Filtering for public databases with naming ambiguities
First Claim
1. A method for selectively restricting access to a plurality of network resources accessible through a network, comprising the steps of:
- a) receiving a request for at least one of said plurality of network resources from a user, said request including a first resource identifier and a user identification code;
b) determining whether to submit said first resource identifier to said network by querying a database using said first resource identifier and said user identification code;
c) submitting said first resource identifier to said network;
d) receiving a first response from said network, said first response including a first response resource; and
e) determining whether to forward said first response resource to said user by querying said database using said first response resource and said user identification code.
2 Assignments
0 Petitions
Accused Products
Abstract
Multiple approaches are used with a filter to handle naming ambiguities when requesting access to a plurality of network resources through a public network such as the Internet. One approach is to consider responses from the public network as well as requested URLs in determining whether to allow or deny resources. The response information used may include header information or the resource itself. If the header information includes a new URL, the new URL can be forwarded to the requestor, or submitted to the public network. A permission database is queried to determine whether a resource corresponding to the new URL should be forwarded to the requestor. A checksum database can also be used to determine if a specific resource should be forwarded to the requestor. Another approach is to record and maintain a database of aliases for URLs. When a URL is requested, the alias URLs are determined for that URL. The alias URLs can then be queried in the permission database to determine if the resource corresponding to the aliases can be accessed by the requesting terminal before the URL is requested from the public network.
34 Citations
10 Claims
-
1. A method for selectively restricting access to a plurality of network resources accessible through a network, comprising the steps of:
-
a) receiving a request for at least one of said plurality of network resources from a user, said request including a first resource identifier and a user identification code; b) determining whether to submit said first resource identifier to said network by querying a database using said first resource identifier and said user identification code; c) submitting said first resource identifier to said network; d) receiving a first response from said network, said first response including a first response resource; and e) determining whether to forward said first response resource to said user by querying said database using said first response resource and said user identification code. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A public network resource access system comprising:
-
a processor; a plurality of network resources coupled to said processor through a firewall; at least one user terminal coupled to said processor; and a database coupled to said processor; wherein said processor is programmed to; a) receive a request for at least one of said plurality of network resources from a user, said request including a first resource identifier and a user identification code; b) determine whether to submit said first resource identifier to said network by querying a database using said first resource identifier and said user identification code; c) submit said first resource identifier to said network; d) receive a first response from said network, said first response including a first response resource; and e) determine whether to forward said first response resource to said user by querying said database using said first response resource and said user identification code. - View Dependent Claims (7, 8, 9, 10)
-
Specification