1
Raymond Morris Bryant: Method of recording and measuring e-business sessions on the world wide web. International Business Machines Corporation, Jeffrey S Labace, Joseph R Burwell, David H Judson, September 4, 2001: US06286046 (239 worldwide citation)

A monitor located between a Web browser and a server upon which a server application is running. The monitor is useful for recording a set of URLs (sometimes referred to as a “request list”) that issue from the Web browser during a sample interactive session between the user of the client machine an ...


2
Yi Fang, I Lung Kao, Ivan Matthew Milman, George Conerly Wilson: Single sign-on (SSO) mechanism personal key manager. International Business Machines Corporation, Jeffrey S LaBaw, David Judson, Joseph R Burwell, June 5, 2001: US06243816 (212 worldwide citation)

A method of managing passwords of users desiring access to multiple target resources in a computer enterprise environment. For each given user, each of a set of id/password pairs is associated to each of a set of one or more respective targets. Each id/password pair is normally required to access a ...


3
Timothy John Guenthner, Francis D Lawlor, Dah Haur Lin, Charles Rudolph Schmitt: Mapping web server objects to TCP/IP ports. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, March 19, 2002: US06360262 (167 worldwide citation)

A method of routing in a computer network having a pool of servers capable of servicing requests for access to a set of server resource objects. The set of server resource objects are distributed in a non-homogeneous manner across the server pool. According to the method, each incoming client reques ...


4
I Lung Kao, Ivan Matthew Milman: Method and system for single sign on using configuration directives with respect to target types. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, August 14, 2001: US06275944 (149 worldwide citation)

A single sign-on (SSO) mechanism to enable a given user to access a target application on a target resource in a distributed computer enterprise. One or more configuration directives each identifying a given logon process and any associated methods required to access the target application on the ta ...


5
Michael A Crane, Ivan Matthew Milman: Authentication framework for managing authentication requests from multiple authentication devices. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David H Judson, January 21, 2003: US06510236 (146 worldwide citation)

An authentication framework for authenticating clients, each of which is coupled to an authentication device of one of a plurality of permitted authentication device types. An authentication method begins by having a client pass to an application server a request for authentication. The request incl ...


6
Thomas Alexander Bellwood, Christian Lita, Matthew Francis Rutkowski: Dynamic connection to multiple origin servers in a transcoding proxy. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David H Judson, June 24, 2003: US06584567 (132 worldwide citation)

A method of enabling a proxy to participate in a secure communication between a client and a set of servers. The method begins by establishing a first secure session between the client and the proxy. Upon verifying the first secure session, the method continues by establishing a second secure sessio ...


7
Theodore Jack London Shrader, Garry L Child, William H Gengler: Dynamic use and validation of HTTP cookies for authentication. International Business Machines Corporation, Jeffrey S LaBaw, David Judson, Joseph R Burwell, April 16, 2002: US06374359 (131 worldwide citation)

A method of enabling a Web browser user to interact with a given application running on a Web server begins by constructing and returning a cookie to the Web browser upon a given occurrence, e.g., user login to the application. Without additional user input, the routine then forces the Web browser t ...


8
German Sergio Goldszmidt, John J E Turek, Brian Jay Vetter: Service request routing using quality-of-service data and network resource information. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, October 23, 2001: US06308216 (126 worldwide citation)

A routing apparatus is located at an outbound “edge” of an administrative domain or at an inbound “edge” of an ISP or other network facility. The apparatus, which is preferably implemented in software, includes a “dispatcher.” The dispatcher has a database associated therewith in which information a ...


9
Michael J Beranek: HTTP caching proxy to filter and control display of data in a web browser. International Business Machines Corporation, Jeffrey S LaBaw, Joseph R Burwell, David Judson, April 26, 2005: US06886013 (114 worldwide citation)

A method of controlling how a Web document is presented for display on a browser of a client machine. The Web document typically is formatted according to a markup language such as HTML. The method uses a client side HTTP caching proxy to intercept the Web document and then dynamically rewrite the d ...


10
Rabindranath Dutta, Steven Michael French, Janani Janakiraman: Method and system for augmenting web-indexed search engine results with peer-to-peer search results. International Business Machines Corporation, Leslie A Van Leeuwen, Joseph R Burwell, October 21, 2003: US06636854 (111 worldwide citation)

A method and system for augmenting conventional search engine results with peer-to-peer search results. Rather than relying solely on an index search in a database that has only indexed a minor portion of the entire World Wide Web, a server-based, peer-to-peer search is initiated in conjunction with ...