scispace - formally typeset
Search or ask a question
Topic

User identifier

About: User identifier is a research topic. Over the lifetime, 11201 publications have been published within this topic receiving 116700 citations. The topic is also known as: UID & uid.


Papers
More filters
Patent
John R. Rose1
14 Nov 1996
TL;DR: In this paper, a system and method for managing the distribution of licensed application programs stored on a server over a distributed computer system maintains control over the program even after the program has been distributed to a client computer from a provider on an information server.
Abstract: A system and method for managing the distribution of licensed application programs stored on a server over a distributed computer system maintains control over the program even after the program has been distributed to a client computer from a provider on an information server. Protection may include license expiration date verification, authorized user ID verification, and protection against decompilation and reverse engineering by maintaining the program in an encrypted form until verification of the expiration date and user identity are complete and the program is ready for decoding, loading into the client computer CPU, and execution. A user identifies a program for trial use by any conventional means such as by using a network browser on the World Wide Web. The server recognizes a user request to access the application program. The server may have an agent on the client computer for performing certain predetermined administrative tasks. This agent may take the form of an application builder program module, provided by the trial application provider, which is resident on the client computer. The server (including the agent) determines whether program access conditions are satisfied, and if satisfied transmits a version of the program to the client. The transmitted file includes an encrypted portion. The server and agent also verify that the user is currently entitled to execute the application program including that the trial license has not expired at the time the user initiates execution, and generates an executable version of the application program.

599 citations

Patent
22 Dec 2000
TL;DR: In this paper, an e-mail sender (10) transfers an e -mail to its intended recipient (40) and the message arrives at a first tier system (20) which may be an e mail server.
Abstract: An e-mail sender (10) transfers an e-mail to its intended recipient (40). The message arrives at a first tier system (20) which may be an e-mail server. A digital identifier engine on the first tier system (20) generates a digital identifier which comprises a hash of at least a portion of the e-mail. Second tier system (30) includes a database and processor which determines, based on an algorithm which varies with the characteristics tested, whether the e-mail is spam or not processes the e-mail accordingly.

541 citations

Patent
Albert Reiche1
25 Nov 1997
TL;DR: In this article, the authors proposed a single point of authentication for remote users across any number of HTTP servers, such as Intranet, using any user ID and password scheme implemented by a main authentication HTTP server.
Abstract: The present invention relates to the field of data and computer network security. Data and computer network security is of the utmost importance to most organizations that possess such networks. One of the difficulties that users and managers of these networks face is that the users have to provide a user ID and password every time they wish to access one of the organization's secured HTTP servers or URLs. This creates a problem for users and managers since lists of numerous user IDs and passwords need to be maintained and therefore can easily be lost or their confidentiality compromised. This invention addresses these problems by providing a transparent, scalable, single point of authentication for remote users across any number of HTTP servers anywhere on a data network, such as an Intranet, using any user ID and password scheme implemented by a main authentication HTTP server.

540 citations

Patent
27 May 2010
TL;DR: In this article, the authors describe several computer-implemented methods and systems, including: in a computer network system, providing a user page region viewable by a user; providing to the user, in the user region, indicators of each of three categories, the categories consisting essentially of: (i) what the user has, (ii) what user wants, and (c) what a user has thought or is thinking).
Abstract: Embodiments of computer-implemented methods and systems are described, including: in a computer network system, providing a user page region viewable by a user; providing to the user, in the user page region, indicators of each of three categories, the categories consisting essentially of: (i) what the user has, (ii) what the user wants, and (c) what the user has thought or is thinking; wherein the user page region accepts a post by the user; after the post by the user, displaying the post in a group page region, viewable by a set of one of more persons other than the user, the set of persons being separated from the user at locations on a network; before the displaying, requiring the user to select one of the three categories to be associated with the post; and displaying the category selected by the user, with the post, in the group page region.

426 citations

Patent
15 Jan 2014
TL;DR: In this paper, a method for providing information to a plurality of vendors located remotely from a broadcast network was proposed, where the plurality of user defined parameters are received by a user input database with at least one of the user-defined parameters including a user profile.
Abstract: A method for providing information to a plurality of vendors located remotely from a broadcast network. A plurality of user-defined parameters are received by a user input database with at least one of the user-defined parameters including a user profile. Each of the user profiles includes a user identifier code identifying a communicator device associated with a particular user. Real-time data indicative of the spatial locations of the communicator devices is received by a communicator location database. Search information is received independently from a plurality of vendors and a data set is generated for each vendor.

424 citations


Network Information
Related Topics (5)
Mobile computing
51.3K papers, 1M citations
74% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
71% related
Wireless ad hoc network
49K papers, 1.1M citations
71% related
Server
79.5K papers, 1.4M citations
71% related
Wireless sensor network
142K papers, 2.4M citations
71% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
2021111
2020468
2019694
2018743
2017655