Access control system and method for a networked computer system
First Claim
1. An access control system for use with a networked computer system, the system comprising:
- a host of the networked computer system;
a bit stream whereby information is transferred from a source of said bit stream to said host, said bit stream bearing a routing label identifying an origin of said bit stream in the computer network;
a word integrated with said bit stream, said word including a routing label identifying an origin of said word in the computer network; and
an access control module in communication with said host, said access control module operable to make an identification, wherein the identification includes comparing the origin of said bit stream to the origin of said word.
5 Assignments
0 Petitions
Accused Products
Abstract
An access control system for use with a networked computer system [10] comprises a host [14] of the networked computer system, and a bit stream whereby information is transferred from a source of said bit stream to said host [14], said bit stream bearing a routing label identifying an origin of said bit stream in the computer network. The system further comprises a word integrated with said bit stream, said word including a routing label identifying an origin of said word in the computer network, and an access control module in communication with said host, said access control module operable to make an identification, wherein the identification includes comparing the origin of said bit stream to the origin of said word.
-
Citations
20 Claims
-
1. An access control system for use with a networked computer system, the system comprising:
-
a host of the networked computer system;
a bit stream whereby information is transferred from a source of said bit stream to said host, said bit stream bearing a routing label identifying an origin of said bit stream in the computer network;
a word integrated with said bit stream, said word including a routing label identifying an origin of said word in the computer network; and
an access control module in communication with said host, said access control module operable to make an identification, wherein the identification includes comparing the origin of said bit stream to the origin of said word. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An access control method for use with a server system over a computer network, the method comprising:
-
receiving a bit stream from a source of the bit stream, the bit stream bearing a routing label identifying an origin of the bit stream in the computer network, wherein a word is integrated with said bit stream, the word including a routing label identifying an origin of said word in the computer network; and
comparing the origin of the bit stream to the origin of the word. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A propagating wave for use with an access control system of a server system over a computer network, the wave comprising:
-
a routing label operable to identify an origin of client transmission in the computer network; and
a word generated by a client of the server system, the word including the routing label. - View Dependent Claims (18, 19, 20)
-
Specification