Information security – Access control or authentication
Reexamination Certificate
2002-03-15
2008-11-18
Kincaid, Kristine (Department: 2139)
Information security
Access control or authentication
C726S001000, C709S224000, C709S225000, C709S226000, C707S793000, C707S793000, C707S793000
Reexamination Certificate
active
07454779
ABSTRACT:
Controlling access to information in a distributed data processing system. The distributed data processing system has a server, which stores the information and also further comprises a logging tool for creating a log file. The distributed data processing system also has a client computer comprising an application program for controlling a software agent. When the software agent requests information from the server, a process to identify the software agent is invoked. In response to the identification, all the requests from the identified software agent are stored in the log file and this data in the log file is analyzed. The data is also utilized in the process of monitoring the behavior of the identified software agent. In response to the monitoring process, at least one of a plurality of pre-defined rules is invoked, in order to control the behavior of the identified software agent.
REFERENCES:
patent: 6263364 (2001-07-01), Najork et al.
patent: 6304864 (2001-10-01), Liddy et al.
patent: 6330588 (2001-12-01), Freeman
patent: 6530024 (2003-03-01), Proctor
patent: 6638314 (2003-10-01), Meyerzon et al.
patent: 6658453 (2003-12-01), Dattatri
patent: 6661431 (2003-12-01), Stuart et al.
patent: 6792458 (2004-09-01), Muret et al.
patent: 6826594 (2004-11-01), Pettersen
patent: 2002/0116631 (2002-08-01), Torii et al.
patent: 2002/0156836 (2002-10-01), Janosik et al.
patent: 2002/0178169 (2002-11-01), Nair et al.
patent: 2004/0260722 (2004-12-01), Allen et al.
patent: 2005/0165778 (2005-07-01), Obata et al.
patent: WO 00/54458 (2000-09-01), None
“Web Server Administrator's Guide to the Robots Exclusion Protocol”, pp. 1-3, http://www.robotstxt.org/wc/exclusion-admin.html.
Spider Hunter: Learn to write cloaking scripts and track spiders, 5 pages http://www.spiderhunter.com.
Spider Central, 4 pages, http://www.john.php4hosting.com.
Extract from “Internet Agents: Spiders, Wandereres, Brokers and Bots” by Fah-Chun Cheong, New Riders Publishing, 1996, Chapter 1, pp. 3-7.
http://citeseer.nj.nec.com/43855.html, “Discovery of Web Robot Sessions Based on their Navigational Patterns”, Pang-Ning Tan, Vipin Kumar, NEC Research Index, Mar. 6, 2001.
“Determining WWW User Agents from Server Access Log”, Taketo Kabe, et al, Parallel and Distributed Systems: Workshops, Seventh International Conference on, 2000, Jul. 4-7, 2000, ISBN: 0-7695-0571-6.
“Detecting Attacks on Networks”, by C. Herringshaw, Computer, Dec. 1997, vol. 30, Issu 12, ISN: 018-9162.
“A Survey of Intrusion Detection Techniques” by Teresa F. Lunt, Computers & Security, vol. 12, No. 4, 1993, ISSN: 0167-4048.
Hughes Jeremy P. J.
Tate Richard P.
Greenberg, Esq. Steven M.
International Business Machines - Corporation
Kincaid Kristine
Ray-Yarletts, Esq. Jeanine
Shaw Yin-Chen
LandOfFree
Method, system and computer program for controlling access... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method, system and computer program for controlling access..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, system and computer program for controlling access... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4042128