`Slemmer
`
`USOO6226677B1
`(10) Patent No.:
`US 6,226,677 B1
`(45) Date of Patent:
`May 1, 2001
`
`(54) CONTROLLED COMMUNICATIONS OVERA
`GLOBAL COMPUTER NETWORK
`
`(75) Inventor: Michael W. Slemmer, Sioux Falls, SD
`(US)
`
`9/1998 Baehr et al. ......................... 709/249
`5,802,320
`9/1999 Merriman et al. ................... 709/219
`5.948,061
`6,014,698 * 1/2000 Griffiths ...........
`... 709/224
`6,098,172
`8/2000 Coss et al.
`713/201
`6,119,162
`9/2000 Li et al. ............................... 709/227
`
`(73) Assignee: LodgeNet Entertainment
`Corporation, Sioux Falls, SD (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(*) Notice:
`
`(21) Appl. No.: 09/232,386
`(22) Filed:
`Jan. 15, 1999
`O
`O
`Related U.S. Application Data
`(60) Provisional application No. 60/109,878, filed on Nov. 25,
`1998.
`(51) Int. Cl." .................................................. G06F 13/00
`(52) U.S. Cl. .............................................................. 709/227
`(58) Field of Search ............................... 705/14. 709/202,
`709/317, 227
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`5,781,550 * 7/1998 Templin et al. ..................... 370/401
`
`sk -
`
`cited by examiner
`Primary Examiner Kenneth R. Coulter
`(74) Attorney, Agent, or Firm-Sheridan Ross P.C.
`(57)
`ABSTRACT
`In one embodiment, a method related to controlling com
`munication of a TCP packet from a user machine is dis
`closed. During a browser request from the user machine, the
`TCP packet is sent via the intranet to a forced proxy server.
`The TCP packet having a number of fields including a first
`field related to a first destination IP address. The TCP packet
`and its first destination IP address is received by the forced
`proxy server and analyzed. If the first destination IP address
`is not from a “sandboxed’ domain, the first destination IP
`address is changed to a predetermined Second destination IP
`address to effectively reroute the TCP packet to another IP
`address on the Internet. The rerouted IP address provides
`content to the user machine in which at least a majority of
`the content is different from that expected to be obtained by
`the user machine.
`
`27 Claims, 4 Drawing Sheets
`
`Attach Computer 300
`to intranet
`
`304
`
`Red
`uest
`
`First UR
`
`Forced Proxying
`-
`Begin Forced Proxying by Redirecting 303
`Browser to Second URL
`312
`
`Requests
`Browser
`File at Second URL
`
`Proxy Server Retrieves File at Third
`URL Mapped to File at Second URL
`
`3.18
`
`32
`
`File from hird URL Presented to Browser
`as Originated from the Second URL
`
`324
`
`
`
`More Requests from
`Secord URL?
`
`No
`
`Redirect Browser
`to a Fourth URL
`
`328
`
`Disable Forced
`Proxying
`
`332
`
`
`
`Browser Displays File
`at Fourth URL
`
`336
`
`340
`
`User May
`Browse Freely
`
`EXHIBIT 1003
`Guest-Tek v. Nomadix, IPR2018-00376
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 1 of 4
`
`US 6,226,677 B1
`
`
`
`
`
`
`
`
`
`User
`Machine
`No. 1
`
`User
`Machine
`No. 2
`
`100
`
`140
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 2 of 4
`
`US 6,226,677 B1
`
`Attach Computer with
`Browser to Intranet
`
`2OO
`
`204
`
`Browser Request a First
`Content from internet
`
`Selective
`Sandboxing
`- -
`
`No
`
`
`
`
`
`220
`
`ls Content
`a Sandboxed
`Domain?
`
`Yes
`
`
`
`
`
`
`
`
`
`
`
`User Browses Sandboxed
`Domain Only
`
`Has the
`User Requested
`a Third Content?
`
`Browser Presented a Potentially
`Unwanted Second Content
`
`
`
`
`
`
`
`
`
`
`
`Desired
`Interaction
`Achieved?
`
`
`
`Forced Proxying
`" - - - - - - - - - - - - - - - - - - - - - - 1. - - - - -
`Yes
`216
`
`Fig. 2
`
`BrOWse Freel
`y
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 3 of 4
`
`US 6,226,677 B1
`
`Attach Computer 300
`to Intranet
`
`3O4
`
`First URL
`
`-
`
`-
`
`-
`
`- a
`
`a
`
`is
`
`a q
`
`is
`
`a
`
`Forced Proxying
`a 1- - - - - -
`
`Begin Forced Proxying by Redirecting
`Browser to Second URL
`312
`
`3O8
`
`Browser Requests
`File at Second URL
`
`Proxy Server Retrieves File at Third
`URL Mapped to File at Second URL
`
`
`
`31 6
`
`
`
`File from Third URL Presented to Browser
`as Originated from the Second URL
`
`
`
`
`
`More Requests from
`Second URL?
`
`
`
`No
`
`Redirect BrOWSer
`
`328
`
`Disable Forced 5'
`Proxying
`
`Browser Displays File 336
`at Fourth URL
`
`340
`
`Fig. 3
`
`User May
`Browse Freely
`
`
`
`U.S. Patent
`
`May 1, 2001
`
`Sheet 4 of 4
`
`US 6,226,677 B1
`
`997
`
`XINT.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`#7 · 61
`
`99 #7
`
`
`
`1
`CONTROLLED COMMUNICATIONS OVERA
`GLOBAL COMPUTER NETWORK
`
`This application is related to and claims priority from
`Provisional Patent Application No. 60/109,878, filed Nov.
`25, 1998.
`
`FIELD OF THE INVENTION
`The present invention relates to networks, and in
`particular, to an apparatus and method for controlling inter
`action with a global computer network.
`
`BACKGROUND OF THE INVENTION
`Systems of various configurations are known to control
`access to a global computer network, Such as the Internet.
`Typically, Systems block access to predetermined content on
`the Internet, forward a user from the Selected address to a
`new address on the Internet or present advertising or other
`information to the user before accessing the Internet.
`Software which prevents access to predetermined web
`Sites based upon a Selected criteria is well known. The
`Software may reside on the user's computer or elsewhere to
`detect requests for content from prohibited or restricted IP
`(Internet Protocol) addresses. Periodic updates of the soft
`ware is required to keep the list of Such IP addresses current.
`Once a prohibited request is noted, the Software does not
`return the requested content, but instead returns an appro
`priate message. In this way, content on the Internet is
`blocked.
`Modern browsers have the capability for a web site to
`redirect the browser to a new web site. This feature is useful
`when the name or IP address of a web site has changed. The
`user may have Saved the former universal resource locator
`(URL) or its corresponding IP address into the user's
`browser. When the user attempts to return to the former
`URL, the desired content may no longer be located there and
`has moved to a different URL on the Internet. To redirect the
`user to the desired web page, the former web site can
`command the browser to point to the new URL where the
`web page currently resides. In this way, the user is able to
`browse the desired content at the new URL with only a small
`delay.
`Although redirection of a web browser is useful in direct
`ing the user to the desired content, it has not been used to
`direct the user to content that is not Sought by the user. It
`would be counterintuitive to redirect the user to undesired
`content. Even if redirection were performed to attempt to
`have the user view unwanted content, the user could change
`the URL and cause the browser to view another location on
`the Internet.
`Even though most browsers support the ability to redirect
`a user to a different web site, Some browserS do not Support
`this capability. Notably, older browsers and less popular
`browserS may not Support this capability. Additionally, Some
`browsers allow disabling the ability to redirect a user to
`another web site. In order to provide content from a different
`web site regardless of the browser's capability or
`configuration, there is a need for a browser independent
`redirection which cannot be disabled.
`Proprietary ISPs (Internet Service Providers), such as
`America Online TM, CompuServeTM and Prodigy'TM, require
`subscribers of the ISP to access their service with proprietary
`access Software. This Software typically has the capability of
`presenting the Subscriber with advertising or other poten
`tially unwanted information. Additionally this software has
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,226,677 B1
`
`2
`the capability of browsing the Internet. However, once the
`user has used the proprietary access Software to access the
`Internet, the user cannot be redirected to potentially
`unwanted content from the Internet. The proprietary acceSS
`Software can only present potentially unwanted or non
`requested content before access to the Internet. In other
`words, once Internet browsing has begun, the Subscriber
`may browse the Internet freely.
`Although browsing the Internet freely may be desirable to
`users, directing the user to content not specifically requested
`by the user may be valued by advertisers. This may also be
`of benefit to the user since income to the ISP derived from
`the advertisers might help defray the costs of providing
`Internet access to the user. Over time, users may view this
`diversion from anticipated content as advantageous in reduc
`ing their costs for using the Internet.
`In Summary, it appears desirable to develop a System
`which: (1) redirects the browser to potentially unwanted
`content regardless of the capabilities or configuration of the
`browser, and (2) requires the user to view or interact with the
`potentially unwanted content before the user can freely
`interact with any other content on the Internet.
`SUMMARY OF THE INVENTION
`In accordance with the present invention, a System which
`controls access to a global computer network is disclosed. In
`one embodiment, a method related to controlling commu
`nication of a TCP (Transmission Control Protocol) packet
`from a user machine is disclosed. During a browser request
`from the user machine, the TCP packet is sent via the
`intranet to a forced proxy server. The TCP packet has a
`number of fields including a first field related to a first
`destination IP address. The TCP packet and its first desti
`nation IP address are received by the forced proxy server and
`analyzed. If the first destination IP address is not from a
`“sandboxed” domain, the first destination IP address is
`changed to a predetermined Second destination IP address to
`effectively reroute the TCP packet to another IP address on
`the Internet. The rerouted IP address provides content to the
`user machine in which at least a majority of the content is
`different from that expected to be obtained by the user
`machine. In one embodiment, all or substantially all of the
`content is different from that the first or requested destina
`tion IP address.
`Relatedly, a system for controlling TCP packet transmis
`sions relative to the Internet is disclosed. The system
`includes a user machine, a forced proxy server, and an
`intranet. Typically, the intranet is protected from intrusion by
`systems or individuals who access the Internet. The forced
`proxy server includes a first port for receiving TCP packets
`from the user machine or other machines attached to the
`intranet. The proxy server receives at least a first TCP packet
`from the user machine where the TCP packet includes a first
`destination IP address. IP addresses point to a location on the
`Internet which typically includes content. Upon receipt of
`the TCP packet, the forced proxy server ascertains whether
`the TCP packet is directed to the intranet or Internet. If the
`TCP packet is directed to the Internet, the TCP packet is
`passed to a forced proxying Software program running on
`the proxy server. The Software program may modify or leave
`unchanged the TCP packet based upon a predetermined
`criteria before the TCP packet is passed to the Internet.
`Based upon the predetermined criteria, the forced proxy
`Server may return alternate content to the user machine from
`a Source different from the first destination address. At least
`a majority of the alternate content is different from that
`expected to be obtained by the user machine.
`
`
`
`US 6,226,677 B1
`
`3
`Based upon the foregoing Summary, a number of impor
`tant advantages of the present invention are readily dis
`cerned. The browser can be controlled so that the user views
`potentially unwanted content regardless of the capabilities or
`configuration of the browser. Additionally, the user can be
`required to view or interact with the potentially unwanted
`content at times when the user may wish to freely interact
`with other content on the Internet. A system which achieves
`these goals is expected to help finance access to the Internet
`and thus reduce costs to users.
`Additional advantages of the present invention will
`become readily apparent from the following discussion,
`particularly when taken together with the accompanying
`drawings.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a block diagram which Schematically depicts an
`embodiment of the control System;
`FIG. 2 is a flow diagram which schematically depicts the
`operation an embodiment of the control System;
`FIG. 3 is a flow diagram which schematically depicts the
`operation of an embodiment which may be used in a
`multi-unit property; and
`FIG. 4 is a block diagram which Schematically depicts an
`embodiment deployed in a multi-unit property.
`
`4
`Internet 140. The intranet 110 is typically a private network
`isolated from the Internet 140 by a firewall. The firewall may
`be implemented on a forced proxy server 130. Each of the
`client machines 120 typically includes at least one computer
`processor, a monitor having a display Screen, Storage
`memory, Such as a hard drive and/or Semi-conductor
`memory, and input devices, Such as a keyboard and/or a
`mouse. The user machine 120 also has necessary or appro
`priate Software including operating System Software and a
`commercially available web browser. The system 100 also
`includes the forced proxy server 130 in communication with
`each of the one or more user machines 120. The server 130
`can handle all signal traffic to/from each of the user
`machines 120. On the outputside or port(s) of the server 130
`is an interface or connector hardware that enables the Server
`130 to communicate with the Internet 140. In that regard, the
`server 130 essentially acts as a proxy for Internet commu
`nications with each of the user machines 120.
`With regard to communications from the user machines
`120 to the Internet 140, messages are sent to the Internet 140
`from the user machines 120 by means of encapsulated
`parcels of data identified as “datagrams' or "packets. Each
`Such packet must pass through the proxy server 130 to
`access the Internet 140. In controlling communications, the
`system 100, particularly the server 130, is interested only in
`TCP (Transmission Control Protocol) packets, which are
`used to carry essentially all web traffic. Each TCP packet
`contains the following fields or integers: Source IP (Internet
`Protocol) address; source TCP port; destination IP address;
`and destination TCP port.
`Requests to the world wide web from the user machines
`120 are unique in that their destination TCP port is set to 80.
`When a packet is transmitted from a user machine 120, a
`transparent proxying software module in the server 130
`makes a determination regarding whether or not the trans
`mitted information relates to a web request. In that regard,
`the server 130 analyzes at least portions of each packet. If a
`packet TCP port is identified as 80, that packet is intercepted
`by the transparent proxying Software module and redirected
`to a different TCP port on the server 130. A software control
`program running on the Server 130 is in communication with
`that software port to which the packet is redirected. This
`Software port responds to requests as if they were the web
`server on the Internet 140. This proxy server program or
`control program assumes control of the web request by
`fulfilling the actual request from the user machine 120 or
`implementing other predetermined StepS. Such other prede
`termined Steps relate to providing information to the user
`machine 120 from one or more particular web pages of a
`web site different from the user machine's 120 requested
`site. The identification of the web pages to be directed to the
`particular user machine can be based on a number of factors
`including: the input to the user machine 120 by the user or
`operator of that machine and provided to the browser on the
`user machine 120; the Internet or MAC address associated
`with the particular user machine 120; and other factors such
`as whether or not the Internet 140 is accessible to the
`particular user machine 120. The server 130 also has the
`capability of deactivating or essentially bypassing Such
`controls in the Sense of allowing a particular user machine
`120 to freely access the Internet 140 as if the proxy server
`130 were not interposed between the particular user machine
`120 and the Internet 140.
`With reference to FIG. 2, an embodiment of the control
`system 100 is schematically depicted as a flow chart. The
`user attaches the computer 120 to a port to the intranet 110
`in step 200. Commonly, the port is a modem or network port,
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`DETAILED DESCRIPTION
`A System and methods of operation are described in which
`predetermined controls are exercised over a user's ability to
`communicate and obtain information over a global computer
`network, Such as the Internet. Generally, the System and
`methods of operation function to control information
`received by a user machine Such that information is returned
`to the user machine which was not requested by it. More
`particularly, a user machine may request a particular web
`page or Set of web pages using a browser, which pages are
`available on the world wide web accessible using the
`Internet. The present invention, depending on predetermined
`conditions, may cause information to be viewed on the user
`machine that was obtained from a different address or URL
`(Uniform Resource Locator) on the global computer
`network, Such as a different web site. A web site, Such as
`“www.abc.com', may be input into the browser on the user
`machine. However, instead of accessing this web site, the
`System would cause the user machine browser to actually
`display pages, HTML (HyperText Markup Language) text
`and/or images from a different Source, Such as a different
`address on the web.
`The system also provides selective “sandboxing” in which
`certain web sites are directly accessible by the browser of the
`user machine while other web sites that are requested for
`access will result in triggering the controls implemented by
`the present invention (i.e., forced proxying), Such as redi
`recting the request to another web site. In that regard, the
`user machine might receive as an input into its browser the
`name "www.xy Z.com', which has a corresponding web
`address or URL, and browse that site with no interference.
`On the other hand, when the user machine receives an input
`related to another web site address or Selection of a link that
`would take the user machine outside of the “www.xyz.com”
`Site, the user machine would again be Subject to the controls
`of the present invention (forced proxying).
`With reference'to the FIG. 1, the system 100 includes one
`or more of a number of user or client machines 120. The
`system 100 is generally divided into an intranet 110 and the
`
`
`
`S
`but could be any wired or wireleSS communication mecha
`nism. The browser on the user machine 120 requests a first
`content from the Internet 140 in step 204. A determination
`is made by the proxy server 130 as to whether the first
`content is from a “sandboxed’ domain in step 220. If the first
`content is from a Sandboxed domain, the user in Step 224 can
`freely browse that domain without being subject to forced
`proxying. When the user attempts to point the browser in
`order to receive a third content in Step 228, a new determi
`nation is made as to whether the third content is from
`another Sandboxed domain. In this way, the user may browse
`as many Sandboxed domains as desired without being Sub
`ject to forced proxying.
`However, if the forced proxy server 130 notices a request
`for a non-Sandboxed domain in Step 220, the forced proxy
`proceSS is begun. In proceeding to Step 208, the first or third
`non-Sandboxed content is Substituted with a Second content.
`The Second content is typically provided from an advertiser
`on the intranet 110 or Internet 140. A desired interaction with
`the Second content is required of the user before forced
`proxying may end in Step 212. The desired interaction with
`the Second content may simply be a passive time delay or
`positive requirement that certain Steps be taken. Providers of
`the Second content may embed the desired interaction in
`their web site Such that desired interaction is reprogramable.
`Once the desired interaction is achieved in Step 212, the user
`is allowed to browse the Internet 140 freely in step 216. As
`an added Step, the browser could present the first content
`(i.e., the content requested before forced proxying began)
`automatically after the desired interaction is achieved in Step
`212.
`While browsing the Internet with the user machine 120,
`both wanted and potentially unwanted content is presented
`to the user. For example, a particular web page may contain
`an article about Stocks which is the desired content of the
`user. However, the web page would typically contain poten
`tially unwanted or non-requested content in the form of
`advertising. In other words, the web page is mostly desired
`content and partially undesired content. RatioS of more than
`80% desired content to less than 20% potentially undesired
`content are typical on web pages today. Commonly, adver
`tising is in the form of banners or buttons which contain
`information related to the advertiser. If the user is interested
`in the advertised product or Service, clicking on the banner
`or button will point the web browser to another site.
`Although the advertising is potentially unwanted, the user
`enjoys reading the free article about StockS.
`The amicable exchange of mostly free desired content for
`a Small amount of potentially undesired advertising is appre
`ciated by users. AS those skilled in the art can appreciate, the
`advertising, even though potentially unwanted, has become
`expected by users in the normal course of web browsing.
`However, the user is not accustomed to Seeking a web page
`related to fly fishing, for example, with the associated
`advertising and instead receiving a web page related to the
`latest blockbuster movie with any associated advertising.
`Use of forced proxying in this way allows unexpected
`Substitution of a majority of the desired content (i.e. fly
`fishing information) for potentially unwanted content (i.e.,
`the latest blockbuster movie).
`With respect to examples of control Steps or algorithms,
`the Software control program to which the web request is
`transferred for control purposes can include the following
`controls when it receives a web request for content.
`The user machine 120 is caused to receive a returned
`HTTP (HyperText Transport Protocol) redirect message.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,226,677 B1
`
`6
`This is a special command that directs the web browser of
`the user machine 120 to “jump to” or be provided with
`information from another web site location, without any
`display or other indication of this web site change to the
`particular user machine 120. For example, a user machine
`120 receiving a request to its browser in the form of
`www.abc.com could be directed by the control program in
`the proxy server 130 to access www.xyz.com as the web site
`address or URL to be displayed or from which information
`is to be obtained.
`Alternatively, the control program could return a web
`page to the user machine 120 based on a path that the user
`machine 120 selected. For example, if an input were
`received by the user machine 120 in the form of the web site
`address www.abc.com/index or www.def.com/index, the
`proxy server 130, by means of the software module that
`determines that this is a TCP packet and also by means of the
`Software control program, could instead access and fetch one
`or more web pages from the Web Site address www.xy Z.com/
`index. Similarly, an input to the particular user machine 120
`in form of www.abc.com/XXX, could result in the proxy
`server 130 obtaining www.xyz.com/XXX. In this way, the
`particular user machine 120 will always be forced to receive
`return information from the www.xyz.com web site. Except
`for the “location' URL typically displayed on a status line
`in the web browser, the web brouser will read something
`different, because it is reading from www.xy Z.com and not
`www.abc.com/XXX, it will appear to the user machine 120
`that the desired URL (i.e., www.abc.com/XXX) is being
`accessed properly.
`Alternatively, the proxy server 130 could return to the
`user machine 120 the actual web page that the user machine
`120 requested. In this case, the control program acts like a
`normal proxy server by connecting to the Internet 140 and
`fetching the requested page or pages. This functionality can
`be identified as “sandboxing” by which requests to certain
`one or more locations on the web are allowed or granted
`without modification, while others are not. For instance,
`connections to www.xy Z.com could be proxied in this
`manner, while other requests my generate a Set of pages
`from a web site different from the requested web site.
`Alternatively, the control program could return web
`page(s) based on particularly identified information about
`the user machine 120. The proxy server 130 may rely on the
`IP address that it receives to provide a response based
`thereon. Other information about the user machine 120
`might also be utilized in customizing a response to a web
`request from that user machine 120.
`With respect to describing in greater detail the method
`ology and operations of the present invention, two examples
`are provided:
`
`EXAMPLE 1.
`Log in to a network different from that to which the user
`machine is normally configured, Such as logging in at a hotel
`or other multi-unit property.
`With reference to FIG. 3, a user plugs in a laptop and runs
`the browser in step 300. The user's default web page is a first
`URL home.browserid.com/Index.htm. The user's laptop
`(user machine 120) attempts to connect to port 80 of
`home.browserid.com in step 304. The server 130 redirects
`this request to the forced proxying or control program. The
`control program determines that this is the first time it has
`Seen this user machine 120. The control program returns a
`HTTP redirect message sending the user machine 120 to a
`second URL at www.login.com in step 308. The user's
`
`
`
`US 6,226,677 B1
`
`5
`
`15
`
`25
`
`7
`laptop receives this message and now tries to fetch
`www.login.com by attempting to connect to port 80 of
`www.login.com in step 312. The server 130 redirects this
`request to the control program. The control program recog
`nizes the second URL at www.login.com. When it receives
`requests to www.login.com it knows to respond with a Set of
`pages Stored at a third offsite Server www.connect
`group.com. Next in Step 316, the control program connects
`to that third Server and fetches a third home page from that
`offsite Server, namely, www.connectgroup.com. The third
`home page is returned to the user machine 120 in step 320.
`Because the third home page contains two images,
`image1.gif and image2.gif, the user machine browser makes
`two additional connections to port 80 on www.iogin.com in
`Step 324, once for each image. In as Similar manner as
`described above, the server 130 redirects these requests to
`the control program. The control program recognizes
`www.login.com again. It also sees that the user machine 120
`is trying to acceSS /image1.gif and /image2.gif, respectively,
`on that server. It connects to the offsite server and fetches
`www.connect group.com/image 1.gif
`and
`www.connectgroup.com/image2.gif. It returns these images
`to the particular user machine 120. The user views this page
`and clicks on one of the links on the page, which directs the
`user to www.login.com/page2.html. The server 130 redirects
`this request to the control program. The control program
`recognizes www.login.com again. It also sees that the user
`machine 120 is trying to acceSS /page2.html on that Server.
`It connects to the offsite server and fetches
`www.connectgroup.com/page2.html. It returns this page to
`the particular user machine 120. The user sees on the
`monitor of the user machine 120 that this page contains a
`“login' button which upon activation ultimately results in
`the user being allowed to browse the Internet freely. The user
`Selects or clicks it. This action or Selection causes the user
`machine 120 to access www.login.com/login. The Server
`130 software module redirects this request to the server
`control program. The control or forced proxying program
`recognizes www.login.com and also the page being accessed
`as /login. The program realizes that this user machine 120 is
`trying to log in. In Step 328, the program forwards the user
`machine 120 a fourth web page by using a redirect com
`mand. This page will cause the user machine 120 to jump to
`a fourth URL www.lodgenet.com in five seconds, which is
`enough time for the control program to disable forced
`proxying for this user in Step 332. The control program
`disables forced proxying for this user machine IP address.
`The user machine 120 displays a “logging you in . . . '
`message for five Seconds and then the www.lodgenet.com
`home page is displayed in Step 336. The operator of this user
`machine 120 can then begin to use the Internet normally in
`step 340.
`
`8
`request to the forced proxying program. The forced proxying
`program recognizes www.community.com as a Sandboxed
`domain. It fetches www.community.com and returns this
`page to the user machine 120. This page includes a Selector
`element or button which allows the user machine 120 to
`access the Site it initially Sought, in this case, www.stock
`quote.com. The Server 130 overlays the appropriate codes in
`the www.community.com web page to make this button
`work properly.
`Loosing the user to non-Sandboxed domains is avoided by
`the proxy server 130. A preexisting advertising banner on the
`www.community.com web page may want to lure the user to
`www.flycast.com. The proxy server 130 intercepts the
`browser's request for the advertising banner to determine if
`www.flycast.com is recognized as another Sandboxed
`domain. If www.flycast.com is an approved Sandboxed
`domain, the proxy server fetches the advertising banner for
`www.flycast.com. The user machine browser displays the
`advertising banner on the monitor Screen. The user may
`View this advertisement, but wants to check Stock quotes.
`To proceed to the originally requested Web Site, the user
`clicks on the button on the www.community.com page
`which takes the user to WWW.Stock-quote.com. The Server
`130 redirects this request to the control program. The control
`program remembers that WWW.Stock-quote.com was the Site
`that the user initially wanted to access. It returns to the user
`machine 120 a “logging you in . . . ' page with a redirect
`which will point the user's browser to www.stock
`quote.com in five Seconds. The program then disables forced
`proxying for this user machine 120. In five Seconds, the user
`machine browser fetches the web page Stored at WWW.Stock
`quote.com. The user machine 120 can now use the Internet
`normally.
`With reference to FIG. 4, an embodiment of the control
`System implemented for a multi-unit property (e.g., a hotel,
`an apartment or the like) is shown in block diagram form.
`Located in each unit 404 is a phone 408 and the user
`machine 120. In this embodiment the phone 408 and user
`machine 120 are coupled to a filter 412 which serves to
`multiplex and demultipleX a voice Signal and a computer
`data Signal to and from a single pair of telephone wires. The
`filter 412 Supports an ethernet connector and an analog or
`digital phone Service connector. By using the ubiquitous pair
`of telephone wires to convey both voice and data, expensive
`rewiring of the property is avoided. It is noted however,
`Separate wires for voice and data Signals could be utilized
`where feasible.
`The combined Voice and data wires running from each
`unit 404 are attached to a punchdown block 416. The
`punchdown block 416 allows interchangeable interconnec
`tion of the incoming telephone wires with the outgoing
`telephone wires. AS those skilled in the art can appreciate,
`wiring and rewiring each unit 404 is made easier by using
`the punchdown block 416. The phone line from each unit
`404 passes from the punchdown block 416 to a concentrator
`420. The concentrator 420 takes the many phone lines from
`each unit and demultiplexes and multiplexes the Vo