throbber
(12) United States Patent
`Devine et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 6,606,708 B1
`Aug. 12,2003
`
`US006606708B1
`
`(54)
`
`(75)
`
`(73)
`(*)
`
`(21)
`(22)
`
`(60)
`
`(51)
`
`(52)
`
`(58)
`
`(56)
`
`SECURE SERVER ARCHITECTURE FOR
`WEB BASED DATA MANAGEMENT
`
`EP
`
`FOREIGN PATENT DOCUMENTS
`0 809 387 A2
`5/1997
`
`Inventors: Carol Y. Devine, Colorado Springs, CO (US); Gerald A. Shifrin, Monument,
`
`CO (US); Richard W. Shoulberg,
`Manitou Springs, CO (US)
`
`Assignee; WorldCOm, Inc” Clinton, MS (Us)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`USO 154(k)) by 0 days'
`
`Appl' NO‘: 09/159’406
`
`W0
`
`WO 99/01826
`
`1/1999
`
`OTHER PUBLICATIONS
`
`Biggs, M., “Help for the Web enhances customer support,
`reduces help disk load” Inforworld, Jun. 16, 1997, v. 19, No.
`24, pp- 82+
`
`_
`_
`(List continued on neXt page.)
`
`Primary Examiner—Gail Hayes
`Assistant Examiner—Taghi T. Arani
`
`Related U-S- Application Data
`Provisional application N°~ 60/060,655, ?led 9n SeP~ 26,
`1997'
`InL C]_7 _______________________ __ G061? 15/16; G061? 13/14;
`G061? 13/36
`U_S_ CL _____________________ __ 713/201; 713/201; 709/200;
`709/201; 709/203; 709/217; 709/218; 709/219;
`707/740; 707/103; 705/26; 705/27
`Field of Search ............................... .. 709/200—203,
`709/217_219, 227; 705/26, 27; 707 /1_10,
`103, 517, 522, 523; 713/201
`
`References Cited
`
`Us PATENT DOCUMENTS
`4 160 129 A
`7/1979 PeySer et a1‘
`4:345:315 A
`8/1982 Cadotte et a1_
`4,817,050 A
`3/1989 Komatsu et a1
`4,893,248 A
`1/1990 Pins er a1,
`4,972,504 A 11/1990 Daniel, Jr. et al.
`5,041,972 A
`8/ 1991 Frost
`5,075,771 A 12/1991 Hashimoto
`5,131,020 A
`7/1992 Liebesny et 211.
`
`(List continued on neXt page.)
`
`A double ?reWalled system is disclosed for protecting
`remote enterprise servers that provide communication ser
`vices to telecommunication network customers from unau
`thoriZed third parties. A ?rst router directs all connection
`requests to one or more secure Web servers, Which may
`utilize a load balancer to ef?ciently distribute the session
`connection load among a high number of authorized Client
`users. On the network side of the Web servers, a second
`router directs an Connection requests to a dispatcher Server’
`Which routes application server calls to a proXy server for the
`application requested. Aplurality of data security protocols
`are also employed. The protocols provide for an identi?ca
`tion of the user, and an authentication of the user to ensure
`the user is Who he/she claims to be and a determination of
`entitlements that the user may avail themselves of Within the
`enterprise system. Session security is described, particularly
`as to the differences betWeen a remote user’s copper Wire
`connection to a legacy system and a user’s remote connec
`tion to the enterprise system over a “stateless”public
`Internet, Where each session is a single transmission, rather
`than an interval of time betWeen logon and logoff, as is
`Customary in legacy Systems
`
`26 Claims, 17 Drawing Sheets
`
`COBackPlane
`
`ssrgiswajsam)
`
`Web Browser
`
`/
`
`COAPP
`Launching from
`Backpiane
`
`54(a)
`
`COApp
`(e.g. Service inquiry)
`
`has
`
`COAppFrame Application Using
`Common Object
`Services
`
`Graphical User
`inie rface
`Object
`
`55(8)
`
`COAppFrame
`has a Number
`of COViews
`
`IBM / Softlayer v. ZitoVault
`Ex. 1005 / Page 1 of 36
`
`

`
`US 6,606,708 B1
`Page 2
`
`US. PATENT DOCUMENTS
`
`5,136,707
`5,223,699
`5,228,076
`5,245,533
`5,262,760
`5,285,494
`5,287,270
`5,313,598
`5,315,093
`5,325,290
`5,327,486
`5,361,259
`5,369,571
`5,452,446
`5,475,836
`5,481,542
`5,483,596
`5,490,060
`5,491,779
`5,506,893
`5,526,257
`5,530,744
`5,533,108
`5,537,611
`5,539,734
`5,548,726
`5,551,025
`5,555,290
`5,563,805
`5,566,351
`5,586,260
`5,602,918
`5,610,915
`5,621,727
`5,623,601
`5,630,066
`5,649,182
`5,650,994
`5,659,601
`5,666,481
`5,671,354
`5,689,645
`5,692,030
`5,692,181
`5,694,546
`5,696,906
`5,699,403
`5,699,528
`5,706,502
`5,708,780
`5,710,882
`5,721,908
`5,721,913
`5,727,129
`5,734,709
`5,734,831
`5,742,762
`5,742,763
`5,742,768
`5,742,905
`5,745,754
`5,754,830
`5,757,900
`5,764,756
`5,768,501
`5,774,660
`5,778,178
`5,778,377
`5,781,550
`5,781,632
`
`8/1992
`6/1993
`7/1993
`9/1993
`11/1993
`2/1994
`2/1994
`5/1994
`5/1994
`6/1994
`7/1994
`11/1994
`11/1994
`9/1995
`12/1995
`1/1996
`1/1996
`2/1996
`2/1996
`4/1996
`6/1996
`6/1996
`7/1996
`7/1996
`7/1996
`8/1996
`8/1996
`9/1996
`10/1996
`10/1996
`12/1996
`2/1997
`3/1997
`4/1997
`4/1997
`5/1997
`7/1997
`7/1997
`8/1997
`9/1997
`9/1997
`11/1997
`11/1997
`11/1997
`12/1997
`12/1997
`12/1997
`12/1997
`1/1998
`1/1998
`1/1998
`2/1998
`2/1998
`3/1998
`3/1998
`3/1998
`4/1998
`4/1998
`4/1998
`4/1998
`4/1998
`5/1998
`5/1998
`6/1998
`6/1998
`6/1998
`7/1998
`7/1998
`7/1998
`7/1998
`
`Block et al.
`Flynn et al.
`Hopner et al.
`Marshall
`Iwamura et al.
`Sprecher et al.
`Hardy et al.
`Yamakawa
`Stewart
`Cauffman et al.
`Wolff et al.
`Hunt et al.
`Metts
`Johnson
`Harris et al.
`Logston et al.
`Rosenow et al.
`Malec et al.
`BeZjian
`Buscher et al.
`Lerner
`Charalambous et al.
`Harris et al.
`Rajagopal et al.
`Burwell et al.
`Pettus
`O’Reilly
`McLeod et al.
`O’Reilly et al.
`Crittenden et al.
`Hu
`Chen et al.
`Elliott et al.
`Vaudreuil
`Vu
`Gosling
`ReitZ
`Daley
`Cheslog
`Lewis
`Ito et al.
`Schettler et al.
`Teglovic et al.
`Anand et al.
`Reisman
`Peters et al.
`Ronnen
`Hogan
`Foley et al.
`Levergood et al.
`Svennevik et al.
`Lagarde et al.
`Ackroff et al.
`Barrett et al.
`DeWitt et al.
`Sanders
`Scholl et al.
`Jones
`Gennaro et al.
`Pepe et al.
`Lagarde et al.
`Butts et al.
`Nagel et al.
`Onweller
`Lewis
`Brendel et al.
`Arunachalam
`Marlin et al.
`Templin et al.
`Odom
`
`5,787,160
`5,787,412
`5,790,780
`5,790,789
`5,790,797
`5,790,809
`5,793,694
`5,793,762
`5,793,964
`5,796,393
`5,799,154
`5,802,320
`5,805,803
`5,812,533
`5,812,654
`5,812,750
`5,815,080
`5,815,665
`5,819,225
`5,819,271
`5,825,769
`5,825,890
`5,826,029
`5,826,269
`5,832,519
`5,835,084
`5,844,896
`5,845,067
`5,845,267
`5,848,233
`5,848,396
`5,848,399
`5,850,517
`5,852,810
`5,852,812
`5,862,325
`5,867,495
`5,870,558
`5,875,236
`5,877,759
`5,881,237
`5,883,948
`5,884,032
`5,884,312
`5,892,900
`5,907,681
`5,909,679
`5,909,682
`5,915,001
`5,920,542
`5,923,016
`5,930,764
`5,930,804
`5,933,142
`5,937,165
`5,938,729
`5,949,976
`5,953,389
`5,956,714
`5,958,016
`5,960,411
`5,961,602
`5,963,925
`5,966,695
`5,970,467
`5,974,396
`5,974,441
`5,982,864
`5,982,891
`5,983,350
`5,991,733
`
`7/1998
`7/1998
`8/1998
`8/1998
`8/1998
`8/1998
`8/1998
`8/1998
`8/1998
`8/1998
`8/1998
`9/1998
`9/1998
`9/1998
`9/1998
`9/1998
`9/1998
`9/1998
`10/1998
`10/1998
`10/1998
`10/1998
`10/1998
`10/1998
`11/1998
`11/1998
`12/1998
`12/1998
`12/1998
`12/1998
`12/1998
`12/1998
`12/1998
`12/1998
`12/1998
`1/1999
`2/1999
`2/1999
`2/1999
`3/1999
`3/1999
`3/1999
`3/1999
`3/1999
`4/1999
`5/1999
`6/1999
`6/1999
`6/1999
`7/1999
`7/1999
`7/1999
`7/1999
`8/1999
`8/1999
`8/1999
`9/1999
`9/1999
`9/1999
`9/1999
`9/1999
`10/1999
`10/1999
`10/1999
`10/1999
`10/1999
`10/1999
`11/1999
`11/1999
`11/1999
`11/1999
`
`Chaney et al.
`Bosch et al.
`Brichta et al.
`Suarez
`Shimada et al.
`Holmes
`Akiba et al.
`Penners et al.
`Rogers et al.
`MacNaughton et al.
`Kuriyan
`Baehr et al.
`Birrell et al.
`Cox et al.
`Anderson et al.
`Dev et al.
`Taguchi
`Teper et al.
`Eastwood et al.
`Mahoney et al.
`O’Reilly et al.
`Elgamal et al.
`Gore, Jr. et al.
`Hussey
`Bowen et al.
`Bailey et al.
`Marks et al.
`Porter et al.
`Ronen
`Radia et al.
`Gerace
`Burke
`Verkler et al.
`Sotiroff et al.
`Reeder
`Reed et al.
`Elliott et al.
`Branton, Jr. et al.
`JankowitZ et al.
`Bauer
`Schwaller et al.
`Dunn
`Bateman et al.
`Dustan et al.
`Ginter et al.
`Bates et al.
`Hall
`Cowan et al.
`Uppaluru
`Henderson
`Fredregill et al.
`Melchione et al.
`Yu et al.
`LaStrange et al.
`Schwaller et al.
`Cote et al.
`Chappelle
`Pruett et al.
`Condon
`Chang et al.
`Hartman et al.
`Thompson et al.
`Kolling et al.
`Melchione et al.
`Alavi
`Anderson et al.
`Rogers et al.
`Jagadish et al.
`Ginter et al.
`Minear et al.
`Aleia et al.
`
`Ex. 1005 / Page 2 of 36
`
`

`
`US 6,606,708 B1
`Page 3
`
`5,991,746
`5,991,806
`5,999,525
`5,999,965
`5,999,972
`5,999,973
`6,003,079
`6,006,265
`6,011,844
`6,012,090
`6,014,647
`6,014,702
`6,018,768
`6,021,409
`6,023,762
`6,029,182
`6,031,904
`6,032,132
`6,032,184
`6,041,325
`6,041,357
`6,044,144
`6,044,362
`6,049,602
`6,049,789
`6,052,450
`6,058,170
`6,058,381
`6,064,667
`6,065,002
`6,065,059
`6,072,493
`6,073,105
`6,073,122
`6,073,241
`6,078,891
`6,078,924
`6,084,953
`6,085,171
`6,085,190
`6,088,451
`6,088,796
`6,091,808
`6,094,655
`6,104,704
`6,105,131
`6,108,700
`6,108,782
`6,112,238
`6,112,242
`6,115,040
`6,115,458
`6,115,693
`6,115,737
`6,119,109
`6,122,258
`6,128,624
`
`1 1/1999
`1 1/ 1999
`12/ 1999
`12/ 1999
`12/ 1999
`12/1999
`12/ 1999
`12/ 1999
`1/ 2000
`1/ 2000
`1/ 2000
`1/ 2000
`1/ 2000
`2/2000
`2/ 2000
`2/ 2000
`2/ 2000
`2/ 2000
`2/ 2000
`3/ 2000
`3/ 2000
`3/ 2000
`3/2000
`4/2000
`4/ 2000
`4/ 2000
`5/ 2000
`5/ 2000
`5/ 2000
`5/2000
`5/ 2000
`6/ 2000
`6/ 2000
`6/ 2000
`6/ 2000
`6/ 2000
`6/ 2000
`7/2000
`7/ 2000
`7/ 2000
`7/ 2000
`7/ 2000
`7/ 2000
`7/ 2000
`8/ 2000
`8/ 2000
`8/ 2000
`8/2000
`8/ 2000
`8/ 2000
`9/2000
`9/ 2000
`9/ 2000
`9/ 2000
`9/ 2000
`9/ 2000
`10/2000
`
`Wang
`McHann, Jr.
`Krishnaswamy et al.
`Kelly
`Gish
`Glitho et al.
`Friedrich et al.
`Rangan et al.
`Uppaluru et al.
`Chung et al.
`NiZZari et al.
`King et al.
`Ullman et al.
`Burrows
`Dean et al.
`Nehab et al.
`An et al.
`Nelson
`Cogger et al.
`Shah et al.
`KunZelman et al.
`Becker et al.
`Neely
`Foladare et al.
`Frison et al.
`Allison et al.
`Jagadish et al.
`Nelson
`Gisby et al.
`Knotts et al.
`Shieh et al.
`Driskell et al.
`Sutcliffe et al.
`Wool
`Rosenberg et al.
`Riordan et al.
`Ainsbury et al.
`Bardenheuer et al.
`Leonard
`Sakata
`He et al.
`Cianfrocca et al.
`Wood et al.
`Rogers et al.
`Buhler et al.
`Carroll
`Maccobee et al.
`Fletcher et al.
`Boyd et al.
`Jois et al.
`Bladow et al.
`Taskett
`McDonough et al.
`Ely et al.
`Muratani et al.
`Brown
`Papierniak et al.
`
`6,130,933 A 10/2000 Miloslavsky
`6,131,095 A 10/2000 Low et al.
`6,131,116 A 10/2000 Riggins et al.
`6,134,584 A 10/2000 Chang et al.
`6,137,869 A 10/2000 Voit et al.
`6,145,001 A 11/2000 Scholl et al.
`6,154,744 A 11/2000 Kenner et al.
`6,161,102 A 12/2000 Yanagihara et al.
`6,161,126 A 12/2000 Wies et al. ............... .. 709/203
`6,161,128 A 12/2000 Smyk
`6,173,311 B1
`1/2001 Hassett et al.
`6,182,113 B1
`1/2001 Narayanaswami
`6,205,456 B1
`3/2001 Nakao
`6,212,506 B1
`4/2001 Shah et al.
`6,212,558 B1
`4/2001 Antur et al.
`6,240,450 B1
`5/2001 Sharples et al.
`6,253,239 B1
`6/2001 Shklar et al.
`6,286,050 B1
`9/2001 Pullen et al.
`6,292,481 B1
`9/2001 Voit et al.
`6,295,551 B1
`9/2001 Roberts et al.
`6,377,993 B1
`4/2002 Brandt et al.
`2001/0003828 A1
`1/2001 Narayanaswami
`2001/0001014 A1
`5/2001 Akins, III et al.
`
`OTHER PUBLICATIONS
`
`Burch, B., “AT&T, MCI to release neW management tools”,
`Network World, Jan. 17, 1994, p. 19.
`LoW, C., “Integrating Communication Services” , IEEE
`Communication Magazine, Jun. 1997, pp. 164—169.
`“McAfee’s NeW ‘Self—Service’ Help Desk Web Suite Makes
`PCs Help Desk—Ready” , NeWsWire Association, Inc., Oct.
`13, 1997.
`Niemeyer, R., “Using Web Technologies in TWo MLS
`Environments: A Security Analysis.” IEEE, pp. 205—214,
`1997.
`Porter, T., “MCI offers tracking system: Direct Dispatch lets
`users eye problems remotely” , Service News, Apr. 1994, p.
`17.
`Shklar, L., et al., “MetaMagic: Generating Virtual Web Sites
`Through Data Modeling,” http://WWW.scope.gmd.de/info/
`WWW6/posters/714/poster714.html.
`ViZard, M. et al., “MCI to Pilot Convergence Billing Ser
`vice” , InforWorla', v. 18, Issue 37, Sep. 9, 1996.
`Yager, T., “Mixed Messages” , UNIXReview, v. 16, N. 2, p.
`29, Feb. 1998.
`“Carriers Improve Net Management Services” , Communi
`cations Week, May 2, 1994, p. 74.
`“NetWork management; neW software platform enhances
`netWork management capabilities; MCI ServiceVieW offers
`greater cost savings, increased ?exibility.” , Product
`Announcement, Edge, Oct. 2, 1995, on & about AT&T, v.
`10, n. 375, p. 11(1).
`* cited by examiner
`
`Ex. 1005 / Page 3 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 1 of 17
`
`US 6,606,708 B1
`
`Emgomm
`
`mmmc_m:m_
`
`o_mo._
`
`v:o>>mEm._u_
`_mEmu<
`
`§Qmu<
`>ommm4
`
`aw
`
`
`
`.b:wb:_.05.
`
`Back-End
`Services
`
`
`
`v:o>>mEm.u__m=:o$Eo._<.oEoE__o_>_c
`
`
`
`
`
`v:w-E9u_
`
`
`
`u_mo._wmm_.__w:m_
`
`wcm_n_.xom.m
`
`mmo_>._mm
`
`:o.=mEmw2n_
`
`mmo_Zom
`
`Ex. 1005/ Page 4 of 36
`
`Ex. 1005 / Page 4 of 36
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 2 0f 17
`
`US 6,606,708 B1
`
`1 Java Applet I‘
`""'\
`
`I
`
`[12
`
`COBackPlane
`
`,swgiszuélsam)
`
`/ 14
`
`/
`
`Web Browser
`
`\
`
`COApp
`Launching from
`Backplane
`
`COApp
`(e.g. Service Inquiry)
`
`54(8)
`
`54(b)
`
`COApp
`(Alarm Monitor)
`
`Application Using
`Common Object
`Services
`
`Graphical User
`Interface
`ObjBCt
`
`56(8)
`
`COAppFrame
`has a Number
`of COViews
`
`FIG. 2
`
`Ex. 1005 / Page 5 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 3 0f 17
`
`US 6,606,708 B1
`
`D networkMCl Internet Home
`Eile Edit \_liew Q0 Favorites ?elp
`
`!@E
`
`Back Forward Stop Refresh Home Search Favorites
`[I Address ID https://mci.com/homehtml
`
`l
`
`[networkMCl Interact
`
`MC
`network
`I
`
`t
`R rt R
`‘El’ epo
`eques or
`Iii/Traffic Monitor
`73
`70 ’ A {LU/Aim Momtor
`,-/ E Network Manager
`75
`Erllntelligent Routing
`
`“mars
`New
`
`256 "
`
`Features
`Bene?ts
`
`/—257
`
`networkMCl Interact
`Support
`'3 Help
`Copyright 1997, 1998, MCI Telecommunications Corporation, All Rights Reserved.
`The names, logos, taglines and icons identifying MCI's products and services are proprietary
`marks of MCI Communications Corporations.
`
`254 Application Toolbar
`
`'glgjgl
`
`IMCHRR ||TM HAMHNMH IR Hue“ 7'
`
`FIG. 3
`
`Ex. 1005 / Page 6 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 4 of 17
`
`US 6,606,708 B1
`
`$8
`
`38.
`
`E8.
`
`qmoumz
`
`mv
`
`32%_>_ZuF
`
`2.
`
`52mmucmnomem
`
`m>_.omam.ma
`
`mo:
`
`._®>._OWWOOLSm
`
`Q
`
`mmo
`
`
`
`_m>.mw>>m_>oEE._.
`
`xv
`
`._w>._0WMO;Em
`
`_O_>_
`
`mEm..E_m_>_
`
`mEm..m>m
`
`_os_
`
`mmcm.-v_s_
`
`w._m>_ow
`
`E8
`
`_Qs_wo
`
`m
`
`Ii6an
`
`wo_>._wm
`
`;lia:32.
`
`
`mv-_'Rzwmhawmommmm.I
`
`._mEmmxon:_.E.
`
`
`
`«w:m£:__O_>_
`
`E20520
`
`:2.
`
`
`Lmzmm._mmm:m_>_Em.
`
`av-miooonm>>m€>_._.mm..so.m
`
`
`
`$ocm_mmumo._
`
`
`
`umfimcm._mm>>o._m
`
`”m:ozm.o__aa<
`
`mamamEoI-
`
`xonc_-
`
`
`
`
`
`.o._:o_>_wE_._._mmw_-
`
`
`
`
`
`
`
`.mmm:m_>_vtozaozwm._n___oH-
`
`
`
`>.__:U:_mo_Emm-
`
`ocmnumofi-
`
`
`
`>._Ew._wU._O-
`
`Ex. 1005/ Page 7 of 36
`
`Ex. 1005 / Page 7 of 36
`
`
`
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 5 of 17
`
`US 6,606,708 B1
`
`QMucmnumofi
`
`
`
`_momcm_>___m0
`
`mm
`
`m.m.=_
`
`ESN
`
`ms_oo
`
`s_mo
`
`mmoo
`
`E8.
`
`ws_z_
`
`3.8
`
`
`
`fie:m>=owam._mn_
`
`GEN
`
`&<O._.mZ
`
`Eon
`
`mmo
`
`
`
`>>m_>Eo__0
`
`mm8
`
`6:80
`
`Stew
`
`.oc2mam_D
`
`Ezmw
`
`8
`
`I-I-I-H-x-J
`J17:
`Router
`
`1-1-1
`
`saw
`
`nw>>m.6>I
`
`~49:HN.»2
`
`:_
`
`mom
`
`l')
`
`('l‘l'I'.['l‘} [VI-J
`
`
`
`«mo:>owmo._
`
`mm:m._n__2
`
`
`
`§_§.___os_
`
`N_>_n_
`
`NH
`
`mmzopmno
`
`Ex. 1005/ Page 8 of 36
`
`Ex. 1005 / Page 8 of 36
`
`
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 6 6f 17
`
`US 6,606,708 B1
`
`D networkMCl Interact Login
`Eile Edit \_/iew (_30 Favorites Help
`(0 Q G
`<‘-=
`=>
`69
`U
`Back Forward Stop Refresh Home Search Favorites
`ll Address ID https://cosweb02.mcit.com/
`
`, 1
`
`[networkMCl Interact
`
`QQ
`
`A
`networkMcl
`
`232
`Username [:I" Products &
`Services
`
`2
`O)
`——
`
`IE“ @ Programs&
`Promotions
`
`Q ~
`
`\ 5Q
`
`Questions &
`Answers
`
`Copyright 1997, 1998, MCI Telecommunications Corporation, All Rights Reserved.
`The names, logos, taglines and icons identifying MCl‘s products and services are proprietary
`marks of MCI Communications Corporations.
`
`[QI Internet Zone j
`
`FIG. 6
`
`Ex. 1005 / Page 9 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 7 of 17
`
`US 6,606,708 B1
`
`E£o:<386:6:2.8
`
`co=mEmEm_aE_
`
`momt2:_b_._:owm_om>>9mOo
`bcaummoamoflmzE86%:2:8
`
`
`mwmmflo
`
`:o=mEmEm_qE_=:£on_385:6:
`
`w__mo
`
`3»
`
`momtmE_92.8
`
`N9.»
`
`btsommoo
`
`9.».
`
`8»
`
`_aE_a_58mt.8o
`
`_qE_a_58m=:£mooo
`
`BE_b__:ommo--vmamomEzOo
`
`N.0_n_
`
`Ex. 1005 / Page 10 of 36
`
`Ex. 1005 / Page 10 of 36
`
`
`
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 8 of 17
`
`US 6,606,708 B1
`
`00»
`
`>>>>>>X38_Em:
`
`Ezmm
`
`8.69338.95:E
`
`>xo.n_>>>>>>
`
`
`
`5.26%.52mm
`
`:o_E>._ocm_
`
`.m__mF
`
`
`
`
`
`oc_owqm->xo._n.$co.mam_onm>>.m.m
`
`
`
`
`
`EmaSumo:BnmmrEnmmr
`
`couqbocm
`
`Beam:
`
`mi92.
`
`mm.atN:
`
`0:.
`
`w...U_u_
`
`
`m:0Q>.r
`CO__.ONmCm._.F®_xOOO
`
`«E.
`
`Ex. 1005 / Page 11 of 36
`
`Ex. 1005 / Page 11 of 36
`
`
`

`
`U.S. Patent
`
`Aug. 12,2003
`
`Sheet 9 0f 17
`
`US 6,606,708 B1
`
`Web Server/Dispatcher Communication Overview
`
`——>
`HydraWeb
`Monitors Load
`and Capacity
`of Each of the
`Servers in the
`Web Server
`Cluster.
`Automatically
`
`Perm'ms
`
`Load Balancing
`Between Servers
`
`HydraWeb
`\45
`
`Makes Request/
`Response to
`System
`29a \
`
`Receives
`Response
`From System
`
`— - - - —FlREWALL ---- - —
`
`I
`Web Servers
`
`Mana es ient _ . >
`
`Receivea D/efgypt,
`a i ate
`an
`Requests from
`Customer Brmclvlser.
`g‘lessions.
`Passes Request
`Via Encrypted
`Socket Through
`Firewall to
`Dispatcher
`
`22
`
`/
`W :8 er
`Cluster
`
`8 8w
`
`\24
`
`23
`
`— — — —F|REWALL — — — — — —
`
`—'>
`Dispatcher
`i??ltiltanv 2212228
`Dispatcher <-—"‘ and Dispatches to
`Appropriate Back
`End (Ful?lling)
`Servers
`
`27
`
`29b 7
`26 \
`
`‘.
`Proxies
`Handle
`Communications
`Between Fulfilling
`Sewers, StarWRS,
`lNBOX and
`Dispatcher
`
`Proxies
`
`Ful?lling
`Servers
`
`Proxy
`
`Reporting
`System
`
`<—“
`.
`Ful?lling Servers
`i.e. Unpriced
`Reporting
`Tollfree Network
`Manager
`
`4-9
`
`FIG. 9
`
`l——>
`Reporting System
`Includes:
`Report Manager
`<— Report Requester
`Report Scheduler
`Message Center
`(lNBOX)
`
`‘
`
`Ex. 1005 / Page 12 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 10 of 17
`
`US 6,606,708 B1
`
`3302con:
`
`60.Em>m
`
`:o_..oo_mmEm:
`
`m.mn_oo._.
`
`wm>922cm.95ILEmmam
`mo_m_n_mam._m_3_EQsmmmn_262
`
`ma
`
`momemu
`
`_§_em_ozwtflmEm:
`
`.om>>o._m
`
`4mm_
`
`
`
`um_.Ew>mEoIumo_:>>on_Em_3com.Stow_3262.6:
`
`
`umumo__Esoovow:oEEooucm_.2xommwz
`
`
`
`>nmm:_<w&<_umo_EsoDmmmmoo»umo_Eson__omm_N8__45::
`
`
`>Umm:_<_8o__§oon%mo_Esoo_|I.II..=>_._.Imoan.
`
`
`
`wcmaxommmam_min_.umo_EsoQQ_mcomoo_Emmxo@.7.
`IIA..muc%wv_.wv_m..wu#mv__n.V_mm%_
`gmflomfio_n_o%68xm
`
`Em.N8.
`
`wm>
`
`m_OE0:
`
`
`mom.Eo>>mmmn_\mEmZ
`mEmEw=_Em%.Wmm.%4=<
`
`
`w>w_:mmumvmwoxmmm>
`
`m.mEm_Em:I_
`
`
`
` Sam:N»m.&<fiabwcoowmm0wwm
`
`
`
` Eu2.0_n_902:30
`
`
`mo2.$__o
`
`Eoammmcomo._me.
`
`8.2m2mmm_>_E8OOVcofimmmm:omo._8%“.
`
`5..xommm_>_
`
`Ex. 1005 / Page 13 of 36
`
`Ex. 1005 / Page 13 of 36
`
`
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 11 0f 17
`
`US 6,606,708 B1
`
`
`
`ovm.w_m:<.mE_m_om_o
`
`
`mwm.$:8m._.o636553:66:.$=_$m
`comeomam.Em_Cm3m_O._Ew._5w.0EBaum.#mu:umm_EmEo_.._Em
`
`
`
`
`:omo._.._8mam_ocoam:E_:omo._nm>>
`
`mmcoamomEm_c._mm4vvm.
`
`9%EoEm=_Em:omo._
`
`masmwofim.25EoEm==:m
`
`
`
`mvmumwntmwzEomzxmnmo
`
`_z_.u$>w%_ocowwwmmooowcomumom:omo._vwuowoxm
`
`
`
`
`
`
`I.58E300
`
`
`
`mi.uw.._nm.xu...m_._mmama._mE_m_om_n_
`
`Eomzxwnmou__m>
`
`
`
`_Eo>>mmmn_>>mz
`
`mo_m_n_
`
`
`moE_.r>:ms_oo._.
`
`
`
`
`
`:ouwmmo._n__.wm3u__m>:_
`
`
`_o_>_v:o>>_mz_os:.oEozatom:
`
`
`
`~om.oa..4c_9.05>3.\mm:o_>_Em:_owD_om._oE_Eo>>wwmm_o_>:.oEwzSum
`Em382:.
`
`
`
`may..Em:
`
`
`
`
`
`_m;o_mam_n_u._Qswmmn_ucmn__._wm::omo._
`
`
`
`:o=om.E._oUn._wm_._E9:ww:33vEm_u__m>cozooccoonm>>
`__£mo__EmQ
`
`
`
`_z_.§m_xoooI§!
`
`
`_.F.o_"_.—
`
`
`
`om».magnum_.5mo._.m._m_v_ooo
`
`
`
`tomo._.m._m_xooo
`
`!I
`
`gmmatmmz+o__._o_mmmm
`
`
`
`fimntmormama...miooo
`
`
`
`
`
`mafiwfimntmwrw:E._.miooo
`
`
`
`
`
`
`
`
`
`cozomccoo_m._w_xooo
`
`__9mo
`
`_m.§xooo\.
`
`EwEw=_Em%_8o
`
`§§n__.wm3+EoEo=_Em+o_ow:EmEm$4wmmauwm«mm_z_.nm>>_EoEm=_Em_nm>>
`
`Ex. 1005 / Page 14 of 36
`
`Ex. 1005 / Page 14 of 36
`
`
`
`
`€
`

`
`U.S. Patent
`
`Aug. 12,2003
`
`Sheet 12 of 17
`
`US 6,606,708 B1
`
`_z_.8>>I
`
`
`
`
`
`cozommcm....3202.mm:
`
`_OS_v_.o.<5mZ
`
`
`
`
`
`co=omE.o0925Em.o:m.uwmscwmmama.mEoIwmmscmmxo__0.om.oE_
`
`
`
`
`__96o:o=omm:m.._.Ema.33
`
`
`ucww83New
`
`
`
`_.o=omm:m.._.cmm
`
`
`
`
`
`“
`
`8.%__m>
`
`
`
`:o_.....mmm.owD
`
`.m_o_xoo0
`
`_.o__.oo:mo0cvm__m.on_..oEmmn_.m;2mam_n_
`
`
`
`.6_§m%_oN34:o_..8Eoo2coemmo
`_m0mco_fio_:3EEoO
`.8.%__m>8.5—newwzmommcoamwmEm:_z_.nm>>
`
`
`umacmmm2m..u__m>82,3».m..%_ooo
`,_%__o%,,w6,
`
`toawm
`
`
`
`
`
`:o:.om:..o0co_mmmm_8.%__m>_.o=mo_c:EEo0xomco
`
`
`
`.xon:_Em:2%__m>>xo..n_fiwscmm.250
`
`
`
`__m6ocoammm.83mmcoammmmmmmmoé
`
`
`
`.o:2mqw_n_.m:Bmaw_Q._o_mm:cmmmmmmww_>_
`
`
`..Ea.:%_o1.58amwmwwc463.365.cmmommmwz
`
`
`
`.xonc_Qm_Dtoammch»m»m.m._._.m_>.mo:.wm
`.o.mm:umm_1._om..._9m:mm.m.m_wm_mm_.¢co..mdm_n__.o_mmmw
`
`
`
`
`
`82.8560m..>_womm.2mm:mm
`
`
`
`__£wn_Evvmm
`
`Ecuoomnawficozomccoo..mm..m:m.m.mw.wm0.00922:0:C._._..
`
`
`
`
`
`
`
`END.Eucom.mE2mam_omwconmmmmmmmmm_2fioscmm
`
`
`.,s_§_.,_8.215“.—s_.s_.._863ww2=.wM_%.6zS9.
`
`
`
`
`
`umm>maw_Qu<m>w>xo.n_.950mmmmmm_>_.9mo:umm
`__m.wn_.58-.
`
`toamm
`
`.250Bmo_c:EEo0
`
`Ex. 1005 / Page 15 of 36
`
`.250
`
`
`
`
`
`Emwzm.omcoamomumo_E>on_
`
`Ex. 1005 / Page 15 of 36
`
`
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 13 of 17
`
`US 6,606,708 B1
`
`
`
`
`
`EmaSomEF.
`
`mumxom
`
`
`
`
`
`o_.=omam->x9n_uflmzomozx__..mxm_>_
`
` 91.
`
`$nE:z_m_.m
`-_o:o:.~am_n_
`umcm_mm<
`
`mm:
`
`
`
`oomtm.:_>xo.n_:mc2maw_n_
`
`om»>xo_n_9.oc2mam_n_onF
`
`9.:
`
`92
`
`moq>.r>3.mm:M35:
`
`
`mmmmwmz:o_mmwmm:_n=o;om_mmamas.
`
`_oo29n_
`
`co_w.m>
`
`:oEEoo
`
`_oo3o.n_
`
`Eummr
`
`mtN:
`
`o:>m<B:>m
`
`
`
`
`
`o_.=ooaw->x9n_Em:.om
`
`ummsamm
`
`
`
`o_u:m_._;oc>m<
`
`
`
`n9m.m:o0.>xo.n___on_mm—:o:>m<
`
`om_omam
`xoi
`
`mmmmmwmfi
`
`E2.2".
`
`v__=m
`
`.m..m:E._.
`
`Ex. 1005 / Page 16 of 36
`
`Ex. 1005 / Page 16 of 36
`
`
`
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 14 0f 17
`
`US 6,606,708 B1
`
`mmcoammm 2 63m
`
`05
`
`Ex. 1005 / Page 17 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 15 0f 17
`
`US 6,606,708 B1
`
`DMZ Architecture (File Server)
`
`HydraWEB Provides Virtual lP
`Address Always Available
`
`HydraWEB
`-
`
`4 Connection to Network,
`t
`§°———<H rtb
`DMZ Presents Virtual lP
`- Ec-
`eal ea
`Address For Web Servers
`—_l—
`Hot Standby Con?guration
`Eli
`100m
`FEET-g“
`
`sw'tch
`
`Network
`
`HA F'le
`Server Cluster
`
`"'
`
`HA F'le
`Server Cluster
`24
`/
`_' é“
`
`Horizontal Scalin By Adding
`More Machines. ach Machine
`is Con?gured to use F?e Server
`for Content Storage. Applications
`Must Include Logic to Reconnect
`in the Event of Failure.
`
`HA File Server Cluster Using
`Striped and Mirror Disks Provides
`Highly Available Content Storage
`
`FIG. 14
`
`Ex. 1005 / Page 18 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 16 0f 17
`
`US 6,606,708 B1
`
`DMZ Architecture (Local Disk)
`
`HydraWEB
`
`HydraWEB Provides Virtual lP
`Address Always Available
`
`Connection to Network,
`DMZ Presents Virtual IP
`Address For Web Servers
`
`Heartbeat
`
`Switch
`
`24
`
`.
`gtach'ne U388 Rt’rm
`gatglggfan Monhe.
`C's r'Rut'otn'l agd'rg t
`fag 0- a e n; -
`(51
`0 erv'ce as es're '
`
`Horizontal Scaling By Adding
`ore Machines. Each Machine
`is Con?gured to Use Local Disk
`for Content Storage. A Shared
`State Repository for Client State
`Must Be Maintained. Applications
`Must Include Logic to Reconnect
`in the Event of Failure.
`Content Must Be Moved to Each
`Machine Separately.
`
`FIG. 15
`
`Ex. 1005 / Page 19 of 36
`
`

`
`U.S. Patent
`
`Aug. 12, 2003
`
`Sheet 17 of 17
`
`US 6,606,708 B1
`
`
`
`>>o_u_mmmooibtzomm:o_..mo__nE<
`
`
`
`
`
`
`
`Em:9mn__m>:o=mo__aa<
`
`fim_mmEomo._
`
`pom
`
`
`
`ammo$3bzaoow_>_u_Z.F
`
`u_o<ma_oowbtsomwEm:E0
`.m_._
`
`__m0
`
`co_..mo__na<
`
`:oEEoo
`
`oEo._n_Em:
`
`oo>>mxoseflm
`
`3
`
`m__..6.n_Em:E0
`
`
`
`.#m_._Boo.$_.e2.mc
`
`
`
`cctzoom:o_..o::..._
`
`3.0_n_
`
`Ex. 1005 / Page 20 of 36
`
`Ex. 1005 / Page 20 of 36
`
`

`
`US 6,606,708 B1
`
`1
`SECURE SERVER ARCHITECTURE FOR
`WEB BASED DATA MANAGEMENT
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`The following patent application claims the benefit of
`U.S. Provisional Patent Application U.S. Ser. No. 60/060,
`655, filed Sep. 26, 1997, entitled INTEGRATED CUS-
`TOMER INTERFACE SYSTEM FOR COMMUNICA-
`TIONS MANAGEMENT.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`The present invention relates in general to securing access
`to a computer and computer data, and more particularly to
`a security methodology for securing access to an enterprise
`network or extranet having access from the public Internet.
`2. Background Art
`In conventional remote connect computer systems, a
`connection is made with a large legacy system via a dial-up
`connection from a customer owned terminal, personal com-
`puter or workstation. This connection frequently, although
`not always, is a fixed copper connection through one or more
`telco central offices and emulates a terminal addressable by
`the legacy systems and employs a security methodology
`dictated by the legacy system. The dial-up access requires
`custom hardware for a terminal or custom software for a
`
`workstation to provide a remote connection. This includes
`dial-up services, communication services, emulation and/or
`translation services and generally some resident custom
`form of the legacy application to interface with the midrange
`or mainframe computer running the legacy system.
`There are several problems associated with this approach.
`First,
`the aforementioned software is very hardware
`dependent, requiring multiple versions of software compat-
`ible with each of a wide range of workstations customers
`generally have. In addition, an extensive inventory of both
`software and user manuals for distribution to the outside
`
`customers is required if an enterprise desires to make its
`resources available to its customers. Moreover, installing the
`software generally requires an intensive effort on the cus-
`tomer and the software support team before any reliable and
`secure sessions are possible.
`Secondly, dial-up, modem, and communications software
`interact with each other in many ways which are not always
`predictable to a custom application, requiring extensive
`trouble shooting and problem solving for an enterprise
`desiring to make the legacy system available to the
`customer, particularly where various telephone exchanges,
`dialing standards or signal standards are involved.
`Thirdly, although businesses are beginning to turn to the
`Internet to improve customer service and lower costs by
`providing Web-based support systems, when an enterprise
`desires to make more than one system available to the
`customer, the custom application for one legacy system is
`not able to connect to a different legacy system, and the
`customer must generally logoff, logon and re-authenticate to
`switch from one to the other. The security and entitlement
`features of the various legacy systems may be completely
`different, and vary from system to system and platform to
`platform. The security methodology used by the two legacy
`systems may be different,
`requiring different
`logon
`interfaces, user or enterprise IDs and passwords. Different
`machine level languages may be used by the two systems as
`for example, operating systems utilizing the 256 (=28)
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`character combination EBCDIC used by IBM, and 128
`(=27) character combination ASCII used by contemporary
`personal computers.
`It is therefore desired to provide remote customers with
`secure connectivity to enterprise legacy systems over the
`public Internet. The public Internet provides access connec-
`tivity world wide via the TCP/IP protocol, without need to
`navigate various disparate security protocols,
`telephone
`exchanges, dialing standards or signal standards, thereby
`providing a measure of platform independence for the
`customer.
`
`As contemplated with the present invention the customer
`can run their own Internet Web browser and utilize their own
`
`platform connection to the Internet to enable services. This
`resolves many of the platform hardware and connectivity
`issues in the customers favor, and leaves the choice of
`platform and operating system to the customer. Web-based
`programs can minimize the need for training and support
`since they utilize existing client software which the user has
`already installed and already knows how to use. Further, if
`the customer later changes that platform, then, as soon as the
`new platform is Internet enabled, service is restored to the
`customer. The connectivity and communications software
`burden is thus resolved in favor of standard and readily
`available hardware and the browser and software used by the
`public Internet connection.
`Secure World Wide Web (Web)-based online systems are
`now starting to emerge, generally using security protocols
`supplied by the browser or database vendors. These Web-
`based online systems usually employ HTTPS and a Web
`browser having Secure Sockets Layer (SSL) encryption, and
`they display Hypertext Markup Language (HTML) pages as
`a graphical user interface (GUI), and often include Java
`applets and Common Gateway Interface (CGI) programs for
`customer interaction.
`
`For the enterprise, the use of off-the-shelf Web browsers
`by the customer significantly simplifies the enterprise bur-
`den. Software development and support resources are avail-
`able for the delivery of the enterprise legacy services and are
`not consumed by a need for customer support at the work-
`station level.
`
`However, the use of the public Internet also introduces
`new security considerations not present in existing copper
`wire connections, as an open system increases the exposure
`to IP hijackers, sniffers and various types of spoofers that
`attempt to collect user IDs and passwords, and exposes the
`availability of the service to the users when the system is
`assaulted by syn-flooding, war dialers or ping attacks. These
`measures also need to be combined with traditional security
`measures used to prevent traditional hacker attacks, whether
`by copper wire or the Internet, that might compromise the
`enterprise system and its data.
`SUMMARY OF THE INVENTION
`
`The present invention is directed to a series of security
`protocols and an integrated system for the same that enables
`a remote user to interact with one or more application
`services provided by servers over the public Internet, or an
`enterprise Extranet. The present invention utilizes the Web
`paradigm and an integrated graphical user interface to allow
`easy and convenient access from the user’s perspective,
`wherein the security provisions are transparent to the user,
`other than the entry of a customary user id and a strong
`password.
`In order to provide cross-platform software operability
`that is not dependent on a specific operating system or
`
`Ex. 1005 / Page 21 of 36
`
`Ex. 1005 / Page 21 of 36
`
`

`
`US 6,606,708 B1
`
`3
`hardware, the present invention is implemented using pro-
`gramming languages, such as JavaTM which only requires a
`Java” enabled Web browser. The system of the present
`invention includes an application backplane unit for con-
`trolling and managing the overall user interface system to a
`number of Web enabled application services, and a common
`security object for managing security and Java” applets for
`a number of disparate services available from the servers.
`Each service includes its own user interface unit, referred
`heretofore as a client application,
`independently imple-
`mented of one another and the backplane. Although the
`client applications are independently developed as separate
`modules,
`the system of the present invention provides a
`capability of integrating the client applications and secured
`access thereto into one unified system, allowing users to
`access the individual client applications via the backplane
`unit and the security object.
`The present invention includes centralized user authenti-
`cation to insure that the remote user has valid access to the
`
`system. The authentication procedure generally includes a
`logon object which prompts for and accepts the user’s name
`and password. The logon object then communicates the
`logon transaction to a server responsible for screening those
`remote users attempting to access services. Once a remote
`user has been authenticated by the system of the present
`invention, the user need not re-enter their name and pass-
`word each time the user accesses another server via the
`
`respective server’s user interface program. In addition, each
`application may supplement
`the provided authentication
`procedure, with its own method of authentication by com-
`municating with its respective servers independently.
`Once a validated remote user is logged onto the system,
`the user is presented with a set of services which the remote
`user may obtain. The set of services available for each
`remote user is unique and depends on each user’s subscrip-
`tions to the services. The set of service subscription, then
`forms the user’s entitlements for the services. Thus, for
`example, if a user subscribes to a toll free network manage-
`ment service,
`the user is entitled to access information
`regarding the service. On the other hand, if the user does not
`subscribe to the toll free network manager service,
`that
`option is not available for the user to select.
`The present invention includes a user object to represent
`a current user logged onto the system. This user object, inter
`alia, is responsible for obtaining from a server the current
`user’s information including the user’s entitlements to vari-
`ous services. The backplane uses the entitlement informa-
`tion to provide only those services available to the user. As
`explained previously,
`the backplane will not enable the
`services to which the user does not have the ent

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket