US20040243842A1 - System server computer and method for monitoring the input rights of a user - Google Patents

System server computer and method for monitoring the input rights of a user Download PDF

Info

Publication number
US20040243842A1
US20040243842A1 US10/489,076 US48907604A US2004243842A1 US 20040243842 A1 US20040243842 A1 US 20040243842A1 US 48907604 A US48907604 A US 48907604A US 2004243842 A1 US2004243842 A1 US 2004243842A1
Authority
US
United States
Prior art keywords
document
control unit
address
field
assigning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/489,076
Inventor
Michael Schlereth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Priority to US10/489,076 priority Critical patent/US20040243842A1/en
Priority claimed from PCT/DE2002/003105 external-priority patent/WO2003025714A2/en
Assigned to SIEMENS AKTIENGESELLSCHAFT reassignment SIEMENS AKTIENGESELLSCHAFT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SCHLERETH, MICHAEL
Publication of US20040243842A1 publication Critical patent/US20040243842A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0423Input/output
    • G05B19/0425Safety, monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24167Encryption, password, user access privileges
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • G05B2219/32Operator till task planning
    • G05B2219/32126Hyperlink, access to program modules and to hardware modules in www, web server, browser
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • the invention relates to a method for transmission of a process value from a control unit to a client computer as well as to a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product.
  • FIG. 1 shows a block diagram of this already known system.
  • the system comprises a personal computer 8 with a browser program 10 .
  • the browser 10 can be a commercially available Internet browser such as, for example, Netscape Communication Navigator or Microsoft Internet Explorer.
  • the browser program 10 is used for accessing what is known as a website 4 via the Internet 14 in order to display the contents of the website 4 on the monitor 12 of the personal computer 8 for a user 2 .
  • the website 4 includes a network interface 16 with a unique Internet address 18 as well as a server computer 20 and an application program 22 .
  • the server computer 20 serves to interpret HTTP protocols and uses TCP/IP by means of TCP/IP stack 24 in order to interact with the network interface 16 and the application program 22 . This enables the data to be transferred between the application program 22 and the user 2 via the Internet 14 .
  • the application program supplies data from a control system 6 .
  • This data can be used by the user 2 for monitoring the controller, since said data can be transferred by means of the TCP/IP stack 24 from the website 4 via the Internet 14 to the personal computer 8 of the user 2 .
  • a human-machine interface is created on the personal computer 8 .
  • the user 2 can set up a connection to the Internet 14 by way of what is termed an Internet Service Provider (ISP) and then enter the address of the website 4 into the browser program 10 .
  • ISP Internet Service Provider
  • the user 2 can then, for example, read a homepage of the website 4 and download information from said website 4 .
  • the browser 10 sends commands to the website 4 , which commands are used by the application program 22 in order to display information which is provided by the control system 6 .
  • a disadvantage with this already known system is in particular that the application program 22 has to be programmed specifically for a particular control system 6 and permits no flexibility of any kind.
  • the document XP 002163955, “c-Internet connector box miniwebserver”, Operating Instructions Rev 2.0 Internet Connector Box, Xx, Xx (Oct. 7, 1999), 1-121 discloses a device (ICB) with an embedded Internet server with which dynamic Internet pages can be generated from an HTML template. Up to three devices which support a special protocol can be connected to the ICB device. In order to communicate with such devices, the ICB device uses an information element which the devices sent to the device in their initialization phase.
  • XP010365709 Emerging Technologies And Factory Automation, 1999, Proceedings, Etfa '99, 1999 7 th IEEE International Conference On [sic] Barcelona, Spain 18-21 Oct. 1999, Piscataway, Ni, Usa, ieee, Us (18-Oct.-1999), 823-830 discloses a method for accessing fieldbus devices using a client computer via the Internet.
  • a database or an XML document is used to provide a description of the fieldbus devices.
  • the content of the HTML pages is then generated using the information from the database or the XML document.
  • the object of the invention is therefore to create an improved method for transmission of a process value from a control unit to a client computer as well as a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product.
  • the invention permits the links between the fields of an HTML page and the process values on the server to be parameterized and transferred together with the HTML page from the server computer to the client computer.
  • Elements on the HTML page can be identified in this case by means of an ID attribute, whereby the element type can be arbitrary.
  • a particular advantage is that the graphical layout of the HTML page can initially be independent of the actual engineering data, i.e. for example the actual addresses of the control system.
  • the individual fields of the HTML page are then linked subsequently via a further document in a markup language, XML for example.
  • this flexible access by the user to the system controller can also take place via what is termed a firewall.
  • the user can therefore log in from any location initially for example into a corporate intranet via a corresponding firewall in order subsequently to enter into contact with the system server.
  • What is particularly advantageous here is that the user can also make inputs in addition to being able to visualize process values.
  • FIG. 1 is a block diagram of a control system known from the prior art
  • FIG. 2 is a block diagram of a first embodiment of the control system according to the invention.
  • FIG. 3 is a block diagram of a second embodiment of the control system according to the invention.
  • FIG. 4 is a flowchart of an embodiment of the method for transmission of a process value from a control unit to a client computer
  • FIG. 5 shows an embodiment of the method for transmission of an input value from a client computer to a control unit
  • FIG. 6 is a block diagram of a third embodiment of the control system according to the invention.
  • FIG. 2 shows a block diagram of a control system for controlling a system 25 .
  • the system 25 is connected to one or more control units known as stored program controls (SPCs)—designated as SPS X and SPS Y in the example shown.
  • SPCs stored program controls
  • the two control units SPS X and SPS Y each have different addresses, for accessing data for example.
  • the control unit SPS X has the addresses a and c for storing process values; the control unit SPS Y has the address b.
  • the control units SPS X and SPS Y are connected to a system server computer 27 via a fieldbus 26 .
  • the system server computer 27 can execute read/write accesses to the storage addresses a, c of the SPS X and to the address b of the SPS Y via the fieldbus 26 .
  • the system server computer 27 contains a document 28 in a markup language.
  • the markup language used for the document 28 is the hypertext markup language (HTML).
  • the document 28 contains the fields A, B and C for displaying and/or graphically visualizing process values and/or for entering values.
  • a script 29 is coded in the document 28 . This can be a JAVA script for example. As an alternative to the script 29 , a so-called applet can be provided.
  • the pointer 30 can consist, for example, of the Uniform Resource Locator (URL) of the document 31 .
  • URL Uniform Resource Locator
  • the document 31 is likewise available in a markup language, this being an Extended Markup Language (XML) in the example shown in FIG. 2.
  • XML Extended Markup Language
  • a table 32 is coded in the document 31 .
  • Table 32 contains an assignment of the fields A, B and C of the document 28 to specific storage addresses of the control units SPS X and SPS Y.
  • field A is assigned to SPS X, and more specifically to address a of SPS X
  • field B is assigned to address b of SPS Y
  • field C to address c of SPS X.
  • Table 32 can contain further assignments of this kind for further fields of the document 28 to further addresses of the SPS X and Y, as well as of further control units where necessary.
  • a client computer 33 can set up a connection to the system server computer 27 via a network 35 .
  • the client computer 33 can be a regular personal computer, an operator console, a portable computer, a mobile phone with WAP browser or also a so-called WAP pad.
  • the network 35 can be a corporate network or system-internal network, an intranet, extranet or the Internet itself. In the last-mentioned case the communication can also be set up via a so-called firewall between the client computer 33 and the system server computer 27 .
  • a commercially available browser program for example Netscape Communication Navigator or Microsoft Internet Explorer, can be used as the browser.
  • a user of the client computer 33 navigates by means of the browser 34 via the network 35 to the HTML document 28 .
  • the user does this for example by selecting a corresponding hypertext link or entering the URL of the document 28 into the browser 34 .
  • the document 28 is then transferred via the network 35 to the client computer 33 .
  • the script 29 of the document 28 is also launched automatically on the client computer 33 and executed.
  • the script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used.
  • the script 29 reads the pointer 30 of the document 28 and access the document 31 on the system server computer 27 by means of the corresponding URL.
  • the document 31 is then transferred via the network 35 to the client computer 33 .
  • the script 29 then reads the assignments of the fields A, B and C of the document 28 to the addresses of the control units SPS X and SPS Y from table 32 , for example for field A the address specification indicating that a corresponding process value is stored on SPS X under the address a.
  • the script 29 then sends a command to the system server computer 27 , which command contains the control units and addresses assigned to the fields A, B and C.
  • the system server computer 27 then accesses the control units SPS X and/or SPS Y via the fieldbus 26 in order to read the contents of the corresponding storage locations with the addresses a, b and c.
  • FIG. 3 shows an alternative embodiment of the embodiment according to FIG. 2, in which alternative embodiment corresponding elements are designated by the same reference characters.
  • the system server computer 27 contains the files 36 and 37 .
  • File 36 contains a table which assigns to the document 28 a pointer to the document 31 belonging to the document 28 . This corresponds to the pointer 30 of the embodiment shown in FIG. 2, whereby the file 36 does not belong to the document 28 of the embodiment shown in FIG. 3, but is stored separately on the system server computer 27 . If further documents 28 are present on the system server computer 27 , the file 36 accordingly contains pointers for the assignment of these further documents 28 to corresponding further documents 31 .
  • the document 31 contains a coded table 38 which corresponds to the table 32 of the embodiment shown in FIG. 2.
  • table 38 of the embodiment shown in FIG. 3 contains no actual addresses, but only the designation of parameter value designations assigned to the fields A, B, C of the document 28 .
  • Field A for example, is assigned to a parameter value with the designation “boiler”, the boiler temperature for example;
  • field B is assigned to a parameter value with the designation “engine”, an engine speed for example, and
  • field C is assigned to a parameter value with the designation “pump”, a valve setting of the pump for example.
  • File 37 which is stored separately from the document 28 on the system server computer 27 , assigns each designation of this kind to an address on a control unit, for example the designation “boiler” to the control unit SPS X and its storage address a, the designation “engine” to the control unit SPS Y and its address b, etc.
  • the document 28 is then loaded in turn by the client computer 33 and the script 29 executed.
  • the script 29 queries the file 36 for the pointer to the document 31 which is assigned to the document 28 and then, by means of this pointer, loads the document 31 .
  • the script queries the file 37 in order to obtain the corresponding addresses or control units.
  • the script 29 again sends a command to the system server computer 27 in order to execute a query to obtain the corresponding parameter values of the specified addresses of the control units SPS X and SPS Y.
  • the script 29 then sends a command to the system server computer 27 .
  • This command contains as arguments the input value and also the address and control unit assigned to the input field. This was determined beforehand by the script 29 on the occasion of the transfer of the process values from the control units to the client computer, as explained above.
  • the system server computer 27 then executes a write access to the corresponding address of the corresponding control unit—in the example under consideration, for field A as the input field this is the SPS X with the address a—in order to store the input value there.
  • table 32 or file 37 contains only a corresponding address specification, since the specification of the control unit is superfluous in that case.
  • FIG. 4 shows a flowchart of an embodiment of the method for transmission of a process value.
  • a document in a markup language for example HTML
  • a script coded in the HTML page is launched and, in step 42 , loads a further document in a markup language, for example XML, assigned to the HTML page from the system server computer.
  • step 43 the script queries the corresponding data for the fields of the HTML document from the system server computer.
  • step 44 the system server computer then queries the corresponding data from the control unit or control units.
  • step 45 this data is then transferred from the system server computer to the client computer, and in step 46 it is displayed in the corresponding fields of the HTML page.
  • FIG. 5 shows an embodiment of the method according to the invention for transmission of an input value from a client computer to a control unit.
  • the input value is entered in one of the fields of the HTML document, for example field A (compare FIGS. 2 and 3).
  • this input value is assigned to a specific address, i.e. a particular control unit if a plurality of control units are present, and to a storage address on the control unit in question. This assignment of the input value to an address is made via the corresponding assignment of the input field to the address which is provided by means of a further document in a markup language (compare document 31 of FIGS. 2 and 3).
  • step 52 the input value is transferred together with the address to the server and from there stored at the corresponding address.
  • FIG. 6 shows a further preferred embodiment of a control system for controlling a system 25 . Elements of the control systems of FIG. 6 which correspond to elements of the control system from FIG. 2 are designated by the same reference characters.
  • table 32 is not part of the document 31 , but is stored separately in the system server computer 27 . Instead of that, the document 31 contains a table 36 for assigning current display values to the fields A, B, C, . . .
  • the system server computer 27 also includes a program 37 .
  • the program 37 generates the document 31 with the table 36 automatically by means of corresponding accesses to the SPS X, SPS Y, . . . using the table 32 .
  • a separate table 32 exists for each page 28 .
  • a user of the client computer 33 navigates by means of the browser 34 via the network 35 to the HTML document 28 ; for example the user selects a corresponding hypertext link or enters the URL of the document 28 into the browser 34 .
  • the document 28 is then transferred via the network 35 to the client computer 33 .
  • the script 29 of the document 28 is also launched automatically on the client computer 33 and executed.
  • the script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used.
  • the script 29 reads the pointer 30 of the document 28 and accesses the document 31 on the system server computer 27 by means of the corresponding URL.
  • the program 37 determines the addresses of the required values in the SPSs from table 32 and fetches the values via the fieldbus 26 .
  • the program 37 then generates the document 31 , in which the table 36 is coded with field/value assignment.
  • the document 31 is then transferred via the network 35 to the client computer 33 .
  • the script 29 then reads out the assignments of the fields A, B and C to the values in table 36 and modifies the displayed elements of the HTML page 28 in the browser 34 .
  • the values can be displayed here for example as numeric values in HTML fields or a value can also be translated for example into a color change of an HTML element.
  • User inputs in the browser 34 can also be transferred from the client 33 to the system 25 in the same way. If a user has modified HTML fields of the HTML page 28 displayed in the browser 34 , the script 29 generates a document 31 on the client 33 , in which document 31 the table 36 is coded with the field/value assignment.
  • This document 31 is transferred from the client 33 to the system server 27 .
  • the program 37 interprets/translates the field names from table 36 into SPS addresses with the aid of table 32 and sends the values from table 37 via the fieldbus 26 to the corresponding SPSs.
  • the document 31 contains a table 36 with the field values.
  • the table 38 (cf. FIG. 3) is stored on the system server 27 , and a corresponding program 37 generates the field values.
  • the invention pertains to a control system with at least one control unit SPS X, SPS Y, . . . , a server computer, a first document in a markup language and a second document in a markup language for loading by a client computer, whereby the first document contains at least a field A, B, C, . . . and the second document contains data for assigning the field to an address of a control unit.

Abstract

Control system with at least one control unit, a server computer, a first document in a markup language and a second document in a markup language for loading through a client computer, whereby the first document contains at least one field and the second document contains data for directing the field to an address in a control unit.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is the US National Stage of International Application No. PCT/DE02/03103, filed Aug. 23, 2002 and claims the benefit thereof. The International Application claims the benefits of German application No. 10144332.3 filed Sep. 10, 2001, both of the applications are incorporated by reference herein in their entirety. [0001]
  • FIELD OF INVENTION
  • The invention relates to a method for transmission of a process value from a control unit to a client computer as well as to a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product. [0002]
  • BACKGROUND OF INVENTION
  • It is known per se from the prior art how to link a control system, for example a stored program control (SPC) or a programmable logic controller (PLC), with a system server which can be accessed by a client computer. The client computer can load HTML pages from the server computer, for example in order to display process values on a user interface. The link between an output field of the HTML page and the process value is permanently programmed, for example by means of a JAVA script or by means of OCX (OLE Control Extension). [0003]
  • A system for remotely accessing a control system via a commercial communications network is known from U.S. Pat. No. 6,061,603. [0004]
  • FIG. 1 shows a block diagram of this already known system. [0005]
  • The system comprises a [0006] personal computer 8 with a browser program 10. The browser 10 can be a commercially available Internet browser such as, for example, Netscape Communication Navigator or Microsoft Internet Explorer. The browser program 10 is used for accessing what is known as a website 4 via the Internet 14 in order to display the contents of the website 4 on the monitor 12 of the personal computer 8 for a user 2.
  • The website [0007] 4 includes a network interface 16 with a unique Internet address 18 as well as a server computer 20 and an application program 22. The server computer 20 serves to interpret HTTP protocols and uses TCP/IP by means of TCP/IP stack 24 in order to interact with the network interface 16 and the application program 22. This enables the data to be transferred between the application program 22 and the user 2 via the Internet 14.
  • The application program supplies data from a [0008] control system 6. This data can be used by the user 2 for monitoring the controller, since said data can be transferred by means of the TCP/IP stack 24 from the website 4 via the Internet 14 to the personal computer 8 of the user 2. By this means a human-machine interface is created on the personal computer 8.
  • The user [0009] 2 can set up a connection to the Internet 14 by way of what is termed an Internet Service Provider (ISP) and then enter the address of the website 4 into the browser program 10. Using the browser 10 the user 2 can then, for example, read a homepage of the website 4 and download information from said website 4. In response to an input by the user 2 the browser 10 sends commands to the website 4, which commands are used by the application program 22 in order to display information which is provided by the control system 6. A disadvantage with this already known system is in particular that the application program 22 has to be programmed specifically for a particular control system 6 and permits no flexibility of any kind.
  • The document XP 002163955, “c-Internet connector box miniwebserver”, Operating Instructions Rev 2.0 Internet Connector Box, Xx, Xx (Oct. 7, 1999), 1-121 discloses a device (ICB) with an embedded Internet server with which dynamic Internet pages can be generated from an HTML template. Up to three devices which support a special protocol can be connected to the ICB device. In order to communicate with such devices, the ICB device uses an information element which the devices sent to the device in their initialization phase. [0010]
  • XP010365709, Emerging Technologies And Factory Automation, 1999, Proceedings, Etfa '99, 1999 7[0011] th IEEE International Conference On [sic] Barcelona, Spain 18-21 Oct. 1999, Piscataway, Ni, Usa, ieee, Us (18-Oct.-1999), 823-830 discloses a method for accessing fieldbus devices using a client computer via the Internet. Here, a database or an XML document is used to provide a description of the fieldbus devices. The content of the HTML pages is then generated using the information from the database or the XML document.
  • SUMMARY OF INVENTION
  • The object of the invention is therefore to create an improved method for transmission of a process value from a control unit to a client computer as well as a method for transmission of an input value from a client computer to a control unit and a corresponding control system and computer program product. [0012]
  • The object underlying the invention is achieved by the features of the respective independent claims. [0013]
  • Preferred embodiments of the invention are specified in the dependent claims. [0014]
  • The invention permits the links between the fields of an HTML page and the process values on the server to be parameterized and transferred together with the HTML page from the server computer to the client computer. Elements on the HTML page can be identified in this case by means of an ID attribute, whereby the element type can be arbitrary. [0015]
  • A particular advantage is that the graphical layout of the HTML page can initially be independent of the actual engineering data, i.e. for example the actual addresses of the control system. The individual fields of the HTML page are then linked subsequently via a further document in a markup language, XML for example. [0016]
  • This permits the greatest possible flexibility also with regard to changes on the HTML page or changes with regard to the control system, for example if a control system is to be replaced by a control system of a new type which has different address ranges. In this case only the address ranges need to be re-assigned to the corresponding fields in the HTML page in the XML document. [0017]
  • Also of particular advantage is that this flexible access by the user to the system controller can also take place via what is termed a firewall. The user can therefore log in from any location initially for example into a corporate intranet via a corresponding firewall in order subsequently to enter into contact with the system server. What is particularly advantageous here is that the user can also make inputs in addition to being able to visualize process values.[0018]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A preferred exemplary embodiment of the invention will be explained in more detail in the following with reference to the drawings, in which: [0019]
  • FIG. 1 is a block diagram of a control system known from the prior art, [0020]
  • FIG. 2 is a block diagram of a first embodiment of the control system according to the invention, [0021]
  • FIG. 3 is a block diagram of a second embodiment of the control system according to the invention, [0022]
  • FIG. 4 is a flowchart of an embodiment of the method for transmission of a process value from a control unit to a client computer, [0023]
  • FIG. 5 shows an embodiment of the method for transmission of an input value from a client computer to a control unit, [0024]
  • FIG. 6 is a block diagram of a third embodiment of the control system according to the invention.[0025]
  • DETAILED DESCRIPTION OF INVENTION
  • FIG. 2 shows a block diagram of a control system for controlling a [0026] system 25. The system 25 is connected to one or more control units known as stored program controls (SPCs)—designated as SPS X and SPS Y in the example shown. The two control units SPS X and SPS Y each have different addresses, for accessing data for example. In particular, the control unit SPS X has the addresses a and c for storing process values; the control unit SPS Y has the address b.
  • The control units SPS X and SPS Y are connected to a [0027] system server computer 27 via a fieldbus 26. The system server computer 27 can execute read/write accesses to the storage addresses a, c of the SPS X and to the address b of the SPS Y via the fieldbus 26.
  • The system server computer[0028] 27 contains a document 28 in a markup language. In the example shown in FIG. 2, the markup language used for the document 28 is the hypertext markup language (HTML). The document 28 contains the fields A, B and C for displaying and/or graphically visualizing process values and/or for entering values. In addition, a script 29 is coded in the document 28. This can be a JAVA script for example. As an alternative to the script 29, a so-called applet can be provided.
  • Also coded in the [0029] document 28 is a pointer 30 to a document 31. The pointer 30 can consist, for example, of the Uniform Resource Locator (URL) of the document 31.
  • The [0030] document 31 is likewise available in a markup language, this being an Extended Markup Language (XML) in the example shown in FIG. 2. A table 32 is coded in the document 31.
  • Table [0031] 32 contains an assignment of the fields A, B and C of the document 28 to specific storage addresses of the control units SPS X and SPS Y. In table 32, for example, field A is assigned to SPS X, and more specifically to address a of SPS X, whereas field B is assigned to address b of SPS Y, and field C to address c of SPS X. Table 32 can contain further assignments of this kind for further fields of the document 28 to further addresses of the SPS X and Y, as well as of further control units where necessary.
  • By means of a browser [0032] 34 a client computer 33 can set up a connection to the system server computer 27 via a network 35. The client computer 33 can be a regular personal computer, an operator console, a portable computer, a mobile phone with WAP browser or also a so-called WAP pad.
  • The [0033] network 35 can be a corporate network or system-internal network, an intranet, extranet or the Internet itself. In the last-mentioned case the communication can also be set up via a so-called firewall between the client computer 33 and the system server computer 27. A commercially available browser program, for example Netscape Communication Navigator or Microsoft Internet Explorer, can be used as the browser.
  • During operation of the system according to FIG. 2, a user of the [0034] client computer 33 navigates by means of the browser 34 via the network 35 to the HTML document 28. The user does this for example by selecting a corresponding hypertext link or entering the URL of the document 28 into the browser 34.
  • The [0035] document 28 is then transferred via the network 35 to the client computer 33. The script 29 of the document 28 is also launched automatically on the client computer 33 and executed. The script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used.
  • The [0036] script 29 reads the pointer 30 of the document 28 and access the document 31 on the system server computer 27 by means of the corresponding URL. The document 31 is then transferred via the network 35 to the client computer 33.
  • The [0037] script 29 then reads the assignments of the fields A, B and C of the document 28 to the addresses of the control units SPS X and SPS Y from table 32, for example for field A the address specification indicating that a corresponding process value is stored on SPS X under the address a.
  • The [0038] script 29 then sends a command to the system server computer 27, which command contains the control units and addresses assigned to the fields A, B and C. The system server computer 27 then accesses the control units SPS X and/or SPS Y via the fieldbus 26 in order to read the contents of the corresponding storage locations with the addresses a, b and c.
  • The corresponding process values stored at these storage addresses are then transferred by the [0039] system server computer 27 via the network 35 to the client computer 33 and displayed by the script 29 in the corresponding fields A, B and C of the document 28 for the user.
  • FIG. 3 shows an alternative embodiment of the embodiment according to FIG. 2, in which alternative embodiment corresponding elements are designated by the same reference characters. [0040]
  • In contrast to the embodiment shown in FIG. 2, the [0041] system server computer 27 according to FIG. 3 contains the files 36 and 37. File 36 contains a table which assigns to the document 28 a pointer to the document 31 belonging to the document 28. This corresponds to the pointer 30 of the embodiment shown in FIG. 2, whereby the file 36 does not belong to the document 28 of the embodiment shown in FIG. 3, but is stored separately on the system server computer 27. If further documents 28 are present on the system server computer 27, the file 36 accordingly contains pointers for the assignment of these further documents 28 to corresponding further documents 31.
  • The [0042] document 31 contains a coded table 38 which corresponds to the table 32 of the embodiment shown in FIG. 2. In contrast to table 32 of the embodiment shown in FIG. 2, table 38 of the embodiment shown in FIG. 3 contains no actual addresses, but only the designation of parameter value designations assigned to the fields A, B, C of the document 28. Field A, for example, is assigned to a parameter value with the designation “boiler”, the boiler temperature for example; field B is assigned to a parameter value with the designation “engine”, an engine speed for example, and field C is assigned to a parameter value with the designation “pump”, a valve setting of the pump for example.
  • [0043] File 37, which is stored separately from the document 28 on the system server computer 27, assigns each designation of this kind to an address on a control unit, for example the designation “boiler” to the control unit SPS X and its storage address a, the designation “engine” to the control unit SPS Y and its address b, etc.
  • During operation of the system shown in FIG. 3, the [0044] document 28 is then loaded in turn by the client computer 33 and the script 29 executed. The script 29 then queries the file 36 for the pointer to the document 31 which is assigned to the document 28 and then, by means of this pointer, loads the document 31. Using the designations assigned to the individual fields A, B and C in table 38 of the document 31, the script then queries the file 37 in order to obtain the corresponding addresses or control units.
  • Using the addresses obtained in this way, the [0045] script 29 again sends a command to the system server computer 27 in order to execute a query to obtain the corresponding parameter values of the specified addresses of the control units SPS X and SPS Y.
  • With this embodiment it is particularly advantageous that the assignments in the [0046] document 31 are made abstractly, which means that the document 31 does not need to be changed in the event of a change of the control unit and/or the address. In this case only a change of the corresponding address entry in the file 37 is required.
  • Both in the embodiment according to FIG. 2 and in the embodiment according to FIG. 3, it is also possible to transfer an input value from the [0047] client computer 33 to a control unit. To do this, the user enters an input value in an input field of the document 28, in field A for example. The script 29 is activated by actuation of the entry key by the user of the client computer 33.
  • The [0048] script 29 then sends a command to the system server computer 27. This command contains as arguments the input value and also the address and control unit assigned to the input field. This was determined beforehand by the script 29 on the occasion of the transfer of the process values from the control units to the client computer, as explained above.
  • The [0049] system server computer 27 then executes a write access to the corresponding address of the corresponding control unit—in the example under consideration, for field A as the input field this is the SPS X with the address a—in order to store the input value there.
  • If only one control unit is present, table [0050] 32 or file 37 contains only a corresponding address specification, since the specification of the control unit is superfluous in that case.
  • FIG. 4 shows a flowchart of an embodiment of the method for transmission of a process value. In [0051] step 40, a document in a markup language, for example HTML, is first loaded by the client computer. In step 41, a script coded in the HTML page is launched and, in step 42, loads a further document in a markup language, for example XML, assigned to the HTML page from the system server computer.
  • Using the address specifications in the XML document, in [0052] step 43 the script queries the corresponding data for the fields of the HTML document from the system server computer. In step 44, the system server computer then queries the corresponding data from the control unit or control units. In step 45, this data is then transferred from the system server computer to the client computer, and in step 46 it is displayed in the corresponding fields of the HTML page.
  • FIG. 5 shows an embodiment of the method according to the invention for transmission of an input value from a client computer to a control unit. In [0053] step 50, the input value is entered in one of the fields of the HTML document, for example field A (compare FIGS. 2 and 3). In step 51, this input value is assigned to a specific address, i.e. a particular control unit if a plurality of control units are present, and to a storage address on the control unit in question. This assignment of the input value to an address is made via the corresponding assignment of the input field to the address which is provided by means of a further document in a markup language (compare document 31 of FIGS. 2 and 3).
  • In [0054] step 52, the input value is transferred together with the address to the server and from there stored at the corresponding address.
  • FIG. 6 shows a further preferred embodiment of a control system for controlling a [0055] system 25. Elements of the control systems of FIG. 6 which correspond to elements of the control system from FIG. 2 are designated by the same reference characters.
  • In contrast to the control system from FIG. 2, table [0056] 32 is not part of the document 31, but is stored separately in the system server computer 27. Instead of that, the document 31 contains a table 36 for assigning current display values to the fields A, B, C, . . .
  • The [0057] system server computer 27 also includes a program 37. The program 37 generates the document 31 with the table 36 automatically by means of corresponding accesses to the SPS X, SPS Y, . . . using the table 32. A separate table 32 exists for each page 28.
  • Compared to the embodiment shown in FIG. 2, it is advantageous with the embodiment shown in FIG. 6 that the display values are transferred directly to the client and not the addresses which permit these values to be queried. Compared to the embodiment shown in FIG. 2, therefore, with the embodiment shown in FIG. 6 the load on the [0058] network 35 is reduced. This is achieved in particular in that the program 37 generates table 36 in document 31 on the server side by accessing table 32.
  • During operation of the system shown in FIG. 6, a user of the [0059] client computer 33 navigates by means of the browser 34 via the network 35 to the HTML document 28; for example the user selects a corresponding hypertext link or enters the URL of the document 28 into the browser 34.
  • The [0060] document 28 is then transferred via the network 35 to the client computer 33. The script 29 of the document 28 is also launched automatically on the client computer 33 and executed. The script can be, for example, a JAVA script or a Visual Basic script; alternatively, a so-called applet can also be used.
  • The [0061] script 29 reads the pointer 30 of the document 28 and accesses the document 31 on the system server computer 27 by means of the corresponding URL. The program 37 then determines the addresses of the required values in the SPSs from table 32 and fetches the values via the fieldbus 26. The program 37 then generates the document 31, in which the table 36 is coded with field/value assignment. The document 31 is then transferred via the network 35 to the client computer 33.
  • The [0062] script 29 then reads out the assignments of the fields A, B and C to the values in table 36 and modifies the displayed elements of the HTML page 28 in the browser 34. The values can be displayed here for example as numeric values in HTML fields or a value can also be translated for example into a color change of an HTML element.
  • User inputs in the [0063] browser 34 can also be transferred from the client 33 to the system 25 in the same way. If a user has modified HTML fields of the HTML page 28 displayed in the browser 34, the script 29 generates a document 31 on the client 33, in which document 31 the table 36 is coded with the field/value assignment.
  • This [0064] document 31 is transferred from the client 33 to the system server 27. There, the program 37 interprets/translates the field names from table 36 into SPS addresses with the aid of table 32 and sends the values from table 37 via the fieldbus 26 to the corresponding SPSs.
  • Accordingly, it is also possible to vary the embodiment shown in FIG. 3 in such a way that the [0065] document 31 contains a table 36 with the field values. For this purpose the table 38 (cf. FIG. 3) is stored on the system server 27, and a corresponding program 37 generates the field values.
  • To sum up, the invention pertains to a control system with at least one control unit SPS X, SPS Y, . . . , a server computer, a first document in a markup language and a second document in a markup language for loading by a client computer, whereby the first document contains at least a field A, B, C, . . . and the second document contains data for assigning the field to an address of a control unit. [0066]

Claims (33)

1.-15. (cancelled)
16. A method for transmission of a process value from a control unit to a client computer, comprising:
providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the process value;
providing at least one access to a second document in a markup language, with the second document having data for assigning the field to an address of the control unit;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning;
querying the process value from the address; and
transmitting the process value from the server computer to the client computer.
17. A method for transmission of an input value from a client computer to a control unit, comprising:
providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the input value;
providing at least one access to a second document in a markup language, the second document containing data for assigning the field to an address of the control unit;
entering the input value into the field;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning; and
transmitting the input value from the server computer to the control unit.
18. A method according to claim 16, wherein the first document comprises a script.
19. A method according to claim 16, wherein a script of the first document executes a query of the database to determine the assignment of the first document to a second document.
20. A method according to claim 16, wherein the first document comprises a pointer to the second document.
21. A method according to claims 16, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
22. A method according to claims 16, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, the database containing an assignment of the designation to an address of the control unit.
23. A computer program product comprising computer-readable means for performing a method for transmission of a process value from a control unit to a client computer, the method comprising:
providing at least one access to a first document in a markup language of a server computer, the first document having at least one field for the process value;
providing at least one access to a second document in a markup language, with the second document having data for assigning the field to an address of the control unit;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning;
querying the process value from the address; and
transmitting the process value from the server computer to the client computer.
24. A control system comprising:
at least one control unit;
a server computer;
a first document in a markup language and a second document in a markup language for loading by a client computer, the first document comprising at least one field; and
a first database for assigning the first and the second document on the server computer, the second document comprising data for assigning the field to an address of the control unit.
25. A control system according to claim 24, wherein the first document comprises a script.
26. A control system according to claim 24, wherein the first document has a pointer to the second document.
27. A control system according to claim 24, wherein the data for assigning the field to an address of the control unit has an address of the control unit.
28. A control system according to claim 24, wherein the data for assigning the field to an address of the control unit assigns a designation to the field and having a second database on the server computer for assigning the designation to the address of the control unit.
29. A method according to claim 17, wherein the first document comprises a script.
30. A method according to claim 17, wherein a script of the first document executes a query of the database to determine the assignment of the first document to a second document.
31. A method according to claim 29, wherein the script of the first document executes a query of the database to determine the assignment of the first document to a second document.
32. A method according to claim 18, wherein the script of the first document executes a query of the database in order to determine the assignment of the first document to a second document.
33. A method according to claim 17, wherein the first document contains a pointer to the second document.
34. A method according to claim 33 , wherein the pointer to the second document is a URL.
35. A method according to claim 18, wherein the first document contains a pointer to the second document.
36. A method according to claim 17, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
37. A method according to claim 29, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
38. A method according to claim 18, wherein the data for assigning the field to an address of the control unit contains an address of the control unit.
39. A method according to claim 17, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
40. A method according to claim 29, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
41. A method according to claim 18, wherein the second document assigns a designation to the field of the first document and a database of the server computer is queried using a script, said database containing an assignment of the designation to an address of the control unit.
42. A computer program product comprising computer-readable means for performing a method for transmission of an input value from a client computer to a control unit, comprising:
providing at least one access to a first document in a markup language of a server computer, with the first document having at least one field for the input value;
providing at least one access to a second document in a markup language, the second document containing data for assigning the field to an address of the control unit;
entering the input value into the field;
assigning the field to the address of the control unit;
assigning the second document to the first document, whereby a database is accessed on behalf of the server computer for the purpose of assigning; and
transmitting the input value from the server computer to the control unit.
43. A computer program product according to claim 23, wherein the program for performing the method is executed on a control system.
44. A computer program product according to claim 42, wherein the program for performing the method is executed on a control system.
45. A control system according to claim 25, wherein the first document has a pointer to the second document.
46. A control system according to claim 45, wherein the pointer is a URL.
47. A control system according to claim 26, wherein the pointer is a URL.
US10/489,076 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user Abandoned US20040243842A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/489,076 US20040243842A1 (en) 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US15039299P 1999-08-23 1999-08-23
US60150392 1999-08-23
US09/535,080 US6339423B1 (en) 1999-08-23 2000-03-23 Multi-domain access control
US09535080 2000-03-23
PCT/DE2002/003105 WO2003025714A2 (en) 2001-09-10 2002-08-23 System server computer and method for monitoring the input rights of a user
US10/489,076 US20040243842A1 (en) 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user

