US20060036951A1 - Method of switching internet personas based on URL - Google Patents
Method of switching internet personas based on URL Download PDFInfo
- Publication number
- US20060036951A1 US20060036951A1 US10/916,972 US91697204A US2006036951A1 US 20060036951 A1 US20060036951 A1 US 20060036951A1 US 91697204 A US91697204 A US 91697204A US 2006036951 A1 US2006036951 A1 US 2006036951A1
- Authority
- US
- United States
- Prior art keywords
- user
- specific
- remote site
- persona
- attributes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Definitions
- the present invention generally relates to computer systems, and more particularly to a method of accessing remote sites on a network such as the Internet, where the remote sites utilize user information such as user names, passwords, etc., for access.
- Network 2 has several client workstations 3 a , 3 b , 3 c , and 3 d which are interconnected via a communications infrastructure 4 .
- Network 2 additionally has servers 5 a , 5 b .
- Each server is essentially a stand-alone computer system (having one or more processors, memory devices, and communications devices), but has been adapted to primarily provide information to individual users at client workstations 3 a - 3 d .
- the information provided by a server can be in the form of programs which run locally on a given client, or in the form of data such as files used by other programs.
- Communications infrastructure 4 may include transmission media such as copper wires or optical fibers, along with interconnected routers, hubs and switches.
- Clients 3 a - 3 d can also be stand-alone computer systems (like personal computers, or PCs), or “dumber” systems adapted for limited use with network 2 (like network computers, or NCs).
- PC generally refers to any multi-purpose computer adapted for use by one or more individuals, regardless of the manufacturer, hardware platform, operating system, etc.
- Network 2 thus offers client-server communications as well as peer-to-peer communications between different clients in real-time or by delayed file delivery.
- Other nodes can be included in network 2 , such as a storage device 6 .
- the network can be local in nature, or can be further connected to other network systems (not shown).
- the construction of network 2 is also generally applicable to the Internet.
- Conventional protocols and services have been established for the Internet which allow the transfer of various types of information, including electronic mail, simple file transfers via FTP, remote computing via TELNET, “gopher” searching, Usenet newsgroups, and hypertext file delivery and multimedia streaming via the World Wide Web (WWW).
- a given server can be dedicated to performing one of these operations, or run multiple services.
- mail servers sending and receiving
- the Internet is becoming increasingly popular as the primary medium for both personal and commercial transactions.
- URLs Internet services are typically accessed by specifying a unique address, or universal resource locator (URL).
- the URL has two basic components, the protocol to be used, and the object pathname.
- http hypertext transfer protocol
- www.uspto.gov home page for the U.S. Patent & Trademark Office
- the server name is associated with a unique numeric value (a TCP/IP address/domain).
- email email (“mailto:” protocol)
- the address is composed of two parts, a user name and a server name separated by the commercial “at” symbol, e.g., “johndoe@mailserver.com”.
- FIG. 1 Various types of electronic documents can be transmitted on a network like the Internet.
- a document creator at client workstation 3 a uses an editor (e.g., an email composer) to draft a document such as an email 7 .
- This email is then transmitted across the communications infrastructure 4 to the document recipient at client workstation 3 b who views it with a document reader (e.g., an email viewer).
- FIG. 1 also depicts the delivery of a web page 8 from a remote web site hosted at server 5 a to client workstation 3 d .
- Web page 8 may be created using, e.g., a hypertext markup language (HTML) editor, and typically includes hypertext links for other web pages.
- HTML hypertext markup language
- a hypertext link is an image that is viewable on the workstation's display which can be selected by the user (e.g., using a pointing device or “mouse”) and which then automatically instructs the client workstation to request another page associated with that particular hypertext link (i.e., issue another URL).
- a hypertext link may appear as a picture, or as a word or sentence, possibly underlined or otherwise accentuated to indicate that it is an embedded link and not just normal, informative text.
- a WWW page may have text, graphic (still) images, and even multimedia objects such as sound recordings or moving video clips.
- a page may be larger than the physical size of the monitor screen, and techniques such as scroll bars are used by the viewing software (the web browser) to view different portions of the page.
- Java applets can greatly enhance the capabilities of a web page, they may also introduce security and other issues.
- many web browsers are configured to allow the user to globally enable or disable the use of Java routines. This capability can, however, create problems. A user may want to explore some new web sites and, in doing so, disable Java for security reasons, but when this user visits old, reliable sites that require Java, the web pages will not be properly presented unless the user manually edits the configuration to re-enable Java. If a user repeatedly visits several web sites where Java is to be disabled, but additionally repeatedly visits web sites requiring Java, it can become very cumbersome for the user to constantly change the Java preference back and forth.
- a cookie is an identification number or character sequence that resides locally on the client workstation but is used by the remote web site in creating a web page.
- the remote web site can examine the cookies to discern the user and employ previously selected options or preferences in presenting the web page. Cookies can, however, also raise security issues and may be undesirable in certain cases.
- conventional web browsers can allow the user to globally enable or disable cookies, but the user must repeatedly change this setting for different web sites where cookies are acceptable or unacceptable.
- Web browsers also allow the user to create an identity, e.g., with a username or email address, that is utilized by a remote site in accessing a web page. If a user wants to have different usernames or email addresses for different web sites, the identity information must be manually re-entered before visiting each site, which again is extremely inconvenient. For example, a user might prefer a personal email address for use with certain web sites, while preferring a work email address for other web sites, and preferring a fictitious email address for web sites that might abuse (spam) the user's email account.
- an identity e.g., with a username or email address
- the identity information must be manually re-entered before visiting each site, which again is extremely inconvenient. For example, a user might prefer a personal email address for use with certain web sites, while preferring a work email address for other web sites, and preferring a fictitious email address for web sites that might abuse (spam) the user's email account.
- a method of communicating with a remote site on a network generally comprising the steps of establishing a plurality of user personas respectively associated with a plurality of remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site.
- the specific remote site can be associated with the specific user persona by a universal resource locator (URL) of the remote site, e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
- URL universal resource locator
- a default persona can be used for any remote site having no specifically associated user persona.
- the attributes in the user personas can provide various functions such as indicating whether Java programming is enabled for the specific remote site or whether “cookies” are enabled for the specific remote site.
- the attributes can also define a username for the specific remote site.
- a user persona can be established when a bookmark is created for the specific remote site.
- FIG. 1 is a pictorial representation of electronic document delivery across a conventional communications network having various nodes such as client workstations, servers, and storage devices;
- FIG. 2 is a block diagram of a computer system programmed to access remote network sites using associated persona preferences in accordance with one implementation of the present invention
- FIG. 3 is a pictorial representation of different persona preferences which have been selectively associated with different remote network sites (URLs) in accordance with one implementation of the present invention
- FIG. 4 is an elevational view of a web browser application as displayed on a computer screen, depicting a dialog box for viewing, entering or editing different persona preferences selectively associated with different remote network sites in accordance with one implementation of the present invention.
- FIG. 5 is a chart illustrating the logical flow of remote site access using associated persona preferences in accordance with one implementation of the present invention.
- the present invention provides a method of switching between several internet “personas” which allows the computer user to effortlessly and transparently utilize different preferences depending upon the URL visited.
- Each persona contains a range of user preferences such as email addresses, cookie creation, Java permissions, etc.
- the invention utilizes a program application such as an enhanced web browser to store these preferences in association with the different URLs, as explained further below.
- the web browser is executed on a data processing system or computer.
- FIG. 2 depicts one embodiment 10 of a computer system programmed to automatically switch between different user personas in accordance with one implementation of the present invention.
- System 10 includes a central processing unit (CPU) 12 which carries out program instructions, firmware or read-only memory (ROM) 14 which stores the system's basic input/output logic, and a dynamic random access memory (DRAM) 16 which temporarily stores program instructions and operand data used by CPU 12 .
- CPU 12 , ROM 14 and DRAM 16 are all connected to a system bus 18 .
- PCI host bridge 22 provides a low latency path through which processor 12 may access PCI devices mapped anywhere within bus memory or I/O address spaces.
- PCI host bridge 22 also provides a high bandwidth path to allow the PCI devices to access DRAM 16 .
- Attached to PCI local bus 20 are a network adapter 24 , a small computer system interface (SCSI) adapter 26 , an expansion bus bridge 28 , an audio adapter 30 , and a graphics adapter 32 .
- Network adapter 24 may be used to connect computer system 10 to an external computer network 34 , such as a local area network (LAN) or the Internet.
- LAN local area network
- Small computer system interface (SCSI) adapter 26 is used to control high-speed SCSI disk drive 36 .
- Disk drive 36 stores the program instructions and data in a more permanent state, including the program which embodies the present invention as explained further below.
- Expansion bus bridge 28 is used to couple an industry standard architecture (ISA) expansion bus 38 to PCI local bus 20 .
- ISA industry standard architecture
- several user input devices are connected to ISA bus 38 , including a keyboard 40 , a microphone 42 , and a graphical pointing device (mouse) 44 .
- Other devices may also be attached to ISA bus 38 , such as a CD-ROM drive 46 .
- Audio adapter 30 controls audio output to a speaker 48
- graphics adapter 32 controls visual output to a display monitor 50 , to allow the user to control the document creation process as taught herein.
- Computer system 10 carries out program instructions for switching between different user personas when accessing web sites in accordance with one or more of the implementations discussed in detail below. Accordingly, practice of the invention may include the use of conventional web browser application features in addition to the inventive concept disclosed herein. The details of such applications will become readily apparent to those skilled in the art upon reference to this disclosure.
- FIG. 3 is a pictorial representation of various user personas that are stored on computer 10 in association with respective URLs.
- the user preferences may be stored for example when a URL is first bookmarked. Then when a page is revisited, the page is matched against previously stored personas/URLs, and the appropriate user persona is automatically loaded by the web browser.
- FIG. 3 illustrates four such user personas.
- the user For the ABC Company web site (URL “http://www.abc.com”), the user has established a persona which includes a username “johndoe”, a password “123456”, and enables Java routines.
- the user For the XYZ government web site (URL “http://www.xyz.gov”), the user has established a persona which includes a username “jdoe”, a password “654321”, and disables Java routines.
- the FTP download web site URL “ftp://downloads.net”
- the user For the FTP download web site (URL “ftp://downloads.net”), the user has established a persona which includes a username “guest”, a password “anon”, and disables Java routines.
- email sent to the administrator of the web site at the user's place of work (URL “mailto://admin@work.com”), the user has established a persona which includes a username (email address) “me@work.com”, a password “123456”, and disables Java routines (the mail server is the remote site in this case).
- All four of these personas are accessible by the web browser running on computer system 10 .
- the web browser can automatically locate and load the appropriate user persona without any additional effort on the part of the user.
- User interface 60 may include general features familiar to computer users such as a title bar 62 , a menu bar 64 having various commands which can be executed using keyboard 40 or mouse 44 to display additional pull-down menus, and a button bar 66 having several graphical buttons with icons that allow the user to more simply effectuate a command with a single click of mouse 44 as it controls the graphical pointer 68 on display monitor 50 , and a URL field 70 for manually typing in a URL.
- FIG. 3 illustrates a query or dialog box 72 that is presented to the user in response to a command such as using mouse 40 to control graphical pointer 68 and click on a particular button 74 provided for the purpose of selecting such information sets.
- dialog box 72 allows the user to create, view and edit the preferences for each persona.
- a name field 76 shows various names or titles associated with various personas, with the name “ABC Company” selected.
- the associated persona preferences for the ABC Company are shown to the right of field 76 , and include the URL, a username, a password, and enabling of Java, cookies and caching.
- the user can edit these preferences using the “Edit” button 78 which can present a further dialog box or interface (not shown) to allow the preferences to be modified.
- a “New” button 80 is similarly used to create a new persona.
- An “Options” button 82 can be used to set other general attributes used with persona preferences such as associating all URLs for a given site/domain with the chosen persona.
- one of the personas may be designated as the “Default” persona. This persona is used for any URLs that are not explicitly specified in one of the other established personas.
- FIG. 5 illustrates the procedure for visiting a web site (URL), e.g., on the Internet, and begins when the user selects the particular URL to visit ( 90 ).
- the list of URLs for previously associated personas is reviewed to check for a match with the URL selected by the user ( 92 ). If the URL is on the list, the associated persona is loaded and set for accessing that URL ( 94 ). If the URL is not on the list, the default persona is used ( 96 ). If the default persona is being used, the user may want to associate a new persona with the site.
- URL web site
- FIG. 5 illustrates the procedure for visiting a web site (URL), e.g., on the Internet, and begins when the user selects the particular URL to visit ( 90 ).
- the list of URLs for previously associated personas is reviewed to check for a match with the URL selected by the user ( 92 ). If the URL is on the list, the associated persona is loaded and set for accessing that URL ( 94 ). If
- the procedure can make an inquiry as to whether the desired persona is currently loaded ( 98 ). If not, the user can load the desired persona ( 100 ), and the URL is then loaded by the web browser ( 102 ). This process continues iteratively for each URL selected to visit ( 104 ).
- FIG. 6 illustrates an example of how a user might open an email message using the present invention.
- the procedure begins with the user selecting a mail message to read ( 110 ).
- the email ID (address) for the sender of the message is first extracted ( 112 ), and compared to the list of email addresses having previously associated personas ( 114 ). If the email address is on the list, the associated persona is loaded and set for viewing that message ( 116 ). If the address is not on the list, the default persona is used ( 118 ).
- the program can again query the user as to whether the desired persona is actually loaded ( 120 ). If not, the user is afforded an opportunity to load another desired persona ( 122 ).
- the email message is then opened using the appropriate persona ( 124 ). In this manner, the desired persona is used for any transactions involving that message, such as a return confirmation that is transmitted to the original email sender.
- the process continues interatively for each mail message to be displayed ( 126 ).
- FIG. 7 illustrates one manner to implement the invention for adding new bookmarks, including a “type” of association for a URL that indicates if all pages on the site should use the persona, or if only the pages subordinate to the current page (i.e., a branch of the site tree) should use the persona, or if just that specific page should use the persona.
- the process again begins when the user visits a site, i.e., enters a URL in a web browser ( 130 ).
- a bookmark is set for the URL ( 132 ), and a list of available personas is displayed which may be associated with it ( 134 ).
- the user selects the desired persona ( 136 ), and further chooses are particular selection type as explained above ( 138 ).
- a URL for a company's background information might be “http://www.abc.com/info” and, for such an address, the user could associate the persona with all addresses at that site (e.g., any address with the domain “http://www.abc.com”), or branches off the information page (e.g., any address beginning with “http://www.abc.com/info”) or just the specific page bookmarked.
- the persona is then stored with a type indicator for the URL(s) as appropriate ( 140 ).
- the present invention offers several advantages over convention network applications such as web browsers and email composes.
- a user is no longer required to continually modify preferences to allow specific sites/pages to have elevated privileges. It is also easier to protect sensitive information (e.g., email addresses) from site snoopers.
- Browser attributes are treated consistently and are not artificially separated into security-type preferences and user preferences.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A method of communicating with a remote site on a network by establishing different user personas respectively associated with different remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and then accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site. The specific remote site can be associated with the specific user persona by a universal resource locator (URL), e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona. A default persona can be used for any remote site having no specifically associated user persona. The attributes in the user personas can provide various functions such as indicating whether Java programming is enabled for the specific remote site or whether “cookies” are enabled for the specific remote site. The attributes can also define a username for the specific remote site. A user persona can be established when a bookmark is created for the specific remote site.
Description
- 1. Field of the Invention
- The present invention generally relates to computer systems, and more particularly to a method of accessing remote sites on a network such as the Internet, where the remote sites utilize user information such as user names, passwords, etc., for access.
- 2. Description of the Related Art
- A
generalized computing network 2 is shown inFIG. 1 . Network 2 hasseveral client workstations 3 a, 3 b, 3 c, and 3 d which are interconnected via a communications infrastructure 4.Network 2 additionally has servers 5 a, 5 b. Each server is essentially a stand-alone computer system (having one or more processors, memory devices, and communications devices), but has been adapted to primarily provide information to individual users atclient workstations 3 a-3 d. The information provided by a server can be in the form of programs which run locally on a given client, or in the form of data such as files used by other programs. Communications infrastructure 4 may include transmission media such as copper wires or optical fibers, along with interconnected routers, hubs and switches. -
Clients 3 a-3 d can also be stand-alone computer systems (like personal computers, or PCs), or “dumber” systems adapted for limited use with network 2 (like network computers, or NCs). As used herein, “PC” generally refers to any multi-purpose computer adapted for use by one or more individuals, regardless of the manufacturer, hardware platform, operating system, etc. Network 2 thus offers client-server communications as well as peer-to-peer communications between different clients in real-time or by delayed file delivery. Other nodes can be included innetwork 2, such as a storage device 6. - The network can be local in nature, or can be further connected to other network systems (not shown). The construction of
network 2 is also generally applicable to the Internet. Conventional protocols and services have been established for the Internet which allow the transfer of various types of information, including electronic mail, simple file transfers via FTP, remote computing via TELNET, “gopher” searching, Usenet newsgroups, and hypertext file delivery and multimedia streaming via the World Wide Web (WWW). A given server can be dedicated to performing one of these operations, or run multiple services. For example, mail servers (sending and receiving) can be used to facilitate the transmission of email. The Internet is becoming increasingly popular as the primary medium for both personal and commercial transactions. - Internet services are typically accessed by specifying a unique address, or universal resource locator (URL). The URL has two basic components, the protocol to be used, and the object pathname. For example, the URL “http://www.uspto.gov” (home page for the U.S. Patent & Trademark Office) specifies a hypertext transfer protocol (“http”) and a pathname of the server (“www.uspto.gov”). The server name is associated with a unique numeric value (a TCP/IP address/domain). For email (“mailto:” protocol), the address is composed of two parts, a user name and a server name separated by the commercial “at” symbol, e.g., “johndoe@mailserver.com”.
- Various types of electronic documents can be transmitted on a network like the Internet. As illustrated in
FIG. 1 , a document creator at client workstation 3 a uses an editor (e.g., an email composer) to draft a document such as anemail 7. This email is then transmitted across the communications infrastructure 4 to the document recipient at client workstation 3 b who views it with a document reader (e.g., an email viewer).FIG. 1 also depicts the delivery of aweb page 8 from a remote web site hosted at server 5 a to client workstation 3 d.Web page 8 may be created using, e.g., a hypertext markup language (HTML) editor, and typically includes hypertext links for other web pages. A hypertext link is an image that is viewable on the workstation's display which can be selected by the user (e.g., using a pointing device or “mouse”) and which then automatically instructs the client workstation to request another page associated with that particular hypertext link (i.e., issue another URL). A hypertext link may appear as a picture, or as a word or sentence, possibly underlined or otherwise accentuated to indicate that it is an embedded link and not just normal, informative text. A WWW page may have text, graphic (still) images, and even multimedia objects such as sound recordings or moving video clips. A page may be larger than the physical size of the monitor screen, and techniques such as scroll bars are used by the viewing software (the web browser) to view different portions of the page. - Different user attributes or preferences can be utilized when accessing a remote web site. For example, many web sites now use small programs, called Java applets, to carry out certain functions (such as procedures that are local to the client workstation and do not require additional access to the remote site). While Java applets can greatly enhance the capabilities of a web page, they may also introduce security and other issues. Accordingly, many web browsers are configured to allow the user to globally enable or disable the use of Java routines. This capability can, however, create problems. A user may want to explore some new web sites and, in doing so, disable Java for security reasons, but when this user visits old, reliable sites that require Java, the web pages will not be properly presented unless the user manually edits the configuration to re-enable Java. If a user repeatedly visits several web sites where Java is to be disabled, but additionally repeatedly visits web sites requiring Java, it can become very cumbersome for the user to constantly change the Java preference back and forth.
- Another attribute used by conventional web browsers is the so-called “magic cookie.” A cookie is an identification number or character sequence that resides locally on the client workstation but is used by the remote web site in creating a web page. When a web page is requested, the remote web site can examine the cookies to discern the user and employ previously selected options or preferences in presenting the web page. Cookies can, however, also raise security issues and may be undesirable in certain cases. Again, conventional web browsers can allow the user to globally enable or disable cookies, but the user must repeatedly change this setting for different web sites where cookies are acceptable or unacceptable.
- Web browsers also allow the user to create an identity, e.g., with a username or email address, that is utilized by a remote site in accessing a web page. If a user wants to have different usernames or email addresses for different web sites, the identity information must be manually re-entered before visiting each site, which again is extremely inconvenient. For example, a user might prefer a personal email address for use with certain web sites, while preferring a work email address for other web sites, and preferring a fictitious email address for web sites that might abuse (spam) the user's email account.
- In light of the foregoing, it would be desirable to devise an improved method of accessing remote sites such as web hosts which does not require the user to manually re-enter different attributes or preferences. It would be further advantageous if the method could easily allow the user to exert finer control of the privileges a remote site has.
- It is therefore one object of the present invention to provide an improved method of communicating with remote network sites.
- It is another object of the present invention to provide such a method which allows a user to automatically associate certain preferences or attributes with specific web sites.
- It is yet another object of the present invention to provide such a method which is applicable to a variety of electronic documents including web pages and electronic mail.
- The foregoing objects are achieved in a method of communicating with a remote site on a network, generally comprising the steps of establishing a plurality of user personas respectively associated with a plurality of remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site. The specific remote site can be associated with the specific user persona by a universal resource locator (URL) of the remote site, e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona. A default persona can be used for any remote site having no specifically associated user persona. The attributes in the user personas can provide various functions such as indicating whether Java programming is enabled for the specific remote site or whether “cookies” are enabled for the specific remote site. The attributes can also define a username for the specific remote site. A user persona can be established when a bookmark is created for the specific remote site.
- The above as well as additional objectives, features, and advantages of the present invention will become apparent in the following detailed written description.
- The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
-
FIG. 1 is a pictorial representation of electronic document delivery across a conventional communications network having various nodes such as client workstations, servers, and storage devices; -
FIG. 2 is a block diagram of a computer system programmed to access remote network sites using associated persona preferences in accordance with one implementation of the present invention; -
FIG. 3 is a pictorial representation of different persona preferences which have been selectively associated with different remote network sites (URLs) in accordance with one implementation of the present invention; -
FIG. 4 is an elevational view of a web browser application as displayed on a computer screen, depicting a dialog box for viewing, entering or editing different persona preferences selectively associated with different remote network sites in accordance with one implementation of the present invention; and -
FIG. 5 is a chart illustrating the logical flow of remote site access using associated persona preferences in accordance with one implementation of the present invention. - The use of the same reference symbols in different drawings indicates similar or identical items.
- The present invention provides a method of switching between several internet “personas” which allows the computer user to effortlessly and transparently utilize different preferences depending upon the URL visited. Each persona contains a range of user preferences such as email addresses, cookie creation, Java permissions, etc. The invention utilizes a program application such as an enhanced web browser to store these preferences in association with the different URLs, as explained further below. The web browser is executed on a data processing system or computer.
FIG. 2 depicts oneembodiment 10 of a computer system programmed to automatically switch between different user personas in accordance with one implementation of the present invention. -
System 10 includes a central processing unit (CPU) 12 which carries out program instructions, firmware or read-only memory (ROM) 14 which stores the system's basic input/output logic, and a dynamic random access memory (DRAM) 16 which temporarily stores program instructions and operand data used by CPU 12. CPU 12,ROM 14 andDRAM 16 are all connected to asystem bus 18. There may be additional structures in the memory hierarchy which are not depicted, such as on-board (L1) and second-level (L2) caches. - CPU 12,
ROM 14 andDRAM 16 are also coupled to a peripheral component interconnect (PCI) local bus 20 using a PCI host bridge 22. PCI host bridge 22 provides a low latency path through which processor 12 may access PCI devices mapped anywhere within bus memory or I/O address spaces. PCI host bridge 22 also provides a high bandwidth path to allow the PCI devices to accessDRAM 16. Attached to PCI local bus 20 are anetwork adapter 24, a small computer system interface (SCSI) adapter 26, anexpansion bus bridge 28, anaudio adapter 30, and agraphics adapter 32.Network adapter 24 may be used to connectcomputer system 10 to an external computer network 34, such as a local area network (LAN) or the Internet. Small computer system interface (SCSI) adapter 26 is used to control high-speedSCSI disk drive 36.Disk drive 36 stores the program instructions and data in a more permanent state, including the program which embodies the present invention as explained further below.Expansion bus bridge 28 is used to couple an industry standard architecture (ISA) expansion bus 38 to PCI local bus 20. As shown, several user input devices are connected to ISA bus 38, including a keyboard 40, amicrophone 42, and a graphical pointing device (mouse) 44. Other devices may also be attached to ISA bus 38, such as a CD-ROM drive 46.Audio adapter 30 controls audio output to aspeaker 48, andgraphics adapter 32 controls visual output to adisplay monitor 50, to allow the user to control the document creation process as taught herein. - While the illustrative implementation provides the program instructions embodying the present invention on
disk drive 36, those skilled in the art will appreciate that the invention can be embodied in a program product utilizing other computer-readable media, including transmission media. -
Computer system 10 carries out program instructions for switching between different user personas when accessing web sites in accordance with one or more of the implementations discussed in detail below. Accordingly, practice of the invention may include the use of conventional web browser application features in addition to the inventive concept disclosed herein. The details of such applications will become readily apparent to those skilled in the art upon reference to this disclosure. -
FIG. 3 is a pictorial representation of various user personas that are stored oncomputer 10 in association with respective URLs. The user preferences may be stored for example when a URL is first bookmarked. Then when a page is revisited, the page is matched against previously stored personas/URLs, and the appropriate user persona is automatically loaded by the web browser.FIG. 3 illustrates four such user personas. For the ABC Company web site (URL “http://www.abc.com”), the user has established a persona which includes a username “johndoe”, a password “123456”, and enables Java routines. For the XYZ government web site (URL “http://www.xyz.gov”), the user has established a persona which includes a username “jdoe”, a password “654321”, and disables Java routines. For the FTP download web site (URL “ftp://downloads.net”), the user has established a persona which includes a username “guest”, a password “anon”, and disables Java routines. For email sent to the administrator of the web site at the user's place of work (URL “mailto://admin@work.com”), the user has established a persona which includes a username (email address) “me@work.com”, a password “123456”, and disables Java routines (the mail server is the remote site in this case). - All four of these personas are accessible by the web browser running on
computer system 10. In this manner, when the user initiates communication, e.g., by clicking on a web site bookmark or selecting an addressee for an email, the web browser can automatically locate and load the appropriate user persona without any additional effort on the part of the user. - With further reference to
FIG. 4 , there is depicted one embodiment of auser interface 60 of the web browser that is displayed onmonitor 50 as the electronic communication process is carried out bycomputer system 10 under control of the user.User interface 60 may include general features familiar to computer users such as atitle bar 62, amenu bar 64 having various commands which can be executed using keyboard 40 or mouse 44 to display additional pull-down menus, and abutton bar 66 having several graphical buttons with icons that allow the user to more simply effectuate a command with a single click of mouse 44 as it controls thegraphical pointer 68 ondisplay monitor 50, and aURL field 70 for manually typing in a URL. - Prior to initiating any specific communication, the user can establish different personas which are to be searched as a URL is entered to dynamically associate a given persona with a respective URL.
FIG. 3 illustrates a query or dialog box 72 that is presented to the user in response to a command such as using mouse 40 to controlgraphical pointer 68 and click on a particular button 74 provided for the purpose of selecting such information sets. In the illustrative implementation, dialog box 72 allows the user to create, view and edit the preferences for each persona. Aname field 76 shows various names or titles associated with various personas, with the name “ABC Company” selected. The associated persona preferences for the ABC Company are shown to the right offield 76, and include the URL, a username, a password, and enabling of Java, cookies and caching. The user can edit these preferences using the “Edit” button 78 which can present a further dialog box or interface (not shown) to allow the preferences to be modified. A “New”button 80 is similarly used to create a new persona. An “Options” button 82 can be used to set other general attributes used with persona preferences such as associating all URLs for a given site/domain with the chosen persona. - As seen in
field 76, one of the personas may be designated as the “Default” persona. This persona is used for any URLs that are not explicitly specified in one of the other established personas. - The present invention may be further understood with reference to the flow charts of
FIGS. 5-7 which depict examples of accessing network sites in accordance with various implementations of the present invention.FIG. 5 illustrates the procedure for visiting a web site (URL), e.g., on the Internet, and begins when the user selects the particular URL to visit (90). The list of URLs for previously associated personas is reviewed to check for a match with the URL selected by the user (92). If the URL is on the list, the associated persona is loaded and set for accessing that URL (94). If the URL is not on the list, the default persona is used (96). If the default persona is being used, the user may want to associate a new persona with the site. Alternatively, if a previously associated persona is being used, the user may nevertheless want to change to a different persona. In either case, the procedure can make an inquiry as to whether the desired persona is currently loaded (98). If not, the user can load the desired persona (100), and the URL is then loaded by the web browser (102). This process continues iteratively for each URL selected to visit (104). -
FIG. 6 illustrates an example of how a user might open an email message using the present invention. The procedure begins with the user selecting a mail message to read (110). The email ID (address) for the sender of the message is first extracted (112), and compared to the list of email addresses having previously associated personas (114). If the email address is on the list, the associated persona is loaded and set for viewing that message (116). If the address is not on the list, the default persona is used (118). The program can again query the user as to whether the desired persona is actually loaded (120). If not, the user is afforded an opportunity to load another desired persona (122). The email message is then opened using the appropriate persona (124). In this manner, the desired persona is used for any transactions involving that message, such as a return confirmation that is transmitted to the original email sender. The process continues interatively for each mail message to be displayed (126). -
FIG. 7 illustrates one manner to implement the invention for adding new bookmarks, including a “type” of association for a URL that indicates if all pages on the site should use the persona, or if only the pages subordinate to the current page (i.e., a branch of the site tree) should use the persona, or if just that specific page should use the persona. The process again begins when the user visits a site, i.e., enters a URL in a web browser (130). A bookmark is set for the URL (132), and a list of available personas is displayed which may be associated with it (134). The user then selects the desired persona (136), and further chooses are particular selection type as explained above (138). For example, a URL for a company's background information might be “http://www.abc.com/info” and, for such an address, the user could associate the persona with all addresses at that site (e.g., any address with the domain “http://www.abc.com”), or branches off the information page (e.g., any address beginning with “http://www.abc.com/info”) or just the specific page bookmarked. The persona is then stored with a type indicator for the URL(s) as appropriate (140). - The present invention offers several advantages over convention network applications such as web browsers and email composes. A user is no longer required to continually modify preferences to allow specific sites/pages to have elevated privileges. It is also easier to protect sensitive information (e.g., email addresses) from site snoopers. Browser attributes are treated consistently and are not artificially separated into security-type preferences and user preferences.
- Although the invention has been described with reference to specific embodiments, this description is not meant to be construed in a limiting sense. Various modifications of the disclosed embodiments, as well as alternative embodiments of the invention, will become apparent to persons skilled in the art upon reference to the description of the invention. It is therefore contemplated that such modifications can be made without departing from the spirit or scope of the present invention as defined in the appended claims.
Claims (21)
1. A method of communicating with a remote site on a network, comprising:
establishing a plurality of user personas respectively associated with a plurality of remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites; and
accessing a specific one of the remote sites using the one or more attributes in a specific one of the user personas associated with the specific remote site.
2. The method of claim 1 wherein:
the specific remote site is associated with the specific user persona by a universal resource locator (URL) of the remote site; and
said accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
3. The method of claim 1 further comprising establishing one of the user personas as a default persona to be used for any remote site having no specifically associated user persona.
4. The method of claim 1 wherein one of the attributes in the user personas indicates whether Java programming is enabled for the specific remote site.
5. The method of claim 1 wherein one of the attributes in the user personas indicates whether cookies are enabled for the specific remote site.
6. The method of claim 1 wherein one of the attributes in the user personas indicates a username for the specific remote site.
7. The method of claim 1 wherein at least one of the user personas is established when a bookmark is created for the specific remote site.
8. A computer system comprising:
means for processing program instructions;
a memory device connected to said processing means; and
program instructions residing in said memory device for establishing a plurality of user personas respectively associated with a plurality of remote sites on a network connected to the computer system, each user persona containing one or more attributes used in accessing the remote sites, and for accessing a specific one of the remote sites using the one or more attributes in a specific one of the user personas associated with the specific remote site.
9. The computer system of claim 8 wherein:
the specific remote site is associated with the specific user persona by a universal resource locator (URL) of the remote site; and
the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
10. The computer system of claim 8 wherein said program instructions further establish one of the user personas as a default persona to be used for any remote site having no specifically associated user persona.
11. The computer system of claim 8 wherein one of the attributes in the user personas indicates whether Java programming is enabled for the specific remote site.
12. The computer system of claim 8 wherein one of the attributes in the user personas indicates whether cookies are enabled for the specific remote site.
13. The computer system of claim 8 wherein one of the attributes in the user personas indicates a username for the specific remote site.
14. The computer system of claim 8 wherein at least one of the user personas is established when a bookmark is created for the specific remote site.
15. A computer program product comprising:
a computer-readable medium; and
program instructions residing in said medium for establishing a plurality of user personas respectively associated with a plurality of remote sites on a network connected to a computer system, each user persona containing one or more attributes used in accessing the remote sites, and for accessing a specific one of the remote sites using the one or more attributes in a specific one of the user personas associated with the specific remote site.
16. The computer program product of claim 15 wherein:
the specific remote site is associated with the specific user persona by a universal resource locator (URL) of the remote site; and
the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
17. The computer program product of claim 15 wherein said program instructions further establish one of the user personas as a default persona to be used for any remote site having no specifically associated user persona.
18. The computer program product of claim 15 wherein one of the attributes in the user personas indicates whether Java programming is enabled for the specific remote site.
19. The computer program product of claim 15 wherein one of the attributes in the user personas indicates whether cookies are enabled for the specific remote site.
20. The computer program product of claim 15 wherein one of the attributes in the user personas indicates a username for the specific remote site.
21. The computer program product of claim 15 wherein at least one of the user personas is established when a bookmark is created for the specific remote site.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/916,972 US20060036951A1 (en) | 2004-08-12 | 2004-08-12 | Method of switching internet personas based on URL |
US12/207,494 US8176185B2 (en) | 2004-08-12 | 2008-09-09 | Method of switching Internet personas based on URL |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/916,972 US20060036951A1 (en) | 2004-08-12 | 2004-08-12 | Method of switching internet personas based on URL |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/207,494 Continuation US8176185B2 (en) | 2004-08-12 | 2008-09-09 | Method of switching Internet personas based on URL |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060036951A1 true US20060036951A1 (en) | 2006-02-16 |
Family
ID=35801440
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/916,972 Abandoned US20060036951A1 (en) | 2004-08-12 | 2004-08-12 | Method of switching internet personas based on URL |
US12/207,494 Expired - Fee Related US8176185B2 (en) | 2004-08-12 | 2008-09-09 | Method of switching Internet personas based on URL |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/207,494 Expired - Fee Related US8176185B2 (en) | 2004-08-12 | 2008-09-09 | Method of switching Internet personas based on URL |
Country Status (1)
Country | Link |
---|---|
US (2) | US20060036951A1 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080027924A1 (en) * | 2006-07-25 | 2008-01-31 | Microsoft Corporation | Persona-based application personalization |
US20080040435A1 (en) * | 2006-08-11 | 2008-02-14 | Giovanni Buschi | Method and system for personalizing an e-mail signature |
US20130060850A1 (en) * | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for regulating information flow during interactions |
US8566401B1 (en) * | 2006-12-22 | 2013-10-22 | Symantec Corporation | Method and apparatus for enabling e-mail routing and filtering based on dynamic identities |
KR20140139111A (en) * | 2012-03-30 | 2014-12-04 | 이베이 인크. | User authentication and authorization using personas |
EP2916514A3 (en) * | 2014-02-18 | 2015-10-21 | Synology Incorporated | A method for processing URL and an associated server and a non-transitory computer readable storage medium |
US9230089B2 (en) | 2012-07-16 | 2016-01-05 | Ebay Inc. | User device security manager |
US20160070453A1 (en) * | 2014-09-05 | 2016-03-10 | Verizon Patent And Licensing Inc. | Method and system for indicating social categories |
US9319410B1 (en) * | 2014-01-07 | 2016-04-19 | Fundology, Inc. | Electronic shared-document repository |
US9432190B2 (en) | 2011-09-07 | 2016-08-30 | Elwha Llc | Computational systems and methods for double-encrypting data for subsequent anonymous storage |
US9473647B2 (en) | 2011-09-07 | 2016-10-18 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US9491146B2 (en) | 2011-09-07 | 2016-11-08 | Elwha Llc | Computational systems and methods for encrypting data for anonymous storage |
US9690853B2 (en) | 2011-09-07 | 2017-06-27 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US9747561B2 (en) | 2011-09-07 | 2017-08-29 | Elwha Llc | Computational systems and methods for linking users of devices |
US10074113B2 (en) | 2011-09-07 | 2018-09-11 | Elwha Llc | Computational systems and methods for disambiguating search terms corresponding to network members |
US10165079B2 (en) * | 2010-12-21 | 2018-12-25 | Microsoft Technology Licensing, Llc | Providing a persona-based application experience |
US10185814B2 (en) | 2011-09-07 | 2019-01-22 | Elwha Llc | Computational systems and methods for verifying personal information during transactions |
US10198729B2 (en) | 2011-09-07 | 2019-02-05 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US10263936B2 (en) | 2011-09-07 | 2019-04-16 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US10546306B2 (en) | 2011-09-07 | 2020-01-28 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US20210136059A1 (en) * | 2019-11-05 | 2021-05-06 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134548A (en) * | 1998-11-19 | 2000-10-17 | Ac Properties B.V. | System, method and article of manufacture for advanced mobile bargain shopping |
US20020006126A1 (en) * | 1998-07-24 | 2002-01-17 | Gregory Johnson | Methods and systems for accessing information from an information source |
US6345289B1 (en) * | 1997-03-18 | 2002-02-05 | International Business Machines Corporation | Intermediate system transmitting relevant selections based on permutation function applied consumer/information signature vectors for privacy |
US20020095454A1 (en) * | 1996-02-29 | 2002-07-18 | Reed Drummond Shattuck | Communications system |
US20020116388A1 (en) * | 2001-01-29 | 2002-08-22 | Clement Gary L. | Methods and apparatus for providing on-the-job performance support |
US20020171679A1 (en) * | 2001-05-17 | 2002-11-21 | Clapper Edward O. | Hardware cross-emulation using personas |
US20030023880A1 (en) * | 2001-07-27 | 2003-01-30 | Edwards Nigel John | Multi-domain authorization and authentication |
US20030126094A1 (en) * | 2001-07-11 | 2003-07-03 | Fisher Douglas C. | Persistent dynamic payment service |
US20030131260A1 (en) * | 2002-01-10 | 2003-07-10 | International Business Machines Corporation | Strategic internet persona assumption |
US20030135587A1 (en) * | 2000-01-24 | 2003-07-17 | Andrew Fisher | Method and system of state management for data communications |
US20030221122A1 (en) * | 2002-04-18 | 2003-11-27 | International Business Machines Corporation | Autonomic security settings switching based upon a network connection security profile |
US7117504B2 (en) * | 2001-07-10 | 2006-10-03 | Microsoft Corporation | Application program interface that enables communication for a network software platform |
US20070074169A1 (en) * | 2005-08-25 | 2007-03-29 | Fortify Software, Inc. | Apparatus and method for analyzing and supplementing a program to provide security |
US20070118803A1 (en) * | 2000-05-08 | 2007-05-24 | Walker Jay S | Products and processes for providing one or more links in an electronic file that is presented to a user |
US20070128899A1 (en) * | 2003-01-12 | 2007-06-07 | Yaron Mayer | System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows |
US7330890B1 (en) * | 1999-10-22 | 2008-02-12 | Microsoft Corporation | System for providing personalized content over a telephone interface to a user according to the corresponding personalization profile including the record of user actions or the record of user behavior |
US20080077983A1 (en) * | 2006-09-22 | 2008-03-27 | Bea Systems, Inc. | Non-invasive insertion of pagelets |
US20080082959A1 (en) * | 2004-10-22 | 2008-04-03 | New Technology/Enterprise Limited | Data processing system and method |
US7436939B1 (en) * | 2001-09-26 | 2008-10-14 | Sprint Spectrum L.P. | Method and system for consolidated message notification in a voice command platform |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040220926A1 (en) * | 2000-01-03 | 2004-11-04 | Interactual Technologies, Inc., A California Cpr[P | Personalization services for entities from multiple sources |
US7634732B1 (en) * | 2003-06-26 | 2009-12-15 | Microsoft Corporation | Persona menu |
-
2004
- 2004-08-12 US US10/916,972 patent/US20060036951A1/en not_active Abandoned
-
2008
- 2008-09-09 US US12/207,494 patent/US8176185B2/en not_active Expired - Fee Related
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6757710B2 (en) * | 1996-02-29 | 2004-06-29 | Onename Corporation | Object-based on-line transaction infrastructure |
US20020095454A1 (en) * | 1996-02-29 | 2002-07-18 | Reed Drummond Shattuck | Communications system |
US20050004978A1 (en) * | 1996-02-29 | 2005-01-06 | Reed Drummond Shattuck | Object-based on-line transaction infrastructure |
US6345289B1 (en) * | 1997-03-18 | 2002-02-05 | International Business Machines Corporation | Intermediate system transmitting relevant selections based on permutation function applied consumer/information signature vectors for privacy |
US20020006126A1 (en) * | 1998-07-24 | 2002-01-17 | Gregory Johnson | Methods and systems for accessing information from an information source |
US6134548A (en) * | 1998-11-19 | 2000-10-17 | Ac Properties B.V. | System, method and article of manufacture for advanced mobile bargain shopping |
US7330890B1 (en) * | 1999-10-22 | 2008-02-12 | Microsoft Corporation | System for providing personalized content over a telephone interface to a user according to the corresponding personalization profile including the record of user actions or the record of user behavior |
US20030135587A1 (en) * | 2000-01-24 | 2003-07-17 | Andrew Fisher | Method and system of state management for data communications |
US20070118803A1 (en) * | 2000-05-08 | 2007-05-24 | Walker Jay S | Products and processes for providing one or more links in an electronic file that is presented to a user |
US20020116388A1 (en) * | 2001-01-29 | 2002-08-22 | Clement Gary L. | Methods and apparatus for providing on-the-job performance support |
US7373495B2 (en) * | 2001-05-17 | 2008-05-13 | Intel Corporation | Hardware cross-emulation using personas |
US20020171679A1 (en) * | 2001-05-17 | 2002-11-21 | Clapper Edward O. | Hardware cross-emulation using personas |
US20070100967A1 (en) * | 2001-07-10 | 2007-05-03 | Microsoft Corporation | Application Program Interface for Network Software Platform |
US7117504B2 (en) * | 2001-07-10 | 2006-10-03 | Microsoft Corporation | Application program interface that enables communication for a network software platform |
US20030126094A1 (en) * | 2001-07-11 | 2003-07-03 | Fisher Douglas C. | Persistent dynamic payment service |
US20030023880A1 (en) * | 2001-07-27 | 2003-01-30 | Edwards Nigel John | Multi-domain authorization and authentication |
US7436939B1 (en) * | 2001-09-26 | 2008-10-14 | Sprint Spectrum L.P. | Method and system for consolidated message notification in a voice command platform |
US6990590B2 (en) * | 2002-01-10 | 2006-01-24 | International Business Machines Corporation | Strategic internet persona assumption |
US20030131260A1 (en) * | 2002-01-10 | 2003-07-10 | International Business Machines Corporation | Strategic internet persona assumption |
US20030221122A1 (en) * | 2002-04-18 | 2003-11-27 | International Business Machines Corporation | Autonomic security settings switching based upon a network connection security profile |
US20070128899A1 (en) * | 2003-01-12 | 2007-06-07 | Yaron Mayer | System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows |
US20080082959A1 (en) * | 2004-10-22 | 2008-04-03 | New Technology/Enterprise Limited | Data processing system and method |
US20070074169A1 (en) * | 2005-08-25 | 2007-03-29 | Fortify Software, Inc. | Apparatus and method for analyzing and supplementing a program to provide security |
US20080077983A1 (en) * | 2006-09-22 | 2008-03-27 | Bea Systems, Inc. | Non-invasive insertion of pagelets |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7613692B2 (en) | 2006-07-25 | 2009-11-03 | Microsoft Corporation | Persona-based application personalization |
US20080027924A1 (en) * | 2006-07-25 | 2008-01-31 | Microsoft Corporation | Persona-based application personalization |
US20080040435A1 (en) * | 2006-08-11 | 2008-02-14 | Giovanni Buschi | Method and system for personalizing an e-mail signature |
US8566401B1 (en) * | 2006-12-22 | 2013-10-22 | Symantec Corporation | Method and apparatus for enabling e-mail routing and filtering based on dynamic identities |
US10165079B2 (en) * | 2010-12-21 | 2018-12-25 | Microsoft Technology Licensing, Llc | Providing a persona-based application experience |
US10606989B2 (en) | 2011-09-07 | 2020-03-31 | Elwha Llc | Computational systems and methods for verifying personal information during transactions |
US9432190B2 (en) | 2011-09-07 | 2016-08-30 | Elwha Llc | Computational systems and methods for double-encrypting data for subsequent anonymous storage |
US10546306B2 (en) | 2011-09-07 | 2020-01-28 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US10523618B2 (en) | 2011-09-07 | 2019-12-31 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US10263936B2 (en) | 2011-09-07 | 2019-04-16 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US10198729B2 (en) | 2011-09-07 | 2019-02-05 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US10185814B2 (en) | 2011-09-07 | 2019-01-22 | Elwha Llc | Computational systems and methods for verifying personal information during transactions |
US10546295B2 (en) | 2011-09-07 | 2020-01-28 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US9473647B2 (en) | 2011-09-07 | 2016-10-18 | Elwha Llc | Computational systems and methods for identifying a communications partner |
US9491146B2 (en) | 2011-09-07 | 2016-11-08 | Elwha Llc | Computational systems and methods for encrypting data for anonymous storage |
US10079811B2 (en) | 2011-09-07 | 2018-09-18 | Elwha Llc | Computational systems and methods for encrypting data for anonymous storage |
US9690853B2 (en) | 2011-09-07 | 2017-06-27 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US9747561B2 (en) | 2011-09-07 | 2017-08-29 | Elwha Llc | Computational systems and methods for linking users of devices |
US20130060850A1 (en) * | 2011-09-07 | 2013-03-07 | Elwha LLC, a limited liability company of the State of Delaware | Computational systems and methods for regulating information flow during interactions |
US9928485B2 (en) * | 2011-09-07 | 2018-03-27 | Elwha Llc | Computational systems and methods for regulating information flow during interactions |
US10074113B2 (en) | 2011-09-07 | 2018-09-11 | Elwha Llc | Computational systems and methods for disambiguating search terms corresponding to network members |
KR101830038B1 (en) | 2012-03-30 | 2018-02-19 | 이베이 인크. | User authentication and authorization using personas |
AU2013237959B2 (en) * | 2012-03-30 | 2015-07-30 | Ebay Inc. | User authentication and authorization using personas |
EP3843328A1 (en) * | 2012-03-30 | 2021-06-30 | eBay Inc. | User authentication and authorization using personas |
US10754941B2 (en) | 2012-03-30 | 2020-08-25 | Ebay Inc. | User device security manager |
KR20140139111A (en) * | 2012-03-30 | 2014-12-04 | 이베이 인크. | User authentication and authorization using personas |
EP2792105A4 (en) * | 2012-03-30 | 2016-02-17 | Ebay Inc | User authentication and authorization using personas |
KR101711270B1 (en) | 2012-03-30 | 2017-02-28 | 이베이 인크. | User authentication and authorization using personas |
EP3554002A1 (en) * | 2012-03-30 | 2019-10-16 | eBay, Inc. | User authentication and authorization using personas |
US9230089B2 (en) | 2012-07-16 | 2016-01-05 | Ebay Inc. | User device security manager |
US9319410B1 (en) * | 2014-01-07 | 2016-04-19 | Fundology, Inc. | Electronic shared-document repository |
EP2916514A3 (en) * | 2014-02-18 | 2015-10-21 | Synology Incorporated | A method for processing URL and an associated server and a non-transitory computer readable storage medium |
US10375141B2 (en) | 2014-02-18 | 2019-08-06 | Synology Incorporated | Method for processing URL and associated server and non-transitory computer readable storage medium |
US20160070453A1 (en) * | 2014-09-05 | 2016-03-10 | Verizon Patent And Licensing Inc. | Method and system for indicating social categories |
US10176535B2 (en) * | 2014-09-05 | 2019-01-08 | Verizon Patent And Licensing Inc. | Method and system for providing social category indicators in a user profile header of an on-line posting |
US20210136059A1 (en) * | 2019-11-05 | 2021-05-06 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
US12047373B2 (en) * | 2019-11-05 | 2024-07-23 | Salesforce.Com, Inc. | Monitoring resource utilization of an online system based on browser attributes collected for a session |
Also Published As
Publication number | Publication date |
---|---|
US20090077468A1 (en) | 2009-03-19 |
US8176185B2 (en) | 2012-05-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8176185B2 (en) | Method of switching Internet personas based on URL | |
US6810410B1 (en) | Customizing a client application using an options page stored on a server computer | |
US8103737B2 (en) | System and method for previewing hyperlinks with ‘flashback’ images | |
TW424185B (en) | Named bookmark sets | |
US6510458B1 (en) | Blocking saves to web browser cache based on content rating | |
US6571295B1 (en) | Web page annotating and processing | |
US6567918B1 (en) | Saved Web page security system and method | |
US9154493B2 (en) | Managing multiple logins from a single browser | |
US6632248B1 (en) | Customization of network documents by accessing customization information on a server computer using uniquie user identifiers | |
US6453342B1 (en) | Method and apparatus for selective caching and cleaning of history pages for web browsers | |
US7624351B2 (en) | Methods and apparatus for controlling a plurality of applications | |
JPH10162030A (en) | Method and device for rendering hyperlink information | |
US7548922B2 (en) | Customized and consolidated bookmarks | |
JP4856704B2 (en) | Computer-implemented method, system, and computer program for representing data as graphical topology representation (computer-implemented method for representing data as graphical topology representation) | |
US20020191020A1 (en) | Method and apparatus for removing confindential information from a history | |
KR19990044850A (en) | Method and system for international support of Internet web pages | |
US6963901B1 (en) | Cooperative browsers using browser information contained in an e-mail message for re-configuring | |
JP2003150542A (en) | Method for sharing annotation information to be added to digital content, program and computer system | |
US20080140777A1 (en) | Selective mirrored site accesses from a communication | |
KR19990044851A (en) | Method and system for automatically associating predefined user data with query entry fields in a computer network | |
US7137009B1 (en) | Method and apparatus for securing a cookie cache in a data processing system | |
WO2002059734A1 (en) | Interactive marking and recall of a document | |
JP2000207421A (en) | Method and system for retrieving document by using hyperlink | |
US20060020615A1 (en) | Method of automatically including parenthetical information from set databases while creating a document | |
WO2001073562A1 (en) | Content server device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MARION, NEAL RICHARD;MULLEN, SHAWN PATRICK;RAMSAY III, GEORGE F.;AND OTHERS;REEL/FRAME:015088/0531;SIGNING DATES FROM 20040809 TO 20040810 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |