Movatterモバイル変換


[0]ホーム

URL:


US20020198994A1 - Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment - Google Patents

Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
Download PDF

Info

Publication number
US20020198994A1
US20020198994A1US10/012,708US1270801AUS2002198994A1US 20020198994 A1US20020198994 A1US 20020198994A1US 1270801 AUS1270801 AUS 1270801AUS 2002198994 A1US2002198994 A1US 2002198994A1
Authority
US
United States
Prior art keywords
contract
computing device
information
message
student
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/012,708
Inventor
Charles Patton
Jeremy Roschelle
Roy Pea
Phil Vahey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SRI International Inc
Original Assignee
SRI International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SRI International IncfiledCriticalSRI International Inc
Priority to US10/012,708priorityCriticalpatent/US20020198994A1/en
Assigned to SRI INTERNATIONALreassignmentSRI INTERNATIONALASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: PATTON, CHARLES, VAHEY, PHIL, ROSCHELLE, JEREMY, PEA, ROY D.
Publication of US20020198994A1publicationCriticalpatent/US20020198994A1/en
Priority to US12/249,729prioritypatent/US8127039B2/en
Priority to US13/402,187prioritypatent/US9246586B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Described are a system and method for use by a computing device to transmit information over a communication medium. The computing device communicates over the medium according to a protocol stack having a plurality of protocol layers. Information having an identifier is received at a first protocol layer from a higher protocol layer in the protocol stack. The computing device determines whether to present the information to the network communication medium based on at least one term of a contract associated with the identifier. Upon determining to present the information to the communication medium, the computing device incorporates the identifier in the information before placing the information on the network communication medium.

Description

Claims (86)

