URL login
First Claim
1. A method for logging into restricted computer system resources using a universal resource locator ("URL"), comprising the steps of:
- (a) receiving input from a user indicating a URL referencing a login object;
(b) applying the URL to the login object;
(c) if the login object does not require a challenge, then permitting access by the user to contents of the login object, and otherwise;
(1) indicating the need for a challenge;
(2) retrieving a challenge object indicated by the login object;
(3) rendering the challenge object to the user;
(4) accepting login information from the user;
(5) applying the login information to the login object;
(6) permitting access by the user to contents of the login object in response to valid login information.
3 Assignments
0 Petitions
Accused Products
Abstract
A universal resource locator ("URL") login system. The invention makes full use of the internet/intranet concept by using a URL instead of a specific home directory as a fixed location to control and access a login function. The URL login function causes objects to be collected from various locations on a network and brought to a local client computer system where they are rendered. The content of one URL may reference another URL, so that a compound object is created comprising a collection of objects drawn from various storage locations on a network. The invention permits a user to access the user'"'"'s private information and personal desktop no matter where the user is located. Accordingly, a user can use public computer systems to fully access private networks. Upon a successful login, the invention fetches objects from remote locations and instantiates them locally for the duration of the user'"'"'s session. The user need only tell, via a URL, a local client computer system where the objects are located, and if required, the login system of the invention will return a challenge for access. The challenge is for access to the desired object, and not access to a particular computer system.
107 Citations
12 Claims
-
1. A method for logging into restricted computer system resources using a universal resource locator ("URL"), comprising the steps of:
-
(a) receiving input from a user indicating a URL referencing a login object; (b) applying the URL to the login object; (c) if the login object does not require a challenge, then permitting access by the user to contents of the login object, and otherwise; (1) indicating the need for a challenge; (2) retrieving a challenge object indicated by the login object; (3) rendering the challenge object to the user; (4) accepting login information from the user; (5) applying the login information to the login object; (6) permitting access by the user to contents of the login object in response to valid login information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for logging into restricted computer system resources using a universal resource locator ("URL"), comprising:
-
(a) means for receiving input from a user indicating a URL referencing a login object; (b) means for applying the URL to the login object; (c) means for permitting access by the user to contents of the login object if the login object does not require a challenge, and otherwise for; (1) indicating the need for a challenge; (2) retrieving a challenge object indicated by the login object; (3) rendering the challenge object to the user; (4) accepting login information from the user; (5) applying the login information to the login object; (6) permitting access by the user to contents of the login object in response to valid login information. - View Dependent Claims (7, 8)
-
-
9. A computer program, residing on a computer-readable medium, for logging into restricted computer system resources using a universal resource locator ("URL"), the computer program comprising instructions for causing a computer to:
-
(a) receive input from a user indicating a URL referencing a login object; (b) apply the URL to the login object; (c) if the login object does not require a challenge, then permit access by the user to contents of the login object, and otherwise; (1) indicate the need for a challenge; (2) retrieve a challenge object indicated by the login object; (3) render the challenge object to the user; (4) accept login information from the user; (5) apply the login information to the login object; (6) permit access by the user to contents of the login object in response to valid login information. - View Dependent Claims (10, 11, 12)
-
Specification