CA2197218C - Apparatus and method for accessing a local computer network - Google Patents
Apparatus and method for accessing a local computer network Download PDFInfo
- Publication number
- CA2197218C CA2197218C CA002197218A CA2197218A CA2197218C CA 2197218 C CA2197218 C CA 2197218C CA 002197218 A CA002197218 A CA 002197218A CA 2197218 A CA2197218 A CA 2197218A CA 2197218 C CA2197218 C CA 2197218C
- Authority
- CA
- Canada
- Prior art keywords
- remote
- user
- address
- computer
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Abstract
A remote access server provides a remote user (18), with access to a local computer network. The server (16) receives a user identification string from its communication port, the string having been entered by the remote user at a remote computer which is coupled to the communication port. The string identifies the remote user. The server uses the string to access a database (30) and determine an internet protocol (IP) address associated with the string. The remote computer needs the IP address to communicate on the local computer network. The database includes a user identification string for each remote user and an IP address for each string. The remote access server (16) sends the IP address to the remote computer via the communication port.
The server then allows the remote computer to access the local computer network and to communicate on the local computer network using the IP address.
The server then allows the remote computer to access the local computer network and to communicate on the local computer network using the IP address.
Description
_WO 96!05681 2 1 9 7 2 1 8 PGT/US95/08902 APPARATUS AND METHOD
FOR ACCESSING A LOCAL COMPUTER NETWORK
Field of the Invention This invention relates to an apparatus and method for providing a remote user at a remote computer with access to a local computer network, and more particularly to a remote access server which provides the access by assigning an Internet protocol (IP) address to the remote user.
Background of the Invention The client-server computer networking model allows organizations of all sizes to utilize group productivity products such as'e-mail. Many business organizations have grown to rely heavily on network services. Employees who travel typically need to access the same network services and resources provided to them at work. Field offices also frequently need to access the headquarters network services. The term "telecommuter" has been used to describe an employee who stays at home and conducts business by accessing the network services provided at the traditional worksite. These types of users are sometimes referred to as "remote" because they typically are located in a physically remote place from the networks and because they do not connect to the networks locally or directly. Remote users typically connect to the networks via telephone lines. The terms "remote access" and "remote networking" are used to identify the situation in which a remote user accesses a computer network over analog or digital telephone
FOR ACCESSING A LOCAL COMPUTER NETWORK
Field of the Invention This invention relates to an apparatus and method for providing a remote user at a remote computer with access to a local computer network, and more particularly to a remote access server which provides the access by assigning an Internet protocol (IP) address to the remote user.
Background of the Invention The client-server computer networking model allows organizations of all sizes to utilize group productivity products such as'e-mail. Many business organizations have grown to rely heavily on network services. Employees who travel typically need to access the same network services and resources provided to them at work. Field offices also frequently need to access the headquarters network services. The term "telecommuter" has been used to describe an employee who stays at home and conducts business by accessing the network services provided at the traditional worksite. These types of users are sometimes referred to as "remote" because they typically are located in a physically remote place from the networks and because they do not connect to the networks locally or directly. Remote users typically connect to the networks via telephone lines. The terms "remote access" and "remote networking" are used to identify the situation in which a remote user accesses a computer network over analog or digital telephone
-2-lines.
A remote user generally can utilize any type of computer to access the network. The computer can be, for example, a personal computer, a workstation, or a portable computer such as a laptop computer or a notebook computer.
Also, the computer can be, for example, an IBM ~TM~ PC or compatible, an Apple Macintosh~TM~, or a Unix~TM~-based computer. The user typically connects a modem or similar communication device to a serial port of the computer. The modem connected to the user's remote computer communicates over the telephone lines with another modem which is coupled to a server. The other modem and the server are located at the network which the remote computer is attempting to access. The server is coupled directly to the network. It is the server which provides the remote computer with controlled access to the network and the services and resources thereon. The server is referred to as a "remote access server," and it typically includes a serial port for connecting to the other modem, a port for connecting to the network, and electronics which include at least a microprocessor and memory.
It is desirable for the remote access server to have a variety of features. For example, the remote access server should make accessing the network transparent to the remote user. The remote access server also should be easy for a network manager to install and maintain.
A remote user generally can utilize any type of computer to access the network. The computer can be, for example, a personal computer, a workstation, or a portable computer such as a laptop computer or a notebook computer.
Also, the computer can be, for example, an IBM ~TM~ PC or compatible, an Apple Macintosh~TM~, or a Unix~TM~-based computer. The user typically connects a modem or similar communication device to a serial port of the computer. The modem connected to the user's remote computer communicates over the telephone lines with another modem which is coupled to a server. The other modem and the server are located at the network which the remote computer is attempting to access. The server is coupled directly to the network. It is the server which provides the remote computer with controlled access to the network and the services and resources thereon. The server is referred to as a "remote access server," and it typically includes a serial port for connecting to the other modem, a port for connecting to the network, and electronics which include at least a microprocessor and memory.
It is desirable for the remote access server to have a variety of features. For example, the remote access server should make accessing the network transparent to the remote user. The remote access server also should be easy for a network manager to install and maintain.
-3-SUMMARY OF THE INVENTION
It is an object of the invention to provide a remote access server which allows one or more remote computers to S access simultaneously a local computer network, even if each of the remote computers employs a different protocol (e.g., IPX, TCP/IP, AppleTalk~TM~, NetBEUI~TM~, or 802.2/LLC).
It is another object of the invention to provide a remote access server which provides user authentication and security features. One aspect of these features is that the server assigns, on a "per-user" basis, an Internet protocol (IP) address which a remote computer needs with some protocols, such as TCP/IP, to communicate on the network. With per-user IP address assignment, the server ensures that each IS remote user has the same IP address every time that remote user makes a remote access connection to the network via the server, even though that remote user may utilize a different remote computer every time a remote access connection is made. The server uses a user identification string, which is entered into the remote computer by the remote user, to retrieve from a server-internal or server-external database the corresponding IP address for that remote user. The database typically is centrally maintained by a network manager with authority to add and delete remote users and IP addresses.
Because each remote user has an IP address under the per-user IP addressing scheme, it is possible to track via IP
address the network services accessed by particular remote users. Once a user has been provided access to the network itself, following any type of optional user authentication procedure which includes but is not limited to the use of the per-user IP
It is an object of the invention to provide a remote access server which allows one or more remote computers to S access simultaneously a local computer network, even if each of the remote computers employs a different protocol (e.g., IPX, TCP/IP, AppleTalk~TM~, NetBEUI~TM~, or 802.2/LLC).
It is another object of the invention to provide a remote access server which provides user authentication and security features. One aspect of these features is that the server assigns, on a "per-user" basis, an Internet protocol (IP) address which a remote computer needs with some protocols, such as TCP/IP, to communicate on the network. With per-user IP address assignment, the server ensures that each IS remote user has the same IP address every time that remote user makes a remote access connection to the network via the server, even though that remote user may utilize a different remote computer every time a remote access connection is made. The server uses a user identification string, which is entered into the remote computer by the remote user, to retrieve from a server-internal or server-external database the corresponding IP address for that remote user. The database typically is centrally maintained by a network manager with authority to add and delete remote users and IP addresses.
Because each remote user has an IP address under the per-user IP addressing scheme, it is possible to track via IP
address the network services accessed by particular remote users. Once a user has been provided access to the network itself, following any type of optional user authentication procedure which includes but is not limited to the use of the per-user IP
- 4 -address, it is possible to use IP addresses to ensure that only certain remote users are allowed access to specific network services. By providing IP addresses on a per-user basis, the network administrator is able to utilize standard functionality, which resides in various network services, to authorize access to each such service on a per-user basis.
Per-user assignment of IP addresses is very different from other IP addressing schemes such as "per-port" schemes and "remote computer-supplied"
schemes. With per-port IP address assignment, each port of the server has an IP address and that IP-address is assigned to whichever remote computer happens to dial into that port. With remote computer-supplied IP address assignment, the server allows the remote computer to identify its own IP address which typically is pre-configured into the remote computer.
Both per-port and remote computer-supplied IP
addressing, unlike per-user IP addressing, do not provide one-to-one correspondence between each remote user and each IP address. These two other IP
addressing schemes also do not, unlike per-user IP
addressing, tie network access to remote user identity.
It is not possible with either per-port or remote computer-supplied IP addressing to use IP address to determine whether a particular remote user is actually entitled access to specific network services because the IP address is tied to the server's ports or the remote computer and not to the remote user himself or herself.
Other objects, aspects, features, and advantages of the invention will become apparent from the following description and from the claims.
WO 96105681 219 7 218 PCT~S95/08902
Per-user assignment of IP addresses is very different from other IP addressing schemes such as "per-port" schemes and "remote computer-supplied"
schemes. With per-port IP address assignment, each port of the server has an IP address and that IP-address is assigned to whichever remote computer happens to dial into that port. With remote computer-supplied IP address assignment, the server allows the remote computer to identify its own IP address which typically is pre-configured into the remote computer.
Both per-port and remote computer-supplied IP
addressing, unlike per-user IP addressing, do not provide one-to-one correspondence between each remote user and each IP address. These two other IP
addressing schemes also do not, unlike per-user IP
addressing, tie network access to remote user identity.
It is not possible with either per-port or remote computer-supplied IP addressing to use IP address to determine whether a particular remote user is actually entitled access to specific network services because the IP address is tied to the server's ports or the remote computer and not to the remote user himself or herself.
Other objects, aspects, features, and advantages of the invention will become apparent from the following description and from the claims.
WO 96105681 219 7 218 PCT~S95/08902
- 5 -Brief Description of the Drawings In the drawings, like reference characters generally refer to the same parts throughout the different views. Also, the drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention.
FIG. 1 is a diagram of a remote access system in which a remote access server according to the invention provides a remote user at a remote computer with access to a local computer network.
FIG. 2 is a diagram of a remote access system shown in more detail than the system shown in FIG. 1.
FIG. 3 is a flowchart of the steps a remote access server performs in order to provide a remote user at a remote computer with access to a local computer network according to the invention.
FIG. 4 is a block diagram showing major components of a remote access server according to the invention.
FIG. 1 is a diagram of a remote access system in which a remote access server according to the invention provides a remote user at a remote computer with access to a local computer network.
FIG. 2 is a diagram of a remote access system shown in more detail than the system shown in FIG. 1.
FIG. 3 is a flowchart of the steps a remote access server performs in order to provide a remote user at a remote computer with access to a local computer network according to the invention.
FIG. 4 is a block diagram showing major components of a remote access server according to the invention.
-6-DESCRIPTION
Referring to FIG. 1, in a remote access system 10, a remote computer 12 is allowed access to a local computer network 14 by a remote access server 16. As will be described in more detail later with reference to FIG. 4, the remote access server 16 is itself a powerful programmable computer.
In the disclosed embodiment, the remote access server 16 is a LanRover~TM~ which is available from Shiva Corporation of Burlington, Mass. A remote user 18 at the remote computer 12 initiates an attempt to gain access to the network 14 (and the network services and resources available thereon) via the remote access server 16 by entering a user identification (ID) string 20 into the remote computer 12. The user ID string is a predetermined code which uniquely identifies the remote user, and it typically is assigned to the remote user by a network manager who has central control of and responsibility for the network 14 and the maintenance thereof.
The user ID string 20 entered by the remote user 18 is sent by the remote computer 12 to the remote access server 16 over telephone lines 22. The term telephone lines 22 is used herein to mean any digital and/or analog communication link or links used to transmit voice and/or data including wireless links and cellular data links such as Cellular Digital Packet Data (CDPD). In the disclosed embodiment, a modem 24 is connected to the remote computer 12, and another modem 26 is connected to the remote access server 16. The modems 24, 26 allow the remote computer 12 and the remote access server 16 to communicate over the telephone lines 22. Note that the modem 26 connected to the remote access server 16 could be part of the WO 96/05681 219 7 218 pCTIUS95/08902 server 16 (e. g., included within the server housing), as indicated by the dotted-line box 28 enclosing the server 16 and the modem 26 connected thereto. Also note that the modems 24, 26 could be Integrated Services Digital Network (ISDN) terminal adapters if the telephone lines 22 are the ISDN, or the modems 24, 26 could be any of a variety of other switched-access devices.
The remote access server 16 receives the user ID
string 20 which was entered by the remote user 18 and sent by the remote computer 12. An optional user authentication procedure may occur at this time where a remote user proves his or her identity by entering a password, by reference to an authentication server database, or by any other method. Once the remote user is authenticated, that remote user is granted access to the network. Further authorization may occur in order for an authenticated user to become an authorized user and be granted access to specific network services. In any event, the server 16 uses the user ID string 20 to index into a database 30 and retrieve an Internet Protocol (IP) address associated with the user ID
string 20. With some protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP), the remote computer 12 must have an IP
address in order to communicate on the network 14 and access the network services and resources available thereon. The database 30 can be resident in the remote access server 16, or it can be maintained on a node (e.g., a database server) on the network 14. The database 30 includes a unique user ID string for each remote user and a unique IP address for each user ID
string. The database 30 typically is maintained by a network manager who has central control of and WO 96105681 P~TIUS95108902 2i972i8 _$_ responsibility for the network 14 and the maintenance thereof. The network manager generally controls (e. g., has the authority and ability to define, add, and delete) remote user names, user ID strings, and IP
addresses.
After the remote access server 16 determines a unique IP address based on the user ID string 20 by referring to the database 30, the server 16 sends the unique IP address to the remote computer 12 via, for example, the modems 24, 26 and the telephone lines 22.
The remote computer 12 gains access to the network 14 through the remote access server 16 and uses the.IP
address to communicate with, and utilize the services and resources available on, the network 14.
The remote access server 16 will not allow a remote computer 12 to gain access to the network 14 unless the remote user 18 enters a valid user ID string 20 at that remote computer 12 . That is, if the remote access server 16 searches the database 30 but fails to find an IP address associated with the user ID string 20 which the remote user 18 entered at the remote computer 12 (because, for example, the user ID string is not in the database 30 at all or it is in the database 30 but there is no associated IP address listed in the database 30), the remote access server 16 will not transmit an IP address to the remote computer 12, and thus the remote computer 12 (and the remote user 18) will not be able to communicate on the network 14. In this situation, the remote access server 16 will not pass any data from the remote computer 12 or the remote user 18 on to the network 14.
The remote access server 16 thus ensures that each "authorized" remote user 18 receives the same, unique IP address every time that remote user 18 makes a R'O 96/05681 2 1 9 7 2 1 8 PCT/US95/08902 _ g remote access connection to the network 14 via the server 16, even though that remote user 18 may utilize a different remote computer 12 every time a remote access connection is made. A remote user 18 is "authorized" if his or her name, unique user ID string, and unique IP address are contained in the database 30.
Again, a network manager typically centrally controls and maintains the database 30 and its contents. By linking network access to the identity of the individual remote users, the remote access server 16 can effectively restrict network access to specific network services based on IP address.
The user authorization feature allows an authorized remote user's use of network services and resources to be tracked via IP address. That is, the remote access server 16 can keep a log of a particular remote user's network activities because (i) all data exchanged between the network 14 and the remote user's remote computer 12 passes through the server 16 and (ii) the IP address used by the remote user's remote computer 12 uniquely identifies the remote user 18. The server 16 typically will examine more of the data than just the IP address in order to determine exactly what network service or resource is being accessed by the authorized remote user 18. The remote access server 16 can keep the log in the database 30 or in any other storage location which can be on or off the network 14 (e.g., a tape or disk drive).
The remote access system 10 shown generally in FIG. 1 is shown in more detail in FIG. 2. Referring to FIG. 2, the remote computer 12 is a portable laptop computer. In general, the remote computer 12 can be any type of portable computer (e.g., a laptop or a notebook), workstation, or personal computer (e.g., an IBM~TM~ PC or compatible, an Apple Macintosh~TM~, or a Unix~TM~-based computer). The remote computer 12 generally must be able to function as a stand-alone computer system when not connected to a network, and as a full network node when it is dialed-in to the network 14 through the remote access server 16. For a remote Macintosh~TM~ system, it generally is preferred that the computer have a 25 MHz 68030 processor. For a remote PC system, it generally is preferred that the computer have at least a 25 MHz 486 processor.
The remote access system 10 described herein is not to be confused with a remote control system. In a remote control system, a remote user dials-in to the local network with his or her remote computer and takes control of a local computer on the network. Once the remote user's remote computer is connected to the local network in a remote control system, the remote user actually uses the local computer, not the remote computer. That is, only user-interface data (e.g., screen images and keyboard/mouse input) are transferred to the remote computer from the local computer; the remote computer acts as a dumb terminal in a remote control system.
A remote control system is very different from the remote access system 10. In the remote access system 10, the remote computer 12 must perform adequately by itself, with enough processing power, memory, and disk storage space to run (on the remote computer 12 itself) the remote user's chosen applications without relying upon the on-network communication speed which typically is much higher than the speed of the telephone line link 22. Some telephone lines 22 allow speeds of up to 57.6 kilobits per second whereas the local computer network 14 can operate in ranges from 1 to 100 megabits per second depending on the type of network. The local computer network 14 can be, for example, Ethernet or Token Ring~TM>.
The remote computer 12 typically will have a serial port 32 which is managed by a serial controller such as a 16550A serial controller chip which can receive or transmit up to sixteen characters without intervention from the central processing unit (CPU) of the remote computer 12. The modem 24 connected to the serial port 32 can be, for example, a V.32bis modem (14.4 kilobits per second) or an ISDN
terminal adapter. The other modem 26 (which is not shown in FIG. 2 because it is internal to the remote access server 16) is selected to operate properly given the telephone lines 22 employed and the modem 24 connected to the serial port 32.
The network services and resources available on the network 14 which the remote user 18 might access via the remote access server 16 can include, for example, a Notes Server 46, an E-Mail Server 48, and a Database Server 50.
The Database Server SO can be used to maintain the database 30 of user names, user ID strings, and IP addresses which was described previously with reference to FIG. 1.
The remote computer 12 can be loaded with network application software 34 and remote access client software 36.
The remote access client software 36 can allow, as a relevant example, a Unix~TM~-based computer to use a standard Point-to-Point Protocol (PPP) implementation, and a PC-based computer to use any standard (if any) or vendor-supplied remote access clients. A remote access client includes a "dialer" which establishes and terminates the remote access connection .and a "driver" which interfaces with the network protocol stacks and the serial port 32 to send and receive network data. The remote access client can operate with a variety of protocols including IPX, TCP/IP, NetBEUI~TM~, LLC/802.2, and AppleTalk~TM~. NovelltTM~'s IPX
is the native protocol for NetWare~TM~. TCP/IP is widely used in Unix-based systems and client-server databases, and TCP/IP also is becoming standard for many other applications. NetBEUI~TM~ is used for LAN Manager and Microsoft~TM~'s. Windows for Workgroups~T"'~ . LLCJ802.2 is for IBM LAN Server and host connectivity. The combination of AppleTalk~TM~ and TCP/IP covers almost all Macintosh~TM~
applications.
The performance of the remote access server 16 is primarily determined by the ability to move data through its serial ports (shown in FIG. 4 but not in FIG. 2) without much attention from its CPU (also shown in FIG. 4 but not in FIG.
2). The performance of the server 16 also is determined by its CPU's ability to perform the routing, filtering, IP address tracking, etc. that the CPU must do without adding undue delays as it forwards data packets. The server 16 thus has generally been optimized for serial port throughput and general CPU power. Because the server 16 must be highly reliable and efficient, it includes solid-state, non-volatile storage for the controlling software. The software is upgradeable via downloading from the network 14 to the server 16. The network manager can perform any upgrades.
The software in the remote access server 16 causes the server 16 to perform the various functions described herein, although it should be noted that it is possible to use dedicated electronic hardware to perform all server functionality described herein. The steps which the server performs in order to provide a remote user at a remote computer with access to a local computer network according to the invention are shown in FIG. 3.
Referring to FIG. 3, it is first necessary to set s up the connections by coupling a communication port of the remote access server to the telephone lines (step 52) and coupling a network port of the remote access server to the local computer network (step 54).
The server is now ready to receive a dial-in from a remote computer over the telephone lines and to communicate on the local network. After the remote access server is set-up, the remote user can cause the remote computer to dial-in and connect to the server over the telephone lines. The remote user then enters into the remote computer a unique user ID string which the remote computer sends to the server over the telephone lines. The user ID string uniquely identifies that remote user. The remote access server receives the user ID string from the communication port (step 56). An optional user authentication procedure may occur at this time where a user proves his or her identity by entering a password, by reference to an authentication server database, or by any other method (step 57). Once the remote user is authenticated, that remote user is granted access to the network (step 58).
Further authorization may occur in order for an authenticated user to become an authorized user and be granted access to specific network services. The remote access server then uses the received user ID
string to perform a look-up in the database of user ID
strings and IP addresses (step 59). The remote access server retrieves from the database the unique IP
address associated with the user ID string, if any (step 60). The remote access server then sends the R'O 96/05681 219 7 218 PCT~S95I08902 retrieved unique IP address to the remote computer via the communication port and the telephone lines (step 62). The remote access server then allows the remote computer to access the local computer network and to communicate on the network using the unique IP
address (step 64).
Table 1 below shows the database. A variety of other configurations can be employed for the database.
Also, the database can include different and/or additional parameters.
USER ID 1 ~ NAME1 IP ADDRESS
~ 1 ~ USER ID 2 ~ NAME2 IP ADDRESSa2 ~
USER ID 3 ~ NAME3 IP ADDRESS
~ 3 USER ID N' ~ NAME N ~ IP ADDRESS N
________________________________________ TABLE 1 - Database Remote User Information The data packets used in the remote access system according to the invention preferably are standard Internet protocol packets, although other data packet formats can be employed.
Referring now to FIG. 4, in one embodiment, the remote access server 16 includes electronics 38, a plurality of serial communication ports 401-40N, and a plurality of network ports 421-42N. The server 16 also can include a plurality of internal modems 441-44N.
The serial ports 40 and the network ports 42 are controlled by the electronics 38.
The electronics 38 include, in some embodiments, a powerful 16 MHz 68EC020 microprocessor and memory such as 1 megabyte of battery backed-up static random access memory (SRAM) and 64 kilobytes in an erasable programmable read only memory (EPROM).
Each of the serial communication ports 40 is for coupling with a communication device (e.g., the modem 26 of FIG. 1 ), or for coupling directly with the telephone lines 22, to provide for communication with a remote computer (e.g., the remote computer 12 of FIGS. 1 and 2) over the telephone lines 22. A connecting cable can be used to couple a serial port 40 with the communication device or with the telephone lines. Each of the serial ports 40 can simultaneously be coupled to a different one of the plurality of remote computers so as to provide simultaneous access to a local computer network for each of the remote computers, even if each of the remote computers employs a different protocol (e.g., IPX, TCP/IP, AppleTalk~TM~, NetBEUI~TM~, or 802.2/LLC). In some embodiments, the server 16 includes either four or eight serial ports 40, and each port 40 is a DB-25 asynchronous serial port which supports speeds of up to 57.6 kilobits per second (kbps). In some other embodiments, the server 16 includes four 57.6 kbps ports 40 with an internal V.32bis modem 44 associated with each, and four high-speed (115.2 kbps) serial ports 40 with no internal modem associated therewith. In some other embodiments, the server 16 includes a single port 40 for use with ARA.
Each of the network ports 42 is for coupling with a local computer network (e.g., the network 14 of FIGS. 1 and 2), via a connecting cable, to provide for communication with the network. Typically, the server 16 is connected to only one network during normal operation. In some embodiments, the server 16 includes three network ports 42, one for lOBaseT Ethernet, one for Thin Ethernet, and one for Thick Ethernet. In some other embodiments, the server 16 includes a single network port 42 for Token Ring~TM~. In some other embodiments, the server 16 includes a single network port 42 for use with Apple LocalTalk~TM~.
The remote access server 16 shown functionally in FIG.
4 can be contained in a housing similar to that shown in FIG.
2. The housing is less than or equal to about 1.7 by 17 by 10 inches. The housing can be made rack-mountable.
Other modifications and implementations will occur to those of ordinary skill in the art without departing from the spirit and the scope of the invention as claimed. Accordingly, the invention is to be defined not by the preceding illustrative description but instead by the following claims.
Referring to FIG. 1, in a remote access system 10, a remote computer 12 is allowed access to a local computer network 14 by a remote access server 16. As will be described in more detail later with reference to FIG. 4, the remote access server 16 is itself a powerful programmable computer.
In the disclosed embodiment, the remote access server 16 is a LanRover~TM~ which is available from Shiva Corporation of Burlington, Mass. A remote user 18 at the remote computer 12 initiates an attempt to gain access to the network 14 (and the network services and resources available thereon) via the remote access server 16 by entering a user identification (ID) string 20 into the remote computer 12. The user ID string is a predetermined code which uniquely identifies the remote user, and it typically is assigned to the remote user by a network manager who has central control of and responsibility for the network 14 and the maintenance thereof.
The user ID string 20 entered by the remote user 18 is sent by the remote computer 12 to the remote access server 16 over telephone lines 22. The term telephone lines 22 is used herein to mean any digital and/or analog communication link or links used to transmit voice and/or data including wireless links and cellular data links such as Cellular Digital Packet Data (CDPD). In the disclosed embodiment, a modem 24 is connected to the remote computer 12, and another modem 26 is connected to the remote access server 16. The modems 24, 26 allow the remote computer 12 and the remote access server 16 to communicate over the telephone lines 22. Note that the modem 26 connected to the remote access server 16 could be part of the WO 96/05681 219 7 218 pCTIUS95/08902 server 16 (e. g., included within the server housing), as indicated by the dotted-line box 28 enclosing the server 16 and the modem 26 connected thereto. Also note that the modems 24, 26 could be Integrated Services Digital Network (ISDN) terminal adapters if the telephone lines 22 are the ISDN, or the modems 24, 26 could be any of a variety of other switched-access devices.
The remote access server 16 receives the user ID
string 20 which was entered by the remote user 18 and sent by the remote computer 12. An optional user authentication procedure may occur at this time where a remote user proves his or her identity by entering a password, by reference to an authentication server database, or by any other method. Once the remote user is authenticated, that remote user is granted access to the network. Further authorization may occur in order for an authenticated user to become an authorized user and be granted access to specific network services. In any event, the server 16 uses the user ID string 20 to index into a database 30 and retrieve an Internet Protocol (IP) address associated with the user ID
string 20. With some protocols, such as the Transmission Control Protocol/Internet Protocol (TCP/IP), the remote computer 12 must have an IP
address in order to communicate on the network 14 and access the network services and resources available thereon. The database 30 can be resident in the remote access server 16, or it can be maintained on a node (e.g., a database server) on the network 14. The database 30 includes a unique user ID string for each remote user and a unique IP address for each user ID
string. The database 30 typically is maintained by a network manager who has central control of and WO 96105681 P~TIUS95108902 2i972i8 _$_ responsibility for the network 14 and the maintenance thereof. The network manager generally controls (e. g., has the authority and ability to define, add, and delete) remote user names, user ID strings, and IP
addresses.
After the remote access server 16 determines a unique IP address based on the user ID string 20 by referring to the database 30, the server 16 sends the unique IP address to the remote computer 12 via, for example, the modems 24, 26 and the telephone lines 22.
The remote computer 12 gains access to the network 14 through the remote access server 16 and uses the.IP
address to communicate with, and utilize the services and resources available on, the network 14.
The remote access server 16 will not allow a remote computer 12 to gain access to the network 14 unless the remote user 18 enters a valid user ID string 20 at that remote computer 12 . That is, if the remote access server 16 searches the database 30 but fails to find an IP address associated with the user ID string 20 which the remote user 18 entered at the remote computer 12 (because, for example, the user ID string is not in the database 30 at all or it is in the database 30 but there is no associated IP address listed in the database 30), the remote access server 16 will not transmit an IP address to the remote computer 12, and thus the remote computer 12 (and the remote user 18) will not be able to communicate on the network 14. In this situation, the remote access server 16 will not pass any data from the remote computer 12 or the remote user 18 on to the network 14.
The remote access server 16 thus ensures that each "authorized" remote user 18 receives the same, unique IP address every time that remote user 18 makes a R'O 96/05681 2 1 9 7 2 1 8 PCT/US95/08902 _ g remote access connection to the network 14 via the server 16, even though that remote user 18 may utilize a different remote computer 12 every time a remote access connection is made. A remote user 18 is "authorized" if his or her name, unique user ID string, and unique IP address are contained in the database 30.
Again, a network manager typically centrally controls and maintains the database 30 and its contents. By linking network access to the identity of the individual remote users, the remote access server 16 can effectively restrict network access to specific network services based on IP address.
The user authorization feature allows an authorized remote user's use of network services and resources to be tracked via IP address. That is, the remote access server 16 can keep a log of a particular remote user's network activities because (i) all data exchanged between the network 14 and the remote user's remote computer 12 passes through the server 16 and (ii) the IP address used by the remote user's remote computer 12 uniquely identifies the remote user 18. The server 16 typically will examine more of the data than just the IP address in order to determine exactly what network service or resource is being accessed by the authorized remote user 18. The remote access server 16 can keep the log in the database 30 or in any other storage location which can be on or off the network 14 (e.g., a tape or disk drive).
The remote access system 10 shown generally in FIG. 1 is shown in more detail in FIG. 2. Referring to FIG. 2, the remote computer 12 is a portable laptop computer. In general, the remote computer 12 can be any type of portable computer (e.g., a laptop or a notebook), workstation, or personal computer (e.g., an IBM~TM~ PC or compatible, an Apple Macintosh~TM~, or a Unix~TM~-based computer). The remote computer 12 generally must be able to function as a stand-alone computer system when not connected to a network, and as a full network node when it is dialed-in to the network 14 through the remote access server 16. For a remote Macintosh~TM~ system, it generally is preferred that the computer have a 25 MHz 68030 processor. For a remote PC system, it generally is preferred that the computer have at least a 25 MHz 486 processor.
The remote access system 10 described herein is not to be confused with a remote control system. In a remote control system, a remote user dials-in to the local network with his or her remote computer and takes control of a local computer on the network. Once the remote user's remote computer is connected to the local network in a remote control system, the remote user actually uses the local computer, not the remote computer. That is, only user-interface data (e.g., screen images and keyboard/mouse input) are transferred to the remote computer from the local computer; the remote computer acts as a dumb terminal in a remote control system.
A remote control system is very different from the remote access system 10. In the remote access system 10, the remote computer 12 must perform adequately by itself, with enough processing power, memory, and disk storage space to run (on the remote computer 12 itself) the remote user's chosen applications without relying upon the on-network communication speed which typically is much higher than the speed of the telephone line link 22. Some telephone lines 22 allow speeds of up to 57.6 kilobits per second whereas the local computer network 14 can operate in ranges from 1 to 100 megabits per second depending on the type of network. The local computer network 14 can be, for example, Ethernet or Token Ring~TM>.
The remote computer 12 typically will have a serial port 32 which is managed by a serial controller such as a 16550A serial controller chip which can receive or transmit up to sixteen characters without intervention from the central processing unit (CPU) of the remote computer 12. The modem 24 connected to the serial port 32 can be, for example, a V.32bis modem (14.4 kilobits per second) or an ISDN
terminal adapter. The other modem 26 (which is not shown in FIG. 2 because it is internal to the remote access server 16) is selected to operate properly given the telephone lines 22 employed and the modem 24 connected to the serial port 32.
The network services and resources available on the network 14 which the remote user 18 might access via the remote access server 16 can include, for example, a Notes Server 46, an E-Mail Server 48, and a Database Server 50.
The Database Server SO can be used to maintain the database 30 of user names, user ID strings, and IP addresses which was described previously with reference to FIG. 1.
The remote computer 12 can be loaded with network application software 34 and remote access client software 36.
The remote access client software 36 can allow, as a relevant example, a Unix~TM~-based computer to use a standard Point-to-Point Protocol (PPP) implementation, and a PC-based computer to use any standard (if any) or vendor-supplied remote access clients. A remote access client includes a "dialer" which establishes and terminates the remote access connection .and a "driver" which interfaces with the network protocol stacks and the serial port 32 to send and receive network data. The remote access client can operate with a variety of protocols including IPX, TCP/IP, NetBEUI~TM~, LLC/802.2, and AppleTalk~TM~. NovelltTM~'s IPX
is the native protocol for NetWare~TM~. TCP/IP is widely used in Unix-based systems and client-server databases, and TCP/IP also is becoming standard for many other applications. NetBEUI~TM~ is used for LAN Manager and Microsoft~TM~'s. Windows for Workgroups~T"'~ . LLCJ802.2 is for IBM LAN Server and host connectivity. The combination of AppleTalk~TM~ and TCP/IP covers almost all Macintosh~TM~
applications.
The performance of the remote access server 16 is primarily determined by the ability to move data through its serial ports (shown in FIG. 4 but not in FIG. 2) without much attention from its CPU (also shown in FIG. 4 but not in FIG.
2). The performance of the server 16 also is determined by its CPU's ability to perform the routing, filtering, IP address tracking, etc. that the CPU must do without adding undue delays as it forwards data packets. The server 16 thus has generally been optimized for serial port throughput and general CPU power. Because the server 16 must be highly reliable and efficient, it includes solid-state, non-volatile storage for the controlling software. The software is upgradeable via downloading from the network 14 to the server 16. The network manager can perform any upgrades.
The software in the remote access server 16 causes the server 16 to perform the various functions described herein, although it should be noted that it is possible to use dedicated electronic hardware to perform all server functionality described herein. The steps which the server performs in order to provide a remote user at a remote computer with access to a local computer network according to the invention are shown in FIG. 3.
Referring to FIG. 3, it is first necessary to set s up the connections by coupling a communication port of the remote access server to the telephone lines (step 52) and coupling a network port of the remote access server to the local computer network (step 54).
The server is now ready to receive a dial-in from a remote computer over the telephone lines and to communicate on the local network. After the remote access server is set-up, the remote user can cause the remote computer to dial-in and connect to the server over the telephone lines. The remote user then enters into the remote computer a unique user ID string which the remote computer sends to the server over the telephone lines. The user ID string uniquely identifies that remote user. The remote access server receives the user ID string from the communication port (step 56). An optional user authentication procedure may occur at this time where a user proves his or her identity by entering a password, by reference to an authentication server database, or by any other method (step 57). Once the remote user is authenticated, that remote user is granted access to the network (step 58).
Further authorization may occur in order for an authenticated user to become an authorized user and be granted access to specific network services. The remote access server then uses the received user ID
string to perform a look-up in the database of user ID
strings and IP addresses (step 59). The remote access server retrieves from the database the unique IP
address associated with the user ID string, if any (step 60). The remote access server then sends the R'O 96/05681 219 7 218 PCT~S95I08902 retrieved unique IP address to the remote computer via the communication port and the telephone lines (step 62). The remote access server then allows the remote computer to access the local computer network and to communicate on the network using the unique IP
address (step 64).
Table 1 below shows the database. A variety of other configurations can be employed for the database.
Also, the database can include different and/or additional parameters.
USER ID 1 ~ NAME1 IP ADDRESS
~ 1 ~ USER ID 2 ~ NAME2 IP ADDRESSa2 ~
USER ID 3 ~ NAME3 IP ADDRESS
~ 3 USER ID N' ~ NAME N ~ IP ADDRESS N
________________________________________ TABLE 1 - Database Remote User Information The data packets used in the remote access system according to the invention preferably are standard Internet protocol packets, although other data packet formats can be employed.
Referring now to FIG. 4, in one embodiment, the remote access server 16 includes electronics 38, a plurality of serial communication ports 401-40N, and a plurality of network ports 421-42N. The server 16 also can include a plurality of internal modems 441-44N.
The serial ports 40 and the network ports 42 are controlled by the electronics 38.
The electronics 38 include, in some embodiments, a powerful 16 MHz 68EC020 microprocessor and memory such as 1 megabyte of battery backed-up static random access memory (SRAM) and 64 kilobytes in an erasable programmable read only memory (EPROM).
Each of the serial communication ports 40 is for coupling with a communication device (e.g., the modem 26 of FIG. 1 ), or for coupling directly with the telephone lines 22, to provide for communication with a remote computer (e.g., the remote computer 12 of FIGS. 1 and 2) over the telephone lines 22. A connecting cable can be used to couple a serial port 40 with the communication device or with the telephone lines. Each of the serial ports 40 can simultaneously be coupled to a different one of the plurality of remote computers so as to provide simultaneous access to a local computer network for each of the remote computers, even if each of the remote computers employs a different protocol (e.g., IPX, TCP/IP, AppleTalk~TM~, NetBEUI~TM~, or 802.2/LLC). In some embodiments, the server 16 includes either four or eight serial ports 40, and each port 40 is a DB-25 asynchronous serial port which supports speeds of up to 57.6 kilobits per second (kbps). In some other embodiments, the server 16 includes four 57.6 kbps ports 40 with an internal V.32bis modem 44 associated with each, and four high-speed (115.2 kbps) serial ports 40 with no internal modem associated therewith. In some other embodiments, the server 16 includes a single port 40 for use with ARA.
Each of the network ports 42 is for coupling with a local computer network (e.g., the network 14 of FIGS. 1 and 2), via a connecting cable, to provide for communication with the network. Typically, the server 16 is connected to only one network during normal operation. In some embodiments, the server 16 includes three network ports 42, one for lOBaseT Ethernet, one for Thin Ethernet, and one for Thick Ethernet. In some other embodiments, the server 16 includes a single network port 42 for Token Ring~TM~. In some other embodiments, the server 16 includes a single network port 42 for use with Apple LocalTalk~TM~.
The remote access server 16 shown functionally in FIG.
4 can be contained in a housing similar to that shown in FIG.
2. The housing is less than or equal to about 1.7 by 17 by 10 inches. The housing can be made rack-mountable.
Other modifications and implementations will occur to those of ordinary skill in the art without departing from the spirit and the scope of the invention as claimed. Accordingly, the invention is to be defined not by the preceding illustrative description but instead by the following claims.
Claims (19)
1. A method for providing a remote user with access to a computer network, comprising:
receiving a user identification string from a communication port, the string having been entered by the remote user at a remote computer which is coupled to the communication port, the string uniquely identifying the remote user;
using the user identification string to access a database and retrieve a unique Internet protocol (IP) address associated with the user identification string, the remote computer needing the IP address to communicate on the computer network, the database including a unique user identification string for each remote user and a unique IP address for each user identification string such that the same unique IP address is retrieved every time a particular remote user enters the user identification string uniquely identifying that remote user;
sending the IP address to the remote computer via the communication port;
and allowing the remote computer to access the computer network and to communicate on the computer network using the IP address.
receiving a user identification string from a communication port, the string having been entered by the remote user at a remote computer which is coupled to the communication port, the string uniquely identifying the remote user;
using the user identification string to access a database and retrieve a unique Internet protocol (IP) address associated with the user identification string, the remote computer needing the IP address to communicate on the computer network, the database including a unique user identification string for each remote user and a unique IP address for each user identification string such that the same unique IP address is retrieved every time a particular remote user enters the user identification string uniquely identifying that remote user;
sending the IP address to the remote computer via the communication port;
and allowing the remote computer to access the computer network and to communicate on the computer network using the IP address.
2. The method of claim 1 further comprising maintaining the database.
3. The method of claim 1 further comprising coupling a communication device to the communication port for communicating with the remote computer.
4. The method of claim 3 wherein the communication port is a serial port.
5. The method of claim 4 wherein the communication 2 device is a modem.
6. A method for providing a remote user with access to a computer network, comprising:
providing a communication port to provide for communication with a remote computer;
coupling a network port to the computer network to provide for communication with the computer network, the remote computer needing an Internet protocol (IP) address to communicate on the computer network;
receiving from the communication port a user identification string which was entered by the remote user at the remote computer and which uniquely identifies the remote user;
using the unique user identification string to access a database and retrieve a unique IP address associated with the user identification string, the database including a unique user identification string for each remote user and a unique IP address for each user identification string such that the same unique IP address is retrieved every time a particular remote user enters the user identification string uniquely identifying that remote user;
sending the IP address to the remote computer via the communication port;
and allowing the remote computer to access the computer network and to communicate on the computer network using the IP address.
providing a communication port to provide for communication with a remote computer;
coupling a network port to the computer network to provide for communication with the computer network, the remote computer needing an Internet protocol (IP) address to communicate on the computer network;
receiving from the communication port a user identification string which was entered by the remote user at the remote computer and which uniquely identifies the remote user;
using the unique user identification string to access a database and retrieve a unique IP address associated with the user identification string, the database including a unique user identification string for each remote user and a unique IP address for each user identification string such that the same unique IP address is retrieved every time a particular remote user enters the user identification string uniquely identifying that remote user;
sending the IP address to the remote computer via the communication port;
and allowing the remote computer to access the computer network and to communicate on the computer network using the IP address.
7. The method of claim 6 further comprising coupling a plurality of communication ports such that a plurality of remote computers are provided simultaneous access to the local computer network after each remote computer is sent an IP address.
8. The method of claim 6 further comprising maintaining the database.
9. The method of claim 6 further comprising coupling a communication device to the communication port for communicating with the remote computer.
10. The method of claim 9 wherein the communication port is a serial port.
11. The method of claim 10 wherein the communication device is a modem.
12. A server for providing a remote user with access to a computer network, comprising:
at least one communication port to provide for communication with a remote computer;
at least one network port for coupling to the computer network to provide for communication with the computer network, the remote computer needing an Internet protocol (IP) address to communicate on the computer network; and processing electronics for:
controlling the communication port and the network port, receiving from the communication port a user identification string which was entered by the remote user at the remote computer and which uniquely identifies the remote user, using the user identification string to access a database and retrieve a unique IP address associated with the user identification string, the database including a unique user identification string for each remote user and a unique IP address for each user identification string such that the same unique IP address is retrieved every time a particular remote user enters the user identification string uniquely identifying that remote user, sending the IP address to the remote computer via the communication port, and allowing the remote computer to access the computer network through the server and to communicate on the computer network using the IP address.
at least one communication port to provide for communication with a remote computer;
at least one network port for coupling to the computer network to provide for communication with the computer network, the remote computer needing an Internet protocol (IP) address to communicate on the computer network; and processing electronics for:
controlling the communication port and the network port, receiving from the communication port a user identification string which was entered by the remote user at the remote computer and which uniquely identifies the remote user, using the user identification string to access a database and retrieve a unique IP address associated with the user identification string, the database including a unique user identification string for each remote user and a unique IP address for each user identification string such that the same unique IP address is retrieved every time a particular remote user enters the user identification string uniquely identifying that remote user, sending the IP address to the remote computer via the communication port, and allowing the remote computer to access the computer network through the server and to communicate on the computer network using the IP address.
13. The server of claim 12 further comprising a plurality of communication ports such that a plurality of remote computers are provided simultaneous access to the local computer network through the server after each remote computer is sent an IP address.
14. The server of claim 12 wherein the processing electronics includes a microprocessor and memory.
15. The server of claim 12 wherein the database is maintained internally by the server.
16. The server of claim 12 wherein the database is maintained on the local computer network and external from the server.
17. The server of claim 12 further comprising a communication device coupled to the communication port for communicating with the remote computer.
18. The server of claim 17 wherein the communication port is a serial port.
19. The server of claim 18 wherein the communication device is a modem.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/287,775 US5598536A (en) | 1994-08-09 | 1994-08-09 | Apparatus and method for providing remote users with the same unique IP address upon each network access |
US08/287,775 | 1994-08-09 | ||
PCT/US1995/008902 WO1996005681A1 (en) | 1994-08-09 | 1995-07-14 | Apparatus and method for accessing a local computer network |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2197218A1 CA2197218A1 (en) | 1996-02-22 |
CA2197218C true CA2197218C (en) | 2005-10-11 |
Family
ID=23104296
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002197218A Expired - Lifetime CA2197218C (en) | 1994-08-09 | 1995-07-14 | Apparatus and method for accessing a local computer network |
Country Status (6)
Country | Link |
---|---|
US (1) | US5598536A (en) |
EP (1) | EP0775411B1 (en) |
AU (1) | AU3009695A (en) |
CA (1) | CA2197218C (en) |
DE (1) | DE69524104T2 (en) |
WO (1) | WO1996005681A1 (en) |
Families Citing this family (269)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020091850A1 (en) * | 1992-10-23 | 2002-07-11 | Cybex Corporation | System and method for remote monitoring and operation of personal computers |
US6678284B1 (en) * | 1994-03-11 | 2004-01-13 | Utstarcom, Inc. | Communication access chassis with general purpose computing platform |
JP3454931B2 (en) * | 1994-08-30 | 2003-10-06 | 株式会社東芝 | Network system |
DE4438522C2 (en) * | 1994-10-31 | 1997-08-21 | Ibm | Device for the transmission of data streams in data communication networks |
US5764918A (en) * | 1995-01-23 | 1998-06-09 | Poulter; Vernon C. | Communications node for transmitting data files over telephone networks |
US7702540B1 (en) * | 1995-04-26 | 2010-04-20 | Ebay Inc. | Computer-implement method and system for conducting auctions on the internet |
US7937312B1 (en) | 1995-04-26 | 2011-05-03 | Ebay Inc. | Facilitating electronic commerce transactions through binding offers |
AU702912B2 (en) * | 1995-05-08 | 1999-03-11 | Cranberry Properties, Llc | System for electronic messaging via wireless devices |
US5812819A (en) * | 1995-06-05 | 1998-09-22 | Shiva Corporation | Remote access apparatus and method which allow dynamic internet protocol (IP) address management |
US7272639B1 (en) | 1995-06-07 | 2007-09-18 | Soverain Software Llc | Internet server access control and monitoring systems |
US5721842A (en) * | 1995-08-25 | 1998-02-24 | Apex Pc Solutions, Inc. | Interconnection system for viewing and controlling remotely connected computers with on-screen video overlay for controlling of the interconnection switch |
US5884323A (en) * | 1995-10-13 | 1999-03-16 | 3Com Corporation | Extendible method and apparatus for synchronizing files on two different computer systems |
US5727202A (en) | 1995-10-18 | 1998-03-10 | Palm Computing, Inc. | Method and apparatus for synchronizing information on two different computer systems |
US6301339B1 (en) | 1995-11-15 | 2001-10-09 | Data Race, Inc. | System and method for providing a remote user with a virtual presence to an office |
US5764639A (en) * | 1995-11-15 | 1998-06-09 | Staples; Leven E. | System and method for providing a remote user with a virtual presence to an office |
JP3876452B2 (en) * | 1995-12-18 | 2007-01-31 | ソニー株式会社 | Call system and call method |
CA2216533C (en) * | 1995-12-19 | 2002-05-07 | Motorola, Inc. | Method and apparatus for rate governing communications |
US5870550A (en) * | 1996-02-26 | 1999-02-09 | Network Engineering Software | Web server employing multi-homed, moldular framework |
US8117298B1 (en) | 1996-02-26 | 2012-02-14 | Graphon Corporation | Multi-homed web server |
US6324264B1 (en) | 1996-03-15 | 2001-11-27 | Telstra Corporation Limited | Method of establishing a communications call |
US5684951A (en) * | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system |
DE59610895D1 (en) * | 1996-04-17 | 2004-02-19 | Siemens Ag | Control device in the intelligent network |
US5881236A (en) * | 1996-04-26 | 1999-03-09 | Hewlett-Packard Company | System for installation of software on a remote computer system over a network using checksums and password protection |
US5806005A (en) * | 1996-05-10 | 1998-09-08 | Ricoh Company, Ltd. | Wireless image transfer from a digital still video camera to a networked computer |
KR970075417A (en) * | 1996-05-13 | 1997-12-10 | 이노우에 히로시 | Magnetic bearing device |
US5812780A (en) * | 1996-05-24 | 1998-09-22 | Microsoft Corporation | Method, system, and product for assessing a server application performance |
US5805442A (en) * | 1996-05-30 | 1998-09-08 | Control Technology Corporation | Distributed interface architecture for programmable industrial control systems |
US7146408B1 (en) | 1996-05-30 | 2006-12-05 | Schneider Automation Inc. | Method and system for monitoring a controller and displaying data from the controller in a format provided by the controller |
US6058433A (en) * | 1996-07-23 | 2000-05-02 | Gateway 2000, Inc. | System and method for providing increased throughput through a computer serial port to a modem communications port |
US5854901A (en) * | 1996-07-23 | 1998-12-29 | Cisco Systems, Inc. | Method and apparatus for serverless internet protocol address discovery using source address of broadcast or unicast packet |
US6456308B1 (en) | 1996-08-08 | 2002-09-24 | Agranat Systems, Inc. | Embedded web server |
US5973696A (en) * | 1996-08-08 | 1999-10-26 | Agranat Systems, Inc. | Embedded web server |
EP0823803A1 (en) | 1996-08-09 | 1998-02-11 | Landis & Gyr Technology Innovation AG | Arrangement for accessing a device connected to a local area network via a public network |
EP0825506B1 (en) * | 1996-08-20 | 2013-03-06 | Invensys Systems, Inc. | Methods and apparatus for remote process control |
US6023563A (en) * | 1996-08-20 | 2000-02-08 | Shani; Ron | Networking switch having the network presence of a bridge |
US6295357B1 (en) | 1996-09-06 | 2001-09-25 | Data Race, Inc. | System and method for ringing other subscriber telephones connected to a telephone line during data communications on the telephone line |
US6061650A (en) * | 1996-09-10 | 2000-05-09 | Nortel Networks Corporation | Method and apparatus for transparently providing mobile network functionality |
US5948061A (en) * | 1996-10-29 | 1999-09-07 | Double Click, Inc. | Method of delivery, targeting, and measuring advertising over networks |
US8454432B2 (en) * | 1996-11-14 | 2013-06-04 | Agincourt Gaming, Llc | Method for providing network gaming system |
US8821258B2 (en) * | 1996-11-14 | 2014-09-02 | Agincourt Gaming, Llc | Method for providing games over a wide area network |
US6091737A (en) | 1996-11-15 | 2000-07-18 | Multi-Tech Systems, Inc. | Remote communications server system |
US6578146B2 (en) * | 1996-11-19 | 2003-06-10 | R. Brent Johnson | System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol |
US6167440A (en) * | 1996-11-19 | 2000-12-26 | Fujitsu Limited | Communication startup processing system |
US5852717A (en) * | 1996-11-20 | 1998-12-22 | Shiva Corporation | Performance optimizations for computer networks utilizing HTTP |
US5884024A (en) * | 1996-12-09 | 1999-03-16 | Sun Microsystems, Inc. | Secure DHCP server |
US20060195595A1 (en) | 2003-12-19 | 2006-08-31 | Mendez Daniel J | System and method for globally and securely accessing unified information in a computer network |
US6678683B1 (en) | 1996-12-27 | 2004-01-13 | Canon Kabushiki Kaisha | Document management system using an access-limited character train and password, and a method and computer-readable medium therefor |
JP3566478B2 (en) * | 1996-12-27 | 2004-09-15 | キヤノン株式会社 | Document security management system, document security management method, and document search device |
US7206815B1 (en) | 1997-01-29 | 2007-04-17 | Palmsource Inc. | Method and apparatus for synchronizing an email client on a portable computer system with an email client on a desktop computer |
US6401112B1 (en) | 1997-01-29 | 2002-06-04 | Palm, Inc. | Method and apparatus for synchronizing an Email client on a portable computer system with an Email client on a desktop computer |
US6006274A (en) * | 1997-01-30 | 1999-12-21 | 3Com Corporation | Method and apparatus using a pass through personal computer connected to both a local communication link and a computer network for indentifying and synchronizing a preferred computer with a portable computer |
CA2283964C (en) | 1997-03-12 | 2008-05-06 | Nomadix, Llc | Nomadic translator or router |
US6278705B1 (en) | 1997-04-08 | 2001-08-21 | 3Com Corporation | Integrated architecture to support a single system image across multiple network access servers |
US6147987A (en) * | 1997-04-08 | 2000-11-14 | 3Com Corporation | Supporting load sharing across multiple network access servers |
US6026085A (en) | 1997-04-08 | 2000-02-15 | 3Com Corporation | Architecture to support a single system image across multiple network access servers |
US5958007A (en) | 1997-05-13 | 1999-09-28 | Phase Three Logic, Inc. | Automatic and secure system for remote access to electronic mail and the internet |
DE19719955C2 (en) * | 1997-05-14 | 2000-09-14 | Deutsche Telekom Mobil | Procedure for the accessibility of subscribers in a radio communication system |
US5974463A (en) * | 1997-06-09 | 1999-10-26 | Compaq Computer Corporation | Scaleable network system for remote access of a local network |
US6088728A (en) * | 1997-06-11 | 2000-07-11 | Oracle Corporation | System using session data stored in session data storage for associating and disassociating user identifiers for switching client sessions in a server |
US6243751B1 (en) * | 1997-06-11 | 2001-06-05 | Oracle Corporation | Method and apparatus for coupling clients to servers |
WO1998058334A1 (en) * | 1997-06-16 | 1998-12-23 | Doubleclick Inc. | Method and apparatus for automatic placement of advertising |
US6560220B2 (en) * | 1997-06-20 | 2003-05-06 | Telefonaktiebolaget L M Ericsson (Publ) | Network access device and telecommunications signaling |
FI117366B (en) | 1997-06-30 | 2006-09-15 | Sonera Smarttrust Oy | A method of establishing a secure service connection in a telecommunication system |
US6393483B1 (en) * | 1997-06-30 | 2002-05-21 | Adaptec, Inc. | Method and apparatus for network interface card load balancing and port aggregation |
US5870465A (en) * | 1997-08-21 | 1999-02-09 | Data Race, Inc. | Telephony adapter system for providing a user with a virtual presence to an office |
US6282454B1 (en) | 1997-09-10 | 2001-08-28 | Schneider Automation Inc. | Web interface to a programmable controller |
US20020152289A1 (en) * | 1997-09-10 | 2002-10-17 | Schneider Automation Inc. | System and method for accessing devices in a factory automation network |
US6732191B1 (en) | 1997-09-10 | 2004-05-04 | Schneider Automation Inc. | Web interface to an input/output device |
US7035898B1 (en) | 1997-09-10 | 2006-04-25 | Schneider Automation Inc. | System for programming a factory automation device using a web browser |
US7058693B1 (en) | 1997-09-10 | 2006-06-06 | Schneider Automation Inc. | System for programming a programmable logic controller using a web browser |
US6151625A (en) * | 1997-09-10 | 2000-11-21 | Schneider Automation Inc. | Internet web interface including programmable logic controller for controlling output devices based on status of input devices |
US6587884B1 (en) | 1997-09-10 | 2003-07-01 | Schneider Automation, Inc. | Dual ethernet protocol stack for maximum speed access to a programmable logic controller (PLC) |
US20020091784A1 (en) * | 1997-09-10 | 2002-07-11 | Baker Richard A. | Web interface to a device and an electrical network control system |
US6013107A (en) * | 1997-10-06 | 2000-01-11 | International Business Machines Corporation | Dynamic mapping of user id into TCP/IP address without user interaction as user signing on or singing off among workstations |
US6128661A (en) * | 1997-10-24 | 2000-10-03 | Microsoft Corporation | Integrated communications architecture on a mobile device |
US6496979B1 (en) | 1997-10-24 | 2002-12-17 | Microsoft Corporation | System and method for managing application installation for a mobile device |
US6272545B1 (en) | 1997-10-24 | 2001-08-07 | Microsoft Corporation | System and method for interaction between one or more desktop computers and one or more mobile devices |
DE19747583B4 (en) | 1997-10-28 | 2006-04-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Communication system and method |
US6359892B1 (en) * | 1997-11-04 | 2002-03-19 | Inventions, Inc. | Remote access, emulation, and control of office equipment, devices and services |
IL132888A0 (en) | 1999-11-11 | 2001-03-19 | Surf Comm Solutions Ltd | Channel load balancing |
US6563821B1 (en) | 1997-11-14 | 2003-05-13 | Multi-Tech Systems, Inc. | Channel bonding in a remote communications server system |
US6216159B1 (en) * | 1997-11-25 | 2001-04-10 | International Business Machines Corporation | Method and system for IP address accessibility to server applications |
JP3882182B2 (en) * | 1997-11-27 | 2007-02-14 | 富士フイルムホールディングス株式会社 | Image display device, camera, and image communication system |
US6157950A (en) * | 1997-12-05 | 2000-12-05 | Encanto Networks, Inc. | Methods and apparatus for interfacing a computer or small network to a wide area network such as the internet |
US6618366B1 (en) * | 1997-12-05 | 2003-09-09 | The Distribution Systems Research Institute | Integrated information communication system |
JPH11177593A (en) * | 1997-12-08 | 1999-07-02 | Yazaki Corp | Address setting method and communication system to which the method is applied |
US6032162A (en) * | 1998-01-08 | 2000-02-29 | Burke; Alexander James | System for processing and storing internet bookmark address links |
US9900305B2 (en) * | 1998-01-12 | 2018-02-20 | Soverain Ip, Llc | Internet server access control and monitoring systems |
GB2333670B (en) | 1998-01-19 | 2003-02-12 | Ericsson Telefon Ab L M | Address allocation |
US6038597A (en) * | 1998-01-20 | 2000-03-14 | Dell U.S.A., L.P. | Method and apparatus for providing and accessing data at an internet site |
JPH11212934A (en) * | 1998-01-23 | 1999-08-06 | Sony Corp | Information processing device and method and information supply medium |
US20020059468A1 (en) * | 1999-11-18 | 2002-05-16 | Freeny Charles C. | Split personal computer system |
US6205448B1 (en) | 1998-01-30 | 2001-03-20 | 3Com Corporation | Method and apparatus of synchronizing two computer systems supporting multiple synchronization techniques |
US6373847B1 (en) * | 1998-02-03 | 2002-04-16 | Nortel Networks Limited | Computer telephony integration server with dial-up network access |
US6034686A (en) * | 1998-03-09 | 2000-03-07 | 3Com Corporation | Collapsing event display for small screen computer |
US7162510B2 (en) * | 1998-03-16 | 2007-01-09 | Schneider Automation Inc. | Communication system for a control system over Ethernet and IP networks |
US6473422B2 (en) | 1998-04-27 | 2002-10-29 | Telefonaktiebolaget Lm Ericsson | Communications network and method for screening incoming circuit switched calls |
US6779019B1 (en) * | 1998-05-29 | 2004-08-17 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device |
US7209949B2 (en) * | 1998-05-29 | 2007-04-24 | Research In Motion Limited | System and method for synchronizing information between a host system and a mobile data communication device |
US6438585B2 (en) | 1998-05-29 | 2002-08-20 | Research In Motion Limited | System and method for redirecting message attachments between a host system and a mobile data communication device |
US20020049818A1 (en) * | 1998-05-29 | 2002-04-25 | Gilhuly Barry J. | System and method for pushing encrypted information between a host system and a mobile data communication device |
US6219694B1 (en) | 1998-05-29 | 2001-04-17 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device having a shared electronic address |
US7025209B2 (en) | 1998-05-29 | 2006-04-11 | Palmsource, Inc. | Method and apparatus for wireless internet access |
US6253326B1 (en) | 1998-05-29 | 2001-06-26 | Palm, Inc. | Method and system for secure communications |
US6343318B1 (en) | 1998-05-29 | 2002-01-29 | Palm, Inc. | Method and apparatus for communicating information over low bandwidth communications networks |
US6397259B1 (en) | 1998-05-29 | 2002-05-28 | Palm, Inc. | Method, system and apparatus for packet minimized communications |
US8516055B2 (en) * | 1998-05-29 | 2013-08-20 | Research In Motion Limited | System and method for pushing information from a host system to a mobile data communication device in a wireless data network |
US6463463B1 (en) | 1998-05-29 | 2002-10-08 | Research In Motion Limited | System and method for pushing calendar event messages from a host system to a mobile data communication device |
US7606936B2 (en) * | 1998-05-29 | 2009-10-20 | Research In Motion Limited | System and method for redirecting data to a wireless device over a plurality of communication paths |
US7209955B1 (en) | 1998-05-29 | 2007-04-24 | Research In Motion Limited | Notification system and method for a mobile data communication device |
US7266365B2 (en) * | 1998-05-29 | 2007-09-04 | Research In Motion Limited | System and method for delayed transmission of bundled command messages |
WO2000008802A2 (en) * | 1998-08-03 | 2000-02-17 | Doubleclick Inc. | Network for distribution of re-targeted advertising |
US6633905B1 (en) * | 1998-09-22 | 2003-10-14 | Avocent Huntsville Corporation | System and method for accessing and operating personal computers remotely |
US6167383A (en) * | 1998-09-22 | 2000-12-26 | Dell Usa, Lp | Method and apparatus for providing customer configured machines at an internet site |
US20060069657A1 (en) * | 1998-10-01 | 2006-03-30 | Freeny Charles C Jr | Multiple customer and multiple location PC service provider system |
US6434157B1 (en) | 1998-10-06 | 2002-08-13 | Schneider Automation, Inc. | MODBUS plus ethernet bridge |
US6233626B1 (en) | 1998-10-06 | 2001-05-15 | Schneider Automation Inc. | System for a modular terminal input/output interface for communicating messaging application layer over encoded ethernet to transport layer |
US9239763B2 (en) | 2012-09-28 | 2016-01-19 | Oracle International Corporation | Container database |
US6253327B1 (en) * | 1998-12-02 | 2001-06-26 | Cisco Technology, Inc. | Single step network logon based on point to point protocol |
US8266266B2 (en) | 1998-12-08 | 2012-09-11 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization, authentication and accounting |
US7194554B1 (en) | 1998-12-08 | 2007-03-20 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization authentication and accounting |
US8713641B1 (en) | 1998-12-08 | 2014-04-29 | Nomadix, Inc. | Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device |
US6763007B1 (en) | 1998-12-11 | 2004-07-13 | Lucent Technologies Inc. | Two phase local mobility scheme for wireless access to packet based networks |
US7239618B1 (en) | 1998-12-11 | 2007-07-03 | Lucent Technologies Inc. | Single phase local mobility scheme for wireless access to packet-based networks |
US6434134B1 (en) | 1998-12-11 | 2002-08-13 | Lucent Technologies, Inc. | Dynamic address assignment for wireless devices accessing packet-based wired networks |
US6654359B1 (en) | 1998-12-11 | 2003-11-25 | Lucent Technologies Inc. | Wireless access to packet-based networks |
US6496505B2 (en) | 1998-12-11 | 2002-12-17 | Lucent Technologies Inc. | Packet tunneling optimization to wireless devices accessing packet-based wired networks |
US6341312B1 (en) * | 1998-12-16 | 2002-01-22 | International Business Machines Corporation | Creating and managing persistent connections |
US6826692B1 (en) * | 1998-12-23 | 2004-11-30 | Computer Associates Think, Inc. | Method and apparatus to permit automated server determination for foreign system login |
US6853867B1 (en) | 1998-12-30 | 2005-02-08 | Schneider Automation Inc. | Interface to a programmable logic controller |
US6845401B1 (en) | 1998-12-30 | 2005-01-18 | Schneider Automation Inc. | Embedded file system for a programmable logic controller |
US6327511B1 (en) | 1998-12-30 | 2001-12-04 | Schneider Automation, Inc. | Input/output (I/O) scanner for a control system with peer determination |
US6466571B1 (en) * | 1999-01-19 | 2002-10-15 | 3Com Corporation | Radius-based mobile internet protocol (IP) address-to-mobile identification number mapping for wireless communication |
US6591306B1 (en) | 1999-04-01 | 2003-07-08 | Nec Corporation | IP network access for portable devices |
US6486892B1 (en) * | 1999-04-07 | 2002-11-26 | Joseph L. Stern | System and method for accessing, manipulating and viewing internet and non-internet related information and for controlling networked devices |
US7012600B2 (en) * | 1999-04-30 | 2006-03-14 | E Ink Corporation | Methods for driving bistable electro-optic displays, and apparatus for use therein |
US7089530B1 (en) * | 1999-05-17 | 2006-08-08 | Invensys Systems, Inc. | Process control configuration system with connection validation and configuration |
AU5025600A (en) * | 1999-05-17 | 2000-12-05 | Foxboro Company, The | Process control configuration system with parameterized objects |
US6754885B1 (en) | 1999-05-17 | 2004-06-22 | Invensys Systems, Inc. | Methods and apparatus for controlling object appearance in a process control configuration system |
US6496511B1 (en) * | 1999-05-21 | 2002-12-17 | 3Com Corporation | Method for preserving preassigned IP addresses in a remote access server |
US6360272B1 (en) * | 1999-05-28 | 2002-03-19 | Palm, Inc. | Method and apparatus for maintaining a unified view of multiple mailboxes |
US6389572B1 (en) | 1999-05-28 | 2002-05-14 | Palm, Inc. | Method of extracting bits from modulated waveforms |
US6501995B1 (en) | 1999-06-30 | 2002-12-31 | The Foxboro Company | Process control system and method with improved distribution, installation and validation of components |
US6788980B1 (en) * | 1999-06-11 | 2004-09-07 | Invensys Systems, Inc. | Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network |
WO2001009690A1 (en) | 1999-07-29 | 2001-02-08 | The Foxboro Company | Methods and apparatus for object-based process control |
WO2001014989A1 (en) * | 1999-08-23 | 2001-03-01 | 3Com Corporation | Architecture for a network management service which identifies and locates users and/or devices within an enterprise network |
US6711610B1 (en) | 1999-09-10 | 2004-03-23 | International Business Machines Corporation | System and method for establishing secure internet communication between a remote computer and a host computer via an intermediate internet computer |
US8190708B1 (en) | 1999-10-22 | 2012-05-29 | Nomadix, Inc. | Gateway device having an XML interface and associated method |
US6675193B1 (en) * | 1999-10-29 | 2004-01-06 | Invensys Software Systems | Method and system for remote control of a local system |
US6832321B1 (en) * | 1999-11-02 | 2004-12-14 | America Online, Inc. | Public network access server having a user-configurable firewall |
US7257642B1 (en) * | 1999-11-11 | 2007-08-14 | Surp Communication Solutions Ltd. | Channel load balancing |
US6473660B1 (en) | 1999-12-03 | 2002-10-29 | The Foxboro Company | Process control system and method with automatic fault avoidance |
US7424444B1 (en) | 1999-12-20 | 2008-09-09 | Dell Usa, L.P. | Apparatus and method for configuring computers |
US7007080B2 (en) * | 1999-12-23 | 2006-02-28 | Solution Inc Limited | System for reconfiguring and registering a new IP address for a computer to access a different network without user intervention |
AU2774901A (en) * | 2000-01-06 | 2001-07-16 | L90, Inc. | Method and apparatus for selecting and delivering internet based advertising |
AU2001250201A1 (en) * | 2000-04-10 | 2001-10-23 | Research In Motion Limited | System and method for bundling information |
JP2001309053A (en) * | 2000-04-26 | 2001-11-02 | Nec Corp | Ip address assigning system and its processing method |
US6996839B1 (en) * | 2000-04-29 | 2006-02-07 | Sony Corporation | Authorized user system using biological signature |
US7181487B1 (en) | 2000-07-07 | 2007-02-20 | Schneider Automation Inc. | Method and system for transmitting and activating an application requesting human intervention in an automation network |
US7032029B1 (en) | 2000-07-07 | 2006-04-18 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
US7519737B2 (en) * | 2000-07-07 | 2009-04-14 | Schneider Automation Inc. | Input/output (I/O) scanner for a control system with peer determination |
KR100729779B1 (en) * | 2000-07-26 | 2007-06-20 | 삼성전자주식회사 | Method for analysing of an intellectual property information and system for performing the same |
US20020167967A1 (en) * | 2000-09-06 | 2002-11-14 | Schneider Electric | Method for managing bandwidth on an ethernet network |
US7028204B2 (en) * | 2000-09-06 | 2006-04-11 | Schneider Automation Inc. | Method and apparatus for ethernet prioritized device clock synchronization |
US7356347B1 (en) * | 2000-09-28 | 2008-04-08 | Palmsource, Inc. | Efficient discovery of devices in a bluetooth environment |
KR100402981B1 (en) * | 2000-09-29 | 2003-10-22 | 엘지전자 주식회사 | Apparatus and Method of Managing IP Address in the Exchange |
US6640140B1 (en) * | 2000-10-10 | 2003-10-28 | Schneider Automation Inc. | PLC executive with integrated web server |
US7023795B1 (en) | 2000-11-07 | 2006-04-04 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
CA2725700C (en) | 2000-12-22 | 2015-11-24 | Research In Motion Limited | Wireless router system and method |
US7031275B1 (en) | 2000-12-28 | 2006-04-18 | Utstarcom, Inc. | Address management for mobile nodes |
CA2368404C (en) * | 2001-01-18 | 2005-08-09 | Research In Motion Limited | Unified messaging system and method |
US7103656B2 (en) * | 2001-02-20 | 2006-09-05 | Research In Motion Limited | System and method for administrating a wireless communication network |
US7024428B1 (en) | 2001-02-23 | 2006-04-04 | Openwave Systems Inc. | Reliable data synchronization over unreliable networks |
CA2375844C (en) * | 2001-03-09 | 2008-12-30 | Research In Motion Limited | Advanced voice and data operations in a mobile data communication device |
CA2376918C (en) * | 2001-03-14 | 2007-10-23 | Research In Motion Limited | Scalable and secure messaging system for a wireless network |
US20020198609A1 (en) * | 2001-06-21 | 2002-12-26 | Baron Carl N. | Method and apparatus for regulating network access to functions of a controller |
US7293179B2 (en) * | 2001-08-01 | 2007-11-06 | Johnson R Brent | System and method for virtual tape management with remote archival and retrieval via an encrypted validation communication protocol |
US7076529B2 (en) * | 2001-09-27 | 2006-07-11 | Bellsouth Intellectual Property Corporation | Systems and methods for notification of electronic mail receipt in a shared computer environment via advanced intelligent network systems |
US7317699B2 (en) * | 2001-10-26 | 2008-01-08 | Research In Motion Limited | System and method for controlling configuration settings for mobile communication devices and services |
US20030084169A1 (en) * | 2001-10-31 | 2003-05-01 | Min Zhu | System and method for accessing a target computer from a remote location using a remote computer |
DE60214590T2 (en) | 2001-12-07 | 2007-09-13 | Research In Motion Ltd., Waterloo | METHOD AND DEVICE FOR CONTROLLING INFORMATION DISTRIBUTION TO MOBILE STATIONS |
US7138733B2 (en) * | 2001-12-13 | 2006-11-21 | Hewlett-Packard Development Company, L.P. | Redundant data and power infrastructure for modular server components in a rack |
US20030204419A1 (en) * | 2002-04-30 | 2003-10-30 | Wilkes Gordon J. | Automated messaging center system and method for use with a healthcare system |
US10173008B2 (en) | 2002-01-29 | 2019-01-08 | Baxter International Inc. | System and method for communicating with a dialysis machine through a network |
US7698156B2 (en) * | 2002-01-29 | 2010-04-13 | Baxter International Inc. | System and method for identifying data streams associated with medical equipment |
US8775196B2 (en) | 2002-01-29 | 2014-07-08 | Baxter International Inc. | System and method for notification and escalation of medical data |
US20030220994A1 (en) * | 2002-02-28 | 2003-11-27 | Chunrong Zhu | Wireless network access system and method |
US20030217053A1 (en) * | 2002-04-15 | 2003-11-20 | Bachman George E. | Context control mechanism for data executed in workflows of process, factory-floor, environmental, computer aided manufacturing-based or other control system |
US6650088B1 (en) | 2002-04-23 | 2003-11-18 | Palm, Inc. | Apparatus and system for charging a portable electronic device |
US20050065817A1 (en) * | 2002-04-30 | 2005-03-24 | Mihai Dan M. | Separation of validated information and functions in a healthcare system |
US20040167804A1 (en) * | 2002-04-30 | 2004-08-26 | Simpson Thomas L.C. | Medical data communication notification and messaging system and method |
US20040172301A1 (en) * | 2002-04-30 | 2004-09-02 | Mihai Dan M. | Remote multi-purpose user interface for a healthcare system |
US20040176667A1 (en) * | 2002-04-30 | 2004-09-09 | Mihai Dan M. | Method and system for medical device connectivity |
US20040172300A1 (en) * | 2002-04-30 | 2004-09-02 | Mihai Dan M. | Method and system for integrating data flows |
US20030201697A1 (en) * | 2002-04-30 | 2003-10-30 | Richardson William R. | Storage device for health care facility |
US8234128B2 (en) | 2002-04-30 | 2012-07-31 | Baxter International, Inc. | System and method for verifying medical device operational parameters |
US20030208361A1 (en) * | 2002-05-02 | 2003-11-06 | Belinne Daryl Jarvis | Configuration of systems with services |
US20030225596A1 (en) * | 2002-05-31 | 2003-12-04 | Richardson Bill R. | Biometric security for access to a storage device for a healthcare facility |
US20030225864A1 (en) * | 2002-05-31 | 2003-12-04 | Gardiner Samuel W. | Host-based automatic negotiation of an internet protocol address for a network connected device |
US8230026B2 (en) | 2002-06-26 | 2012-07-24 | Research In Motion Limited | System and method for pushing information between a host system and a mobile data communication device |
US7739485B2 (en) * | 2002-10-11 | 2010-06-15 | Hewlett-Packard Development Company, L.P. | Cached field replaceable unit EEPROM data |
US20080261633A1 (en) | 2002-10-22 | 2008-10-23 | Research In Motion Limited | System and Method for Pushing Information from a Host System to a Mobile Data Communication Device |
US20040210664A1 (en) * | 2003-04-17 | 2004-10-21 | Schneider Automation Inc. | System and method for transmitting data |
US20050049932A1 (en) * | 2003-09-03 | 2005-03-03 | Howell James A. | Process for managing subscription service purchases |
US20050071270A1 (en) * | 2003-09-26 | 2005-03-31 | Ramirez Christopher W. | Process for remote recovery and creation of machine specific authentication keys for systems |
DE502004008199D1 (en) * | 2004-01-23 | 2008-11-20 | Siemens Ag | Method for assigning an IP address to a device |
US8054947B2 (en) | 2004-02-02 | 2011-11-08 | Eicon Networks Corporation | Apparatus and method for multiplexing communication signals |
US7761923B2 (en) * | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
US7474634B1 (en) | 2004-03-12 | 2009-01-06 | West Corporation | System, methods, and computer-readable media for expedited access to conference calls |
WO2005089239A2 (en) | 2004-03-13 | 2005-09-29 | Cluster Resources, Inc. | System and method of providing a self-optimizing reservation in space of compute resources |
US8782654B2 (en) | 2004-03-13 | 2014-07-15 | Adaptive Computing Enterprises, Inc. | Co-allocating a reservation spanning different compute resources types |
US20070266388A1 (en) | 2004-06-18 | 2007-11-15 | Cluster Resources, Inc. | System and method for providing advanced reservations in a compute environment |
US7415470B2 (en) * | 2004-08-12 | 2008-08-19 | Oracle International Corporation | Capturing and re-creating the state of a queue when migrating a session |
US7502824B2 (en) * | 2004-08-12 | 2009-03-10 | Oracle International Corporation | Database shutdown with session migration |
US8176490B1 (en) | 2004-08-20 | 2012-05-08 | Adaptive Computing Enterprises, Inc. | System and method of interfacing a workload manager and scheduler with an identity manager |
WO2006053093A2 (en) | 2004-11-08 | 2006-05-18 | Cluster Resources, Inc. | System and method of providing system jobs within a compute environment |
US20060122894A1 (en) * | 2004-12-03 | 2006-06-08 | Mcgary Jon | User configured order status updates |
US7647626B2 (en) * | 2004-12-08 | 2010-01-12 | International Business Machines Corporation | Method for establishing a trusted relationship between a data server and a middleware server |
DE102004062116B3 (en) * | 2004-12-23 | 2006-05-11 | Ab Skf | Bearing arrangement for computer tomography has bearing with inner ring, which stores construction unit, and outer ring, which is connected with damping element, fitted as single element and contain hollow cylindrical basic outline |
US7568039B2 (en) * | 2004-12-27 | 2009-07-28 | International Business Machines Corporation | Method for providing and utilizing a network trusted context |
US9176772B2 (en) * | 2005-02-11 | 2015-11-03 | Oracle International Corporation | Suspending and resuming of sessions |
US20060193462A1 (en) * | 2005-02-28 | 2006-08-31 | Gregg Hansen | System for optimizing configurable information handling systems |
US8863143B2 (en) | 2006-03-16 | 2014-10-14 | Adaptive Computing Enterprises, Inc. | System and method for managing a hybrid compute environment |
WO2006107531A2 (en) * | 2005-03-16 | 2006-10-12 | Cluster Resources, Inc. | Simple integration of an on-demand compute environment |
US9231886B2 (en) | 2005-03-16 | 2016-01-05 | Adaptive Computing Enterprises, Inc. | Simple integration of an on-demand compute environment |
US9015324B2 (en) | 2005-03-16 | 2015-04-21 | Adaptive Computing Enterprises, Inc. | System and method of brokering cloud computing resources |
US8782120B2 (en) | 2005-04-07 | 2014-07-15 | Adaptive Computing Enterprises, Inc. | Elastic management of compute resources between a web server and an on-demand compute environment |
CA2603577A1 (en) | 2005-04-07 | 2006-10-12 | Cluster Resources, Inc. | On-demand access to compute resources |
EP1872251B1 (en) | 2005-04-18 | 2015-10-21 | BlackBerry Limited | Method for providing wireless application privilege management |
US20060291645A1 (en) * | 2005-06-08 | 2006-12-28 | Vasu Mekala | Needs based offer |
US7623684B2 (en) * | 2005-07-19 | 2009-11-24 | Dell Products, L.P. | System and method for information handling system software registration code management |
US20070130289A1 (en) * | 2005-12-07 | 2007-06-07 | Christopher Defazio | Remote access |
WO2007123753A2 (en) | 2006-03-30 | 2007-11-01 | Invensys Systems, Inc. | Digital data processing apparatus and methods for improving plant performance |
US8275895B1 (en) | 2006-12-21 | 2012-09-25 | Crimson Corporation | Systems and methods for establishing a trusted dynamic host configuration protocol connection |
US20080174283A1 (en) * | 2007-01-23 | 2008-07-24 | Michel Ivgi | Robust Ground Start Detection |
US20080177868A1 (en) * | 2007-01-23 | 2008-07-24 | Itai Ephraim Zilbershtein | Address Provisioning |
US7774438B2 (en) * | 2007-01-26 | 2010-08-10 | Avaya Communication Israel Ltd. | Parameter provisioning |
US8179872B2 (en) | 2007-05-09 | 2012-05-15 | Research In Motion Limited | Wireless router system and method |
US7880139B2 (en) * | 2007-05-31 | 2011-02-01 | Georgia Tech Research Corporation | Method and apparatus of uniform gas-phase molecular matrix deposition for imaging mass spectrometry |
US7660539B2 (en) * | 2007-07-11 | 2010-02-09 | Dell Products, L.P. | Printer consumable ordering direct from printer |
US8041773B2 (en) | 2007-09-24 | 2011-10-18 | The Research Foundation Of State University Of New York | Automatic clustering for self-organizing grids |
US8249066B2 (en) | 2008-02-19 | 2012-08-21 | Dialogic Corporation | Apparatus and method for allocating media resources |
RU2495476C2 (en) | 2008-06-20 | 2013-10-10 | Инвенсис Системз, Инк. | Systems and methods for immersive interaction with actual and/or simulated facilities for process, environmental and industrial control |
US8057679B2 (en) | 2008-07-09 | 2011-11-15 | Baxter International Inc. | Dialysis system having trending and alert generation |
US10089443B2 (en) | 2012-05-15 | 2018-10-02 | Baxter International Inc. | Home medical device systems and methods for therapy prescription and tracking, servicing and inventory |
US8554579B2 (en) | 2008-10-13 | 2013-10-08 | Fht, Inc. | Management, reporting and benchmarking of medication preparation |
US20120114312A1 (en) | 2009-03-25 | 2012-05-10 | Eloy Technology, Llc | Method and system for determining the availability of a media controller |
US8463964B2 (en) * | 2009-05-29 | 2013-06-11 | Invensys Systems, Inc. | Methods and apparatus for control configuration with enhanced change-tracking |
US8127060B2 (en) * | 2009-05-29 | 2012-02-28 | Invensys Systems, Inc | Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware |
US8549038B2 (en) | 2009-06-15 | 2013-10-01 | Oracle International Corporation | Pluggable session context |
US8190651B2 (en) | 2009-06-15 | 2012-05-29 | Nxstage Medical, Inc. | System and method for identifying and pairing devices |
US10877695B2 (en) | 2009-10-30 | 2020-12-29 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US11720290B2 (en) | 2009-10-30 | 2023-08-08 | Iii Holdings 2, Llc | Memcached server functionality in a cluster of data processing nodes |
US9445158B2 (en) | 2009-11-06 | 2016-09-13 | Eloy Technology, Llc | Distributed aggregated content guide for collaborative playback session |
JP6008617B2 (en) | 2012-06-29 | 2016-10-19 | キヤノン株式会社 | COMMUNICATION DEVICE, ITS CONTROL METHOD, AND PROGRAM |
NZ723391A (en) | 2012-08-31 | 2018-01-26 | Baxter Corp Englewood | Medication requisition fulfillment system and method |
US9489489B2 (en) | 2012-10-26 | 2016-11-08 | Baxter Corporation Englewood | Image acquisition for medical dose preparation system |
EP3453377A1 (en) | 2012-10-26 | 2019-03-13 | Baxter Corporation Englewood | Improved work station for medical dose preparation system |
NZ727697A (en) | 2014-06-30 | 2022-05-27 | Baxter Corp Englewood | Managed medical information exchange |
US11107574B2 (en) | 2014-09-30 | 2021-08-31 | Baxter Corporation Englewood | Management of medication preparation with formulary management |
US11575673B2 (en) | 2014-09-30 | 2023-02-07 | Baxter Corporation Englewood | Central user management in a distributed healthcare information management system |
WO2016090091A1 (en) | 2014-12-05 | 2016-06-09 | Baxter Corporation Englewood | Dose preparation data analytics |
AU2016226164A1 (en) | 2015-03-03 | 2017-10-19 | Baxter Corporation Englewood | Pharmacy workflow management with integrated alerts |
JP2018524718A (en) | 2015-06-25 | 2018-08-30 | ガンブロ・ルンディア・エービーGambro Lundia Ab | Medical device system and method with distributed database |
US10289617B2 (en) | 2015-12-17 | 2019-05-14 | Oracle International Corporation | Accessing on-premise and off-premise datastores that are organized using different application schemas |
US10387387B2 (en) | 2015-12-17 | 2019-08-20 | Oracle International Corporation | Enabling multi-tenant access to respective isolated data sets organized using different application schemas |
US10303894B2 (en) | 2016-08-31 | 2019-05-28 | Oracle International Corporation | Fine-grained access control for data manipulation language (DML) operations on relational data |
JP7153017B2 (en) | 2016-12-21 | 2022-10-13 | ガンブロ・ルンディア・エービー | A medical device system that includes an information technology infrastructure with a secure cluster domain that supports external domains |
CN111756805A (en) * | 2020-05-27 | 2020-10-09 | 西安万像电子科技有限公司 | Method and device for accessing server, terminal equipment and storage medium |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5163131A (en) * | 1989-09-08 | 1992-11-10 | Auspex Systems, Inc. | Parallel i/o network file server architecture |
US5309437A (en) * | 1990-06-29 | 1994-05-03 | Digital Equipment Corporation | Bridge-like internet protocol router |
US5159592A (en) * | 1990-10-29 | 1992-10-27 | International Business Machines Corporation | Network address management for a wired network supporting wireless communication to a plurality of mobile users |
US5442633A (en) * | 1992-07-08 | 1995-08-15 | International Business Machines Corporation | Shortcut network layer routing for mobile hosts |
US5245656A (en) * | 1992-09-09 | 1993-09-14 | Bell Communications Research, Inc. | Security method for private information delivery and filtering in public networks |
US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
-
1994
- 1994-08-09 US US08/287,775 patent/US5598536A/en not_active Expired - Lifetime
-
1995
- 1995-07-14 WO PCT/US1995/008902 patent/WO1996005681A1/en active IP Right Grant
- 1995-07-14 EP EP95926294A patent/EP0775411B1/en not_active Expired - Lifetime
- 1995-07-14 AU AU30096/95A patent/AU3009695A/en not_active Abandoned
- 1995-07-14 DE DE69524104T patent/DE69524104T2/en not_active Expired - Lifetime
- 1995-07-14 CA CA002197218A patent/CA2197218C/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
WO1996005681A1 (en) | 1996-02-22 |
DE69524104T2 (en) | 2002-07-18 |
AU3009695A (en) | 1996-03-07 |
DE69524104D1 (en) | 2002-01-03 |
CA2197218A1 (en) | 1996-02-22 |
EP0775411A1 (en) | 1997-05-28 |
EP0775411B1 (en) | 2001-11-21 |
US5598536A (en) | 1997-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2197218C (en) | Apparatus and method for accessing a local computer network | |
EP0775341B1 (en) | Apparatus and method for limiting access to a local computer network | |
EP0830773B1 (en) | Remote access apparatus and method which allow dynamic internet protocol (ip) address management | |
US6766371B1 (en) | Virtual network environment | |
US6094659A (en) | Web server for use in a LAN modem | |
US6028848A (en) | Apparatus and methods for use therein for an ISDN LAN modem utilizing internal DNS and DHCP servers for transparent translation of local host names to IP addresses | |
US6108330A (en) | Apparatus and methods for use therein for an ISDN LAN modem that selects among a plurality of DNS servers for responding to a DNS query | |
US5550984A (en) | Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information | |
US6029203A (en) | Apparatus and methods for use therein for an ISDN LAN modem that provides enhanced network activity | |
EP0998099B1 (en) | Network address management | |
US6052803A (en) | Key-based technique for assuring and maintaining integrity of firmware stored in both volatile and non-volatile memory | |
US6618476B1 (en) | Line information security interface for TAPI service provider | |
WO1996039769A1 (en) | Apparatus and method for providing unique identifiers to remote dial-in network clients | |
US7325065B1 (en) | Identifying unauthorized communication systems using a system-specific identifier | |
EP1379027B1 (en) | Wireless LAN device | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus | |
Cisco | About CiscoRemote Plus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20150714 |