WO2004038563A2 - System and method for automatically launching and accessing network addresses and applications - Google Patents
System and method for automatically launching and accessing network addresses and applications Download PDFInfo
- Publication number
- WO2004038563A2 WO2004038563A2 PCT/US2003/034012 US0334012W WO2004038563A2 WO 2004038563 A2 WO2004038563 A2 WO 2004038563A2 US 0334012 W US0334012 W US 0334012W WO 2004038563 A2 WO2004038563 A2 WO 2004038563A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- launch
- user
- automatically
- information
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
Definitions
- the invention relates to the automatic launching of network addresses and applications. More particularly, the invention relates to a system and method for automatically launching one or more application programs and/or one or more network addresses and automatically logging in to websites that require user authentication data prior to gaining access to certain data or web pages.
- the use of computing devices, the Internet and the World Wide Web has increased dramatically in recent years.
- users often have accounts with and otherwise access many network addresses, e.g., websites, that require certain user authentication information to be entered prior to gaining access to the website or to certain privileged data.
- the user authentication information typically includes, for example, user identification, such as a username, a password and optionally an answer to a particular question that the user has previously answered and that other users would be unlikely to know.
- Users commonly access many different network addresses with many different usernames and passwords, and it can be very difficult to remember which user authentication information is used to access each of the various network addresses.
- users of computing devices often initiate many applications programs for accessing data files and browsers for accessing many network addresses. Users typically manually initiate applications for each of the potentially many data files they wish to open, as well as manually initiating multiple browsers for each of the network addresses they wish to access.
- the process of manually initiating each file, network address and login can be a very cumbersome and time- consuming process, and often leads to frustration of the user.
- Yodlee that is available at the website http://www.yodlee.com.
- Yodlee requires the user to manually initiate access to the Yodlee website, then select each website the user wants to access one at a time from a list of Yodlee supported sites, as well as requiring the user to enter confidential and personal information and storing that information on remote computer servers separate from the user's computer.
- Many users object to this as invading their privacy and have serious concerns regarding the sharing of their personal information with third parties for marketing and other purposes.
- Another such product is "Gator” that is available at http://www.gator.com.
- Gator requires the user to manually process more access and login steps than Yodlee, is subject to many of the same privacy concerns, and also may install certain "spyware," for example, on the user's computing device to track the user's activities and report them to third parties over the network.
- spyware is essentially a program that is installed on one's computer to gather information about the user and her activities and relay it to advertisers or other interested third parties without the user's knowledge.
- U.S. Pat. No. 5,995,965 which is hereby incorporated by reference in its entirety, is related to the above-discussed technology, except that it includes automatic access being initiated by insertion of a smart portable device, such as a smart card. What is needed is therefore a system and method for automatically initiating access to one or more user-selected network addresses and/or computing application programs simultaneously while requiring minimal input from or actions by the user. This invention provides such a system and method.
- the user need only enter a password or personal identification number (PIN) or biometric information before the automatic launch is commenced.
- the system and method operate in a secure and private way, and store the user's personal and confidential information only on the user's own computing device, not on a remote server.
- the system and method provide the capability to automatically initiate the application programs such that they access specific data files generated by the particular application program.
- the Microsoft Excel application program can be automatically initiated to open one or more specific Excel data files, and the system and method enable the user to automatically login to one or more personal online accounts (e.g., e-mail accounts, a stock brokerage account) using the same system.
- the system and method automatically provide certain network addresses with user authentication data (if necessary), e.g., a username and password, and communicate over a computer network.
- One aspect of the invention includes a computerized system for automatically launching one or more application programs comprising a retrieval module for retrieving one or more stored network addresses, an application launch module for launching the one or more application programs to access the one or more stored network addresses, and a login module for automatically logging a user in to a network address by providing user authentication data in the login entry fields without user input.
- This additionally comprises the system wherein the application launch module further launches one or more application programs to access one or more user data files.
- the user- selected network address or addresses comprises one or more website Uniform Resource Locators (URLs).
- URLs Uniform Resource Locators
- An additional aspect of the invention includes a method of automatically launching one or more application programs comprising retrieving one or more stored network addresses, launching the one or more application programs to access the one or more stored network addresses, and automatically logging a user in to a network address, including providing user authentication data if needed in the login entry fields, without user input.
- This additionally comprises the method wherein the application launch module further launches one or more application programs to access one or more user data files.
- the user-selected network address(es) comprises one or more website URLs.
- This additionally comprises the method wherein the method is executed at system startup. This additionally comprises the method further comprising inputting user authentication information of a user before retrieving the one or more stored network addresses.
- Figure 1 is a system diagram of one example of a network and computer device configuration in which the automatic launch and login system according to the invention may operate.
- FIG. 2 is a flowchart of the main steps of a preferred operation of the invention.
- Figure 3 illustrates a launch control window
- this invention involves computer-executable software modules in a user's computer that automatically start (launch) a set of processes, including entry of any required access data such as user names, passwords, etc., and optionally activate data files related to the processes as needed.
- the processes may be web browsers, application programs, etc.
- the invention allows for a large range of variation in the type and number of processes that are automatically and (from the perspective of the user, simultaneously) launched; in effect, any process or group of processes that the user could launch manually using conventional input (such as keyboard or voice entries, mouse or touchpad movements, etc.) can be designated for automatic launch using the invention.
- the system automatically initiates access to one or more user-selected network addresses and/or computing application programs simultaneously while requiring minimal input from or actions by the user.
- the system and method operate in a secure and private way:
- the user's personal and confidential information is preferably stored, not on a remote server, but rather only on the user's own computing device, e.g., a personal computer (PC), personal digital assistant (PDA), web-enabled cell phone, set-top box, embedded system, or other wired or wireless computing device.
- PC personal computer
- PDA personal digital assistant
- system and method provide the capability to automatically initiate the application program(s) such that they optionally access specific data files generated by the particular application program and optionally provide authentication information to the application program.
- the Microsoft Excel application program can be automatically initiated to open one or more specific Excel user data files, including any authentication data such as a password if required to access the file(s).
- the system and method automatically provide certain network addresses with user authentication data (if required), e.g., username and password, and operate over a computer network, e.g., local area network (LAN), wide area network (WAN), dial-up connection, intranet, the Internet, public or private network, Virtual Private Network (VPN), or any of the multitude of other types of computer networks.
- LAN local area network
- WAN wide area network
- VPN Virtual Private Network
- the system and method provide a client-based solution in which the user's data (including network addresses, e.g., website Uniform Resource Locators, that is, URLs, any access and authentication data required, etc.) are stored with or on the local computing device.
- the automatic login feature may be performed by field detection, matching (or downloading of login information from a remote server or even from a locally stored file) and filling of data in the fields, and by automatically sending user entry events, e.g., the "Enter" keystroke or a computer mouse click.
- one such feature involves greatly enhanced consumer privacy, as personal and confidential data is not stored on a remote server but is instead stored on the user's computing device.
- An additional advantageous feature involves user control of the user's data, in that the user maintains and controls her own data instead of allowing a third-party organization access to this data.
- the system and method provide a server-based solution in which the user's data (including network addresses, e.g., website URLs and, if required, user login authentication data, if required, such as username and password) are stored on a remote server.
- network addresses e.g., website URLs and, if required, user login authentication data, if required, such as username and password
- This embodiment while still providing the advantages of automatic initiation and login of one or more network addresses while requiring a minimum of user input, does not provide the privacy advantage of storing the user's personal and confidential information on the user's computing device.
- the user authentication data required to access a certain network address will typically comprise a username and password.
- the authentication data might, however, also include any combination of a digital certificate, digital signature, biometric information, e.g., fingerprint, retinal or other eye scan, voice recognition, or other measurable physical characteristics that can be checked and verified.
- the one or multiple network addresses which may require user authentication information, may be accessed simultaneously, and the URL(s) and the user's authentication information (again, if required), previously stored either locally on the computing device they are using, or on a remote server, is automatically entered and submitted to the network address(es).
- the user gains access to the network address.
- the user does not have to manually input any required authentication information for each individual network address, and does not have to manually submit any required authentication information to a server to gain access to the network address.
- the user need to provide any manual input such as a keystroke or mouse click to launch and open one or more network addresses.
- the system and method according to the invention provide the user with the convenience of being able to access multiple network addresses and other applications simultaneously (that is, without requiring intermediate user action), saving the user the time and effort of having to remember and manually input the specific network addresses, and when required the necessary authentication information to access the network addresses, avoiding the effort of having to manually submit the information for authentication.
- Figure 1 illustrates the main hardware and software components used to implement the preferred embodiment of the invention.
- the user's computer includes both system hardware 100 and system software 110.
- System hardware will include one or more processors 101 , some form of non-volatile storage such as one or more disks 102, and one or more devices, such as a network interface card (NIC) 103, to connect the computer to a network 160.
- NIC network interface card
- Standard input devices such as a keyboard 105 and mouse 106 will normally also be connected in the conventional manner to the system hardware.
- the computer is a device such as a PDA or cellular telephone
- the non-volatile storage devices and input devices will of course be those standard in such systems.
- a reader 107 for a portable data-storage device 108 may also be connected to the user's computer.
- the portable data-storage device 108 may be completely passive, such as a simple floppy disk, magnetic strip card, etc., or it may be at least partially active, such as a smart card that can include computer-executable code.
- a display (either visual, audible, or a combination of both) 109 will also be connected to the system hardware; again, this is of course well known.
- Memory 120 typically high-speed RAM, is also included in the user's computer. Although normally considered part of the system hardware 100, the memory 120 is shown separately in Figure 1 to make it easier to understand the function of the invention's software components.
- System software 110 will include some form of operating system 112 whose operation and functions are well known. Note that almost all devices that include a processor that executes code will also include some form of system-level kernel that serves as an interface between user-level applications and physical system resources, including the processor itself. For example, even web-enabled cellular phones include a program that accepts user-specified addresses or file names and submits them according to the appropriate protocol to its wireless network. As used in this application, the term "operating system” is to encompass all such system- level, resource-allocating software layers.
- a "computer” includes portable devices such as "personal digital assistants” and even modem cellular phones, many of which allow for functions such as web browsing, games, etc.; larger systems such as servers, mainframe computers, etc.; and other systems such as television set-top boxes.
- the memory 120 could be remote, in a server contacted via the Internet, or it could be a removable storage medium such as a flash card, a "memory stick," a smart card, etc.
- any of the thousands of different types and titles of applications 120 may be loaded into the user's computer.
- the code and data defining each such application is stored in non-volatile storage (such as the disk 102) until the operating system 112 loads it in whole or in part into memory 120 for execution.
- non-volatile storage such as the disk 102
- the operating system 112 loads it in whole or in part into memory 120 for execution.
- one or more browsers 132 will typically be included in the user's computer.
- the operating system 112 usually treats a browser like any other application. Nonetheless, the browser 132 is shown separately in Figure 1 to highlight the invention's unique ability to automatically launch and "log into” both general applications and sites on one or more remote servers 160, which may host not only web content (such as net sites and pages 162), databases, etc., as well as combinations such as customer and member account portals.
- the invention comprises an auto-launch (including, as needed, auto-login) utility or application 150, which in turn includes various modules 151-158, some of which are optional, which implement different features of the invention and are described below. All or any of the modules 151-158 may be implemented simply as sub-routines within the larger body of executable code that makes up the auto- launch application 150 as a whole.
- the auto-launch application can be installed in the user's computer in any normal manner such as by loading a CD-ROM disc, through downloading, etc.
- a launch list 122 which includes information identifying which processes are to be automatically launched using the invention
- a list 124 of network addresses for example URLs, that a browser or other network access software can use to access remotely stored content (stored, for example, in one of the servers 160)
- a set 126 of access and authorization data for example, user names, passwords, digital keys, etc.
- Each of the illustrated memory structures 122, 124, 126 will normally be stored as one or more files on disk, or on some other non- volatile storage medium, and then loaded into memory when the auto-launch application itself is initiated. All of the structures 122, 124, 126 (as well as any other parameters used by the invention) may be stored as a single file as long as this file is structured in a manner known to the module 152 that is to retrieve the stored information.
- the type of information used for auto-launch and access will of course depend on what types of applications are to be launched. For example, if no web sites are to be automatically accessed, then there will be no need to retrieve network addresses.
- Fig 2 is a flowchart that shows the main actions of the system according to the invention.
- the main procedural steps of the invention are:
- Step 200 The invention is itself started. This may be done either automatically or manually.
- the auto-launch module 150 can be included in the standard start-up list used by the operating system. It would also be possible to include the auto-launch module according to the invention as part of system software itself so that it would load along with other system-level processes during booting. Assuming connection of suitable hardware, auto-launch could also be activated by some other means such as by insertion of a key or smart card, by successful fingerprint or retinal scanning, by voice recognition, etc.
- an icon could be generated on the user's desktop or system tray, or on a toolbar, or in some list; when the operating system senses user selection of this icon (or program name), then it will start the auto-launch application
- a startup module could also be required to activate the auto-launch application according to the invention.
- a startup module could also be required to activate the auto-launch application according to the invention.
- 151 is therefore preferably included as an interface to the operating system 112 and to interpret the user's manual input to activate the auto-launch program.
- Step 205 Once initiated, the auto-launch program needs to know what it is that is to be launched, and how to launch it.
- the invention may be used to auto- launch any number (including none) of browsers or browser instances, as well as any type and number (again, including none) of other applications. Note that not all auto-launched applications need to be "visible" to the user; rather, applications such as anti-virus or performance-monitoring software that run in the background may also be auto-launched using the invention.
- Non-browser applications such as a word-processing program, a spreadsheet, etc.
- each such application may be opened "blank,” it will usually be more helpful to the user for the applications to start with some associated data file(s) loaded and "ready.”
- the user might want his last-opened files to be opened along with the applications.
- the locators (file names and/or addresses) for any desired data files are therefore preferably maintained along with the respective applications in the launch list 122.
- the data files to be opened may be remotely stored; in this case, the locators will include the required network address(es).
- the launch list 122 therefore includes the information (usually the entry address) allowing the operating system to initiate the browser(s) to be auto-launched.
- a set 124 of addresses (such as URLs) is therefore also preferably stored in memory, with any standard data structure used to associate these addresses with the browser.
- Some browsers, such as Microsoft Internet Explorer have only one remote address "active" at any given time, so that multiple browser instances must be opened if one wants to have multiple web pages available on-screen.
- Other browsers such as Opera allow multiple web pages (URLs) to be accessed and open within a single browser instance.
- Both types of browsers may be auto-launched using the invention.
- the invention may also be used to auto-launch applications - including browsers - with addresses or other locators to records in a remote data base. Accessing such database records may be done in a manner analogous to accessing specific web pages.
- database here includes such sites/structures as customer account information and the like, whose associated launch information will typically include both a network address and descriptors identifying at least one remotely stored data file.
- an application that does not presuppose a network connection will usually have associated with it one or more data files (such as documents) to be opened; accessing a web site presupposes not only some form of browser or analogous interface software, but also some identifier (for example URL) to the site; access to database records presupposes some form of record or file identifier; etc.
- each type of process that may be auto- launched using the invention will usually (but not necessarily) also have some other secondary information associated with it in order to recreate the user's preferred work environment.
- the information used to identify the document(s), network address(es), record(s), etc. is referred to as "associated launch data.”
- Step 210 In many cases, applications or data files or web pages cannot be launched or opened or accessed without entry of user-specific or other security information. Typically such information will include a user name, a password or other authorization code, a digital signature, or even biometric information such as a fingerprint. For each application, file, page, etc. to be auto-accessed using the invention, the corresponding access/authentication data is preferably stored in memory in ay suitable data structure 126.
- a network connection module 153 within the auto-launch program preferably determines whether the user's computer has an active connection, and what type of connection is involved. This may be done using known software techniques. If user action is required to establish the network connection, the network connection module 153 preferably instructs the user interface 157 (see below) to call up appropriate log-in windows, which are typically generated by the operating system.
- opening a network connection usually involves running a user- level program like any other.
- most modern operating systems allow a user to define and configure any number of network connections.
- An icon or at least a name is then associated with each configured connection.
- Connection configuration may (but need not) include storing access information such as the user's name and password.
- To initiate the connection the user clicks on the corresponding icon, chooses the connection from a list, etc., whereupon the operating system initiates the connecting program like any other.
- Known operating system signals are also available to user-level programs to let them know that there is an active and available network connection, be it manually opened or always on.
- a protected application, web page, etc. When a protected application, web page, etc., is initiated or accessed, it will typically generate (either on its own or through a utility in the operating system) at least one window or screen with log-in data entry fields that the user is to fill in and submit.
- the programs for establishing network connections generally generate such windows as well in order to first establish the network connection.
- a field detection module 157 is preferably included to detect the presentation of such entry fields (or simply the requirement to enter data) and "auto- fill" module 154 is preferably included to enter and submit the required data automatically.
- a launch module 155 is activated, which submits the launch information to the operating system, which in turn loads the selected applications and files, as well as browsers and locators (such as URLs).
- the launch module which submits the corresponding entries to the operating system through its standard application program interface.
- the operating system accesses the network 160 with any associated network address(es) retrieved from memory region 124.
- Some of the selected web sites may require log-in information. This requirement is expressed to the browser in the form of downloaded html (or other, such as Java) code, and as such is detectable by user-level processes such as a field-detection module 156.
- the auto-fill module 154 detects which log-in information is required in each field and submits to the operating system the key (or other input) sequences required to fill in the fields with the correct authentication and/or access data, which is available in memory region 126. Once all such information is submitted for each network location, the state of the user's computer will be as if he had manually activated all desired applications and files, browsers and network sites.
- Step 215 At this point, the user may begin a work session, using whatever files and sites have been automatically opened for her.
- the auto-launch program 150 may then simply monitor the user's actions or remain idle until invoked by the user (for example, by clicking on an icon designed for the purpose) in order to change the auto-launch information stored in memory in regions 122, 124, 126.
- Step 220 The user may of course choose to end her session with the computer altogether, or to deactivate the invention while continuing other work. Since the auto-launch program is a user-level process, the operating system will halt and unload it like any other process if the user chooses to shut down the computer. Alternatively, the user could specifically close the auto-launch program in any common manner, for example by selecting the program and either clicking on the standard "close” button (usually shown as an "X" at the top right of active windows) or an icon or button displayed specifically for the purpose by the auto-launch program itself. If closed, the program will reach the end 250 of its operation for the current session.
- the standard "close” button usually shown as an "X" at the top right of active windows
- an icon or button displayed specifically for the purpose by the auto-launch program itself. If closed, the program will reach the end 250 of its operation for the current session.
- Step 225 Assume that the user wants to update his auto-launch list or parameters. Using any conventional method, such as clicking on an icon, the user may then open the user interface 157 to display a control window.
- a control window 300 is illustrated in Figure 3.
- the interface 157 displays a list 305 of all applications, network addresses, etc., that are currently selected for potential auto-launching.
- buttons, etc. are included to remind the user of the status of each listed process.
- a symbol 306 such as a small rocket is shown next to each process to indicate that the process is set to be auto-launched using the invention.
- a lock icon 307 may be included to indicate that the site is also set for auto-login (with, for example, user name and password).
- Standard radio buttons 308 or similar graphical devices are preferably included next to the listed processes to indicate which is currently selected for editing or other updating. Note that a process may be listed in the control window 300 but not marked for auto-launch; one such process is shown as "Budget File" in Figure 3. For example, a process previously selected for auto-launch might have been de-selected. If the user wants it removed entirely, he may select it and click on "Delete.”
- Updating the auto-launch profile may be done in either (or both) of two ways: manually or through automatic detection:
- the user wants to edit the information, for example, for accessing a web site or for designating which files are to be opened along with a word-processing program.
- the user edits a process (such as a website or application) record by selecting the name of the process from the list 305, for example, by checking the adjacent radio button or clicking on it with a mouse or similar cursor-control device.
- the user has selected to update information relating to his e-mail account.
- the user interface 157 may then generate, and cause to be displayed, a typical dialog box, into which the user can make changes to such authorization and access data as the title, URL, username, password, and auto-launch/auto-login status of the selected website.
- a listed process may be deleted from the auto-launch list 305 by selecting the process and clicking on a button such as "Delete.” Later confirmation of this decision causes the corresponding entry to be deleted from the launch list 122 as well.
- the "Move” button illustrated in Figure 3 controls a preferred feature in which the user can change the order in which processes are listed and auto-launched.
- the "Go” button is preferably included to manually open the currently selected process.
- buttons such as “My Web,” and “My Apps,” are preferably included to make it easier for the user to access features of the invention, although they are optional; buttons for other features may of course also be included depending on the needs of a given application of the invention. Clicking on "My Web” and “My Apps” buttons causes only network sites or non-network based applications, respectively, to be shown in the currently displayed list 305.
- Step 230 An advantageous feature included in the preferred embodiment of the invention is its convenience and flexibility when it comes to adding new processes to the auto-launch list. Adding processes may be wholly automated, performed manually, or both.
- the preferred embodiment of the invention for adding processes to the auto- launch list 122 uses automatic capture via the module 158. Assume that the user has opened an application (with any desired data files) and/or a web page and assume that the user wants this process environment (program plus any associated open data files and/or network addresses) added to the launch list 122. In other words, assume that a running process is the currently active, displayed process, along with whatever data file(s) are also currently being worked on. For example, the user may currently be working with a word-processing program with three open documents. The program will then be the active process and the documents will be the associated launch information.
- the user may add the process and its associated launch information to the auto-launch list this simply by clicking on the "Add" button (or some analogous icon).
- the invention thus provides (but does not require) a "one- click" process-addition feature; it would be possible, however, to require the user to confirm desired addition via an additional window.
- the capture module then extracts all parameters needed to open the process (usually, executable file name and location) and currently associated data files (usually by file name) from the current status of the running process. If available, the module may also capture whatever log-in information was required to open the process. If not readily available, the capture module could extract this information if other modules, such as the field detection module 156, are programmed to track user input to identify manual input of log-in information.
- the process currently in active use is then preferably added to the currently displayed list 305 so that the user will have an opportunity to change her mind before the extracted parameters are entered into the data structures 122, 124, 126 for use the next time the auto-launch program according to the invention is activated.
- the user interface 157 could display for the user a confirmation window that asks the user to confirm whether the current process should be listed in the control window 300 and whether it should be auto-launched when the auto-launch program 150 itself is next launched.
- the capture module 158 enters the captured data into the appropriate data structures 122, 124, 126 in memory.
- the user may leave the information extracted by auto-capture unchanged, or he may edit it. For example, the user might want to change the name of a current website record in a "Title" field and assign a name that allows him to distinguish it more easily from the others in the event of multiple accounts.
- Steps 235 and 240 The preferred embodiment of the invention does not require specific user action - such as opening the control window 300 - to initiate auto-launch process capture. Assume, for example, that the user logs in to a password-protected web site (or application) for the first time (tracked in any known manner), or to a site not currently included in the launch list 122. This may be detected in any known manner.
- the application (via the interface 157) can then generate a window giving the user the opportunity, by clicking on appropriate buttons or checking conventional boxes, to add this new process to the process list 305 and/or the launch list 122. Parameter input and capture may be done as before (see Step 230).
- the utility preferably includes certain error-handling mechanisms.
- the auto-launch application 150 is itself launched by insertion of a smart card. It is possible that a file path stored on the card is no longer valid, or, indeed, that a listed application is no longer resident on the computer in which the card is inserted. Any known mechanism is therefore included within the auto-launch application 150 to notify the user whenever a process that is listed for auto-launch cannot be launched.
- the auto-launch application 150 could give a special indication, such as distinctive shading in the control window 300, to any un-launchable process, along with some message indicating the problem.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003284986A AU2003284986A1 (en) | 2002-10-25 | 2003-10-24 | System and method for automatically launching and accessing network addresses and applications |
EP03779305A EP1554659A4 (en) | 2002-10-25 | 2003-10-24 | System and method for automatically launching and accessing network addresses and applications |
US10/532,781 US20060031289A1 (en) | 2002-10-25 | 2003-10-24 | System and method for automatically launching and accessing netwrok addresses and applications |
JP2004547198A JP2006504189A (en) | 2002-10-25 | 2003-10-24 | System and method for automatic activation and access of network addresses and applications (priority) This is an international patent application filed under the Patent Cooperation Treaty (PCT). This international application claims priority from US Provisional Application No. 60 / 421,622, filed October 25, 2002, which is incorporated by reference. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US42162202P | 2002-10-25 | 2002-10-25 | |
US60/421,622 | 2002-10-25 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004038563A2 true WO2004038563A2 (en) | 2004-05-06 |
WO2004038563A3 WO2004038563A3 (en) | 2004-07-22 |
Family
ID=32176732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2003/034012 WO2004038563A2 (en) | 2002-10-25 | 2003-10-24 | System and method for automatically launching and accessing network addresses and applications |
Country Status (6)
Country | Link |
---|---|
US (1) | US20060031289A1 (en) |
EP (1) | EP1554659A4 (en) |
JP (1) | JP2006504189A (en) |
CN (1) | CN1732452A (en) |
AU (1) | AU2003284986A1 (en) |
WO (1) | WO2004038563A2 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005119514A1 (en) * | 2004-06-03 | 2005-12-15 | International Business Machines Corporation | Saving multiple browser instances as a selectable web project |
EP1895744A1 (en) * | 2006-08-30 | 2008-03-05 | Research In Motion Limited | Method and apparatus for simplified user access to multiple browser transports in a mobile communication device |
US7792965B2 (en) | 2006-08-30 | 2010-09-07 | Research In Motion Limited | Method and apparatus for simplified user access to multiple browser transports in a mobile communication device |
US20110221568A1 (en) * | 2010-03-15 | 2011-09-15 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US8230485B2 (en) | 2004-09-15 | 2012-07-24 | Microsoft Corporation | Method and system for controlling access privileges for trusted network nodes |
US8271792B2 (en) | 2008-02-20 | 2012-09-18 | Ricoh Company, Ltd. | Image processing apparatus, authentication package installation method, and computer-readable recording medium |
US20120297471A1 (en) * | 2006-07-13 | 2012-11-22 | Brian Smithson | Approach for securely processing an electronic document |
US10698989B2 (en) | 2004-12-20 | 2020-06-30 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US10764044B1 (en) | 2006-05-05 | 2020-09-01 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US10769939B2 (en) | 2007-11-09 | 2020-09-08 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US10909229B2 (en) | 2013-05-10 | 2021-02-02 | Proxense, Llc | Secure element as a digital pocket |
US10943471B1 (en) | 2006-11-13 | 2021-03-09 | Proxense, Llc | Biometric authentication using proximity and secure information on a user device |
US10971251B1 (en) | 2008-02-14 | 2021-04-06 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US11080378B1 (en) | 2007-12-06 | 2021-08-03 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US11086979B1 (en) | 2007-12-19 | 2021-08-10 | Proxense, Llc | Security system and method for controlling access to computing resources |
US11113482B1 (en) | 2011-02-21 | 2021-09-07 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11258791B2 (en) | 2004-03-08 | 2022-02-22 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US11546325B2 (en) | 2010-07-15 | 2023-01-03 | Proxense, Llc | Proximity-based system for object tracking |
US11553481B2 (en) | 2006-01-06 | 2023-01-10 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8005732B2 (en) | 2003-12-31 | 2011-08-23 | American Express Travel Related Services Company, Inc. | System for reducing information required to open a new account |
US20090106558A1 (en) * | 2004-02-05 | 2009-04-23 | David Delgrosso | System and Method for Adding Biometric Functionality to an Application and Controlling and Managing Passwords |
US20060288057A1 (en) * | 2005-06-15 | 2006-12-21 | Ian Collins | Portable data backup appliance |
US8661540B2 (en) * | 2005-10-07 | 2014-02-25 | Imation Corp. | Method and apparatus for secure credential entry without physical entry |
US7844445B2 (en) * | 2005-10-12 | 2010-11-30 | Storage Appliance Corporation | Automatic connection to an online service provider from a backup system |
US7822595B2 (en) * | 2005-10-12 | 2010-10-26 | Storage Appliance Corporation | Systems and methods for selectively copying embedded data files |
US20080028008A1 (en) * | 2006-07-31 | 2008-01-31 | Storage Appliance Corporation | Optical disc initiated data backup |
US7813913B2 (en) | 2005-10-12 | 2010-10-12 | Storage Appliance Corporation | Emulation component for data backup applications |
US7702830B2 (en) * | 2005-10-12 | 2010-04-20 | Storage Appliance Corporation | Methods for selectively copying data files to networked storage and devices for initiating the same |
US8195444B2 (en) * | 2005-10-12 | 2012-06-05 | Storage Appliance Corporation | Systems and methods for automated diagnosis and repair of storage devices |
US7818160B2 (en) | 2005-10-12 | 2010-10-19 | Storage Appliance Corporation | Data backup devices and methods for backing up data |
US20070091746A1 (en) * | 2005-10-12 | 2007-04-26 | Storage Appliance Corporation | Optical disc for simplified data backup |
US7899662B2 (en) | 2005-10-12 | 2011-03-01 | Storage Appliance Corporation | Data backup system including a data protection component |
US11227676B2 (en) * | 2006-02-21 | 2022-01-18 | Universal Secure Registry, Llc | Universal secure registry |
US20080172487A1 (en) * | 2007-01-03 | 2008-07-17 | Storage Appliance Corporation | Systems and methods for providing targeted marketing |
EP2135429B1 (en) * | 2007-03-16 | 2017-09-06 | BRITISH TELECOMMUNICATIONS public limited company | Data transmission scheduler |
CN101640719A (en) * | 2008-07-30 | 2010-02-03 | 深圳富泰宏精密工业有限公司 | Alarm clock task management system and method |
EP2634719B1 (en) * | 2008-12-01 | 2018-03-28 | BlackBerry Limited | System and method of providing biometric quick launch |
US20100138914A1 (en) * | 2008-12-01 | 2010-06-03 | Research In Motion Limited | System and method of providing biometric quick launch |
US9009816B2 (en) * | 2009-01-21 | 2015-04-14 | Imation Corp. | Removable memory storage device with multiple authentication processes |
JP2010198341A (en) * | 2009-02-25 | 2010-09-09 | Fujitsu Fsas Inc | Authentication processing program and device |
US20110119756A1 (en) * | 2009-11-18 | 2011-05-19 | Carefx Corporation | Method Of Managing Usage Of A Workstation And Desktop Management System Therefor |
KR101313977B1 (en) * | 2009-12-18 | 2013-10-01 | 한국전자통신연구원 | Iptv service control method and system using mobile device |
US8413137B2 (en) | 2010-02-04 | 2013-04-02 | Storage Appliance Corporation | Automated network backup peripheral device and method |
CN101859253A (en) * | 2010-03-08 | 2010-10-13 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for customizing applications and displaying application information |
US8595551B2 (en) | 2010-06-11 | 2013-11-26 | Microsoft Corporation | Web application transitioning and transient web applications |
US8863001B2 (en) | 2010-06-11 | 2014-10-14 | Microsoft Corporation | Web application home button |
US8671384B2 (en) | 2010-06-11 | 2014-03-11 | Microsoft Corporation | Web application pinning including task bar pinning |
US8429546B2 (en) | 2010-06-11 | 2013-04-23 | Microsoft Corporation | Creating task sessions |
US9164671B2 (en) | 2010-06-11 | 2015-10-20 | Microsoft Technology Licensing, Llc | Web application navigation domains |
US8793650B2 (en) | 2010-06-11 | 2014-07-29 | Microsoft Corporation | Dynamic web application notifications including task bar overlays |
US8434135B2 (en) | 2010-06-11 | 2013-04-30 | Microsoft Corporation | Creating and launching a web application with credentials |
US20110307810A1 (en) * | 2010-06-11 | 2011-12-15 | Isreal Hilerio | List integration |
US9319625B2 (en) * | 2010-06-25 | 2016-04-19 | Sony Corporation | Content transfer system and communication terminal |
CN101916197A (en) * | 2010-07-22 | 2010-12-15 | 北京东土科技股份有限公司 | Method for controlling self-starting program of system |
US20120042286A1 (en) * | 2010-08-10 | 2012-02-16 | Rmt, Inc. | Graphical Computer Application Recall System and Method |
US20120210238A1 (en) * | 2011-02-11 | 2012-08-16 | Sony Network Entertainment International Llc | Direct service launch on a second display |
US9223948B2 (en) | 2011-11-01 | 2015-12-29 | Blackberry Limited | Combined passcode and activity launch modifier |
CN105160240B (en) * | 2012-09-20 | 2018-03-20 | 北京奇安信科技有限公司 | A kind of terminal password protection method and device |
CN102999358A (en) * | 2012-11-19 | 2013-03-27 | 广东欧珀移动通信有限公司 | Intelligent program starting method |
CN103019825A (en) * | 2012-12-24 | 2013-04-03 | 北京小米科技有限责任公司 | Method and device for controlling applications |
KR20150042643A (en) * | 2013-10-11 | 2015-04-21 | 삼성전자주식회사 | Terminal appartus and method for connecting to virtual server in a vritual desktop infrastructure |
CN103957209B (en) * | 2014-04-29 | 2018-04-17 | 北京奇虎科技有限公司 | Optimizer, optimization method and the optimization system of online game |
US9524172B2 (en) * | 2014-09-29 | 2016-12-20 | Bank Of America Corporation | Fast start |
CN106951754B (en) * | 2016-01-06 | 2018-08-31 | 阿里巴巴集团控股有限公司 | A kind of frame display methods and device |
JP6729229B2 (en) * | 2016-09-15 | 2020-07-22 | 沖電気工業株式会社 | File generation device, communication processing device, file generation method, communication processing method, and program |
WO2018157362A1 (en) * | 2017-03-02 | 2018-09-07 | 廖建强 | Access control method and terminal |
US10534899B2 (en) | 2017-08-24 | 2020-01-14 | Blackberry Limited | Utilizing inputs for accessing devices |
CN108415735B (en) * | 2018-02-01 | 2022-04-05 | 麒麟软件有限公司 | Quick starting method of Web browser |
CN109614212A (en) * | 2018-12-05 | 2019-04-12 | 北京达佳互联信息技术有限公司 | Using starting method, apparatus, terminal and storage medium |
US11599878B2 (en) * | 2018-12-19 | 2023-03-07 | Mastercard International Incorporated | Systems and methods for identifying errors in transaction messages |
CN113553226B (en) * | 2021-07-23 | 2023-03-21 | 曙光信息产业股份有限公司 | Startup and shutdown testing method, device, testing system, electronic equipment and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5412717A (en) * | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
US5128882A (en) * | 1990-08-22 | 1992-07-07 | The United States Of America As Represented By The Secretary Of The Army | Device for measuring reflectance and fluorescence of in-situ soil |
EP0570123B1 (en) * | 1992-05-15 | 1999-03-17 | Addison M. Fischer | Computer system security method and apparatus having program authorization information data structures |
US5742759A (en) * | 1995-08-18 | 1998-04-21 | Sun Microsystems, Inc. | Method and system for facilitating access control to system resources in a distributed computer system |
US5872930A (en) * | 1996-07-11 | 1999-02-16 | Microsoft Corporation | Load balancing between E-mail servers within a local area network |
EP1355169B1 (en) * | 1997-05-02 | 2010-02-10 | Baker Hughes Incorporated | Method and apparatus for controlling chemical injection of a surface treatment system |
JPH1125051A (en) * | 1997-07-09 | 1999-01-29 | Hitachi Ltd | Information system |
CA2309658C (en) * | 1997-11-12 | 2007-10-30 | Benjamin Slotznick | Automatically switching a user's interface from a program to another program while the first is processing |
JPH11175335A (en) * | 1997-12-05 | 1999-07-02 | Hitachi Ltd | User authentication method in plural job environments |
US6343507B1 (en) * | 1998-07-30 | 2002-02-05 | Schlumberger Technology Corporation | Method to improve the quality of a formation fluid sample |
JP4673460B2 (en) * | 1999-08-31 | 2011-04-20 | ソニー株式会社 | Password storage device, password supply method and password supply system |
JP2001188755A (en) * | 1999-12-28 | 2001-07-10 | Casio Comput Co Ltd | Communication electronic equipment and storage medium stored with communication processing program |
JP2001236315A (en) * | 2000-02-24 | 2001-08-31 | Nippon Telegr & Teleph Corp <Ntt> | User authentication system, user, authentication support device, and storage medium stored with user authenticating program |
WO2001065360A2 (en) * | 2000-02-28 | 2001-09-07 | 360 Degree Web, Inc. | Smart card enabled mobile personal computing environment |
JP2001306513A (en) * | 2000-04-21 | 2001-11-02 | Fujitsu Ltd | Information managing device and storage medium |
JP2002031232A (en) * | 2000-07-14 | 2002-01-31 | Isuzu Motors Ltd | Shift assist device for transmission |
JP3636647B2 (en) * | 2000-08-23 | 2005-04-06 | 日本電信電話株式会社 | INTERNET CONNECTION DEVICE AND RECORDING MEDIUM RECORDING INTERNET CONNECTION PROGRAM |
US6476384B1 (en) * | 2000-10-10 | 2002-11-05 | Schlumberger Technology Corporation | Methods and apparatus for downhole fluids analysis |
US7606733B2 (en) * | 2000-10-27 | 2009-10-20 | Sandisk Il Ltd. | Account portability for computing |
US7003727B2 (en) * | 2001-02-06 | 2006-02-21 | International Business Machines Corporation | User identification and password field determination |
US20020133605A1 (en) * | 2001-03-19 | 2002-09-19 | Alok Khanna | Generation and use of rules for reading of data for online account aggregation |
-
2003
- 2003-10-24 AU AU2003284986A patent/AU2003284986A1/en not_active Abandoned
- 2003-10-24 WO PCT/US2003/034012 patent/WO2004038563A2/en active Application Filing
- 2003-10-24 EP EP03779305A patent/EP1554659A4/en not_active Withdrawn
- 2003-10-24 CN CNA2003801075081A patent/CN1732452A/en active Pending
- 2003-10-24 US US10/532,781 patent/US20060031289A1/en not_active Abandoned
- 2003-10-24 JP JP2004547198A patent/JP2006504189A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5412717A (en) * | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
Non-Patent Citations (1)
Title |
---|
See also references of EP1554659A2 * |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11258791B2 (en) | 2004-03-08 | 2022-02-22 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US11922395B2 (en) | 2004-03-08 | 2024-03-05 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
WO2005119514A1 (en) * | 2004-06-03 | 2005-12-15 | International Business Machines Corporation | Saving multiple browser instances as a selectable web project |
US8230485B2 (en) | 2004-09-15 | 2012-07-24 | Microsoft Corporation | Method and system for controlling access privileges for trusted network nodes |
US10698989B2 (en) | 2004-12-20 | 2020-06-30 | Proxense, Llc | Biometric personal data key (PDK) authentication |
US11553481B2 (en) | 2006-01-06 | 2023-01-10 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11800502B2 (en) | 2006-01-06 | 2023-10-24 | Proxense, LL | Wireless network synchronization of cells and client devices on a network |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US11212797B2 (en) | 2006-01-06 | 2021-12-28 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network with masking |
US11219022B2 (en) | 2006-01-06 | 2022-01-04 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network with dynamic adjustment |
US11551222B2 (en) | 2006-05-05 | 2023-01-10 | Proxense, Llc | Single step transaction authentication using proximity and biometric input |
US11157909B2 (en) | 2006-05-05 | 2021-10-26 | Proxense, Llc | Two-level authentication for secure transactions |
US10764044B1 (en) | 2006-05-05 | 2020-09-01 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US11182792B2 (en) | 2006-05-05 | 2021-11-23 | Proxense, Llc | Personal digital key initialization and registration for secure transactions |
US20120297471A1 (en) * | 2006-07-13 | 2012-11-22 | Brian Smithson | Approach for securely processing an electronic document |
US8826374B2 (en) * | 2006-07-13 | 2014-09-02 | Ricoh Company, Ltd. | Approach for securely processing an electronic document |
US7792965B2 (en) | 2006-08-30 | 2010-09-07 | Research In Motion Limited | Method and apparatus for simplified user access to multiple browser transports in a mobile communication device |
EP1895744A1 (en) * | 2006-08-30 | 2008-03-05 | Research In Motion Limited | Method and apparatus for simplified user access to multiple browser transports in a mobile communication device |
US8856270B2 (en) | 2006-08-30 | 2014-10-07 | Blackberry Limited | Method and apparatus for simplified user access to multiple browser transports in a mobile communication device |
US10943471B1 (en) | 2006-11-13 | 2021-03-09 | Proxense, Llc | Biometric authentication using proximity and secure information on a user device |
US10769939B2 (en) | 2007-11-09 | 2020-09-08 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US11562644B2 (en) | 2007-11-09 | 2023-01-24 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US11080378B1 (en) | 2007-12-06 | 2021-08-03 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
US11086979B1 (en) | 2007-12-19 | 2021-08-10 | Proxense, Llc | Security system and method for controlling access to computing resources |
US11727355B2 (en) | 2008-02-14 | 2023-08-15 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US10971251B1 (en) | 2008-02-14 | 2021-04-06 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US8271792B2 (en) | 2008-02-20 | 2012-09-18 | Ricoh Company, Ltd. | Image processing apparatus, authentication package installation method, and computer-readable recording medium |
US11120449B2 (en) | 2008-04-08 | 2021-09-14 | Proxense, Llc | Automated service-based order processing |
US20110221568A1 (en) * | 2010-03-15 | 2011-09-15 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US11095640B1 (en) | 2010-03-15 | 2021-08-17 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US10171460B2 (en) | 2010-03-15 | 2019-01-01 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US9418205B2 (en) * | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US11546325B2 (en) | 2010-07-15 | 2023-01-03 | Proxense, Llc | Proximity-based system for object tracking |
US11669701B2 (en) | 2011-02-21 | 2023-06-06 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US11132882B1 (en) | 2011-02-21 | 2021-09-28 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
US11113482B1 (en) | 2011-02-21 | 2021-09-07 | Proxense, Llc | Implementation of a proximity-based system for object tracking and automatic application initialization |
US10909229B2 (en) | 2013-05-10 | 2021-02-02 | Proxense, Llc | Secure element as a digital pocket |
US11914695B2 (en) | 2013-05-10 | 2024-02-27 | Proxense, Llc | Secure element as a digital pocket |
Also Published As
Publication number | Publication date |
---|---|
AU2003284986A8 (en) | 2004-05-13 |
EP1554659A4 (en) | 2009-07-22 |
EP1554659A2 (en) | 2005-07-20 |
CN1732452A (en) | 2006-02-08 |
JP2006504189A (en) | 2006-02-02 |
AU2003284986A1 (en) | 2004-05-13 |
US20060031289A1 (en) | 2006-02-09 |
WO2004038563A3 (en) | 2004-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060031289A1 (en) | System and method for automatically launching and accessing netwrok addresses and applications | |
US8990697B2 (en) | Associating file types with web-based applications for automatically launching the associated application | |
US7577659B2 (en) | Interoperable credential gathering and access modularity | |
US8732284B2 (en) | Data serialization in a user switching environment | |
US6366912B1 (en) | Network security zones | |
US7249379B2 (en) | Method and apparatus for implementing process-based security in a computer system | |
US6286001B1 (en) | System and method for authorizing access to data on content servers in a distributed network | |
US7779363B2 (en) | Enabling user control over selectable functions of a running existing application | |
US11593155B2 (en) | Workflow service application networking | |
US20090328169A1 (en) | Apparatus and method for convenient and secure access to websites | |
US20060271880A1 (en) | System and method for transferring personalization information among computer systems | |
US10574641B2 (en) | Browser plug-in for secure credential submission | |
US20070277127A1 (en) | Screensaver for individual application programs | |
US9398030B2 (en) | Ascertaining domain contexts | |
US20230342498A1 (en) | Computer device and method for managing privilege delegation | |
US7178165B2 (en) | Additional layer in operating system to protect system from hacking | |
US20050138435A1 (en) | Method and system for providing a login and arbitrary user verification function to applications | |
US8418232B2 (en) | Extensible permissions for administrative and target permissions | |
US20230196239A1 (en) | Workflow service application stating | |
KR100566925B1 (en) | A method of managing user's proper computer environment | |
Chapter | CardSpace with ASP .NET 2.0 Forms Authentication and Membership |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AT AU BG BR BY CA CH CN CZ DE DK EE ES FI GB HU IL IN JP KR LT LU LV MX NO NZ PL PT RO RU SE SG SK TR UA US ZA |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2006031289 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003779305 Country of ref document: EP Ref document number: 10532781 Country of ref document: US Ref document number: 2004547198 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038A75081 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2003779305 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10532781 Country of ref document: US |