1. Field of the Invention
Embodiments of the present invention relate to the field of back end server applications. More particularly, embodiments of the present invention relate generally to providing an automatic interface between a back end server application that is a human resources management application and a user through a messaging environment.
2. Related Art
Human resources management applications provide a platform to manage administrative costs in areas such as delivering training, tracking performance, invoicing, and other related professional services. The human resources management applications improve administrative efficiencies by assessing gaps in current skills and certifications of employees of a corporation, plan training to close those gaps, improve learning of employees through training offerings, and improve performance of the employees.
Typically, deployment of a human resource management application is centralized to allow administrators across a corporation to quickly access human resource data. However, progress reporting of employees within the human resource application can be a tedious process. An administrator, or employee, needs to log into the human resource application, navigate to the correct page or screen, and update the progress of each entry individually.
As such, the user must have knowledge of the human resource application in order to effectively navigate to the correct screen for interacting with the human resource application. This is problematic when users (e.g., employees of a corporation) who are not especially familiar with the system are asked to track progress for a particular goal (e.g., sales goals) assigned to that user. As a result, users who have a difficult time navigating through the human resource application may choose not to use the human resource application to track their progress, thereby nullifying the benefits provided by the human resource application to the corporation.
A method and system for supporting interaction with a back end server application through a messaging environment. Specifically, in accordance with one embodiment of the present invention, the method determines when an event occurs. Occurrence of the event is monitored within the back end server application. For instance, an event may consist of the passing of a date requiring an update or report of the goals of an employee of a corporation. The event allows for an action, in response to the event, to be taken by a user within the back end server application.
A notification message is generated informing the user of the event. The notification message is rendered to comply with a format supporting the messaging environment. For example, the format may support an e-mail messaging environment, or a calendaring environment. The rendered notification message enables the user to take the action within the back end application without having the user directly open the back end server application. That is, the user is presented access to the particular screen or page that is used for interfacing with the user in order to service the action taken by the user. The rendered notification message is sent to an electronic device associated with the user to facilitate interfacing between the user and the back end server application.
In accordance with another embodiment of the present invention, a system for interfacing with a back end server application through a messaging environment is disclosed. The system includes a notification module for generating a notification message informing a user of an event. The notification module also tracks or monitors the occurrence of the event. Occurrence of the event allows for a response or action, in response to said event, to be taken by a user within the back end server application. For example, when the event is the passing of a date for requiring updates for goal progress of an employee of a corporation, the action taken by the employee is to update his or her goal progress within the back end server application.
The system also includes a rendering module. The rendering module renders the notification message in such a way to comply with a format supporting the messaging environment. That is, the notification is presented to the user within messaging environment, such as within an e-mail. In addition, the notification message that is rendered enables the user to take the action without having the user directly open the back end server application. That is, the user is seamlessly presented with an interface to the back end application directly through the messaging environment.
In addition, the system also includes an authentication module. The authentication module automatically authenticates the user with the back end server application to provide to the user seamless access to the back end server application. For example, in one embodiment, the authentication module relies on the authentication by the messaging environment for the user to provide authentication to the back end server application for the user. In another embodiment, an authentication certificate is provided within the notification message that is rendered. When interfacing with the back end server, the certificate is automatically presented for authentication.
Reference will now be made in detail to the preferred embodiments of the present invention, a method and system for interfacing with a back end server application through a messaging environment, examples of which are illustrated in the accompanying drawings.
Accordingly, various embodiments of the present invention disclose a method and system for supporting interaction with a back end server application that is pushed onto a user of the system. That is, information is presented to a user automatically at an appropriate time within a messaging environment. The message that is presented also enables the user to take action within the back end server application without having the user directly open the back end server application. As a result, embodiments of the present invention provide timely and seamless interfacing with a back end server application.
Referring now to
Exemplary electronic system 100 includes an address/data bus 120 for communicating information, a central processor 101 coupled with the bus 120 for processing information and instructions, a volatile memory 102 (e.g., random access memory (RAM), static RAM dynamic RAM, etc.) coupled with the bus 120 for storing information and instructions for the central processor 101, and a non-volatile memory 103 (e.g., read only memory (ROM), programmable ROM, flash memory, EPROM, EEPROM, etc.) coupled to the bus 120 for storing static information and instructions for the processor 101.
Exemplary electronic system 100 also includes an optional data storage device 104 (e.g., cache memory, memory card, hard drive, etc.) coupled with the bus 120 for storing information and instructions. Data storage device 104 is removable, in one embodiment. With reference still to
Some portions of the detailed descriptions which follow are presented in terms of procedures, steps, logic blocks, processing, and other symbolic representations of operations on data bits that can be performed on computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, computer executed step, logic block, process, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as “determining,” “generating,” “rendering,” “sending,” “authenticating,” or the like, refer to the actions and processes of a computer system, or similar electronic computing device, including an embedded system, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
Now referring to
The back end server 210 provides a centralized access to the back end server application 220 for a plurality of users, such as human resource administrators or employees of a corporation. The back end server application 220 provides management functionality through an integrated internet-based platform to manage learning of employees, content of databases, performance of employees, talent assessment of employees, and collaboration between employees of a corporation. For instance, the back end server application can track progress of specified goals (e.g., sales goals) of an employee or a group of employees of a corporation, or to manage the scheduling of an employee who is performing tasks to complete a certificate, and other business related services.
As shown in
The message complies with a format of the messaging environment. For example, in one embodiment, the message complies with an e-mail format that is supported by an e-mail messaging environment. In another embodiment, the message complies with a calendaring format that is supported by a calendaring environment. The messaging application 250 at the electronic device 240 allows the user to read the message and interface with the back end server application through the message.
In one embodiment, the message enables the user to interface with the back end server application 220 through a browser. More specifically, the messaging application is able to launch a browser application 260 within the electronic device 240 when the user indicates that an interaction with the back end server 210 is necessary. As such, the messaging application is able to open a browser application 260 which communicates with the back end server application 220 through the internet 230 to retrieve the corresponding web page that allows the user to interface with the back end server application 220. In one embodiment, the web page is integrated back within the message. For instance the web page is contained as active content within an inline frame of the message.
The notification engine 310 includes an event tracker 313 and a message generator 315. In general, the notification engine 310 generates a notification message informing the user of an event. The event allows for, or requires, an action to be taken by the user in response to the event. The action is executed within the back end server application. Various examples of events and follow-on actions that are taken by the user are presented in
The event tracker 313 monitors the data within the back end server application to determine the occurrence of the event. Various events include, as an example, the passing of a periodic date requiring updating or review of goals assigned to various users of the back end server application that are associated with a corporation.
In addition, the message generator 315 generates the notification message that notifies the user of the event. The message generator 315 is invoked though a java action, in one embodiment, in response to the event. That is, for each event (e.g., a periodic event), a pre-defined java action is responsible for generating the content of the notification message, and for sending the notification message to the user through the messaging environment.
The rendering module 320 renders the notification message to comply with a format supporting the messaging environment. That is, the rendering module 320 transforms the notification message to be compatible with the messaging environment. For example, the notification message complies with an e-mail messaging format that is supported within an e-mail messaging environment, in one embodiment. In another embodiment, the notification message complies with a calendaring format that is supported within a calendaring environment, in one embodiment.
In one embodiment, the notification message that is rendered enables the user to take an action within the back end server application. More specifically, the notification message enables the user to interface with the back end server application to perform the action in response to the event without having the user directly open the back end server application.
In one embodiment, the interface is accomplished by including an IFRAME element as defined by the hypertext markup language (HTML) that describes an inline frame for the inclusion of external objects within the notification message. In the present embodiment, the external object is the web page of the back end server that provides an interface with the user to perform the action in response to the event.
In another embodiment, the interface is accomplished by including a deep link to a web page within the notification message. In the present embodiment, the web page of the back end server provides an interface with the user to perform the action in response to the event.
In still another embodiment, an action button is provided within the notification message. The action button when invoked accesses a web page of the back end application. In one embodiment, the active button invokes a deep link to the web page. The web page services the action to be taken by the user. In addition, active content from the web page is displayed through an inline frame of the message, in one embodiment.
The system 300 also includes an authentication module 330. The authentication module 330 automatically authenticates the user with the back end server application to enable direct interfacing with the back end server application. That is, the authentication module enables the user to have seamless access to the back end server application.
Referring now to
At 410, the present embodiment determines when an event occurs. More specifically, the event triggers a response by a user of the back end server. That is, the event allows for an action to be taken by the user in response to the event.
For example, in a goal oriented management environment, certain goals that define a purpose toward which an endeavor is directed are tracked to determine the progress of the goal. As such, at periodic intervals, these goals are reviewed and updated by the user associated with those goals. The present embodiment, determines when the periodic event has occurred, such as, the passing of a 1 or 2 week interval.
In a learning oriented environment, certain learning tasks are pushed onto the user at pre-designated times. For example, if the user is trying to obtain a certificate, a number of tasks need completion before qualifying for the certificate. The present embodiment is able to determine when the event occurs that indicates that a learning task is necessary to be performed, such as the completion of a class toward certificate completion.
At 420, the present embodiment generates a notification message informing the user of the event. More specifically, the notification message provides details as to the event, and determines the appropriate list of actions to be taken by the user in response to the event.
The present embodiment also identifies the user from a plurality of users supported by the back end server. That is, the user and group of users associated with the event are identified. Thereafter, the present embodiment, determines the message address for each of the users identified so that the notification message can be sent to those users.
At 430, the present embodiment renders the notification into a format that complies with the messaging environment. That is, the present embodiment transforms the notification message into a format compatible with the messaging environment. For example, the format is an e-mail format to be used within an e-mail messaging environment, in one embodiment, or the format is a calendaring format to be used within a calendaring environment, in another embodiment.
As such, the present embodiment is able to provide a seamless interface to the back end server. More specifically, the notification message that is rendered enables the user to take the action, that is in response to the event. The action is taken directly within the back end application without having the user directly open the back end server application. That is, the user is presented with the correct web page, or screen, or user interface in the back end server application within the body of the notification message so that the user can directly interface with the back end sever application to accomplish the required action.
In one embodiment, during the rendering process, an action button for accessing a web page that services the action taken by the user in response to the event is provided in the message. More specifically, active content from the web page is displayed through an inline frame (e.g., IFRAME) of the message when the button is invoked or engaged.
In another embodiment, during the rendering process, a deep link to a web page of the back end server is provided. The web page services the action taken by the user in response to the event.
At 440, the present embodiment, sends the notification message that is rendered to an electronic device associated with the user. As such, the present embodiment facilitates the direct interfacing between the user and the back end server application through the notification message.
At 450, the present embodiment optionally provides for automatic authentication of the user with the back end server. Automatic authentication enables seamless access by the user to the back end server application. In that way, the user need not navigate through a log-in process that authenticates the user with the back end server.
Various embodiments are implemented to enable the automatic authentication of the user with the back end server. In one embodiment, the authentication is provided from the authentication process used by the user within the messaging environment. That is, once the user is authenticated within the messaging environment, the user is also authenticated within the back end server application. As such, when the user opens the notification message, the user is automatically authenticated with the back end server application.
In another embodiment the authentication is provided in a web server single-sign-on process. That is, the back end server application performs the authentication for the user. As such, the user need not type in a username/password in the message in order to view the content.
In still another embodiment, the authentication is provided by an auto-login process. That is, the user can enable the auto login process that automatically logs the user into the back end server whenever the user is accessing the back end server. More specifically, a business rule is implemented for the auto-login process, in one embodiment. If the business rule is “ON”, a “Remember Me” option is provided in the login screen. As such, when the “Remember Me” option is selected by the user, the present embodiment presents the login screen with the username/password pre-filled in the screen. Thereafter, the user need only click the “GO” button to log into the back end server application.
In still another embodiment, the authentication is provided in a certificate based process. More specifically, an authentication certificate is embedded in a deep link universal resource locator (URL) that automatically authenticates the user. That is, the certificate is included within the notification message that is sent to the user. A return to the back end server through the notification message will include the certificate.
As long as the certificate is valid, the user accessing the back end server application is authenticated. That is, upon detection of the certificate, the back end server application bypasses the standard login process. As such, the user is given access to the back end server application.
On the other hand, if the certificate has expired when the user presents the certificate, a login screen is presented to the user, in accordance with one embodiment of the present invention.
To implement the certificate used for authentication, one embodiment of the present invention uses an API for generating the certificate for the user. This API can only be used for the user to whom the notification including the certificate was sent. The API will throw an exception when another user tries to use the certificate.
In accordance with one embodiment of the present invention, two business rules are implemented to support the certificate based authentication process. The business rules are domain based, in one embodiment. In another embodiment, the business rules are non-domain based. A first rule enables the embedded certificate in a deep link. The second rule provides an “expiration time” for the certificate. After the time has expired, the certificate is invalid.
Turning now to
As shown in
The notification message in the screen shot 500A includes an inline frame 505 that provides an interface to the back end server application. That is, the present embodiment enables the user to update associated goals within a back end server application within an inline frame (e.g., IFRAME) 505 that provides active content of the back 25, end server application of the notification message. That is, the inline frame 505 provides the interface to the specific web page of the back end server for updating goal progress.
As shown in
Additionally, the screen shot includes a percentage completed that quickly informs how much of the goal has been accomplished. As show in
Also, instructions for the user in the form of page text can be provided within the notification message of
Further, clicking on the title brings up a read-only goal detail page. More specifically, the e-mail notification message essentially contains embedded HTML that, when rendered by an e-mail client, permits the content to be viewed essentially as a web page. For example, by clicking on the title, “Testing Review 2,” the page represented by screen shot 500B of
As shown in
Moreover, clicking on the status of the entry for each of the goals will bring up a popup window in the notification message that permits the updating of the goal progress for the entry selected. For example, clicking on the status of “Testing Review 2,” the page represented by screen shot 500C of
As shown in
Turning now to
As shown in
As shown in
Details of the class are also provided in the notification message of screen shot 600A. For example, the title of the class is presented, that the class is instructor led is presented, the start and end dates are presented, and a drop policy is represented in the notification message of screen shot 600A. In addition, the notification message also indicates that a manager approval is required.
The notification message in the screen shot 600A includes an action button that facilitates an interface to the back end server application that registers the user for the class. For example, the “Class A” may be a prescribed class assigned to user within a particular time period. As such, the notification message enables the user to register for the prescribed class through a web page of the back end application. In one embodiment, this web page is presented by invoking the register button 605. In another embodiment the user is automatically registered for the class by invoking the register button 605.
In still another embodiment, the notification message provides access to a web page displaying a catalogue of classes applicable to the user. For instance, the web page is presented to the user in the notification message as active content in an inline frame, in one embodiment. The web page of the back end server enables the user to register for any selected class in the catalogue.
Turning now to
As shown in
As shown in
The notification message in the screen shot 600B includes action buttons that facilitates an interface to the back end server application that can register User Three for the class. That is, the present embodiment provides a rejection button 610 for denying authorization to register for the class by the User Three. By invoking the rejection button 610, the present embodiment automatically prevents User Three from registering for the “Class A.”
In addition, the present embodiment provides an approve button 620 for approving authorization to register for the class by User Three. By invoking the approve button 620, the present embodiment automatically registers User Three into the “Class A.” The necessary procedures for enrolling User Three into the “Class A” are performed, and a confirmation is sent to User Three.
Turning now to
As shown in
As shown in
In still another embodiment, the event that occurs is an offer for registration to a prescribed web based training class (WBT). In this case, the notification message includes information that describes the WBT class to educate the user in making a decision to register for the class or to decline registration.
The present embodiment provides a deep link to the WBT class that automatically launches the WBT class. For example, an “Accept” button is presented to the user in the notification message for accepting registration of the WBT class. When the user invokes the “Accept” button, the deep link is invoked. As such, the WBT class is automatically launched and presented to the user.
At 710, the present embodiment identifies an event that is recorded within the database. That is, details of the event are provided to the notification engine (e.g., engine 310) that is driven off database tables so that the event can be monitored. In addition, the present embodiment generates a notification of the event in response to the event.
Table 1 is an exemplary pseudo code for identifying and monitoring an event within a database as implemented at 710, as follows. In particular, an event is identified by title as “Goal Progress Email.” The pseudo code calls a database stored procedure to create a row in a table to register the identified event. The pseudo code of Table 1 provides details of the event, such as a unique identifier “nevnt000000000006073”, a description, etc.
At 720, the present embodiment creates a query for the event that searches for associated users. That is, the query returns the identifiers (id's) of the user to whom the notification (e.g., an E-mail) is sent. As such, the notification engine (e.g., engine 310) will query a database to select the users to whom the notification will be sent.
Table 2 is an exemplary pseudo code for associating the query to be used with the notification event at 720 of flow chart 700, in accordance with one exemplary embodiment of the present invention, as follows.
At 730, the present embodiment creates a java action that is invoked by the notification engine (e.g., engine 310) when the event occurs. In the present embodiment, the notification engine executes a java code.
Table 3 is an exemplary pseudo code for creating the java action at 730 of flow chart 700, in accordance with one exemplary embodiment of the present invention, as follows. As shown in Table 3, once the notification engine (e.g., engine 310) discovers an event, the “GoalProgressJavaACtion” java code is invoked.
At 740, the present embodiment creates the java class called at 730 of flow chart 700. For example, the java class of the example illustrated in Tables 1-3 is the “GoalPrgressJavaAction” class. In one embodiment, the java class created extends from the “OutlookNotifyJavaAction” super class, as will be described more fully below in relation to Table 5.
At 750, the present embodiment creates a deep link to the web page that is utilized in the java class created at 740. The deep link provides a user direct access to the web page for interfacing, in response to the notification. At 750, if the web page has not been generated, the web page can also be generated through any web page generation technique.
Table 4 is an exemplary pseudo code for an interface including a method that identifies a java class that can be called from the database, in accordance with one embodiment of the present invention. More specifically, the pseudo code in Table 4 is an interface for which all notification, execute actions implement. That is, the notification engine (e.g., engine 310) calls up the method of Table 4 for an interface to call various execute action methods.
Table 5 is an exemplary pseudo code for creating the class, “OutlookNotifyJavaAction”, which is an abstract class that generally defines the category of actions that generate the notifications (e.g., I-frame), in accordance with one exemplary embodiment of the present invention, as follows. The “OutlookNotifyJavaAction” is a super class of these actions. In particular, the pseudo code of Table 4 includes key words for substituting information particular to the user receiving the notification for the key word. Also, the content of the e-mail is defined in Table 4. In addition, the java interface of Table 4 identifies the execute action. The execute action lists the recipients of the e-mail that are stored in a database. Thereafter, the pseudo code of Table 4 generates the e-mail for each of the users and sends the e-mail to the user. In the specific embodiment, the e-mail is generated through an “OutlookEmail.xml” code, as presented in Table 6, below.
The pseudo code of Table 5 retrieves the E-mail content for generating the E-mail at the section of the code with the string “getEmailContent”. More specifically, the code provides for retrieving the deep link to the URL used in the e-mail, the certificate used to authenticate the user, the content of the e-mail, etc.
In addition, the pseudo code lists abstract methods that are implemented by the various notification methods. For example, abstract methods, such as, “Get the name of the Deep Link”, “Get the Subject for the Email”, etc. are defined.
Also, the pseudo code checks for the system preference of implementing the security features for authenticating a user who is accessing a web page through the notification. For example, the string of the code “addCertificateinfo” is used to define certificate information used to authenticate the user.
Table 6 is an exemplary pseudo code for creating the class, “NotificationUtil”, for generating a method “SendMail” for sending the e-mail message in a messaging environment to users in response to an event, in accordance with one exemplary embodiment of the present invention, as follows.
Table 7 is an exemplary pseudo code for creating the utility class, “OutlookEmail.xml”. This is the template for the hypertext markup language (html) that is embedded in the e-mail notification message, in accordance with one embodiment. The pseudo code of Table 7 generates the I-frame that is used for linking to a particular web page through deep linking.
Table 8 is an exemplary pseudo code for creating the class, “deepLinkURLGenerator”. This pseudo code generates the deep link URL, as follows.
Table 9 is an exemplary pseudo code for creating the class, “GoalProgressJavaAction”. Once the notification engine (e.g., engine 310) discovers an event, the “GoalProgressJavaACtion” java code is invoked. That is, the pseudo code shows how a specific notification message is implemented.
As shown in
More specifically, the servlet 820 passes the request to a deep link handler 830, which processes the request 810. More specifically, the servlet 820 delegates requests to one or more handlers depending on the specific type of request.
The deep link handler 830 identifies the user through the login context block 840. More specifically, the deep link handler 830 authenticates the user, as previously described.
The deep link handler is also able to generate the application page URL for the deep link by reading the deep link XML file 850. This deep link XML file 850 is a configuration file that maps the deep link URL to an actual web page, and identifies the parameters for the page.
Tables 10-12 provide examples of the values for the deep link xml file 850 of
Table 11 is the XML Schema definition for the deep link metadata file.
Table 12 provides an example of the deep link metadata definition used for the goal progress e-mail as previously presented in various tables.
Accordingly, various embodiments of the present invention disclose a method and system for supporting interaction with a back end server application that is pushed onto a user of the system. That is, information is presented to a user automatically at an appropriate time within a messaging environment. In embodiments of the present invention, the message that is presented also enables the user to take action within the back end server application without having the user directly open the back end server application. As a result, embodiments of the present invention provide timely and seamless interfacing with a back end server application.
While the methods of embodiments illustrated in flow charts 400 and 700 show specific sequences and quantity of steps, the present invention is suitable to alternative embodiments. For example, not all the steps provided for in the method are required for the present invention. Furthermore, additional steps can be added to the steps presented in the present embodiment. Likewise, the sequences of steps can be modified depending upon the application.
Embodiments of the present invention, a method and system for testing network configurations using a common test interface are described. While the invention is described in conjunction with the preferred embodiments, it is understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be recognized by one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
Number | Name | Date | Kind |
---|---|---|---|
5721825 | Lawson et al. | Feb 1998 | A |
5828882 | Hinckley | Oct 1998 | A |
6094681 | Shaffer et al. | Jul 2000 | A |
6134658 | Multerer et al. | Oct 2000 | A |
6167448 | Hemphill et al. | Dec 2000 | A |
6416328 | Callahan | Jul 2002 | B1 |
6477548 | Nihei | Nov 2002 | B1 |
6490574 | Bennett et al. | Dec 2002 | B1 |
6584502 | Natarajan et al. | Jun 2003 | B1 |
6587668 | Miller et al. | Jul 2003 | B1 |
6594466 | Harned et al. | Jul 2003 | B1 |
6652283 | Van Schaack et al. | Nov 2003 | B1 |
6769010 | Knapp et al. | Jul 2004 | B1 |
6807577 | Gillespie et al. | Oct 2004 | B1 |
6892307 | Wood et al. | May 2005 | B1 |
6907455 | Wolfe et al. | Jun 2005 | B1 |
6938076 | Meyer et al. | Aug 2005 | B2 |
6976164 | King et al. | Dec 2005 | B1 |
6988138 | Alcorn et al. | Jan 2006 | B1 |
7113933 | Imholte | Sep 2006 | B1 |
7330817 | Exall et al. | Feb 2008 | B1 |
20010001143 | Jones et al. | May 2001 | A1 |
20020059373 | Boys | May 2002 | A1 |
20020059380 | Biliris et al. | May 2002 | A1 |
20020064766 | Cozens et al. | May 2002 | A1 |
20020118583 | Nakazono | Aug 2002 | A1 |
20020129354 | Bryan et al. | Sep 2002 | A1 |
20020138325 | Mashimo et al. | Sep 2002 | A1 |
20020188607 | Kogut-O'Connell et al. | Dec 2002 | A1 |
20030002634 | Gupta et al. | Jan 2003 | A1 |
20030009602 | Jacobs et al. | Jan 2003 | A1 |
20030055699 | O'Connor | Mar 2003 | A1 |
20030110215 | Joao | Jun 2003 | A1 |
20030142797 | Troy et al. | Jul 2003 | A1 |
20030154254 | Awasthi | Aug 2003 | A1 |
20030172077 | Moussavian | Sep 2003 | A1 |
20030187925 | Inala et al. | Oct 2003 | A1 |
20030232315 | Pfund | Dec 2003 | A1 |
20040002958 | Seshadri et al. | Jan 2004 | A1 |
20040015549 | Saruhashi et al. | Jan 2004 | A1 |
20040033475 | Mizuma et al. | Feb 2004 | A1 |
20040044736 | Austin-Lane et al. | Mar 2004 | A1 |
20040073601 | Darago et al. | Apr 2004 | A1 |
20040088177 | Travis et al. | May 2004 | A1 |
20040098459 | Leukert-Knapp et al. | May 2004 | A1 |
20040153508 | Alcorn et al. | Aug 2004 | A1 |
20040153509 | Alcorn et al. | Aug 2004 | A1 |
20040172320 | Spellman et al. | Sep 2004 | A1 |
20040181581 | Kosco | Sep 2004 | A1 |
20040230661 | Rashid et al. | Nov 2004 | A1 |
20050055238 | Wisnosky et al. | Mar 2005 | A1 |
20050108030 | Kim | May 2005 | A1 |
20050177730 | Davenport et al. | Aug 2005 | A1 |
20050181775 | Rideout et al. | Aug 2005 | A1 |
20050195076 | McCulloch et al. | Sep 2005 | A1 |
20050209914 | Nguyen et al. | Sep 2005 | A1 |
20060136933 | Jensen et al. | Jun 2006 | A1 |
Number | Date | Country |
---|---|---|
1542479 | Jun 2005 | EP |
Entry |
---|
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems, Park et al., Computer Networks, 44, pp. 267-273, 2004. |