SE512672C2 - Procedure and system for transferring a cookie - Google Patents
Procedure and system for transferring a cookieInfo
- Publication number
- SE512672C2 SE512672C2 SE9802098A SE9802098A SE512672C2 SE 512672 C2 SE512672 C2 SE 512672C2 SE 9802098 A SE9802098 A SE 9802098A SE 9802098 A SE9802098 A SE 9802098A SE 512672 C2 SE512672 C2 SE 512672C2
- Authority
- SE
- Sweden
- Prior art keywords
- user terminal
- cookie
- server
- proxy server
- remote server
- Prior art date
Links
- 235000014510 cooky Nutrition 0.000 title claims abstract description 67
- 230000005540 biological transmission Effects 0.000 claims abstract description 6
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/561—Adding application-functional data or data for application control, e.g. adding metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/564—Enhancement of application control based on intercepted application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
- H04L67/5651—Reducing the amount or size of exchanged application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Library & Information Science (AREA)
- Software Systems (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
512 672 2 Typiskt använder servern cookien för att komma ihåg användaren och för att bibehålla illusionen av en session som sträcker sig över flera sidor. Eftersom en cookie inte är en del av standard- HTTP-specifikationen stödjer endast en del webläsare dessa, såsom "Microsoft Internet Explorer" 3,0 och högre och Netscape Navigator 2,0 och högre. Servern och/eller dess CGI-skript måste också ha kännedom om cookies för att kunna dra fördel av dem. 512 672 2 Typically, the server uses the cookie to remember the user and to maintain the illusion of a multi-page session. Because a cookie is not part of the standard HTTP specification, only some browsers support it, such as "Microsoft Internet Explorer" 3.0 and higher and Netscape Navigator 2.0 and higher. The server and / or its CGI scripts must also be aware of cookies in order to take advantage of them.
En cookie kan inte användas för att stjäla information om ett datorsystem, dvs den kan inte gå in i datorsystemet och återvända med information från det. De kan endast användas för att lagra information som inmatas vid något tillfälle. Således kan till exempel om någon fyller i ett formulär som anger en föredragen färg, servern omvandla denna information till en cookie och skicka denna till den webläsare som används. Nästa gång som webläsaren ansluter till webplatsen kommer weblåsaren att returnera cookien och därigenom möjliggöra för servern att ändra bakgrundsfärgen på sina sidor så att dessa passar användarens preferenser.A cookie cannot be used to steal information about a computer system, ie it cannot enter the computer system and return information from it. They can only be used to store information entered at any one time. Thus, for example, if someone fills in a form indicating a preferred color, the server may convert this information into a cookie and send it to the browser used. The next time the browser connects to the website, the browser will return the cookie and thereby enable the server to change the background color of its pages to suit the user's preferences.
Informationen som finns i dessa cookies kan emellertid snappas upp när den överförs på Internet. Detta ställer kanske inte till ett så stort problem när informationen överförs på ett fast nät eller när informationen är av okänslig natur, såsom färgpreferenser.However, the information contained in these cookies may be intercepted when transmitted over the Internet. This may not be such a big problem when the information is transmitted on a fixed network or when the information is of an insensitive nature, such as color preferences.
I några fall är informationen som finns i dessa cookies konfidentiell och ibland kan den också behöva överföras över ett trådlöst nät, till exempel när ändanvändaren använder en mobil terminal, såsom en laptop-dator eller någon annan dator som kommunicerar via modem över ett trådlöst nät. I sådana fall kan den konfidentiella informationen tämligen enkelt avlyssnas 5x 512 672 3 eftersom denna information, åtminstone delvis överförs över ett luftgrànssnitt där den kan uppsnappas av ett antal olika sorters utrustningar.In some cases, the information contained in these cookies is confidential and sometimes it may also need to be transmitted over a wireless network, for example when the end user uses a mobile terminal, such as a laptop computer or another computer that communicates via modem over a wireless network. In such cases, the confidential information can be fairly easily intercepted 5x 512 672 3 since this information is, at least in part, transmitted over an air interface where it can be intercepted by a number of different types of equipment.
Det finns dessutom ett problem som hör samman med överföringen av cookies från olika webplatser eftersom webplatsen inte kan bestämma om den använda terminal som cookies skall skickas till kan ta emot och spara cookies. Således är exempelvis i några handhàllna användarterminaler minnesutrymmet mycket begränsat och om många webplatser skickar cookies till en sådan användarterminal kommer minnet i en sådan terminal att ganska snabbt bli fullt med cookies och annan, mer viktig, information kan inte lagras.There is also a problem associated with the transfer of cookies from different websites because the website can not decide whether the used terminal to which cookies are to be sent can receive and save cookies. Thus, for example, in some handheld user terminals the memory space is very limited and if many websites send cookies to such a user terminal, the memory in such a terminal will quite quickly become full of cookies and other, more important, information can not be stored.
REDoGöRELsE FÖR UPPFINNINGEN Det är ett syfte med föreliggande uppfinning att övervinna problemen som hör samman med överföring av cookies till en användarterminal som har ett mycket begränsat minne och också att minska risken för att cookieinformation kan avlyssnas såsom beskrivits ovan.SUMMARY OF THE INVENTION It is an object of the present invention to overcome the problems associated with the transfer of cookies to a user terminal having a very limited memory and also to reduce the risk that cookie information may be intercepted as described above.
Detta syfte och andra uppnås genom att placera en proxyserver mellan en ändanvändare och en avlägsen server, vilken kan avläsa och lagra cookies som sänds från en avlägsen server till användarterminalen. w__”,_ ,_ _M s 1 Således kommer cookien att fångas upp och lagras i proxyservern när en på avstånd belägen HTTP-server eller liknande kontaktas av användarterminalen och den på avstånd liggande servern sänder É en cookie användarterminalen. Information avseende den på avstånd liggande servern, till exempel URL och en identitet som : 512 672 4 identifierar användarterminalen eller användaren lagras tillsammans med cookien. Nästa gång som användarterminalen eller användaren kontaktar samma HTTP-server matchar proxyservern den begärda URL:en och identifieringsinformationen och hittar på detta sätt den lagrade cookien. Cookien läggs sedan till meddelandet så att den på avstånd belägna servern kontaktas med en kopia av cookien såsom önskas.å På detta sätt behöver inte cookies lagras i användarterminalen vilken kan ha ett litet minne och därför inte är lämpad för att lagra cookies. Vidare överförs inte cookien över något luftgränssnitt då användarterminalen är en mobil terminal vilket därigenom signifikant minskar mängden data som överförs över luftgränssnittet.This purpose and others are achieved by placing a proxy server between an end user and a remote server, which can read and store cookies sent from a remote server to the user terminal. w __ ”, _, _ _M s 1 Thus, the cookie will be captured and stored in the proxy server when a remote HTTP server or similar is contacted by the user terminal and the remote server sends É a cookie to the user terminal. Information regarding the remote server, such as the URL and an identity that: 512 672 4 identifies the user terminal or the user is stored together with the cookie. The next time the user terminal or user contacts the same HTTP server, the proxy server matches the requested URL and identification information, thus finding the stored cookie. The cookie is then added to the message so that the remote server is contacted with a copy of the cookie as desired.å In this way, cookies do not need to be stored in the user terminal which may have a small memory and is therefore not suitable for storing cookies. Furthermore, the cookie is not transmitted over any air interface as the user terminal is a mobile terminal, which thereby significantly reduces the amount of data transmitted over the air interface.
KORTFATTAD BESKRIVNING AV RITNINGARNA Föreliggande uppfinning kommer nu att beskrivas närmare med hjälp av icke begränsande exempel och med hänvisning till de bilagda ritningarna, på vilka: - Fig. l är en allmän vy över ett transmissionssystem innefattande en mobil användarterminal.BRIEF DESCRIPTION OF THE DRAWINGS The present invention will now be described in more detail by way of non-limiting example and with reference to the accompanying drawings, in which: Fig. 1 is a general view of a transmission system comprising a mobile user terminal.
- Fig. 2 är ett flödesschema som visar stegen som utförs i en proxyserver vid mottagande av en URL-begäran från en användarterminal.Fig. 2 is a flow chart showing the steps performed in a proxy server upon receipt of a URL request from a user terminal.
BESKRIVNING AV FÖREDRAGNA UTFÖRINGSFORMR I fig. 1 visas en allmän vy över ett kommunikationsnät. Nätet innefattar en användarterminal 52 med en webläsare 54.DESCRIPTION OF PREFERRED EMBODIMENTS Fig. 1 shows a general view of a communication network. The network includes a user terminal 52 with a web browser 54.
Användarterminalen 52 innefattar också ett trådlöst modem 58 med hjälp av vilket användarterminalen 52 kan ansluta till en radiobasstation 60. Radiobasstationen 60 är ansluten till en avlägsen proxyserver 66 vilken företrädesvis är placerad på ett 512 672 centralt ställe i transmissionssystemet, exempelvis Home Location Register (HLR) om systemet är ett GSM-system.The user terminal 52 also includes a wireless modem 58 by means of which the user terminal 52 can connect to a radio base station 60. The radio base station 60 is connected to a remote proxy server 66 which is preferably located at a central location in the transmission system, such as the Home Location Register (CPR). if the system is a GSM system.
Proxyservern 66 innefattar eller är ansluten till ett minne 72 för att lagra information avseende cookies som överförs via proxyservern 66. Proxyservern 66 är ansluten till World Wide Web (WWW) eller till Internet 68 till vilket ett antal andra servrar 70 är anslutna.The proxy server 66 includes or is connected to a memory 72 for storing information regarding cookies transmitted via the proxy server 66. The proxy server 66 is connected to the World Wide Web (WWW) or to the Internet 68 to which a number of other servers 70 are connected.
Proxyservern 66 kan också vara placerad på något annat ställe i systemet eller distribueras över systemet. Exempelvis kan om transmissionssystemet är ett GSM-system cookie-informationen lagras vid “visiting Location Register" (VLR)eller t.o.m vara placerad pà samma ställe som radiobasstationen.The proxy server 66 may also be located elsewhere in the system or distributed throughout the system. For example, if the transmission system is a GSM system, the cookie information may be stored at the "Visiting Location Register" (VLR) or even be located in the same place as the radio base station.
I en föredragen utföringsform för ett GSM-system är proxyservern 66 placerad tillsammans med HLR:en och VLR:en och eventuellt är också några av radiobasstationerna försedda med cache-servrar för att cacha cookieinformation. Liknande arrangemang kan naturligtvis också göras för andra cellulära radiosystem.In a preferred embodiment of a GSM system, the proxy server 66 is located together with the CPR and the VLR and possibly some of the radio base stations are also provided with cache servers for caching cookie information. Similar arrangements can of course also be made for other cellular radio systems.
När användarterminalen 52 kontaktar en webplats för första gången i en sådan på avstånd belägen server 70 kan en cookie överföras tillbaka mot användarterminalen 52. Såsom beskrivits ovan är en cookie en liten bit information, ofta inte mer än en kort sessionsidentifikation, som HTTP-servern sänder till webläsaren och som kan bestå av upp till 4 kbyte information.When the user terminal 52 contacts a website for the first time in such a remote server 70, a cookie can be transferred back to the user terminal 52. As described above, a cookie is a small piece of information, often no more than a short session identification, which the HTTP server sends to the browser and which can consist of up to 4 kbytes of information.
Cookien fångas upp av proxyservern 66, vilken lagrar cookien tillsammans med information avseende URL:en som har utfärdat cookien och en identifiering som identifierar användarterminalen 52. Cookien behöver då inte överföras över det trådlösa nätet vilket vanligen har en mycket liten bandbredd, typiskt 4,8 512 672 6 kbit/s, vilket kommer att minska överföringstiden. Dessutom behöver inte cookien lagras i användarterminalen 52, vilken kan vara en handhållen dator såsom MC-16 tillverkad av företaget Ericsson, eller en "smart-phone", vilken kan ha ett mycket begränsat minne.The cookie is captured by the proxy server 66, which stores the cookie together with information regarding the URL that issued the cookie and an identification identifying the user terminal 52. The cookie then does not need to be transmitted over the wireless network which usually has a very small bandwidth, typically 4.8 512 672 6 kbit / s, which will reduce the transmission time. In addition, the cookie does not need to be stored in the user terminal 52, which may be a handheld computer such as the MC-16 manufactured by the company Ericsson, or a "smart-phone", which may have a very limited memory.
Nästa gång som användarterminalen 52 ansluter till samma webplats som har utfärdat cookien kommer proxyservern 66 att identifiera användarterminalen 52 och kontrollera vilken webplats eller URL (Uniform Resource Locator) som användaren kontaktar. Om webplatsen har kontaktats tidigare kommer proxyservern att kunna matcha identiteten med URL:en och därigenom hitta cookien som är associerad med denna särskilda URL.The next time the user terminal 52 connects to the same website that issued the cookie, the proxy server 66 will identify the user terminal 52 and check which website or URL (Uniform Resource Locator) the user is contacting. If the website has been contacted before, the proxy server will be able to match the identity with the URL and thereby find the cookie associated with this particular URL.
Proxyservern 66 lägger sedan till cookien till begäran från användarterminalen 52 till servern 70. Den på avstånd belägna servern 70 kommer då att mottaga en anslutningsbegäran tillsammans med en cookie som om cookien hade returnerats från själva webläsaren. På detta sätt minskas datatrafiken över den trådlösa, låghastighetsdelen av accessvägen och minnesbehovet i användarterminalen 52 kan minskas.The proxy server 66 then adds the cookie to the request from the user terminal 52 to the server 70. The remote server 70 will then receive a connection request along with a cookie as if the cookie had been returned from the browser itself. In this way, the data traffic over the wireless is reduced, the low-speed part of the access path and the memory requirement in the user terminal 52 can be reduced.
I fig. 2 visas ett flödesschema över de operationer som utförs i proxyservrarna då en anslutningsbegäran mottages från användarterminalen mot en på avstånd liggande server 70 ansluten till Internet. Således mottages först i ett block 201 begäran från användarterminalen 52. Därefter läses i ett block 203 den URL som användarterminalen vill ansluta till från begäran. Sedan bestäms i ett block 205 identiteten på terminalen eller användaren. 512 672 7 Resultatet av operationerna som utförs i blocken 203 och 205 används sedan i ett block 207 för att bestämma om URL:en tidigare har begärts eller besökts av denna särskilda användarterminal. Således kontrolleras i blocket 207 om en cookie finns lagrad i minnet 72 vilken är associerad med denna särskilda URL och denna särskilda identitet.Fig. 2 shows a flow chart of the operations performed in the proxy servers when a connection request is received from the user terminal to a remote server 70 connected to the Internet. Thus, in a block 201, a request is first received from the user terminal 52. Then, in a block 203, the URL to which the user terminal wants to connect is read from the request. Then, in a block 205, the identity of the terminal or user is determined. The result of the operations performed in blocks 203 and 205 is then used in a block 207 to determine if the URL has previously been requested or visited by this particular user terminal. Thus, in block 207, it is checked if a cookie is stored in the memory 72 which is associated with this particular URL and this particular identity.
Om dessa matchar varandra, dvs servern tidigare har lagrat en cookie för denna särskilda användare som svarar mot denna särskilda URL, läggs cookien till begäran i ett block 209 och begäran vidarebefordras sedan mot den på avstånd liggande servern under vilken den begärda URL:en finns. Om, å andra sidan, någon matchning inte kan utföras i blocket 207, dvs att denna särskilda URL ansluts till för första gången av denna särskilda användare, så vidarebefordras begäran direkt mot servern 70 i blocket 211.If these match each other, ie the server has previously stored a cookie for this particular user corresponding to this particular URL, the cookie is added to the request in a block 209 and the request is then forwarded to the remote server under which the requested URL is located. If, on the other hand, no matching can be performed in block 207, i.e. that this particular URL is connected to for the first time by this particular user, then the request is forwarded directly to the server 70 in block 211.
Således behöver cookien inte lagras i användarterminalen genom att lagra cookie-information i en proxyserver, vilka användarterminaler i många fall har ett litet minne och därför inte är lämpade att lagra cookies. Vidare överförs inte cookien över ett luftgränssnitt då användarterminalen är mobil terminal, vilket signifikant minskar mängden data som överförs.Thus, the cookie does not need to be stored in the user terminal by storing cookie information in a proxy server, which user terminals in many cases have a small memory and are therefore not suitable for storing cookies. Furthermore, the cookie is not transmitted over an air interface as the user terminal is a mobile terminal, which significantly reduces the amount of data transmitted.
Claims (12)
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9802098A SE512672C2 (en) | 1998-06-12 | 1998-06-12 | Procedure and system for transferring a cookie |
MYPI99002162A MY124068A (en) | 1998-06-12 | 1999-06-01 | A method and a system for transmitting a cookie |
JP2000553901A JP2002517861A (en) | 1998-06-12 | 1999-06-08 | Method and system for sending cookies |
EEP200000711A EE03983B1 (en) | 1998-06-12 | 1999-06-08 | A communication system between a user terminal and a remote server and a method for transmitting, capturing, and storing "cookies" assigned to a user terminal |
EP99931671A EP1086434A1 (en) | 1998-06-12 | 1999-06-08 | A method and a system for transmitting a cookie |
PCT/SE1999/000992 WO1999064967A1 (en) | 1998-06-12 | 1999-06-08 | A method and a system for transmitting a cookie |
CNB998073113A CN1135489C (en) | 1998-06-12 | 1999-06-08 | Method and system for transmitting cookie information |
KR1020007014121A KR20010071463A (en) | 1998-06-12 | 1999-06-08 | A method and a system for transmitting a cookie |
BR9911164-0A BR9911164A (en) | 1998-06-12 | 1999-06-08 | Transmission system comprising a user terminal, and the process of transmitting a cookie on a system |
AU48114/99A AU758578B2 (en) | 1998-06-12 | 1999-06-08 | A method and a system for transmitting a cookie |
HK02100521.6A HK1039192B (en) | 1998-06-12 | 2002-01-23 | A method and a system for transmitting a cookie |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9802098A SE512672C2 (en) | 1998-06-12 | 1998-06-12 | Procedure and system for transferring a cookie |
Publications (3)
Publication Number | Publication Date |
---|---|
SE9802098D0 SE9802098D0 (en) | 1998-06-12 |
SE9802098L SE9802098L (en) | 1999-12-13 |
SE512672C2 true SE512672C2 (en) | 2000-04-17 |
Family
ID=20411681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SE9802098A SE512672C2 (en) | 1998-06-12 | 1998-06-12 | Procedure and system for transferring a cookie |
Country Status (11)
Country | Link |
---|---|
EP (1) | EP1086434A1 (en) |
JP (1) | JP2002517861A (en) |
KR (1) | KR20010071463A (en) |
CN (1) | CN1135489C (en) |
AU (1) | AU758578B2 (en) |
BR (1) | BR9911164A (en) |
EE (1) | EE03983B1 (en) |
HK (1) | HK1039192B (en) |
MY (1) | MY124068A (en) |
SE (1) | SE512672C2 (en) |
WO (1) | WO1999064967A1 (en) |
Families Citing this family (116)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6751654B2 (en) * | 1999-03-31 | 2004-06-15 | International Business Machines Corporation | Simulating web cookies for non-cookie capable browsers |
US7146354B1 (en) | 1999-06-18 | 2006-12-05 | F5 Networks, Inc. | Method and system for network load balancing with a compound data structure |
US6405219B2 (en) | 1999-06-22 | 2002-06-11 | F5 Networks, Inc. | Method and system for automatically updating the version of a set of files stored on content servers |
US6374300B2 (en) | 1999-07-15 | 2002-04-16 | F5 Networks, Inc. | Method and system for storing load balancing information with an HTTP cookie |
