US20070219881A1 - Method and system for tracking computer system usage through a remote access security device - Google Patents
- ️Thu Sep 20 2007
Info
-
Publication number
- US20070219881A1 US20070219881A1 US11/650,300 US65030007A US2007219881A1 US 20070219881 A1 US20070219881 A1 US 20070219881A1 US 65030007 A US65030007 A US 65030007A US 2007219881 A1 US2007219881 A1 US 2007219881A1 Authority
- US
- United States Prior art keywords
- host computer
- user
- computer
- remotely located
- computer networks Prior art date
- 1998-01-16 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000004891 communication Methods 0.000 claims abstract description 24
- 238000012544 monitoring process Methods 0.000 claims abstract description 11
- 101100025807 Caenorhabditis elegans nas-30 gene Proteins 0.000 description 8
- 230000008520 organization Effects 0.000 description 6
- 230000000737 periodic effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001684 chronic effect Effects 0.000 description 1
- 238000007596 consolidation process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/1091—Recording time for administrative or management purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
- G06Q40/123—Tax preparation or submission
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Definitions
- the present invention relates to a system and method for monitoring access to each of a plurality of unrelated host computer networks. More particularly, the present invention relates to a system and method of tracking computer usage, and costs associated with the computer usage, by authorized users of different computer networks.
- each organization's computer facility tracks computer usage internally and generates various reports based on that information. Also, the costs associated with remotely dialing up an organization's computer facilities, such as the telephone line charges, are reported separately by each of the one or more long distance line carriers utilized by the remotely located computer users. Additional costs of maintaining a remotely accessible computer network, such as supporting an information services person or department to handle difficulties with remote access by authorized users, may take up significant resources particularly in smaller organizations.
- FIG. 1 illustrates a preferred embodiment of a system for monitoring computer usage and costs associated with remote access according to the present invention.
- FIG. 2 is a flow chart showing a preferred method of monitoring computer usage and costs using the system of FIG. 1 .
- An advantage of the present invention is consolidation of usage and billing information in a single report.
- Another advantage of the present invention is the ability to manipulate the usage and billing data for each of a number of different host computer networks by individual user and by predetermined groups or departments of users at each organization.
- the preferred method and system cooperate with a system for securing access between remotely located computer users and the computers of different organizations for which they are permitted access.
- FIG. 1 illustrates a preferred system 10 for securing access between remotely located computer users and computers of different organizations in addition to monitoring access and maintaining billing records for each host computer system.
- the system 10 includes at least one remotely located user computer 12 .
- a secure identification card 14 is associated with the user and the user computer 12 .
- a user computer 12 preferably communicates over standard telephone lines, also known as plain old telephone service (POTS) lines 17 , via modem 16 through the public switched telephone network (PSTN) 18 .
- POTS plain old telephone service
- PSTN public switched telephone network
- the system 10 of the present invention may use other commonly available communication devices, such as an ISDN terminal adapter or a communications server, in place of the analog modem.
- the user computer may be a personal computer or another computer network.
- One suitable secure ID card is available from Security Dynamics, Inc. of Cambridge, Mass. and includes a display showing a time variant pass code for use by an authorized user in accessing a host computer network.
- a communications server 20 which may be a router such as a Cisco 5200, is in communication with a security service bureau 22 over a frame relay network 18 .
- the security service bureau 22 may be a local area network (LAN) 26 that includes at least one administrative workstation 28 for monitoring operation of the security service bureau 22 .
- a suitable administrative workstation 28 may be any of a number of commonly available personal computers.
- a network access server (NAS) 30 is also connected to the LAN 26 .
- the LAN 26 of the service bureau 22 connects to the frame relay network 24 via a firewall 32 .
- the firewall may be a personal computer, such as those available from SUN Microsystems, running software available from SOLARIS to provide protection to the service bureau LAN 26 from outside corruption.
- the NAS 30 may be any of a number of servers available from Hewlett Packard, such as the HP712, HP755, or the HP720.
- the NAS 30 of the service bureau 22 controls access of remote users, through the communication server 20 and frame relay network 24 , to the multiple host computer networks 34 or stand alone computers.
- each of the host computer networks or stand alone computers utilize the service bureau to authenticate remote users at various computers 12 .
- One system and method for authenticating users through a service bureau is disclosed in a commonly assigned U.S. application Ser. No. 09/008,527, filed Jan. 16, 1998, and is hereby incorporated by reference in its entirety.
- the system 10 also includes an integrated service center (ISC) 35 and an enterprise service system (ESS) 37 .
- the ISC 35 preferably includes a computer configured to accept all service requests from various end user host computer networks desiring to add or remove computer use monitoring services or change the list of authorized users for the network. Additionally, the ISC 35 receives telephone calls from end users 12 seeking help relating to remote access services. The ISC 35 assigns help requests to the appropriate party in the system 10 .
- the ISC 35 is a vertically integrated service center and help desk for video, audio, and data communications.
- the ESS 37 is a master database containing lists of periodic user charges, also known as “per seat” charges, for the various host computer systems serviced by the system 10 .
- the ESS 37 also contains a list of field service fees associated with a respective host computer network 34 and records any extra services used by a host computer network 34 and its authorized users.
- the fees for each particular host computer network are negotiated prior to beginning services to a particular host computer network and associated authorized users.
- the negotiated fees may be stored as tables in the ESS.
- the ESS 37 may be a server running UNIX software such as a SPARC Server available from SUN Microsystems.
- the ESS receives updates on authorized users and subscribing host computer networks from the ISC.
- a network management center (NMC) 39 is in communication with the ISC 35 and a private corporate intranet 19 via the ESS 37 .
- the NMC 39 receives help requests from the ISC and provides a help desk for network infrastructure problems, performance issues and chronic desktop problems.
- the NMC 39 uses a pre-entered user definition and information to create a trouble record for resolving issues associated with remote access services provided to the host computer networks 34 .
- Each trouble call is stored at the NMC 39 .
- the NMC serves to provide proactive surveillance of all physical lines and communications servers in the system as well as handling trouble calls passed on from the ISC.
- a customer service center (CSC) 40 is also linked to the system 10 via the ESS and the private corporate intranet 19 .
- the CSC 40 manages the ordering of POTS services and repairs of business lines (e.g. DS 1 , ISDN, etc.).
- a billing application communicates over the corporate intranet 19 , via the ESS 37 , with the NAS 30 and other system 10 components to obtain necessary billing information concerning host computer networks 34 and their respective users.
- the billing application is a software application running within the ESS containing logic necessary to organize cost data by per user and per entity within a particular client's (host computers) organization.
- the billing application may be a discrete billing computer 42 executing the necessary logic to obtain and manipulate billing information.
- Each computer network 34 provides an associated list of authorized users that is maintained at the ISC, ESS, and NAS 30 (at step 50 ).
- An authorized user accessing a host computer exchanges the information with the NAS 30 , via the communication server, each time the user dials in to gain access to his respective host computer network 34 .
- a starting time stamp is created at the beginning of each remote access call received from a user at the communication server 20 (at step 52 ).
- the remote user accesses his respective host computer network by dialing in through the PSTN 18 using a modem 16 or other communication device to reach a network communications server 20 .
- the communication server 20 forwards information on the call through the frame relay network 24 to the service bureau 22 .
- the NAS 30 authenticates the user through the exchange of a user name and a pass code.
- the pass code preferably consists of a fixed personal identification number and a time variable security token.
- the security token may be a soft token, such as a software application on each authorized user's computer, or a hard token, such as a secure ID card 14 available from Security Dynamics, Inc. Each authorized user preferably has her own security token and the security token may be a sequence of numbers, letters, or other type of symbol.
- the security token is obtained by the user from a display that generates a new security token at predetermined time increments.
- the NAS 30 containing an identical security token generating algorithm synchronized with the secure ID card 14 generates the same security token to verify that the user is an authorized user.
- the communication server 20 connects the user computer 12 to the appropriate host computer 34 for the duration of the call.
- the NAS 30 receives an ending time stamp from the communication server 20 at the conclusion of the remote access call when the user hangs up or otherwise disconnects from the host computer network 34 (at step 54 ).
- the service bureau stores the starting and ending time stamps in the NAS memory.
- the starting and ending time stamps are associated in the user log with the list of authorized users so that the user log contains a record of computer time usage for each authorized user (at step 56 ).
- the user log is transmitted from the service bureau in a discrete file generated at the NAS to the billing computer 42 (at step 58 ).
- the billing period may be any desired length of time, such as a month or a year.
- the list of host computer networks and associated list of authorized users for a host computer network is also transmitted to the billing computer (at step 60 ) from the NAS over the frame relay network.
- the billing computer then generates a billing summary for each of the subscribing customer host computer networks (at step 62 ).
- a long distance carrier invoice is electronically transmitted to the billing computer from a long distance telephone service provider.
- the long distance service provider may be any one of a number of available service providers, such as Ameritech, selected by the host computer network.
- the long distance telephone service provider transmits a minutes of use invoice for the long distance access number used by authorized users of a given host computer network to access the security service bureau.
- the long distance access number may be an “800” number or other telephone number dedicated for use by authorized users to communicate with the appropriate host computer through the system 10 .
- the billing computer can use the unique pass code each user possesses to distribute the minutes of use charge to the appropriate.
- the long distance charges are distributed appropriately among the users of each host computer network based on a user's percentage of computer access time for that billing period.
- the ESS 39 provides fixed expense information to the billing computer 42 by way of monthly per seat charges and incident charges. Incident charges refer to the fees assessed to calls by authorized users to the system help desk at the CSC.
- a bill may be generated that breaks up authorized users into the various departments to which they are assigned within a customer's organization. For each authorized user in the department a predetermined group of information may be displayed. This information may include per seat charges, the cost of long distance telephone usage (distributed among authorized users based on the amount of time a user was communicating with the host computer network), any equipment charges, maintenance charges, and miscellaneous charges.
- the per seat charges refer to fixed service charges associated with supporting each authorized user.
- the miscellaneous costs may include incidental security cost such as replacing secure ID cards, or for particular pieces of software necessary for enabling remote users to access their host network through the security service bureau 22 .
- incidental security cost such as replacing secure ID cards, or for particular pieces of software necessary for enabling remote users to access their host network through the security service bureau 22 .
- Optionally included in the per seat charges are the local exchange and other incidental charges.
- Another aspect of the presently preferred invention is that computer usage information may be provided to the customer and the service provider maintaining the security service bureau 22 so that computer resources may be optimized for usage patterns.
- the billing computer may generate monthly or annual reports dividing up the usage for each individual authorized user by total time used per a given period or by time of day or week so that host computer network 34 or service bureau 22 resources can be properly allocated for particularly heavy usage.
- the method includes maintaining a list of host computer networks and associated list of authorized users for each network, creating a starting and ending time stamp for remote access calls, transmitting the starting and ending time stamps in the user log to a billing computer in addition to other billing information, and generating a billing summary of costs and usage at the billing computer.
- the system preferably includes a security service bureau providing secure remote access between remotely located authorized users and their respective proprietary host networks.
- the NAS preferably records time stamps and a user log indicating usage of resources by individual authorized users.
- a billing computer is also included in the system having the logic necessary to compile information from the user log in the security service bureau and cost information received from outside sources to generate a periodic bill indicating cost per individual user and/or department.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Entrepreneurship & Innovation (AREA)
- Technology Law (AREA)
- Tourism & Hospitality (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Water Supply & Treatment (AREA)
- General Health & Medical Sciences (AREA)
- Public Health (AREA)
- Multimedia (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Meter Arrangements (AREA)
Abstract
A system and method for monitoring remote computer access and associated costs is provided. The system includes a remotely located communication server in communication with multiple host computer networks and in communication with a network access server. First and second memory devices contain a list of authorized users for the host computer networks and a user log for use by a billing computer to generate bills. The method includes the steps of creating starting and ending time stamps for each authorized user accessing a respective one of the multiple host computer networks and creating a user log to generate bills and monitor host computer network usage.
Description
-
RELATED APPLICATIONS
-
This application is a continuation of U.S. application Ser. No. 11/267,245, filed Nov. 4, 2005, pending, which is a continuation of U.S. application Ser. No. 10/024,734, filed Dec. 18, 2001, now U.S. Pat. No. 7,020,628, which is as continuation of U.S. application Ser. No. 09/008,344, filed Jan. 16, 1998, now U.S. Pat. No. 6,349,289, and the entirety of each of these applications is incorporated herein by reference.
BACKGROUND OF THE INVENTION
-
The present invention relates to a system and method for monitoring access to each of a plurality of unrelated host computer networks. More particularly, the present invention relates to a system and method of tracking computer usage, and costs associated with the computer usage, by authorized users of different computer networks.
-
Many organizations, both in government and in private industry, rely on access to centralized computer facilities. Use of remote access capabilities to centralized computer facilities is generally desirable in order to facilitate use of computer resources and improve productivity. Remotely located individuals who are, for example, traveling on business, often need to access their organization's computer. A concern of many organizations is monitoring the costs of remote users accessing the host computer or computer network of the company, in addition to tracking the usage of computer time and various costs associated with that time.
-
Typically, each organization's computer facility tracks computer usage internally and generates various reports based on that information. Also, the costs associated with remotely dialing up an organization's computer facilities, such as the telephone line charges, are reported separately by each of the one or more long distance line carriers utilized by the remotely located computer users. Additional costs of maintaining a remotely accessible computer network, such as supporting an information services person or department to handle difficulties with remote access by authorized users, may take up significant resources particularly in smaller organizations.
BRIEF DESCRIPTION OF THE DRAWINGS
- FIG. 1
illustrates a preferred embodiment of a system for monitoring computer usage and costs associated with remote access according to the present invention.
- FIG. 2
is a flow chart showing a preferred method of monitoring computer usage and costs using the system of
FIG. 1.
DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EMBODIMENTS
-
An advantage of the present invention is consolidation of usage and billing information in a single report. Another advantage of the present invention is the ability to manipulate the usage and billing data for each of a number of different host computer networks by individual user and by predetermined groups or departments of users at each organization. The preferred method and system cooperate with a system for securing access between remotely located computer users and the computers of different organizations for which they are permitted access.
- FIG. 1
illustrates a
preferred system10 for securing access between remotely located computer users and computers of different organizations in addition to monitoring access and maintaining billing records for each host computer system. The
system10 includes at least one remotely located
user computer12. A
secure identification card14 is associated with the user and the
user computer12. A
user computer12 preferably communicates over standard telephone lines, also known as plain old telephone service (POTS) lines 17, via
modem16 through the public switched telephone network (PSTN) 18. The
system10 of the present invention may use other commonly available communication devices, such as an ISDN terminal adapter or a communications server, in place of the analog modem. The user computer may be a personal computer or another computer network. One suitable secure ID card is available from Security Dynamics, Inc. of Cambridge, Mass. and includes a display showing a time variant pass code for use by an authorized user in accessing a host computer network.
-
A
communications server20, which may be a router such as a Cisco 5200, is in communication with a
security service bureau22 over a
frame relay network18. The
security service bureau22 may be a local area network (LAN) 26 that includes at least one
administrative workstation28 for monitoring operation of the
security service bureau22. A suitable
administrative workstation28 may be any of a number of commonly available personal computers. A network access server (NAS) 30 is also connected to the
LAN26. The
LAN26 of the
service bureau22 connects to the
frame relay network24 via a
firewall32. The firewall may be a personal computer, such as those available from SUN Microsystems, running software available from SOLARIS to provide protection to the service bureau LAN 26 from outside corruption. The NAS 30 may be any of a number of servers available from Hewlett Packard, such as the HP712, HP755, or the HP720. The NAS 30 of the
service bureau22 controls access of remote users, through the
communication server20 and
frame relay network24, to the multiple
host computer networks34 or stand alone computers. In the example of
FIG. 1, each of the host computer networks or stand alone computers utilize the service bureau to authenticate remote users at
various computers12. One system and method for authenticating users through a service bureau is disclosed in a commonly assigned U.S. application Ser. No. 09/008,527, filed Jan. 16, 1998, and is hereby incorporated by reference in its entirety.
-
The
system10 also includes an integrated service center (ISC) 35 and an enterprise service system (ESS) 37. The ISC 35 preferably includes a computer configured to accept all service requests from various end user host computer networks desiring to add or remove computer use monitoring services or change the list of authorized users for the network. Additionally, the ISC 35 receives telephone calls from
end users12 seeking help relating to remote access services. The
ISC35 assigns help requests to the appropriate party in the
system10. In one embodiment, the ISC 35 is a vertically integrated service center and help desk for video, audio, and data communications.
-
The ESS 37 is a master database containing lists of periodic user charges, also known as “per seat” charges, for the various host computer systems serviced by the
system10. The ESS 37 also contains a list of field service fees associated with a respective
host computer network34 and records any extra services used by a
host computer network34 and its authorized users. The fees for each particular host computer network are negotiated prior to beginning services to a particular host computer network and associated authorized users. The negotiated fees may be stored as tables in the ESS. The ESS 37 may be a server running UNIX software such as a SPARC Server available from SUN Microsystems. The ESS receives updates on authorized users and subscribing host computer networks from the ISC.
-
A network management center (NMC) 39 is in communication with the
ISC35 and a private
corporate intranet19 via the ESS 37. The NMC 39 receives help requests from the ISC and provides a help desk for network infrastructure problems, performance issues and chronic desktop problems. The NMC 39 uses a pre-entered user definition and information to create a trouble record for resolving issues associated with remote access services provided to the
host computer networks34. Each trouble call is stored at the
NMC39. The NMC serves to provide proactive surveillance of all physical lines and communications servers in the system as well as handling trouble calls passed on from the ISC.
-
A customer service center (CSC) 40 is also linked to the
system10 via the ESS and the private
corporate intranet19. The CSC 40 manages the ordering of POTS services and repairs of business lines (e.g. DS1, ISDN, etc.). A billing application communicates over the
corporate intranet19, via the
ESS37, with the
NAS30 and
other system10 components to obtain necessary billing information concerning
host computer networks34 and their respective users. Preferably, the billing application is a software application running within the ESS containing logic necessary to organize cost data by per user and per entity within a particular client's (host computers) organization. Alternatively, the billing application may be a
discrete billing computer42 executing the necessary logic to obtain and manipulate billing information.
-
Utilizing the
system10 described above, a preferred method of monitoring access to each of the host computer networks subscribing to the system security services is illustrated in
FIG. 2. Each
computer network34 provides an associated list of authorized users that is maintained at the ISC, ESS, and NAS 30 (at step 50). An authorized user accessing a host computer exchanges the information with the
NAS30, via the communication server, each time the user dials in to gain access to his respective
host computer network34. A starting time stamp is created at the beginning of each remote access call received from a user at the communication server 20 (at step 52). In a preferred embodiment, the remote user accesses his respective host computer network by dialing in through the
PSTN18 using a
modem16 or other communication device to reach a
network communications server20. The
communication server20 forwards information on the call through the
frame relay network24 to the
service bureau22. At the
service bureau22, the
NAS30 authenticates the user through the exchange of a user name and a pass code.
-
The pass code preferably consists of a fixed personal identification number and a time variable security token. The security token may be a soft token, such as a software application on each authorized user's computer, or a hard token, such as a
secure ID card14 available from Security Dynamics, Inc. Each authorized user preferably has her own security token and the security token may be a sequence of numbers, letters, or other type of symbol. Using the
secure ID card14, the security token is obtained by the user from a display that generates a new security token at predetermined time increments. The
NAS30, containing an identical security token generating algorithm synchronized with the
secure ID card14 generates the same security token to verify that the user is an authorized user. On authentication, the
communication server20 connects the
user computer12 to the
appropriate host computer34 for the duration of the call. The
NAS30 receives an ending time stamp from the
communication server20 at the conclusion of the remote access call when the user hangs up or otherwise disconnects from the host computer network 34 (at step 54). Following the conclusion of the remote access call, the service bureau stores the starting and ending time stamps in the NAS memory. Preferably the starting and ending time stamps are associated in the user log with the list of authorized users so that the user log contains a record of computer time usage for each authorized user (at step 56).
-
After the end of the predetermined billing period, the user log is transmitted from the service bureau in a discrete file generated at the NAS to the billing computer 42 (at step 58). The billing period may be any desired length of time, such as a month or a year. The list of host computer networks and associated list of authorized users for a host computer network is also transmitted to the billing computer (at step 60) from the NAS over the frame relay network. The billing computer then generates a billing summary for each of the subscribing customer host computer networks (at step 62).
-
As part of the process of developing a periodic bill for customers subscribing to the system, a long distance carrier invoice is electronically transmitted to the billing computer from a long distance telephone service provider. The long distance service provider may be any one of a number of available service providers, such as Ameritech, selected by the host computer network. The long distance telephone service provider transmits a minutes of use invoice for the long distance access number used by authorized users of a given host computer network to access the security service bureau. The long distance access number may be an “800” number or other telephone number dedicated for use by authorized users to communicate with the appropriate host computer through the
system10.
-
Because each authorized user of a given host computer network is provided with the same telephone number, the billing computer can use the unique pass code each user possesses to distribute the minutes of use charge to the appropriate. Preferably, the long distance charges are distributed appropriately among the users of each host computer network based on a user's percentage of computer access time for that billing period. The
ESS39 provides fixed expense information to the
billing computer42 by way of monthly per seat charges and incident charges. Incident charges refer to the fees assessed to calls by authorized users to the system help desk at the CSC.
-
Using all the information gathered, the billing computer based on the subscribed for services and the usage of each individual authorized user, various usage information and billing forms will be created. For example, in one preferred embodiment a bill may be generated that breaks up authorized users into the various departments to which they are assigned within a customer's organization. For each authorized user in the department a predetermined group of information may be displayed. This information may include per seat charges, the cost of long distance telephone usage (distributed among authorized users based on the amount of time a user was communicating with the host computer network), any equipment charges, maintenance charges, and miscellaneous charges. The per seat charges refer to fixed service charges associated with supporting each authorized user. The miscellaneous costs may include incidental security cost such as replacing secure ID cards, or for particular pieces of software necessary for enabling remote users to access their host network through the
security service bureau22. Optionally included in the per seat charges are the local exchange and other incidental charges. Once the billing summary has been generated, the billing computer can transmit the billing summary directly to the appropriate host computer network. The transmission may be done via e-mail over an internet connection, via facsimile, or through other means.
-
Another aspect of the presently preferred invention is that computer usage information may be provided to the customer and the service provider maintaining the
security service bureau22 so that computer resources may be optimized for usage patterns. For example, the billing computer may generate monthly or annual reports dividing up the usage for each individual authorized user by total time used per a given period or by time of day or week so that
host computer network34 or
service bureau22 resources can be properly allocated for particularly heavy usage.
-
From the above, a new system and method of monitoring access and fees for host computer networks with relocated users is provided. The method includes maintaining a list of host computer networks and associated list of authorized users for each network, creating a starting and ending time stamp for remote access calls, transmitting the starting and ending time stamps in the user log to a billing computer in addition to other billing information, and generating a billing summary of costs and usage at the billing computer. The system preferably includes a security service bureau providing secure remote access between remotely located authorized users and their respective proprietary host networks. In one preferred embodiment, the NAS preferably records time stamps and a user log indicating usage of resources by individual authorized users. A billing computer is also included in the system having the logic necessary to compile information from the user log in the security service bureau and cost information received from outside sources to generate a periodic bill indicating cost per individual user and/or department.
-
It is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that the following claims, including all equivalents, are intended to define the scope of this invention.
Claims (7)
1. In a system for providing secure remote access between a plurality of unrelated host computer networks and a plurality of authorized users via a network access server, a method of monitoring access to each of the unrelated host computer networks comprising the steps of:
receiving at a communication server a request from a remotely located computer user to access one of the plurality of unrelated host computer networks;
automatically transmitting information regarding the request from the communication server to the network access server, the information comprising identification information for the remotely located computer user;
determining at the network access server if the user is authorized to access the one of the plurality of unrelated host computer networks;
establishing a connection between the remotely located computer user and the one of the plurality of unrelated host computer networks via the communication server if the remotely located user is an authorized remotely located user for the one of the plurality of unrelated host computer networks;
storing computer usage time for the authorized remotely located computer user in a user log at the network access server after the authorized remotely located computer user disconnects from the one of the plurality of unrelated host computer networks whereby the user log contains a record of computer time usage for each authorized user;
for each of the plurality of unrelated host computer networks, generating a billing and computer time usage summary, each billing and computer time usage summary listing charges and computer time usage for a respective one of the plurality of unrelated host computer networks; and
electronically transmitting each billing and computer usage summary to an appropriate one of the plurality of unrelated host computer networks.
2. The method of
claim 1, wherein generating a billing and computer time usage summary further comprises generating a list of fixed charges and generating a list of help desk charges for each of the unrelated host computer networks.
3. The method of
claim 1, wherein generating a billing and computer time usage summary further comprises receiving a long distance telephone company report containing charges associated with each of the respective unrelated host computer networks.
4. The method of
claim 3, further comprising listing, in the billing and computer time usage summary for a particular unrelated host computer network, charges from the long distance company report for each remotely located computer user of the particular unrelated host computer network.
5. The method of
claim 4, wherein listing charges from the long distance company report comprises calculating a percentage of computer use time attributable to each of the remotely located computer users for the particular host computer network and distributing the charges from the long distance company report to appropriate remotely located computer users in the billing summary for the particular host computer network according to the calculated percentage of computer use time.
6. The method of
claim 1, wherein storing computer usage time for the authorized remotely located computer user comprises recording starting and ending time stamps for a remote access call to the one of the plurality of unrelated host computer networks in the user log.
7. A system for providing secure remote access between a plurality of unrelated host computer networks and a plurality of authorized users, the system comprising:
a first processor configured for communication with the plurality of unrelated host computer networks;
first processor logic executable by the first processor comprising instructions for executing the following steps:
in response to receipt of identification information for a remotely located user seeking to access one of the plurality of unrelated computer networks, determining if the user is authorized to access the one of the plurality of unrelated host computer networks;
establishing a connection between the remotely located computer user and the one of the plurality of unrelated host computer networks via a communication device if the remotely located user is an authorized remotely located user for the one of the plurality of unrelated host computer networks; and
storing computer usage time for the authorized remotely located computer user in a user log after the authorized remotely located computer user disconnects from the one of the plurality of unrelated host computer networks whereby the user log contains a record of computer time usage for each authorized user;
a second processor in communication with the first processor; and
second processor logic executable by the second processor comprising instructions for executing the following steps:
generating a billing and computer time usage summary for each of the plurality of unrelated host computer networks, each billing and computer time usage summary listing charges and computer time usage for a respective one of the plurality of unrelated host computer networks; and
electronically transmitting each billing and computer usage summary to an appropriate one of the plurality of unrelated host computer networks.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/650,300 US20070219881A1 (en) | 1998-01-16 | 2007-01-05 | Method and system for tracking computer system usage through a remote access security device |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/008,344 US6349289B1 (en) | 1998-01-16 | 1998-01-16 | Method and system for tracking computer system usage through a remote access security device |
US10/024,734 US7020628B2 (en) | 1998-01-16 | 2001-12-18 | Method and system for tracking computer system usage through a remote access security device |
US11/267,245 US7181421B2 (en) | 1998-01-16 | 2005-11-04 | Method and system for tracking computer system usage through a remote access security device |
US11/650,300 US20070219881A1 (en) | 1998-01-16 | 2007-01-05 | Method and system for tracking computer system usage through a remote access security device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/267,245 Continuation US7181421B2 (en) | 1998-01-16 | 2005-11-04 | Method and system for tracking computer system usage through a remote access security device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070219881A1 true US20070219881A1 (en) | 2007-09-20 |
Family
ID=21731090
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/008,344 Expired - Fee Related US6349289B1 (en) | 1998-01-16 | 1998-01-16 | Method and system for tracking computer system usage through a remote access security device |
US10/024,734 Expired - Fee Related US7020628B2 (en) | 1998-01-16 | 2001-12-18 | Method and system for tracking computer system usage through a remote access security device |
US11/267,245 Expired - Fee Related US7181421B2 (en) | 1998-01-16 | 2005-11-04 | Method and system for tracking computer system usage through a remote access security device |
US11/650,300 Abandoned US20070219881A1 (en) | 1998-01-16 | 2007-01-05 | Method and system for tracking computer system usage through a remote access security device |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/008,344 Expired - Fee Related US6349289B1 (en) | 1998-01-16 | 1998-01-16 | Method and system for tracking computer system usage through a remote access security device |
US10/024,734 Expired - Fee Related US7020628B2 (en) | 1998-01-16 | 2001-12-18 | Method and system for tracking computer system usage through a remote access security device |
US11/267,245 Expired - Fee Related US7181421B2 (en) | 1998-01-16 | 2005-11-04 | Method and system for tracking computer system usage through a remote access security device |
Country Status (3)
Country | Link |
---|---|
US (4) | US6349289B1 (en) |
AU (1) | AU2319199A (en) |
WO (1) | WO1999036875A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8640036B2 (en) | 2010-04-07 | 2014-01-28 | Cisco Techology, Inc. | Messaging and presence protocol as a configuration and management bus for embedded devices |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US9553831B2 (en) | 2013-04-11 | 2017-01-24 | Cisco Technology, Inc. | Adaptive publish/subscribe system |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
Families Citing this family (82)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
ATE367701T1 (en) | 1997-03-12 | 2007-08-15 | Nomadix Inc | NOMADIC TRANSLATOR OR PATH FINDER |
US6349289B1 (en) * | 1998-01-16 | 2002-02-19 | Ameritech Corporation | Method and system for tracking computer system usage through a remote access security device |
US8266266B2 (en) | 1998-12-08 | 2012-09-11 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization, authentication and accounting |
US7194554B1 (en) | 1998-12-08 | 2007-03-20 | Nomadix, Inc. | Systems and methods for providing dynamic network authorization authentication and accounting |
US8713641B1 (en) | 1998-12-08 | 2014-04-29 | Nomadix, Inc. | Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device |
US6779016B1 (en) | 1999-08-23 | 2004-08-17 | Terraspring, Inc. | Extensible computing system |
US7703102B1 (en) * | 1999-08-23 | 2010-04-20 | Oracle America, Inc. | Approach for allocating resources to an apparatus based on preemptable resource requirements |
US7089593B1 (en) * | 1999-09-01 | 2006-08-08 | International Business Machines Corporation | Method for providing temporary access to a commonly accessible computer processing system |
US6868399B1 (en) * | 1999-10-22 | 2005-03-15 | Nomadix, Inc. | Systems and methods for integrating a network gateway device with management systems |
SE522315C2 (en) * | 2000-02-01 | 2004-02-03 | Telia Ab | Charging based on quality requirements in a telecommunications network |
US6978252B2 (en) * | 2000-04-18 | 2005-12-20 | Ideaflood, Inc. | Method and system for transacting with network traffic |
EP1189475A1 (en) * | 2000-04-24 | 2002-03-20 | Mitsubishi Denki Kabushiki Kaisha | Cellular phone and remote control system |
JP2001312468A (en) * | 2000-04-28 | 2001-11-09 | Konami Co Ltd | Network connection control method and connection control system |
CA2309398C (en) * | 2000-05-24 | 2012-02-21 | Steven P. Meyer | A system, computer product and method for providing a private communication portal |
US7184982B1 (en) | 2000-06-23 | 2007-02-27 | Ebs Group Limited | Architecture for anonymous trading system |
US6983259B1 (en) | 2000-06-23 | 2006-01-03 | Ebs Group Limited | Anonymous trading system |
US7827085B1 (en) | 2000-06-23 | 2010-11-02 | Ebs Group Limited | Conversational dealing in an anonymous trading system |
US7333952B1 (en) | 2000-06-23 | 2008-02-19 | Ebs Group Limited | Compound order handling in an anonymous trading system |
US20020133364A1 (en) * | 2001-03-15 | 2002-09-19 | International Business Machines Corporation | System and method for pricing agent for differentiated services computer networks |
US20020133473A1 (en) * | 2001-03-15 | 2002-09-19 | International Business Machines Corporation | System and method for on-demand pricing for differentiated services computer networks |
US20020194143A1 (en) * | 2001-04-26 | 2002-12-19 | International Business Machines Corporation | Method and system for usage-based pricing of E-content |
US20020198850A1 (en) * | 2001-06-26 | 2002-12-26 | International Business Machines Corporation | System and method for dynamic price determination in differentiated services computer networks |
AU2003219823A1 (en) * | 2002-02-20 | 2003-09-09 | Bitpipe, Inc. | Electronic document tracking |
US20030195845A1 (en) * | 2002-04-16 | 2003-10-16 | Anton Francis M. | Method of conducting business among entities participating in a system for distributed network authentication, access and aggregation |
US8326713B2 (en) * | 2003-04-16 | 2012-12-04 | American Express Travel Related Services Company, Inc. | Method and system for technology consumption management including allocation of fees |
US8326712B2 (en) * | 2003-04-16 | 2012-12-04 | American Express Travel Related Services Company, Inc. | Method and system for technology consumption management |
US20050050324A1 (en) * | 2003-07-07 | 2005-03-03 | David Corbett | Administrative system for smart card technology |
US7308584B2 (en) * | 2003-08-14 | 2007-12-11 | International Business Machines Corporation | System and method for securing a portable processing module |
US20050038879A1 (en) * | 2003-08-14 | 2005-02-17 | International Business Machines Corporation | System and method for discovery of remote device driver functionality and interface |
US7707080B2 (en) * | 2003-12-05 | 2010-04-27 | International Business Machines Corporation | Resource usage metering of network services |
US7301463B1 (en) * | 2004-04-14 | 2007-11-27 | Sage Life Technologies, Llc | Assisting and monitoring method and system |
JP4154372B2 (en) * | 2004-07-28 | 2008-09-24 | 富士通株式会社 | Mobile device |
US20060029200A1 (en) * | 2004-08-06 | 2006-02-09 | Sarah Tasker | Method and system for improved travel transaction billing and reconciling |
US7814216B2 (en) * | 2004-09-07 | 2010-10-12 | Route 1 Inc. | System and method for accessing host computer via remote computer |
US8996603B2 (en) * | 2004-09-16 | 2015-03-31 | Cisco Technology, Inc. | Method and apparatus for user domain based white lists |
US20060069782A1 (en) * | 2004-09-16 | 2006-03-30 | Michael Manning | Method and apparatus for location-based white lists in a telecommunications network |
US7599288B2 (en) * | 2004-09-30 | 2009-10-06 | Hewlett-Packard Development Company, L.P. | Processing of usage data for first and second types of usage-based functions |
US20060095347A1 (en) * | 2004-11-03 | 2006-05-04 | Melucci Robert J | Software application for inventory data collection, validation and consolidation |
US20060218632A1 (en) * | 2005-03-28 | 2006-09-28 | Cisco Technology, Inc.; | Method and system for installing premise equipment |
US8194641B2 (en) * | 2005-03-28 | 2012-06-05 | Cisco Technology, Inc. | Method and system for operating a communication service portal |
US7416116B2 (en) * | 2005-04-27 | 2008-08-26 | Xerox Corporation | Printed user activity at digital copier or network-connected device for pay-for-print/copy customers |
US20070043605A1 (en) * | 2005-05-09 | 2007-02-22 | Aztec Pacific Incorporated | System and method for time management and attributions |
US7631325B2 (en) | 2005-11-02 | 2009-12-08 | At&T Intellectual Property I, L.P. | System and method of authorizing a set top box device in an internet protocol television system |
US7702781B2 (en) * | 2006-03-03 | 2010-04-20 | Teoco Corporation | System and method of storing data files at a remote storage facility |
US7933817B2 (en) * | 2006-06-14 | 2011-04-26 | Boehringer Technologies, L.P. | Billing method for pump usage |
US11762972B1 (en) * | 2006-08-13 | 2023-09-19 | Tara Chand Singhal | System and methods for a multi-factor remote user authentication |
US7529922B2 (en) * | 2006-09-19 | 2009-05-05 | Giga-Byte Technology Co., Ltd. | Method for recording use time of computer system |
US8014308B2 (en) * | 2006-09-28 | 2011-09-06 | Microsoft Corporation | Hardware architecture for cloud services |
US7734379B2 (en) * | 2006-10-23 | 2010-06-08 | Service Pro Monitoring, Llc | System, method, and apparatus for managing wastewater treatment installation |
US7925554B1 (en) * | 2006-12-29 | 2011-04-12 | Amazon Technologies, Inc. | Using configured application pricing to determine end user fees for use of invocable services |
US10853780B1 (en) * | 2006-12-29 | 2020-12-01 | Amazon Technologies, Inc. | Providing configurable pricing for use of invocable services by applications |
US20080294537A1 (en) * | 2007-05-21 | 2008-11-27 | Rajeev Mishra | Method to support advance accounting within software partitions |
JP4942558B2 (en) * | 2007-06-11 | 2012-05-30 | 株式会社リコー | Device management apparatus and device management method |
US10783463B2 (en) * | 2007-06-27 | 2020-09-22 | International Business Machines Corporation | System, method and program for tracking labor costs |
US8374929B1 (en) * | 2007-08-06 | 2013-02-12 | Gogrid, LLC | System and method for billing for hosted services |
US20090132579A1 (en) * | 2007-11-21 | 2009-05-21 | Kwang Edward M | Session audit manager and method |
KR101300948B1 (en) * | 2007-11-27 | 2013-09-16 | 캐논 덴시 가부시키가이샤 | Management server, client terminal, terminal management system, terminal management method, and recording medium |
CN101555620A (en) * | 2008-04-07 | 2009-10-14 | Axt公司 | Crystal growing device and method |
US20090300714A1 (en) * | 2008-05-27 | 2009-12-03 | Open Invention Network Llc | Privacy engine and method of use in a user-centric identity management system |
US10334324B2 (en) | 2008-11-26 | 2019-06-25 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US9154942B2 (en) | 2008-11-26 | 2015-10-06 | Free Stream Media Corp. | Zero configuration communication between a browser and a networked media device |
US9386356B2 (en) | 2008-11-26 | 2016-07-05 | Free Stream Media Corp. | Targeting with television audience data across multiple screens |
US10567823B2 (en) | 2008-11-26 | 2020-02-18 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US9986279B2 (en) | 2008-11-26 | 2018-05-29 | Free Stream Media Corp. | Discovery, access control, and communication with networked services |
US10977693B2 (en) | 2008-11-26 | 2021-04-13 | Free Stream Media Corp. | Association of content identifier of audio-visual data with additional data through capture infrastructure |
US8180891B1 (en) | 2008-11-26 | 2012-05-15 | Free Stream Media Corp. | Discovery, access control, and communication with networked services from within a security sandbox |
US9961388B2 (en) | 2008-11-26 | 2018-05-01 | David Harrison | Exposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements |
US10419541B2 (en) | 2008-11-26 | 2019-09-17 | Free Stream Media Corp. | Remotely control devices over a network without authentication or registration |
US9519772B2 (en) | 2008-11-26 | 2016-12-13 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US10880340B2 (en) | 2008-11-26 | 2020-12-29 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US9026668B2 (en) | 2012-05-26 | 2015-05-05 | Free Stream Media Corp. | Real-time and retargeted advertising on multiple screens of a user watching television |
US10631068B2 (en) | 2008-11-26 | 2020-04-21 | Free Stream Media Corp. | Content exposure attribution based on renderings of related content across multiple devices |
US8214487B2 (en) | 2009-06-10 | 2012-07-03 | At&T Intellectual Property I, L.P. | System and method to determine network usage |
US10181139B2 (en) | 2012-10-14 | 2019-01-15 | John M Glass | Automated workspace usage management methods and apparatus |
BR112015016617A2 (en) | 2013-01-21 | 2017-07-11 | Covidien Lp | non-adherent antimicrobial dressings and related methods |
US9577894B1 (en) * | 2013-03-15 | 2017-02-21 | Ca, Inc. | System and method for codification and representation of situational and complex application behavioral patterns |
JP6252739B2 (en) * | 2013-09-13 | 2017-12-27 | 株式会社リコー | Transmission management system, management method and program |
CN104814831A (en) | 2014-01-30 | 2015-08-05 | 柯惠有限合伙公司 | Preparation of occlusive dressings |
US20150220904A1 (en) * | 2014-01-31 | 2015-08-06 | Simple Bills, Inc. | Account Management and Transfer System and Method of Use |
US9674201B1 (en) | 2015-12-29 | 2017-06-06 | Imperva, Inc. | Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets |
US9674202B1 (en) | 2015-12-29 | 2017-06-06 | Imperva, Inc. | Techniques for preventing large-scale data breaches utilizing differentiated protection layers |
US10554525B2 (en) * | 2017-11-28 | 2020-02-04 | International Business Machines Corporation | Tracking usage of computing resources |
Citations (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US4484306A (en) * | 1982-03-22 | 1984-11-20 | Exide Electronics Corporation | Method and apparatus for controlling access in a data transmission system |
US4672572A (en) * | 1984-05-21 | 1987-06-09 | Gould Inc. | Protector system for computer access and use |
US4757267A (en) * | 1987-06-17 | 1988-07-12 | Applied Telematics, Inc. | Telephone system for connecting a customer to a supplier of goods |
US4776004A (en) * | 1987-03-13 | 1988-10-04 | American Telephone And Telegraph Company, At&T Bell Laboratories | Communication services method and apparatus |
US4800590A (en) * | 1985-01-14 | 1989-01-24 | Willis E. Higgins | Computer key and computer lock system |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4944007A (en) * | 1988-08-19 | 1990-07-24 | Ncr Corporation | Public key diversification method |
US4977594A (en) * | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4994963A (en) * | 1988-11-01 | 1991-02-19 | Icon Systems International, Inc. | System and method for sharing resources of a host computer among a plurality of remote computers |
US5003584A (en) * | 1990-04-16 | 1991-03-26 | At&T Bell Laboratories | Method and apparatus for the billing of value-added communication calls |
US5068894A (en) * | 1989-08-22 | 1991-11-26 | U.S. Philips Corp. | Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system |
US5113499A (en) * | 1989-04-28 | 1992-05-12 | Sprint International Communications Corp. | Telecommunication access management system for a packet switching network |
US5115466A (en) * | 1989-11-13 | 1992-05-19 | Alcatel Stk A/S | Communication network intended for secure transmission of speech and data |
US5120939A (en) * | 1989-11-09 | 1992-06-09 | At&T Bell Laboratories | Databaseless security system |
US5196840A (en) * | 1990-11-05 | 1993-03-23 | International Business Machines Corporation | Secure communications system for remotely located computers |
US5216703A (en) * | 1991-06-17 | 1993-06-01 | Pactel Corporation | Piggy-back number and routing isolation for cellular telephone switches |
US5276444A (en) * | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5291551A (en) * | 1991-10-23 | 1994-03-01 | At&T Bell Laboratories | Home agent telecommunication technique |
US5317636A (en) * | 1992-12-09 | 1994-05-31 | Arris, Inc. | Method and apparatus for securing credit card transactions |
US5361062A (en) * | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
US5392345A (en) * | 1993-04-30 | 1995-02-21 | At&T Corp. | Work at home ACD agent network |
US5412723A (en) * | 1994-03-01 | 1995-05-02 | International Business Machines Corporation | Mechanism for keeping a key secret from mobile eavesdroppers |
US5481613A (en) * | 1994-04-15 | 1996-01-02 | Northern Telecom Limited | Computer network cryptographic key distribution system |
US5493492A (en) * | 1994-03-30 | 1996-02-20 | Cramer; Milton L. | Device for recording billable time and services |
US5502576A (en) * | 1992-08-24 | 1996-03-26 | Ramsay International Corporation | Method and apparatus for the transmission, storage, and retrieval of documents in an electronic domain |
US5508817A (en) * | 1992-03-19 | 1996-04-16 | Fujitsu Limited | Electronic mail accounting system |
US5534857A (en) * | 1991-11-12 | 1996-07-09 | Security Domain Pty. Ltd. | Method and system for secure, decentralized personalization of smart cards |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5546379A (en) * | 1993-10-01 | 1996-08-13 | Nec America | Bandwidth-on-demand remote office network apparatus and method |
US5553239A (en) * | 1994-11-10 | 1996-09-03 | At&T Corporation | Management facility for server entry and application utilization in a multi-node server configuration |
US5560008A (en) * | 1989-05-15 | 1996-09-24 | International Business Machines Corporation | Remote authentication and authorization in a distributed data processing system |
US5561282A (en) * | 1993-04-30 | 1996-10-01 | Microbilt Corporation | Portable signature capture pad |
US5586175A (en) * | 1993-10-15 | 1996-12-17 | Linkusa Corporation | Call-processing system and method |
US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
US5606617A (en) * | 1994-10-14 | 1997-02-25 | Brands; Stefanus A. | Secret-key certificates |
US5646998A (en) * | 1992-11-17 | 1997-07-08 | Stambler; Leon | Secure transaction system and method utilized therein |
US5661807A (en) * | 1993-07-30 | 1997-08-26 | International Business Machines Corporation | Authentication system using one-time passwords |
US5696906A (en) * | 1995-03-09 | 1997-12-09 | Continental Cablevision, Inc. | Telecommunicaion user account management system and method |
US5737414A (en) * | 1995-05-24 | 1998-04-07 | Walker Asset Management Limited Partnership | 900 number billing and collection system and method for on-line computer services |
US5740361A (en) * | 1996-06-03 | 1998-04-14 | Compuserve Incorporated | System for remote pass-phrase authentication |
US5742905A (en) * | 1994-09-19 | 1998-04-21 | Bell Communications Research, Inc. | Personal communications internetworking |
US5751799A (en) * | 1994-02-17 | 1998-05-12 | Fujitsu Limited | Method and device for charging during data communication time in a data switching network |
US5764890A (en) * | 1994-12-13 | 1998-06-09 | Microsoft Corporation | Method and system for adding a secure network server to an existing computer network |
US5771354A (en) * | 1993-11-04 | 1998-06-23 | Crawford; Christopher M. | Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services |
US5778071A (en) * | 1994-07-12 | 1998-07-07 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
US5790548A (en) * | 1996-04-18 | 1998-08-04 | Bell Atlantic Network Services, Inc. | Universal access multimedia data network |
US5802502A (en) * | 1993-05-24 | 1998-09-01 | British Telecommunications Public Limited Company | System for selective communication connection based on transaction pricing signals |
US5862203A (en) * | 1995-07-21 | 1999-01-19 | Call Manage | Telecommunications call management system |
US5887065A (en) * | 1996-03-22 | 1999-03-23 | Activcard | System and method for user authentication having clock synchronization |
US5889942A (en) * | 1996-12-18 | 1999-03-30 | Orenshteyn; Alexander S. | Secured system for accessing application services from a remote station |
US5893077A (en) * | 1995-08-23 | 1999-04-06 | Microsoft Corporation | Method and apparatus for generating and collecting a billing event object within an on-line network |
US5907610A (en) * | 1996-01-11 | 1999-05-25 | U S West, Inc. | Networked telephony central offices |
US5915006A (en) * | 1997-05-01 | 1999-06-22 | At&T Corp. | Telephone line aggregated billing |
US5953389A (en) * | 1993-11-16 | 1999-09-14 | Bell Atlantic Network Services, Inc. | Combination system for provisioning and maintaining telephone network facilities in a public switched telephone network |
US5956690A (en) * | 1997-09-03 | 1999-09-21 | The Detroit Medical Center | Bundled billing accounting computer systems |
US5987430A (en) * | 1997-08-28 | 1999-11-16 | Atcom, Inc. | Communications network connection system and method |
US6119109A (en) * | 1996-09-30 | 2000-09-12 | Digital Vision Laboratories Corporation | Information distribution system and billing system used for the information distribution system |
US6137869A (en) * | 1997-09-16 | 2000-10-24 | Bell Atlantic Network Services, Inc. | Network session management |
US6272341B1 (en) * | 1995-11-30 | 2001-08-07 | Motient Services Inc. | Network engineering/systems engineering system for mobile satellite communication system |
US6279038B1 (en) * | 1995-04-13 | 2001-08-21 | Global Crossing, North America | Client interface |
US6338046B1 (en) * | 1997-10-06 | 2002-01-08 | Nokia Telecommunications, Oy | System and method for determining charges for usage of a network connection |
US6349289B1 (en) * | 1998-01-16 | 2002-02-19 | Ameritech Corporation | Method and system for tracking computer system usage through a remote access security device |
US6504907B1 (en) * | 1998-03-26 | 2003-01-07 | Verizon Services Corp. | Call detail reporting for lawful surveillance |
US6533108B1 (en) * | 2000-07-07 | 2003-03-18 | Valu Engineering, Inc. | Serpentine clip |
US6654451B1 (en) * | 2000-02-07 | 2003-11-25 | Bellsouth Intellectual Property Corporation | Methods and systems for billing and routing local toll-free calls |
US20040019683A1 (en) * | 2002-07-25 | 2004-01-29 | Lee Kuo Chu | Protocol independent communication system for mobile devices |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4430728A (en) * | 1981-12-29 | 1984-02-07 | Marathon Oil Company | Computer terminal security system |
SE9102218L (en) | 1991-07-22 | 1992-06-22 | Volvo Ab | DEVICE FOR INDICATING A PRELIMINARY TENSION POWER IN THE LONG-TREAD, FLEXIBLE ELEMENT |
JPH05118861A (en) * | 1991-10-29 | 1993-05-14 | Hitachi Cable Ltd | Signal processing method of phase-modulation optical fiber gyro |
US5280581A (en) * | 1992-02-27 | 1994-01-18 | Hughes Aircraft Company | Enhanced call-back authentication method and apparatus for remotely accessing a host computer from a plurality of remote sites |
BE1004536A6 (en) * | 1992-09-18 | 1992-12-08 | Stelton Ltd | Data transmission and access control them. |
JPH0876295A (en) * | 1994-08-31 | 1996-03-22 | Casio Comput Co Ltd | Image reproducing device and image picking up and reproducing device |
JPH09327959A (en) * | 1996-06-10 | 1997-12-22 | Ricoh Co Ltd | Printer money-allocating system |
US5867495A (en) | 1996-11-18 | 1999-02-02 | Mci Communications Corporations | System, method and article of manufacture for communications utilizing calling, plans in a hybrid network |
US5867494A (en) | 1996-11-18 | 1999-02-02 | Mci Communication Corporation | System, method and article of manufacture with integrated video conferencing billing in a communication system architecture |
AU2558899A (en) | 1998-01-16 | 1999-08-02 | Ameritech Corporation | System and method for providing secure remote access to a computer network |
WO1999046691A1 (en) * | 1998-03-09 | 1999-09-16 | Farrell Newton | Internet, intranet and other network communication security systems utilizing entrance and exit keys |
-
1998
- 1998-01-16 US US09/008,344 patent/US6349289B1/en not_active Expired - Fee Related
-
1999
- 1999-01-14 AU AU23191/99A patent/AU2319199A/en not_active Abandoned
- 1999-01-14 WO PCT/US1999/000779 patent/WO1999036875A1/en active Application Filing
-
2001
- 2001-12-18 US US10/024,734 patent/US7020628B2/en not_active Expired - Fee Related
-
2005
- 2005-11-04 US US11/267,245 patent/US7181421B2/en not_active Expired - Fee Related
-
2007
- 2007-01-05 US US11/650,300 patent/US20070219881A1/en not_active Abandoned
Patent Citations (80)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US4484306A (en) * | 1982-03-22 | 1984-11-20 | Exide Electronics Corporation | Method and apparatus for controlling access in a data transmission system |
US4672572A (en) * | 1984-05-21 | 1987-06-09 | Gould Inc. | Protector system for computer access and use |
US4800590A (en) * | 1985-01-14 | 1989-01-24 | Willis E. Higgins | Computer key and computer lock system |
US4827508A (en) * | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4977594A (en) * | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4776004A (en) * | 1987-03-13 | 1988-10-04 | American Telephone And Telegraph Company, At&T Bell Laboratories | Communication services method and apparatus |
US4757267A (en) * | 1987-06-17 | 1988-07-12 | Applied Telematics, Inc. | Telephone system for connecting a customer to a supplier of goods |
US4757267B1 (en) * | 1987-06-17 | 1991-05-21 | Applied Telematics Inc | |
US4944007A (en) * | 1988-08-19 | 1990-07-24 | Ncr Corporation | Public key diversification method |
US4994963A (en) * | 1988-11-01 | 1991-02-19 | Icon Systems International, Inc. | System and method for sharing resources of a host computer among a plurality of remote computers |
US5113499A (en) * | 1989-04-28 | 1992-05-12 | Sprint International Communications Corp. | Telecommunication access management system for a packet switching network |
US5560008A (en) * | 1989-05-15 | 1996-09-24 | International Business Machines Corporation | Remote authentication and authorization in a distributed data processing system |
US5068894A (en) * | 1989-08-22 | 1991-11-26 | U.S. Philips Corp. | Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system |
US5120939A (en) * | 1989-11-09 | 1992-06-09 | At&T Bell Laboratories | Databaseless security system |
US5115466A (en) * | 1989-11-13 | 1992-05-19 | Alcatel Stk A/S | Communication network intended for secure transmission of speech and data |
US5003584A (en) * | 1990-04-16 | 1991-03-26 | At&T Bell Laboratories | Method and apparatus for the billing of value-added communication calls |
US5196840A (en) * | 1990-11-05 | 1993-03-23 | International Business Machines Corporation | Secure communications system for remotely located computers |
US5216703A (en) * | 1991-06-17 | 1993-06-01 | Pactel Corporation | Piggy-back number and routing isolation for cellular telephone switches |
US5276444A (en) * | 1991-09-23 | 1994-01-04 | At&T Bell Laboratories | Centralized security control system |
US5291551A (en) * | 1991-10-23 | 1994-03-01 | At&T Bell Laboratories | Home agent telecommunication technique |
US5534857A (en) * | 1991-11-12 | 1996-07-09 | Security Domain Pty. Ltd. | Method and system for secure, decentralized personalization of smart cards |
US5508817A (en) * | 1992-03-19 | 1996-04-16 | Fujitsu Limited | Electronic mail accounting system |
US5502576A (en) * | 1992-08-24 | 1996-03-26 | Ramsay International Corporation | Method and apparatus for the transmission, storage, and retrieval of documents in an electronic domain |
US5646998A (en) * | 1992-11-17 | 1997-07-08 | Stambler; Leon | Secure transaction system and method utilized therein |
US5361062A (en) * | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
US5317636A (en) * | 1992-12-09 | 1994-05-31 | Arris, Inc. | Method and apparatus for securing credit card transactions |
US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
US5392345A (en) * | 1993-04-30 | 1995-02-21 | At&T Corp. | Work at home ACD agent network |
US5561282A (en) * | 1993-04-30 | 1996-10-01 | Microbilt Corporation | Portable signature capture pad |
US5802502A (en) * | 1993-05-24 | 1998-09-01 | British Telecommunications Public Limited Company | System for selective communication connection based on transaction pricing signals |
US5661807A (en) * | 1993-07-30 | 1997-08-26 | International Business Machines Corporation | Authentication system using one-time passwords |
US5546379A (en) * | 1993-10-01 | 1996-08-13 | Nec America | Bandwidth-on-demand remote office network apparatus and method |
US5633919A (en) * | 1993-10-15 | 1997-05-27 | Linkusa Corporation | Real-time billing system for a call processing system |
US6016343A (en) * | 1993-10-15 | 2000-01-18 | Link Usa Corporation | Call-processing system and method |
US5586175A (en) * | 1993-10-15 | 1996-12-17 | Linkusa Corporation | Call-processing system and method |
US5590181A (en) * | 1993-10-15 | 1996-12-31 | Link Usa Corporation | Call-processing system and method |
US5873099A (en) * | 1993-10-15 | 1999-02-16 | Linkusa Corporation | System and method for maintaining redundant databases |
US5615251A (en) * | 1993-10-15 | 1997-03-25 | Linkusa Corporation | Real-time reconfiguration |
US5854833A (en) * | 1993-10-15 | 1998-12-29 | Linkusa Corporation | Processing using DEF records |
US5638430A (en) * | 1993-10-15 | 1997-06-10 | Linkusa Corporation | Call validation system |
US5799156A (en) * | 1993-10-15 | 1998-08-25 | Linkusa Corporation | System for determining an alternative application to receive message from first application when the number of times to resend the message to second application is exceeded |
US6014651A (en) * | 1993-11-04 | 2000-01-11 | Crawford; Christopher M. | Commercial online software distribution systems and methods using encryption for security |
US5901228A (en) * | 1993-11-04 | 1999-05-04 | Crawford; Christopher M. | Commercial online backup service that provides transparent extended storage to remote customers over telecommunications links |
US6327579B1 (en) * | 1993-11-04 | 2001-12-04 | Christopher M. Crawford | Online computer services including help desk, anti-virus and/or application service features |
US5771354A (en) * | 1993-11-04 | 1998-06-23 | Crawford; Christopher M. | Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services |
US5953389A (en) * | 1993-11-16 | 1999-09-14 | Bell Atlantic Network Services, Inc. | Combination system for provisioning and maintaining telephone network facilities in a public switched telephone network |
US5751799A (en) * | 1994-02-17 | 1998-05-12 | Fujitsu Limited | Method and device for charging during data communication time in a data switching network |
US5412723A (en) * | 1994-03-01 | 1995-05-02 | International Business Machines Corporation | Mechanism for keeping a key secret from mobile eavesdroppers |
US5493492A (en) * | 1994-03-30 | 1996-02-20 | Cramer; Milton L. | Device for recording billable time and services |
US5481613A (en) * | 1994-04-15 | 1996-01-02 | Northern Telecom Limited | Computer network cryptographic key distribution system |
US5778071A (en) * | 1994-07-12 | 1998-07-07 | Information Resource Engineering, Inc. | Pocket encrypting and authenticating communications device |
US5742905A (en) * | 1994-09-19 | 1998-04-21 | Bell Communications Research, Inc. | Personal communications internetworking |
US5606617A (en) * | 1994-10-14 | 1997-02-25 | Brands; Stefanus A. | Secret-key certificates |
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5553239A (en) * | 1994-11-10 | 1996-09-03 | At&T Corporation | Management facility for server entry and application utilization in a multi-node server configuration |
US5764890A (en) * | 1994-12-13 | 1998-06-09 | Microsoft Corporation | Method and system for adding a secure network server to an existing computer network |
US5696906A (en) * | 1995-03-09 | 1997-12-09 | Continental Cablevision, Inc. | Telecommunicaion user account management system and method |
US6279038B1 (en) * | 1995-04-13 | 2001-08-21 | Global Crossing, North America | Client interface |
US5737414A (en) * | 1995-05-24 | 1998-04-07 | Walker Asset Management Limited Partnership | 900 number billing and collection system and method for on-line computer services |
US6249865B1 (en) * | 1995-05-24 | 2001-06-19 | Walker Digital, Llc | Systems and methods for a user to access digital data provided by an on-line server over a data network |
US5862203A (en) * | 1995-07-21 | 1999-01-19 | Call Manage | Telecommunications call management system |
US5893077A (en) * | 1995-08-23 | 1999-04-06 | Microsoft Corporation | Method and apparatus for generating and collecting a billing event object within an on-line network |
US6272341B1 (en) * | 1995-11-30 | 2001-08-07 | Motient Services Inc. | Network engineering/systems engineering system for mobile satellite communication system |
US5907610A (en) * | 1996-01-11 | 1999-05-25 | U S West, Inc. | Networked telephony central offices |
US5887065A (en) * | 1996-03-22 | 1999-03-23 | Activcard | System and method for user authentication having clock synchronization |
US5790548A (en) * | 1996-04-18 | 1998-08-04 | Bell Atlantic Network Services, Inc. | Universal access multimedia data network |
US5740361A (en) * | 1996-06-03 | 1998-04-14 | Compuserve Incorporated | System for remote pass-phrase authentication |
US6119109A (en) * | 1996-09-30 | 2000-09-12 | Digital Vision Laboratories Corporation | Information distribution system and billing system used for the information distribution system |
US5889942A (en) * | 1996-12-18 | 1999-03-30 | Orenshteyn; Alexander S. | Secured system for accessing application services from a remote station |
US5915006A (en) * | 1997-05-01 | 1999-06-22 | At&T Corp. | Telephone line aggregated billing |
US5987430A (en) * | 1997-08-28 | 1999-11-16 | Atcom, Inc. | Communications network connection system and method |
US5956690A (en) * | 1997-09-03 | 1999-09-21 | The Detroit Medical Center | Bundled billing accounting computer systems |
US6137869A (en) * | 1997-09-16 | 2000-10-24 | Bell Atlantic Network Services, Inc. | Network session management |
US6338046B1 (en) * | 1997-10-06 | 2002-01-08 | Nokia Telecommunications, Oy | System and method for determining charges for usage of a network connection |
US6349289B1 (en) * | 1998-01-16 | 2002-02-19 | Ameritech Corporation | Method and system for tracking computer system usage through a remote access security device |
US6504907B1 (en) * | 1998-03-26 | 2003-01-07 | Verizon Services Corp. | Call detail reporting for lawful surveillance |
US6654451B1 (en) * | 2000-02-07 | 2003-11-25 | Bellsouth Intellectual Property Corporation | Methods and systems for billing and routing local toll-free calls |
US6533108B1 (en) * | 2000-07-07 | 2003-03-18 | Valu Engineering, Inc. | Serpentine clip |
US20040019683A1 (en) * | 2002-07-25 | 2004-01-29 | Lee Kuo Chu | Protocol independent communication system for mobile devices |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8640036B2 (en) | 2010-04-07 | 2014-01-28 | Cisco Techology, Inc. | Messaging and presence protocol as a configuration and management bus for embedded devices |
US8954866B2 (en) | 2010-04-07 | 2015-02-10 | Cisco Technology, Inc. | Messaging and presence protocol as a configuration and management bus for embedded devices |
US9553831B2 (en) | 2013-04-11 | 2017-01-24 | Cisco Technology, Inc. | Adaptive publish/subscribe system |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10269065B1 (en) | 2013-11-15 | 2019-04-23 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US10880313B2 (en) | 2018-09-05 | 2020-12-29 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US11399029B2 (en) | 2018-09-05 | 2022-07-26 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US12074876B2 (en) | 2018-09-05 | 2024-08-27 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
Also Published As
Publication number | Publication date |
---|---|
US7020628B2 (en) | 2006-03-28 |
US7181421B2 (en) | 2007-02-20 |
AU2319199A (en) | 1999-08-02 |
US20020103760A1 (en) | 2002-08-01 |
US20060059057A1 (en) | 2006-03-16 |
WO1999036875A1 (en) | 1999-07-22 |
US6349289B1 (en) | 2002-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7181421B2 (en) | 2007-02-20 | Method and system for tracking computer system usage through a remote access security device |
RU2212057C2 (en) | 2003-09-10 | Realization of charge for service in telecommunication system |
US6148301A (en) | 2000-11-14 | Information distribution system |
US6115737A (en) | 2000-09-05 | System and method for accessing customer contact services over a network |
US6249571B1 (en) | 2001-06-19 | Telemanagement system with modular features and database synchronization |
US20020194143A1 (en) | 2002-12-19 | Method and system for usage-based pricing of E-content |
US7861283B2 (en) | 2010-12-28 | User position utilization system |
US8417632B2 (en) | 2013-04-09 | Systems and methods for interfacing with a billing and account management unit |
US7793352B2 (en) | 2010-09-07 | Sharing network access capacities across internet service providers |
WO2000014919A2 (en) | 2000-03-16 | Apparatus and methods for connecting a network user to a network service provider |
US7184526B1 (en) | 2007-02-27 | Telephone-based selection, ordering, and billing of digital content delivered via a network |
US7720818B1 (en) | 2010-05-18 | On-line account management system having a tiered account information storage system |
US6173046B1 (en) | 2001-01-09 | Customer group billing |
WO1999037055A1 (en) | 1999-07-22 | System and method for providing secure remote access to a computer network |
US8189751B2 (en) | 2012-05-29 | Tracking trunk usage in an enterprise network |
KR20010001199A (en) | 2001-01-05 | Internet information billing system |
Cisco | 2001-04-11 | Determining Service Provider Requirements |
JP2002026954A (en) | 2002-01-25 | Network address management system and its method |
KR20000054362A (en) | 2000-09-05 | accounts service process and thereof system utilizing internet |
US20030074438A1 (en) | 2003-04-17 | Techniques for enabling an internet services provider to perform office operations and functions |
US8060467B1 (en) | 2011-11-15 | On-line account management system having a synchronized account information data store |
WO2003094000A2 (en) | 2003-11-13 | System for internet usage determination |
AU759926B2 (en) | 2003-05-01 | Implementation of charging in a telecommunications system |
Kasacavage | 2002 | Providing Access to External Databases |
Lüpken et al. | 2000 | Functional Integration Test of Mass Processes with Electronic Signatures in Public Administration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2010-05-24 | STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |