-
公开(公告)号:CZ20014650A3
公开(公告)日:2002-05-15
申请号:CZ20014650
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:DE10051024A1
公开(公告)日:2001-05-23
申请号:DE10051024
申请日:2000-10-14
Applicant: IBM
Inventor: BARRETT ROBERT C , BELLWOOD THOMAS ALEXANDER , DUTTA RABINDRANATH , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS , STERLING DOUGLAS MERLE
Abstract: The method involves storing the overall output of the program element, e.g. code converters, group in the cache (707) instead of storing individual outputs of each program element (704,706,708). Independent claims are also included for the following: (a) Computer program for management of intermediate caching points in software system; (b) Computer system
-
公开(公告)号:CA2377257A1
公开(公告)日:2001-01-11
申请号:CA2377257
申请日:2000-06-28
Applicant: IBM
Inventor: RUTKOWSKI MATTHEW FRANCIS , LITA CHRISTIAN , BELLWOOD THOMAS ALEXANDER
Abstract: A method of enabling a proxy to participate in a secure communication betwee n a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using t he first secure session, this first session master secret is then provided by t he client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client 's behalf and without the first server's knowledge or participation. If data fr om a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:GB2329309A
公开(公告)日:1999-03-17
申请号:GB9815613
申请日:1998-07-20
Applicant: IBM
Inventor: BERANEK MICHAEL , LITA CHRISTIAN
Abstract: A method of controlling how a Web document is presented for display on a browser of a Web appliance. The Web appliance typically includes a television class monitor associated therewith. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the document before it is displayed on the browser of the Web appliance. In particular, as the Web document is received from the server, the HTML is parsed to identify the format of the document and the information therein. A filter mechanism is then used to reformat the Web document according to some given protocol, and the re-formatted Web document is then passed to the browser for display on the monitor. Dynamic alteration of the HTML in this manner enables control of the "look and feel" of the browser display irrespective of the monitor resolution and/or quality.
-
公开(公告)号:DE10051024B4
公开(公告)日:2006-10-26
申请号:DE10051024
申请日:2000-10-14
Applicant: IBM
Inventor: BARRETT ROBERT C , BELLWOOD THOMAS ALEXANDER , DUTTA RABINDRANATH , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS , STERLING DOUGLAS MERLE
Abstract: A set of program elements (e.g., transcoders) are grouped together as an administrative unit. Instead of caching the individual outputs of each program element, preferably only the aggregate output of the set of program elements, taken as a whole, is cached. The inventive technique enables the effective re-use of intermediate content. In an illustrative client-server based implementation involving a transcoding service located at a server, the cached information may be shared across multiple server instances to obviate redundant processing. With the present invention, a caching mechanism in a complex software system may be extended in a user-configurable manner by setting up optimal intermediate caching points that are defined by groups of programs used in long computations.
-
公开(公告)号:DE60026838T2
公开(公告)日:2006-09-07
申请号:DE60026838
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD ALEXANDER , LITA CHRISTIAN , RUTKOWSKI FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:GB2329310B
公开(公告)日:2002-05-22
申请号:GB9816410
申请日:1998-07-29
Applicant: IBM
Inventor: BERANEK MICHAEL , LITA CHRISTIAN
Abstract: A method of controlling how a Web document is presented for display on a browser of a client machine. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the document before it is displayed on the browser. In particular, as the Web document is received from the server, the HTML is parsed to identify the format of the document and the information therein. A filter mechanism is then used to reformat the Web document according to some given protocol, and the re-formatted Web document is then passed to the browser for display. Dynamic alteration of the HTML in this manner enables control of the "look and feel" of the browser display.
-
公开(公告)号:AU5554100A
公开(公告)日:2001-01-22
申请号:AU5554100
申请日:2000-06-28
Applicant: IBM
Inventor: LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
Abstract: A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server. After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given service (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
公开(公告)号:CA2299039A1
公开(公告)日:2000-09-30
申请号:CA2299039
申请日:2000-02-21
Applicant: IBM
Inventor: LITA CHRISTIAN
Abstract: A method, computer program product and server for use managing connection requests to a pool of servers identified by a given URL. The method begins in response to a connection request from a given client machine that initiates a user session for associating a session identifier with a given server in the pool. The session identifier is then used to generate a "virtual" URL that redirects the connection request to the given server. Thereafter, any additional connection requests issued from the given client machine during the user session are redirected to the given server so that all content is served to the client from the same location. When the user session terminates, the virtual URL is inactivated and the given server is returned to the pool so that it can then be assigned a new user session to manage.
-
公开(公告)号:CA2377257C
公开(公告)日:2008-05-13
申请号:CA2377257
申请日:2000-06-28
Applicant: IBM
Inventor: BELLWOOD THOMAS ALEXANDER , LITA CHRISTIAN , RUTKOWSKI MATTHEW FRANCIS
IPC: G06F13/00 , H04L9/00 , G06F15/00 , H04L9/08 , H04L9/32 , H04L12/22 , H04L12/66 , H04L29/06 , H04L29/08
Abstract: A method of enabling a proxy to participate in a secure communication betwee n a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure session between the client and the proxy. In the second secure session, the client requests the proxy to act as a conduit to a first server. Thereafter, the client and the first server negotiate a first session master secret. Using the first secure session, this first session master secret is then provided by the client to the proxy to enable the proxy to participate in secure communications between the client and the first server . After receiving the first session master secret, the proxy generates cryptographic information that enables it to provide a given servi ce (e.g., transcoding) on the client's behalf and without the first server's knowledge or participation. If data from a second server is required during the processing of a given client request to the first server, the proxy issues a request to the client to tunnel back through the proxy to the second server using the same protocol.
-
-
-
-
-
-
-
-
-