scispace - formally typeset
Search or ask a question
Topic

Computer bridge

About: Computer bridge is a research topic. Over the lifetime, 37 publications have been published within this topic receiving 617 citations.

Papers
More filters
Patent
12 Apr 2012
TL;DR: In this article, a home bridge computer is configured to securely deliver an electronic document over a computer network, where the home bridge combines SSL security, authentication and direct data transfer in a link delivery system to maintain security of private electronic documents.
Abstract: A private document delivery system and method includes a home bridge computer configured to securely deliver an electronic document over a computer network. The home bridge computer combines SSL security, authentication, and direct data transfer in a link delivery system to maintain security of private electronic documents. The private electronic documents and messages transmitted via the home bridge computer are not stored during transit on the computer network, and no third parties to the message receive a permanent copy of the message. The systems and methods also include signaling mechanisms configured to notify the receiving computer that the electronic document is awaiting delivery. The system and method includes a network registry configured to verify the receiving computer's identity with a protocol specified by the sending computer and to provide access instructions to the receiving computer with which the receiving computer locates the home bridge and retrieves the private message.

6 citations

Patent
02 Apr 2014
TL;DR: In this paper, a distributed authentication system (100) consisting of a first computer system (130) comprising a first authentication system and a first service providing, a second computer system comprising a second authentication system providing, and a bridge computer system having a register (214) is described.
Abstract: The invention relates to a distributed authentication system (100) comprising: - a first computer system (130) comprising a first authentication system (136) and a first service providing; - a second computer system (138) having a second authentication system (144) and a second service (143) provides, - a Bridge computer system (118) having a register (214); wherein the bridge computer system or the first and second computer systems are configured to: • first computer system: receiving a request for authentication of a user (102) over the first Autheritifizierungssystem; Communication of an unsuccessful authentication attempt to the bridge computer system by means of a first message; • Bridge computer system: in the case of receipt of the first message, sending a request for entering a user identifier to the user computer system and receiving at least the user identification (OM); Identifying a stored in the register address (URL II) of the second computer system based on the user identifier; and initiating execution of the second system authentication means of the address; • second computer system: in the case of a successful authentication of the user (102) relative to the second authentication system of this communication successful authentication to the bridge computer system by a second message; • Bridge computer system: in the case of receiving the second message, sending an identity verification message concerning the user (102) to the first authentication system; • First computer system: authenticated in the case of receipt of the identity verification message, treatment of the user to be successful and providing the first service.

5 citations

Journal Article
TL;DR: In this article, an agent-oriented model for a bidder in the auctioning stage of bridge is proposed, where each agent selects a bid according to the criteria: Cooperate with the partner to get maximum profit and compete against opponents to minimize loss.
Abstract: The authors propose an agent oriented model for a bidder in the auctioning stage of bridge. Each agent selects a bid according to the criteria: Cooperate with the partner to get maximum profit and compete against opponents to minimize loss. Since bridge auction is a task of imperfect information, each agent has hypothetical reasoning ability and generates images of other players' hands by abduction from the observed bidding sequence. This paper shows a framework for reasoning about each others knowledge and the details of analysis on typical examples. It is shown that the difference between one's own real hand and its image in a partner's knowledge motivates an agent to continue bidding. We also analyze an example of reasoning by an agent to select a sacrifice bid where the expected score of the bid is better than the score of an opponent's possible contract. Experimental results show that the reasoning by the agent is flexible enough to play with a human partner and other computer bridge programs.

4 citations

Patent
Andrea Naglieri1
31 Jan 2006
TL;DR: In this article, a method for exchanging information between computers from different computer networks without any direct connection is disclosed, where the two networks include corresponding bridge computers that share a file system residing on a common storage device.
Abstract: A method for exchanging information between computers from different computer networks without any direct connection is disclosed. The two networks include corresponding bridge computers that which share a file system residing on a common storage device. Any computer of a network needing to transmit information to a computer on the other network can map the file system of the corresponding bridge computer. The computer authenticates itself on the bridge computer, and it is then allowed to write the information into a file residing on the shared memory device. Likewise, any computer on the other network can map the same file system of the corresponding bridge computer. The computer authenticates itself on the bridge computer, and it is then allowed to read the information from a mirror copy of the file on the shared memory device. As a result, any network that is isolated from the outside can send and receive information. Such operation is possible even in the presence of virus infections without any security exposure.

4 citations

Network Information
Related Topics (5)
Game mechanics
10.1K papers, 287K citations
63% related
Game design
13.2K papers, 258.7K citations
63% related
Logic programming
11.1K papers, 274.2K citations
61% related
Inductive programming
9.4K papers, 276.7K citations
61% related
Functional logic programming
6.7K papers, 205.7K citations
60% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20202
20192
20181
20171
20162
20151