System and method for using internet based caller ID for controlling access to an object stored in a computer
First Claim
Patent Images
1. A system for controlling access to an object comprising:
- an accessible object;
a processor identifier associated with the object;
a verification agent for accessing information embedded in a processor and calculating from that embedded information a value that may be compared with the processor identifier; and
a comparison agent for comparing the value with the processor identifier to determine whether the processor corresponds to the processor identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling access to an object. The system stores an object and a processor identifier. The system includes a verification agent that can access information embedded in a processor and then calculate from that embedded information a value that may be compared with the stored processor identifier. A comparison agent is used to compare that value with the processor identifier to determine whether the processor corresponds to the processor identifier. If the value that the verification agent returns matches the processor identifier, then the computer grants the user access to the object.
-
Citations
41 Claims
-
1. A system for controlling access to an object comprising:
-
an accessible object;
a processor identifier associated with the object;
a verification agent for accessing information embedded in a processor and calculating from that embedded information a value that may be compared with the processor identifier; and
a comparison agent for comparing the value with the processor identifier to determine whether the processor corresponds to the processor identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 41)
-
- 8. A machine readable storage medium having stored therein programming instructions which, when executed by a central processing unit, permit access to information embedded in a processor and subsequently calculate from that embedded information a value that may be compared with a processor identifier stored in a server.
-
13. A system for controlling access to an object comprising:
-
means for storing the object;
means for storing a processor identifier;
means for accessing information embedded in a processor;
means for calculating from that embedded information a value that may be compared with the processor identifier; and
means for comparing the value with the processor identifier to determine whether the processor corresponds to the processor identifier.
-
-
17. A method for controlling access to an object comprising the steps of:
-
storing the object in a computer;
storing a processor identifier in the computer;
accessing information embedded in a processor;
calculating from that embedded information a value that may be compared with the processor identifier; and
comparing the value with the processor identifier to determine whether the processor corresponds to the processor identifier.
-
-
20. A method for enabling a platform to access via the Internet an object stored on a web server comprising:
-
storing a platform identifier on the web server;
receiving a request from a platform for access to the object;
initiating a dynamic call-back process for dynamically accessing a hardware based platform identifier associated with the platform;
comparing the platform identifier associated with the platform to the platform identifier stored on the web server; and
granting access to the object if the platform identifier associated with the platform matches the platform identifier stored on the web server.
-
-
21. A method for connecting a platform to a conference, comprising:
-
receiving a request to access a conference from a platform having a platform identifier;
checking the platform identifier against a set of platform identifiers that are authorized to participate in the conference; and
allowing the platform to join the conference if its platform identifier matches one included in the set of platform identifiers. - View Dependent Claims (22, 23, 25, 26, 27, 28, 30, 31)
-
-
24. A method for restricting access to a web site, comprising:
-
receiving a request to access the web site from a platform having a platform identifier;
checking the platform identifier against a set of platform identifiers that are authorized to access the web site; and
allowing the platform to access the web site if its platform identifier matches one included in the set of platform identifiers.
-
-
29. A method for permitting access to a web site, comprising:
-
receiving a request to access the web site from a user having a user identification and a password, and using a platform having a hardware based platform identifier;
checking the user'"'"'s identification and password for authorization to access the web site;
checking the platform identifier; and
allowing the user to access the web site.
-
-
32. A method for tracking a platform'"'"'s web surfing activity, comprising:
recording a platform'"'"'s hardware based platform identifier when the platform accesses a web site. - View Dependent Claims (33, 34, 35, 36, 37, 39, 40)
-
38. A method for permitting access to a server through a virtual private network, comprising:
-
receiving a request to access the server from a remote user having a certificate for verifying the user'"'"'s identity and public key, and using a platform having a hardware based platform identifier;
decrypting the certificate using a certificate authority'"'"'s public key;
checking the platform identifier; and
allowing the user to access the server.
-
Specification