Publications (1)

Publication Number Publication Date
US20040243842A1 true US20040243842A1 (en) 2004-12-02

Family

ID=26847603

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/535,080 Expired - Lifetime US6339423B1 (en) 1999-08-23 2000-03-23 Multi-domain access control
US10/489,076 Abandoned US20040243842A1 (en) 1999-08-23 2002-08-23 System server computer and method for monitoring the input rights of a user

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/535,080 Expired - Lifetime US6339423B1 (en) 1999-08-23 2000-03-23 Multi-domain access control

Country Status (4)

Country Link
US (2) US6339423B1 (en)
EP (1) EP1216533B1 (en)
ES (1) ES2409629T3 (en)
WO (1) WO2001015377A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060112020A1 (en) * 2004-11-19 2006-05-25 Karlheinz Dorn Generation and management of a rights context for order handling in technical processes
US20080289021A1 (en) * 2007-05-17 2008-11-20 Ashok Chandrasekhar Software application access method and system

Families Citing this family (217)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7096192B1 (en) * 1997-07-28 2006-08-22 Cybersource Corporation Method and system for detecting fraud in a credit card transaction over a computer network
US7403922B1 (en) * 1997-07-28 2008-07-22 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US6965999B2 (en) * 1998-05-01 2005-11-15 Microsoft Corporation Intelligent trust management method and system
US7155605B1 (en) * 1999-03-31 2006-12-26 Lenovo (Singapore) Pte. Ltd. Data processing system and method for maintaining secure data blocks
US7272855B1 (en) 1999-06-08 2007-09-18 The Trustees Of Columbia University In The City Of New York Unified monitoring and detection of intrusion attacks in an electronic system
US7013296B1 (en) 1999-06-08 2006-03-14 The Trustees Of Columbia University In The City Of New York Using electronic security value units to control access to a resource
US7140039B1 (en) * 1999-06-08 2006-11-21 The Trustees Of Columbia University In The City Of New York Identification of an attacker in an electronic system
US6745332B1 (en) * 1999-06-29 2004-06-01 Oracle International Corporation Method and apparatus for enabling database privileges
US7058817B1 (en) * 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
US7058683B1 (en) 1999-07-20 2006-06-06 Sun Microsystems, Inc. Methods and apparatus for providing a virtual host in electronic messaging servers
US6778653B1 (en) * 1999-11-09 2004-08-17 Nortel Networks Limited Storing information about a telephony session
US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
US7137009B1 (en) * 2000-01-06 2006-11-14 International Business Machines Corporation Method and apparatus for securing a cookie cache in a data processing system
US20010047397A1 (en) * 2000-02-18 2001-11-29 Jameson David H. Method and system for using pervasive device to access webpages
US20020138728A1 (en) * 2000-03-07 2002-09-26 Alex Parfenov Method and system for unified login and authentication
JP3641590B2 (en) * 2000-03-13 2005-04-20 ヤフー株式会社 Access authentication system
US8239445B1 (en) * 2000-04-25 2012-08-07 International Business Machines Corporation URL-based sticky routing tokens using a server-side cookie jar
US7039699B1 (en) * 2000-05-02 2006-05-02 Microsoft Corporation Tracking usage behavior in computer systems
CA2409280A1 (en) * 2000-05-15 2001-11-22 Communicator, Inc. Method and system for providing an online industry hub
US7200863B2 (en) * 2000-05-16 2007-04-03 Hoshiko Llc System and method for serving content over a wide area network
JP2001338062A (en) * 2000-05-26 2001-12-07 Nec Corp System for controlling electronic medical record and method for the same
US7426530B1 (en) * 2000-06-12 2008-09-16 Jpmorgan Chase Bank, N.A. System and method for providing customers with seamless entry to a remote server
US10185936B2 (en) * 2000-06-22 2019-01-22 Jpmorgan Chase Bank, N.A. Method and system for processing internet payments
US8661539B2 (en) * 2000-07-10 2014-02-25 Oracle International Corporation Intrusion threat detection
US7080077B2 (en) * 2000-07-10 2006-07-18 Oracle International Corporation Localized access
US7134137B2 (en) * 2000-07-10 2006-11-07 Oracle International Corporation Providing data to applications from an access system
US7194764B2 (en) * 2000-07-10 2007-03-20 Oracle International Corporation User authentication
US9038170B2 (en) 2000-07-10 2015-05-19 Oracle International Corporation Logging access system events
US7464162B2 (en) * 2000-07-10 2008-12-09 Oracle International Corporation Systems and methods for testing whether access to a resource is authorized based on access information
US7249369B2 (en) * 2000-07-10 2007-07-24 Oracle International Corporation Post data processing
US7124203B2 (en) * 2000-07-10 2006-10-17 Oracle International Corporation Selective cache flushing in identity and access management systems
US7711798B1 (en) * 2000-07-12 2010-05-04 Paltalk Holdings, Inc. Method and computer program for offering products and services by examining user activity
US7200869B1 (en) * 2000-09-15 2007-04-03 Microsoft Corporation System and method for protecting domain data against unauthorized modification
US6925497B1 (en) * 2000-09-26 2005-08-02 Microsoft Corporation Systems and methods for controlling the number of clients that access a server
US7051069B2 (en) * 2000-09-28 2006-05-23 Bea Systems, Inc. System for managing logical process flow in an online environment
US6823391B1 (en) * 2000-10-04 2004-11-23 Microsoft Corporation Routing client requests to back-end servers
US6898633B1 (en) * 2000-10-04 2005-05-24 Microsoft Corporation Selecting a server to service client requests
AU2001296774A1 (en) * 2000-10-09 2002-04-22 Enic Corporation Registering and using multilingual domain names
US7103556B2 (en) * 2000-11-02 2006-09-05 Jpmorgan Chase Bank, N.A. System and method for aggregate portfolio client support
EP2378733B1 (en) * 2000-11-10 2013-03-13 AOL Inc. Digital content distribution and subscription system
US7093019B1 (en) * 2000-11-21 2006-08-15 Hewlett-Packard Development Company, L.P. Method and apparatus for providing an automated login process
US6718331B2 (en) * 2000-12-14 2004-04-06 International Business Machines Corporation Method and apparatus for locating inter-enterprise resources using text-based strings
US8095624B2 (en) * 2000-12-28 2012-01-10 CenterBeam Inc. Architecture for serving and managing independent access devices
US7185364B2 (en) 2001-03-21 2007-02-27 Oracle International Corporation Access system interface
US7062563B1 (en) * 2001-02-28 2006-06-13 Oracle International Corporation Method and system for implementing current user links
US7171411B1 (en) 2001-02-28 2007-01-30 Oracle International Corporation Method and system for implementing shared schemas for users in a distributed computing system
US7440962B1 (en) 2001-02-28 2008-10-21 Oracle International Corporation Method and system for management of access information
FR2821685A1 (en) * 2001-03-01 2002-09-06 Couponet S A Controlling access to web sites by issuing access tokens to regular site users to speed their access, while blocking access to other users, and so encouraging user loyalty
US7499948B2 (en) 2001-04-16 2009-03-03 Bea Systems, Inc. System and method for web-based personalization and ecommerce management
US20030041050A1 (en) * 2001-04-16 2003-02-27 Greg Smith System and method for web-based marketing and campaign management
US20030217333A1 (en) * 2001-04-16 2003-11-20 Greg Smith System and method for rules-based web scenarios and campaigns
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
US7020705B2 (en) * 2001-04-26 2006-03-28 Intel Corporation De-authenticating in security environments only providing authentication
US20030005308A1 (en) * 2001-05-30 2003-01-02 Rathbun Paul L. Method and system for globally restricting client access to a secured web site
AU2002312381A1 (en) 2001-06-07 2002-12-16 First Usa Bank, N.A. System and method for rapid updating of credit information
US7392546B2 (en) * 2001-06-11 2008-06-24 Bea Systems, Inc. System and method for server security and entitlement processing
JP4301482B2 (en) * 2001-06-26 2009-07-22 インターナショナル・ビジネス・マシーンズ・コーポレーション Server, information processing apparatus, access control system and method thereof
US7421411B2 (en) * 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
US7266839B2 (en) * 2001-07-12 2007-09-04 J P Morgan Chase Bank System and method for providing discriminated content to network users
GB2378010A (en) * 2001-07-27 2003-01-29 Hewlett Packard Co Mulit-Domain authorisation and authentication
US20030037131A1 (en) * 2001-08-17 2003-02-20 International Business Machines Corporation User information coordination across multiple domains
US7920682B2 (en) * 2001-08-21 2011-04-05 Byrne William J Dynamic interactive voice interface
DE10144336A1 (en) * 2001-09-10 2003-04-03 Siemens Ag Plant server computer and method for checking the rights for a user input
US6976068B2 (en) * 2001-09-13 2005-12-13 Mcafee, Inc. Method and apparatus to facilitate remote software management by applying network address-sorting rules on a hierarchical directory structure
JP2003108520A (en) * 2001-09-28 2003-04-11 Canon Inc Information providing server, terminal device, its control method and information providing system
US7069581B2 (en) * 2001-10-04 2006-06-27 Mcafee, Inc. Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment
US20030074455A1 (en) * 2001-10-11 2003-04-17 International Business Machines Corporation Context aware server devices
WO2003036500A1 (en) * 2001-10-24 2003-05-01 Bea Systems, Inc. System and method for application flow integration in a portal framework
WO2003038561A2 (en) * 2001-11-01 2003-05-08 First Usa Bank, N.A. System and method for establishing or modifying an account with user selectable terms
US7225256B2 (en) * 2001-11-30 2007-05-29 Oracle International Corporation Impersonation in an access system
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US7260555B2 (en) * 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets
US7631184B2 (en) * 2002-05-14 2009-12-08 Nicholas Ryan System and method for imposing security on copies of secured items
US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment
US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items
US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items
US10033700B2 (en) * 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights
US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line
US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets
USRE41546E1 (en) 2001-12-12 2010-08-17 Klimenty Vainstein Method and system for managing security tiers
US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor
US7783765B2 (en) * 2001-12-12 2010-08-24 Hildebrand Hal S System and method for providing distributed access control to secured documents
US7178033B1 (en) 2001-12-12 2007-02-13 Pss Systems, Inc. Method and apparatus for securing digital assets
US7565683B1 (en) * 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system
US7681034B1 (en) 2001-12-12 2010-03-16 Chang-Ping Lee Method and apparatus for securing electronic data
US8006280B1 (en) 2001-12-12 2011-08-23 Hildebrand Hal S Security system for generating keys from access rules in a decentralized manner and methods therefor
US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control
US7478418B2 (en) * 2001-12-12 2009-01-13 Guardian Data Storage, Llc Guaranteed delivery of changes to security policies in a distributed system
US7350226B2 (en) * 2001-12-13 2008-03-25 Bea Systems, Inc. System and method for analyzing security policies in a distributed computer network
US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application
US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files
US7661129B2 (en) * 2002-02-26 2010-02-09 Citrix Systems, Inc. Secure traversal of network components
US20180165441A1 (en) 2002-03-25 2018-06-14 Glenn Cobourn Everhart Systems and methods for multifactor authentication
US7748045B2 (en) * 2004-03-30 2010-06-29 Michael Frederick Kenrich Method and system for providing cryptographic document retention with off-line access
US8613102B2 (en) 2004-03-30 2013-12-17 Intellectual Ventures I Llc Method and system for providing document retention using cryptography
WO2003093964A1 (en) 2002-05-01 2003-11-13 Bea Systems, Inc. Enterprise application platform
US7725560B2 (en) 2002-05-01 2010-05-25 Bea Systems Inc. Web service-enabled portlet wizard
US20030226037A1 (en) * 2002-05-31 2003-12-04 Mak Wai Kwan Authorization negotiation in multi-domain environment
EP1520217A2 (en) * 2002-06-06 2005-04-06 Dick C. Hardt Distributed hierarchical identity management
CA2838180C (en) 2002-08-19 2014-12-02 Research In Motion Limited System and method for secure control of resources of wireless mobile communication devices
US7512810B1 (en) * 2002-09-11 2009-03-31 Guardian Data Storage Llc Method and system for protecting encrypted files transmitted over a network
US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
AU2003282212A1 (en) * 2002-10-17 2004-05-04 Vodafone Group Plc Facilitating and authenticating transactions
US7568218B2 (en) * 2002-10-31 2009-07-28 Microsoft Corporation Selective cross-realm authentication
US7836310B1 (en) 2002-11-01 2010-11-16 Yevgeniy Gutnik Security system that uses indirect password-based encryption
US8301493B2 (en) * 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US7451217B2 (en) * 2002-12-19 2008-11-11 International Business Machines Corporation Method and system for peer-to-peer authorization
US7890990B1 (en) 2002-12-20 2011-02-15 Klimenty Vainstein Security system with staging capabilities
US20040128559A1 (en) * 2002-12-31 2004-07-01 Zurko Mary Ellen Trusting security attribute authorities that are both cooperative and competitive
US8831966B2 (en) 2003-02-14 2014-09-09 Oracle International Corporation Method for delegated administration
US7591000B2 (en) * 2003-02-14 2009-09-15 Oracle International Corporation System and method for hierarchical role-based entitlements
US7653930B2 (en) 2003-02-14 2010-01-26 Bea Systems, Inc. Method for role and resource policy management optimization
US20040167868A1 (en) * 2003-02-20 2004-08-26 Bea Systems, Inc. System and method for a virtual content repository
US20040167871A1 (en) * 2003-02-20 2004-08-26 Bea Systems, Inc. Content mining for virtual content repositories
US7415478B2 (en) * 2003-02-20 2008-08-19 Bea Systems, Inc. Virtual repository complex content model
US7293286B2 (en) * 2003-02-20 2007-11-06 Bea Systems, Inc. Federated management of content repositories
US7483904B2 (en) * 2003-02-20 2009-01-27 Bea Systems, Inc. Virtual repository content model
US7840614B2 (en) 2003-02-20 2010-11-23 Bea Systems, Inc. Virtual content repository application program interface
US7562298B2 (en) 2003-02-20 2009-07-14 Bea Systems, Inc. Virtual content repository browser
US20040167880A1 (en) * 2003-02-20 2004-08-26 Bea Systems, Inc. System and method for searching a virtual repository content
US7941840B2 (en) * 2003-02-25 2011-05-10 Hewlett-Packard Development Company, L.P. Secure resource access
US7810036B2 (en) * 2003-02-28 2010-10-05 Bea Systems, Inc. Systems and methods for personalizing a portal
US8224887B2 (en) * 2003-03-26 2012-07-17 Authenticatid, Llc System, method and computer program product for authenticating a client
US7454786B2 (en) * 2003-03-27 2008-11-18 International Business Machines Corporation Method for integrated security roles
US8108920B2 (en) * 2003-05-12 2012-01-31 Microsoft Corporation Passive client single sign-on for web applications
US8108939B2 (en) * 2003-05-29 2012-01-31 Oracle International Corporation Method and apparatus to facilitate security-enabled content caching
US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files
US20040268139A1 (en) * 2003-06-25 2004-12-30 Microsoft Corporation Systems and methods for declarative client input security screening
US7730543B1 (en) * 2003-06-30 2010-06-01 Satyajit Nath Method and system for enabling users of a group shared across multiple file security systems to access secured files
US7472184B2 (en) * 2003-09-19 2008-12-30 International Business Machines Corporation Framework for restricting resources consumed by ghost agents
US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents
US7703140B2 (en) * 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies
GB2406925B (en) * 2003-10-09 2007-01-03 Vodafone Plc Facilitating and authenticating transactions
US7882132B2 (en) * 2003-10-09 2011-02-01 Oracle International Corporation Support for RDBMS in LDAP system
US7904487B2 (en) * 2003-10-09 2011-03-08 Oracle International Corporation Translating data access requests
US20050262362A1 (en) * 2003-10-10 2005-11-24 Bea Systems, Inc. Distributed security system policies
US20050097352A1 (en) * 2003-10-10 2005-05-05 Bea Systems, Inc. Embeddable security service module
US20050081055A1 (en) * 2003-10-10 2005-04-14 Bea Systems, Inc. Dynamically configurable distributed security system
US20050086531A1 (en) * 2003-10-20 2005-04-21 Pss Systems, Inc. Method and system for proxy approval of security changes for a file security system
US20050138371A1 (en) * 2003-12-19 2005-06-23 Pss Systems, Inc. Method and system for distribution of notifications in file security systems
US7702909B2 (en) * 2003-12-22 2010-04-20 Klimenty Vainstein Method and system for validating timestamps
KR101058002B1 (en) * 2004-02-02 2011-08-19 삼성전자주식회사 How to record and play back data under a domain management system
US7752322B2 (en) * 2004-03-19 2010-07-06 Sony Corporation System for ubiquitous network presence and access without cookies
US7774601B2 (en) 2004-04-06 2010-08-10 Bea Systems, Inc. Method for delegated administration
US7240076B2 (en) * 2004-04-13 2007-07-03 Bea Systems, Inc. System and method for providing a lifecycle for information in a virtual content repository
US7236990B2 (en) * 2004-04-13 2007-06-26 Bea Systems, Inc. System and method for information lifecycle workflow integration
US7580953B2 (en) * 2004-04-13 2009-08-25 Bea Systems, Inc. System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories
US7475091B2 (en) * 2004-04-13 2009-01-06 Bea Systems, Inc. System and method for viewing a virtual content repository
US7236989B2 (en) * 2004-04-13 2007-06-26 Bea Systems, Inc. System and method for providing lifecycles for custom content in a virtual content repository
EP1738562B1 (en) * 2004-04-23 2011-03-23 Panasonic Corporation Server apparatus, client apparatus and network system
US7707427B1 (en) * 2004-07-19 2010-04-27 Michael Frederick Kenrich Multi-level file digests
US8689276B2 (en) * 2004-08-25 2014-04-01 Adobe Systems Incorporated System and method for controlling access to files
JP4737974B2 (en) * 2004-11-26 2011-08-03 株式会社東芝 ONLINE SHOPPING SYSTEM AND USER MANAGEMENT DEVICE, NET STORE DEVICE, AND USER TERMINAL DEVICE
US9438683B2 (en) * 2005-04-04 2016-09-06 Aol Inc. Router-host logging
US8887233B2 (en) * 2005-04-08 2014-11-11 Netapp, Inc. Cookie-based acceleration of an authentication protocol
US8078740B2 (en) * 2005-06-03 2011-12-13 Microsoft Corporation Running internet applications with low rights
US8583926B1 (en) 2005-09-19 2013-11-12 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US7818344B2 (en) * 2005-09-26 2010-10-19 Bea Systems, Inc. System and method for providing nested types for content management
US7953734B2 (en) 2005-09-26 2011-05-31 Oracle International Corporation System and method for providing SPI extensions for content management system
US7917537B2 (en) * 2005-09-26 2011-03-29 Oracle International Corporation System and method for providing link property types for content management
US20070073673A1 (en) * 2005-09-26 2007-03-29 Bea Systems, Inc. System and method for content management security
US20070073674A1 (en) * 2005-09-26 2007-03-29 Bea Systems, Inc. System and method for providing federated events for content management systems
US7752205B2 (en) * 2005-09-26 2010-07-06 Bea Systems, Inc. Method and system for interacting with a virtual content repository
US20070073784A1 (en) * 2005-09-26 2007-03-29 Bea Systems, Inc. System and method for type inheritance for content management
US7483893B2 (en) * 2005-09-26 2009-01-27 Bae Systems, Inc. System and method for lightweight loading for managing content
CA2527550A1 (en) * 2005-11-24 2007-05-24 Oz Communications Method for securely associating data with https sessions
US7673135B2 (en) * 2005-12-08 2010-03-02 Microsoft Corporation Request authentication token
US8688813B2 (en) * 2006-01-11 2014-04-01 Oracle International Corporation Using identity/resource profile and directory enablers to support identity management
US20070226338A1 (en) * 2006-03-23 2007-09-27 Novell, Inc. Registration of peer-to-peer services
US8185737B2 (en) 2006-06-23 2012-05-22 Microsoft Corporation Communication across domains
US8463852B2 (en) * 2006-10-06 2013-06-11 Oracle International Corporation Groupware portlets for integrating a portal with groupware systems
US8312507B2 (en) 2006-10-17 2012-11-13 A10 Networks, Inc. System and method to apply network traffic policy to an application session
US8584199B1 (en) 2006-10-17 2013-11-12 A10 Networks, Inc. System and method to apply a packet routing policy to an application session
CA2585808A1 (en) * 2007-03-26 2008-09-26 David Ker Method and system for implementing a secured and centrally managed virtual ip network on a common ip network infrastructure
JP4946564B2 (en) * 2007-03-27 2012-06-06 富士通株式会社 Authentication processing method and system
US7926095B1 (en) 2007-05-04 2011-04-12 Avaya Inc. Efficient authentication system for primary and secondary servers
US8473735B1 (en) 2007-05-17 2013-06-25 Jpmorgan Chase Systems and methods for managing digital certificates
US9769177B2 (en) * 2007-06-12 2017-09-19 Syracuse University Role-based access control to computing resources in an inter-organizational community
US10019570B2 (en) * 2007-06-14 2018-07-10 Microsoft Technology Licensing, Llc Protection and communication abstractions for web browsers
US9015279B2 (en) * 2007-06-15 2015-04-21 Bryte Computer Technologies Methods, systems, and computer program products for tokenized domain name resolution
US7924810B2 (en) * 2007-06-21 2011-04-12 Hewlett-Packard Development Company, L.P. Method and computing system for controlling access
KR20090067551A (en) * 2007-12-21 2009-06-25 삼성전자주식회사 Method and apparatus for using and limiting cluster-based contents, method and apparatus for authenticating access right of contents, and computer readable medium thereof
US7970939B1 (en) * 2007-12-31 2011-06-28 Symantec Corporation Methods and systems for addressing DNS rebinding
US8627493B1 (en) * 2008-01-08 2014-01-07 Juniper Networks, Inc. Single sign-on for network applications
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
KR100997802B1 (en) * 2008-10-20 2010-12-01 한국전자통신연구원 Apparatus and method for security managing of information terminal
US9288210B2 (en) * 2009-01-26 2016-03-15 Microsoft Technology Licensing, Llc Revocable object access
US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management
US9407959B2 (en) 2009-09-21 2016-08-02 Adobe Systems Incorporated Monitoring behavior with respect to a software program
US8584221B2 (en) 2009-10-23 2013-11-12 Microsoft Corporation Authenticating using cloud authentication
US8838962B2 (en) * 2010-09-24 2014-09-16 Bryant Christopher Lee Securing locally stored Web-based database data
US9225727B2 (en) 2010-11-15 2015-12-29 Blackberry Limited Data source based application sandboxing
CA3122203A1 (en) 2010-12-20 2012-06-28 The Nielsen Company (Us), Llc Methods and apparatus to determine media impressions using distributed demographic information
US8875243B1 (en) * 2011-01-27 2014-10-28 Sprint Communications Company L.P. Identity abstraction providing limited cross-domain access
DE102011077218B4 (en) 2011-06-08 2023-12-14 Servicenow, Inc. Access to data stored in a cloud
EP2575315A1 (en) * 2011-09-30 2013-04-03 British Telecommunications Public Limited Company Controlled access
US9386105B2 (en) * 2011-11-02 2016-07-05 Microsoft Technology Licensing, Llc Techniques for dynamic domain-based isolation
US9118619B2 (en) * 2011-11-07 2015-08-25 Qualcomm Incorported Prevention of cross site request forgery attacks by conditional use cookies
US9191405B2 (en) 2012-01-30 2015-11-17 Microsoft Technology Licensing, Llc Dynamic cross-site request forgery protection in a web-based client application
US9118618B2 (en) 2012-03-29 2015-08-25 A10 Networks, Inc. Hardware-based packet editor
US10382202B1 (en) * 2012-09-28 2019-08-13 EMC IP Holding Company LLC Method and apparatus for federated identity and authentication services
US8887260B2 (en) 2012-10-25 2014-11-11 Facebook, Inc. Token-based access control
US9338225B2 (en) 2012-12-06 2016-05-10 A10 Networks, Inc. Forwarding policies on a virtual service network
US9286465B1 (en) * 2012-12-31 2016-03-15 Emc Corporation Method and apparatus for federated single sign on using authentication broker
US9690931B1 (en) 2013-03-11 2017-06-27 Facebook, Inc. Database attack detection tool
US9992107B2 (en) 2013-03-15 2018-06-05 A10 Networks, Inc. Processing data packets using a policy based network path
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
WO2014179753A2 (en) 2013-05-03 2014-11-06 A10 Networks, Inc. Facilitating secure network traffic by an application delivery controller
US10148726B1 (en) 2014-01-24 2018-12-04 Jpmorgan Chase Bank, N.A. Initiating operating system commands based on browser cookies
US9942152B2 (en) 2014-03-25 2018-04-10 A10 Networks, Inc. Forwarding data packets using a service-based forwarding policy
US10268467B2 (en) 2014-11-11 2019-04-23 A10 Networks, Inc. Policy-driven management of application traffic for providing services to cloud-based applications
US10104084B2 (en) * 2015-07-30 2018-10-16 Cisco Technology, Inc. Token scope reduction
US10223541B2 (en) * 2017-01-24 2019-03-05 Salesforce.Com, Inc. Adaptive permission token
US11196733B2 (en) * 2018-02-08 2021-12-07 Dell Products L.P. System and method for group of groups single sign-on demarcation based on first user login
US11003394B2 (en) 2019-06-28 2021-05-11 Seagate Technology Llc Multi-domain data storage system with illegal loop prevention
CN113704795B (en) * 2021-09-02 2024-02-06 杭州戎戍网络安全技术有限公司 Multi-domain access control formalized modeling method based on label attribute
CN114900330A (en) * 2022-04-07 2022-08-12 京东科技信息技术有限公司 Page protection method and device

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US5968119A (en) * 1996-12-09 1999-10-19 Wall Data Incorporated Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation
US6061603A (en) * 1997-09-10 2000-05-09 Schneider Automation Inc. System for remotely accessing an industrial control system over a commercial communications network
US6073241A (en) * 1996-08-29 2000-06-06 C/Net, Inc. Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state
US6098093A (en) * 1998-03-19 2000-08-01 International Business Machines Corp. Maintaining sessions in a clustered server environment
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6185567B1 (en) * 1998-05-29 2001-02-06 The Trustees Of The University Of Pennsylvania Authenticated access to internet based research and data services
US6199113B1 (en) * 1998-04-15 2001-03-06 Sun Microsystems, Inc. Apparatus and method for providing trusted network security
US20010037469A1 (en) * 1999-05-11 2001-11-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US6393468B1 (en) * 1997-01-20 2002-05-21 British Telecommunications Public Limited Company Data access control
US20020072980A1 (en) * 2000-12-07 2002-06-13 Rabindranath Dutta System, method, and program for managing electronic shopping carts
US20020083178A1 (en) * 2000-08-11 2002-06-27 Brothers John David West Resource distribution in network environment
US20020109717A1 (en) * 2001-02-13 2002-08-15 International Business Machines Corporation Customizing a graphical user interface of a host application
US20020143861A1 (en) * 2001-04-02 2002-10-03 International Business Machines Corporation Method and apparatus for managing state information in a network data processing system
US20030023752A1 (en) * 2001-07-12 2003-01-30 International Business Machines Corporation Pluggable URL providers in a J2EE server
US6539424B1 (en) * 1999-11-12 2003-03-25 International Business Machines Corporation Restricting deep hyperlinking on the World Wide Web
US6985953B1 (en) * 1998-11-30 2006-01-10 George Mason University System and apparatus for storage and transfer of secure data on web
US7233997B1 (en) * 1997-06-26 2007-06-19 British Telecommunications Plc Data communications

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8916586D0 (en) 1989-07-20 1989-09-06 Int Computers Ltd Distributed data processing system
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
JP2977476B2 (en) * 1995-11-29 1999-11-15 株式会社日立製作所 Security method
WO1997026729A2 (en) * 1995-12-27 1997-07-24 Robinson Gary B Automated collaborative filtering in world wide web advertising
US6088016A (en) * 1996-12-30 2000-07-11 S3 Incorporated Dithering method and apparatus using ramp probability logic
US6006334A (en) * 1997-05-01 1999-12-21 International Business Machines Corp. Method and system for authentication over a distributed service to limit password compromise
US6170017B1 (en) * 1997-05-08 2001-01-02 International Business Machines Corporation Method and system coordinating actions among a group of servers
JP3180054B2 (en) 1997-05-16 2001-06-25 インターナショナル・ビジネス・マシーンズ・コーポレ−ション Network security system
CA2293566A1 (en) * 1997-06-25 1998-12-30 Inforonics, Inc. Apparatus and method for identifying clients accessing network sites
CA2295150A1 (en) * 1997-06-26 1999-01-07 Michael John Kenning Data communications
US6065120A (en) * 1997-12-09 2000-05-16 Phone.Com, Inc. Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices
US6145084A (en) * 1998-10-08 2000-11-07 Net I Trust Adaptive communication system enabling dissimilar devices to exchange information over a network

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5696898A (en) * 1995-06-06 1997-12-09 Lucent Technologies Inc. System and method for database access control
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US5963915A (en) * 1996-02-21 1999-10-05 Infoseek Corporation Secure, convenient and efficient system and method of performing trans-internet purchase transactions
US6073241A (en) * 1996-08-29 2000-06-06 C/Net, Inc. Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state
US5968119A (en) * 1996-12-09 1999-10-19 Wall Data Incorporated Method of accessing information of an SNA host computer from a client computer using a specific terminal emulation
US6393468B1 (en) * 1997-01-20 2002-05-21 British Telecommunications Public Limited Company Data access control
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US7233997B1 (en) * 1997-06-26 2007-06-19 British Telecommunications Plc Data communications
US6061603A (en) * 1997-09-10 2000-05-09 Schneider Automation Inc. System for remotely accessing an industrial control system over a commercial communications network
US6098093A (en) * 1998-03-19 2000-08-01 International Business Machines Corp. Maintaining sessions in a clustered server environment
US6199113B1 (en) * 1998-04-15 2001-03-06 Sun Microsystems, Inc. Apparatus and method for providing trusted network security
US6185567B1 (en) * 1998-05-29 2001-02-06 The Trustees Of The University Of Pennsylvania Authenticated access to internet based research and data services
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6985953B1 (en) * 1998-11-30 2006-01-10 George Mason University System and apparatus for storage and transfer of secure data on web
US20010037469A1 (en) * 1999-05-11 2001-11-01 Sun Microsystems, Inc. Method and apparatus for authenticating users
US6539424B1 (en) * 1999-11-12 2003-03-25 International Business Machines Corporation Restricting deep hyperlinking on the World Wide Web
US20020083178A1 (en) * 2000-08-11 2002-06-27 Brothers John David West Resource distribution in network environment
US20020072980A1 (en) * 2000-12-07 2002-06-13 Rabindranath Dutta System, method, and program for managing electronic shopping carts
US20020109717A1 (en) * 2001-02-13 2002-08-15 International Business Machines Corporation Customizing a graphical user interface of a host application
US20020143861A1 (en) * 2001-04-02 2002-10-03 International Business Machines Corporation Method and apparatus for managing state information in a network data processing system
US20030023752A1 (en) * 2001-07-12 2003-01-30 International Business Machines Corporation Pluggable URL providers in a J2EE server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060112020A1 (en) * 2004-11-19 2006-05-25 Karlheinz Dorn Generation and management of a rights context for order handling in technical processes
US20080289021A1 (en) * 2007-05-17 2008-11-20 Ashok Chandrasekhar Software application access method and system
US7987516B2 (en) 2007-05-17 2011-07-26 International Business Machines Corporation Software application access method and system

Also Published As

Publication number Publication date
EP1216533A1 (en) 2002-06-26
US6339423B1 (en) 2002-01-15
EP1216533B1 (en) 2013-03-06
WO2001015377A1 (en) 2001-03-01
EP1216533A4 (en) 2007-10-24
ES2409629T3 (en) 2013-06-27

Similar Documents

Publication Publication Date Title
US20040243842A1 (en) System server computer and method for monitoring the input rights of a user
US7539935B2 (en) Method for transmission of a process value and control system
EP0859986B1 (en) Method and apparatus for server-independent caching of dynamically-generated customized pages
CN110162720B (en) Webpage loading method and device, computer equipment and storage medium
US8065358B2 (en) Proxied web access for control devices on industrial control systems
US6067579A (en) Method for reducing message translation and traffic through intermediate applications and systems in an internet application
US6845401B1 (en) Embedded file system for a programmable logic controller
JP4993330B2 (en) Automation control module (ACM) that can operate the service portal
US20040010344A1 (en) Remote control method and system for robot controller
WO2002050706A2 (en) Method and system for fulfilling requests for information from a network client
US20030149749A1 (en) Method of data refreshing of a mark-up- language document
US20120054327A1 (en) Site redirection
US7320107B2 (en) Bookmark frame and method of launching browsers using the bookmark in an internet terminal
US20050198241A1 (en) Web server comprising integrated automation functionality and access to a realtime operating system
US20030225726A1 (en) Mechanism for sharing web-based imaging information from a mainframe computing environment
JP2021096833A (en) Electronic Device Description Language (EDDL) Search and Navigation Assistant
JP4669000B2 (en) Web page control program, method and server
CN104123143A (en) User control loading system and method
US20020169804A1 (en) System and method for storage space optimized memorization and generation of web pages
US20030055874A1 (en) System for automatically recognizing devices connected in a distributed processing environment
US20080005129A1 (en) System for creating dynamic web pages
US20040205630A1 (en) System and method for application entitlement
KR20050066690A (en) Prining device providing contents list and automatically printing contents selected and method thereof
JP4197343B2 (en) COMMUNICATION COMMUNICATION SYSTEM AND COMPUTER-READABLE RECORDING MEDIUM CONTAINING CONTROL COMMUNICATION PROGRAM
KR100382783B1 (en) The mobile system and method for researching internet data

Legal Events

Date Code Title Description
AS Assignment

Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHLERETH, MICHAEL;REEL/FRAME:015705/0654

Effective date: 20040226

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION