AU4618099A - Combining services in an internet-type network - Google Patents
Combining services in an internet-type network Download PDFInfo
- Publication number
- AU4618099A AU4618099A AU46180/99A AU4618099A AU4618099A AU 4618099 A AU4618099 A AU 4618099A AU 46180/99 A AU46180/99 A AU 46180/99A AU 4618099 A AU4618099 A AU 4618099A AU 4618099 A AU4618099 A AU 4618099A
- Authority
- AU
- Australia
- Prior art keywords
- client
- server
- services
- data
- cid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
Description
WO 99/63416 PCT/F199/00462 1 COMBINING SERVICES IN AN INTERNET-TYPE NETWORK BACKGROUND OF THE INVENTION The invention relates to a method and equipment for combining 5 services of especially different types in an Internet-type network. In the present application, 'Internet' must be interpreted broadly to refer to a network covering a large geographical area and/or a plurality of users. Particularly, the purpose is not to exclude restricted subnetworks of the actual Internet, called Intranet, Extranet etc. 'Client' (C) refers to a user of the 10 services or to a user computer. A client may be an actual person or a process operating in a computer, such as a search robot. 'Page' is an abbreviation of a World Wide Web page. The primary field of use of the invention is the combination of different types of services such that the first services are more technical than the second services, which are in turn more entertainment 15 oriented than the first services. A producer of a technical service is called a 'service provider' (SP), and a producer of a more entertainment-oriented service is called a 'content provider' (CP). Also the corresponding servers are referred to by these terms. It should be remembered, however, that the division between technical and entertainment-oriented services is only a 20 concrete example intended to illustrate the invention, and that entertainment oriented services may typically include facts and news. The Internet has become a new tool for companies for providing services. Marketing and distribution of services through the Internet are increasing very rapidly. On the other hand, companies must make significant 25 investments to maintain the technical quality, content and style of their services at least on the same level as their competitors. It is a problem in many companies that after the initial enthusiasm wears off, there are not enough resources for developing the Web site. The Web site of Microsoft is an example of a well-designed service 30 package. On the same home page it is possible to find both technical services, such as help in problem situations and downloading of new software updates, and entertaining services, such as news. A problem is, however, that no other company has similar resources for providing different types of services. Smaller companies have tried to solve this problem, for example, 35 such that a service provider supplements his pages with links to the services of a content provider. A problem with this method is that the service provider WO 99/63416 PCTIFI99/00462 2 cannot control what a client sees on the pages of the content provider. For example, the service provider cannot prevent the client from seeing advertisements of competing companies. The content provider may even sell the identification data of the client to the companies whose advertisements the 5 client has seen. Correspondingly, the problem for the client is that a jump via a permanent link to the web site of the content provider produces the same page for all the clients instead of customization of the page according to the client's personal preferences. Locating a relevant service or data takes up a great deal of the client's time and consumes the resources of the telecommunication 10 system. 'Profile' refers to the part of the client data that is transmitted to the other server and used by this server to customize the service. The profile may comprise, for example, the following data (from general to detailed): the client has shares, the client has shares of a car company, the client has shares of a 15 certain company, or the client has a stock portfolio with a specific content. BRIEF DESCRIPTION OF THE INVENTION The purpose of the invention is to develop a method and equipment implementing the method so that the aforementioned problems can be solved, in other words a service can be customized according to the needs and/or 20 interests of a client. The objects of the invention are achieved with a method and a system which are characterized by what is disclosed in the independent claims. The preferred embodiments of the invention are disclosed in the dependent claims. The invention is based on combining at least two different servers 25 or server processes. A server of a service provider SP is called a first server and a server of a content provider CP is called a second server. A client contacts the first server via an Internet-type telecommunication network and gives the server his identification data, such as client identity and/or password. The client is directed to another server, which produces services for the client. 30 The first server transmits the client's profile data to the second server, which adapts its services according to the client's profile data and/or the identity of the first server. The client identification data is preferably concealed from the second server. In the service-adaptive stage, the client may be prevented from accessing some of the services of the second server, for example based on 35 the identification data of the first server. The services that are primarily offered to the client may be selected from the services provided by the second server WO 99/63416 PCT/F199/00462 3 based on the profile data. In this manner, it is, for example, possible to prevent the administrator of the first server from directing the client to see competing advertisements or services. The method and system according to the invention have an 5 advantage that the technical service provider does not have to use his time and resources to provide content, and vice versa. The content provider is able to distribute its services via several technical servers. With one contact the client receives customized service, for example data or news that is of current interest to the client. Since the client does not have to specifically look for the 10 data that interests him, the invention saves the resources of the telecommunication system. The invention can be implemented with known devices by means of rather simple changes in software. BRIEF DESCRIPTION OF THE FIGURES In the following, the invention will be described in greater detail in 15 connection with preferred embodiments and with reference to the accompanying drawing, in which Figure 1 is a block and signalling diagram illustrating the invention, Figure 2 shows the operation of a service provider SP, and Figure 3 shows the operation of a content provider CP. 20 DETAILED DESCRIPTION OF THE INVENTION Figure 1 shows equipment according to a preferred embodiment of the invention and the operation thereof. In step 1, a client C activates with his computer a browser. The computer sets up a connection to the server of a service provider SP via the Internet under the control of the browser. From the 25 point of view of the invention it does not matter whether the client's connection to the Internet is fixed or set up via a switched telephone network. The server of the service provider SP usually identifies the client such that the client has a client identity ClD and a password PW. Other means of identification include the use of a smart card or callback. The relationship between the SP and the 30 client is usually confidential. The 'client profile' PR (CID) refers below to the part of the client data that is transmitted to the server of a content provider CP. A good example of a content provider CP is a media company, such as a newspaper publisher. Assume that the service provider, for example a bank, manages the client's stock portfolio. The bank knows the client's identity and 35 the contents of the portfolio. Outsiders are not allowed to know at least the WO 99/63416 PCT/F199/00462 4 specific content of a certain client's stock portfolio. In this case, the client profile may be, for example, information that the client has shares of certain companies. Assume also that the client C owns shares of Car Factory Ltd and is 5 interested in news concerning the company. A user interface provided by the SP may be, for example, such that the content of the stock portfolio is shown as a listing where the name of each share is also a link to the server of the CP. The client thus activates the link to Car Factory Ltd (for example by clicking the company name). The server of the SP then transmits to the server of the CP a 10 service request which preferably contains: - the identity of the server SP - the client identity - the client profile - service control data. 15 Control data refers to, for example, communication between the SP and the CP related to different manners of customizing the service. For example, the clients may be divided into different types and the code of the client type can be transmitted in the form of control data. In step 2, according to a preferred embodiment of the invention the service request is not 20 transmitted directly from the SP to the CP, but there is between them an encryption function, which is represented in Figure 1 by a separate server called 'profile proxy' PP. The encryption function may also be a separate function in the server of the SP, for example. The purpose of the encryption function is to convert the identity and/or profile data of the client into such a 25 form that the CP cannot recognize the client's identity if the service in question is anonymous. An anonymous service means a service of the CP which does not require user identification. In some services of the content provider, the client is identified, for example, by means of user identity, in which case the client does not use the service as an anonymous user. An example of such 30 services is real-time data on the stock exchange which can only be accessed by those with valid service subscription. By means of the encryption function, information about the client's identity is only limited to the company whose server the client has contacted. The advantage of the encryption function to the client is, for example, that the client is able to contact the server of a 35 content provider without the CP coming to know the client's identity. The identity of the client is only known to the service provider (in this case the WO 99/63416 PCTIFI99/00462 5 bank) whose server the client has contacted first. If the client trusts the bank, he may safely browse through advertisements, for example, without fear of becoming a target of aggressive marketing. The content provider may combine the received client profile with its 5 own profile data, if the use of the content requires client identification. When the client is identified in the service of both the SP and the CP, the latter is also able to use its own client profile data in the service customization and to combine the profile data received from the SP with its own profile data. The CP may already know, for example, the fields of activity the client is interested 10 in. The SP transmits the names of the companies in the stock portfolio together with the client's profile data. The CP is then able to combine the information on the fields of activity and the names of the listed companies for the purpose of customization of content without finding out the client identity used by the service provider. 15 Another alternative is that a service which normally requires user identification can be provided to the clients of the service provider as a service that is anonymous with respect to the content provider. In this case, the SP in a way treats its clients to the service. For example a stock exchange service, which is normally liable to charge and requires a user identity, may be used by 20 the clients of the SP without any extra charge and user identification when the search comes to the CP via the encryption function PP. Thus the CP will not be able to find out the client's identity. The encryption function can be described by means of a conversion function f: CID -+f(CID) = CID' 25 wherein the apostrophe means that the data has been converted with the conversion function f. In addition to concealing the client identity CID, it may be preferable to filter or distort the profile data PR(CID) transmitted to the CP. In the case of the stock portfolio, this may be carried out such that the detailed content of the portfolio is not transmitted to the CP but, for example, 30 the exact number of the shares is converted into size ranges or omitted completely. PR'(CID') refers to a client profile distorted in such a manner. In step 3, the content provider receives a search request where the client data is preferably concealed and/or distorted. Next, the CP provides the clients with customized media content. The customization may include one or 35 more of the following steps. The client may see, for example, news concerning companies that interest him, either companies mentioned in the profile data (in WO 99/63416 PCT/F199/00462 6 this case Car Factory Ltd) or companies that operate in the same general field. On the basis of the identity of the SP, news can be selected for the client from the field in question (in this case for example financial news and news of the stock exchange). 5 In steps 4 and 5, according to another preferred embodiment of the invention the customization of the media content also includes that the CP filters off the advertisements competing with the SP, in other words it prevents the client from seeing these advertisements. This takes place by means of a database DB, for example. In the database, each service provider with which 10 the content provider has a co-operation agreement is assigned a list of the companies whose advertisements are filtered off when the client arrives at the CP server from the server of this SP. Alternatively, it is possible that a list of the companies whose advertisements are allowed is obtained from the database when the client arrives at the CP server from the server of the SP in 15 question. In step 6, the CP forms a service that is customized according to the client's needs. By means of the functionality described so far, the invention solves the problems described in the introduction, in other words service customization and limiting the client identity to the company whose server the 20 client has contacted. According to yet another preferred embodiment, the invention is complemented such that in step 7 the content provider returns to the service provider usage information Ul'(CID') and/or profile conversion data APR(CID'). In the present application, usage information refers to unprocessed data, such as log data. It may include a complete path of the pages of the CP 25 the client has visited and possibly the time spent on each page. Correspondingly, the profile conversion data is data processed from the usage information. When the client uses services of the CP, he makes choices which may shape the user profile. Some of the choices are of interest to the SP. The 30 SP and the CP may come to an agreement about exchanging such data. For example, in a stock exchange service the client has indicated his interest in certain fields of activity and the SP and the CP have agreed on exchange of this data. However, the client now changes his interests by selecting new fields of activity and deleting some of the earlier choices. This profile 35 conversion data is transmitted from the CP to the SP.
WO 99/63416 PCT/FI99/00462 7 Assume that the service provider directs the client to the server of the CP and the profile data PR indicates that the client is interested in news related to the stock exchange, car industry or a certain car factory. The client finds from the CP server also other interesting things, for example he spends a 5 considerable amount of time in the section of holiday houses, maybe houses in a certain area or of a certain size/price. In such a case, the profile conversion data includes corresponding information about the client's other interests. When the encryption function PP is used, the usage information UI' 10 and the profile conversion data APR' are reconverted or the encryption is decrypted with an inverse conversion function f 1: UI(CID) = f 1 (Ul'(CID') In step 8, the usage information UI and/or the profile conversion data APR is transmitted to the SP in a form the SP understands. The usage 15 information may contain data of the services the client has used in the SP server. The SP may supplement its client register on the basis of this data. Alternatively or in addition, the CP may return to the SP profile conversion data APR that has already been processed. The encryption function f and the decryption function f 1 are 20 implemented most suitably by means of symmetrical encryption, which is presented as f'key(fkey(x)) = x, wherein 'key' is the encryption key as well as the decryption key. According to yet another preferred embodiment, the converted identification data of the client is intended for a single use, which means that the client always appears as a new client to the CP, so that the data about the 25 client's areas of interests is only limited to the company whose server the client has contacted himself. Figures 2 and 3 illustrate the operation according to a preferred embodiment of the invention from the point of view of the SP and the CP, respectively. In step 21 of Figure 2, the service provider identifies the client 30 and determines the client identity CID and the client profile PR(CID). In step 22, this data is transmitted to the CP in an encrypted form, for example by means of transmission via the encryption function PP. In step 23, when the client has terminated the use of the CP, the SP receives unprocessed usage information Ul or preferably processed profile conversion data APR. In step 35 24, the SP updates the client profile PR(CID).
WO 99/63416 PCT/F199/00462 8 In step 31 of Figure 3, the CP receives from the SP the client identity CID' and the client profile PR'(CID'). In step 32, the CP forms a service customized according to the client's needs. Service customization may include selecting facts, news and/or advertisements on the basis of the profile data 5 and/or the identity of the SP. Usage information indicating, for example, how long the client has been on each page is maintained simultaneously. When the client terminates the use of the CP server, in step 34 the usage information is processed into profile conversion data APR. (If the CP does not perform this in a centralized manner, each SP must carry it out separately in step 24). In step 10 35, the CP transmits the profile conversion data APR to the SP. It is obvious for a person skilled in the art that the basic idea of the invention can be implemented in several different manners. In the embodiment described above, the functions SP, PP and CP are provided in different servers which communicate together via the Internet. This is not necessary, 15 but some or all of these functions can be regarded as different processes of one and the same server. This common server is controlled by an external unit which is neither the SP nor the CP. Even though the functions are situated at the different servers SP, PP and CP, they may communicate with each other for example via a local area network. The invention and the embodiments 20 thereof are thus not restricted to the examples described above, but they may vary within the scope of the claims.
Claims (10)
1. A method of combining two different services, in which method: - a client (C) contacts (1) a first server (SP) via an Internet-type 5 telecommunication network and provides the server with identification data (CID, PW) of the client; - the client (C) is forwarded (2) from the first server (SP) to a second server (CP), which provides services (6) to the client (C); characterized in that 10 - the first server (SP) transmits to the second server (CP) the client's profile data (PR(CID)); and - the second server (CP) customizes (4, 5) the services provided for the client (C) according to the client's profile data (PR(CID)) and/or the identity of the first server (SP). 15
2. A method according to claim 1, c h a r a c t e r i z e d in that before the client is directed to the second server (CP), the client's identification data (CID) is concealed (3) from the second server.
3. A method according to claim 1 or 2, c h a r a c t e r i z e d in that in the step of service customization, the client (C) is prevented (4, 5) from 20 accessing some of the available services of the second server (CP).
4. A method according to claim 3, c h a r a c t e r i z e d in that said prevention is based on the identification data of the first server (SP).
5. A method according to any one of the preceding claims, c h a r a c t e r i z e d in that in the service customization the services that are to be 25 offered primarily to the client are selected from the available services of the second server (CP) on the basis of said profile data PR(CID).
6. A method according to any one of the preceding claims, c h a r a c t e r i z e d in that the second server (CP) transmits to the first server (SP) data (7, 8) about the services the client (C) has selected from the second 30 server and it preferably processes said data (7, 8) in order to form profile conversion data (APR).
7. An arrangement for combining two different services, comprising: - a second server (CP) arranged to provide services (6) to a client (C); and WO 99/63416 PCT/F199/00462 10 - a first server (SP) arranged to receive from the client (C) his identification data (ClD, PW) via an Internet-type telecommunication network and to forward the client (C) to the second server (CP); characterized inthat 5 - the first server (SP) is arranged to transmit the client's profile data (PR(CID)) to the second server (CP); and - the second server (CP) is arranged to customize the services produced for the client (C) according to the client's profile data (PR(CID)) and/or the identity of the first server (SP). 10
8. An arrangement according to claim 7, characterized in that it also includes an encryption function (PP) for concealing the client identification data from the second server (CP).
9. An arrangement according to claim 7 or 8, c h a r a c t e r i z e d in that it also includes means, preferably a database (DB) connected 15 functionally to the second server, for preventing the client (C) from accessing some of the available services of the second server (CP).
10. A server (CP) for producing services (6) to a client (C) via an Internet-type telecommunication network, c h a r a c t e r i z e d in that the server (CP) is arranged to receive from another server (SP, PP) the client's 20 identification and/or profile data (2, 3) and to customize the services produced for the client (C) according to the client's identification and/or profile data (2, 3) and/or the identity of said other server (SP).
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI981214A FI105738B (en) | 1998-05-29 | 1998-05-29 | Combining services in an Internet-type network |
FI981214 | 1998-05-29 | ||
PCT/FI1999/000462 WO1999063416A2 (en) | 1998-05-29 | 1999-05-27 | Combining services in an internet-type network |
Publications (1)
Publication Number | Publication Date |
---|---|
AU4618099A true AU4618099A (en) | 1999-12-20 |
Family
ID=8551850
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU46180/99A Abandoned AU4618099A (en) | 1998-05-29 | 1999-05-27 | Combining services in an internet-type network |
Country Status (15)
Country | Link |
---|---|
EP (1) | EP1092198A2 (en) |
JP (1) | JP2002517810A (en) |
KR (1) | KR20010071348A (en) |
CN (1) | CN1305614A (en) |
AU (1) | AU4618099A (en) |
BR (1) | BR9910753A (en) |
CA (1) | CA2332787A1 (en) |
FI (1) | FI105738B (en) |
ID (1) | ID27179A (en) |
IL (1) | IL139877A0 (en) |
NO (1) | NO20005905L (en) |
PL (1) | PL345158A1 (en) |
RU (1) | RU2000130130A (en) |
TR (1) | TR200003541T2 (en) |
WO (1) | WO1999063416A2 (en) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6996720B1 (en) | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US6970849B1 (en) | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
US7047411B1 (en) | 1999-12-17 | 2006-05-16 | Microsoft Corporation | Server for an electronic distribution system and method of operating same |
WO2001059621A2 (en) * | 2000-02-08 | 2001-08-16 | Vocaltec Communications, Ltd | Personalized visitor pages |
US6978373B1 (en) * | 2000-03-22 | 2005-12-20 | International Business Machines Corporation | Methods systems and computer program products for providing secure client profile completion by network intermediaries |
WO2001075558A1 (en) * | 2000-04-03 | 2001-10-11 | Targian Ab | A system operable to identify and access information about a user |
US7158953B1 (en) | 2000-06-27 | 2007-01-02 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
US6891953B1 (en) | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US6981262B1 (en) | 2000-06-27 | 2005-12-27 | Microsoft Corporation | System and method for client interaction in a multi-level rights-management architecture |
US7051200B1 (en) | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7526762B1 (en) | 2000-06-30 | 2009-04-28 | Nokia Corporation | Network with mobile terminals as browsers having wireless access to the internet and method for using same |
JP3501361B2 (en) * | 2000-09-04 | 2004-03-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Computer network system, computer system, communication method between computer systems, method for measuring computer system performance, and recording medium |
US7080147B2 (en) | 2000-09-04 | 2006-07-18 | International Business Machines Corporation | Computer network system, computer system, method for communication between computer systems, method for measuring computer system performance, and storage medium |
JP4787419B2 (en) * | 2001-04-11 | 2011-10-05 | 株式会社大和証券グループ本社 | Distributed processing server, distributed processing system, distributed processing method, and program |
US7188342B2 (en) | 2001-04-20 | 2007-03-06 | Microsoft Corporation | Server controlled branding of client software deployed over computer networks |
DE10135372B4 (en) * | 2001-07-09 | 2006-03-02 | Detewe Systems Gmbh | Method for configuration and / or data exchange between a telecommunication device and a host |
FI115420B (en) | 2001-08-20 | 2005-04-29 | Helsingin Kauppakorkeakoulu | User-specific personalization of information services |
FI115419B (en) | 2001-08-20 | 2005-04-29 | Helsingin Kauppakorkeakoulu | User-specific personalization of information services |
JP4026495B2 (en) * | 2002-12-19 | 2007-12-26 | 株式会社小松製作所 | Server switching control device |
JP4340483B2 (en) * | 2003-06-27 | 2009-10-07 | 富士通株式会社 | Composite content delivery method and delivery system |
US20060174025A1 (en) * | 2005-02-01 | 2006-08-03 | John H. Larue, Jr. | System and method for streaming content utilizing client upstream communication bandwidth capacity over a network |
CN101159710B (en) * | 2007-11-06 | 2011-03-23 | 中国科学院计算技术研究所 | Service combination searching method and system of structure facing to service |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5717923A (en) * | 1994-11-03 | 1998-02-10 | Intel Corporation | Method and apparatus for dynamically customizing electronic information to individual end users |
EP0718784B1 (en) * | 1994-12-20 | 2003-08-27 | Sun Microsystems, Inc. | Method and system for the retrieval of personalized information |
US5819284A (en) * | 1995-03-24 | 1998-10-06 | At&T Corp. | Personalized real time information display as a portion of a screen saver |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
JPH11507752A (en) * | 1995-06-07 | 1999-07-06 | オープン・マーケット・インコーポレーテッド | Internet server access control and monitoring system |
WO1997015885A1 (en) * | 1995-10-25 | 1997-05-01 | Open Market, Inc. | Managing transfers of information in a communications network |
US5961593A (en) * | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
-
1998
- 1998-05-29 FI FI981214A patent/FI105738B/en not_active IP Right Cessation
-
1999
- 1999-05-27 RU RU2000130130/09A patent/RU2000130130A/en not_active Application Discontinuation
- 1999-05-27 CN CN99807507A patent/CN1305614A/en active Pending
- 1999-05-27 TR TR2000/03541T patent/TR200003541T2/en unknown
- 1999-05-27 KR KR1020007013470A patent/KR20010071348A/en not_active Application Discontinuation
- 1999-05-27 WO PCT/FI1999/000462 patent/WO1999063416A2/en not_active Application Discontinuation
- 1999-05-27 PL PL99345158A patent/PL345158A1/en unknown
- 1999-05-27 CA CA002332787A patent/CA2332787A1/en not_active Abandoned
- 1999-05-27 AU AU46180/99A patent/AU4618099A/en not_active Abandoned
- 1999-05-27 JP JP2000552564A patent/JP2002517810A/en active Pending
- 1999-05-27 ID IDW20002620A patent/ID27179A/en unknown
- 1999-05-27 EP EP99929343A patent/EP1092198A2/en not_active Withdrawn
- 1999-05-27 IL IL13987799A patent/IL139877A0/en unknown
- 1999-05-27 BR BR9910753-8A patent/BR9910753A/en not_active Application Discontinuation
-
2000
- 2000-11-21 NO NO20005905A patent/NO20005905L/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
FI981214A (en) | 1999-11-30 |
TR200003541T2 (en) | 2001-06-21 |
IL139877A0 (en) | 2002-02-10 |
PL345158A1 (en) | 2001-12-03 |
RU2000130130A (en) | 2002-11-27 |
KR20010071348A (en) | 2001-07-28 |
JP2002517810A (en) | 2002-06-18 |
WO1999063416A2 (en) | 1999-12-09 |
NO20005905L (en) | 2001-01-18 |
EP1092198A2 (en) | 2001-04-18 |
ID27179A (en) | 2001-03-08 |
FI105738B (en) | 2000-09-29 |
NO20005905D0 (en) | 2000-11-21 |
BR9910753A (en) | 2001-02-13 |
CA2332787A1 (en) | 1999-12-09 |
CN1305614A (en) | 2001-07-25 |
WO1999063416A3 (en) | 2000-01-27 |
FI981214A0 (en) | 1998-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU4618099A (en) | Combining services in an internet-type network | |
US5815665A (en) | System and method for providing trusted brokering services over a distributed network | |
CA2307020C (en) | Communication procedure between a user station and a network, in particular the internet, including architecture for implementation | |
US6938171B1 (en) | Gateway system and recording medium | |
CN1312879C (en) | Method for coordinating actions among group of servers | |
JP4263260B2 (en) | Server system | |
US6401125B1 (en) | System and method for maintaining state information between a web proxy server and its clients | |
DE69838443T2 (en) | Distributed network computer system | |
CN101127606B (en) | Method and device for transmitting data object | |
EP0812088A3 (en) | Preserving state in stateless network protocols | |
WO1998026344A3 (en) | System and method for globally accessing computer services | |
WO1998043447A2 (en) | Domain communications server apparatus and method | |
JP2003527672A (en) | Method and apparatus for providing secure authentication of a portable device via an internet host server | |
WO1998000951A3 (en) | Method and arrangement for distributing service programs in a network environment | |
JPH103420A (en) | Access control system and method | |
AU3501000A (en) | Proxy server augmenting a client request with user profile data | |
KR20040071203A (en) | System and method for downloading data using a proxy | |
US20100042927A1 (en) | Third Party Management of Computer System Control | |
US20130311549A1 (en) | Framework for service personalization | |
Lai et al. | Managing international data communications | |
AU766949B2 (en) | A smart molecule system for processing network information in any physical object | |
JP4667748B2 (en) | Method and apparatus for controlling a multi-node process | |
US20060059071A1 (en) | Method and system for separating personal data accounts | |
MXPA00011761A (en) | Combining services in an internet-type network | |
KR20010092537A (en) | System and method for distributing contents automatically |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MK5 | Application lapsed section 142(2)(e) - patent request and compl. specification not accepted |