13 | EMC IP Holding Company LLC | Method and apparatus for federated identity and authentication services |
US8887260B2 (en) | 2012-10-25 | 2014-11-11 | Facebook, Inc. | Token-based access control |
US9338225B2 (en) | 2012-12-06 | 2016-05-10 | A10 Networks, Inc. | Forwarding policies on a virtual service network |
US9286465B1 (en) * | 2012-12-31 | 2016-03-15 | Emc Corporation | Method and apparatus for federated single sign on using authentication broker |
US9690931B1 (en) | 2013-03-11 | 2017-06-27 | Facebook, Inc. | Database attack detection tool |
US9419957B1 (en) | 2013-03-15 | 2016-08-16 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US9992107B2 (en) | 2013-03-15 | 2018-06-05 | A10 Networks, Inc. | Processing data packets using a policy based network path |
US10038693B2 (en) | 2013-05-03 | 2018-07-31 | A10 Networks, Inc. | Facilitating secure network traffic by an application delivery controller |
US10148726B1 (en) | 2014-01-24 | 2018-12-04 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
US9942152B2 (en) | 2014-03-25 | 2018-04-10 | A10 Networks, Inc. | Forwarding data packets using a service-based forwarding policy |
US10268467B2 (en) | 2014-11-11 | 2019-04-23 | A10 Networks, Inc. | Policy-driven management of application traffic for providing services to cloud-based applications |
US10104084B2 (en) * | 2015-07-30 | 2018-10-16 | Cisco Technology, Inc. | Token scope reduction |
US10223541B2 (en) * | 2017-01-24 | 2019-03-05 | Salesforce.Com, Inc. | Adaptive permission token |
US11196733B2 (en) * | 2018-02-08 | 2021-12-07 | Dell Products L.P. | System and method for group of groups single sign-on demarcation based on first user login |
US11003394B2 (en) | 2019-06-28 | 2021-05-11 | Seagate Technology Llc | Multi-domain data storage system with illegal loop prevention |
CN113704795B (en) * | 2021-09-02 | 2024-02-06 | 杭州戎戍网络安全技术有限公司 | Multi-domain access control formalized modeling method based on label attribute |
CN114900330A (en) * | 2022-04-07 | 2022-08-12 | 京东科技信息技术有限公司 | Page protection method and device |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696898A (en) * | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US5875296A (en) * | 1997-01-28 | 1999-02-23 | International Business Machines Corporation | Distributed file system web server user authentication with cookies |
US5941947A (en) * | 1995-08-18 | 1999-08-24 | Microsoft Corporation | System and method for controlling access to data entities in a computer network |
US5963915A (en) * | 1996-02-21 | 1999-10-05 | Infoseek Corporation | Secure, convenient and efficient system and method of performing trans-internet purchase transactions |
US5968119A (en) * | 1996-12-09 | 1999-10-19 | Wall Data Incorporated | Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation |
US6061603A (en) * | 1997-09-10 | 2000-05-09 | Schneider Automation Inc. | System for remotely accessing an industrial control system over a commercial communications network |
US6073241A (en) * | 1996-08-29 | 2000-06-06 | C/Net, Inc. | Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state |
US6098093A (en) * | 1998-03-19 | 2000-08-01 | International Business Machines Corp. | Maintaining sessions in a clustered server environment |
US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
US6185567B1 (en) * | 1998-05-29 | 2001-02-06 | The Trustees Of The University Of Pennsylvania | Authenticated access to internet based research and data services |
US6199113B1 (en) * | 1998-04-15 | 2001-03-06 | Sun Microsystems, Inc. | Apparatus and method for providing trusted network security |
US20010037469A1 (en) * | 1999-05-11 | 2001-11-01 | Sun Microsystems, Inc. | Method and apparatus for authenticating users |
US6393468B1 (en) * | 1997-01-20 | 2002-05-21 | British Telecommunications Public Limited Company | Data access control |
US20020072980A1 (en) * | 2000-12-07 | 2002-06-13 | Rabindranath Dutta | System, method, and program for managing electronic shopping carts |
US20020083178A1 (en) * | 2000-08-11 | 2002-06-27 | Brothers John David West | Resource distribution in network environment |
US20020109717A1 (en) * | 2001-02-13 | 2002-08-15 | International Business Machines Corporation | Customizing a graphical user interface of a host application |
US20020143861A1 (en) * | 2001-04-02 | 2002-10-03 | International Business Machines Corporation | Method and apparatus for managing state information in a network data processing system |
US20030023752A1 (en) * | 2001-07-12 | 2003-01-30 | International Business Machines Corporation | Pluggable URL providers in a J2EE server |
US6539424B1 (en) * | 1999-11-12 | 2003-03-25 | International Business Machines Corporation | Restricting deep hyperlinking on the World Wide Web |
US6985953B1 (en) * | 1998-11-30 | 2006-01-10 | George Mason University | System and apparatus for storage and transfer of secure data on web |
US7233997B1 (en) * | 1997-06-26 | 2007-06-19 | British Telecommunications Plc | Data communications |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB8916586D0 (en) | 1989-07-20 | 1989-09-06 | Int Computers Ltd | Distributed data processing system |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
JP2977476B2 (en) * | 1995-11-29 | 1999-11-15 | 株式会社日立製作所 | Security method |
US5918014A (en) * | 1995-12-27 | 1999-06-29 | Athenium, L.L.C. | Automated collaborative filtering in world wide web advertising |
US6088016A (en) * | 1996-12-30 | 2000-07-11 | S3 Incorporated | Dithering method and apparatus using ramp probability logic |
US6006334A (en) * | 1997-05-01 | 1999-12-21 | International Business Machines Corp. | Method and system for authentication over a distributed service to limit password compromise |
US6170017B1 (en) * | 1997-05-08 | 2001-01-02 | International Business Machines Corporation | Method and system coordinating actions among a group of servers |
JP3180054B2 (en) | 1997-05-16 | 2001-06-25 | インターナショナル・ビジネス・マシーンズ・コーポレ−ション | Network security system |
EP0981885B1 (en) * | 1997-06-25 | 2005-12-14 | Inforonics, Inc. | Apparatus and method for identifying clients accessing network sites |
WO1999000958A1 (en) * | 1997-06-26 | 1999-01-07 | British Telecommunications Plc | Data communications |
US6065120A (en) * | 1997-12-09 | 2000-05-16 | Phone.Com, Inc. | Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices |
US6145084A (en) * | 1998-10-08 | 2000-11-07 | Net I Trust | Adaptive communication system enabling dissimilar devices to exchange information over a network |
-
2000
- 2000-03-23 US US09/535,080 patent/US6339423B1/en not_active Expired - Lifetime
- 2000-08-23 WO PCT/US2000/023442 patent/WO2001015377A1/en active Application Filing
- 2000-08-23 ES ES00961372T patent/ES2409629T3/en not_active Expired - Lifetime
- 2000-08-23 EP EP00961372A patent/EP1216533B1/en not_active Expired - Lifetime
-
2002
- 2002-08-23 US US10/489,076 patent/US20040243842A1/en not_active Abandoned
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5696898A (en) * | 1995-06-06 | 1997-12-09 | Lucent Technologies Inc. | System and method for database access control |
US5941947A (en) * | 1995-08-18 | 1999-08-24 | Microsoft Corporation | System and method for controlling access to data entities in a computer network |
US5963915A (en) * | 1996-02-21 | 1999-10-05 | Infoseek Corporation | Secure, convenient and efficient system and method of performing trans-internet purchase transactions |
US6073241A (en) * | 1996-08-29 | 2000-06-06 | C/Net, Inc. | Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state |
US5968119A (en) * | 1996-12-09 | 1999-10-19 | Wall Data Incorporated | Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation |
US6393468B1 (en) * | 1997-01-20 | 2002-05-21 | British Telecommunications Public Limited Company | Data access control |
US5875296A (en) * | 1997-01-28 | 1999-02-23 | International Business Machines Corporation | Distributed file system web server user authentication with cookies |
US7233997B1 (en) * | 1997-06-26 | 2007-06-19 | British Telecommunications Plc | Data communications |
US6061603A (en) * | 1997-09-10 | 2000-05-09 | Schneider Automation Inc. | System for remotely accessing an industrial control system over a commercial communications network |
US6098093A (en) * | 1998-03-19 | 2000-08-01 | International Business Machines Corp. | Maintaining sessions in a clustered server environment |
US6199113B1 (en) * | 1998-04-15 | 2001-03-06 | Sun Microsystems, Inc. | Apparatus and method for providing trusted network security |
US6185567B1 (en) * | 1998-05-29 | 2001-02-06 | The Trustees Of The University Of Pennsylvania | Authenticated access to internet based research and data services |
US6182142B1 (en) * | 1998-07-10 | 2001-01-30 | Encommerce, Inc. | Distributed access management of information resources |
US6985953B1 (en) * | 1998-11-30 | 2006-01-10 | George Mason University | System and apparatus for storage and transfer of secure data on web |
US20010037469A1 (en) * | 1999-05-11 | 2001-11-01 | Sun Microsystems, Inc. | Method and apparatus for authenticating users |
US6539424B1 (en) * | 1999-11-12 | 2003-03-25 | International Business Machines Corporation | Restricting deep hyperlinking on the World Wide Web |
US20020083178A1 (en) * | 2000-08-11 | 2002-06-27 | Brothers John David West | Resource distribution in network environment |
US20020072980A1 (en) * | 2000-12-07 | 2002-06-13 | Rabindranath Dutta | System, method, and program for managing electronic shopping carts |
US20020109717A1 (en) * | 2001-02-13 | 2002-08-15 | International Business Machines Corporation | Customizing a graphical user interface of a host application |
US20020143861A1 (en) * | 2001-04-02 | 2002-10-03 | International Business Machines Corporation | Method and apparatus for managing state information in a network data processing system |
US20030023752A1 (en) * | 2001-07-12 | 2003-01-30 | International Business Machines Corporation | Pluggable URL providers in a J2EE server |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060112020A1 (en) * | 2004-11-19 | 2006-05-25 | Karlheinz Dorn | Generation and management of a rights context for order handling in technical processes |
US20080289021A1 (en) * | 2007-05-17 | 2008-11-20 | Ashok Chandrasekhar | Software application access method and system |
US7987516B2 (en) | 2007-05-17 | 2011-07-26 | International Business Machines Corporation | Software application access method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2001015377A1 (en) | 2001-03-01 |
EP1216533B1 (en) | 2013-03-06 |
US6339423B1 (en) | 2002-01-15 |
EP1216533A4 (en) | 2007-10-24 |
ES2409629T3 (en) | 2013-06-27 |
EP1216533A1 (en) | 2002-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20040243842A1 (en) | System server computer and method for monitoring the input rights of a user | |
US7539935B2 (en) | Method for transmission of a process value and control system | |
CN110162720B (en) | Webpage loading method and device, computer equipment and storage medium | |
JP3883775B2 (en) | CONTROL SYSTEM SERVER DEVICE, CONTROL SYSTEM, CONTROL SYSTEM SERVER DEVICE COMMUNICATION METHOD, AND RECORDING MEDIUM CONTAINING THE PROGRAM | |
EP0859986B1 (en) | Method and apparatus for server-independent caching of dynamically-generated customized pages | |
KR100552554B1 (en) | Method and system for fulfilling requests for information from a network client | |
US6067579A (en) | Method for reducing message translation and traffic through intermediate applications and systems in an internet application | |
US6845401B1 (en) | Embedded file system for a programmable logic controller | |
JP4993330B2 (en) | Automation control module (ACM) that can operate the service portal | |
US20040010344A1 (en) | Remote control method and system for robot controller | |
US20020156838A1 (en) | Proxied web access for control devices on industrial control systems | |
US20030149749A1 (en) | Method of data refreshing of a mark-up- language document | |
US20050198241A1 (en) | Web server comprising integrated automation functionality and access to a realtime operating system | |
US20030225726A1 (en) | Mechanism for sharing web-based imaging information from a mainframe computing environment | |
US20040085366A1 (en) | Method for maintaining state information in a browser session across multiple web sites | |
US20020109714A1 (en) | Bookmark frame and method of launching browsers using the bookmark in an internet terminal | |
JP4669000B2 (en) | Web page control program, method and server | |
KR20000030236A (en) | System and method for providing adaptive imformation using communication network | |
CN104123143A (en) | User control loading system and method | |
WO2001057651A2 (en) | System and method for user interface translation | |
US20030055874A1 (en) | System for automatically recognizing devices connected in a distributed processing environment | |
KR100611199B1 (en) | Prining device providing contents list and automatically printing contents selected and method thereof | |
US20080005129A1 (en) | System for creating dynamic web pages | |
JP4197343B2 (en) | COMMUNICATION COMMUNICATION SYSTEM AND COMPUTER-READABLE RECORDING MEDIUM CONTAINING CONTROL COMMUNICATION PROGRAM | |
KR100382783B1 (en) | The mobile system and method for researching internet data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHLERETH, MICHAEL;REEL/FRAME:015705/0654 Effective date: 20040226 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |