This invention pertains to user accounts for Internet browsers, and more particularly to allowing multiple users to log into a browser while using the same operating system user account.
Internet browsing has become a popular and indispensable use of computer technology. By using an Internet browser such as Mozilla® Firefox® or Microsoft® Internet Explorer, computer users are able to access web pages all over the Internet. (Mozilla and Firefox are registered trademarks of the Mozilla Foundation; Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries.) Like many software applications, web browsers include settings and preferences to allow users to customize the look and feel, as well as the behavior of the application. Browser settings are typically saved in a file dedicated to the user logged into a computer operating system.
For example, a family's home computer can have operating system accounts set up for each member of the household. If the mother logs into the operating system and uses the browser on the computer, the browser can save her browsing history and preferences in an account set up by the operating system for her. If the father uses the browser on the computer in the mother's operating system user account, the father will be able to see the browsing history of the mother, and the browser settings will be according to the mother's preferences. But if the father logs into his own account in the computer's operating system and uses the browser, he will see the settings and history from when he last used the computer, regardless of whether or not he was the last user of the computer.
Some browsers have a profile feature that allows multiple profiles while in the same operating system user account. Each user profile can provide some difference in look and feel from other profiles. A user can create or change his or her user profile using a profile manager. The profile manager then displays existing profiles that are available for selection, or allows a user to create a new profile.
Most computer users do not know how to use profiles or even of the existence of profiles. Further, profiles do not completely separate data from other users. A browser starts up with the most recent profile, and a user must affirmatively change to a different profile. Users that do know about and use profiles must track which profile is currently being used and switch to another profile as appropriate. And the data of one profile is available to users of another profile.
Accordingly, a need remains for a way to log in and authenticate users into a web browser, without having to log into an operating system as a different user or use a separate profile manager, to address these and other problems associated with the prior art.
A multi-user web browser is stored on a computer allowing more than one user to create and use browser user accounts without requiring each user to log into a different operating system user account. Upon startup of the multi-user browser, a user is prompted to enter a browser user name and associated password. Until the multi-user browser receives a valid browser user name and password, the multi-user browser prevents users from using the browser to view content over the Internet. Receiving a browser user name and password enables the user to customize the browser settings for the logged in browser user without requiring the user to log into an operating system user account.
The foregoing and other features, objects, and advantages of the invention will become more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.
In an embodiment of the invention, computer 105 includes a single user operating system, where the operating supports only a single operating system user account. In another embodiment, computer 105 includes an operating system supporting multiple users, including a default operating system user, often named “default” or “guest”. A person skilled in the art will recognize that other user account names can represent a generic/default type user, and that there are no limitations on what the account is named.
Stored on computer 105 are multi-user web browser 110, authenticator 115, account creator 120, and browser accounts table 125. Multi-user browser 110 includes browser login window 130, where browser users can enter their browser user names and corresponding passwords. Other than browser login window 130, browser 110 behaves like standard web browsers, such as Microsoft Internet Explorer, Mozilla Firefox or other applications that are used to browse the network.
Like existing browsers that allow operating system users to customize browser settings, multi-user browser 110 allows user customization of options, including customization settings for general browser operation, privacy and security, content and downloading, connections, and other advanced options. A person skilled in the art will recognize that other types of settings can be customized by browser 110. The difference between multi-user browser 110 and existing browsers is that the customizations are now no longer tied to the user logged into the operating system, but instead are connected to the browser user that is logged into the multi-user browser.
In addition to customized settings, browser 110 can also save a web browsing history for the browser user. Browsing history can include visited web pages (e.g., visited URLs), bookmarked web pages, stored for information, stored passwords associated with particular web sites, cached pages and images, etc. A person skilled in the art will recognize other content that can also comprise browser history.
Looking at the customization options and other stored information, some of the options are merely a convenience, while other options implicate privacy or security concerns. For example, if one browser user saves his user name and password to a frequently accessed website, such an e-mail portal, then another user of the browser would be able to log into the first browser user's e-mail account and see e-mail that belongs to another person. Similarly, a browser user saving account information for access to his bank account would likely not want other subsequent users of the browser to have access to this personal information.
In the prior art, one solution for a browser user on a public computer (where more than one user can access and use the browser) was to not save any sensitive browser information for the user. The browser could be pre-configured to prevent any change to settings or storage of information, such as history or password information every time. In this case, users who frequently accessed the public computer had to re-enter all information every time they used the browser, even information which was merely based on user preferences and not implicating any privacy or security concerns.
Another prior art solution allowed settings to be changed, with users selectively determining what information to retain as browser history. This solution had the advantage that users could prevent sensitive information from being stored in a public browser, while allowing history and customization of information as a convenience. But each user has to confirm that the browser was configured in a desired manner. As most users were not likely to remember to check the settings, users might have inadvertently used the browser in a manner they did not want.
In an embodiment of the invention, browser 110 includes browser login window 130 to receive the browser user name and password. Browser login window 130 can be an initial web page of browser 110, a dialog box, or some other control that a user sees and completes before being able to view actual websites with browser 110. Browser login window 130 includes field 135 for a browser user to enter a user name, and field 140 for the browser user to enter a corresponding password. In one embodiment of the invention, the corresponding password can be blank. Although not shown in
While field 135 is shown in
In an embodiment of the invention, authenticator 115 and account creator 120 work with account table 125 to ensure proper creation and logging in of browser users. Account table 125 includes a list of browser users with the corresponding passwords. In
In an embodiment using accounts table 125, as a browser user logs into browser 110, authenticator 115 checks account table 125 to validate that the browser user name received in field 135 corresponds to an existing browser user account. For example, suppose a browser user enters “User 2” into field 135, and “a_password” into field 140. When checking to see if this is a valid browser user, authenticator 115 would identify User 2 in row 145 of browser account table 125. While in this embodiment, authenticator 115 validates that the browser user name exists in account table 125, it is also possible to have a validator distinct from the authenticator to validate the browser user.
Upon identification of the received browser user name, authenticator 115 then checks row 145 of browser account table 125 to see if the password received in field 140 matches the password for User 2. Recall that in this example, field 140 has received “a_password” as the entered password. When authenticator 115 compares “a_password” from field 140 to “my_password” from row 145 of browser account table, authenticator 115 recognizes that the received password is not correct and does not authenticate the browser user. In an embodiment of the invention, authenticator 115 can send a message back to browser login window 130 to inform the browser user that authentication was not successful, along with a reminder for the user to verify that the intended user name and password were entered in the browser user name field and password field.
Suppose the browser user then remembers that “a_password” is not the correct password, but that the correct password should be “my_password”, and enters “my_password” into field 140, while keeping “User 2” in field 135. This time, authenticator 115 looks at row 145 of browser account table 125, and sees that “my_password” is the correct password for “User 2”, and authenticates the browser user. Once the browser user is successfully authenticated, multi-user browser 110 then runs as a fully operable web browser, capable of visiting websites, and customization of browser settings, and so on.
In one embodiment of the invention, a browser administrator can configure the multi-user browser to have minimal or no password requirements. Some browser users might prefer the convenience of a short, easy to remember password over a password that might be difficult to guess. For example, a password consisting of only a few characters or an easily remembered word might be very easy to guess. Similarly, a user might even forego using a password and leave that field blank.
In an embodiment of the invention where simple or no passwords are used, browser account files can still be stored in a secure directory, preventing a browser user (other than the browser administrator) from accessing the files directly from the file system. For example, if one user knows the browser user name of another user and knows that the other user does not use a password, the first user can log into the other user's browser account. In the course of using the browser, the browser account settings can change for the user. However, because browser account files are stored in a secure directory, the files themselves are not in danger of being altered or deleted directly. The secure directory is discussed in greater detail below in reference to
New browser user accounts are created with account creator 120.
In one embodiment of the invention, browser account creator 120 notifies the user if a browser user account does not exist and asks the user if the entered browser user account should be created. Browser account creator 120 can then create the new account automatically using the user name and password entered in browser login window 130. In this embodiment, if a user has already created a browser user name, but mistakenly enters the wrong user name in user name field 205, the user can instead correctly re-enter the browser user name.
In another embodiment of the invention, browser login window 130 can include a button to create a new browser user account. In this embodiment, authenticator 115 is used to verify that the entered browser user name in field 205 does not already exist. If a user attempts to create a new browser user account with a name that already exists, authenticator 115 alerts the user that the browser user name is already taken. By alerting the browser user, the user can know to try entering a new browser user name.
After validating that the entered browser user name is available for a new browser user account, browser account creator 120 creates a new browser user account with the entered browser user name and password. Looking at
In an embodiment of the invention, the multi-user browser can remind browser users of their passwords if the users forget their passwords. For example, when browser accounts are created, in addition to providing a browser user name and password, the browser user can select a question and answer combination that can later help authenticate the browser user. Users can provide answers to such questions as their favorite color, the name of a pet, a mother's maiden name, name of elementary school, etc. In another embodiment of the invention, the extra authentication question can even be provided by the user (in addition to the answer.) The question and answer can be included in browser user account table 225. If only one question is used, then the question can be omitted from browser user account table 225.
In an embodiment where users can be reminded of their passwords, browser login window 130 can include a button or link for users who have forgotten their passwords. When browser users forget their passwords, the browser users are reminded of the authentication question, and asked to enter the answer to the question in an appropriate field.
For users that do forget their passwords, in one embodiment the user is told what the current password is (e.g., in an e-mail) so that the user can log into the browser with the current login information. In another embodiment, after authenticating with the question and answer, the user is logged in without further requirement of a password for that browsing session. In yet another embodiment, once the user is properly authenticated, the browser can clear the forgotten password from browser user account table 225 and permit the user to enter a new password.
In another embodiment of the invention, while a browser user is logged in the browser, the user can change his or her browser login information stored in browser user account table 225. For example, users can change the passwords associated with the browser accounts. Where a user has answered an authentication question (for when passwords are forgotten), the user can similarly change the answer to the question. In addition, where the user supplies the question for account authentication, or where the user selects one question from a list of available questions, the user can even change the question that is asked.
In an embodiment of the invention, the file system of computer 105 includes secure directory 405. Secure directory 405 can be set up so that only an operating system administrator or other authorized user can access the directory through the file system on the computer. For example, if an administrator is logged into an administrator operating system account, the administrator can access all directories on the computer using the typical file system means provided by the operating system. By entering the path of the directory, the administrator can see what files exist for a browser user. Where a browser account file is a standard file format, such as a cookies file stored as a text file, the administrator can access the content of the file. Other browser account files in a proprietary file format might require an additional application for the administrator to view the data in the file, although the administrator can still view such information as what files exist for a user, file size, and timestamp information.
However, browser users (including a user that is presently logged into the multi-user browser) are prevented from accessing secure directory 405 via the file system. In an embodiment of the invention, all directories on computer 105 can be secure, preventing browser users from access to any directories and files on computer 105. A person skilled in the art will recognize that there are other ways of preventing browser users from being able to access the files on secure directory 405: for example, by locking the account so a user cannot switch from the browser to another application.
Browser user account files 410 that are stored in secure directory 405 can include browser account settings 415, browser history 420, browser cache 425, and cookies 430. A person skilled in the art will recognize that the different browser account content can be stored in as few as one browser account file, but can also be several different files storing browser user account files 410. For example, browser settings 415 can be stored in a file or a directory separate from the other files in browser account data.
The same is true with the other files in browser user account files 410. In an embodiment of the invention, cache 425 is stored in a cache directory in secure directory 405. The cache directory can then store as many files of cache as necessary. Cache files 425 can includes cached web pages the browser user has visited before, as well as cached images from those web pages. A person skilled in the art will recognize that other information can also be cached.
In an embodiment of the invention, settings file 415 stores browser user preferences for the browser user account. Preferences can includes such information as browser look and feel (e.g. skins), privacy and security settings, and other preferences such as connection information or content. For example, privacy settings can include information on how long the browser is to retain history and cache. Security settings can include whether or not cookies should be enabled. Content settings can include what types of content the user wants to see. For example, a user can prefer that pop up ads are blocked generally, but then list web sites for which pop ups should be allowed.
In an embodiment of the invention, default settings can be used to initialize settings 415 when a user first creates a browser user account. The default settings can be created by a browser administrator, which is described below with reference to
Browser users can log into a multi-user web browser at either computer 105 or computer 505. Just as in previously described embodiments, computer 105 and computer 505 are typically logged into an operating system account for a default operating system user. In this example, the web browser application itself can be stored on each client computer, while browser user account files 410 are instead stored in secure directory 520 on server 510. This embodiment is useful for environments where there are multiple client computers available for browser access. By storing browser user account files 410 on server 510, a user who has set up a browser user account does not need to return to the same client computer where the account was created in order to benefits from having a browser user account. For example, if a public library has several computers with multi-user browsers networked together, a user that has created a browser user account while at one computer in the library network will be able to access the browser user account on all computers in the library network.
In the example of
In an embodiment of the invention, expiration date field 610 allows an administrator to enter a time period to preserve a browser user account after the browser account is created. For example, if the administrator enters six months into expiration date field 610, then six months after an account is created, the account expires. Inactivity period field 615 enables an administrator to specify a time period where a browser user account expires after the browser account has been inactive for that time period. A person skilled in the art will recognize that there can be other ways to manage expiration of browser user accounts
When using both expiration date field 610 and inactivity period field 615, dates associated with browser user accounts are stored along with other browser account information. For example, an account creation date can be associated with the account so that it can be calculated when the time period of expiration date field 610 has lapsed. Similarly, a date indicating when a browser user last accessed the browser account enables a calculation of how long it has been since the browser account has been inactive. The dates can be simply dates associated with files in browser user account file or can be stored separately.
As browser accounts expire, browser account files can be deleted from the secure directory. Also, the browser user name and password can be removed from the browser account table. This way, in the future if the user wants to create another browser account using the same browser user name, the user name will be available for registration.
In addition to setting expiration settings and other settings that only administrators have access to, browser management control 605 can enable administrators to set up default settings to apply to browser user accounts as the browser account is created. In an embodiment of the invention, an administrator can access browser management control 605 by logging into the multi-user browser as the browser administrator. As browser users can access and modify their browser settings, the browser administrator can similarly access and modify browser settings used as default settings applied to accounts as new browser accounts are created. Then when a browser user creates a new browser account, the browser account is initialized with the default browser settings.
At step 710, the browser checks a user account table to see if the browser user name exists as a browser user account. If the browser user account is identified as an existing account, then at step 715 the multi-user browser authenticates the browser user name and browser password. Then, if at step 720 the received password corresponds to the received browser user name, at step 725 the browser session is initialized with the browser user account settings.
After the browser session is initialized, at step 730 (
At step 750, if the browser is configured to close after exiting a browser user session, the process is complete. If the browser remains open to receive another browser user login, then the flowchart returns to step 705 (
Returning to step 710, if the entered browser user name is not found in the browser user account table, then the flowchart proceeds to step 755 (
If the browser user accounts can be automatically created, then at step 760 the user is asked if he or she would like to create the browser account with the entered browser user name and password. If at step 765 the browser user account is to be created, then the browser user account is created at step 770. In an embodiment of the invention, when a browser user account is created, the browser user name and corresponding password (possibly encrypted) are stored in a browser user account table, indicating that a browser user account has been created. Also created initially are the browser account settings such as the default settings to apply to newly created browser user accounts. Similarly, there can be a default set of bookmarks set up on the creation of a browser user account. Because there is typically no default browser history, cookies, or cache, there might not be content in these files created when the browser user account is created. However, the files to store this data can be created while creating the browser user account. After creating the new browser user account, the browser user can use the browser as described above with respect to step 730 on
If at step 755 the browser is not set up for automatic browser user account creation, then at set 775 the user is prompted to check that the entered browser user name and password are correct before returning to step 705 (
Not shown in the flowchart is an embodiment of the invention where the browser login window used in step 705 to receive a browser user name and password can also include a button, link, or other control to create a new browser user account. Users clicking this control to create a new account can go to a different window or dialog where new browser account information is received. This information includes browser user name and password. A create new browser account dialog or window can also allow browser users to enter the password twice (verifying that the password entered is the intended password) and/or provide other information to identify the user in the event the user forgets his or her password.
After starting the browser account management control, at step 810 settings are selected. The settings chosen here can be applied to all browser user accounts. For example, one type of setting can control how long to retain a browser user account after the account has been created. Another control can include how long to preserve a browser user account after the account has been inactive. In one embodiment, these types of controls are applied to all user accounts, where the browser user is not able to override the settings. In another embodiment, a user browser can override some (or all) of these settings, as desired: for example, to prevent any history retention or to store passwords for the user.
Once the account settings have been selected, at step 815 the browser account management control is closed. If, at step 820, the active operating system user account is not the default user account for the multi-user browser, then the administrator logs out of the current operating system at step 825. Then, at step 830, the administrator logs into the operating system as the default user, and at step 835 the multi-user browser is started.
If at step 820, the operating system user is the default user, then if the browser management control is an application outside of the browser, the multi-user browser is started at step 835. Once the multi-user browser is been started, step 705 from
As previously discussed, it is also possible that the browser account management control is a tool within the multi-user browser itself. In this instance, it is not necessary to start the multi-user browser for users as the browser is already running so the flowchart proceeds along arrow 840 and finishes.
This sequence of resolving conflicts is just one possible approach. A person skilled in the art will recognize that the conflict resolver can enable user configuration before automatically resolving the conflict. For example, some users might wish to have as much control over the converted VM instances as possible.
The following discussion is intended to provide a brief, general description of a suitable machine in which certain aspects of the invention may be implemented. Typically, the machine includes a system bus to which is attached processors, memory, e.g., random access memory (RAM), read-only memory (ROM), or other state preserving medium, storage devices, a video interface, and input/output interface ports. The machine may be controlled, at least in part, by input from conventional input devices, such as keyboards, mice, etc., as well as by directives received from another machine, interaction with a virtual reality (VR) environment, biometric feedback, or other input signal. As used herein, the term “machine” is intended to broadly encompass a single machine, or a system of communicatively coupled machines or devices operating together. Exemplary machines include computing devices such as personal computers, workstations, servers, portable computers, handheld devices, telephones, tablets, etc., as well as transportation devices, such as private or public transportation, e.g., automobiles, trains, cabs, etc.
The machine may include embedded controllers, such as programmable or non-programmable logic devices or arrays, Application Specific Integrated Circuits, embedded computers, smart cards, and the like. The machine may utilize one or more connections to one or more remote machines, such as through a network interface, modem, or other communicative coupling. Machines may be interconnected by way of a physical and/or logical network, such as an intranet, the Internet, local area networks, wide area networks, etc. One skilled in the art will appreciated that network communication may utilize various wired and/or wireless short range or long range carriers and protocols, including radio frequency (RF), satellite, microwave, Institute of Electrical and Electronics Engineers (IEEE) 802.11, Bluetooth, optical, infrared, cable, laser, etc.
The invention may be described by reference to or in conjunction with associated data including functions, procedures, data structures, application programs, etc. which when accessed by a machine results in the machine performing tasks or defining abstract data types or low-level hardware contexts. Associated data may be stored in, for example, the volatile and/or non-volatile memory, e.g., RAM, ROM, etc., or in other storage devices and their associated storage media, including hard-drives, floppy-disks, optical storage, tapes, flash memory, memory sticks, digital video disks, biological storage, etc. Associated data may be delivered over transmission environments, including the physical and/or logical network, in the form of packets, serial data, parallel data, propagated signals, etc., and may be used in a compressed or encrypted format. Associated data may be used in a distributed environment, and stored locally and/or remotely for machine access.
Having described and illustrated the principles of the invention with reference to illustrated embodiments, it will be recognized that the illustrated embodiments may be modified in arrangement and detail without departing from such principles. And although the foregoing discussion has focused on particular embodiments, other configurations are contemplated. In particular, even though expressions such as “according to an embodiment of the invention” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the invention to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments.
Consequently, in view of the wide variety of permutations to the embodiments described herein, this detailed description and accompanying material is intended to be illustrative only, and should not be taken as limiting the scope of the invention. What is claimed as the invention, therefore, is all such modifications as may come within the scope and spirit of the following claims and equivalents thereto.
Number | Name | Date | Kind |
---|---|---|---|
4918653 | Johri et al. | Apr 1990 | A |
5664206 | Murow et al. | Sep 1997 | A |
5713024 | Halladay | Jan 1998 | A |
5721824 | Taylor | Feb 1998 | A |
5732212 | Perholtz et al. | Mar 1998 | A |
5748890 | Goldberg et al. | May 1998 | A |
5835777 | Staelin | Nov 1998 | A |
5894571 | O'Connor | Apr 1999 | A |
5901227 | Perlman | May 1999 | A |
5950010 | Hesse et al. | Sep 1999 | A |
5961593 | Gabber et al. | Oct 1999 | A |
6144959 | Anderson et al. | Nov 2000 | A |
6205579 | Southgate | Mar 2001 | B1 |
6256774 | O'Leary et al. | Jul 2001 | B1 |
6282711 | Halpern et al. | Aug 2001 | B1 |
6301707 | Carroll et al. | Oct 2001 | B1 |
6324691 | Gazdik | Nov 2001 | B1 |
6353926 | Parthesarathy et al. | Mar 2002 | B1 |
6367075 | Kruger et al. | Apr 2002 | B1 |
6421777 | Pierre-Louis et al. | Jul 2002 | B1 |
6457130 | Hitz et al. | Sep 2002 | B2 |
6460060 | Maddalozzo et al. | Oct 2002 | B1 |
6493871 | Welch et al. | Dec 2002 | B1 |
6539473 | Hubacher et al. | Mar 2003 | B1 |
6539539 | Larsen et al. | Mar 2003 | B1 |
6606744 | Mikurak | Aug 2003 | B1 |
6615406 | Wong et al. | Sep 2003 | B1 |
6651085 | Woods | Nov 2003 | B1 |
6725452 | Te'eni et al. | Apr 2004 | B1 |
6728711 | Richard | Apr 2004 | B2 |
6735757 | Kroening et al. | May 2004 | B1 |
6775829 | Kroening | Aug 2004 | B1 |
6799208 | Sankaranarayan et al. | Sep 2004 | B1 |
6892382 | Hapner et al. | May 2005 | B1 |
6928644 | Kroening et al. | Aug 2005 | B1 |
6981028 | Rawat et al. | Dec 2005 | B1 |
7006993 | Cheong et al. | Feb 2006 | B1 |
7013461 | Hellerstein et al. | Mar 2006 | B2 |
7016959 | Dinh et al. | Mar 2006 | B2 |
7051327 | Milius et al. | May 2006 | B1 |
7055149 | Birkholz et al. | May 2006 | B2 |
7093247 | Ashworth et al. | Aug 2006 | B2 |
7143067 | Cheston et al. | Nov 2006 | B1 |
7177859 | Pather et al. | Feb 2007 | B2 |
7181768 | Ghosh et al. | Feb 2007 | B1 |
7185047 | Bate et al. | Feb 2007 | B1 |
7222218 | Dutt et al. | May 2007 | B2 |
7251812 | Jhanwar et al. | Jul 2007 | B1 |
7272815 | Eldridge et al. | Sep 2007 | B1 |
7284243 | Burgess | Oct 2007 | B2 |
7302634 | Lucovsky et al. | Nov 2007 | B2 |
7350075 | Eastham | Mar 2008 | B1 |
7353533 | Wright et al. | Apr 2008 | B2 |
7356679 | Le et al. | Apr 2008 | B1 |
7398480 | Zimniewicz et al. | Jul 2008 | B2 |
7398524 | Shapiro | Jul 2008 | B2 |
7424617 | Boyd et al. | Sep 2008 | B2 |
7478381 | Roberts et al. | Jan 2009 | B2 |
7506337 | Iyer | Mar 2009 | B2 |
7506338 | Alpern et al. | Mar 2009 | B2 |
7539978 | Haddox et al. | May 2009 | B1 |
7546594 | McGuire et al. | Jun 2009 | B2 |
7571427 | Wang et al. | Aug 2009 | B2 |
7574706 | Meulemans et al. | Aug 2009 | B2 |
7853609 | Dehghan et al. | Dec 2010 | B2 |
20010023440 | Franklin et al. | Sep 2001 | A1 |
20010029605 | Forbes et al. | Oct 2001 | A1 |
20020007330 | Kumar et al. | Jan 2002 | A1 |
20020007380 | Bauchot et al. | Jan 2002 | A1 |
20020010757 | Granik et al. | Jan 2002 | A1 |
20020019879 | Jasen et al. | Feb 2002 | A1 |
20020100036 | Moshir et al. | Jul 2002 | A1 |
20020147974 | Wookey | Oct 2002 | A1 |
20020156877 | Lu et al. | Oct 2002 | A1 |
20020162030 | Brezak et al. | Oct 2002 | A1 |
20030014656 | Ault et al. | Jan 2003 | A1 |
20030061202 | Coleman | Mar 2003 | A1 |
20030115292 | Griffin et al. | Jun 2003 | A1 |
20030121024 | Hill et al. | Jun 2003 | A1 |
20030126214 | Oliszewski | Jul 2003 | A1 |
20030131073 | Lucovsky et al. | Jul 2003 | A1 |
20030149759 | Hetherington et al. | Aug 2003 | A1 |
20030172127 | Northrup et al. | Sep 2003 | A1 |
20030182414 | O'Neill | Sep 2003 | A1 |
20030195970 | Dinh et al. | Oct 2003 | A1 |
20030200149 | Gonzalez et al. | Oct 2003 | A1 |
20030217123 | Anderson et al. | Nov 2003 | A1 |
20030221190 | Deshpande et al. | Nov 2003 | A1 |
20040003266 | Moshir et al. | Jan 2004 | A1 |
20040006710 | Pollutro et al. | Jan 2004 | A1 |
20040015946 | Te'eni et al. | Jan 2004 | A1 |
20040025048 | Porcari et al. | Feb 2004 | A1 |
20040049697 | Edwards, Jr. et al. | Mar 2004 | A1 |
20040102182 | Reith et al. | May 2004 | A1 |
20040196981 | Nakano et al. | Oct 2004 | A1 |
20040205748 | Iyer | Oct 2004 | A1 |
20040254976 | Malik et al. | Dec 2004 | A1 |
20050002057 | Oe | Jan 2005 | A1 |
20050005152 | Singh et al. | Jan 2005 | A1 |
20050081055 | Patrick et al. | Apr 2005 | A1 |
20050097353 | Patrick et al. | May 2005 | A1 |
20050120054 | Shulman et al. | Jun 2005 | A1 |
20050125677 | Michaelides | Jun 2005 | A1 |
20050132179 | Glaum et al. | Jun 2005 | A1 |
20050132349 | Roberts et al. | Jun 2005 | A1 |
20050134896 | Koga | Jun 2005 | A1 |
20050246588 | Deng et al. | Nov 2005 | A1 |
20060021065 | Kamperman et al. | Jan 2006 | A1 |
20060047657 | Frieder et al. | Mar 2006 | A1 |
20060059359 | Reasor et al. | Mar 2006 | A1 |
20060090208 | Smith | Apr 2006 | A1 |
20060123101 | Buccella et al. | Jun 2006 | A1 |
20060123414 | Fors et al. | Jun 2006 | A1 |
20060137000 | Isaacson | Jun 2006 | A1 |
20060155838 | Wu et al. | Jul 2006 | A1 |
20060218544 | Chakraborty et al. | Sep 2006 | A1 |
20060230124 | Belfiore et al. | Oct 2006 | A1 |
20060265597 | Carey et al. | Nov 2006 | A1 |
20060277542 | Wipfel | Dec 2006 | A1 |
20070006205 | Kennedy et al. | Jan 2007 | A1 |
20070111726 | Lambert et al. | May 2007 | A1 |
Number | Date | Country |
---|---|---|
2419711 | May 2006 | GB |
Entry |
---|
“Firefox Help: How to Manage Profiles”; http://www.mozilla.org/support/firefox/profile; printed on Aug. 27, 2007; pp. 1-4. |
“XenFaq—Xen Wiki”; http://www.wiki.xensource.com/xenwiki/XenFaq; printed on Aug. 27, 2007; pp. 1-7. |
Buytaert, Kris; “Linux Virtualization with Xen”; LinuxDevCenter.com; http://www.linuxdevcenter.com/pub/a/linux/2006/01/26/xen.html; Jan. 26, 2006; pp. 1-3. |
Rosen, Rami; “Introduction to the Xen Virtual Machine”; LinuxJournal.com; http://www.linuxjournal.com/article/8540; Sep. 1, 2005; pp. 1-10. |
Clark, Bryan; “A Moment of Xen: Virtualize Linux to Test Your Apps”; IBM.com; http://www-128.ibm.com/developerworks/linux/library/I-xen/; Mar. 15, 2005; pp. 1-6. |
“A Third Phase of Internet Search”; http://getoutfoxed.com/booklprint/46; printed on Aug. 28, 2007; p. 1-2. |
“Abstract”; http://getoutfoxed.com/booklprint/36; printed on Aug. 28, 2007; p. 1. |
“Beyond Outfoxed”; http://getoutfoxed.com/booklprint/88; printed on Aug. 28, 2007; p. 1. |
“Calculating Levels of Trust”; http://getoutfoxed.com/booklprint/112; printed on Aug. 28, 2007; pp. 1-2. |
“Comparison to Existing Systems”; http://getoutfoxed.com/booklprint/47; printed on Aug. 28, 2007; pp. 1-3. |
“Files & Processes”; http://getoutfoxed.com/booklprint/84; printed on Aug. 28, 2007; p. 1. |
“How it Works”; http://getoutfoxed.com/booklprint/87; printed on Aug. 28, 2007; p. 1. |
“Keeping Your Network Clean”; http://getoutfoxed.com/booklprint/108; printed on Aug. 28, 2007; p. 1. |
“Novell ZENworks 7 Suite: Your Complete Identity-driven IT Resource Management Solution”; Novell, Inc. Product Guide; http://www.novell.com; (2006); pp. 1-11. |
“Novell ZENworks Configuration Management: Complete Systems Management to Lower Your Total Cost of Ownership”; Novell, Inc. Product Guide; http://www.novell.com; (2007); pp. 1-11. |
“Novell ZENworks Endpoint Security Management: Total Control from a Single Console”; Novell, Inc. Technical White Paper; http://www.novell.com; (2007); pp. 1-11. |
“Novell ZENworks Orchestrator Virtual Machine Management Guide 1.1”; Novell, Inc.; http://www.novell.com; (2007); pp. 1-109. |
“Novell ZENworks”; Wikipedia, the free encyclopedia; http://en.wikipedia.org/wiki/ZENworks; Printed on Aug. 28, 2007; pp. 1-3. |
“Objections”; http://getoutfoxed.com/booklprint/35; printed on Aug. 28, 2007; p. 1. |
“Objections”; http://getoutfoxed.com/booklprint/86; printed on Aug. 28, 2007; p. 1. |
“Orchestrating the Data Center with Novell ZENworks”; Novell Solution Flyer; http://www.novell.com; (2007), pp. 1-4. |
Tridgell, A. et al., “The rsync algorithm,” retrieved at http://www.samba.org/rsync/tech—report/node2.html, Nov. 9, 1998, p. 1. |
“Phishing, Spyware, Crapware, Adware”; http://getoutfoxed.com/booklprint/85; printed on Aug. 28, 2007; p. 1. |
“Search & Browsing”; http://getoutfoxed.com/booklprint/83; printed on Aug. 28, 2007; p. 1. |
“Small World Networks”; http://getoutfoxed.com/booklprint/62; printed on Aug. 28, 2007; pp. 1-2. |
“Socially Aware Surfing and Shopping”; http://getoutfoxed.com/booklprint/73; printed on Aug. 28, 2007; p. 1. |
“Tagging and Folksonomy”; http://getoutfoxed.com/booklprint/96; printed on Aug. 28, 2007; p. 1. |
“Three Magic Ingredients”; http://getoutfoxed.com/booklprint/32; printed on Aug. 28, 2007; p. 1. |
“What Outfoxed is Not”; http://getoutfoxed.com/booklprint/34; printed on Aug. 28, 2007; p. 1. |
Adorno, Kerry, “Novell Delivers Industry's Most Comprehensive Systems Management Solution”; Novell, Inc.; http://www.novell.com/news/press/novell-delivers-industrys-most-comprehensive-systems-management-solution; Waltham, Massachusetts; Aug. 14, 2007; p. 1. |
Aiken, Peter et al., Microsoft Computer Dictionary; Fifth Edition; Microsoft Press; 2002. |
Bailey, E.C., Maximum RPM, Red Hat Inc., 2000, ISBN 1-888172-78-9, http://www.redhat.com/docs/books/max-rpm/index.html, pp. 1-565. |
Cowan, Crispin, Arnold, Seth, Beattie, Steve, Wright, Chris, & Viega, John “Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack”; USA; 2003, pp. 1-53. |
Cowan, Crispin, Arnold, Seth, Beattie, Steve, Wright, Chris, & Viega, John, “Immunix & Defcon: Defending Vulnerable Code From Intense Attack”; Immunix; USA; 2003. |
Cowan, Crispin, Beattie, Steve, Kroah-Hartman, Greg, Pu, Calton, Wagle, Perry, & Gligor, Virgil, “SubDomain: Parsimonious Server Security”; Proceedings of the 14th Systems Administration Conference; The Usenix Association; USA; 2000. |
Forrest, Stephanie “Computer Immunnology”; ACM; Oct. 1997; pp. 88-96. |
Fusco, John, “The Linux Programmer's Toolbox”; Prentice Hall; 2007; Chapter 5, “What Every Developer Should Know about the Kernel,” pp. 222-224. |
Garfinkel, Simson & Spaford, Gene, “Practical Unix & Internet Security”; Second edition; ISBN 1-56592-148-8; Apr. 1996; Chapters 3.1, 3.2,4.1,4.2. |
James, Stan; “Outfoxed in a Nutshell”; http://getoutfoxed.com/nutshell; printed on Aug. 28, 2007; pp. 1-3. |
James, Stan; “Outfoxed in a Nutshell: What does Outfoxed add to my Browser?”; http://getoutfoxed.com/nutshell/ node/106; printed on Aug. 28, 2007; pp. 1-3. |
James, Stan; “What is Outfoxed?”; http://getoutfoxed.com/about; printed on Aug. 28, 2007; pp. 1-2. |
Newham, C. et al., “Learning the Bash Shell,” 2nd Ed., O'Reilly & Associates, 1998, p. 13. |
Nemeth, Evi et al., “Linux Administration Handbook”; Prentice Hall; 2006; Chapter 12—TCP/IP Networking, pp. 276-277. |
Silva, G.N., APT HOWTO, Chapter 5—Getting Information about packages, Aug. 2001, http://web.archive.org/web/20010911133902/http://www.debian.org/doc/manuals/apt-howto-ch-sourcehandling.en.html. |
Silva, G.N., APT HOWTO, Chapter 6—Working with source packages, Aug. 2001, http://web.archive.org/web/20010911133902/http://www.debian.org/doc/manuals/apt-howto/ch-sourcehandling.en.html. |
Tanenbaum, Andrew S., “Computer Networks”; Third edition; Prentice Hall; 1996; pp. 29, 44. |
Tanenbaum, Andrew; “Modern Operating Systems”; Second edition; Prentice Hall, Upper Saddle River, NJ; 2001; pp. 753-757. |
YourDictionary.com Remote boot, retrieved on Jan. 5, 2010 from https://www.yourdictionary.com/computer/remote-boot. |
Bhuta et al., “A framework for identification and resolution of interoperability mismatchs in COTS based system”, IEEE IWICCS, 2007, pp. 1-6. |
Chapman et al., “Contemplating systemic software reuse in project centric company”, ACM SAICSIT, 2008, pp. 16-26. |
Gill et al., “Resuability issued in component based development”, ACM, 2003, pp. 1-5. |
Lymer et al., “Experience in using business scenarios to access COTS components in integrated solutions”, ACM, 2005, pp. 1-15. |
Number | Date | Country | |
---|---|---|---|
20070214272 A1 | Sep 2007 | US |