US6970933B1 (en) | 1999-07-15 | 2005-11-29 | F5 Networks, Inc. | Enabling application level persistence between a server and another resource over a network |
US7441045B2 (en) | 1999-12-13 | 2008-10-21 | F5 Networks, Inc. | Method and system for balancing load distribution on a wide area network |
AU3741200A (en) * | 1999-12-20 | 2001-07-03 | Netzero, Inc. | Method and apparatus employing a proxy server for modifying an html document supplied by a web server to a web client |
WO2001050299A2 (en) * | 1999-12-29 | 2001-07-12 | Pango Systems B.V. | System and method for incremental disclosure of personal information to content providers |
US7047301B2 (en) | 2000-01-31 | 2006-05-16 | F5 Networks, Inc. | Method and system for enabling persistent access to virtual servers by an LDNS server |
US8380854B2 (en) | 2000-03-21 | 2013-02-19 | F5 Networks, Inc. | Simplified method for processing multiple connections from the same client |
US7343413B2 (en) | 2000-03-21 | 2008-03-11 | F5 Networks, Inc. | Method and system for optimizing a network by independently scaling control segments and data flow |
NO315179B1 (en) * | 2000-03-22 | 2003-07-21 | Elink As | Procedure for data communication |
EP1211860A1 (en) * | 2000-12-01 | 2002-06-05 | BRITISH TELECOMMUNICATIONS public limited company | Provision of secure access for telecommunications system |
AU2001244362A1 (en) * | 2000-04-10 | 2001-10-23 | British Telecommunications Public Limited Company | Provision of secure access for telecommunications system |
US8239445B1 (en) * | 2000-04-25 | 2012-08-07 | International Business Machines Corporation | URL-based sticky routing tokens using a server-side cookie jar |
US7174454B2 (en) | 2002-11-19 | 2007-02-06 | America Online, Inc. | System and method for establishing historical usage-based hardware trust |
CN1313897C (en) | 2000-05-19 | 2007-05-02 | 网景通信公司 | Adaptive multi-tier authentication system |
CN1270259C (en) | 2000-05-29 | 2006-08-16 | 诺基亚有限公司 | Synchronization method |
US6961330B1 (en) * | 2000-06-23 | 2005-11-01 | Comverse Ltd. | Web development and deployment using SMS and USSD |
SE517116C2 (en) | 2000-08-11 | 2002-04-16 | Ericsson Telefon Ab L M | Method and device for secure communication services |
US7080147B2 (en) | 2000-09-04 | 2006-07-18 | International Business Machines Corporation | Computer network system, computer system, method for communication between computer systems, method for measuring computer system performance, and storage medium |
JP3501361B2 (en) * | 2000-09-04 | 2004-03-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Computer network system, computer system, communication method between computer systems, method for measuring computer system performance, and recording medium |
KR20020020407A (en) * | 2000-09-08 | 2002-03-15 | 정규석 | A Cookie Application Method in Wireless Terminator |
CN1539231B (en) * | 2001-05-17 | 2011-07-13 | 艾斯奥托公司 | Procedure and silicon chip on-board system for management of 'cookie' type data files |
US8392527B2 (en) | 2001-06-04 | 2013-03-05 | Hewlett-Packard Development Company L.P. | System and method for requesting computer resources |
KR20030001018A (en) * | 2001-06-28 | 2003-01-06 | 박일남 | System and method for managing log on a web site |
US7062547B2 (en) | 2001-09-24 | 2006-06-13 | International Business Machines Corporation | Method and system for providing a central repository for client-specific accessibility |
US6970918B2 (en) * | 2001-09-24 | 2005-11-29 | International Business Machines Corporation | System and method for transcoding support of web content over secure connections |
US7093291B2 (en) * | 2002-01-28 | 2006-08-15 | Bailey Ronn H | Method and system for detecting and preventing an intrusion in multiple platform computing environments |
US20030177196A1 (en) * | 2002-03-14 | 2003-09-18 | Aditya Bhasin | Method and system for providing proxy based caching services to a client device |
FR2841416B1 (en) * | 2002-06-20 | 2005-01-28 | Cegetel Groupe | METHOD FOR MANAGING CONTEXT INFORMATION BY INTERMEDIATE SERVER |
EP1379044A1 (en) * | 2002-06-22 | 2004-01-07 | TELEFONAKTIEBOLAGET LM ERICSSON (publ) | Method for providing information to a web server |
US7430755B1 (en) | 2002-09-03 | 2008-09-30 | Fs Networks, Inc. | Method and system for providing persistence in a secure network access |
FR2844948B1 (en) * | 2002-09-23 | 2005-01-07 | Eastman Kodak Co | METHOD FOR ARCHIVING MULTIMEDIA MESSAGES |
US8078759B2 (en) | 2002-11-06 | 2011-12-13 | Tellique Kommunikationstechnik Gmbh | Method for prefetching of structured data between a client device and a server device |
US7164685B2 (en) * | 2003-04-11 | 2007-01-16 | Nokia Corporation | Cookies or liberty enabler for processing all connections between user/agent and origin server in a wireless network for enabling cookies or liberty support services for users/agents |
US7921152B2 (en) | 2003-07-17 | 2011-04-05 | International Business Machines Corporation | Method and system for providing user control over receipt of cookies from e-commerce applications |
GB2415801A (en) * | 2004-07-02 | 2006-01-04 | Hewlett Packard Development Co | Storage of data packages in association with electronic document browsing |
US8943304B2 (en) | 2006-08-03 | 2015-01-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9621666B2 (en) | 2005-05-26 | 2017-04-11 | Citrix Systems, Inc. | Systems and methods for enhanced delta compression |
US9692725B2 (en) | 2005-05-26 | 2017-06-27 | Citrix Systems, Inc. | Systems and methods for using an HTTP-aware client agent |
US9407608B2 (en) | 2005-05-26 | 2016-08-02 | Citrix Systems, Inc. | Systems and methods for enhanced client side policy |
JP2007219608A (en) | 2006-02-14 | 2007-08-30 | Fujitsu Ltd | Load balancing processing program and load balancing device |
US8561155B2 (en) | 2006-08-03 | 2013-10-15 | Citrix Systems, Inc. | Systems and methods for using a client agent to manage HTTP authentication cookies |
EP2040413B1 (en) * | 2007-09-21 | 2013-06-19 | Nokia Siemens Networks Oy | Subscription and advice of charge control |
KR100960152B1 (en) * | 2007-10-24 | 2010-05-28 | 플러스기술주식회사 | Method for permitting and blocking use of internet by detecting plural terminals on network |
EP2241081B1 (en) | 2008-01-26 | 2018-05-02 | Citrix Systems, Inc. | Systems and methods for fine grain policy driven cookie proxying |
EP2141891A3 (en) * | 2008-06-30 | 2010-07-21 | Hans E. Maier-Dech | Single point of entry server solution for world-wide-web annotation services with reduced latency |
US7975025B1 (en) | 2008-07-08 | 2011-07-05 | F5 Networks, Inc. | Smart prefetching of data over a network |
US7552210B1 (en) | 2008-08-12 | 2009-06-23 | International Business Machines Corporation | Method of and system for handling cookies |
US10157280B2 (en) | 2009-09-23 | 2018-12-18 | F5 Networks, Inc. | System and method for identifying security breach attempts of a website |
US8868961B1 (en) | 2009-11-06 | 2014-10-21 | F5 Networks, Inc. | Methods for acquiring hyper transport timing and devices thereof |
US10721269B1 (en) | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
US9313047B2 (en) | 2009-11-06 | 2016-04-12 | F5 Networks, Inc. | Handling high throughput and low latency network data packets in a traffic management device |
US9141625B1 (en) | 2010-06-22 | 2015-09-22 | F5 Networks, Inc. | Methods for preserving flow state during virtual machine migration and devices thereof |
US10015286B1 (en) | 2010-06-23 | 2018-07-03 | F5 Networks, Inc. | System and method for proxying HTTP single sign on across network domains |
US8908545B1 (en) | 2010-07-08 | 2014-12-09 | F5 Networks, Inc. | System and method for handling TCP performance in network access with driver initiated application tunnel |
US8347100B1 (en) | 2010-07-14 | 2013-01-01 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US9083760B1 (en) | 2010-08-09 | 2015-07-14 | F5 Networks, Inc. | Dynamic cloning and reservation of detached idle connections |
US8886981B1 (en) | 2010-09-15 | 2014-11-11 | F5 Networks, Inc. | Systems and methods for idle driven scheduling |
WO2012058486A2 (en) | 2010-10-29 | 2012-05-03 | F5 Networks, Inc. | Automated policy builder |
US9554276B2 (en) | 2010-10-29 | 2017-01-24 | F5 Networks, Inc. | System and method for on the fly protocol conversion in obtaining policy enforcement information |
WO2012092261A2 (en) | 2010-12-29 | 2012-07-05 | Citrix Systems, Inc. | Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination |
US10135831B2 (en) | 2011-01-28 | 2018-11-20 | F5 Networks, Inc. | System and method for combining an access control system with a traffic management system |
CN102215250B (en) * | 2011-03-30 | 2013-06-26 | 广州市动景计算机科技有限公司 | Automatic form filling method for mobile communication equipment terminal, server and client |
US9246819B1 (en) | 2011-06-20 | 2016-01-26 | F5 Networks, Inc. | System and method for performing message-based load balancing |
US9270766B2 (en) | 2011-12-30 | 2016-02-23 | F5 Networks, Inc. | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof |
US10230566B1 (en) | 2012-02-17 | 2019-03-12 | F5 Networks, Inc. | Methods for dynamically constructing a service principal name and devices thereof |
US9172753B1 (en) | 2012-02-20 | 2015-10-27 | F5 Networks, Inc. | Methods for optimizing HTTP header based authentication and devices thereof |
US9231879B1 (en) | 2012-02-20 | 2016-01-05 | F5 Networks, Inc. | Methods for policy-based network traffic queue management and devices thereof |
EP2853074B1 (en) | 2012-04-27 | 2021-03-24 | F5 Networks, Inc | Methods for optimizing service of content requests and devices thereof |
US9525632B1 (en) | 2012-05-01 | 2016-12-20 | F5 Networks, Inc. | Minimize recycle SYN issues for split TCP hot flows to improve system reliability and performance |
US9338095B2 (en) | 2012-05-01 | 2016-05-10 | F5 Networks, Inc. | Data flow segment optimized for hot flows |
US9154423B1 (en) | 2012-05-01 | 2015-10-06 | F5 Networks, Inc. | Minimize SYN-flood issues with flow cache while maintaining performance |
US9203771B1 (en) | 2012-07-23 | 2015-12-01 | F5 Networks, Inc. | Hot service flow hardware offloads based on service priority and resource usage |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
US9338143B2 (en) | 2013-03-15 | 2016-05-10 | Shape Security, Inc. | Stateless web content anti-automation |
US10187317B1 (en) | 2013-11-15 | 2019-01-22 | F5 Networks, Inc. | Methods for traffic rate control and devices thereof |
US9270647B2 (en) | 2013-12-06 | 2016-02-23 | Shape Security, Inc. | Client/server security by an intermediary rendering modified in-memory objects |
US8954583B1 (en) | 2014-01-20 | 2015-02-10 | Shape Security, Inc. | Intercepting and supervising calls to transformed operations and objects |
US8893294B1 (en) | 2014-01-21 | 2014-11-18 | Shape Security, Inc. | Flexible caching |
US9225729B1 (en) | 2014-01-21 | 2015-12-29 | Shape Security, Inc. | Blind hash compression |
US9027142B1 (en) | 2014-01-21 | 2015-05-05 | Shape Security, Inc. | Dynamic field re-rendering |
US9544329B2 (en) | 2014-03-18 | 2017-01-10 | Shape Security, Inc. | Client/server security by an intermediary executing instructions received from a server and rendering client application instructions |
US9411958B2 (en) | 2014-05-23 | 2016-08-09 | Shape Security, Inc. | Polymorphic treatment of data entered at clients |
US9858440B1 (en) | 2014-05-23 | 2018-01-02 | Shape Security, Inc. | Encoding of sensitive data |
US9210171B1 (en) | 2014-05-29 | 2015-12-08 | Shape Security, Inc. | Selectively protecting valid links to pages of a web site |
US9083739B1 (en) | 2014-05-29 | 2015-07-14 | Shape Security, Inc. | Client/server authentication using dynamic credentials |
US10050935B2 (en) | 2014-07-09 | 2018-08-14 | Shape Security, Inc. | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction |
US9258274B2 (en) | 2014-07-09 | 2016-02-09 | Shape Security, Inc. | Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
US9003511B1 (en) | 2014-07-22 | 2015-04-07 | Shape Security, Inc. | Polymorphic security policy action |
US10122630B1 (en) | 2014-08-15 | 2018-11-06 | F5 Networks, Inc. | Methods for network traffic presteering and devices thereof |
US9729506B2 (en) | 2014-08-22 | 2017-08-08 | Shape Security, Inc. | Application programming interface wall |
US9438625B1 (en) | 2014-09-09 | 2016-09-06 | Shape Security, Inc. | Mitigating scripted attacks using dynamic polymorphism |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US10516743B1 (en) | 2015-03-24 | 2019-12-24 | Quest Software Inc. | Systems and methods for facilitating portable user sessions |
US9608975B2 (en) | 2015-03-30 | 2017-03-28 | Shape Security, Inc. | Challenge-dynamic credential pairs for client/server request validation |
US10834065B1 (en) | 2015-03-31 | 2020-11-10 | F5 Networks, Inc. | Methods for SSL protected NTLM re-authentication and devices thereof |
US11350254B1 (en) | 2015-05-05 | 2022-05-31 | F5, Inc. | Methods for enforcing compliance policies and devices thereof |
US10505818B1 (en) | 2015-05-05 | 2019-12-10 | F5 Networks. Inc. | Methods for analyzing and load balancing based on server health and devices thereof |
US11757946B1 (en) | 2015-12-22 | 2023-09-12 | F5, Inc. | Methods for analyzing network traffic and enforcing network policies and devices thereof |
US10404698B1 (en) | 2016-01-15 | 2019-09-03 | F5 Networks, Inc. | Methods for adaptive organization of web application access points in webtops and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US10791088B1 (en) | 2016-06-17 | 2020-09-29 | F5 Networks, Inc. | Methods for disaggregating subscribers via DHCP address translation and devices thereof |
US11063758B1 (en) | 2016-11-01 | 2021-07-13 | F5 Networks, Inc. | Methods for facilitating cipher selection and devices thereof |
US10505792B1 (en) | 2016-11-02 | 2019-12-10 | F5 Networks, Inc. | Methods for facilitating network traffic analytics and devices thereof |
US11496438B1 (en) | 2017-02-07 | 2022-11-08 | F5, Inc. | Methods for improved network security using asymmetric traffic delivery and devices thereof |
US10791119B1 (en) | 2017-03-14 | 2020-09-29 | F5 Networks, Inc. | Methods for temporal password injection and devices thereof |
US10812266B1 (en) | 2017-03-17 | 2020-10-20 | F5 Networks, Inc. | Methods for managing security tokens based on security violations and devices thereof |
US10931662B1 (en) | 2017-04-10 | 2021-02-23 | F5 Networks, Inc. | Methods for ephemeral authentication screening and devices thereof |
US11122042B1 (en) | 2017-05-12 | 2021-09-14 | F5 Networks, Inc. | Methods for dynamically managing user access control and devices thereof |
US11122083B1 (en) | 2017-09-08 | 2021-09-14 | F5 Networks, Inc. | Methods for managing network connections based on DNS data and network policies and devices thereof |
US11658995B1 (en) | 2018-03-20 | 2023-05-23 | F5, Inc. | Methods for dynamically mitigating network attacks and devices thereof |
US11044200B1 (en) | 2018-07-06 | 2021-06-22 | F5 Networks, Inc. | Methods for service stitching using a packet header and devices thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
-
1998
- 1998-06-12 SE SE9802098A patent/SE512672C2/en unknown
-
1999
- 1999-06-01 MY MYPI99002162A patent/MY124068A/en unknown
- 1999-06-08 BR BR9911164-0A patent/BR9911164A/en not_active IP Right Cessation
- 1999-06-08 EP EP99931671A patent/EP1086434A1/en not_active Withdrawn
- 1999-06-08 EE EEP200000711A patent/EE03983B1/en not_active IP Right Cessation
- 1999-06-08 KR KR1020007014121A patent/KR20010071463A/en not_active Application Discontinuation
- 1999-06-08 JP JP2000553901A patent/JP2002517861A/en active Pending
- 1999-06-08 CN CNB998073113A patent/CN1135489C/en not_active Expired - Fee Related
- 1999-06-08 AU AU48114/99A patent/AU758578B2/en not_active Ceased
- 1999-06-08 WO PCT/SE1999/000992 patent/WO1999064967A1/en not_active Application Discontinuation
-
2002
- 2002-01-23 HK HK02100521.6A patent/HK1039192B/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
WO1999064967A1 (en) | 1999-12-16 |
EE03983B1 (en) | 2003-02-17 |
JP2002517861A (en) | 2002-06-18 |
AU4811499A (en) | 1999-12-30 |
EP1086434A1 (en) | 2001-03-28 |
AU758578B2 (en) | 2003-03-27 |
SE9802098D0 (en) | 1998-06-12 |
HK1039192A1 (en) | 2002-04-12 |
CN1305613A (en) | 2001-07-25 |
CN1135489C (en) | 2004-01-21 |
KR20010071463A (en) | 2001-07-28 |
MY124068A (en) | 2006-06-30 |
BR9911164A (en) | 2001-03-27 |
EE200000711A (en) | 2002-04-15 |
SE9802098L (en) | 1999-12-13 |
HK1039192B (en) | 2004-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SE512672C2 (en) | Procedure and system for transferring a cookie | |
US7080158B1 (en) | Network caching using resource redirection | |
FI105311B (en) | Procedure and arrangements for finding information | |
CN101510874B (en) | Setup system and method for network connection, network communication tool and method | |
AU741463B2 (en) | Method and apparatus in a wireless communication system for splitting a browser functionality between a wireless client and an infrastructure portion | |
KR101154799B1 (en) | Dns wildcard beaconing to determine client location and resolver load for global traffic load balancing | |
JP4144882B2 (en) | Information processing apparatus, information system, proxy processing method, program, and recording medium | |
CN101164321B (en) | Process for managing resource address requests and associated gateway device | |
US6868453B1 (en) | Internet home page data acquisition method | |
EP0828367A2 (en) | A proxy server apparatus, a proxy server system, and a server apparatus | |
US20070255848A1 (en) | Embedded DNS | |
BR0011409A (en) | Method and system for retrieving the contents of a server in a cellular communication system | |
CN101662464A (en) | System for realizing HTTP request service and method thereof | |
WO2017080459A1 (en) | Method, device and system for caching and providing service contents and storage medium | |
JP2016506677A (en) | Method and apparatus for preventing unauthorized service access | |
US8719216B2 (en) | Caching of web form post-query requests | |
EP3751824A1 (en) | Using dns to communicate mp-tcp capability of server devices | |
US10045175B2 (en) | Handling device generated data | |
US10033830B2 (en) | Requesting web pages and content rating information | |
EP3389240B1 (en) | Method and system for processing cache cluster service | |
CN106899651B (en) | Communication processing method, system and network communication system | |
US7769766B1 (en) | Method and an apparatus to store content rating information | |
KR20020084374A (en) | Discrimination And Display Method Of Abnormal URL In Wireless Internet | |
CN114731338B (en) | System and method for controlling load of domain name system server | |
JP2001154902A (en) | System for acquiring web object |