US20020146129A1 - Method and system for secure wireless database management - Google Patents

Method and system for secure wireless database management Download PDF

Info

Publication number
US20020146129A1
US20020146129A1 US10/040,524 US4052401A US2002146129A1 US 20020146129 A1 US20020146129 A1 US 20020146129A1 US 4052401 A US4052401 A US 4052401A US 2002146129 A1 US2002146129 A1 US 2002146129A1
Authority
US
United States
Prior art keywords
wireless
server
database
management system
database management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/040,524
Inventor
Ari Kaplan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intellectual Ventures Assets 191 LLC
Stavros Investments LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/040,524 priority Critical patent/US20020146129A1/en
Assigned to EXPAND BEYOND CORPORATION reassignment EXPAND BEYOND CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KAPLAN, ARI D.
Publication of US20020146129A1 publication Critical patent/US20020146129A1/en
Assigned to STAVROS INVESTMENTS LLC reassignment STAVROS INVESTMENTS LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EXPAND BEYOND CORPORATION
Assigned to INTELLECTUAL VENTURES ASSETS 191 LLC reassignment INTELLECTUAL VENTURES ASSETS 191 LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XYLON LLC
Assigned to INTELLECTUAL VENTURES ASSETS 186 LLC, INTELLECTUAL VENTURES ASSETS 191 LLC reassignment INTELLECTUAL VENTURES ASSETS 186 LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MIND FUSION, LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9577Optimising the visualization of content, e.g. distillation of HTML documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/2895Intermediate processing functionally located close to the data provider application, e.g. reverse proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99935Query augmenting and refining, e.g. inexact access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface

Definitions

  • the present invention generally relates to a method for maintaining the security of data transferred within a wireless database management system (WDMS), and relates more specifically to a method practiced by software implemented on a plurality of wireless devices and on a plurality of networked computers that comprise the WDMS.
  • WDMS wireless database management system
  • a WDMS solves many problems, it introduces its own unique problem: how can the data transferred within the WDMS be kept secure?
  • information is transmitted to and from a wireless device by electromagnetic radiation that will inevitably travel through public spaces.
  • typically data must be transferred between a database server and a web or application server before it can be broadcast to a wireless device. These connections must also be secured in order to prevent unauthorized access to a WDMS. Without a proper method for securing data transferred within a WDMS, private and confidential information kept in a database or databases within it may become accessible to competitors or the criminal element, with a loss of revenue potentially resulting.
  • the present invention provides a method for maintaining the security of communications within a wireless database management system.
  • data might be exchanged between hundreds of computers.
  • the WDMS might comprise a wireless device, wireless base station, wireless proxy server, a plurality of routers and servers that make up the Internet, a web or application server, database server, and one or more databases.
  • the medium, connection, and protocol used with each of these devices is different and each may present a different kind of security risk.
  • all the communications between these computers and their interconnections must be secured, preferably with several layers of security.
  • data transmitted and received by radio frequency between a wireless device and a wireless base station is encrypted using a private key method such as the Data Encryption Standard (DES) or the Advanced Encryption Standard (AES).
  • DES Data Encryption Standard
  • AES Advanced Encryption Standard
  • ECC Elliptic Curve Cryptography
  • RSA Rivest-Shamir-Adleman
  • a wireless web or application server (usually part of a company's Intranet) might be further secured by the implementation of at least one firewall.
  • the firewall might be used to restrict the set of IP addresses that can be connected to the Intranet to the IP addresses of the wireless devices or of the wireless proxy servers.
  • the present invention also provides a novel method, comprising several steps, for reducing the risk of this kind of unauthorized access.
  • a first step in preventing unauthorized users from accessing a database through the WDMS involves the authentication of a user's identity.
  • the present invention accomplishes authentication by requiring a user to “log in” to the WDMS with one or more user identification phrases and passwords.
  • An unauthorized user that finds or steals a wireless device would be unable to access information kept in the database or databases without having the user identification phrases and passwords necessary to log in.
  • sessions are uniquely identified with information that is stored on a web or application server.
  • Session identification information is also called “session ID”.
  • a user disconnects by a timeout or log out from a database server, he or she may reconnect to the same position within the database or databases by accessing the session information stored in the web or application server memory along with his or her session ID.
  • the session IDs allow for more than one user to connect to the database or databases within the WDMS simultaneously. Session IDs allow database users and administrators to work more efficiently, while at the same time providing an additional layer of security for the WDMS.
  • the present invention allows users to be categorized into groups that might have different levels of access to the database, for example groups that have View-only access, groups that have View-and-change-display access, and groups that have Administrative access.
  • groups that have View-only access for example groups that have View-only access, groups that have View-and-change-display access, and groups that have Administrative access.
  • An administrator of the WDMS would be able to monitor what sessions are active, allowing him or her to keep track of who is using the WDMS and what they are doing with it.
  • FIG. 1 is a block diagram of the overall structure of a wireless database management system in accordance with an embodiment of the present invention
  • FIG. 2 is a block diagram of a typical client within a wireless database management system in accordance with an embodiment of the present invention
  • FIG. 3 is a block diagram of a typical Virtual Private Network (VPN) client within a wireless database system in accordance with an embodiment of the present invention
  • FIG. 4 is a block diagram of a typical Intranet within a wireless database management system in accordance with an embodiment of the present invention
  • FIG. 5 is a block diagram of a typical Virtual Private Network (VPN) Intranet within a wireless database management system in accordance with an embodiment of the present invention
  • FIG. 6 is a block diagram of wireless and network security protocols that are encountered as a query and response are transmitted and received between a database and a wireless device in accordance with an embodiment of the present invention.
  • FIG. 7 is a flowchart that illustrates the control flow of steps performed by software implemented on a wireless device and server in handling idle connections in accordance with an embodiment of the present invention.
  • FIG. 1 the overall structure of a WDMS according to one embodiment of the invention is shown schematically.
  • data transferred within the WDMS is transmitted and received through the Internet 70 (or a VPN Tunnel 75 within the Internet) between a client (or VPN client 5 ) and an Intranet 150 (or VPN Intranet 160 ).
  • FIG. 2 shows an embodiment of a typical client 15
  • FIG. 4 shows an embodiment of a typical Intranet 150 .
  • the VPN client 5 and Intranet 160 are shown in an embodiment in FIGS. 3 and 5 respectively, and will be discussed separately below.
  • data transferred within the WDMS is transferred from a wireless device 10 in FIG. 2 to a database 200 in FIG. 4 or from a database 200 to a wireless device 10 .
  • a description of the WDMS of the invention will begin with a wireless device 10 , and follow the path of data transmitted from a wireless device 10 to a database 200 .
  • a wireless device 10 might comprise a personal digital assistant (PDA), cell phone, two-way pager or other similar device.
  • PDA personal digital assistant
  • FIG. 6 data to be transferred from a wireless device 10 to a wireless base station ( 30 in FIG. 2), is secured with a method comprising two steps.
  • a database query 260 in FIG. 6 is converted to HTML 270 and encrypted with a private key method 280 such as the Data Encryption Standard (DES), DES Extended (DESX), or the Advanced Encryption Standard (AES).
  • DES Data Encryption Standard
  • DESX DES Extended
  • AES Advanced Encryption Standard
  • Private key encryption is also known as symmetric or symmetrical encryption because both the transmitter and receiver must have the same encryption key in order to encrypt and decrypt data.
  • a second step data is encrypted using a public key method 290 such as Elliptic Curve Cryptography (ECC).
  • ECC Elliptic Curve Cryptography
  • public key encryption is also known as asymmetric or asymmetrical encryption because the transmitter and receiver can decrypt data with their own keys; the keys need not be, and usually are not, the same.
  • public key encryption for data transferred between a wireless device 10 in FIG. 2 and a wireless base station 30 is provided by ECC, which may be performed, for example, by an Elliptic Curve Diffie-Hellman function.
  • the private key used in the first step which might be a DESX key, is renewed for every exchange of data between the client and the server.
  • the present device might secure data transferred between a wireless device and a wireless base station with a different combination of public and private key encryption steps.
  • the method of encryption described above prevents data from being intercepted or captured as it is transferred by radio frequency through spaces that may be public 310 in FIG. 6.
  • the data Before broadcast between a wireless device 10 in FIG. 2 and a wireless base station 30 the data may also be compressed and parsed into packets designed for low bandwidth wireless broadcast 300 in FIG. 6. After broadcast, the data is recollected and decompressed 305 before any necessary decryption is performed.
  • wireless communications are described herein by way of example as radio frequency communications, it should be understood that the invention is not limited to radio frequency electromagnetic radiation as a mode of wireless communication.
  • Such wireless communication may utilize other frequencies of electromagnetic radiation such as x-ray, ultraviolet, visible, infrared or microwave.
  • Wireless communication might also rely on other forms of transport such as statistical fluctuations in the average density of matter like acoustic or seismic waves. Even dynamically varying thermal gradients might be harnessed as a mode for wireless communication.
  • Wireless base stations are shown as 30 in FIG. 2.
  • a wireless base station might be part of a wireless network architecture such as MOBITEX or MOTIENT that uses digital packet-switching methods such as the Global System for Mobile Communication (GSM), Time Division Multiple Access (TDMA), or Code-Division Multiple Access (CDMA).
  • GSM Global System for Mobile Communication
  • TDMA Time Division Multiple Access
  • CDMA Code-Division Multiple Access
  • the wireless network architecture might be circuit-switched.
  • a wireless base station 30 is connected through a physical cable 40 to a wireless proxy server 50 .
  • data is again encrypted with public and private keys 320 in FIG. 6 and, according to one embodiment, is also secured for transfer with a low-layer security protocol such as the Secure Socket Layer (SSL) protocol 330 .
  • SSL Secure Socket Layer
  • SSL was designed as an Internet security standard; it combines public and private key encryption methods in order to secure data transferred through the Internet.
  • SSL may require web or application servers to use public key encryption in the form of Certificate Authorities or digital signatures such as VERISIGN, which are public keys issued to web sites that have been researched by a third party and confirmed to be what they claim to be prior to their public key being issued.
  • a wireless device 10 in FIG. 2 might have public keys for one or more web or application servers 90 in FIG. 4 stored in memory for use in SSL. If information stored on a wireless device does not match what is known about a particular web or application server (that is connected to a wireless device through the Internet 70 ) then the connection may be terminated.
  • a wireless device 10 might generate a private key to be shared between it and that web or application server 90 .
  • a private key might be encrypted with the public key of that web or application server before being transferred through the Internet.
  • the data transferred between them might be encrypted with that private key.
  • SSL might be implemented with a different combination of public and private key encryption methods.
  • each wireless base station 30 there is a plurality of wireless base stations 30 in FIG. 2, each providing wireless access to a different geographical region (also known as a cell).
  • Each wireless base station 30 is connected to a wireless proxy server 50 .
  • a wireless proxy server 50 that is networked with the wireless base stations 30 is also connected to the Internet 70 .
  • Data transferred through the Internet is secured by encryption with a low-layer security protocol such as the Secure Sockets Layer (SSL) protocol ( 330 in FIG. 6) or the Transport Layer Security (TLS) protocol; it might rely on an encryption algorithm such as RSA, ElGamal, RC 4 , or MD 5 .
  • SSL Secure Sockets Layer
  • TLS Transport Layer Security
  • data transferred from a wireless device 10 to the Internet 70 through a wireless proxy server 50 might also be converted from standard wireless protocols and languages such as WAP, WDP, and WML into protocols and languages that can be used with the Internet such as TCP/IP, HTTP, HTTPS, and HTML 270 in FIG. 6.
  • data transferred from the Internet 70 to a web or application server 90 might pass through a firewall 80 implemented within an Intranet 150 .
  • the firewall might allow Internet access only through specific assigned ports, such as port 443 (not shown).
  • the firewall might restrict the Internet IP addresses that may access the web or application server 90 to the IP addresses of the wireless proxy server or servers 50 in FIG. 2, effectively limiting access to wireless devices 10 connected to the WDMS through those proxy servers.
  • the firewall might restrict the IP addresses that may access the web or application server to the IP addresses of each wireless device connected to the WDMS, allowing an even greater degree of control over access to the WDMS.
  • the WDMS might be further secured through the use of two firewalls in a so called “DMZ” configuration, with one firewall 80 in FIG. 4 between the Internet 70 and a web or application server 90 , and a second firewall (not shown in FIG. 4) between a web or application server 90 and a database server 100 .
  • DMZ so called “DMZ” configuration
  • FIG. 3 shows an embodiment of the detailed structure of a VPN client 5
  • FIG. 5 shows an embodiment of the detailed structure of a VPN Intranet.
  • a VPN is implemented by limiting access to every computer or computer network intervening a wireless base station 30 in FIG. 3 and a web or application server 90 in FIG. 5.
  • the main differences in the structure of a typical client as shown in FIG. 2 and a VPN client as shown in FIG. 3 are the VPN-controlled wireless proxy server 60 in FIG. 3 and the VPN Tunnel 75 .
  • a wireless base station 30 might connect to a VPN-controlled wireless proxy server 60 rather than a standard wireless proxy server ( 50 in FIG. 2).
  • the VPN-controlled wireless proxy server might then connect to only certain VPN-controlled servers that are also connected to the Internet.
  • the plurality of VPN-controlled Internet servers between a VPN-controlled proxy server 60 and a web or application server 90 in FIG. 5 is known as a VPN Tunnel 75 .
  • the main difference in the structure of a typical Intranet as shown in FIG. 4 and a VPN Intranet as shown in FIG. 5 is the VPN Tunnel 75 .
  • the VPN does not allow users outside the WIMS to have any access to data transferred within the WDMS; they cannot inspect data within the WDMS and they cannot find out from whence data is transmitted or received—they cannot see the data at all.
  • software on the web or application server ( 90 in either FIG. 4 or 5 ) encrypts or decrypts data transferred from a wireless proxy server through the Internet 330 in FIG. 6 and translates the data 350 , which might be a database query or a response to a database query, to or from a protocol or language used with networks like the Internet, such as HTTP or HTML, into or out of a protocol or language that can be used by a database server 100 in either FIG. 4 or 5 such as SQL.
  • FIG. 7 shows more specifically how the user of the wireless device selects a period of time after which the connection between the wireless device and the database server is terminated if the wireless device remains idle (i.e., if it does not send any data to the database server).
  • Part A of FIG. 7 shows how a user of a wireless device 10 establishes a new connection or “session” with a database or databases through a web or application server.
  • session ID session information 410
  • the session ID is particularly useful within the system of the invention because it allows a user to reconnect to a session that was timed out as described above.
  • a user of a wireless device 10 need only make a request for that session 470 , whereupon a web or application server 90 would reply 480 by reconnecting the user to the WDMS.
  • Databases often have many different layers that must be navigated in order to find a particular piece of information.
  • Session IDs would be stored, along with other information about the user's session (e.g., stored results of requests which that user has made to a database or databases) in order to allow a user to quickly find the position that he or she had previously held within the database structure.
  • Part B of FIG. 7 shows how a user might adjust the period for timeouts within the system of the invention by setting a time to be kept in memory on a web or application server.
  • Software on a web or application server 90 asks a user at its console 440 how long he or she expects to remain idle 420 .
  • the user replies with a specific length of time beyond which they do not expect to remain idle 430 .
  • users may only adjust the length of the timeout from a console 440 to a web or application server, the console being hard-wired to the web or application server; allowing such a change to be made from a wireless device might compromise the privacy of the entire WDMS.
  • Part C of FIG. 7 shows how a web or application server 90 might repetitively check 450 how long a session has been inactive in order to ascertain whether or not it needs to be disconnected; if the session extends beyond the time limit set (by a user as shown in FIG. 7 part B) the user is disconnected and must either reestablish the connection or start a new connection.
  • stored results of user requests associated with a session ID are periodically erased from memory on the web or application server.
  • a user of the WDMS determines how often the session IDs and the information associated with them is erased.
  • the session IDs allow the user acting as administrator of the WDMS to keep track of how many users are currently logged on to the WDMS, and what requests those users are making of the database or databases connected to the WDMS. Effectively, this allows the additional step of intelligent human scrutiny to be added to the present security method.
  • the identity of an intended user of the WDMS might be authenticated by software implemented on a wireless device, on a web or application server, or on a database server.
  • authentication of user identity might be made possible by demanding that users enter one or more user names and passwords for access to the WDMS. If user identification phrases and passwords are kept private, then unwanted user access is further limited.
  • additional security might be afforded to the WDMS by categorizing users into groups that have different levels of access to the database server.
  • Table 1 shows an embodiment of how these categories might be organized.
  • TABLE 1 Categories for user access CATEGORY ACCESS ALLOWED
  • View-only access Users may only view data kept in a database or databases.
  • View-and-change- Users may view data kept in a database or display access databases, or may modify the format in which data is displayed.
  • Administrative access Users may view or modify the format of data kept in a database or databases, and may manage the access of other users to a database or databases.
  • One group might be enabled only to view the data kept in the database (View-only access); another group might be able to both view the data kept in the database and modify the manner in which that data is displayed (View-and-change-display access); another group might have complete access to the database, being able to modify, view, or change the display of data kept in the database, decide to what group other users might be assigned, and perform other administrative operations (Administrative access).
  • user requests made to a database or databases from a wireless device may be assigned codes, which are in turn stored in a web or application server and associated with a particular session ID.
  • codes which are in turn stored in a web or application server and associated with a particular session ID.
  • data sent from a wireless device to a web or application server may be limited to a user request code and any necessary parameters that must accompany the particular request.
  • Table 2 shows how, in one embodiment of the present invention, this step makes sending a full-text request from a wireless device to a web or application server unnecessary.
  • This step makes it unnecessary for queries to be sent more than once, saving time and rendering the information that might have been sent with the query unavailable to would be eavesdroppers.
  • the WDMS includes a capacity for a user of a wireless device to connect to a plurality of database servers 100 and databases 200 .
  • FIG. 4 and FIG. 5 do not show more than one database server, but in another embodiment (not shown) one or more databases 200 might be connected a web or application server 90 by a different, separate database server.
  • the addresses which might be, for example, the IP addresses of each database server 100 , are stored on a web or application server 90 . Effectively, this allows a user of a single wireless device within the WDMS to access a plurality of databases by referring to the stored list of database server addresses.
  • each database server's address is given a nickname that is stored along with it in the list of addresses on the web or application server.
  • These nicknames are set by a user of the WDMS.
  • “MYBANK” can reference database “BANK” at IP address “207.208.77.99”.
  • a user of a wireless device refers to the nicknames of the databases that he or she accesses rather than the actual address; thus, an eavesdropper is unable to identify the addresses of the databases that he or she might be trying to gain access to illegally.

Abstract

A method for maintaining the security of a wireless database management system (WDMS) including steps of encrypting data for transmission through both hard-wired and wireless networks, authenticating user identities, timing out idle connections, assigning sessions, and categorizing types of user access. Each component of the structure of a WDMS is described along with the various security techniques employed for securing the data transmitted and received by that component.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Patent Application Serial No. 60/247,523, filed on Nov. 9, 2000.[0001]
  • FIELD OF THE INVENTION
  • The present invention generally relates to a method for maintaining the security of data transferred within a wireless database management system (WDMS), and relates more specifically to a method practiced by software implemented on a plurality of wireless devices and on a plurality of networked computers that comprise the WDMS. [0002]
  • BACKGROUND OF THE INVENTION
  • Security has become a high priority now that access to many computer systems is not physically limited to hard-wired networks. In the past, database administrators were forced to work within the confines of secure office computers or secure office computer networks that allowed access to a database, or its database management software. A WDMS allows the database administrator to monitor and manage the database remotely. If the database administrator does not happen to be physically near in the event of a crisis, then remote access translates directly into a quicker response and less downtime. This is extremely valuable to companies, such as banks, auction houses, brokerage firms, etc., which must keep their databases running uninterrupted in order to prevent a loss of revenue. [0003]
  • Although a WDMS solves many problems, it introduces its own unique problem: how can the data transferred within the WDMS be kept secure? In the present state of the art in wireless communications, information is transmitted to and from a wireless device by electromagnetic radiation that will inevitably travel through public spaces. Obviously, it is not desirable, and in some cases it may be a violation of law, for a company to allow public access to the information kept in its databases. In addition, typically data must be transferred between a database server and a web or application server before it can be broadcast to a wireless device. These connections must also be secured in order to prevent unauthorized access to a WDMS. Without a proper method for securing data transferred within a WDMS, private and confidential information kept in a database or databases within it may become accessible to competitors or the criminal element, with a loss of revenue potentially resulting. [0004]
  • The need for securing data within a computer network is not new, and many security methods have been developed for keeping data secure within a computer network. At present, some of these methods are being adapted for use in less conventional computing environments such as wireless local area networks or wireless phone networks. However, heretofore there has been no system developed to address the unique and important security concerns of a WDMS. Such a system has its own special challenges that need to be understood and addressed. The need exists for a comprehensive method of securing data transmissions within and access to a WDMS. [0005]
  • SUMMARY OF THE INVENTION
  • The present invention provides a method for maintaining the security of communications within a wireless database management system. In transfer through a WDMS, data might be exchanged between hundreds of computers. The WDMS might comprise a wireless device, wireless base station, wireless proxy server, a plurality of routers and servers that make up the Internet, a web or application server, database server, and one or more databases. The medium, connection, and protocol used with each of these devices is different and each may present a different kind of security risk. In order to reduce the risk of data transferred within the WDMS being intercepted or captured, all the communications between these computers and their interconnections must be secured, preferably with several layers of security. [0006]
  • Using software that is implemented on a wireless device and a wireless base station, data transmitted and received by radio frequency between a wireless device and a wireless base station is encrypted using a private key method such as the Data Encryption Standard (DES) or the Advanced Encryption Standard (AES). The same data is also encrypted using a public key method such as Elliptic Curve Cryptography (ECC) or Rivest-Shamir-Adleman (RSA). The use of public and private key methods together constitutes a more robust and flexible security design than either method could provide on its own. [0007]
  • Data transferred from a wireless base station, through a wireless proxy server and the Internet, to a web or application server is secured with a low-layer security protocol such as the Secure Sockets Layer (SSL) protocol or the Transport Layer Security (TLS) protocol. A wireless web or application server (usually part of a company's Intranet) might be further secured by the implementation of at least one firewall. The firewall might be used to restrict the set of IP addresses that can be connected to the Intranet to the IP addresses of the wireless devices or of the wireless proxy servers. [0008]
  • Unfortunately, even if data transfer between a wireless device and a database server is completely secure it still might not be completely private. There remains the possibility that private information kept on the database or databases part of the WDMS might be accessed through a lost or stolen wireless device. The present invention also provides a novel method, comprising several steps, for reducing the risk of this kind of unauthorized access. [0009]
  • A first step in preventing unauthorized users from accessing a database through the WDMS involves the authentication of a user's identity. The present invention accomplishes authentication by requiring a user to “log in” to the WDMS with one or more user identification phrases and passwords. An unauthorized user that finds or steals a wireless device would be unable to access information kept in the database or databases without having the user identification phrases and passwords necessary to log in. [0010]
  • To prevent the still rarer chance that a wireless device could be lost or stolen while an authorized user was still logged into the WDMS, another step is used. In the present invention, software implemented on a web or application server sets an adjustable timeout for connections between that wireless device and the web or application server. After a certain amount of idle time or inactivity, which might be specified by the user, the wireless device will automatically log out from the WDMS. While this does not completely preclude unauthorized users from accessing the database or databases within the WDMS, it makes it much more difficult by requiring them to do so within a very short time frame set by the authorized user. [0011]
  • However, adding a timeout feature to a security scheme for wireless devices also presents a new challenge for a would-be developer of a WDMS: database users and administrators are often many layers deep into a database while they are working. It is extremely inconvenient—if not impossible—for a user to have to navigate back through layer upon layer of a database after he or she has been disconnected. An accidental timeout, perhaps caused by a temporary loss of a wireless connection, might cost hours of work for a user of the WDMS, and could result in an unstable database system if the interruption occurred while changes to the database were not complete. The present invention presents a novel solution to this problem by uniquely identifying the connections (“sessions”) maintained between a wireless device and a database server. According to one embodiment of the invention, sessions are uniquely identified with information that is stored on a web or application server. Session identification information is also called “session ID”. After a user disconnects by a timeout or log out from a database server, he or she may reconnect to the same position within the database or databases by accessing the session information stored in the web or application server memory along with his or her session ID. When the connection is reestablished, the user is returned to the same position as before or, alternatively may be prompted with a choice for this option. This technique is also useful because the session IDs allow for more than one user to connect to the database or databases within the WDMS simultaneously. Session IDs allow database users and administrators to work more efficiently, while at the same time providing an additional layer of security for the WDMS. [0012]
  • To further secure the WDMS, the present invention allows users to be categorized into groups that might have different levels of access to the database, for example groups that have View-only access, groups that have View-and-change-display access, and groups that have Administrative access. An administrator of the WDMS would be able to monitor what sessions are active, allowing him or her to keep track of who is using the WDMS and what they are doing with it. [0013]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing and other objects, advantages and features of the present invention will be apparent from the following detailed description and the accompanying drawings, in which: [0014]
  • FIG. 1 is a block diagram of the overall structure of a wireless database management system in accordance with an embodiment of the present invention; [0015]
  • FIG. 2 is a block diagram of a typical client within a wireless database management system in accordance with an embodiment of the present invention; [0016]
  • FIG. 3 is a block diagram of a typical Virtual Private Network (VPN) client within a wireless database system in accordance with an embodiment of the present invention; [0017]
  • FIG. 4 is a block diagram of a typical Intranet within a wireless database management system in accordance with an embodiment of the present invention; [0018]
  • FIG. 5 is a block diagram of a typical Virtual Private Network (VPN) Intranet within a wireless database management system in accordance with an embodiment of the present invention; [0019]
  • FIG. 6 is a block diagram of wireless and network security protocols that are encountered as a query and response are transmitted and received between a database and a wireless device in accordance with an embodiment of the present invention; and [0020]
  • FIG. 7 is a flowchart that illustrates the control flow of steps performed by software implemented on a wireless device and server in handling idle connections in accordance with an embodiment of the present invention. [0021]
  • DETAILED DESCRIPTION OF THE INVENTION
  • While the present invention is susceptible to various modifications and alternative forms, certain preferred embodiments are shown by way of example in the drawings and will be described in detail herein. It should be understood, however, that it is not intended to limit the invention to the particular forms described, but to the contrary, the invention is intended to cover all modifications, alternatives and equivalents falling within the spirit and scope of the invention defined by the appended claims. [0022]
  • In FIG. 1, the overall structure of a WDMS according to one embodiment of the invention is shown schematically. In general, data transferred within the WDMS is transmitted and received through the Internet [0023] 70 (or a VPN Tunnel 75 within the Internet) between a client (or VPN client 5) and an Intranet 150 (or VPN Intranet 160). FIG. 2 shows an embodiment of a typical client 15, and FIG. 4 shows an embodiment of a typical Intranet 150. The VPN client 5 and Intranet 160 are shown in an embodiment in FIGS. 3 and 5 respectively, and will be discussed separately below.
  • At the most fundamental level, data transferred within the WDMS is transferred from a [0024] wireless device 10 in FIG. 2 to a database 200 in FIG. 4 or from a database 200 to a wireless device 10. A description of the WDMS of the invention will begin with a wireless device 10, and follow the path of data transmitted from a wireless device 10 to a database 200. Reference will be made to FIG. 6 for a description of various encoding, encrypting, and translation performed on the data being transmitted and received between a wireless device 10 and a database 200.
  • A [0025] wireless device 10 might comprise a personal digital assistant (PDA), cell phone, two-way pager or other similar device. Referring to FIG. 6, data to be transferred from a wireless device 10 to a wireless base station (30 in FIG. 2), is secured with a method comprising two steps. First, a database query 260 in FIG. 6, is converted to HTML 270 and encrypted with a private key method 280 such as the Data Encryption Standard (DES), DES Extended (DESX), or the Advanced Encryption Standard (AES). Private key encryption is also known as symmetric or symmetrical encryption because both the transmitter and receiver must have the same encryption key in order to encrypt and decrypt data. In a second step, data is encrypted using a public key method 290 such as Elliptic Curve Cryptography (ECC). By analogy with private key encryption, public key encryption is also known as asymmetric or asymmetrical encryption because the transmitter and receiver can decrypt data with their own keys; the keys need not be, and usually are not, the same. According to one embodiment, public key encryption for data transferred between a wireless device 10 in FIG. 2 and a wireless base station 30 is provided by ECC, which may be performed, for example, by an Elliptic Curve Diffie-Hellman function. The private key used in the first step, which might be a DESX key, is renewed for every exchange of data between the client and the server. In another embodiment, the present device might secure data transferred between a wireless device and a wireless base station with a different combination of public and private key encryption steps.
  • The method of encryption described above prevents data from being intercepted or captured as it is transferred by radio frequency through spaces that may be public [0026] 310 in FIG. 6. Before broadcast between a wireless device 10 in FIG. 2 and a wireless base station 30 the data may also be compressed and parsed into packets designed for low bandwidth wireless broadcast 300 in FIG. 6. After broadcast, the data is recollected and decompressed 305 before any necessary decryption is performed.
  • While wireless communications are described herein by way of example as radio frequency communications, it should be understood that the invention is not limited to radio frequency electromagnetic radiation as a mode of wireless communication. Such wireless communication may utilize other frequencies of electromagnetic radiation such as x-ray, ultraviolet, visible, infrared or microwave. Wireless communication might also rely on other forms of transport such as statistical fluctuations in the average density of matter like acoustic or seismic waves. Even dynamically varying thermal gradients might be harnessed as a mode for wireless communication. [0027]
  • Wireless base stations are shown as [0028] 30 in FIG. 2. A wireless base station might be part of a wireless network architecture such as MOBITEX or MOTIENT that uses digital packet-switching methods such as the Global System for Mobile Communication (GSM), Time Division Multiple Access (TDMA), or Code-Division Multiple Access (CDMA). In another embodiment, the wireless network architecture might be circuit-switched. A wireless base station 30 is connected through a physical cable 40 to a wireless proxy server 50. Before transfer between a wireless base station and a wireless proxy server, data is again encrypted with public and private keys 320 in FIG. 6 and, according to one embodiment, is also secured for transfer with a low-layer security protocol such as the Secure Socket Layer (SSL) protocol 330.
  • SSL was designed as an Internet security standard; it combines public and private key encryption methods in order to secure data transferred through the Internet. In an embodiment, SSL may require web or application servers to use public key encryption in the form of Certificate Authorities or digital signatures such as VERISIGN, which are public keys issued to web sites that have been researched by a third party and confirmed to be what they claim to be prior to their public key being issued. A [0029] wireless device 10 in FIG. 2 might have public keys for one or more web or application servers 90 in FIG. 4 stored in memory for use in SSL. If information stored on a wireless device does not match what is known about a particular web or application server (that is connected to a wireless device through the Internet 70) then the connection may be terminated. If the connection is not terminated, then a wireless device 10 might generate a private key to be shared between it and that web or application server 90. Such a private key might be encrypted with the public key of that web or application server before being transferred through the Internet. After a web or application server has obtained the private key from a wireless device in this manner, the data transferred between them might be encrypted with that private key. In another embodiment, SSL might be implemented with a different combination of public and private key encryption methods.
  • In an embodiment of the system of the invention, there is a plurality of [0030] wireless base stations 30 in FIG. 2, each providing wireless access to a different geographical region (also known as a cell). Each wireless base station 30 is connected to a wireless proxy server 50.
  • According to one embodiment of the WDMS of the invention, a [0031] wireless proxy server 50 that is networked with the wireless base stations 30 is also connected to the Internet 70. Data transferred through the Internet is secured by encryption with a low-layer security protocol such as the Secure Sockets Layer (SSL) protocol (330 in FIG. 6) or the Transport Layer Security (TLS) protocol; it might rely on an encryption algorithm such as RSA, ElGamal, RC4, or MD5. In an embodiment of the WDMS, data transferred from a wireless device 10 to the Internet 70 through a wireless proxy server 50 might also be converted from standard wireless protocols and languages such as WAP, WDP, and WML into protocols and languages that can be used with the Internet such as TCP/IP, HTTP, HTTPS, and HTML 270 in FIG. 6.
  • Referring to FIG. 4, data transferred from the [0032] Internet 70 to a web or application server 90 might pass through a firewall 80 implemented within an Intranet 150. In an embodiment, the firewall might allow Internet access only through specific assigned ports, such as port 443 (not shown). In another embodiment, the firewall might restrict the Internet IP addresses that may access the web or application server 90 to the IP addresses of the wireless proxy server or servers 50 in FIG. 2, effectively limiting access to wireless devices 10 connected to the WDMS through those proxy servers. Alternatively, the firewall might restrict the IP addresses that may access the web or application server to the IP addresses of each wireless device connected to the WDMS, allowing an even greater degree of control over access to the WDMS. In yet another embodiment, the WDMS might be further secured through the use of two firewalls in a so called “DMZ” configuration, with one firewall 80 in FIG. 4 between the Internet 70 and a web or application server 90, and a second firewall (not shown in FIG. 4) between a web or application server 90 and a database server 100.
  • In the presently preferred embodiment of the WDMS, it is possible for a virtual private network (VPN) to provide additional security to data transferred between a [0033] VPN client 5 in FIG. 1 and a VPN Intranet 160. FIG. 3 shows an embodiment of the detailed structure of a VPN client 5, and FIG. 5 shows an embodiment of the detailed structure of a VPN Intranet. A VPN is implemented by limiting access to every computer or computer network intervening a wireless base station 30 in FIG. 3 and a web or application server 90 in FIG. 5.
  • As illustrated, the main differences in the structure of a typical client as shown in FIG. 2 and a VPN client as shown in FIG. 3 are the VPN-controlled [0034] wireless proxy server 60 in FIG. 3 and the VPN Tunnel 75. A wireless base station 30 might connect to a VPN-controlled wireless proxy server 60 rather than a standard wireless proxy server (50 in FIG. 2). The VPN-controlled wireless proxy server might then connect to only certain VPN-controlled servers that are also connected to the Internet. The plurality of VPN-controlled Internet servers between a VPN-controlled proxy server 60 and a web or application server 90 in FIG. 5 is known as a VPN Tunnel 75. Similarly, the main difference in the structure of a typical Intranet as shown in FIG. 4 and a VPN Intranet as shown in FIG. 5 is the VPN Tunnel 75.
  • In an embodiment, the VPN does not allow users outside the WIMS to have any access to data transferred within the WDMS; they cannot inspect data within the WDMS and they cannot find out from whence data is transmitted or received—they cannot see the data at all. [0035]
  • According to one embodiment of the present invention, software on the web or application server ([0036] 90 in either FIG. 4 or 5) encrypts or decrypts data transferred from a wireless proxy server through the Internet 330 in FIG. 6 and translates the data 350, which might be a database query or a response to a database query, to or from a protocol or language used with networks like the Internet, such as HTTP or HTML, into or out of a protocol or language that can be used by a database server 100 in either FIG. 4 or 5 such as SQL.
  • Data transferred in the correct form to the [0037] database server 100 in either FIG. 4 or 5 is processed, the database or databases 200 connected to the database server are accessed, and then data is sent 350 and translated 360 from the server side to the client side following the reverse path shown by the arrows in FIG. 6. The data transferred from the server side to the client side would be secured by a method comprising all of the steps previously mentioned.
  • In addition to the steps previously mentioned, there are other steps that might be taken in securing data transferred within the WDMS. Software on a web or [0038] application server 90 in either FIG. 4 or 5 and software on a wireless device 10 in either FIG. 2 or 3 work together to perform a timeout function for connections maintained between a wireless device and a database server 100 in either FIG. 4 or 5. FIG. 7 shows more specifically how the user of the wireless device selects a period of time after which the connection between the wireless device and the database server is terminated if the wireless device remains idle (i.e., if it does not send any data to the database server). As described previously, this security measure would make it more difficult for someone other than the intended user of the WDMS to use it, for example, through a lost or stolen wireless device. Unless unauthorized users can find or steal a wireless device in less than the timeout period they cannot access data kept within the WDMS. Part A of FIG. 7 shows how a user of a wireless device 10 establishes a new connection or “session” with a database or databases through a web or application server.
  • After prompting from a [0039] user 400 software on the web or application server assigns session information 410 (“session ID”). The session ID is particularly useful within the system of the invention because it allows a user to reconnect to a session that was timed out as described above. As shown in Part D of FIG. 7, to reconnect to a previous session a user of a wireless device 10 need only make a request for that session 470, whereupon a web or application server 90 would reply 480 by reconnecting the user to the WDMS. This could potentially save hours of the user's time by allowing him or her to reconnect directly to the same point within the database at which he or she was working before his or her connection timed out. Databases often have many different layers that must be navigated in order to find a particular piece of information. Also, a search done slightly differently on the same database may return completely different results. Session IDs would be stored, along with other information about the user's session (e.g., stored results of requests which that user has made to a database or databases) in order to allow a user to quickly find the position that he or she had previously held within the database structure.
  • Part B of FIG. 7 shows how a user might adjust the period for timeouts within the system of the invention by setting a time to be kept in memory on a web or application server. Software on a web or [0040] application server 90 asks a user at its console 440 how long he or she expects to remain idle 420. The user replies with a specific length of time beyond which they do not expect to remain idle 430. To further remove the possibility of unwanted user access to the WDMS, users may only adjust the length of the timeout from a console 440 to a web or application server, the console being hard-wired to the web or application server; allowing such a change to be made from a wireless device might compromise the privacy of the entire WDMS.
  • Part C of FIG. 7 shows how a web or [0041] application server 90 might repetitively check 450 how long a session has been inactive in order to ascertain whether or not it needs to be disconnected; if the session extends beyond the time limit set (by a user as shown in FIG. 7 part B) the user is disconnected and must either reestablish the connection or start a new connection. According to one embodiment of the present invention, stored results of user requests associated with a session ID are periodically erased from memory on the web or application server. A user of the WDMS determines how often the session IDs and the information associated with them is erased.
  • In another embodiment, the session IDs allow the user acting as administrator of the WDMS to keep track of how many users are currently logged on to the WDMS, and what requests those users are making of the database or databases connected to the WDMS. Effectively, this allows the additional step of intelligent human scrutiny to be added to the present security method. [0042]
  • In another embodiment of the present invention, the identity of an intended user of the WDMS might be authenticated by software implemented on a wireless device, on a web or application server, or on a database server. For example, authentication of user identity might be made possible by demanding that users enter one or more user names and passwords for access to the WDMS. If user identification phrases and passwords are kept private, then unwanted user access is further limited. [0043]
  • In yet another embodiment of the present invention, additional security might be afforded to the WDMS by categorizing users into groups that have different levels of access to the database server. Table 1 shows an embodiment of how these categories might be organized. [0044]
    TABLE 1
    Categories for user access
    CATEGORY ACCESS ALLOWED
    View-only access Users may only view data kept in a database or
    databases.
    View-and-change- Users may view data kept in a database or
    display access databases, or may modify the format in which
    data is displayed.
    Administrative access Users may view or modify the format of data
    kept in a database or databases, and may
    manage the access of other users to a database
    or databases.
  • One group might be enabled only to view the data kept in the database (View-only access); another group might be able to both view the data kept in the database and modify the manner in which that data is displayed (View-and-change-display access); another group might have complete access to the database, being able to modify, view, or change the display of data kept in the database, decide to what group other users might be assigned, and perform other administrative operations (Administrative access). [0045]
  • In still another embodiment of the present invention, user requests made to a database or databases from a wireless device may be assigned codes, which are in turn stored in a web or application server and associated with a particular session ID. By coding the user requests, data sent from a wireless device to a web or application server may be limited to a user request code and any necessary parameters that must accompany the particular request. Table 2 shows how, in one embodiment of the present invention, this step makes sending a full-text request from a wireless device to a web or application server unnecessary. [0046]
    TABLE 2
    Numbering user requests
    CONVENTIONAL EFFICIENT WDMS
    “SELECT TABLE_NAME, “17ERNIE”
    INTIAL_EXTENT, NEXT_EXTENT,
    PCT_INCREASE, PCTUSED, PCTFREE,
    TABLESPACE_NAME, EXTENTS FROM
    DBA_TABLES WHERE OWNER=ERNIE”
  • This step makes it unnecessary for queries to be sent more than once, saving time and rendering the information that might have been sent with the query unavailable to would be eavesdroppers. [0047]
  • As shown in FIGS. 4 and 5, in an embodiment of the present invention the WDMS includes a capacity for a user of a wireless device to connect to a plurality of [0048] database servers 100 and databases 200. FIG. 4 and FIG. 5 do not show more than one database server, but in another embodiment (not shown) one or more databases 200 might be connected a web or application server 90 by a different, separate database server. According to one embodiment of the invention, the addresses, which might be, for example, the IP addresses of each database server 100, are stored on a web or application server 90. Effectively, this allows a user of a single wireless device within the WDMS to access a plurality of databases by referring to the stored list of database server addresses.
  • In yet another embodiment, each database server's address is given a nickname that is stored along with it in the list of addresses on the web or application server. These nicknames are set by a user of the WDMS. For example, “MYBANK” can reference database “BANK” at IP address “207.208.77.99”. A user of a wireless device refers to the nicknames of the databases that he or she accesses rather than the actual address; thus, an eavesdropper is unable to identify the addresses of the databases that he or she might be trying to gain access to illegally. [0049]
  • It should be understood that various changes and modifications to the presently preferred embodiments described herein would be apparent to those skilled in the art. Such changes and modifications may be made without departing from the spirit and scope of the present invention and without diminishing its attendant advantages. [0050]

Claims (28)

What is claimed is:
1. A method for securing data within a wireless database management system, the method comprising the steps of:
encrypting data transferred within a wireless database management system with a public key method;
encrypting data transferred within a wireless database management system with a private key method; and
encrypting data transferred between a wireless base station and a server with a low-layer security protocol.
2. The method of claim 1 further comprising the step of:
limiting access to a wireless database management system with a firewall between a server and the Internet.
3. The method of claim 2 further comprising the step of:
limiting access to a wireless database management system with a firewall between a database server and a server.
4. The method of claim 1 further comprising the step of:
timing out connections between a wireless device and a server.
5. The method of claim 1 further comprising the step of:
authenticating the identity of a user of a wireless database management system.
6. The method of claim 1 further comprising the step of:
categorizing users of a wireless database management system into groups that are allowed different levels of access to a database.
7. The method of claim 1 further comprising the step of:
coding queries made to a database server by a user of a wireless device, and storing those queries and codes in memory.
8. The method of claim 1 further comprising the step of:
identifying a session that a user of a wireless device has established with a server with a session identification phrase, and storing the session identification phrase in memory.
9. The method of claim 4 further comprising the step of:
allowing the timing out of connections between a wireless device and a server to be adjusted.
10. The method of claim 1 further comprising the step of:
using a controlled wireless proxy server for securing data transferred between a wireless base station and the Internet.
11. The method of claim 10 further comprising the steps of:
limiting access to a wireless database management system with a firewall between a server and the Internet;
using a controlled server for securing data transferred on the Internet; and
connecting an Intranet to a controlled server on the Internet through the firewall.
12. The method of claim 11 further comprising the step of:
limiting access to a wireless database management system with a firewall between a database server and a server.
13. The method of claim 1 further comprising the step of:
compressing and parsing data transferred between a wireless device and a wireless base station.
14. The method of claim 1 further comprising the step of:
nicknaming the address of a database.
15. The method of claim 14 further comprising the step of:
storing the nickname and its address in memory.
16. A method for securing data within a wireless database management system, the method comprising the steps of:
authenticating the identity of a user of a wireless database management system;
identifying a session that a user of a wireless device has established with a web server with a session identification phrase, and storing the session identification phrase in memory; and
timing out connections between a wireless device and a server.
17. The method of claim 16 further comprising the step of:
allowing the timing out of connections between a wireless device and a server to be adjusted.
18. The method of claim 16 further comprising the steps of:
encrypting data transferred within a wireless database management system with a public key method;
encrypting data transferred within a wireless database management system with a private key method; and
encrypting data transferred between a wireless base station and a server with a low-layer security protocol.
19. The method of claim 16 further comprising the step of:
limiting access to a wireless database management system with a firewall between a server and the Internet.
20. The method of claim 16 further comprising the step of:
limiting access to a wireless database management system with a firewall between a database server and a server.
21. The method of claim 16 further comprising the step of:
categorizing users of a wireless database management system into groups that are allowed different levels of access to a database.
22. The method of claim 16 further comprising the step of:
coding queries made to a database server by a user of a wireless device, and storing those queries and codes in memory.
23. The method of claim 16 further comprising the step of:
using a controlled wireless proxy server for securing data transferred between a wireless base station and the Internet.
24. The method of claim 23 further comprising the steps of:
limiting access to a wireless database management system with a firewall between a server and the Internet;
using a controlled server for securing data transferred on the Internet; and
connecting an Intranet to a controlled server on the Internet through the firewall.
25. The method of claim 24 further comprising the step of:
limiting access to a wireless database management system with a firewall between a database server and a server.
26. The method of claim 16 further comprising the step of:
nicknaming the address of a database.
27. The method of claim 26 further comprising the step of:
storing the nickname and its address in memory.
28. The method of claim 16 further comprising the step of:
compressing and parsing data transferred between a wireless device and a wireless base station.
US10/040,524 2000-11-09 2001-11-01 Method and system for secure wireless database management Abandoned US20020146129A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/040,524 US20020146129A1 (en) 2000-11-09 2001-11-01 Method and system for secure wireless database management

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US24752300P 2000-11-09 2000-11-09
US10/040,524 US20020146129A1 (en) 2000-11-09 2001-11-01 Method and system for secure wireless database management

Publications (1)

Publication Number Publication Date
US20020146129A1 true US20020146129A1 (en) 2002-10-10

Family

ID=22935229

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/040,524 Abandoned US20020146129A1 (en) 2000-11-09 2001-11-01 Method and system for secure wireless database management
US10/007,912 Expired - Lifetime US7496554B2 (en) 2000-11-09 2001-11-08 Method and system for wireless database management
US11/498,300 Expired - Lifetime USRE41902E1 (en) 2000-11-09 2006-08-03 System, method and apparatus for wireless monitoring and management of computer systems
US12/369,461 Expired - Fee Related US8065284B2 (en) 2000-11-09 2009-02-11 Method and system for wireless database management

Family Applications After (3)

Application Number Title Priority Date Filing Date
US10/007,912 Expired - Lifetime US7496554B2 (en) 2000-11-09 2001-11-08 Method and system for wireless database management
US11/498,300 Expired - Lifetime USRE41902E1 (en) 2000-11-09 2006-08-03 System, method and apparatus for wireless monitoring and management of computer systems
US12/369,461 Expired - Fee Related US8065284B2 (en) 2000-11-09 2009-02-11 Method and system for wireless database management

Country Status (3)

Country Link
US (4) US20020146129A1 (en)
AU (2) AU2002228831A1 (en)
WO (2) WO2002039646A2 (en)

Cited By (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147019A1 (en) * 2001-03-20 2002-10-10 Uhlik Christopher Richard Method and apparatus for resource management in a wireless data communication system
US20030028649A1 (en) * 2001-07-31 2003-02-06 Christopher Uhlik Method and apparatus for generating an identifier to facilitate deliver of enhanced data services in a mobile computing environment
US20030081783A1 (en) * 2001-10-23 2003-05-01 Adusumilli Koteshwerrao S. Selecting a security format conversion for wired and wireless devices
US20030097592A1 (en) * 2001-10-23 2003-05-22 Koteshwerrao Adusumilli Mechanism supporting wired and wireless methods for client and server side authentication
WO2003058483A1 (en) * 2002-01-08 2003-07-17 Seven Networks, Inc. Connection architecture for a mobile network
US20040006710A1 (en) * 2002-04-25 2004-01-08 Pollutro Dennis Vance Computer security system
US20040073660A1 (en) * 2002-10-15 2004-04-15 Toomey Christopher Newell Cross-site timed out authentication management
US20060182280A1 (en) * 2005-02-11 2006-08-17 Pekka Laitinen Method and apparatus for providing bootstrapping procedures in a communication network
US7215638B1 (en) * 2002-06-19 2007-05-08 Meshnetworks, Inc. System and method to provide 911 access in voice over internet protocol systems without compromising network security
US7263717B1 (en) * 2003-12-17 2007-08-28 Sprint Communications Company L.P. Integrated security framework and privacy database scheme
US20070283141A1 (en) * 2003-12-31 2007-12-06 Pollutro Dennis V Method and System for Establishing the Identity of an Originator of Computer Transactions
US7346930B1 (en) 2002-10-31 2008-03-18 Sprint Communications Company L.P. Security framework bridge
US20090276204A1 (en) * 2008-04-30 2009-11-05 Applied Identity Method and system for policy simulation
US7680281B2 (en) 2004-10-20 2010-03-16 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US7702801B1 (en) * 2001-04-19 2010-04-20 Advanced Micro Devices, Inc. Determining logon status in a broadband network system and automatically restoring logon connectivity
US20100199092A1 (en) * 2009-02-02 2010-08-05 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US7853563B2 (en) 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US7917505B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Methods for publishing content
US7917468B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US20110197141A1 (en) * 2007-09-12 2011-08-11 Richard James Mazzaferri Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine
US8010082B2 (en) 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
US8064583B1 (en) 2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8116214B2 (en) 2004-12-03 2012-02-14 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8209709B2 (en) 2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine
US8316098B2 (en) 2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US8516539B2 (en) 2007-11-09 2013-08-20 Citrix Systems, Inc System and method for inferring access policies from access event records
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
CN103491534A (en) * 2012-06-13 2014-01-01 株式会社理光 Transmitting equipment, receiving equipment, communication system and control method thereof
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8700728B2 (en) 2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8793305B2 (en) 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8805334B2 (en) 2004-11-22 2014-08-12 Seven Networks, Inc. Maintaining mobile terminal information for secure communications
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8849902B2 (en) 2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network
US8861354B2 (en) 2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8886176B2 (en) 2010-07-26 2014-11-11 Seven Networks, Inc. Mobile application traffic optimization
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US8910241B2 (en) 2002-04-25 2014-12-09 Citrix Systems, Inc. Computer security system
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US8918503B2 (en) 2011-12-06 2014-12-23 Seven Networks, Inc. Optimization of mobile traffic directed to private networks and operator configurability thereof
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US8990910B2 (en) 2007-11-13 2015-03-24 Citrix Systems, Inc. System and method using globally unique identities
US8990573B2 (en) 2008-11-10 2015-03-24 Citrix Systems, Inc. System and method for using variable security tag location in network communications
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US9021021B2 (en) 2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
US9043731B2 (en) 2010-03-30 2015-05-26 Seven Networks, Inc. 3D mobile user interface with configurable workspace management
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US9055102B2 (en) 2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network
US9077630B2 (en) 2010-07-26 2015-07-07 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9173128B2 (en) 2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
US9240945B2 (en) 2008-03-19 2016-01-19 Citrix Systems, Inc. Access, priority and bandwidth management based on application identity
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US9275163B2 (en) 2010-11-01 2016-03-01 Seven Networks, Llc Request and response characteristics based adaptation of distributed caching in a mobile network
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
US10367793B2 (en) * 2011-09-13 2019-07-30 Sagemcom Broadband Sas Secure data exchange method between a communication device and a service provider based on asymmetric public key handling and encryption using hardware key, and communication device and system implementing the same

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7233960B1 (en) * 2001-10-31 2007-06-19 Numoda Corporation System and method for mobile wireless electronic data capture and distribution of a merchant card-processing application
KR100414794B1 (en) * 2001-11-22 2004-01-13 에스케이 텔레콤주식회사 Method for connecting a wireless internet service
DE10226650B4 (en) * 2002-06-14 2004-07-22 Siemens Ag Method for controlling a data transmission procedure over radio channels
US7454785B2 (en) * 2002-12-19 2008-11-18 Avocent Huntsville Corporation Proxy method and system for secure wireless administration of managed entities
US7394761B2 (en) * 2003-04-29 2008-07-01 Avocent Huntsville Corporation System and method for delivering messages using alternate modes of communication
US7346062B2 (en) * 2003-07-10 2008-03-18 International Business Machines Corporation Apparatus and method to coordinate calendar searches in a network scheduler given limited resources
US7447780B2 (en) * 2003-11-21 2008-11-04 Time Warner Cable, Inc. Technique for communicating information over a broadband communications network
WO2005057842A1 (en) * 2003-12-11 2005-06-23 Auckland Uniservices Limited A wireless lan system
US9262490B2 (en) 2004-08-12 2016-02-16 Oracle International Corporation Adaptively routing transactions to servers
US9069870B2 (en) * 2006-07-12 2015-06-30 International Business Machines Corporation Client-side aggregation of context-sensitive request results where results for aggregation are asynchronously produced by multiple servers
US20080127234A1 (en) * 2006-09-19 2008-05-29 International Business Machines Corporation Methods, systems, and computer program products for a remote request dispatcher extension framework for container based programming models
US8212805B1 (en) 2007-01-05 2012-07-03 Kenneth Banschick System and method for parametric display of modular aesthetic designs
US9432243B2 (en) * 2007-08-22 2016-08-30 International Business Machines Corporation Re-using asynchronous server-side results generated for a request context of one client to satisfy a request context of a different client
CN101730115B (en) 2008-10-24 2013-01-30 华为技术有限公司 Relay transmission method and device
US8862696B2 (en) * 2009-09-08 2014-10-14 Sony Corporation Interconnecting applications on personal computers and mobile terminals through a web server
US20110219113A1 (en) * 2010-03-02 2011-09-08 Grewal Avininder Pal Singh Method and system for client assisted stateful handling of packets in a communications network
WO2012054930A2 (en) * 2010-10-22 2012-04-26 Datavail Corporation Centralized private network and database monitoring
US8838535B2 (en) * 2012-10-05 2014-09-16 Oracle International Corporation Providing services across systems that manage distributed replicas
US20140149392A1 (en) * 2012-11-28 2014-05-29 Microsoft Corporation Unified search result service and cache update
EP3069531B1 (en) * 2013-11-13 2019-09-25 Huawei Technologies Co., Ltd. Controlling data transmissions for machine type communications in a mobile communication system
US9509827B2 (en) * 2014-03-12 2016-11-29 Intel IP Corporation Apparatus, system and method of managing at a mobile device execution of an application by a computing device
US9842148B2 (en) 2015-05-05 2017-12-12 Oracle International Corporation Method for failure-resilient data placement in a distributed query processing system
US10474653B2 (en) 2016-09-30 2019-11-12 Oracle International Corporation Flexible in-memory column store placement

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5713018A (en) * 1995-09-27 1998-01-27 Sun Microsystems, Inc. System and method for providing safe SQL-level access to a database
US5963965A (en) * 1997-02-18 1999-10-05 Semio Corporation Text processing and retrieval system and method
US6023762A (en) * 1997-07-09 2000-02-08 Northern Telecom Limited Multi-view personalized communications agent
US6088796A (en) * 1998-08-06 2000-07-11 Cianfrocca; Francis Secure middleware and server control system for querying through a network firewall
US6141755A (en) * 1998-04-13 2000-10-31 The United States Of America As Represented By The Director Of The National Security Agency Firewall security apparatus for high-speed circuit switched networks
US6178505B1 (en) * 1997-03-10 2001-01-23 Internet Dynamics, Inc. Secure delivery of information in a network
US6253326B1 (en) * 1998-05-29 2001-06-26 Palm, Inc. Method and system for secure communications
US20020031230A1 (en) * 2000-08-15 2002-03-14 Sweet William B. Method and apparatus for a web-based application service model for security management
US6574742B1 (en) * 1999-11-12 2003-06-03 Insite One, Llc Method for storing and accessing digital medical images
US6591306B1 (en) * 1999-04-01 2003-07-08 Nec Corporation IP network access for portable devices
US6636898B1 (en) * 1999-01-29 2003-10-21 International Business Machines Corporation System and method for central management of connections in a virtual private network
US6636873B1 (en) * 2000-04-17 2003-10-21 Oracle International Corporation Methods and systems for synchronization of mobile devices with a remote database
US6920487B2 (en) * 1999-12-22 2005-07-19 Starhome Gmbh System and methods for global access to services for mobile telephone subscribers

Family Cites Families (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2001A (en) * 1841-03-12 Sawmill
US2002A (en) * 1841-03-12 Tor and planter for plowing
JPS6146991A (en) 1984-08-11 1986-03-07 株式会社デンソー Bar graph display unit
US5528516A (en) 1994-05-25 1996-06-18 System Management Arts, Inc. Apparatus and method for event correlation and problem reporting
US6005561A (en) 1994-12-14 1999-12-21 The 3Do Company Interactive information delivery system
US6473609B1 (en) 1995-12-11 2002-10-29 Openwave Systems Inc. Method and architecture for interactive two-way communication devices to interact with a network
FR2744818B1 (en) * 1996-02-12 1998-03-27 Bull Sa PROCESS FOR VERIFYING THE CONSERVATION OF THE INTEGRITY OF A QUERY ISSUED WITHOUT PROTECTION BY A CUSTOMER TO A SERVER BY MEANS OF INTEGRITY OF THE RESPONSE
US6182083B1 (en) * 1997-11-17 2001-01-30 Sun Microsystems, Inc. Method and system for multi-entry and multi-template matching in a database
US5918013A (en) 1996-06-03 1999-06-29 Webtv Networks, Inc. Method of transcoding documents in a network environment using a proxy server
US5696701A (en) * 1996-07-12 1997-12-09 Electronic Data Systems Corporation Method and system for monitoring the performance of computers in computer networks using modular extensions
US5881232A (en) 1996-07-23 1999-03-09 International Business Machines Corporation Generic SQL query agent
US6098092A (en) 1996-11-08 2000-08-01 Silicon Graphics, Inc. Server to dynamically generate graphics for the world wide web
US5812131A (en) 1997-03-07 1998-09-22 International Business Machines Corp. Mobile client computer programmed to process table displays
US6542497B1 (en) * 1997-03-11 2003-04-01 Verizon Services Corp. Public wireless/cordless internet gateway
US6170017B1 (en) * 1997-05-08 2001-01-02 International Business Machines Corporation Method and system coordinating actions among a group of servers
FI104928B (en) 1997-11-27 2000-04-28 Nokia Mobile Phones Ltd Wireless Communication and a Method of Making a Wireless Communication Device
US6065120A (en) * 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6105006A (en) * 1997-12-22 2000-08-15 Motorola Inc Transaction authentication for 1-way wireless financial messaging units
US6389437B2 (en) 1998-01-07 2002-05-14 Ion Systems, Inc. System for converting scrolling display to non-scrolling columnar display
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US6263437B1 (en) * 1998-02-19 2001-07-17 Openware Systems Inc Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks
US6122666A (en) 1998-02-23 2000-09-19 International Business Machines Corporation Method for collaborative transformation and caching of web objects in a proxy network
US6128655A (en) 1998-07-10 2000-10-03 International Business Machines Corporation Distribution mechanism for filtering, formatting and reuse of web based content
US6269402B1 (en) * 1998-07-20 2001-07-31 Motorola, Inc. Method for providing seamless communication across bearers in a wireless communication system
US6205440B1 (en) * 1998-11-06 2001-03-20 International Business Machines Corporation Method of providing information from query results stored as source code files
US6480891B1 (en) * 1999-01-04 2002-11-12 3Com Corporation Embedded code memory size reduction in asynchronous mode transfer devices
US6184829B1 (en) 1999-01-08 2001-02-06 Trueposition, Inc. Calibration for wireless location system
US6456603B1 (en) * 1999-01-21 2002-09-24 Telefonaktiebolaget L M Ericsson (Publ) Method of supporting communications mobility in a telecommunications system
KR100316288B1 (en) * 1999-08-28 2001-12-20 서평원 Wireless Internet Service Method In Gateway System
US6714944B1 (en) * 1999-11-30 2004-03-30 Verivita Llc System and method for authenticating and registering personal background data
US6405123B1 (en) 1999-12-21 2002-06-11 Televigation, Inc. Method and system for an efficient operating environment in a real-time navigation system
US6516203B1 (en) 1999-12-22 2003-02-04 Bellsouth Intellectual Property Corporation Method and system for providing additional information to a subscriber based on a universal resource locator
US20020046091A1 (en) 2000-01-11 2002-04-18 Robert Mooers Interactive incentive marketing system
US6587835B1 (en) * 2000-02-09 2003-07-01 G. Victor Treyz Shopping assistance with handheld computing device
US6640098B1 (en) * 2000-02-14 2003-10-28 Action Engine Corporation System for obtaining service-related information for local interactive wireless devices
KR100328853B1 (en) * 2000-04-27 2002-03-20 이상철 System and method for supervising repeater by using wireless mobile
US6642945B1 (en) 2000-05-04 2003-11-04 Microsoft Corporation Method and system for optimizing a visual display for handheld computer systems
US6792466B1 (en) * 2000-05-09 2004-09-14 Sun Microsystems, Inc. Trusted construction of message endpoints in a distributed computing environment
US7287072B1 (en) * 2000-10-17 2007-10-23 Sprint Communications Company L.P. Remote monitoring information management
US7035828B2 (en) * 2000-10-25 2006-04-25 Topmoxie, Inc. Method and system for modifying and transmitting data between a portable computer and a network
US7577732B2 (en) * 2003-03-28 2009-08-18 Fujitsu Limited Information distribution service providing system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5615268A (en) * 1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5713018A (en) * 1995-09-27 1998-01-27 Sun Microsystems, Inc. System and method for providing safe SQL-level access to a database
US5963965A (en) * 1997-02-18 1999-10-05 Semio Corporation Text processing and retrieval system and method
US6178505B1 (en) * 1997-03-10 2001-01-23 Internet Dynamics, Inc. Secure delivery of information in a network
US6023762A (en) * 1997-07-09 2000-02-08 Northern Telecom Limited Multi-view personalized communications agent
US6141755A (en) * 1998-04-13 2000-10-31 The United States Of America As Represented By The Director Of The National Security Agency Firewall security apparatus for high-speed circuit switched networks
US6253326B1 (en) * 1998-05-29 2001-06-26 Palm, Inc. Method and system for secure communications
US6088796A (en) * 1998-08-06 2000-07-11 Cianfrocca; Francis Secure middleware and server control system for querying through a network firewall
US6636898B1 (en) * 1999-01-29 2003-10-21 International Business Machines Corporation System and method for central management of connections in a virtual private network
US6591306B1 (en) * 1999-04-01 2003-07-08 Nec Corporation IP network access for portable devices
US6574742B1 (en) * 1999-11-12 2003-06-03 Insite One, Llc Method for storing and accessing digital medical images
US6920487B2 (en) * 1999-12-22 2005-07-19 Starhome Gmbh System and methods for global access to services for mobile telephone subscribers
US6636873B1 (en) * 2000-04-17 2003-10-21 Oracle International Corporation Methods and systems for synchronization of mobile devices with a remote database
US20020031230A1 (en) * 2000-08-15 2002-03-14 Sweet William B. Method and apparatus for a web-based application service model for security management

Cited By (156)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7406315B2 (en) * 2001-03-20 2008-07-29 Arraycomm Llc Method and apparatus for resource management in a wireless data communication system
US20020147019A1 (en) * 2001-03-20 2002-10-10 Uhlik Christopher Richard Method and apparatus for resource management in a wireless data communication system
US7702801B1 (en) * 2001-04-19 2010-04-20 Advanced Micro Devices, Inc. Determining logon status in a broadband network system and automatically restoring logon connectivity
US20030028649A1 (en) * 2001-07-31 2003-02-06 Christopher Uhlik Method and apparatus for generating an identifier to facilitate deliver of enhanced data services in a mobile computing environment
US7363376B2 (en) * 2001-07-31 2008-04-22 Arraycomm Llc Method and apparatus for generating an identifier to facilitate delivery of enhanced data services in a mobile computing environment
US8601566B2 (en) 2001-10-23 2013-12-03 Intel Corporation Mechanism supporting wired and wireless methods for client and server side authentication
US20030081783A1 (en) * 2001-10-23 2003-05-01 Adusumilli Koteshwerrao S. Selecting a security format conversion for wired and wireless devices
US20030097592A1 (en) * 2001-10-23 2003-05-22 Koteshwerrao Adusumilli Mechanism supporting wired and wireless methods for client and server side authentication
US8522337B2 (en) 2001-10-23 2013-08-27 Intel Corporation Selecting a security format conversion for wired and wireless devices
US8020201B2 (en) 2001-10-23 2011-09-13 Intel Corporation Selecting a security format conversion for wired and wireless devices
WO2003058483A1 (en) * 2002-01-08 2003-07-17 Seven Networks, Inc. Connection architecture for a mobile network
US20070027832A1 (en) * 2002-01-08 2007-02-01 Seven Networks, Inc. Connection architecture for a mobile network
US7139565B2 (en) 2002-01-08 2006-11-21 Seven Networks, Inc. Connection architecture for a mobile network
US8989728B2 (en) 2002-01-08 2015-03-24 Seven Networks, Inc. Connection architecture for a mobile network
US8549587B2 (en) 2002-01-08 2013-10-01 Seven Networks, Inc. Secure end-to-end transport through intermediary nodes
US7827597B2 (en) 2002-01-08 2010-11-02 Seven Networks, Inc. Secure transport for mobile communication network
US20080037787A1 (en) * 2002-01-08 2008-02-14 Seven Networks, Inc. Secure transport for mobile communication network
US8127342B2 (en) 2002-01-08 2012-02-28 Seven Networks, Inc. Secure end-to-end transport through intermediary nodes
US8811952B2 (en) 2002-01-08 2014-08-19 Seven Networks, Inc. Mobile device power management in data synchronization over a mobile network with or without a trigger notification
US9781114B2 (en) 2002-04-25 2017-10-03 Citrix Systems, Inc. Computer security system
US7644434B2 (en) 2002-04-25 2010-01-05 Applied Identity, Inc. Computer security system
US20040006710A1 (en) * 2002-04-25 2004-01-08 Pollutro Dennis Vance Computer security system
US8910241B2 (en) 2002-04-25 2014-12-09 Citrix Systems, Inc. Computer security system
US7215638B1 (en) * 2002-06-19 2007-05-08 Meshnetworks, Inc. System and method to provide 911 access in voice over internet protocol systems without compromising network security
US20040073660A1 (en) * 2002-10-15 2004-04-15 Toomey Christopher Newell Cross-site timed out authentication management
US7237024B2 (en) 2002-10-15 2007-06-26 Aol Llc Cross-site timed out authentication management
WO2004036351A2 (en) * 2002-10-15 2004-04-29 America Online, Incorporated Cross-site timed out authentication management
WO2004036351A3 (en) * 2002-10-15 2004-05-27 America Online Inc Cross-site timed out authentication management
US7346930B1 (en) 2002-10-31 2008-03-18 Sprint Communications Company L.P. Security framework bridge
US9251193B2 (en) 2003-01-08 2016-02-02 Seven Networks, Llc Extending user relationships
US7263717B1 (en) * 2003-12-17 2007-08-28 Sprint Communications Company L.P. Integrated security framework and privacy database scheme
US20070283141A1 (en) * 2003-12-31 2007-12-06 Pollutro Dennis V Method and System for Establishing the Identity of an Originator of Computer Transactions
US8234699B2 (en) 2003-12-31 2012-07-31 Citrix Systems, Inc. Method and system for establishing the identity of an originator of computer transactions
US8010082B2 (en) 2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture
USRE45348E1 (en) 2004-10-20 2015-01-20 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US7680281B2 (en) 2004-10-20 2010-03-16 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US8831561B2 (en) 2004-10-20 2014-09-09 Seven Networks, Inc System and method for tracking billing events in a mobile wireless network for a network operator
US8805334B2 (en) 2004-11-22 2014-08-12 Seven Networks, Inc. Maintaining mobile terminal information for secure communications
US8116214B2 (en) 2004-12-03 2012-02-14 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal
US8873411B2 (en) 2004-12-03 2014-10-28 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal
US20160197922A1 (en) * 2005-02-11 2016-07-07 Nokia Corporation Method and apparatus for providing bootstrapping procedures in a communication network
US20060182280A1 (en) * 2005-02-11 2006-08-17 Pekka Laitinen Method and apparatus for providing bootstrapping procedures in a communication network
US9300641B2 (en) * 2005-02-11 2016-03-29 Nokia Corporation Method and apparatus for providing bootstrapping procedures in a communication network
US9906528B2 (en) * 2005-02-11 2018-02-27 Nokia Corporation Method and apparatus for providing bootstrapping procedures in a communication network
US8209709B2 (en) 2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine
US9047142B2 (en) 2005-03-14 2015-06-02 Seven Networks, Inc. Intelligent rendering of information in a limited display environment
US8561086B2 (en) 2005-03-14 2013-10-15 Seven Networks, Inc. System and method for executing commands that are non-native to the native environment of a mobile device
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8064583B1 (en) 2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication
US8761756B2 (en) 2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network
US8468126B2 (en) 2005-08-01 2013-06-18 Seven Networks, Inc. Publishing data in an information community
US8412675B2 (en) 2005-08-01 2013-04-02 Seven Networks, Inc. Context aware data presentation
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US7917468B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data
US7917505B2 (en) 2005-08-01 2011-03-29 Seven Networks, Inc. Methods for publishing content
US7853563B2 (en) 2005-08-01 2010-12-14 Seven Networks, Inc. Universal data aggregation
US9055102B2 (en) 2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging
US8774844B2 (en) 2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging
US8805425B2 (en) 2007-06-01 2014-08-12 Seven Networks, Inc. Integrated messaging
US8693494B2 (en) 2007-06-01 2014-04-08 Seven Networks, Inc. Polling
US8286082B2 (en) 2007-09-12 2012-10-09 Citrix Systems, Inc. Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine
US8484290B2 (en) 2007-09-12 2013-07-09 Citrix Systems, Inc. Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine
US20110197141A1 (en) * 2007-09-12 2011-08-11 Richard James Mazzaferri Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine
US9032026B2 (en) 2007-09-12 2015-05-12 Citrix Systems, Inc. Methods and systems for providing, by a remote machine, access to a desk band associated with a resource executing on a local machine
US9239666B2 (en) 2007-09-12 2016-01-19 Citrix Systems, Inc. Methods and systems for maintaining desktop environments providing integrated access to remote and local resources
US8341208B2 (en) 2007-09-12 2012-12-25 Citrix Systems, Inc. Methods and systems for providing, by a remote machine, access to functionality associated with a resource executing on a local machine
US8296352B2 (en) 2007-09-12 2012-10-23 Citrix Systems, Inc. Methods and systems for providing, by a remote machine, access to graphical data associated with a resource provided by a local machine
US8516539B2 (en) 2007-11-09 2013-08-20 Citrix Systems, Inc System and method for inferring access policies from access event records
US8990910B2 (en) 2007-11-13 2015-03-24 Citrix Systems, Inc. System and method using globally unique identities
US8738050B2 (en) 2007-12-10 2014-05-27 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US9002828B2 (en) 2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery
US8793305B2 (en) 2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service
US8914002B2 (en) 2008-01-11 2014-12-16 Seven Networks, Inc. System and method for providing a network service in a distributed fashion to a mobile device
US9712986B2 (en) 2008-01-11 2017-07-18 Seven Networks, Llc Mobile device configured for communicating with another mobile device associated with an associated user
US8909192B2 (en) 2008-01-11 2014-12-09 Seven Networks, Inc. Mobile virtual network operator
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8862657B2 (en) 2008-01-25 2014-10-14 Seven Networks, Inc. Policy based content service
US8849902B2 (en) 2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network
US8799410B2 (en) 2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server
US8838744B2 (en) 2008-01-28 2014-09-16 Seven Networks, Inc. Web-based access to data objects
US9240945B2 (en) 2008-03-19 2016-01-19 Citrix Systems, Inc. Access, priority and bandwidth management based on application identity
US8943575B2 (en) 2008-04-30 2015-01-27 Citrix Systems, Inc. Method and system for policy simulation
US20090276204A1 (en) * 2008-04-30 2009-11-05 Applied Identity Method and system for policy simulation
US8787947B2 (en) 2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices
US8494510B2 (en) 2008-06-26 2013-07-23 Seven Networks, Inc. Provisioning applications for a mobile device
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8909759B2 (en) 2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement
US8990573B2 (en) 2008-11-10 2015-03-24 Citrix Systems, Inc. System and method for using variable security tag location in network communications
US10089456B2 (en) 2009-02-02 2018-10-02 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US20100199092A1 (en) * 2009-02-02 2010-08-05 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US11734407B2 (en) 2009-02-02 2023-08-22 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US10678904B2 (en) 2009-02-02 2020-06-09 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US11372962B2 (en) 2009-02-02 2022-06-28 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US8837716B2 (en) * 2009-02-02 2014-09-16 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US9043731B2 (en) 2010-03-30 2015-05-26 Seven Networks, Inc. 3D mobile user interface with configurable workspace management
US9043433B2 (en) 2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8886176B2 (en) 2010-07-26 2014-11-11 Seven Networks, Inc. Mobile application traffic optimization
US9407713B2 (en) 2010-07-26 2016-08-02 Seven Networks, Llc Mobile application traffic optimization
US9077630B2 (en) 2010-07-26 2015-07-07 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy
US9049179B2 (en) 2010-07-26 2015-06-02 Seven Networks, Inc. Mobile network traffic coordination across multiple applications
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8782222B2 (en) 2010-11-01 2014-07-15 Seven Networks Timing of keep-alive messages used in a system for mobile network resource conservation and optimization
US8966066B2 (en) 2010-11-01 2015-02-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US9330196B2 (en) 2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US9060032B2 (en) 2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic
US8484314B2 (en) 2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request
US9275163B2 (en) 2010-11-01 2016-03-01 Seven Networks, Llc Request and response characteristics based adaptation of distributed caching in a mobile network
US8204953B2 (en) 2010-11-01 2012-06-19 Seven Networks, Inc. Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8700728B2 (en) 2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8291076B2 (en) 2010-11-01 2012-10-16 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8903954B2 (en) 2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests
US8539040B2 (en) 2010-11-22 2013-09-17 Seven Networks, Inc. Mobile network background traffic data management with optimized polling intervals
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US9100873B2 (en) 2010-11-22 2015-08-04 Seven Networks, Inc. Mobile network background traffic data management
US9325662B2 (en) 2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries
US8356080B2 (en) 2011-04-19 2013-01-15 Seven Networks, Inc. System and method for a mobile device to use physical storage of another device for caching
US8316098B2 (en) 2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management
US9300719B2 (en) 2011-04-19 2016-03-29 Seven Networks, Inc. System and method for a mobile device to use physical storage of another device for caching
US9084105B2 (en) 2011-04-19 2015-07-14 Seven Networks, Inc. Device resources sharing for network resource conservation
US8621075B2 (en) 2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system
US8832228B2 (en) 2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief
US8635339B2 (en) 2011-04-27 2014-01-21 Seven Networks, Inc. Cache state management on a mobile device to preserve user experience
US8984581B2 (en) 2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device
US9239800B2 (en) 2011-07-27 2016-01-19 Seven Networks, Llc Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network
US10367793B2 (en) * 2011-09-13 2019-07-30 Sagemcom Broadband Sas Secure data exchange method between a communication device and a service provider based on asymmetric public key handling and encryption using hardware key, and communication device and system implementing the same
US8977755B2 (en) 2011-12-06 2015-03-10 Seven Networks, Inc. Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation
US8918503B2 (en) 2011-12-06 2014-12-23 Seven Networks, Inc. Optimization of mobile traffic directed to private networks and operator configurability thereof
US8868753B2 (en) 2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation
US9208123B2 (en) 2011-12-07 2015-12-08 Seven Networks, Llc Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor
US9009250B2 (en) 2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation
US9277443B2 (en) 2011-12-07 2016-03-01 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9173128B2 (en) 2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol
US9021021B2 (en) 2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system
US8861354B2 (en) 2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US9131397B2 (en) 2012-01-05 2015-09-08 Seven Networks, Inc. Managing cache to prevent overloading of a wireless network due to user activity
US8909202B2 (en) 2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US9203864B2 (en) 2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network
US9326189B2 (en) 2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network
US8812695B2 (en) 2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network
CN103491534A (en) * 2012-06-13 2014-01-01 株式会社理光 Transmitting equipment, receiving equipment, communication system and control method thereof
US8775631B2 (en) 2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications
US9161258B2 (en) 2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
US9307493B2 (en) 2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion
US9241314B2 (en) 2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy
US9271238B2 (en) 2013-01-23 2016-02-23 Seven Networks, Llc Application or context aware fast dormancy
US8874761B2 (en) 2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols
US8750123B1 (en) 2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network
US9065765B2 (en) 2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network

Also Published As

Publication number Publication date
WO2002039646A2 (en) 2002-05-16
WO2002039637A1 (en) 2002-05-16
US7496554B2 (en) 2009-02-24
AU2002228831A1 (en) 2002-05-21
US20090150410A1 (en) 2009-06-11
WO2002039646A3 (en) 2002-08-29
AU2002228830A1 (en) 2002-05-21
US8065284B2 (en) 2011-11-22
USRE41902E1 (en) 2010-10-26
US20020083044A1 (en) 2002-06-27

Similar Documents

Publication Publication Date Title
US20020146129A1 (en) Method and system for secure wireless database management
US7865936B2 (en) System and method for controlling access to multiple public networks and for controlling access to multiple private networks
Chen et al. A robust mutual authentication protocol for wireless sensor networks
US7702901B2 (en) Secure communications between internet and remote client
US7661128B2 (en) Secure login credentials for substantially anonymous users
US7366900B2 (en) Platform-neutral system and method for providing secure remote operations over an insecure computer network
CN101981890B (en) Systems and methods for secure workgroup management and communication
CN101488950B (en) Symmetric key distribution framework for the internet
US8515078B2 (en) Mass subscriber management
EP1595190B1 (en) Service provider anonymization in a single sign-on system
US10635824B1 (en) Methods and apparatus for private set membership using aggregation for reduced communications
US7571311B2 (en) Scheme for sub-realms within an authentication protocol
JP2020080530A (en) Data processing method, device, terminal, and access point computer
JPH07212356A (en) Certifying method and system of communication partner
US20090034725A1 (en) Method of and system for encryption and authentication
CN107733933B (en) Method and system for double-factor identity authentication based on biological recognition technology
US8185752B2 (en) Method and system for providing data field encryption and storage
US8401183B2 (en) Method and system for keying and securely storing data
Zhao et al. Two-servers PIR based DNS query scheme with privacy-preserving
KR20130039745A (en) System and method for authentication interworking
CN111698203A (en) Cloud data encryption method
US6975729B1 (en) Method and apparatus for facilitating use of a pre-shared secret key with identity hiding
CN110620750A (en) Network security verification method of distributed system
Tang et al. Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
Lu et al. A novel smart card based user authentication and key agreement scheme for heterogeneous wireless sensor networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: EXPAND BEYOND CORPORATION, ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KAPLAN, ARI D.;REEL/FRAME:012509/0645

Effective date: 20011031

AS Assignment

Owner name: STAVROS INVESTMENTS LLC,NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXPAND BEYOND CORPORATION;REEL/FRAME:017833/0138

Effective date: 20060125

Owner name: STAVROS INVESTMENTS LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXPAND BEYOND CORPORATION;REEL/FRAME:017833/0138

Effective date: 20060125

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 191 LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:XYLON LLC;REEL/FRAME:062708/0435

Effective date: 20221222

AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 186 LLC, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:MIND FUSION, LLC;REEL/FRAME:063295/0001

Effective date: 20230214

Owner name: INTELLECTUAL VENTURES ASSETS 191 LLC, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:MIND FUSION, LLC;REEL/FRAME:063295/0001

Effective date: 20230214