Abstract:
A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
Abstract:
PROBLEM TO BE SOLVED: To realize a transcoding processing system which performs semantic transcoding between a client and a server and makes document transmission possible. SOLUTION: The client 620 requests a specified document and offers settings including document readily understandable level setting, locale setting, contents filtering instruction setting, government regulation setting, natural language setting and document syntax format setting. A transcoding proxy 600 requests a document from an origin server 610 and receives the document having a transmission source semantic characteristics from the origin server. The transcoding proxy uses client semantic setting and corrects the document into a sequential or a parallel system. Then, the transmission source semantic characteristics of the document is modified to a semantic setting designated by the client.
Abstract:
PROBLEM TO BE SOLVED: To display a web document on a browser operating on a display device in a conventional TV class by intercepting the web document to set the format again. SOLUTION: An internet client machine 10 is connected to a server platform 12 through a communication channel 14. An HTTP cache proxy on the side of the client machine 10 is used to intercept the web document, and this document is dynamically rewritten before being displayed on the browser attached to a web apparatus. Concretely, the HTML of the web document is analyzed to discriminate the form of the document and information of its contents at the time of receiving this document from the server 12. Next, a filter mechanism is used to set the format of the web document again in accordance with some given protocols or filter properties, and the web document set again is transferred to the browser and is displayed.
Abstract:
PROBLEM TO BE SOLVED: To enable a proxy to participate in a secure communication between a client and a set of servers. SOLUTION: This method includes steps of: requesting a client for a first secure connection to a proxy; requesting the client for a second secure connection to the proxy when a certificate received from the proxy is authenticated to be valid, that is a step of requesting the proxy so that the second secure connection works as a conduit to the server and negotiating respective session master secrets to the client and the server through the conduit; using the first secure connection for the client to deliver the secret to the proxy at the end of the negotiation; and enabling the proxy to use the secret to generate prescribed code information useful for joining the secure communication. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To obtain a method, a computer program product, and a server which are used to manage a connection request to a pool of a server identified by a given URL. SOLUTION: This using method is started in response to a connection request from a given client computer 10 starting a user session to relate a session identifier to a given server 12 in the pool. This session identifier is used thereafter to generate a 'virtual' URL redirecting the connection request to the given server 12. Then all additional connection requests issued by the given client computer 10 in the user session are redirected to the given server 12, and consequently all contents are supplied to a client from the same position. At the end of the user session, the virtual URL is inactivated and the given server 12 is returned to the pool, so that a user session to be managed newly can be allocated to the server 12.
Abstract:
PROBLEM TO BE SOLVED: To dynamically control the way of presenting information on the browser of a client device by analyzing a web information received from a server to recognize form setting information and changing form setting information to correct the displaying characteristic of the web document and delivering the web document to the browser for displaying. SOLUTION: This method includes a step for analyzing the web document to identify form setting information at the time of receiving the web document from the server, a step for changing form setting information to correct the displaying characteristic of the web document and a step for delivering the web document to the browser for displaying. At the time of receiving the web document from a computer network, the proxy 225 of a client device intercepts it and processes for controlling how to present the document by the browser 223 after then. Therefore, the proxy 225 can dynamically adjust the web document without regard to how the web document is form-set by a web server on a connected client side.
Abstract:
A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
Abstract:
A method of controlling how a Web document is presented for display on a browser of a Web appliance. The Web appliance typically includes a television class monitor associated therewith. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the document before it is displayed on the browser of the Web appliance. In particular, as the Web document is received from the server, the HTML is parsed to identify the format of the document and the information therein. A filter mechanism is then used to reformat the Web document according to some given protocol, and the re-formatted Web document is then passed to the browser for display on the monitor. Dynamic alteration of the HTML in this manner enables control of the "look and feel" of the browser display irrespective of the monitor resolution and/or quality.
Abstract:
A set of program elements (e.g., transcoders) are grouped together as an administrative unit. Instead of caching the individual outputs of each program element, preferabl y only the aggregate output of the set of program elements, taken as a whole, is cached. The inventive technique enables the effective re-use of intermediate content. In an illustrative client-server based implementation involving a transcoding service located at a server, the cach ed information may be shared across multiple server instances to obviate redundant processing. With the present invention, a caching mechanism in a complex software system may be extended in a user-configurable manner by setting up optimal intermediate caching points that are defined by groups of programs used in long computations.
Abstract:
A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.