What is claimed is:
1. A method for use by a first computing device to transmit information to at least one other computing device over a network communication medium according to a protocol stack having a plurality of protocol layers, the method comprising:
determining at a particular protocol layer whether to transmit information over the network communication medium based on at least one term of a contract associated with the information; and
upon determining to present the information to the network communication medium, forwarding the information to a lower protocol layer in the protocol stack for transmission over the communication medium.
2. The method ofclaim 1 further comprising associating an identifier with the information by which identifier the contract is associated with the information.
3. The method ofclaim 1 further comprising associating an identifier with the information and including that identifier in the information before transmitting the information over the network communication medium.
4. The method ofclaim 1 further comprising receiving the information at the particular protocol layer from a higher protocol layer in the protocol stack.
5. The method ofclaim 1 further comprising receiving the contract from another computing device over the network communication medium.
6. The method ofclaim 5 wherein the step of receiving the contract occurs using one of IR (infrared) beaming, RF (radio frequency) communication, and wired communication.
7. The method ofclaim 1 further comprising transmitting the contract over the network communication medium to another computing device.
8. The method ofclaim 1 further comprising receiving the contract over a secure communication channel.
9. The method ofclaim 1 further comprising storing the contract on the first computing device.
10. The method ofclaim 1 further comprising storing a plurality of contracts on the first computing device.
11. The method ofclaim 10 wherein the stored contracts are unmodifiable by any program other than a program that handles the particular protocol layer.
12. The method ofclaim 1 wherein the contract specifies one or more terms that the information must satisfy in order to be transmitted over the network communication medium.
13. The method ofclaim 1 wherein the contract specifies one or more terms that determine which actions, if any, can be performed on the information by a computing device receiving the information.
14. The method ofclaim 1 wherein the contract specifies at least one term comprising a parameter selected from a temporal parameter, an information-type parameter, an information-length parameter, and an information-content parameter.
15. The method ofclaim 1 further comprising encrypting the information before transmitting the information over the network communication medium.
16. The method ofclaim 1 further comprising transmitting the contract to each computing device used by a user belonging to a user group.
17. The method ofclaim 1 further comprising allowing the user of a computing device that receives the contract to transmit a copy of the contract to the user of another computing device.
18. The method ofclaim 1 further comprising providing the contract to a plurality of computing devices, wherein the contract permits one of the computing devices having the contract to transmit information associated with the contract and another of the computing devices having the contract to receive information associated with the contract.
19. The method ofclaim 1 further comprising providing the contract to a plurality of computing devices, wherein the contract permits each computing device having the contract to transmit and to receive information associated with the contract.
20. The method ofclaim 1 further comprising providing a user interface by which a user of the first computing device associates the contract with the information.
21. The method ofclaim 1 further comprising choosing the contract for association with the information based on a content of the information.
22. The method ofclaim 1 further comprising choosing the contract for association with the information based on an application program executing on the first computing device.
23. The method ofclaim 1 further comprising choosing the contract for association with the information based on a temporal context of the first computing device.
24. A method for use by a first computing device to receive information from at least one other computing device over a network communication medium according to a protocol stack having a plurality of protocol layers, the method comprising:
identifying at a particular protocol layer of a protocol stack a contract associated with information received over the network communication medium; and
determining at the particular protocol layer whether to present the information to a higher layer in the protocol stack based on at least one term of the contract.
25. The method ofclaim 24 further comprising extracting from the information an identifier that is associated with the contract.
26. The method ofclaim 24 wherein the step of determining whether to present the information to the higher layer in the protocol stack includes determining whether the first computing device has a copy the contract.
27. The method ofclaim 24 further comprising receiving the contract from another computing device over the communication medium.
28. The method ofclaim 27 wherein the step of receiving the contract occurs using one of IR (infrared) beaming, RF (radio frequency) communication, and wired communication.
29. The method ofclaim 24 further comprising receiving the contract over a secure communication channel.
30. The method ofclaim 24 further comprising storing the contract on the first computing device.
31. The method ofclaim 24 further comprising storing a plurality of contracts on the first computing device.
32. The method ofclaim 31 wherein the stored contracts are unmodifiable by any program other than a program that handles the particular protocol layer.
33. The method ofclaim 24 further comprising specifying one or more terms in the contract that the information must satisfy to be presented to the higher protocol layer of the protocol stack.
34. The method ofclaim 24 wherein the contract specifies at least one term comprising a parameter selected from a temporal parameter, an information-type parameter, an information-length parameter, and an information-content parameter.
35. The method ofclaim 24 further comprising decrypting the information before presenting the information to the higher protocol layer of the protocol stack.
36. The method ofclaim 24 further comprising receiving the contract to become a member of a user group.
37. The method ofclaim 24 further comprising allowing the user of the first computing device to transmit a copy of the contract to the user of another computing device.
38. The method ofclaim 24 further comprising providing the contract to a plurality of computing devices, wherein the contract permits one of the computing devices having the contract to transmit information associated with the contract and another of the computing devices having the contract to receive information associated with the contract.
39. The method ofclaim 24 further comprising providing the contract to a plurality of computing devices, wherein the contract permits each computing device having the contract to transmit and to receive information associated with the contract.
40. The method ofclaim 24 further comprising:
entering by the first computing device a secure mode of operation in response to the information received over the network communication medium;
issuing a reply indicating that the first computing device has entered the secure mode of operation;
activating an indicator on the first computing device that verifiably shows that the first computing device is operating in the secure mode of operation.
41. The method ofclaim 40 further comprising receiving the information over the network communication medium from a security station.
42. The method ofclaim 40 wherein the security station is a wireless access point [controlled by a server system].
43. The method ofclaim 40 wherein the security station includes an infrared beaming port.
44. The method ofclaim 40 further comprising placing the security station where a user of the first computing device entering a restricted zone necessarily passes near the security station.
45. The method ofclaim 40 wherein activating the indicator includes at least one of (i) affixing a sticker to a visible surface of the first computing device, (ii) causing the first computing device to produce a detectable output, and (iii) enabling the first computing device to respond correctly to a challenge.
46. The method ofclaim 45 wherein the detectable output is at least one of an illuminated LED (light emitting diode), an emitted sound, and a wireless transmission that indicates the first computing device is operating in the secure mode.
47. The method ofclaim 45, wherein the challenge includes providing a predefined input to the first computing device.
48. The method ofclaim 45 wherein the challenge includes pressing one or more particular keys on a keyboard of the first computing device.
49. The method ofclaim 40, wherein entering the secure mode of operation includes prohibiting the first computing device from at least one of (i) communicating over a particular physical link, (ii) launching an application program, (iii) storing data in memory, (iv) reading data from memory, (v) installing software, (vi) communicating with hardware, (vii) accessing a particular system library, (viii) performing a start-up type of action, and (ix) placing a restriction on a specific application program.
50. The method ofclaim 40, further comprising maintaining a session on the first computing device across a start-up type of event.
51. The method ofclaim 40, wherein the reply includes at least one of (i) a certificate of authenticity, (ii) a certificate of integrity, (iii) a version number, and (iv) a characteristic of the computing device.
52. The method ofclaim 40, further comprising receiving a challenge over the wireless network medium and computing a response that demonstrates the authenticity and integrity of the first computing device.
53. The method ofclaim 40, further comprising placing the first computing device in the secure mode of operation for a predefined duration.
54. The method ofclaim 53 wherein placing the first computing device includes transmitting a contract to the first computing device.
55. The method ofclaim 24 further comprising:
entering a secure session by the first computing device for a defined duration;
specifying a contract to supercede all other contracts presently on the first computing device for the duration of the secure session; and
marking the first computing device to show that the first computing device is in the secure session and is operating under the specified contract.
56. The method ofclaim 55 further comprising filtering, by the contract that supercedes all other contracts, all communications generated by the first computing device for transmission.
57. An article of manufacture having computer-readable program means embodied thereon for communicating over a network communication medium, the article of manufacture comprising:
computer-readable program means for determining at a particular protocol layer of a protocol stack that a message is associated with a contract; and
computer-readable program means for accessing the contract at the particular protocol layer to determine from at least one term of the contract whether to forward the message from the particular protocol layer.
58. The article of manufacture ofclaim 57 further comprising computer-readable program means for receiving the contract from a computing device over the network communication medium.
59. The article of manufacture ofclaim 57 further comprising computer-readable program means for transmitting the contract over the network communication medium to a computing device.
60. The article of manufacture ofclaim 57 further comprising computer-readable program means for storing the contract on a computing device.
61. The article of manufacture ofclaim 57 further comprising computer-readable program means for storing a plurality of contracts on a computing device.
62. The article of manufacture ofclaim 61 wherein the stored contracts are unmodifiable by any program other than a program that handles the particular protocol layer.
63. The article of manufacture ofclaim 57 wherein the contract specifies one or more terms that the message must satisfy to be forwarded from the particular protocol layer.
64. The article of manufacture ofclaim 57 wherein the contract specifies at least one term comprising a parameter selected from a temporal parameter, an information-type parameter, an information-length parameter, and an information-content parameter.
65. The article of manufacture ofclaim 57 further comprising computer-readable program means for encrypting the message before placing the message on the network communication medium.
66. The article of manufacture ofclaim 57 further comprising computer-readable program means for transmitting the contract to each computing device used by a user belonging to a user group.
67. The article of manufacture ofclaim 57 further comprising computer-readable program means for allowing the user of a computing device that receives the contract to transmit a copy of the contract to the user of another computing device.
68. The article of manufacture ofclaim 57 further comprising computer-readable program means for providing the contract to a plurality of computing devices, wherein the contract permits one of the computing devices having the contract to transmit information associated with the contract and another of the computing devices having the contract to receive messages associated with the contract.
69. The article of manufacture ofclaim 57 further comprising computer-readable program means for providing the contract to a plurality of computing devices, wherein the contract permits each computing device having the contract to transmit and to receive messages associated with the contract.
70. The article of manufacture ofclaim 57 further comprising computer-readable program means for providing a user interface by which a user of a computing device associates the contract with the message.
71. The article of manufacture ofclaim 57 further comprising computer-readable program means for selecting the contract for association with the message based on a content of the message.
72. The article of manufacture ofclaim 57 further comprising computer-readable program means for selecting the contract for association with the message based on an application program executing on a computing device.
73. The article of manufacture ofclaim 57 further comprising computer-readable program means for selecting the contract for association with the message based on a temporal context of a computing device.
74. A method for providing a computing device with a capability to perform an interaction with a resource in a wireless network, the method comprising;
transmitting a first message from the first computing device to the second computing device to initiate an exchange for obtaining the capability;
receiving at the first computing device a response to the first message indicating a type of interaction that is supported by the second computing device; and
transmitting from the first computing device to the second computing device a second message including a contract corresponding to the type of interaction to provide the second computing device with the capability to perform the interaction.
75. The method ofclaim 74, wherein the transmitting of the first message occurs when a predefined key of the first computing device is pressed.
76. The method ofclaim 74, wherein the transmitting of the first message occurs through an infrared transceiver of the first computing device.
77. The method ofclaim 74, wherein the transmitting of the first message includes transmitting type information representing content in the first message.
78. The method ofclaim 74, wherein the transmitting of the first message is a point-to-point transmission directed to a specific transceiver on the second computing device that is dedicated to respond to the first message.
79. The method ofclaim 74, further comprising transmitting the contract to the resource in the network to enable interaction between the resource and any computing device having the contract.
80. A method for providing a capability to perform an interaction with a resource in a wireless network including a first and second computing devices, the method comprising:
receiving at the second computing device a first message to initiate a capability exchange with the first computing device;
transmitting by the second computing device a response to the first message to the first computing device indicating a type of interaction that is supported by the second computing device; and
receiving at the second computing device a second message including a contract corresponding to the type of interaction to provide the second computing device with the capability to perform the interaction.
81. The method of claim80, wherein the receiving of the first message occurs through an infrared transceiver of the second computing device.
82. The method of claim80, wherein the receiving of the first message includes receiving type information representing content in the first message.
83. The method of claim80, wherein the receiving of the first message is a point-to-point communication directed to a specific transceiver on the second computing device that is dedicated to respond to the first message.
84. A method of controlling access to an electronic resource, the method comprising the steps of:
providing to the electronic resource a contract having an identifier; and
processing by the electronic resource any communication received by the electronic resource that has the identifier of the contract, otherwise filtering out such communication from further processing.
85. The method of claim84, wherein the contract specifies one or more conditions for using the electronic resource, and further comprising processing by the electronic resource a received communication if that communication satisfies each condition specified by the contract, otherwise filtering out such communication from further processing.
86. The method of claim84 further comprising providing the identifier of the contract to a computing device for inclusion in communications sent by the computing device to the electronic resource to enable the computing device to use the electronic resource.
US10/012,7082001-05-152001-11-16Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environmentAbandonedUS20020198994A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US10/012,708US20020198994A1 (en)2001-05-152001-11-16Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US12/249,729US8127039B2 (en)2001-05-152008-10-10Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US13/402,187US9246586B2 (en)2001-05-152012-02-22Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US29120001P2001-05-152001-05-15
US10/012,708US20020198994A1 (en)2001-05-152001-11-16Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/249,729DivisionUS8127039B2 (en)2001-05-152008-10-10Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment

Publications (1)

Publication NumberPublication Date
US20020198994A1true US20020198994A1 (en)2002-12-26

Family

ID=26683904

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US10/012,708AbandonedUS20020198994A1 (en)2001-05-152001-11-16Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US12/249,729Expired - Fee RelatedUS8127039B2 (en)2001-05-152008-10-10Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US13/402,187Expired - Fee RelatedUS9246586B2 (en)2001-05-152012-02-22Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US12/249,729Expired - Fee RelatedUS8127039B2 (en)2001-05-152008-10-10Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US13/402,187Expired - Fee RelatedUS9246586B2 (en)2001-05-152012-02-22Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment

Country Status (1)

CountryLink
US (3)US20020198994A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030037033A1 (en)*2001-08-202003-02-20Kai NymanNaming distribution method for ad hoc networks
US20030212690A1 (en)*2002-03-282003-11-13Peter SurmaExactly once protocol for message-based collaboration
US20040156333A1 (en)*2003-02-072004-08-12General Electric CompanySystem for evolutionary service migration
US20050138062A1 (en)*2003-11-282005-06-23Infineon Technologies AgMethod, computer program, apparatus and system for the selective communication of data sets
US20060007478A1 (en)*2004-07-062006-01-12Samsung Electronics Co., LtdWireless printing system and method based on wireless LAN
US20060100882A1 (en)*2002-12-242006-05-11Koninlikle Phillips Electronics N.VMethod and system to mark an audio signal with metadata
US20060130007A1 (en)*2004-12-012006-06-15International Business Machines CorporationComputer method and apparatus for automating translation to a modeling language
US20060149782A1 (en)*2005-01-052006-07-06Microsoft CorporationPrescribed navigation using topology metadata and navigation path
US20070067310A1 (en)*2005-08-222007-03-22Infosys Technologies, Ltd.System for performing a task in a communication network and methods thereof
US20080072309A1 (en)*2002-01-312008-03-20Brocade Communications Systems, Inc.Network security and applications to the fabric environment
US20080301320A1 (en)*2007-05-312008-12-04Morris Robert PMethod And System For Managing Communication Protocol Data Based On MIME Types
US20080318610A1 (en)*2007-06-202008-12-25Qualcomm IncorporatedSystem and method for sharing media in a group communication among wireless communication devices
US20080320131A1 (en)*2007-06-222008-12-25International Business Machines CorporationMethod, Apparatus or Software for Managing Propagation of the Performance of a Node in a Network
US20090147703A1 (en)*2005-10-262009-06-11James Wesley BemontMethod for Efficiently Retrieving Topology-Specific Data for Point-to-Point Networks
US20090182603A1 (en)*2006-10-162009-07-16Fujitsu LimitedInformation collection program, information collection apparatus, and information collection method
US20100071036A1 (en)*2008-09-172010-03-18Texas Instruments IncorporatedMethod and apparatus for redistribution system
US20100274757A1 (en)*2007-11-162010-10-28Stefan DeutzmannData link layer for databases
WO2012003292A1 (en)*2010-07-012012-01-05Analysis First LLCIdentification and communication systems
US20130222227A1 (en)*2012-02-242013-08-29Karl-Anders Reinhold JOHANSSONMethod and apparatus for interconnected devices
US20130260801A1 (en)*2010-12-032013-10-03Lg Electronics Inc.Apparatus and method for transceiving multicast traffic in a wireless access system supporting machine-to-machine communication
US20130311623A1 (en)*2011-11-082013-11-21Hitachi, Ltd.Method for managing network system
CN104426858A (en)*2013-08-262015-03-18联想(北京)有限公司Information processing method and electronic equipment
US20170140318A1 (en)*2015-11-182017-05-18Microsoft Technology Licensing, LlcAutomatic extraction and completion of tasks associated with communications
US9674675B2 (en)2007-06-202017-06-06Qualcomm IncorporatedSynchronizing floor control and media sharing in a half-duplex PTT system
CN107316183A (en)*2017-07-062017-11-03郑州云海信息技术有限公司Method and workflow engine that a kind of flow is created
CN112597374A (en)*2016-05-242021-04-02创新先进技术有限公司Internet information resource allocation method and device
US11811642B2 (en)2018-07-272023-11-07GoTenna, Inc.Vine™: zero-control routing using data packet inspection for wireless mesh networks

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020198994A1 (en)2001-05-152002-12-26Charles PattonMethod and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US20100011097A1 (en)*2008-07-112010-01-14Terry CobbMethods of Using Control Communications to Identify Devices that are Connected Through a Communications Patching System and Related Communications Patching Systems
US20100112540A1 (en)*2008-11-032010-05-06Digital Millennial Consulting LlcSystem and method of education utilizing mobile devices
US8872652B2 (en)*2009-05-262014-10-28Radiaulics, Inc.Method and apparatus for wireless communication in test, measurement, control, and communication systems
US8872654B2 (en)2009-05-262014-10-28Radiaulics, Inc.Method and apparatus for wireless communication in test, measurement, control, and communication systems
WO2012034086A2 (en)*2010-09-092012-03-15Board Of Regents Of The University Of Texas SystemClassroom response system
US8533788B2 (en)*2010-10-222013-09-10Texas Instruments IncorporatedWireless device network association
US20130339496A1 (en)*2012-06-152013-12-19Gyan PrakashEnterprise device configuration system
US9100877B2 (en)*2013-02-012015-08-04Intel Deutschland GmbhCommunication devices and methods for controlling a communication device
US9215075B1 (en)2013-03-152015-12-15Poltorak Technologies LlcSystem and method for secure relayed communications from an implantable medical device
US9420056B2 (en)*2013-06-262016-08-16International Business Machines CorporationAnalytics caching based on users connected
CN115018578A (en)2015-02-092022-09-06创新先进技术有限公司 Service realization method and device
US10169553B2 (en)*2015-06-292019-01-01Airwatch, LlcManaging grouped student devices with timed locks
US10813169B2 (en)2018-03-222020-10-20GoTenna, Inc.Mesh network deployment kit
CN110113404A (en)*2019-04-282019-08-09浙江学海教育科技有限公司Interactive teaching method based on examination question
CN112566277B (en)*2019-09-252023-01-31成都鼎桥通信技术有限公司Data returning method and device

Citations (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5124984A (en)*1990-08-071992-06-23Concord Communications, Inc.Access controller for local area network
US5481735A (en)*1992-12-281996-01-02Apple Computer, Inc.Method for modifying packets that meet a particular criteria as the packets pass between two layers in a network
US5546584A (en)*1992-07-011996-08-13Lundin; KennethSystem and method for establishing communication protocols between application programs
US5790553A (en)*1992-08-191998-08-04International Business Machines Corp.Seamless peer-to-peer communications in a layered communications architecture
US5864683A (en)*1994-10-121999-01-26Secure Computing CorporartionSystem for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5935245A (en)*1996-12-131999-08-103Com CorporationMethod and apparatus for providing secure network communications
US5941947A (en)*1995-08-181999-08-24Microsoft CorporationSystem and method for controlling access to data entities in a computer network
US5950195A (en)*1996-09-181999-09-07Secure Computing CorporationGeneralized security policy management system and method
US5968176A (en)*1997-05-291999-10-193Com CorporationMultilayer firewall system
US6047051A (en)*1996-11-112000-04-04Nokia Telecommunications OyImplementation of charging in a telecommunications system
US6052787A (en)*1996-06-052000-04-18Siemens AktiengesellschaftProcess for group-based cryptographic code management between a first computer unit and group computer units
US6105027A (en)*1997-03-102000-08-15Internet Dynamics, Inc.Techniques for eliminating redundant access checking by access filters
US6118744A (en)*1997-09-302000-09-12Compaq Computer CorporationParental blocking system in a DVD integrated entertainment system
US6148290A (en)*1998-09-042000-11-14International Business Machines CorporationService contract for managing service systems
US6154775A (en)*1997-09-122000-11-28Lucent Technologies Inc.Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules
US6219786B1 (en)*1998-09-092001-04-17Surfcontrol, Inc.Method and system for monitoring and controlling network access
US6233686B1 (en)*1997-01-172001-05-15At & T Corp.System and method for providing peer level access control on a network
US20010005890A1 (en)*1999-12-222001-06-28Nec CorporationAccess right managing system, portable terminal, gateway and contents server
US6282183B1 (en)*1997-06-022001-08-28Motorola, Inc.Method for authorizing couplings between devices in a capability addressable network
US6304973B1 (en)*1998-08-062001-10-16Cryptek Secure Communications, LlcMulti-level security network system
US20020016840A1 (en)*2000-05-122002-02-07Shai HerzogApplying recursive policy for scoping of administration of policy based networking
US6347376B1 (en)*1999-08-122002-02-12International Business Machines Corp.Security rule database searching in a network security environment
US20020069278A1 (en)*2000-12-052002-06-06Forsloew JanNetwork-based mobile workgroup system
US6466780B1 (en)*1997-09-032002-10-15Interlok Technologies, LlcMethod and apparatus for securing digital communications
US6480957B1 (en)*1997-11-102002-11-12Openwave Systems Inc.Method and system for secure lightweight transactions in wireless data networks
US6484261B1 (en)*1998-02-172002-11-19Cisco Technology, Inc.Graphical network security policy management
US6487600B1 (en)*1998-09-122002-11-26Thomas W. LynchSystem and method for supporting multimedia communications upon a dynamically configured member network
US6510349B1 (en)*1997-10-282003-01-21Georgia Tech Research CorporationAdaptive data security system and method
US6535592B1 (en)*2000-03-232003-03-18Soma Networks, Inc.Establishing and managing communications over telecommunication networks
US6539482B1 (en)*1998-04-102003-03-25Sun Microsystems, Inc.Network access authentication system
US6539483B1 (en)*2000-01-122003-03-25International Business Machines CorporationSystem and method for generation VPN network policies
US6549949B1 (en)*1999-08-312003-04-15Accenture LlpFixed format stream in a communication services patterns environment
US6580906B2 (en)*1997-12-102003-06-17Intel CorporationAuthentication and security in wireless communication system
US6609196B1 (en)*1997-07-242003-08-19Tumbleweed Communications Corp.E-mail firewall with stored key encryption/decryption
US6618806B1 (en)*1998-04-012003-09-09Saflink CorporationSystem and method for authenticating users in a computer network
US6622014B1 (en)*1999-10-292003-09-16AlcatelMethod for authorizing a communication between at least two devices
US6668045B1 (en)*2000-10-302003-12-23T-Netix, Inc.Message screening, delivery and billing system
US6671732B1 (en)*2000-07-242003-12-30Comverse Ltd.Method and apparatus for control of content based rich media streaming
US6684240B1 (en)*1999-12-152004-01-27Gateway, Inc.Method of setting parental lock levels based on example content
US6732278B2 (en)*2001-02-122004-05-04Baird, Iii Leemon C.Apparatus and method for authenticating access to a network resource
US6801909B2 (en)*2000-07-212004-10-05Triplehop Technologies, Inc.System and method for obtaining user preferences and providing user recommendations for unseen physical and information goods and services
US6812938B2 (en)*2000-03-292004-11-02Citicorp Development Center, Inc.Method and system for providing status indication and control to a computer network user
US6826609B1 (en)*2000-03-312004-11-30Tumbleweed Communications Corp.Policy enforcement in a secure data file delivery system
US6886044B1 (en)*1998-07-082005-04-26British Telecommunications Public Limited CompanyMethod and system having requirements matching servers for processing user messages
US6915437B2 (en)*2000-12-202005-07-05Microsoft CorporationSystem and method for improved network security
US7200749B2 (en)*2000-08-042007-04-03First Data CorporationMethod and system for using electronic communications for an electronic contract

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6345288B1 (en)*1989-08-312002-02-05Onename CorporationComputer-based communication system and method using metadata defining a control-structure
US6795406B2 (en)*1999-07-122004-09-21Genesys Telecommunications Laboratories, Inc.Methods and apparatus for enhancing wireless data network telephony, including quality of service monitoring and control
US7827057B1 (en)*1998-10-052010-11-02Walker Digital, LlcMethod and apparatus for providing cross-benefits based on a customer activity
US7136645B2 (en)*1998-10-092006-11-14Netmotion Wireless, Inc.Method and apparatus for providing mobile and other intermittent connectivity in a computing environment
US6760748B1 (en)*1999-01-202004-07-06Accenture LlpInstructional system grouping student terminals
US7027773B1 (en)*1999-05-282006-04-11Afx Technology Group International, Inc.On/off keying node-to-node messaging transceiver network with dynamic routing and configuring
US7346677B1 (en)*1999-07-022008-03-18Cisco Technology, Inc.Method and apparatus for creating policies for policy-based management of quality of service treatments of network data traffic flows
US6496851B1 (en)*1999-08-042002-12-17America Online, Inc.Managing negotiations between users of a computer network by automatically engaging in proposed activity using parameters of counterproposal of other user
US7340439B2 (en)*1999-09-282008-03-04Chameleon Network Inc.Portable electronic authorization system and method
US7251695B2 (en)*2000-08-172007-07-31Aspen Technology, Inc.Computer network communication method and apparatus
US6988133B1 (en)*2000-10-312006-01-17Cisco Technology, Inc.Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points
US7181017B1 (en)*2001-03-232007-02-20David FelsherSystem and method for secure three-party communications
US20020198994A1 (en)2001-05-152002-12-26Charles PattonMethod and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US20030008662A1 (en)*2001-07-092003-01-09Stern Edith H.Systems and methods wherein a mobile user device operates in accordance with a location policy and user device information
US7009530B2 (en)*2001-09-132006-03-07M&Fc Holding, LlcModular wireless fixed network for wide-area metering data collection and meter module apparatus
US7463726B2 (en)*2003-02-032008-12-09Sparktech CorporationRemotely selecting an economical communications transmission medium
EP2430800A4 (en)*2009-05-152014-01-08Hewlett Packard Development Co METHOD AND APPARATUS FOR APPLYING POLICIES USING A LABEL

Patent Citations (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5124984A (en)*1990-08-071992-06-23Concord Communications, Inc.Access controller for local area network
US5546584A (en)*1992-07-011996-08-13Lundin; KennethSystem and method for establishing communication protocols between application programs
US5790553A (en)*1992-08-191998-08-04International Business Machines Corp.Seamless peer-to-peer communications in a layered communications architecture
US5481735A (en)*1992-12-281996-01-02Apple Computer, Inc.Method for modifying packets that meet a particular criteria as the packets pass between two layers in a network
US5864683A (en)*1994-10-121999-01-26Secure Computing CorporartionSystem for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US5941947A (en)*1995-08-181999-08-24Microsoft CorporationSystem and method for controlling access to data entities in a computer network
US6052787A (en)*1996-06-052000-04-18Siemens AktiengesellschaftProcess for group-based cryptographic code management between a first computer unit and group computer units
US5950195A (en)*1996-09-181999-09-07Secure Computing CorporationGeneralized security policy management system and method
US6047051A (en)*1996-11-112000-04-04Nokia Telecommunications OyImplementation of charging in a telecommunications system
US5935245A (en)*1996-12-131999-08-103Com CorporationMethod and apparatus for providing secure network communications
US6233686B1 (en)*1997-01-172001-05-15At & T Corp.System and method for providing peer level access control on a network
US6105027A (en)*1997-03-102000-08-15Internet Dynamics, Inc.Techniques for eliminating redundant access checking by access filters
US5968176A (en)*1997-05-291999-10-193Com CorporationMultilayer firewall system
US6282183B1 (en)*1997-06-022001-08-28Motorola, Inc.Method for authorizing couplings between devices in a capability addressable network
US6609196B1 (en)*1997-07-242003-08-19Tumbleweed Communications Corp.E-mail firewall with stored key encryption/decryption
US6466780B1 (en)*1997-09-032002-10-15Interlok Technologies, LlcMethod and apparatus for securing digital communications
US6154775A (en)*1997-09-122000-11-28Lucent Technologies Inc.Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules
US6118744A (en)*1997-09-302000-09-12Compaq Computer CorporationParental blocking system in a DVD integrated entertainment system
US6510349B1 (en)*1997-10-282003-01-21Georgia Tech Research CorporationAdaptive data security system and method
US6480957B1 (en)*1997-11-102002-11-12Openwave Systems Inc.Method and system for secure lightweight transactions in wireless data networks
US6580906B2 (en)*1997-12-102003-06-17Intel CorporationAuthentication and security in wireless communication system
US6484261B1 (en)*1998-02-172002-11-19Cisco Technology, Inc.Graphical network security policy management
US6618806B1 (en)*1998-04-012003-09-09Saflink CorporationSystem and method for authenticating users in a computer network
US6539482B1 (en)*1998-04-102003-03-25Sun Microsystems, Inc.Network access authentication system
US6886044B1 (en)*1998-07-082005-04-26British Telecommunications Public Limited CompanyMethod and system having requirements matching servers for processing user messages
US6304973B1 (en)*1998-08-062001-10-16Cryptek Secure Communications, LlcMulti-level security network system
US6148290A (en)*1998-09-042000-11-14International Business Machines CorporationService contract for managing service systems
US6219786B1 (en)*1998-09-092001-04-17Surfcontrol, Inc.Method and system for monitoring and controlling network access
US6487600B1 (en)*1998-09-122002-11-26Thomas W. LynchSystem and method for supporting multimedia communications upon a dynamically configured member network
US6347376B1 (en)*1999-08-122002-02-12International Business Machines Corp.Security rule database searching in a network security environment
US6549949B1 (en)*1999-08-312003-04-15Accenture LlpFixed format stream in a communication services patterns environment
US6622014B1 (en)*1999-10-292003-09-16AlcatelMethod for authorizing a communication between at least two devices
US6684240B1 (en)*1999-12-152004-01-27Gateway, Inc.Method of setting parental lock levels based on example content
US20010005890A1 (en)*1999-12-222001-06-28Nec CorporationAccess right managing system, portable terminal, gateway and contents server
US6539483B1 (en)*2000-01-122003-03-25International Business Machines CorporationSystem and method for generation VPN network policies
US6535592B1 (en)*2000-03-232003-03-18Soma Networks, Inc.Establishing and managing communications over telecommunication networks
US6812938B2 (en)*2000-03-292004-11-02Citicorp Development Center, Inc.Method and system for providing status indication and control to a computer network user
US6826609B1 (en)*2000-03-312004-11-30Tumbleweed Communications Corp.Policy enforcement in a secure data file delivery system
US20020016840A1 (en)*2000-05-122002-02-07Shai HerzogApplying recursive policy for scoping of administration of policy based networking
US6801909B2 (en)*2000-07-212004-10-05Triplehop Technologies, Inc.System and method for obtaining user preferences and providing user recommendations for unseen physical and information goods and services
US6671732B1 (en)*2000-07-242003-12-30Comverse Ltd.Method and apparatus for control of content based rich media streaming
US7200749B2 (en)*2000-08-042007-04-03First Data CorporationMethod and system for using electronic communications for an electronic contract
US6668045B1 (en)*2000-10-302003-12-23T-Netix, Inc.Message screening, delivery and billing system
US20020069278A1 (en)*2000-12-052002-06-06Forsloew JanNetwork-based mobile workgroup system
US6915437B2 (en)*2000-12-202005-07-05Microsoft CorporationSystem and method for improved network security
US6732278B2 (en)*2001-02-122004-05-04Baird, Iii Leemon C.Apparatus and method for authenticating access to a network resource

Cited By (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030037033A1 (en)*2001-08-202003-02-20Kai NymanNaming distribution method for ad hoc networks
US7089298B2 (en)*2001-08-202006-08-08Nokia CorporationNaming distribution method for ad hoc networks
US20080072309A1 (en)*2002-01-312008-03-20Brocade Communications Systems, Inc.Network security and applications to the fabric environment
US20030212690A1 (en)*2002-03-282003-11-13Peter SurmaExactly once protocol for message-based collaboration
US7373424B2 (en)*2002-03-282008-05-13Sap AgExactly once protocol for message-based collaboration
US20060100882A1 (en)*2002-12-242006-05-11Koninlikle Phillips Electronics N.VMethod and system to mark an audio signal with metadata
US7689422B2 (en)*2002-12-242010-03-30Ambx Uk LimitedMethod and system to mark an audio signal with metadata
US20040156333A1 (en)*2003-02-072004-08-12General Electric CompanySystem for evolutionary service migration
US7366185B2 (en)2003-02-072008-04-29Lockheed Martin CorporationSystem for evolutionary service migration
US20050138062A1 (en)*2003-11-282005-06-23Infineon Technologies AgMethod, computer program, apparatus and system for the selective communication of data sets
US8755076B2 (en)*2004-07-062014-06-17Samsung Electronics Co., Ltd.Method and apparatus of processing wireless printing based on wireless LAN
US20060007478A1 (en)*2004-07-062006-01-12Samsung Electronics Co., LtdWireless printing system and method based on wireless LAN
US8264712B2 (en)*2004-07-062012-09-11Samsung Electronics Co., Ltd.Method and apparatus of processing wireless printing based on wireless LAN
US8352927B2 (en)2004-12-012013-01-08International Business Machines CorporationComputer method and apparatus for automating translation to a modeling language
US20060130007A1 (en)*2004-12-012006-06-15International Business Machines CorporationComputer method and apparatus for automating translation to a modeling language
US20100042969A1 (en)*2004-12-012010-02-18International Business Machines CorporationComputer method and apparatus for automating translation to a modeling language
US7650349B2 (en)*2005-01-052010-01-19Microsoft CorporationPrescribed navigation using topology metadata and navigation path
US20060149782A1 (en)*2005-01-052006-07-06Microsoft CorporationPrescribed navigation using topology metadata and navigation path
US8027684B2 (en)*2005-08-222011-09-27Infosys Technologies, Ltd.System for performing a task in a communication network and methods thereof
US20070067310A1 (en)*2005-08-222007-03-22Infosys Technologies, Ltd.System for performing a task in a communication network and methods thereof
US20090147703A1 (en)*2005-10-262009-06-11James Wesley BemontMethod for Efficiently Retrieving Topology-Specific Data for Point-to-Point Networks
US8411591B2 (en)*2005-10-262013-04-02Sanmina CorporationMethod for efficiently retrieving topology-specific data for point-to-point networks
US20090182603A1 (en)*2006-10-162009-07-16Fujitsu LimitedInformation collection program, information collection apparatus, and information collection method
US8666797B2 (en)*2006-10-162014-03-04Fujitsu LimitedInformation collection program, information collection apparatus, and information collection method
US20080301320A1 (en)*2007-05-312008-12-04Morris Robert PMethod And System For Managing Communication Protocol Data Based On MIME Types
US9674675B2 (en)2007-06-202017-06-06Qualcomm IncorporatedSynchronizing floor control and media sharing in a half-duplex PTT system
US20080318610A1 (en)*2007-06-202008-12-25Qualcomm IncorporatedSystem and method for sharing media in a group communication among wireless communication devices
US9210202B2 (en)*2007-06-202015-12-08Qualcomm IncorporatedSystem and method for sharing media in a group communication among wireless communication devices
US20080320131A1 (en)*2007-06-222008-12-25International Business Machines CorporationMethod, Apparatus or Software for Managing Propagation of the Performance of a Node in a Network
US20100274757A1 (en)*2007-11-162010-10-28Stefan DeutzmannData link layer for databases
US20100071036A1 (en)*2008-09-172010-03-18Texas Instruments IncorporatedMethod and apparatus for redistribution system
US9219544B2 (en)2010-07-012015-12-22Analysis First LLCLED based identification and communication systems
WO2012003292A1 (en)*2010-07-012012-01-05Analysis First LLCIdentification and communication systems
US8938170B2 (en)2010-07-012015-01-20Analysis First LLCHandheld identification and communication systems
US8971713B2 (en)2010-07-012015-03-03Analysis First LLCIdentification and communication systems
US8480397B2 (en)2010-07-012013-07-09Analysis First LLCMethods of simulating combat
US20130260801A1 (en)*2010-12-032013-10-03Lg Electronics Inc.Apparatus and method for transceiving multicast traffic in a wireless access system supporting machine-to-machine communication
US20130311623A1 (en)*2011-11-082013-11-21Hitachi, Ltd.Method for managing network system
US9094303B2 (en)*2011-11-082015-07-28Hitachi, Ltd.Method for managing network system
US9513793B2 (en)*2012-02-242016-12-06Blackberry LimitedMethod and apparatus for interconnected devices
US20130222227A1 (en)*2012-02-242013-08-29Karl-Anders Reinhold JOHANSSONMethod and apparatus for interconnected devices
CN104426858A (en)*2013-08-262015-03-18联想(北京)有限公司Information processing method and electronic equipment
US20170140318A1 (en)*2015-11-182017-05-18Microsoft Technology Licensing, LlcAutomatic extraction and completion of tasks associated with communications
US10366359B2 (en)*2015-11-182019-07-30Microsoft Technology Licensing, LlcAutomatic extraction and completion of tasks associated with communications
CN112597374A (en)*2016-05-242021-04-02创新先进技术有限公司Internet information resource allocation method and device
CN107316183A (en)*2017-07-062017-11-03郑州云海信息技术有限公司Method and workflow engine that a kind of flow is created
US11811642B2 (en)2018-07-272023-11-07GoTenna, Inc.Vine™: zero-control routing using data packet inspection for wireless mesh networks

Also Published As

Publication numberPublication date
US20120272295A1 (en)2012-10-25
US8127039B2 (en)2012-02-28
US20090043909A1 (en)2009-02-12
US9246586B2 (en)2016-01-26

Similar Documents

PublicationPublication DateTitle
US8127039B2 (en)Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment
US7116661B2 (en)Combining multi-hop and multicast wireless networking in classroom-like settings
US20020188656A1 (en)Combining specialized, spatially distinguished, point to point communications with other wireless networking communications to provide networking configuration in classroom-like settings
BeresfordLocation privacy in ubiquitous computing
US8498893B2 (en)Systems and methods for providing distributed recursive voting
US20040077367A1 (en)Wireless information retrieval and content dissemination system and method
US20090282493A1 (en)Mehtod and system for managing electronic messages
KR20180135097A (en)Chat-based support of communications and related functions
ChalmersSensing and systems in pervasive computing: Engineering context aware systems
US20060015481A1 (en)Knowledge management system and method
US20160163009A1 (en)Method and system for educational networking and services
US11522918B1 (en)Securely communicating organizational security policies between mobile devices
BoineyTeam decision making in time-sensitive environments
CN113541976A (en)Organization creating method and device, electronic equipment and storage medium
Heacox et al.Real-time online communications:'chat'use in navy operations
Kottahachchi et al.Access controls for intelligent environments
Mcculloh et al.Unobtrusive social network data from email
Sundararaj et al.Delay tolerant networking routing as a game theory problem–An Overview
LivingoodPredicting the success of potential information technology professionals by correlation to the Myers-Briggs Type Indicator
MbonyeUKZN Westville Students' Use of On-campus Wi-Fi and Their Perceptions of Quality of Service
ModianoLow Latency Wireless Networks for Mission Critical Communications
Čulo et al.Paradigms of virtual teams in the communication process
JainEngaging undergraduates in research that speaks their language
Greer et al.Students in differential equations and epidemiology model a campus outbreak of pH1N1
Girmay et al.CONSTRAINTS-DRIVEN PARADIGM SHIFT IN MONITORING CHILD IMMUNIZATION IN ETHIOPIA.

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SRI INTERNATIONAL, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PATTON, CHARLES;ROSCHELLE, JEREMY;PEA, ROY D.;AND OTHERS;REEL/FRAME:012755/0976;SIGNING DATES FROM 20011210 TO 20020117

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp