More on controlling Web browsers

James Cayz cayz at lib.de.us
Wed Mar 26 20:01:55 EST 1997


Robert,

	I have done exactly what you thought about with a text-based
system.  As a matter of fact, I used to have a "harvesting" system
that would collect the barcodes from 2 automated library systems on a
weekly basis, and update the list of "valid" users.

	I dumped that in favor of a real-time query / lookup system.

	Simply put, to access the Web or other Internet Resources
(Full Text, etc), the user logs into our server as the appropriate
generic user (lets say "lynx").  Lynx doesn't have a standard Unix
shell; it has a custom shell that is an authentication program that
asks the user for a library card & PIN, and then, depending on the
library ID of the card, in real time, queries one of 4 systems in the
state.  The remote library systems pass back the PIN or a NACK, which
are then compared or acted upon. A NACK could be anything from the
parent doesn't want their child to have Inet Access to "too many
overdues" (locally controlled field).  If the user is
"authenticated", they get a special version of Lynx, or connection to
our Full text databases.  Throw in bells & Whistles of 1) Mailto:s in
lynx get the barcode of the patron inserted for traceback, 2)
Real-Time monitoring of user's activities since _all_ processes are
barcode-tagged, 3) messaging to-from sysadmins based on barcodes, 4)
Centralized "denying of service" due to abuse, etc.  It works well. 
We are working on similar client server stuff (with a lot more
logging) for offering GUIs.

	5% Custom Coding by library vendor (hook into each library
systems patron database), 95% Custom Coding by me (wrapping everything
into encrypted TCP/IP communications, Lynx mods, etc.).

	I had to go this way - Library Vendors _aren't_ offering this
yet, and, well, the Public wants to get on the Internet....

	James Cayz

+-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=+
[ James Cayz # cayz at lib.de.us # Del-AWARE homepage: http://www.lib.de.us   ]
[ Network Processing Administrator #  302-739-4748 x130 # Fax 302-739-6948 ]
[ Delaware Division of Libraries # 43 S. DuPont Hwy / Dover, DE 19901-7430 ]
+=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-+


On Wed, 26 Mar 1997, Robert Sullivan wrote:
>I would like to echo Dan's request for suggestions, and extend the question a
>bit.  We are patterning our policy after our video policy - parents who do not
>wish their children to check out videos may have their cards coded to block
>this.  We don't make a distinction about type; it applies to Barney videos as
>well as anything else.  The text-based net access we have through our DRA
>system would allow us to do something similar for net machines, but we can't do
>it with graphical access.  The text system (after some modification by our
>automation consortium) also will limit users to, say, an hour a day.  We'd like
>to be able to do that on the new system so staff don't have to monitor use..
>
>We would also like to have one more capability which we've never had to use on
>the text system - disable access for users who don't follow our policy.
>
>Have I lost my mind to think about doing this?  Will I have lost it by the time
>I'm through?  If it's already been done, how?
>
>As an aside, I should note that few parents actually blocked their children's
>cards, and many who did showed their deep moral commitment by reversing that
>when they found they could no longer use them to avoid the fines on their own
>cards and take out more videos for themselves. ;-)



More information about the Web4lib mailing list