1
Yi Fang, I Lung Kao, Ivan Matthew Milman, George Conerly Wilson: Single sign-on (SSO) mechanism personal key manager. International Business Machines Corporation, Jeffrey S LaBaw, David Judson, Joseph R Burwell, June 5, 2001: US06243816 (212 worldwide citation)

A method of managing passwords of users desiring access to multiple target resources in a computer enterprise environment. For each given user, each of a set of id/password pairs is associated to each of a set of one or more respective targets. Each id/password pair is normally required to access a ...


2
Timothy John Guenthner, Francis D Lawlor, Dah Haur Lin, Charles Rudolph Schmitt: Mapping web server objects to TCP/IP ports. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, March 19, 2002: US06360262 (167 worldwide citation)

A method of routing in a computer network having a pool of servers capable of servicing requests for access to a set of server resource objects. The set of server resource objects are distributed in a non-homogeneous manner across the server pool. According to the method, each incoming client reques ...


3
I Lung Kao, Ivan Matthew Milman: Method and system for single sign on using configuration directives with respect to target types. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, August 14, 2001: US06275944 (149 worldwide citation)

A single sign-on (SSO) mechanism to enable a given user to access a target application on a target resource in a distributed computer enterprise. One or more configuration directives each identifying a given logon process and any associated methods required to access the target application on the ta ...


4
Theodore Jack London Shrader, Garry L Child, William H Gengler: Dynamic use and validation of HTTP cookies for authentication. International Business Machines Corporation, Jeffrey S LaBaw, David Judson, Joseph R Burwell, April 16, 2002: US06374359 (131 worldwide citation)

A method of enabling a Web browser user to interact with a given application running on a Web server begins by constructing and returning a cookie to the Web browser upon a given occurrence, e.g., user login to the application. Without additional user input, the routine then forces the Web browser t ...


5
German Sergio Goldszmidt, John J E Turek, Brian Jay Vetter: Service request routing using quality-of-service data and network resource information. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, October 23, 2001: US06308216 (126 worldwide citation)

A routing apparatus is located at an outbound “edge” of an administrative domain or at an inbound “edge” of an ISP or other network facility. The apparatus, which is preferably implemented in software, includes a “dispatcher.” The dispatcher has a database associated therewith in which information a ...


6
Michael J Beranek: HTTP caching proxy to filter and control display of data in a web browser. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, April 26, 2005: US06886013 (114 worldwide citation)

A method of controlling how a Web document is presented for display on a browser of a client machine. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the d ...


7
Michael Haden Conner, Matthew Dale McClain, Lin Xu: Method for providing a visual representation of dynamic HTML table attributes. International Business Machines Corporation, Marilyn Smith Dawkins, Joseph R Burwell, David Judson, May 3, 2005: US06889359 (102 worldwide citation)

A table format object is used to format a dynamic HTML table at a web server. To facilitate the development of a dynamic server page for use in serving the dynamic table, first and second representations are created and made available for display to a page developer, e.g., in a web browser. The firs ...


8
Ching Yun Chao, Roger Eldred Hough, Amal Ahmed Shaheen: Method, system and computer program for replicating data in a distributed computed environment. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, January 8, 2002: US06338092 (97 worldwide citation)

A method for replicating data in a distributed computer environment wherein a plurality of servers are configured about one or more central hubs in a hub and spoke arrangement. In each of a plurality of originating nodes, updates and associated origination sequence numbers are sent to the central hu ...


9
Michael Bradford Ault, Garry L Child, Ernst Robert Plassmann, Bruce Arland Rich, Theodore Jack London Shrader, Davis Kent Soper: Method for enabling a web server running a “closed” native operating system to impersonate a user of a web client to obtain a protected file. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, January 8, 2002: US06338064 (95 worldwide citation)

A method of authenticating a Web client to a Web server connectable to a distributed file system of a distributed computing environment. The distributed computing environment includes a security service for returning a credential to a user authenticated to access the distributed file system. The met ...


10
Raymond Morris Bryant, Richard Dale Hoffman, Samuel Kahn: World wide web internet delay monitor. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, June 25, 2002: US06411998 (93 worldwide citation)

A method of determining Internet delays associated with requests from a Web client connectable to a Web server. The method begins at the Web server in response to a first HTTP request. In particular, the Web server serves a response to the first HTTP request and logs a server processing time associa ...