Method, system and computer program for controlling access...

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000, C709S224000, C709S225000, C709S226000, C707S793000, C707S793000, C707S793000

Reexamination Certificate

active

07454779

ABSTRACT:
Controlling access to information in a distributed data processing system. The distributed data processing system has a server, which stores the information and also further comprises a logging tool for creating a log file. The distributed data processing system also has a client computer comprising an application program for controlling a software agent. When the software agent requests information from the server, a process to identify the software agent is invoked. In response to the identification, all the requests from the identified software agent are stored in the log file and this data in the log file is analyzed. The data is also utilized in the process of monitoring the behavior of the identified software agent. In response to the monitoring process, at least one of a plurality of pre-defined rules is invoked, in order to control the behavior of the identified software agent.

REFERENCES:
patent: 6263364 (2001-07-01), Najork et al.
patent: 6304864 (2001-10-01), Liddy et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6530024 (2003-03-01), Proctor
patent: 6638314 (2003-10-01), Meyerzon et al.
patent: 6658453 (2003-12-01), Dattatri
patent: 6661431 (2003-12-01), Stuart et al.
patent: 6792458 (2004-09-01), Muret et al.
patent: 6826594 (2004-11-01), Pettersen
patent: 2002/0116631 (2002-08-01), Torii et al.
patent: 2002/0156836 (2002-10-01), Janosik et al.
patent: 2002/0178169 (2002-11-01), Nair et al.
patent: 2004/0260722 (2004-12-01), Allen et al.
patent: 2005/0165778 (2005-07-01), Obata et al.
patent: WO 00/54458 (2000-09-01), None
“Web Server Administrator's Guide to the Robots Exclusion Protocol”, pp. 1-3, http://www.robotstxt.org/wc/exclusion-admin.html.
Spider Hunter: Learn to write cloaking scripts and track spiders, 5 pages http://www.spiderhunter.com.
Spider Central, 4 pages, http://www.john.php4hosting.com.
Extract from “Internet Agents: Spiders, Wandereres, Brokers and Bots” by Fah-Chun Cheong, New Riders Publishing, 1996, Chapter 1, pp. 3-7.
http://citeseer.nj.nec.com/43855.html, “Discovery of Web Robot Sessions Based on their Navigational Patterns”, Pang-Ning Tan, Vipin Kumar, NEC Research Index, Mar. 6, 2001.
“Determining WWW User Agents from Server Access Log”, Taketo Kabe, et al, Parallel and Distributed Systems: Workshops, Seventh International Conference on, 2000, Jul. 4-7, 2000, ISBN: 0-7695-0571-6.
“Detecting Attacks on Networks”, by C. Herringshaw, Computer, Dec. 1997, vol. 30, Issu 12, ISN: 018-9162.
“A Survey of Intrusion Detection Techniques” by Teresa F. Lunt, Computers & Security, vol. 12, No. 4, 1993, ISSN: 0167-4048.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, system and computer program for controlling access... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, system and computer program for controlling access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and computer program for controlling access... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4042128

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.