SYSTEM AND METHOD FOR CONTROLLING ACCESS TO INTERNET SITES
First Claim
1. A method of managing access to an Internet content identified by a uniform resource locator (URL), comprising:
- receiving, via a computing device, a request to access content associated with the URL;
transmitting a response to the request, the response indicating that access to the URL is restricted;
receiving a second request to access the content associated with the URL, the second request acknowledging that access to the URL is restricted;
logging the second request; and
transmitting a second response to the second request, the second response allowing access to the requested content associated with the URL.
12 Assignments
0 Petitions
Accused Products
Abstract
A method and system for providing flexible access to Internet sites is described. In one aspect, a method includes receiving, via a computing device, a request to access content associated with the URL. The method further includes transmitting a response to the request, the response indicating that access to the URL is restricted, receiving a second request to access the content associated with the URL, the second request acknowledging that access to the URL is restricted, logging the second request; and transmitting a second response to the second request, the second response allowing access to the requested content associated with the URL.
36 Citations
20 Claims
-
1. A method of managing access to an Internet content identified by a uniform resource locator (URL), comprising:
-
receiving, via a computing device, a request to access content associated with the URL; transmitting a response to the request, the response indicating that access to the URL is restricted; receiving a second request to access the content associated with the URL, the second request acknowledging that access to the URL is restricted; logging the second request; and transmitting a second response to the second request, the second response allowing access to the requested content associated with the URL. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of accessing a URL, comprising:
-
transmitting, via a computing device, a request to access content associated with the URL; receiving a response to the request, the response indicating that access to the URL is restricted; transmitting a second request to access the content associated with the URL, the second request acknowledging that access to the URL is restricted; and receiving a second response to the second request, the second response comprising the requested content. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for managing access to content associated with a uniform resource locator (URL), comprising:
-
one or more processors; one or more memories, each memory coupled to at least one of the one or more processors, and collectively configured to store instructions that when executed, cause the one or more processors to perform a method of; receiving, via a computing device, a request to access content associated with the URL; transmitting a response to the request, the response indicating that access to the requested content is restricted; receiving a second request to access the requested content, the second request acknowledging that access to the requested content is restricted; logging the second request; and transmitting a second response to the second request, the second response allowing access to the requested content associated with the URL. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification