System for ubiquitous network presence and access without cookies
First Claim
Patent Images
1. A method for computer network access comprising the steps of:
- communicating user information to a first server from a client;
storing user information on the first server;
creating a unique identification for the user;
storing the unique identification on the first server;
communicating the unique identification to the client and other servers;
storing the unique identification on the client and other servers; and
matching the unique identification stored on the client to that stored either on the first or other servers when the user correspondingly communicates with either the first or other servers.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for ubiquitous network presence and access without cookies utilizes a unique customer ID that is created for a customer using a client device connected to the Internet and is stored on the device and by other server applications for future automatic authentication and login of the customer when accessing the variety of services available on a business network.
-
Citations
13 Claims
-
1. A method for computer network access comprising the steps of:
-
communicating user information to a first server from a client;
storing user information on the first server;
creating a unique identification for the user;
storing the unique identification on the first server;
communicating the unique identification to the client and other servers;
storing the unique identification on the client and other servers; and
matching the unique identification stored on the client to that stored either on the first or other servers when the user correspondingly communicates with either the first or other servers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A digital computer system programmed to perform the following steps:
-
communicating user information to a first server from a client;
storing user information on the first server;
creating a unique identification for the user;
storing the unique identification on the first server;
communicating the unique identification to the client and other servers;
storing the unique identification on the client and other servers; and
matching the unique identification stored on the client to that stored either on the first or other servers when the user correspondingly communicates with either the first or other servers wherein the other servers correspond to particular services available to the user and wherein the user is not allowed access to the services if the matching step is unsuccessful.
-
-
10. A computer-readable medium storing a computer program implementing a method comprising the steps of:
-
communicating user information to a first server from a client;
storing user information on the first server;
creating a unique identification for the user;
storing the unique identification on the first server;
communicating the unique identification to the client and other servers;
storing the unique identification on the client and other servers; and
matching the unique identification stored on the client to that stored either on the first or other servers when the user correspondingly communicates with either the first or other servers wherein the other servers correspond to particular services available to the user and wherein the user is not allowed access to the services if the matching step is unsuccessful.
-
-
11. A computer network system comprising:
-
a server computer running a server software application operable for creating a unique identification for a user, storing the unique identification on the server computer, communicating the unique identification to a client and authenticating the user via the unique identification when the user communicates with the server computer; and
a client computer running a client software application, said client computer operably connected to the server computer over a network and wherein the client software application is operable for communicating user information to the server application software from the client computer, storing user information on the client computer, and performing the user authentication with the server application. - View Dependent Claims (12, 13)
-
Specification