US20060036951A1 - Method of switching internet personas based on URL - Google Patents

Method of switching internet personas based on URL Download PDF

Info

Publication number
US20060036951A1
US20060036951A1 US10/916,972 US91697204A US2006036951A1 US 20060036951 A1 US20060036951 A1 US 20060036951A1 US 91697204 A US91697204 A US 91697204A US 2006036951 A1 US2006036951 A1 US 2006036951A1
Authority
US
United States
Prior art keywords
user
specific
remote site
persona
attributes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/916,972
Inventor
Neal Marion
Shawn Mullen
George Ramsay
James Tesauro
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US10/916,972 priority Critical patent/US20060036951A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MULLEN, SHAWN PATRICK, MARION, NEAL RICHARD, RAMSAY III, GEORGE F., TESAURO, JAMES STANLEY
Publication of US20060036951A1 publication Critical patent/US20060036951A1/en
Priority to US12/207,494 priority patent/US8176185B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Definitions

  • the present invention generally relates to computer systems, and more particularly to a method of accessing remote sites on a network such as the Internet, where the remote sites utilize user information such as user names, passwords, etc., for access.
  • Network 2 has several client workstations 3 a , 3 b , 3 c , and 3 d which are interconnected via a communications infrastructure 4 .
  • Network 2 additionally has servers 5 a , 5 b .
  • Each server is essentially a stand-alone computer system (having one or more processors, memory devices, and communications devices), but has been adapted to primarily provide information to individual users at client workstations 3 a - 3 d .
  • the information provided by a server can be in the form of programs which run locally on a given client, or in the form of data such as files used by other programs.
  • Communications infrastructure 4 may include transmission media such as copper wires or optical fibers, along with interconnected routers, hubs and switches.
  • Clients 3 a - 3 d can also be stand-alone computer systems (like personal computers, or PCs), or “dumber” systems adapted for limited use with network 2 (like network computers, or NCs).
  • PC generally refers to any multi-purpose computer adapted for use by one or more individuals, regardless of the manufacturer, hardware platform, operating system, etc.
  • Network 2 thus offers client-server communications as well as peer-to-peer communications between different clients in real-time or by delayed file delivery.
  • Other nodes can be included in network 2 , such as a storage device 6 .
  • the network can be local in nature, or can be further connected to other network systems (not shown).
  • the construction of network 2 is also generally applicable to the Internet.
  • Conventional protocols and services have been established for the Internet which allow the transfer of various types of information, including electronic mail, simple file transfers via FTP, remote computing via TELNET, “gopher” searching, Usenet newsgroups, and hypertext file delivery and multimedia streaming via the World Wide Web (WWW).
  • a given server can be dedicated to performing one of these operations, or run multiple services.
  • mail servers sending and receiving
  • the Internet is becoming increasingly popular as the primary medium for both personal and commercial transactions.
  • URLs Internet services are typically accessed by specifying a unique address, or universal resource locator (URL).
  • the URL has two basic components, the protocol to be used, and the object pathname.
  • http hypertext transfer protocol
  • www.uspto.gov home page for the U.S. Patent & Trademark Office
  • the server name is associated with a unique numeric value (a TCP/IP address/domain).
  • email email (“mailto:” protocol)
  • the address is composed of two parts, a user name and a server name separated by the commercial “at” symbol, e.g., “johndoe@mailserver.com”.
  • FIG. 1 Various types of electronic documents can be transmitted on a network like the Internet.
  • a document creator at client workstation 3 a uses an editor (e.g., an email composer) to draft a document such as an email 7 .
  • This email is then transmitted across the communications infrastructure 4 to the document recipient at client workstation 3 b who views it with a document reader (e.g., an email viewer).
  • FIG. 1 also depicts the delivery of a web page 8 from a remote web site hosted at server 5 a to client workstation 3 d .
  • Web page 8 may be created using, e.g., a hypertext markup language (HTML) editor, and typically includes hypertext links for other web pages.
  • HTML hypertext markup language
  • a hypertext link is an image that is viewable on the workstation's display which can be selected by the user (e.g., using a pointing device or “mouse”) and which then automatically instructs the client workstation to request another page associated with that particular hypertext link (i.e., issue another URL).
  • a hypertext link may appear as a picture, or as a word or sentence, possibly underlined or otherwise accentuated to indicate that it is an embedded link and not just normal, informative text.
  • a WWW page may have text, graphic (still) images, and even multimedia objects such as sound recordings or moving video clips.
  • a page may be larger than the physical size of the monitor screen, and techniques such as scroll bars are used by the viewing software (the web browser) to view different portions of the page.
  • Java applets can greatly enhance the capabilities of a web page, they may also introduce security and other issues.
  • many web browsers are configured to allow the user to globally enable or disable the use of Java routines. This capability can, however, create problems. A user may want to explore some new web sites and, in doing so, disable Java for security reasons, but when this user visits old, reliable sites that require Java, the web pages will not be properly presented unless the user manually edits the configuration to re-enable Java. If a user repeatedly visits several web sites where Java is to be disabled, but additionally repeatedly visits web sites requiring Java, it can become very cumbersome for the user to constantly change the Java preference back and forth.
  • a cookie is an identification number or character sequence that resides locally on the client workstation but is used by the remote web site in creating a web page.
  • the remote web site can examine the cookies to discern the user and employ previously selected options or preferences in presenting the web page. Cookies can, however, also raise security issues and may be undesirable in certain cases.
  • conventional web browsers can allow the user to globally enable or disable cookies, but the user must repeatedly change this setting for different web sites where cookies are acceptable or unacceptable.
  • Web browsers also allow the user to create an identity, e.g., with a username or email address, that is utilized by a remote site in accessing a web page. If a user wants to have different usernames or email addresses for different web sites, the identity information must be manually re-entered before visiting each site, which again is extremely inconvenient. For example, a user might prefer a personal email address for use with certain web sites, while preferring a work email address for other web sites, and preferring a fictitious email address for web sites that might abuse (spam) the user's email account.
  • an identity e.g., with a username or email address
  • the identity information must be manually re-entered before visiting each site, which again is extremely inconvenient. For example, a user might prefer a personal email address for use with certain web sites, while preferring a work email address for other web sites, and preferring a fictitious email address for web sites that might abuse (spam) the user's email account.
  • a method of communicating with a remote site on a network generally comprising the steps of establishing a plurality of user personas respectively associated with a plurality of remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site.
  • the specific remote site can be associated with the specific user persona by a universal resource locator (URL) of the remote site, e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
  • URL universal resource locator
  • a default persona can be used for any remote site having no specifically associated user persona.
  • the attributes in the user personas can provide various functions such as indicating whether Java programming is enabled for the specific remote site or whether “cookies” are enabled for the specific remote site.
  • the attributes can also define a username for the specific remote site.
  • a user persona can be established when a bookmark is created for the specific remote site.
  • FIG. 1 is a pictorial representation of electronic document delivery across a conventional communications network having various nodes such as client workstations, servers, and storage devices;
  • FIG. 2 is a block diagram of a computer system programmed to access remote network sites using associated persona preferences in accordance with one implementation of the present invention
  • FIG. 3 is a pictorial representation of different persona preferences which have been selectively associated with different remote network sites (URLs) in accordance with one implementation of the present invention
  • FIG. 4 is an elevational view of a web browser application as displayed on a computer screen, depicting a dialog box for viewing, entering or editing different persona preferences selectively associated with different remote network sites in accordance with one implementation of the present invention.
  • FIG. 5 is a chart illustrating the logical flow of remote site access using associated persona preferences in accordance with one implementation of the present invention.
  • the present invention provides a method of switching between several internet “personas” which allows the computer user to effortlessly and transparently utilize different preferences depending upon the URL visited.
  • Each persona contains a range of user preferences such as email addresses, cookie creation, Java permissions, etc.
  • the invention utilizes a program application such as an enhanced web browser to store these preferences in association with the different URLs, as explained further below.
  • the web browser is executed on a data processing system or computer.
  • FIG. 2 depicts one embodiment 10 of a computer system programmed to automatically switch between different user personas in accordance with one implementation of the present invention.
  • System 10 includes a central processing unit (CPU) 12 which carries out program instructions, firmware or read-only memory (ROM) 14 which stores the system's basic input/output logic, and a dynamic random access memory (DRAM) 16 which temporarily stores program instructions and operand data used by CPU 12 .
  • CPU 12 , ROM 14 and DRAM 16 are all connected to a system bus 18 .
  • PCI host bridge 22 provides a low latency path through which processor 12 may access PCI devices mapped anywhere within bus memory or I/O address spaces.
  • PCI host bridge 22 also provides a high bandwidth path to allow the PCI devices to access DRAM 16 .
  • Attached to PCI local bus 20 are a network adapter 24 , a small computer system interface (SCSI) adapter 26 , an expansion bus bridge 28 , an audio adapter 30 , and a graphics adapter 32 .
  • Network adapter 24 may be used to connect computer system 10 to an external computer network 34 , such as a local area network (LAN) or the Internet.
  • LAN local area network
  • Small computer system interface (SCSI) adapter 26 is used to control high-speed SCSI disk drive 36 .
  • Disk drive 36 stores the program instructions and data in a more permanent state, including the program which embodies the present invention as explained further below.
  • Expansion bus bridge 28 is used to couple an industry standard architecture (ISA) expansion bus 38 to PCI local bus 20 .
  • ISA industry standard architecture
  • several user input devices are connected to ISA bus 38 , including a keyboard 40 , a microphone 42 , and a graphical pointing device (mouse) 44 .
  • Other devices may also be attached to ISA bus 38 , such as a CD-ROM drive 46 .
  • Audio adapter 30 controls audio output to a speaker 48
  • graphics adapter 32 controls visual output to a display monitor 50 , to allow the user to control the document creation process as taught herein.
  • Computer system 10 carries out program instructions for switching between different user personas when accessing web sites in accordance with one or more of the implementations discussed in detail below. Accordingly, practice of the invention may include the use of conventional web browser application features in addition to the inventive concept disclosed herein. The details of such applications will become readily apparent to those skilled in the art upon reference to this disclosure.
  • FIG. 3 is a pictorial representation of various user personas that are stored on computer 10 in association with respective URLs.
  • the user preferences may be stored for example when a URL is first bookmarked. Then when a page is revisited, the page is matched against previously stored personas/URLs, and the appropriate user persona is automatically loaded by the web browser.
  • FIG. 3 illustrates four such user personas.
  • the user For the ABC Company web site (URL “http://www.abc.com”), the user has established a persona which includes a username “johndoe”, a password “123456”, and enables Java routines.
  • the user For the XYZ government web site (URL “http://www.xyz.gov”), the user has established a persona which includes a username “jdoe”, a password “654321”, and disables Java routines.
  • the FTP download web site URL “ftp://downloads.net”
  • the user For the FTP download web site (URL “ftp://downloads.net”), the user has established a persona which includes a username “guest”, a password “anon”, and disables Java routines.
  • email sent to the administrator of the web site at the user's place of work (URL “mailto://admin@work.com”), the user has established a persona which includes a username (email address) “me@work.com”, a password “123456”, and disables Java routines (the mail server is the remote site in this case).
  • All four of these personas are accessible by the web browser running on computer system 10 .
  • the web browser can automatically locate and load the appropriate user persona without any additional effort on the part of the user.
  • User interface 60 may include general features familiar to computer users such as a title bar 62 , a menu bar 64 having various commands which can be executed using keyboard 40 or mouse 44 to display additional pull-down menus, and a button bar 66 having several graphical buttons with icons that allow the user to more simply effectuate a command with a single click of mouse 44 as it controls the graphical pointer 68 on display monitor 50 , and a URL field 70 for manually typing in a URL.
  • FIG. 3 illustrates a query or dialog box 72 that is presented to the user in response to a command such as using mouse 40 to control graphical pointer 68 and click on a particular button 74 provided for the purpose of selecting such information sets.
  • dialog box 72 allows the user to create, view and edit the preferences for each persona.
  • a name field 76 shows various names or titles associated with various personas, with the name “ABC Company” selected.
  • the associated persona preferences for the ABC Company are shown to the right of field 76 , and include the URL, a username, a password, and enabling of Java, cookies and caching.
  • the user can edit these preferences using the “Edit” button 78 which can present a further dialog box or interface (not shown) to allow the preferences to be modified.
  • a “New” button 80 is similarly used to create a new persona.
  • An “Options” button 82 can be used to set other general attributes used with persona preferences such as associating all URLs for a given site/domain with the chosen persona.
  • one of the personas may be designated as the “Default” persona. This persona is used for any URLs that are not explicitly specified in one of the other established personas.
  • FIG. 5 illustrates the procedure for visiting a web site (URL), e.g., on the Internet, and begins when the user selects the particular URL to visit ( 90 ).
  • the list of URLs for previously associated personas is reviewed to check for a match with the URL selected by the user ( 92 ). If the URL is on the list, the associated persona is loaded and set for accessing that URL ( 94 ). If the URL is not on the list, the default persona is used ( 96 ). If the default persona is being used, the user may want to associate a new persona with the site.
  • URL web site
  • FIG. 5 illustrates the procedure for visiting a web site (URL), e.g., on the Internet, and begins when the user selects the particular URL to visit ( 90 ).
  • the list of URLs for previously associated personas is reviewed to check for a match with the URL selected by the user ( 92 ). If the URL is on the list, the associated persona is loaded and set for accessing that URL ( 94 ). If
  • the procedure can make an inquiry as to whether the desired persona is currently loaded ( 98 ). If not, the user can load the desired persona ( 100 ), and the URL is then loaded by the web browser ( 102 ). This process continues iteratively for each URL selected to visit ( 104 ).
  • FIG. 6 illustrates an example of how a user might open an email message using the present invention.
  • the procedure begins with the user selecting a mail message to read ( 110 ).
  • the email ID (address) for the sender of the message is first extracted ( 112 ), and compared to the list of email addresses having previously associated personas ( 114 ). If the email address is on the list, the associated persona is loaded and set for viewing that message ( 116 ). If the address is not on the list, the default persona is used ( 118 ).
  • the program can again query the user as to whether the desired persona is actually loaded ( 120 ). If not, the user is afforded an opportunity to load another desired persona ( 122 ).
  • the email message is then opened using the appropriate persona ( 124 ). In this manner, the desired persona is used for any transactions involving that message, such as a return confirmation that is transmitted to the original email sender.
  • the process continues interatively for each mail message to be displayed ( 126 ).
  • FIG. 7 illustrates one manner to implement the invention for adding new bookmarks, including a “type” of association for a URL that indicates if all pages on the site should use the persona, or if only the pages subordinate to the current page (i.e., a branch of the site tree) should use the persona, or if just that specific page should use the persona.
  • the process again begins when the user visits a site, i.e., enters a URL in a web browser ( 130 ).
  • a bookmark is set for the URL ( 132 ), and a list of available personas is displayed which may be associated with it ( 134 ).
  • the user selects the desired persona ( 136 ), and further chooses are particular selection type as explained above ( 138 ).
  • a URL for a company's background information might be “http://www.abc.com/info” and, for such an address, the user could associate the persona with all addresses at that site (e.g., any address with the domain “http://www.abc.com”), or branches off the information page (e.g., any address beginning with “http://www.abc.com/info”) or just the specific page bookmarked.
  • the persona is then stored with a type indicator for the URL(s) as appropriate ( 140 ).
  • the present invention offers several advantages over convention network applications such as web browsers and email composes.
  • a user is no longer required to continually modify preferences to allow specific sites/pages to have elevated privileges. It is also easier to protect sensitive information (e.g., email addresses) from site snoopers.
  • Browser attributes are treated consistently and are not artificially separated into security-type preferences and user preferences.

Abstract

A method of communicating with a remote site on a network by establishing different user personas respectively associated with different remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and then accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site. The specific remote site can be associated with the specific user persona by a universal resource locator (URL), e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona. A default persona can be used for any remote site having no specifically associated user persona. The attributes in the user personas can provide various functions such as indicating whether Java programming is enabled for the specific remote site or whether “cookies” are enabled for the specific remote site. The attributes can also define a username for the specific remote site. A user persona can be established when a bookmark is created for the specific remote site.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention generally relates to computer systems, and more particularly to a method of accessing remote sites on a network such as the Internet, where the remote sites utilize user information such as user names, passwords, etc., for access.
  • 2. Description of the Related Art
  • A generalized computing network 2 is shown in FIG. 1. Network 2 has several client workstations 3 a, 3 b, 3 c, and 3 d which are interconnected via a communications infrastructure 4. Network 2 additionally has servers 5 a, 5 b. Each server is essentially a stand-alone computer system (having one or more processors, memory devices, and communications devices), but has been adapted to primarily provide information to individual users at client workstations 3 a-3 d. The information provided by a server can be in the form of programs which run locally on a given client, or in the form of data such as files used by other programs. Communications infrastructure 4 may include transmission media such as copper wires or optical fibers, along with interconnected routers, hubs and switches.
  • Clients 3 a-3 d can also be stand-alone computer systems (like personal computers, or PCs), or “dumber” systems adapted for limited use with network 2 (like network computers, or NCs). As used herein, “PC” generally refers to any multi-purpose computer adapted for use by one or more individuals, regardless of the manufacturer, hardware platform, operating system, etc. Network 2 thus offers client-server communications as well as peer-to-peer communications between different clients in real-time or by delayed file delivery. Other nodes can be included in network 2, such as a storage device 6.
  • The network can be local in nature, or can be further connected to other network systems (not shown). The construction of network 2 is also generally applicable to the Internet. Conventional protocols and services have been established for the Internet which allow the transfer of various types of information, including electronic mail, simple file transfers via FTP, remote computing via TELNET, “gopher” searching, Usenet newsgroups, and hypertext file delivery and multimedia streaming via the World Wide Web (WWW). A given server can be dedicated to performing one of these operations, or run multiple services. For example, mail servers (sending and receiving) can be used to facilitate the transmission of email. The Internet is becoming increasingly popular as the primary medium for both personal and commercial transactions.
  • Internet services are typically accessed by specifying a unique address, or universal resource locator (URL). The URL has two basic components, the protocol to be used, and the object pathname. For example, the URL “http://www.uspto.gov” (home page for the U.S. Patent & Trademark Office) specifies a hypertext transfer protocol (“http”) and a pathname of the server (“www.uspto.gov”). The server name is associated with a unique numeric value (a TCP/IP address/domain). For email (“mailto:” protocol), the address is composed of two parts, a user name and a server name separated by the commercial “at” symbol, e.g., “johndoe@mailserver.com”.
  • Various types of electronic documents can be transmitted on a network like the Internet. As illustrated in FIG. 1, a document creator at client workstation 3 a uses an editor (e.g., an email composer) to draft a document such as an email 7. This email is then transmitted across the communications infrastructure 4 to the document recipient at client workstation 3 b who views it with a document reader (e.g., an email viewer). FIG. 1 also depicts the delivery of a web page 8 from a remote web site hosted at server 5 a to client workstation 3 d. Web page 8 may be created using, e.g., a hypertext markup language (HTML) editor, and typically includes hypertext links for other web pages. A hypertext link is an image that is viewable on the workstation's display which can be selected by the user (e.g., using a pointing device or “mouse”) and which then automatically instructs the client workstation to request another page associated with that particular hypertext link (i.e., issue another URL). A hypertext link may appear as a picture, or as a word or sentence, possibly underlined or otherwise accentuated to indicate that it is an embedded link and not just normal, informative text. A WWW page may have text, graphic (still) images, and even multimedia objects such as sound recordings or moving video clips. A page may be larger than the physical size of the monitor screen, and techniques such as scroll bars are used by the viewing software (the web browser) to view different portions of the page.
  • Different user attributes or preferences can be utilized when accessing a remote web site. For example, many web sites now use small programs, called Java applets, to carry out certain functions (such as procedures that are local to the client workstation and do not require additional access to the remote site). While Java applets can greatly enhance the capabilities of a web page, they may also introduce security and other issues. Accordingly, many web browsers are configured to allow the user to globally enable or disable the use of Java routines. This capability can, however, create problems. A user may want to explore some new web sites and, in doing so, disable Java for security reasons, but when this user visits old, reliable sites that require Java, the web pages will not be properly presented unless the user manually edits the configuration to re-enable Java. If a user repeatedly visits several web sites where Java is to be disabled, but additionally repeatedly visits web sites requiring Java, it can become very cumbersome for the user to constantly change the Java preference back and forth.
  • Another attribute used by conventional web browsers is the so-called “magic cookie.” A cookie is an identification number or character sequence that resides locally on the client workstation but is used by the remote web site in creating a web page. When a web page is requested, the remote web site can examine the cookies to discern the user and employ previously selected options or preferences in presenting the web page. Cookies can, however, also raise security issues and may be undesirable in certain cases. Again, conventional web browsers can allow the user to globally enable or disable cookies, but the user must repeatedly change this setting for different web sites where cookies are acceptable or unacceptable.
  • Web browsers also allow the user to create an identity, e.g., with a username or email address, that is utilized by a remote site in accessing a web page. If a user wants to have different usernames or email addresses for different web sites, the identity information must be manually re-entered before visiting each site, which again is extremely inconvenient. For example, a user might prefer a personal email address for use with certain web sites, while preferring a work email address for other web sites, and preferring a fictitious email address for web sites that might abuse (spam) the user's email account.
  • In light of the foregoing, it would be desirable to devise an improved method of accessing remote sites such as web hosts which does not require the user to manually re-enter different attributes or preferences. It would be further advantageous if the method could easily allow the user to exert finer control of the privileges a remote site has.
  • SUMMARY OF THE INVENTION
  • It is therefore one object of the present invention to provide an improved method of communicating with remote network sites.
  • It is another object of the present invention to provide such a method which allows a user to automatically associate certain preferences or attributes with specific web sites.
  • It is yet another object of the present invention to provide such a method which is applicable to a variety of electronic documents including web pages and electronic mail.
  • The foregoing objects are achieved in a method of communicating with a remote site on a network, generally comprising the steps of establishing a plurality of user personas respectively associated with a plurality of remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites, and accessing a specific one of the remote sites using the attributes in a specific one of the user personas that is associated with the specific remote site. The specific remote site can be associated with the specific user persona by a universal resource locator (URL) of the remote site, e.g., for web sites on the Internet, and the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona. A default persona can be used for any remote site having no specifically associated user persona. The attributes in the user personas can provide various functions such as indicating whether Java programming is enabled for the specific remote site or whether “cookies” are enabled for the specific remote site. The attributes can also define a username for the specific remote site. A user persona can be established when a bookmark is created for the specific remote site.
  • The above as well as additional objectives, features, and advantages of the present invention will become apparent in the following detailed written description.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention may be better understood, and its numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
  • FIG. 1 is a pictorial representation of electronic document delivery across a conventional communications network having various nodes such as client workstations, servers, and storage devices;
  • FIG. 2 is a block diagram of a computer system programmed to access remote network sites using associated persona preferences in accordance with one implementation of the present invention;
  • FIG. 3 is a pictorial representation of different persona preferences which have been selectively associated with different remote network sites (URLs) in accordance with one implementation of the present invention;
  • FIG. 4 is an elevational view of a web browser application as displayed on a computer screen, depicting a dialog box for viewing, entering or editing different persona preferences selectively associated with different remote network sites in accordance with one implementation of the present invention; and
  • FIG. 5 is a chart illustrating the logical flow of remote site access using associated persona preferences in accordance with one implementation of the present invention.
  • The use of the same reference symbols in different drawings indicates similar or identical items.
  • DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
  • The present invention provides a method of switching between several internet “personas” which allows the computer user to effortlessly and transparently utilize different preferences depending upon the URL visited. Each persona contains a range of user preferences such as email addresses, cookie creation, Java permissions, etc. The invention utilizes a program application such as an enhanced web browser to store these preferences in association with the different URLs, as explained further below. The web browser is executed on a data processing system or computer. FIG. 2 depicts one embodiment 10 of a computer system programmed to automatically switch between different user personas in accordance with one implementation of the present invention.
  • System 10 includes a central processing unit (CPU) 12 which carries out program instructions, firmware or read-only memory (ROM) 14 which stores the system's basic input/output logic, and a dynamic random access memory (DRAM) 16 which temporarily stores program instructions and operand data used by CPU 12. CPU 12, ROM 14 and DRAM 16 are all connected to a system bus 18. There may be additional structures in the memory hierarchy which are not depicted, such as on-board (L1) and second-level (L2) caches.
  • CPU 12, ROM 14 and DRAM 16 are also coupled to a peripheral component interconnect (PCI) local bus 20 using a PCI host bridge 22. PCI host bridge 22 provides a low latency path through which processor 12 may access PCI devices mapped anywhere within bus memory or I/O address spaces. PCI host bridge 22 also provides a high bandwidth path to allow the PCI devices to access DRAM 16. Attached to PCI local bus 20 are a network adapter 24, a small computer system interface (SCSI) adapter 26, an expansion bus bridge 28, an audio adapter 30, and a graphics adapter 32. Network adapter 24 may be used to connect computer system 10 to an external computer network 34, such as a local area network (LAN) or the Internet. Small computer system interface (SCSI) adapter 26 is used to control high-speed SCSI disk drive 36. Disk drive 36 stores the program instructions and data in a more permanent state, including the program which embodies the present invention as explained further below. Expansion bus bridge 28 is used to couple an industry standard architecture (ISA) expansion bus 38 to PCI local bus 20. As shown, several user input devices are connected to ISA bus 38, including a keyboard 40, a microphone 42, and a graphical pointing device (mouse) 44. Other devices may also be attached to ISA bus 38, such as a CD-ROM drive 46. Audio adapter 30 controls audio output to a speaker 48, and graphics adapter 32 controls visual output to a display monitor 50, to allow the user to control the document creation process as taught herein.
  • While the illustrative implementation provides the program instructions embodying the present invention on disk drive 36, those skilled in the art will appreciate that the invention can be embodied in a program product utilizing other computer-readable media, including transmission media.
  • Computer system 10 carries out program instructions for switching between different user personas when accessing web sites in accordance with one or more of the implementations discussed in detail below. Accordingly, practice of the invention may include the use of conventional web browser application features in addition to the inventive concept disclosed herein. The details of such applications will become readily apparent to those skilled in the art upon reference to this disclosure.
  • FIG. 3 is a pictorial representation of various user personas that are stored on computer 10 in association with respective URLs. The user preferences may be stored for example when a URL is first bookmarked. Then when a page is revisited, the page is matched against previously stored personas/URLs, and the appropriate user persona is automatically loaded by the web browser. FIG. 3 illustrates four such user personas. For the ABC Company web site (URL “http://www.abc.com”), the user has established a persona which includes a username “johndoe”, a password “123456”, and enables Java routines. For the XYZ government web site (URL “http://www.xyz.gov”), the user has established a persona which includes a username “jdoe”, a password “654321”, and disables Java routines. For the FTP download web site (URL “ftp://downloads.net”), the user has established a persona which includes a username “guest”, a password “anon”, and disables Java routines. For email sent to the administrator of the web site at the user's place of work (URL “mailto://admin@work.com”), the user has established a persona which includes a username (email address) “me@work.com”, a password “123456”, and disables Java routines (the mail server is the remote site in this case).
  • All four of these personas are accessible by the web browser running on computer system 10. In this manner, when the user initiates communication, e.g., by clicking on a web site bookmark or selecting an addressee for an email, the web browser can automatically locate and load the appropriate user persona without any additional effort on the part of the user.
  • With further reference to FIG. 4, there is depicted one embodiment of a user interface 60 of the web browser that is displayed on monitor 50 as the electronic communication process is carried out by computer system 10 under control of the user. User interface 60 may include general features familiar to computer users such as a title bar 62, a menu bar 64 having various commands which can be executed using keyboard 40 or mouse 44 to display additional pull-down menus, and a button bar 66 having several graphical buttons with icons that allow the user to more simply effectuate a command with a single click of mouse 44 as it controls the graphical pointer 68 on display monitor 50, and a URL field 70 for manually typing in a URL.
  • Prior to initiating any specific communication, the user can establish different personas which are to be searched as a URL is entered to dynamically associate a given persona with a respective URL. FIG. 3 illustrates a query or dialog box 72 that is presented to the user in response to a command such as using mouse 40 to control graphical pointer 68 and click on a particular button 74 provided for the purpose of selecting such information sets. In the illustrative implementation, dialog box 72 allows the user to create, view and edit the preferences for each persona. A name field 76 shows various names or titles associated with various personas, with the name “ABC Company” selected. The associated persona preferences for the ABC Company are shown to the right of field 76, and include the URL, a username, a password, and enabling of Java, cookies and caching. The user can edit these preferences using the “Edit” button 78 which can present a further dialog box or interface (not shown) to allow the preferences to be modified. A “New” button 80 is similarly used to create a new persona. An “Options” button 82 can be used to set other general attributes used with persona preferences such as associating all URLs for a given site/domain with the chosen persona.
  • As seen in field 76, one of the personas may be designated as the “Default” persona. This persona is used for any URLs that are not explicitly specified in one of the other established personas.
  • The present invention may be further understood with reference to the flow charts of FIGS. 5-7 which depict examples of accessing network sites in accordance with various implementations of the present invention. FIG. 5 illustrates the procedure for visiting a web site (URL), e.g., on the Internet, and begins when the user selects the particular URL to visit (90). The list of URLs for previously associated personas is reviewed to check for a match with the URL selected by the user (92). If the URL is on the list, the associated persona is loaded and set for accessing that URL (94). If the URL is not on the list, the default persona is used (96). If the default persona is being used, the user may want to associate a new persona with the site. Alternatively, if a previously associated persona is being used, the user may nevertheless want to change to a different persona. In either case, the procedure can make an inquiry as to whether the desired persona is currently loaded (98). If not, the user can load the desired persona (100), and the URL is then loaded by the web browser (102). This process continues iteratively for each URL selected to visit (104).
  • FIG. 6 illustrates an example of how a user might open an email message using the present invention. The procedure begins with the user selecting a mail message to read (110). The email ID (address) for the sender of the message is first extracted (112), and compared to the list of email addresses having previously associated personas (114). If the email address is on the list, the associated persona is loaded and set for viewing that message (116). If the address is not on the list, the default persona is used (118). The program can again query the user as to whether the desired persona is actually loaded (120). If not, the user is afforded an opportunity to load another desired persona (122). The email message is then opened using the appropriate persona (124). In this manner, the desired persona is used for any transactions involving that message, such as a return confirmation that is transmitted to the original email sender. The process continues interatively for each mail message to be displayed (126).
  • FIG. 7 illustrates one manner to implement the invention for adding new bookmarks, including a “type” of association for a URL that indicates if all pages on the site should use the persona, or if only the pages subordinate to the current page (i.e., a branch of the site tree) should use the persona, or if just that specific page should use the persona. The process again begins when the user visits a site, i.e., enters a URL in a web browser (130). A bookmark is set for the URL (132), and a list of available personas is displayed which may be associated with it (134). The user then selects the desired persona (136), and further chooses are particular selection type as explained above (138). For example, a URL for a company's background information might be “http://www.abc.com/info” and, for such an address, the user could associate the persona with all addresses at that site (e.g., any address with the domain “http://www.abc.com”), or branches off the information page (e.g., any address beginning with “http://www.abc.com/info”) or just the specific page bookmarked. The persona is then stored with a type indicator for the URL(s) as appropriate (140).
  • The present invention offers several advantages over convention network applications such as web browsers and email composes. A user is no longer required to continually modify preferences to allow specific sites/pages to have elevated privileges. It is also easier to protect sensitive information (e.g., email addresses) from site snoopers. Browser attributes are treated consistently and are not artificially separated into security-type preferences and user preferences.
  • Although the invention has been described with reference to specific embodiments, this description is not meant to be construed in a limiting sense. Various modifications of the disclosed embodiments, as well as alternative embodiments of the invention, will become apparent to persons skilled in the art upon reference to the description of the invention. It is therefore contemplated that such modifications can be made without departing from the spirit or scope of the present invention as defined in the appended claims.

Claims (21)

1. A method of communicating with a remote site on a network, comprising:
establishing a plurality of user personas respectively associated with a plurality of remote sites on the network, each user persona containing one or more attributes used in accessing the remote sites; and
accessing a specific one of the remote sites using the one or more attributes in a specific one of the user personas associated with the specific remote site.
2. The method of claim 1 wherein:
the specific remote site is associated with the specific user persona by a universal resource locator (URL) of the remote site; and
said accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
3. The method of claim 1 further comprising establishing one of the user personas as a default persona to be used for any remote site having no specifically associated user persona.
4. The method of claim 1 wherein one of the attributes in the user personas indicates whether Java programming is enabled for the specific remote site.
5. The method of claim 1 wherein one of the attributes in the user personas indicates whether cookies are enabled for the specific remote site.
6. The method of claim 1 wherein one of the attributes in the user personas indicates a username for the specific remote site.
7. The method of claim 1 wherein at least one of the user personas is established when a bookmark is created for the specific remote site.
8. A computer system comprising:
means for processing program instructions;
a memory device connected to said processing means; and
program instructions residing in said memory device for establishing a plurality of user personas respectively associated with a plurality of remote sites on a network connected to the computer system, each user persona containing one or more attributes used in accessing the remote sites, and for accessing a specific one of the remote sites using the one or more attributes in a specific one of the user personas associated with the specific remote site.
9. The computer system of claim 8 wherein:
the specific remote site is associated with the specific user persona by a universal resource locator (URL) of the remote site; and
the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
10. The computer system of claim 8 wherein said program instructions further establish one of the user personas as a default persona to be used for any remote site having no specifically associated user persona.
11. The computer system of claim 8 wherein one of the attributes in the user personas indicates whether Java programming is enabled for the specific remote site.
12. The computer system of claim 8 wherein one of the attributes in the user personas indicates whether cookies are enabled for the specific remote site.
13. The computer system of claim 8 wherein one of the attributes in the user personas indicates a username for the specific remote site.
14. The computer system of claim 8 wherein at least one of the user personas is established when a bookmark is created for the specific remote site.
15. A computer program product comprising:
a computer-readable medium; and
program instructions residing in said medium for establishing a plurality of user personas respectively associated with a plurality of remote sites on a network connected to a computer system, each user persona containing one or more attributes used in accessing the remote sites, and for accessing a specific one of the remote sites using the one or more attributes in a specific one of the user personas associated with the specific remote site.
16. The computer program product of claim 15 wherein:
the specific remote site is associated with the specific user persona by a universal resource locator (URL) of the remote site; and
the accessing is automatically performed in response to matching of the URL of the specific remote site to the URL associated with the specific user persona.
17. The computer program product of claim 15 wherein said program instructions further establish one of the user personas as a default persona to be used for any remote site having no specifically associated user persona.
18. The computer program product of claim 15 wherein one of the attributes in the user personas indicates whether Java programming is enabled for the specific remote site.
19. The computer program product of claim 15 wherein one of the attributes in the user personas indicates whether cookies are enabled for the specific remote site.
20. The computer program product of claim 15 wherein one of the attributes in the user personas indicates a username for the specific remote site.
21. The computer program product of claim 15 wherein at least one of the user personas is established when a bookmark is created for the specific remote site.
US10/916,972 2004-08-12 2004-08-12 Method of switching internet personas based on URL Abandoned US20060036951A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/916,972 US20060036951A1 (en) 2004-08-12 2004-08-12 Method of switching internet personas based on URL
US12/207,494 US8176185B2 (en) 2004-08-12 2008-09-09 Method of switching Internet personas based on URL

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/916,972 US20060036951A1 (en) 2004-08-12 2004-08-12 Method of switching internet personas based on URL

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/207,494 Continuation US8176185B2 (en) 2004-08-12 2008-09-09 Method of switching Internet personas based on URL

Publications (1)

Publication Number Publication Date
US20060036951A1 true US20060036951A1 (en) 2006-02-16

Family

ID=35801440

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/916,972 Abandoned US20060036951A1 (en) 2004-08-12 2004-08-12 Method of switching internet personas based on URL
US12/207,494 Expired - Fee Related US8176185B2 (en) 2004-08-12 2008-09-09 Method of switching Internet personas based on URL

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/207,494 Expired - Fee Related US8176185B2 (en) 2004-08-12 2008-09-09 Method of switching Internet personas based on URL

Country Status (1)

Country Link
US (2) US20060036951A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080027924A1 (en) * 2006-07-25 2008-01-31 Microsoft Corporation Persona-based application personalization
US20080040435A1 (en) * 2006-08-11 2008-02-14 Giovanni Buschi Method and system for personalizing an e-mail signature
US20130060850A1 (en) * 2011-09-07 2013-03-07 Elwha LLC, a limited liability company of the State of Delaware Computational systems and methods for regulating information flow during interactions
US8566401B1 (en) * 2006-12-22 2013-10-22 Symantec Corporation Method and apparatus for enabling e-mail routing and filtering based on dynamic identities
KR20140139111A (en) * 2012-03-30 2014-12-04 이베이 인크. User authentication and authorization using personas
EP2916514A3 (en) * 2014-02-18 2015-10-21 Synology Incorporated A method for processing URL and an associated server and a non-transitory computer readable storage medium
US9230089B2 (en) 2012-07-16 2016-01-05 Ebay Inc. User device security manager
US20160070453A1 (en) * 2014-09-05 2016-03-10 Verizon Patent And Licensing Inc. Method and system for indicating social categories
US9319410B1 (en) * 2014-01-07 2016-04-19 Fundology, Inc. Electronic shared-document repository
US9432190B2 (en) 2011-09-07 2016-08-30 Elwha Llc Computational systems and methods for double-encrypting data for subsequent anonymous storage
US9473647B2 (en) 2011-09-07 2016-10-18 Elwha Llc Computational systems and methods for identifying a communications partner
US9491146B2 (en) 2011-09-07 2016-11-08 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US9690853B2 (en) 2011-09-07 2017-06-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9747561B2 (en) 2011-09-07 2017-08-29 Elwha Llc Computational systems and methods for linking users of devices
US10074113B2 (en) 2011-09-07 2018-09-11 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
US10165079B2 (en) * 2010-12-21 2018-12-25 Microsoft Technology Licensing, Llc Providing a persona-based application experience
US10185814B2 (en) 2011-09-07 2019-01-22 Elwha Llc Computational systems and methods for verifying personal information during transactions
US10198729B2 (en) 2011-09-07 2019-02-05 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10263936B2 (en) 2011-09-07 2019-04-16 Elwha Llc Computational systems and methods for identifying a communications partner
US10546306B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US20210136059A1 (en) * 2019-11-05 2021-05-06 Salesforce.Com, Inc. Monitoring resource utilization of an online system based on browser attributes collected for a session

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134548A (en) * 1998-11-19 2000-10-17 Ac Properties B.V. System, method and article of manufacture for advanced mobile bargain shopping
US20020006126A1 (en) * 1998-07-24 2002-01-17 Gregory Johnson Methods and systems for accessing information from an information source
US6345289B1 (en) * 1997-03-18 2002-02-05 International Business Machines Corporation Intermediate system transmitting relevant selections based on permutation function applied consumer/information signature vectors for privacy
US20020095454A1 (en) * 1996-02-29 2002-07-18 Reed Drummond Shattuck Communications system
US20020116388A1 (en) * 2001-01-29 2002-08-22 Clement Gary L. Methods and apparatus for providing on-the-job performance support
US20020171679A1 (en) * 2001-05-17 2002-11-21 Clapper Edward O. Hardware cross-emulation using personas
US20030023880A1 (en) * 2001-07-27 2003-01-30 Edwards Nigel John Multi-domain authorization and authentication
US20030126094A1 (en) * 2001-07-11 2003-07-03 Fisher Douglas C. Persistent dynamic payment service
US20030131260A1 (en) * 2002-01-10 2003-07-10 International Business Machines Corporation Strategic internet persona assumption
US20030135587A1 (en) * 2000-01-24 2003-07-17 Andrew Fisher Method and system of state management for data communications
US20030221122A1 (en) * 2002-04-18 2003-11-27 International Business Machines Corporation Autonomic security settings switching based upon a network connection security profile
US7117504B2 (en) * 2001-07-10 2006-10-03 Microsoft Corporation Application program interface that enables communication for a network software platform
US20070074169A1 (en) * 2005-08-25 2007-03-29 Fortify Software, Inc. Apparatus and method for analyzing and supplementing a program to provide security
US20070118803A1 (en) * 2000-05-08 2007-05-24 Walker Jay S Products and processes for providing one or more links in an electronic file that is presented to a user
US20070128899A1 (en) * 2003-01-12 2007-06-07 Yaron Mayer System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows
US7330890B1 (en) * 1999-10-22 2008-02-12 Microsoft Corporation System for providing personalized content over a telephone interface to a user according to the corresponding personalization profile including the record of user actions or the record of user behavior
US20080077983A1 (en) * 2006-09-22 2008-03-27 Bea Systems, Inc. Non-invasive insertion of pagelets
US20080082959A1 (en) * 2004-10-22 2008-04-03 New Technology/Enterprise Limited Data processing system and method
US7436939B1 (en) * 2001-09-26 2008-10-14 Sprint Spectrum L.P. Method and system for consolidated message notification in a voice command platform

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040220926A1 (en) * 2000-01-03 2004-11-04 Interactual Technologies, Inc., A California Cpr[P Personalization services for entities from multiple sources
US7634732B1 (en) * 2003-06-26 2009-12-15 Microsoft Corporation Persona menu

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6757710B2 (en) * 1996-02-29 2004-06-29 Onename Corporation Object-based on-line transaction infrastructure
US20020095454A1 (en) * 1996-02-29 2002-07-18 Reed Drummond Shattuck Communications system
US20050004978A1 (en) * 1996-02-29 2005-01-06 Reed Drummond Shattuck Object-based on-line transaction infrastructure
US6345289B1 (en) * 1997-03-18 2002-02-05 International Business Machines Corporation Intermediate system transmitting relevant selections based on permutation function applied consumer/information signature vectors for privacy
US20020006126A1 (en) * 1998-07-24 2002-01-17 Gregory Johnson Methods and systems for accessing information from an information source
US6134548A (en) * 1998-11-19 2000-10-17 Ac Properties B.V. System, method and article of manufacture for advanced mobile bargain shopping
US7330890B1 (en) * 1999-10-22 2008-02-12 Microsoft Corporation System for providing personalized content over a telephone interface to a user according to the corresponding personalization profile including the record of user actions or the record of user behavior
US20030135587A1 (en) * 2000-01-24 2003-07-17 Andrew Fisher Method and system of state management for data communications
US20070118803A1 (en) * 2000-05-08 2007-05-24 Walker Jay S Products and processes for providing one or more links in an electronic file that is presented to a user
US20020116388A1 (en) * 2001-01-29 2002-08-22 Clement Gary L. Methods and apparatus for providing on-the-job performance support
US7373495B2 (en) * 2001-05-17 2008-05-13 Intel Corporation Hardware cross-emulation using personas
US20020171679A1 (en) * 2001-05-17 2002-11-21 Clapper Edward O. Hardware cross-emulation using personas
US20070100967A1 (en) * 2001-07-10 2007-05-03 Microsoft Corporation Application Program Interface for Network Software Platform
US7117504B2 (en) * 2001-07-10 2006-10-03 Microsoft Corporation Application program interface that enables communication for a network software platform
US20030126094A1 (en) * 2001-07-11 2003-07-03 Fisher Douglas C. Persistent dynamic payment service
US20030023880A1 (en) * 2001-07-27 2003-01-30 Edwards Nigel John Multi-domain authorization and authentication
US7436939B1 (en) * 2001-09-26 2008-10-14 Sprint Spectrum L.P. Method and system for consolidated message notification in a voice command platform
US6990590B2 (en) * 2002-01-10 2006-01-24 International Business Machines Corporation Strategic internet persona assumption
US20030131260A1 (en) * 2002-01-10 2003-07-10 International Business Machines Corporation Strategic internet persona assumption
US20030221122A1 (en) * 2002-04-18 2003-11-27 International Business Machines Corporation Autonomic security settings switching based upon a network connection security profile
US20070128899A1 (en) * 2003-01-12 2007-06-07 Yaron Mayer System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows
US20080082959A1 (en) * 2004-10-22 2008-04-03 New Technology/Enterprise Limited Data processing system and method
US20070074169A1 (en) * 2005-08-25 2007-03-29 Fortify Software, Inc. Apparatus and method for analyzing and supplementing a program to provide security
US20080077983A1 (en) * 2006-09-22 2008-03-27 Bea Systems, Inc. Non-invasive insertion of pagelets

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7613692B2 (en) 2006-07-25 2009-11-03 Microsoft Corporation Persona-based application personalization
US20080027924A1 (en) * 2006-07-25 2008-01-31 Microsoft Corporation Persona-based application personalization
US20080040435A1 (en) * 2006-08-11 2008-02-14 Giovanni Buschi Method and system for personalizing an e-mail signature
US8566401B1 (en) * 2006-12-22 2013-10-22 Symantec Corporation Method and apparatus for enabling e-mail routing and filtering based on dynamic identities
US10165079B2 (en) * 2010-12-21 2018-12-25 Microsoft Technology Licensing, Llc Providing a persona-based application experience
US10606989B2 (en) 2011-09-07 2020-03-31 Elwha Llc Computational systems and methods for verifying personal information during transactions
US9432190B2 (en) 2011-09-07 2016-08-30 Elwha Llc Computational systems and methods for double-encrypting data for subsequent anonymous storage
US10546295B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10523618B2 (en) 2011-09-07 2019-12-31 Elwha Llc Computational systems and methods for identifying a communications partner
US10263936B2 (en) 2011-09-07 2019-04-16 Elwha Llc Computational systems and methods for identifying a communications partner
US10198729B2 (en) 2011-09-07 2019-02-05 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10185814B2 (en) 2011-09-07 2019-01-22 Elwha Llc Computational systems and methods for verifying personal information during transactions
US10546306B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9473647B2 (en) 2011-09-07 2016-10-18 Elwha Llc Computational systems and methods for identifying a communications partner
US9491146B2 (en) 2011-09-07 2016-11-08 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US10079811B2 (en) 2011-09-07 2018-09-18 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US9690853B2 (en) 2011-09-07 2017-06-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9747561B2 (en) 2011-09-07 2017-08-29 Elwha Llc Computational systems and methods for linking users of devices
US20130060850A1 (en) * 2011-09-07 2013-03-07 Elwha LLC, a limited liability company of the State of Delaware Computational systems and methods for regulating information flow during interactions
US9928485B2 (en) * 2011-09-07 2018-03-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10074113B2 (en) 2011-09-07 2018-09-11 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
KR101830038B1 (en) 2012-03-30 2018-02-19 이베이 인크. User authentication and authorization using personas
AU2013237959B2 (en) * 2012-03-30 2015-07-30 Ebay Inc. User authentication and authorization using personas
EP3843328A1 (en) * 2012-03-30 2021-06-30 eBay Inc. User authentication and authorization using personas
US10754941B2 (en) 2012-03-30 2020-08-25 Ebay Inc. User device security manager
KR20140139111A (en) * 2012-03-30 2014-12-04 이베이 인크. User authentication and authorization using personas
EP2792105A4 (en) * 2012-03-30 2016-02-17 Ebay Inc User authentication and authorization using personas
KR101711270B1 (en) 2012-03-30 2017-02-28 이베이 인크. User authentication and authorization using personas
EP3554002A1 (en) * 2012-03-30 2019-10-16 eBay, Inc. User authentication and authorization using personas
US9230089B2 (en) 2012-07-16 2016-01-05 Ebay Inc. User device security manager
US9319410B1 (en) * 2014-01-07 2016-04-19 Fundology, Inc. Electronic shared-document repository
EP2916514A3 (en) * 2014-02-18 2015-10-21 Synology Incorporated A method for processing URL and an associated server and a non-transitory computer readable storage medium
US10375141B2 (en) 2014-02-18 2019-08-06 Synology Incorporated Method for processing URL and associated server and non-transitory computer readable storage medium
US20160070453A1 (en) * 2014-09-05 2016-03-10 Verizon Patent And Licensing Inc. Method and system for indicating social categories
US10176535B2 (en) * 2014-09-05 2019-01-08 Verizon Patent And Licensing Inc. Method and system for providing social category indicators in a user profile header of an on-line posting
US20210136059A1 (en) * 2019-11-05 2021-05-06 Salesforce.Com, Inc. Monitoring resource utilization of an online system based on browser attributes collected for a session

Also Published As

Publication number Publication date
US20090077468A1 (en) 2009-03-19
US8176185B2 (en) 2012-05-08

Similar Documents

Publication Publication Date Title
US8176185B2 (en) Method of switching Internet personas based on URL
US6810410B1 (en) Customizing a client application using an options page stored on a server computer
US8103737B2 (en) System and method for previewing hyperlinks with ‘flashback’ images
TW424185B (en) Named bookmark sets
US9154493B2 (en) Managing multiple logins from a single browser
US6510458B1 (en) Blocking saves to web browser cache based on content rating
KR100310760B1 (en) Method and system for the international support of internet web pages
US6567918B1 (en) Saved Web page security system and method
US6081829A (en) General purpose web annotations without modifying browser
US6632248B1 (en) Customization of network documents by accessing customization information on a server computer using uniquie user identifiers
RU2589306C2 (en) Remote viewing session control
US6453342B1 (en) Method and apparatus for selective caching and cleaning of history pages for web browsers
US7624351B2 (en) Methods and apparatus for controlling a plurality of applications
US7548922B2 (en) Customized and consolidated bookmarks
US5870767A (en) Method and system for rendering hyper-link information in a printable medium from a graphical user interface
US20020191020A1 (en) Method and apparatus for removing confindential information from a history
JP4856704B2 (en) Computer-implemented method, system, and computer program for representing data as graphical topology representation (computer-implemented method for representing data as graphical topology representation)
US6963901B1 (en) Cooperative browsers using browser information contained in an e-mail message for re-configuring
JP2003150542A (en) Method for sharing annotation information to be added to digital content, program and computer system
US20080140777A1 (en) Selective mirrored site accesses from a communication
US7137009B1 (en) Method and apparatus for securing a cookie cache in a data processing system
WO2002059734A1 (en) Interactive marking and recall of a document
US20090172107A1 (en) Proxy content for submitting web service data in the user's security context
JP2000207421A (en) Method and system for retrieving document by using hyperlink
US20060020615A1 (en) Method of automatically including parenthetical information from set databases while creating a document

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MARION, NEAL RICHARD;MULLEN, SHAWN PATRICK;RAMSAY III, GEORGE F.;AND OTHERS;REEL/FRAME:015088/0531;SIGNING DATES FROM 20040809 TO 20040810

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION