• Below is a list of Skeeter Wesinger’s Hard cover Books.

Live Wire ISBN 9781304230379

Down Twisted ISBN 9781483427461

Secrets of the Tin Man ISBN 9781365064920

Titanpointe ISBN 9780359597420

  • Below is a list of Skeeter Wesinger’s Apple iBooks and eBooks.

Live Wire ISBN 9781312404922

Down Twisted ISBN 9781483427478

  • Below is a list of Skeeter Wesinger’s issued United States Copyrights.

Live Wire Copyright 3292481323

Down Twisted Copyright 3492292684

Secrets of the Tin Man 3647102264

  • Below is a full list of Skeeter Wesinger’s issued United States patents.

 

PAT. NO.            Title

1 8,676,778

Method and apparatus for electronically publishing information on a computer network

Abstract

  • Method and apparatus for electronically publishing information on a computer network:
  • Methods and apparatus for electronically publishing information on a computer network are disclosed. A computer connected to a computer network is provided to host a database. The computer is configured receive a request from a user to electronically publish information on the computer network. The computer then may accept and store input from the user in a database. The computer may then electronically publish the user input by making information stored in the database freely accessible on the computer network.

2 8,510,226

Method for synchronous encryption between a client and a licensing agent

Abstract

  • Method for synchronous encryption between a client and a licensing agent:
  • A licensing system is disclosed for performing synchronous encryption with a client over an IP-compliant network. In disclosed embodiments, the system includes a licensing agent configured to pass a data structure unencrypted in an initial communication between the licensing agent/client pair and pass a first key to said client responsive to an initial communication. The licensing agent then receives the data structure from the client having designated fields encrypted according to the first key. The licensing agent then sends a second key to the client for use in subsequent communications.

3 8,370,476

Modular multi-homed web server with animation player

Abstract
  • Modular multi-homed web server with animation player:
  • A multi-homed web server with modular functionality is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time.

4 8,370,453

Modular multi-homed web server with compiled animation server

Abstract

  • Modular multi-homed web server with compiled animation server:
  • A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time. The web server software may be compiled as part of the native web server code.

5 8,364,754

Multi-homed web server with compiled animation server and programmable functionality

Abstract
  • Multi-homed web server with compiled animation server and programmable functionality:
  • A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time. The web server software may be compiled as part of the native webserver code.

6 8,359,368

Multi-homed web server with animation player

Abstract

  • Multi-homed web server with animation player:
  • A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time.

7 8,356,073

Multi-homed web server with animation player and programmable functionality

Abstract

  • Multi-homed web server with animation player and programmable functionality:
  • A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time.

8 8,346,890

Multi-homed web server with compiled animation server

Abstract

  • Multi-homed web server with compiled animation server:
  • A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. The multi-web server is configured to serve animations to clients over the web. The multi-web server may determine whether the specified time to send a subsequent graphic in a series of graphics has passed, and if the specified time has passed, then send a next graphic the next appropriate time. The web server software may be compiled as part of the native webserver code.

9 8,346,861

Web server with animation player

Abstract

  • Web server with animation player:
  • A method of serving animation using a web server, comprising: receiving, by a web server, a request from a client to view an animation comprising a series a graphics; sending, by said web server, a first graphic to said client; sending, by said web server, a next graphic in said series of graphics at a specified time; determining, by said web server, whether the specified time to send a subsequent graphic in said series of graphics has passed; if said specified time has not passed, then sending, by said web server, a next graphic in said series of graphics at said specified time; and if said specified time has passed, then sending, by said web server, a next graphic in said series of graphics at a next specified time.

10 8,117,298

Multi-homed web server

Abstract

  • Multi-homed web server:
  • A multi-homed web server is disclosed including a plurality of virtual hosts operable in a web server. A master configuration file associated with each of said plurality of virtual hosts is provided. A plurality of modules are available for processing particular types of incoming connection requests. Associations are maintained in the master configuration file for determining which of the plurality of modules is appropriate for a particular incoming connection request.

11 7,424,737

Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination

Abstract

  • Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination:
  • A firewall device for protocol transforming traffic traversing between an IP-compliant source and a non-IP compliant destination comprising: a firewall device having a first edge connection corresponding to a first network connection and a second edge connection corresponding to a second network connection; at least one of said first or second edge connections further comprising at least one set of virtual hosts for providing network connectivity between the IP-compliant source and the non-IP compliant destination, each of said virtual hosts of said set corresponding to a distinct home through which a connection may be made between said IP compliant source and said non-IP compliant destination; each of said virtual hosts further comprising a communications channel configured to: receive IP-compliant traffic from said source being destined for said non-IP compliant destination; and channel process said traffic in said communications channel to perform a protocol translation of said traffic, thereby transforming said IP-compliant traffic into a non-IP protocol appropriate for said destination.

12 7,386,880

Web server employing multi-homed, modular framework

Abstract

  • Web server employing multi-homed, modular framework:
  • A firewall device for protocol transforming traffic traversing between an IP-compliant source and a non-IP compliant destination comprising: a firewall device having a first edge connection corresponding to a first network connection and a second edge connection corresponding to a second network connection; at least one of said first or second edge connections further comprising at least one set of virtual hosts for providing network connectivity between the IP-compliant source and the non-IP compliant destination, each of said virtual hosts of said set corresponding to a distinct home through which a connection may be made between said IP compliant source and said non-IP compliant destination; each of said virtual hosts further comprising a communications channel configured to: receive IP-compliant traffic from said source being destined for said non-IP compliant destination; and channel process said traffic in said communications channel to perform a protocol translation of said traffic, thereby transforming said IP-compliant traffic into a non-IP protocol appropriate for said destination.

13 7,383,573

Method for transparently managing outbound traffic from an internal user of a private network destined for a public network

Abstract

  • Method for transparently managing outbound traffic from an internal user of a private network destined for a public network:
  • A method for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising: receiving a request by a firewall from an internal user of a private network to access a public network element over an IP-compliant network; assigning a proxy agent operable within said firewall to process said request; determining, by said proxy agent, whether said internal user is authorized to access said public network element; if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user; and wherein a proxy agent is assigned to each request received by said firewall.

14 7,380,273

Method for authenticating a user access request

Abstract

  • Method for authenticating a user access request:
  • A Web server is provided having a multi-homed, modular framework. The modular framework allows extensions to the Web server to be easily compiled into the Web server, allowing the extensions to run natively as part of the server instead of incurring the overhead typical of CGI scripts, for example. The multi-homing capabilities of the Web server provide the appearance to Web users of multiple distinct and independent servers, allowing a small company or individual to create the same kind of Web presence enjoyed by larger companies. In effect, multiple virtual servers run on the same physical machine. The Web server as a whole is easily extensible to allow additional capabilities to be provided natively within the Web server itself. Furthermore, each virtual server is independently configurable in order to turn different capabilities on or off or to modify the operation of the virtual server. The Web server is also provided with enhanced security features, built-in animation capability, and other features that afford maximum flexibility and versatility.

15 7,360,244

Method for authenticating a user access request

Abstract

  • Method for authenticating a user access request:
  • Methods and apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network are disclosed. Embodiments include a firewall device operable between an internal user of a private network and an IP-compliant network. The firewall device being configured to assign a proxy agent to process a request by the internal user to form a connection with a public network element through the IP-compliant network. Disclosed embodiments include the proxy agent forming a connection only if the internal user is authorized to access the public requested network element.

16 7,269,847

Firewall providing enhanced network security and user transparency

Abstract

  • Firewall providing enhanced network security and user transparency:
  • A firewall for authenticating a user access request is disclosed. The firewall device may include a proxy process for processing incoming connection requests. The proxy is configured to receive an access request from a user over a first communication medium and prompt the user for a username over the first communication medium. The firewall may then send a password to the user over a communication medium other than said first communication medium responsive to receiving a valid username from the user. The firewall may then verify the access request responsive to receiving the password from the user through the first communication medium. The firewall may send passwords to a mobile device for verification.A firewall for authenticating a user access request is disclosed. The firewall device may include a proxy process for processing incoming connection requests. The proxy is configured to receive an access request from a user over a first communication medium and prompt the user for a username and a first password portion over the first communication medium. The firewall may then send a second password portion to the user over a communication medium other than said first communication medium responsive to receiving a valid user name and first password portion pair from the user. The firewall may then verify the access request responsive to receiving the second password portion from the user through the first communication medium. The firewall may send passwords to a mobile device for verification.

17 7,269,591

Method and apparatus for providing a pay-for-service website

Abstract

  • Method and apparatus for providing a pay-for-service web site:
  • A remote configurator for a gateway device is disclosed. The remote configurator module is operatively disposed in a gateway device for providing network connectivity between a source and destination of IP-compliant traffic. Embodiments of the remote configurator module are disclosed providing an HTML-based configuration interface for allowing remote management of gateway configuration files over an IP-compliant connection.A method for providing a pay-for-service web site comprising: providing a web server coupled to a computer network having a database operatively disposed within and accessible on said network; providing an HTML front-end entry process associated with the web server; executing an HTML front-end entry process, said HTML front-end entry process being configured to: create a personal homepage for an owner; store said personal home page in said database; index said personal homepage in said database in a user-defined category; and receive a fee from said owner for making said personal homepage accessible on said network.

18 7,249,376

Firewall providing enhanced network security and user transparency

Abstract

  • Firewall providing enhanced network security and user transparency:
  • The present invention provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs “envoys” that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the best of both worlds. No traffic can pass through the firewall unless the firewall has established an envoy for that traffic. Both connection-oriented (e.g., TCP) and connectionless (e.g., UDP-based) services may be handled using envoys. Establishment of an envoy may be subjected to a myriad of tests to “qualify” the user, the requested communication, or both. Therefore, a high level of security may be achieved. The usual added burden of prior-art proxy systems is avoided in such a way as to achieve fall transparency-the user can use standard applications and need not even know of the existence of the firewall. To achieve full transparency, the firewall is configured as two or more sets of virtual hosts. The firewall is, therefore, “multi-homed,” each home being independently configurable. One set of hosts responds to addresses on a first network interface of the firewall. Another set of hosts responds to addresses on a second network interface of the firewall. In one aspect, programmable transparency is achieved by establishing DNS mappings between remote hosts to be accessed through one of the network interfaces and respective virtual hosts on that interface. In another aspect, automatic transparency may be achieved using code for dynamically mapping remote hosts to virtual hosts in accordance with a technique referred to herein as dynamic DNS, or DDNS.

19 7,127,464

Method for updating personal financial information on a web site

Abstract

  • Method for updating personal financial information on a web site:
  • A method for updating personal financial information on a web site comprising: receiving a request from a user to update personal financial information on the web site; retrieving a password corresponding to said user; querying said user for said password; receiving a user response to said query; and allowing said financial information to be updated if said user response contains said password.

20 7,028,336

Firewall providing enhanced network security and user transparency

Abstract

  • A data processing system for processing data packets transferred over a network, the data processing system comprising: a firewall, the firewall being operable to: receive a set of firewall policies; and apply the firewall policies to a data packet; an authentication application, the authentication application being operable to: receive a set of authentication policies; and authenticate a data packet in accordance with the authentication policies; at least one virtual private network, each virtual private network having an associated destination address and policies; and a controller being operable to: detect an incoming data packet; examine the incoming data packet for a virtual private network destination address; identify the policies associated with the virtual private network destination address; if the policies include firewall policies, then call a firewall engine and apply the set of firewall policies corresponding to the virtual private network to the data packet; if the policies include authentication policies, then call a firewall authentication application and apply a set of firewall authentication policies corresponding to the virtual private network to the data packet; and route the data packet to the virtual private network corresponding to the virtual network destination address contained in the data packet.

21 7,028,034

Method and apparatus for providing a dynamically-updating pay-for-service website

Abstract

  • Method and apparatus for providing a dynamically-updating pay-for-service web site:
  • A web server for providing a dynamically-updating pay-for-service web site is disclosed. The web server includes an HTML front-end entry process configured to create and store personal homepage content in a database for a owner, receive a fee for making the personal homepage accessible on a network. The HTML front-end update process is also configured to allow the owner to update their personal homepage over a network.

22 6,850,940

Automated online information service and directory, particularly for the world wide web

Abstract
  • Automated on-line information service and directory, particularly for the world wide web:
  • A computer network and a database are used to provide a hardware-independent, dynamic information system in which the information content is entirely user-controlled. Requests are received from individual users of the computer network to electronically publish information, and input is accepted from the individual users. Entries from the users containing the information to be electronically published are automatically collected, classified and stored in the database in searchable and retrievable form. Entries are made freely accessible on the computer network. In response to user requests, the database is searched and entries are retrieved. Entries are served to users in a hardware-independent page description language. The entries are password protected, allowing users to retrieve and update entries by supplying a correct password. Preferably, the process is entirely automated with any necessary billing being performed by secure, on-line credit card processing. The user making a database entry has complete control of that entry both at the time the entry is made and in the future after the entry has been made. The entry, when served to a client, is transformed on-the-fly to the page description language. Where the page description language is HTML and the computer network is the World Wide Web, the entry may function as a “mini” homepage for the user that made the entry. Provision is made for graphics and other kinds of content besides text, taking advantage of the content-rich nature of the Web.

23 6,804,783

Firewall providing enhanced network security and user transparency

Abstract
  • Firewall providing enhanced network security and user transparency:
  • A method of authenticating the identity of a user as one authorized to communicate from a first computer, across a computer network, and through a firewall to a second computer, the method comprising the steps of: receiving at the firewall a request to establish a connection between the first computer and the second computer; communicating to the user through a separate communications mechanism a key; and requiring the user to send to the firewall information dependent upon said key in order to said connection to be established.

24 6,751,738

Firewall providing enhanced network security and user transparency

Abstract
  • Firewall providing enhanced network security and user transparency:
  • A method of operating a system for facilitating a connection between a first computer and a second computer, the method comprising: receiving a connection request from the first computer for a connection to the second computer, the request including the name of the second computer; initiating verification checks in response to the request including verifying a name and Internet protocol (IP) address associated with the first computer, and verifying that a connection is allowed between the first computer and the second computer; and establishing a connection between the first computer and the second computer.

25 6,647,422

Web server employing multi-homed, modular framework

Abstract
  • Web server employing multi-homed, modular framework:
  • A computer executing a Web server program, comprising: a plurality of virtual hosts accessible using connection requests passed over a computer network, each of the virtual hosts being identified by a corresponding virtual host identifier includable in a connection request; a plurality of executable modules, each of the modules defining a predetermined function; a plurality of configuration sub-files corresponding to the virtual hosts, each of the configuration sub-files defining which of the executable module functions are usable by a corresponding one of the virtual hosts.

26 6,324,538

Automated on-line information service and directory, particularly for the world wide web

Abstract
  • Automated on-line information service and directory, particularly for the world wide web:
  • A computer network and a database are used to provide a hardware-independent, dynamic information system in which the information content is entirely user-controlled. Requests are received from individual users of the computer network to electronically publish information, and input is accepted from the individual users. Entries from the users containing the information to be electronically published are automatically collected, classified and stored in the database in searchable and retrievable form. Entries are made freely accessible on the computer network. In response to user requests, the database is searched and entries are retrieved. Entries are served to users in a hardware-independent page description language. The entries are password protected, allowing users to retrieve and update entries by supplying a correct password. Preferably, the process is entirely automated with any necessary billing being performed by secure, on-line credit card processing. The user making a database entry has complete control of that entry both at the time the entry is made and in the future after the entry has been made. The entry, when served to a client, is transformed on-the-fly to the page description language. Where the page description language is HTML and the computer network is the World Wide Web, the entry may function as a “mini” homepage for the user that made the entry. Provision is made for graphics and other kinds of content besides text, taking advantage of the content-rich nature of the Web.

27 6,061,798

Firewall system for protecting network elements connected to a public network

Abstract
  • Firewall system for protecting network elements connected to a public network:
  • A firewall system for protecting network elements comprising: A computing platform having a microprocessor and memory storage, wherein said computing platform provides access from a network connection to at least one network element, wherein said memory contains instructions causing said microprocessor to perform the steps of: Initializing a plurality of proxy agents, wherein each of said proxy agents is assigned a corresponding port number and protocol; Verifying that incoming connection requests are formatted in accordance with said corresponding protocol; Logging information associated with incoming connection requests; and, processing received packets to determine the presence of executable commands nested within received packets, and if detected, discarding said received packets.

28 6,052,788

Firewall providing enhanced network security and user transparency

Abstract
  • Firewall providing enhanced network security and user transparency:
  • The present invention, generally speaking, provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs “envoys” that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the best of both worlds. No traffic can pass through the firewall unless the firewall has established an envoy for that traffic. Both connection-oriented (e.g., TCP) and connectionless (e.g., UDP-based) services may be handled using envoys. Establishment of an envoy may be subjected to a myriad of tests to “qualify” the user, the requested communication, or both. Therefore, a high level of security may be achieved. The usual added burden of prior-art proxy systems is avoided in such a way as to achieve full transparency–the user can use standard applications and need not even know of the existence of the firewall. To achieve full transparency, the firewall is configured as two or more sets of virtual hosts. The firewall is, therefore, “multi-homed,” each home being independently configurable. One set of hosts responds to addresses on a first network interface of the firewall. Another set of hosts responds to addresses on a second network interface of the firewall. In one aspect, programmable transparency is achieved by establishing DNS mappings between remote hosts to be accessed through one of the network interfaces and respective virtual hosts on that interface. In another aspect, automatic transparency may be achieved using code for dynamically mapping remote hosts to virtual hosts in accordance with a technique referred to herein as dynamic DNS, or DDNS.

29 5,898,830

Firewall providing enhanced network security and user transparency

Abstract
  • Firewall providing enhanced network security and user transparency:
  • A method of establishing a connection between a first computer and a second remote computer along a route from the first computer to the second computer through a first intermediate system having a first interface to a first computer network and a second interface to a second computer network, without requiring a user to know of the intermediate system, the method comprising the steps of: Configuring the first intermediate system as a plurality of virtual hosts, each responsive to a network address used on one of the first and second computer networks; Mapping from a name of the second computer to a network address of one of the virtual hosts of the first intermediate system, said one of the virtual hosts being associated with the first interface; Issuing a request for a connection from the first computer to the second computer by specifying the name of the second computer; Receiving the request at the first interface and routing the request to said one of the virtual hosts in accordance with said mapping; Establishing a first bi-directional connection from the first computer to said one of the virtual hosts; Establishing a second bi-directional connection from said one of the virtual hosts to the second computer on behalf of the first computer; and passing data between the first computer and the second computer using the first and second bi-directional connections.

30 5,870,550

Web server employing multi-homed, moldular framework

Abstract
  • Web server employing multi-homed, moldular framework:
  • A Web server is provided having a multi-homed, modular framework. The modular framework allows extensions to the Web server to be easily compiled into the Web server, allowing the extensions to run natively as part of the server instead of incurring the overhead typical of CGI scripts, for example. The multi-homing capabilities of the Web server provide the appearance to Web users of multiple distinct and independent servers, allowing a small company or individual to create the same kind of Web presence enjoyed by larger companies. In effect, multiple virtual servers run on the same physical machine. The Web server as a whole is easily extensible to allow additional capabilities to be provided natively within the Web server itself. Furthermore, each virtual server is independently configurable in order to turn different capabilities on or off or to modify operation of the virtual server. The Web server is also provided with enhanced security features, built-in animation capability, and other features that afford maximum flexibility and versatility.

31 5,826,014

Firewall system for protecting network elements connected to a public network

Abstract
  • Firewall system for protecting network elements connected to a public network:
  • Providing a firewall for isolating network elements from a publicly accessible network to which such network elements are attached. The firewall operates on a stand alone computer connected between the public network and the network elements to be protected such that all access to the protected network elements must go through the firewall. The firewall application running on the stand alone computer is preferably the only application running on that machine. The application includes a variety of proxy agents that are specifically assigned to an incoming request in accordance with the service protocol (i.e., port number) indicated in the incoming access request. An assigned proxy agent verifies the authority of an incoming request to access a network element indicated in the request. Once verified, the proxy agent completes the connection to the protected network element on behalf of the source of the incoming request.

32 5,790,664

Automated system for management of licensed software

Abstract
  • Automated system for management of licensed software:
  • Methods and apparatuses are disclosed for providing a system for automatically tracking use of a software and also for determining whether the software is validly licensed and enabling or disabling the software accordingly. Exemplary systems involve attaching a licensing system module to a software application. Records of valid licenses are stored in the database maintained by the software provider. The licensing system module transparently forms a license record inquiry message. The message is transparently sent to the database over a public network, such as the Internet, to determine whether a valid license record exists in the database for the software application. The database forms and returns an appropriate response message that is interpreted by the licensing system module. The software application can then be appropriately enabled or disabled by the licensing system module. The receipt of the license record inquiry can be recorded in the database to monitor software use.

33 5,778,367

Automated on-line information service and directory, particularly for the world wide web

Abstract
  • Automated on-line information service and directory, particularly for the world wide web:
  • A computer network and a database are used to provide a hardware-independent, dynamic information system in which the information content is entirely user-controlled. Requests are received from individual users of the computer network to electronically publish information, and input is accepted from the individual users. Entries from the users containing the information to be electronically published are automatically collected, classified and stored in the database in searchable and retrievable form. Entries are made freely accessible on the computer network. In response to user requests, the database is searched and entries are retrieved. Entries are served to users in a hardware-independent page description language. The entries are password protected, allowing users to retrieve and update entries by supplying a correct password. Preferably, the process is entirely automated with any necessary billing being performed by secure, on-line credit card processing. The user making a database entry has complete control of that entry both at the time the entry is made and in the future after the entry has been made. The entry, when served to a client, is transformed on-the-fly to the page description language. Where the page description language is HTML and the computer network is the World Wide Web, the entry may function as a “mini” homepage for the user that made the entry. Provision is made for graphics and other kinds of content besides text, taking advantage of the content-rich nature of the Web.

Need a PDF reader click here