WO2009087405A2 - Security system for websites - Google Patents

Security system for websites Download PDF

Info

Publication number
WO2009087405A2
WO2009087405A2 PCT/GB2009/000075 GB2009000075W WO2009087405A2 WO 2009087405 A2 WO2009087405 A2 WO 2009087405A2 GB 2009000075 W GB2009000075 W GB 2009000075W WO 2009087405 A2 WO2009087405 A2 WO 2009087405A2
Authority
WO
WIPO (PCT)
Prior art keywords
data
user
party
server
authorised
Prior art date
Application number
PCT/GB2009/000075
Other languages
French (fr)
Other versions
WO2009087405A3 (en
Inventor
Mark Burton
Michael Maguire
Ramesh Nair
Original Assignee
Blue Whale Systems Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Blue Whale Systems Limited filed Critical Blue Whale Systems Limited
Publication of WO2009087405A2 publication Critical patent/WO2009087405A2/en
Publication of WO2009087405A3 publication Critical patent/WO2009087405A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Definitions

  • the invention to which this application relates is a system for improved security on websites.
  • Social networking websites are a recent cultural phenomenon, typically comprising a website in which a user can enter and share information in the form of text, pictures, and the like.
  • Facebook is a popular recent example of such a website, and further allows users to develop and share their own programs via application programming interfaces (APIs) .
  • APIs application programming interfaces
  • a user could create a quiz API, then invite their listed friends on Facebook to play the quiz by installing the API, the results data being visible to listed friends who had also installed the API.
  • An aim of the present invention is to provide a system for improving the security on websites.
  • tracker programs available which store log files but these tend to be text based, and not immediately accessible.
  • a further aim of the invention is to provide an indication as to the origination of web page visitors.
  • the advert server is offline, it can slow down the download of the initially requested website, as requests to the offline advert fail.
  • a further aim of the invention is to provide a means of viewing adverts when the advert servers are offline.
  • a security system in which at least a portion of user data is stored in an encrypted form on a public server and can be selectively identified as being in a private or shared format, wherein when in a shared format the data can be decrypted by an authorised server to allow an authorised third party to view the same.
  • the security system is for a website, and decryption is initiated from a web browser when viewing of the data is required.
  • the authorised server is one which has previously been checked and identified as a trusted server and is provided with decryption means to decrypt encrypted data.
  • the trusted server is physically separate from the public server.
  • the third party uses a web browser on a client to send a request to view the shared data on the public server, which data is decrypted by a separate trusted server to allow the data to be viewed via the browser.
  • an AJAX call back is made from the web page in the browser to the trusted server to decrypt the encrypted data and dynamically update the web page with decrypted content.
  • the user can choose the third parties that are authorised to view the shared data.
  • the data includes Emails.
  • the data includes a list of third parties allowed to view the data.
  • the list includes the identity of the user.
  • the shared data is only decrypted if the user of the browser matches the user identity stored in the list.
  • the server sends a decryption error message if the browser user does not match the user identity in the list.
  • the user can change how selected portions of the data is marked between shared and private formats.
  • the security system can store data such as Emails in a secure fashion on a public server, ensuring that the user can view their Emails but third parties cannot. If a user decides to share an Email, they can change this to a shared format and the trusted server allows decryption of only that Email for authorised third parties which the user can specify.
  • one or more graphical elements are associated with the third party's details and displayed to the user when the user views data to identify the status and/or origin of that third party.
  • the user views data via a web browser, and the graphical elements are in the form of icons associated with the names of the third parties .
  • the graphical element representing status can indicate that the third party is online or offline.
  • the graphical element representing status the origin of the third party is a FAV icon associated with the website previously viewed by that third party, or equivalent thereto.
  • the web page includes adverts which can be downloaded and cached for display such that if the advert server is offline the advert can still be viewed from the cache.
  • the cached adverts can be utilised according to the web page being displayed. For example, if the web page is about a racing car game, it may be more appropriate to display a car relating to the game or cars than what would normally be displayed.
  • a method of providing security to access to a users data at least a portion of said user data stored in an encrypted form on a public server and which data can be accessed by said user, and said user is able to identify said data as being in private or shared formats and wherein when in a shared format the data can be decrypted by an authorised server to allow a third party who is authorised to view the same.
  • the private format data is only accessible by the user.
  • the method includes a means of identifying the state and/or origin of a third party visitor to a user's webpage wherein one 1 or more graphical elements are associated and displayed with the third party's identification details.
  • the graphical elements represent the third party's status and/or the previous page that they have viewed.
  • the method is operated within a social networking website. .
  • the user is able to compile a list of third parties who are authorised to access the shared format data.
  • the method is operated within a social networking website such as Facebook (RTM) .
  • RTM social networking website
  • a green circle next to the user's name could indicate that the user is online at the time, whereas a red circle indicates that the user is offline.
  • the graphical elements to indicate the previous page viewed are FAV icons associated with the website from that previous page, or are equivalent thereto. If for example the website does not include a FAV icon, the user may be able to create one or choose an appropriate predefined one from the social networking website.
  • FAV icons are small graphical files which are typically placed in the root level of a website such that when a page is bookmarked, the browser stores the image alongside the text of that bookmark to make the bookmark easier to identify by a user in the future when searching for the same.
  • Figure 1 schematically illustrates a security system according to an embodiment of the present invention.
  • Figure 2 schematically illustrates a web page according to an embodiment of the present invention.
  • FIG. 1 there is illustrated a client computer 2 with a monitor 4 on which there is displayed a web page 6 in a web browser 8.
  • the web page in this example may be a social networking site such as Facebook (RTM), which allows users to develop and share their own programs via application programming interfaces.
  • RTM social networking site
  • Facebook includes an Email function wherein users can send and receive messages to one another. Conventionally users cannot selectively share their Emails with each other on Facebook (RTM) i.e. Emails cannot be chosen to be made visible to other users .
  • Data relating to users is stored on a public server 10 and is typically marked as private to prevent unauthorised third parties from viewing the data.
  • the client web browser 8 sends a request 12 to view the shared data on the public server 10, which data is sent back 14 to the browser but cannot be viewed if the third party is not authorised.
  • the present invention solves this problem by providing a trusted server 16 which decrypts data stored on the public server 10 in an encrypted form.
  • Facebook (RTM) allows execution of JavaScript (RTM) within a web browser to view a private web page.
  • Facebook (RTM) does not allow the page contents to be updated directly from JavaScript (RTM) for security reasons.
  • Page content can only be updated with the result of an AJAX callback to a back end server.
  • AJAX Asynchronous JavaScript and XML
  • Web pages that use AJAX are more responsive as only small amounts of data are exchanged with the server so that the entire web page does not have to be reloaded each time the user requests a change.
  • an AJAX callback 18 is made to the trusted server 16, which decrypts the data which has been identified, typically by the user as being in a shared format and sends 20 the decrypted content to the Facebook (RTM) web page 6, thereby dynamically updating the same.
  • An encrypted list of third party users is also stored on the public server 10 so that only those authorised third party users can view the shared format data.
  • the list also contains the data owner's Facebook identifier.
  • the trusted server first decrypts the encrypted user list and checks to see if the Facebook identifier of the person currently viewing the web page, supplied separately by Facebook in the callback, is contained in the list. If it matches then the trusted server decrypts the encrypted data and sends the content to the browser of the third party user, otherwise it sends a decryption failure error.
  • the user can typically compile and change the list of third party uses from time to time.
  • an AJAX callback is made to the trusted server as before.
  • the trusted server then performs the same check process as hereinabove described to see if the Facebook identifier of the third party user currently viewing the web page is the same as that of the user data owner. If this check succeeds, the server updates the encrypted list ' of third parties allowed to view the data.
  • the security system allows data such as Emails to be stored in a secure fashion on a public server, ensuring that the user can view their Emails but unauthorised third parties cannot.
  • unencrypted private data is not sent to the web browser. If a user decides to share an Email, the trusted server allows decryption of only that Email for third parties which the user can specify and authorise.
  • FIG. 2 With reference to Figure 2 there is illustrated a Facebook (RTM) web page 22, showing details of friends 28 in the right frame 24, and an advert 30 in the left frame 26. Three friends are visible, and associated with each are graphical icons to indicate their online status 32, and the previous website visited.
  • RTM Facebook

Abstract

The invention relates to a system and method' for allowing secure and selective access to a users data, such as that which may be present on a user's social interaction website. The user is able to select certain portions of their data as private, which only they can view, or shared format, in which the encrypted data can be decrypted by an authorised server and rendered viewable, but only by a third party user who is entered on the system as being authorised.

Description

Security system for websites
The invention to which this application relates is a system for improved security on websites.
Although the following description refers almost exclusively to use of an improved security system for social networking websites such as Facebook (RTM) it will be appreciated by persons skilled in the art that the present invention can be used with other websites and applications
Social networking websites are a recent cultural phenomenon, typically comprising a website in which a user can enter and share information in the form of text, pictures, and the like.
Facebook (RTM) is a popular recent example of such a website, and further allows users to develop and share their own programs via application programming interfaces (APIs) . For example, a user could create a quiz API, then invite their listed friends on Facebook to play the quiz by installing the API, the results data being visible to listed friends who had also installed the API.
Normally, if a user does not wish to make such details available, they can mark the data as being private. Thus, if an unauthorised third party tries to view such data, the data will not render on the third party's browser. However, the data would still have been sent to the third party, and the privacy limitation is thus not a particularly secure way of hiding such data as it could still potentially be captured and processed by other means.
An aim of the present invention is to provide a system for improving the security on websites. In addition, it is not easily possible to see where a third party- has come from in terms of the previous web page viewed. There are tracker programs available which store log files but these tend to be text based, and not immediately accessible.
A further aim of the invention is to provide an indication as to the origination of web page visitors.
Social networking websites are often supported by advertising. Conventionally, adverts are loaded along with the websites in real-time, and if the advert is clicked upon this fact is recorded and often a new web page is opened in connection with the advert on such action.
However if the advert server is offline, it can slow down the download of the initially requested website, as requests to the offline advert fail.
A further aim of the invention is to provide a means of viewing adverts when the advert servers are offline.
In one aspect of the invention, there is provided a security system in which at least a portion of user data is stored in an encrypted form on a public server and can be selectively identified as being in a private or shared format, wherein when in a shared format the data can be decrypted by an authorised server to allow an authorised third party to view the same.
As such, all user data is stored in an encrypted form on a public server and therefore unauthorised third parties cannot extract any useful information. In one embodiment the security system is for a website, and decryption is initiated from a web browser when viewing of the data is required.
In one embodiment the authorised server is one which has previously been checked and identified as a trusted server and is provided with decryption means to decrypt encrypted data.
Typically the trusted server is physically separate from the public server.
In one embodiment the third party uses a web browser on a client to send a request to view the shared data on the public server, which data is decrypted by a separate trusted server to allow the data to be viewed via the browser.
Typically, an AJAX call back is made from the web page in the browser to the trusted server to decrypt the encrypted data and dynamically update the web page with decrypted content.
In one embodiment the user can choose the third parties that are authorised to view the shared data.
In one embodiment the data includes Emails.
In one embodiment the data includes a list of third parties allowed to view the data. Preferably the list includes the identity of the user.
Typically the shared data is only decrypted if the user of the browser matches the user identity stored in the list. Typically the server sends a decryption error message if the browser user does not match the user identity in the list. In one embodiment the user can change how selected portions of the data is marked between shared and private formats.
Thus the security system can store data such as Emails in a secure fashion on a public server, ensuring that the user can view their Emails but third parties cannot. If a user decides to share an Email, they can change this to a shared format and the trusted server allows decryption of only that Email for authorised third parties which the user can specify.
In one embodiment one or more graphical elements are associated with the third party's details and displayed to the user when the user views data to identify the status and/or origin of that third party.
Typically the user views data via a web browser, and the graphical elements are in the form of icons associated with the names of the third parties .
In one embodiment the graphical element representing status can indicate that the third party is online or offline.
In one embodiment the graphical element representing status the origin of the third party is a FAV icon associated with the website previously viewed by that third party, or equivalent thereto.
In one embodiment the web page includes adverts which can be downloaded and cached for display such that if the advert server is offline the advert can still be viewed from the cache.
Typically viewing of the advert can be recorded and reported back to the advert server when next online. Advantageously the cached adverts can be utilised according to the web page being displayed. For example, if the web page is about a racing car game, it may be more appropriate to display a car relating to the game or cars than what would normally be displayed.
In a further aspect of the invention there is provided a method of providing security to access to a users data, at least a portion of said user data stored in an encrypted form on a public server and which data can be accessed by said user, and said user is able to identify said data as being in private or shared formats and wherein when in a shared format the data can be decrypted by an authorised server to allow a third party who is authorised to view the same.
In one embodiment the private format data is only accessible by the user.
Typically the method includes a means of identifying the state and/or origin of a third party visitor to a user's webpage wherein one1 or more graphical elements are associated and displayed with the third party's identification details. In on embodiment the graphical elements represent the third party's status and/or the previous page that they have viewed.
Typically the method is operated within a social networking website. .
Typically the user is able to compile a list of third parties who are authorised to access the shared format data.
In one embodiment the method is operated within a social networking website such as Facebook (RTM) . Thus when a user visits their web page, they can see the status of their friends (online or offline) and where they came from (last web page viewed) via the graphical icons next to their names,
Typically different icons are provided to indicate different statuses. For example a green circle next to the user's name could indicate that the user is online at the time, whereas a red circle indicates that the user is offline.
In one embodiment the graphical elements to indicate the previous page viewed are FAV icons associated with the website from that previous page, or are equivalent thereto. If for example the website does not include a FAV icon, the user may be able to create one or choose an appropriate predefined one from the social networking website.
FAV icons are small graphical files which are typically placed in the root level of a website such that when a page is bookmarked, the browser stores the image alongside the text of that bookmark to make the bookmark easier to identify by a user in the future when searching for the same.
Specific embodiments of the invention are now described wherein:-
Figure 1 schematically illustrates a security system according to an embodiment of the present invention.
Figure 2 schematically illustrates a web page according to an embodiment of the present invention.
With reference to Figure 1 , there is illustrated a client computer 2 with a monitor 4 on which there is displayed a web page 6 in a web browser 8. The web page in this example may be a social networking site such as Facebook (RTM), which allows users to develop and share their own programs via application programming interfaces.
Facebook (RTM) includes an Email function wherein users can send and receive messages to one another. Conventionally users cannot selectively share their Emails with each other on Facebook (RTM) i.e. Emails cannot be chosen to be made visible to other users .
Data relating to users is stored on a public server 10 and is typically marked as private to prevent unauthorised third parties from viewing the data. In a conventional system, the client web browser 8 sends a request 12 to view the shared data on the public server 10, which data is sent back 14 to the browser but cannot be viewed if the third party is not authorised.
However, although such data is not visible by a conventional browser, it is still sent by the public server in an unencrypted form and thus presents a security risk as it could be intercepted.
The present invention solves this problem by providing a trusted server 16 which decrypts data stored on the public server 10 in an encrypted form.
Facebook (RTM) allows execution of JavaScript (RTM) within a web browser to view a private web page. However, Facebook (RTM) does not allow the page contents to be updated directly from JavaScript (RTM) for security reasons. Page content can only be updated with the result of an AJAX callback to a back end server. AJAX (Asynchronous JavaScript and XML), is a web development technique used for creating interactive web applications. Web pages that use AJAX are more responsive as only small amounts of data are exchanged with the server so that the entire web page does not have to be reloaded each time the user requests a change.
Thus in order to decrypt the encrypted content on the public server 10, an AJAX callback 18 is made to the trusted server 16, which decrypts the data which has been identified, typically by the user as being in a shared format and sends 20 the decrypted content to the Facebook (RTM) web page 6, thereby dynamically updating the same.
An encrypted list of third party users is also stored on the public server 10 so that only those authorised third party users can view the shared format data. The list also contains the data owner's Facebook identifier. Thus when the AJAX callback is made to the trusted server 16, the trusted server first decrypts the encrypted user list and checks to see if the Facebook identifier of the person currently viewing the web page, supplied separately by Facebook in the callback, is contained in the list. If it matches then the trusted server decrypts the encrypted data and sends the content to the browser of the third party user, otherwise it sends a decryption failure error. The user can typically compile and change the list of third party uses from time to time.
When the user wishes to mark the data as shared format and therefore viewable by specified third parties, an AJAX callback is made to the trusted server as before. The trusted server then performs the same check process as hereinabove described to see if the Facebook identifier of the third party user currently viewing the web page is the same as that of the user data owner. If this check succeeds, the server updates the encrypted list ' of third parties allowed to view the data.
Thus the security system allows data such as Emails to be stored in a secure fashion on a public server, ensuring that the user can view their Emails but unauthorised third parties cannot.
Advantageously, unencrypted private data is not sent to the web browser. If a user decides to share an Email, the trusted server allows decryption of only that Email for third parties which the user can specify and authorise.
With reference to Figure 2 there is illustrated a Facebook (RTM) web page 22, showing details of friends 28 in the right frame 24, and an advert 30 in the left frame 26. Three friends are visible, and associated with each are graphical icons to indicate their online status 32, and the previous website visited.
Clicking on the previous website icon brings up the corresponding web page.
It will be appreciated by persons skilled in the art that the present invention may also include further additional modifications made to the device which does not affect the overall functioning of the device.

Claims

Claims
1. A security system in which at least a portion of user data is stored in an encrypted form on a public server and can be selectively identified as being in a private or shared format, wherein when in a shared format the data can be decrypted by an authorised server to allow an authorised third party to view the same.
2. A system according to claim 1 wherein all user data is stored in an encrypted form on the public server and therefore unauthorised third parties can not extract any useful information, until said third party is deemed to be authorised to access the shared format data.
3. A system according to claim 1 wherein the system is accessed via a website and decryption of shared format data is initiated from a web browser when viewing of data is required by the authorised third party.
4. A system according to claim 1 wherein the authorised server has previously been checked and identified as a trusted server and is provided with decryption means to decrypt the encrypted data in the shared format.
5. A system according to claim 4 wherein the authorised server is physically separate from the public server.
6. A system according to claim 1 wherein the authorised third party uses a web browser to send a request to view the shared format data on the public server, which data is decrypted by the authorised server to allow the data to be viewed via the user's browser.
7. A system according to claim 6 wherein an AJAX call back is made from a webpage in the browser to the authorised server to decrypt the encrypted shared format data and dynamically update the webpage with content derived from the decrypted data.
8. A system according to claim 1 wherein a user can predetermine the third parties that are authorised to view the shared format data.
9. A system according to claim 8 wherein the shared format data includes emails.
10. A system according to claim 1 wherein the data includes a list of third parties allowed to view the shared format data.
1 1. A system according to claim 10 wherein the list includes the identity of the users.
12. A system according to claim 10 wherein the shared format data can only be decrypted if the third party using the browser matches a user identity stored in the list.
13. A system according to claim 12 wherein the server sends a decryption error message if the browser third party identity does not match the user identity in the list.
14. A system according to claim 1 wherein the user can selectively change the format of selected portions of data between shared and private.
15. A system according to claim 1 wherein the system stores data, such as emails in a secure manner on the public server to
, allow the user to view the data and, if the user decides to allow shared access to the data, the authorised server allows decryption of only that data identified as accessible by the user to third parties which the user specifies.
16. A system according to claim 1 wherein one or more graphical elements are associated with the third party details and displayed to the user when the user views data to identify the status and/or origin of the third party.
17. A system according to claim 16 wherein the user views the data via a web browser and the graphical elements are in the form of icons each associated with the identity of a third party.
18. A system according to claim 17 wherein a graphical element represents the status of the third party.
19. A system according to claim 17 wherein the graphical element is a FAV icon associated with the website previously viewed by that third party, or equivalent thereto.
20. A system according to claim 1 wherein the data includes advert data which can be downloaded and cached for display such that if a server for generating the advert is offline, the advert can still be generated from the cached data.
21. A system according to claim 20 wherein the viewing of the advert can be recorded and reported back to the advert server when next online. '
22. A system according to claim 21 wherein the cached advert data can be utilised with respect to a particular webpage being displayed at that time.
23. A method of providing security to access to a users data, at least a portion of said user data stored in an encrypted form on a public server and which data can be accessed by said user, and said user is able to identify said data as being in private or shared formats and wherein when in a shared format the data can be decrypted by an authorised server to allow a third party who is authorised to view the same.
24 A method according to claim 23 wherein the private format data is only accessible by the user.
25 A method according to claim 23 wherein the method includes a means of identifying the state and/or origin of a third party visitor to a user's webpage wherein one or more graphical elements are associated and displayed with the third party's identification details .
26. A method according to claim 23 wherein the graphical . elements represent the third party's status and/or the previous page that they have viewed.
27. A method according to claim 23 wherein the same is operated within a social networking website.
28 A method according to claim 23 wherein the user can compile a list of third parties who are authorised to access the shared format data.
PCT/GB2009/000075 2008-01-11 2009-01-12 Security system for websites WO2009087405A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0800435.0 2008-01-11
GB0800435A GB0800435D0 (en) 2008-01-11 2008-01-11 Security system for websites

Publications (2)

Publication Number Publication Date
WO2009087405A2 true WO2009087405A2 (en) 2009-07-16
WO2009087405A3 WO2009087405A3 (en) 2009-11-12

Family

ID=39144737

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2009/000075 WO2009087405A2 (en) 2008-01-11 2009-01-12 Security system for websites

Country Status (2)

Country Link
GB (1) GB0800435D0 (en)
WO (1) WO2009087405A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2386977A1 (en) * 2010-05-11 2011-11-16 Gemalto SA System for displaying a private computer file on a screen of a telecommunications terminal and corresponding method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040148408A1 (en) * 2003-01-10 2004-07-29 Sbc Properties, L.P. Network based proxy control of content
US20070082738A1 (en) * 2005-10-06 2007-04-12 Game Driven Corporation Self-organizing turn base games and social activities on a computer network
US20070282877A1 (en) * 2006-05-31 2007-12-06 Red. Hat, Inc. Open overlay for social networks and online services
US20070294539A1 (en) * 2006-01-27 2007-12-20 Imperva, Inc. Method and system for transparently encrypting sensitive information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040148408A1 (en) * 2003-01-10 2004-07-29 Sbc Properties, L.P. Network based proxy control of content
US20070082738A1 (en) * 2005-10-06 2007-04-12 Game Driven Corporation Self-organizing turn base games and social activities on a computer network
US20070294539A1 (en) * 2006-01-27 2007-12-20 Imperva, Inc. Method and system for transparently encrypting sensitive information
US20070282877A1 (en) * 2006-05-31 2007-12-06 Red. Hat, Inc. Open overlay for social networks and online services

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2386977A1 (en) * 2010-05-11 2011-11-16 Gemalto SA System for displaying a private computer file on a screen of a telecommunications terminal and corresponding method
WO2011141464A1 (en) * 2010-05-11 2011-11-17 Gemalto Sa System allowing the display of a private computer file on a screen of a telecommunications terminal and corresponding method

Also Published As

Publication number Publication date
WO2009087405A3 (en) 2009-11-12
GB0800435D0 (en) 2008-02-20

Similar Documents

Publication Publication Date Title
US11799984B2 (en) Installable web applications
US11132463B2 (en) Security systems and methods for encoding and decoding digital content
US11775686B2 (en) Security systems and methods for encoding and decoding content
US9361395B2 (en) System and method for providing offline access in a hosted document service
CN104737175B (en) The method implemented by computer and system, computer-readable media
US11741264B2 (en) Security systems and methods for social networking
US20140337466A1 (en) Persona manager for network communications
CN101390102A (en) Persistent public machine setting
CA3103222C (en) Security systems and methods for encoding and decoding digital content
JP2009199463A (en) Terminal device, information provision system, file access method, and data structure
WO2009087405A2 (en) Security system for websites
JP2008077614A (en) Session management program and session management method
JP6413540B2 (en) Relay device, data processing system, and program
JP2006072952A (en) Network service system using device
JP4750904B2 (en) Page transition device, page transition system, and page transition method
Ganney et al. Web development

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009700733

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09700733

Country of ref document: EP

Kind code of ref document: A2

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25-01-2011)

122 Ep: pct application non-entry in european phase

Ref document number: 09700733

Country of ref document: EP

Kind code of ref document: A2