$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computer network capable of accessing file remotely between computer systems 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-012/14
출원번호 US-0762456 (1991-09-19)
우선권정보 JP-0252864 (1990-09-21)
발명자 / 주소
  • Nukui Harumi (Kanagawa JPX)
출원인 / 주소
  • Kabushiki Kaisha Toshiba (Kanagawa JPX 03)
인용정보 피인용 횟수 : 58  인용 특허 : 0

초록

Each computer system of the computer network according to the present invention has a management information storage portion for storing information with respect to an access authority in accordance with an owner ID and a conversion rule storage portion for storing a rule for converting the formats

대표청구항

A computer network, where a plurality of computer systems are connected through a communication medium, each computer system being capable of accessing files of another computer system, each computer system being given a specific machine ID, each computer system having set kinds of file operations p

이 특허를 인용한 특허 (58)

  1. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  2. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  3. Dao Son K. (Northridge CA) Ebeid Nader (Westlake Village CA), Apparatus and method for providing users with transparent integrated access to heterogeneous database management systems.
  4. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Billing usage in a virtual computing infrastructure.
  5. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Building a cloud computing environment using a seed device in a virtual computing infrastructure.
  6. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  7. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  8. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Defining an authorizer in a virtual computing infrastructure.
  9. Etchegoyen, Craig S., Device-specific content delivery.
  10. Etchegoyen, Craig S., Device-specific content delivery.
  11. Inoue,Hiroshi; Yokomizo,Yoshikazu; Ando,Tsutomu, Digital contents distribution system, digital contents distribution method, roaming server, information processor, and information processing method.
  12. Mastors Robert N. ; Stillwell Michael J., Disconnected write authorization in a client/server computing system.
  13. Srikanth Shoroff ; F. Soner Terek ; Sankrant Sanu ; Andrew Wallace, Enforcing access control on resources at a location other than the source location.
  14. Sabsevitz, Arthur L; Luman, II, Ronald John; Capps, Don, File access management system.
  15. Myerscough, Micah; Yang, Chenguang; Haden, Kyle Von, File fetch from a remote client device.
  16. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Granting access to a cloud computing environment using names in a virtual computing infrastructure.
  17. Smyers Scott D., Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network.
  18. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Launching an instance in a virtual computing infrastructure.
  19. Hippeläinen, Lassi, Marking of electronic documents in order to expose unauthorized publication.
  20. Ellington,Jeremy Mark, Method and system for enabling remote access to a computer system.
  21. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  22. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  23. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  24. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  25. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  26. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  27. Wang Sin-Yaw ; Bellman Christopher M. ; Lam Elvis, Method and system for programming firmware over a computer network.
  28. Masayoshi Ooki JP; Kouji Nishimoto JP; Nobuyuki Hama JP, Method for accessing information.
  29. Ooki Masayoshi,JPX ; Nishimoto Kouji,JPX ; Hama Nobuyuki,JPX, Method for accessing information.
  30. Nolan, Shari J.; Nespor, Jeffrey S.; Harris, Jr., George W.; Lane, Jerry Parker; Merrell, Alan R.; Lagueux, Jr., Richard A.; Panas, Michael G., Method for configuration and management of storage resources in a storage network.
  31. Hauck,Leon E.; Burval,Brent J., Method for restricting access to a web site by remote users.
  32. Brown, Yale Robert; Walker, Matthew Brown, Method of providing targeted advertisements to a computer mediated communications network.
  33. Polcyn Michael J., Monitoring and directing flow of HTML documents for security and access.
  34. Hardy, Alexandre; Tilak, Omkar, Naïve, client-side sharding with online addition of shards.
  35. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  36. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  37. Nguyen Minhtam C. (10018 Lexington Estates Blvd. Boca Raton FL 33428), Network with secure communications sessions.
  38. Nguyen Minhtam C. (335 Elan Village La. ; Apt. 217 San Jose CA 95134), Network with secure communications sessions.
  39. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Networking in a virtual computing infrastructure.
  40. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Objects in a virtual computing infrastructure.
  41. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing data in a virtual computing infrastructure.
  42. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing data in a virtual computing infrastructure.
  43. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Organizing permission associated with a cloud customer in a virtual computing infrastructure.
  44. Gomi,Tomohiro, Printing system for printing interrupt jobs.
  45. Seki Kenji (Tokyo JPX), Radio apparatus capable of detecting field intensity.
  46. Jacobs Dwayne Charles (Boca Raton FL) Ibanez Jesus Gerardo (Austin TX), Remote user profile management administration in a computer network.
  47. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  48. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  49. Whitaker,David J; Anspach,Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  50. Etchegoyen, Craig Stephen, System and method for secured mobile communication.
  51. Etchegoyen, Craig Stephen, System and method for securing an electronic communication.
  52. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  53. Etchegoyen, Craig S.; Harjanto, Dono, Traceback packet transport protocol.
  54. Etchegoyen, Craig Stephen; Harjanto, Dono, Traceback packet transport protocol.
  55. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  56. Brodigan Donald L., Video and data communication system having downstream network interface entitlement profile for restricting transmission to selection device.
  57. Russ, Craig F.; Clarke, Steven E.; Prestifilippo, James C.; Kogen, Clark C., Virtual file system and method.
  58. Van Biljon, Willem Robert; Pinkham, Christopher Conway; Cloran, Russell Andrew; Gorven, Michael Carl; Hardy, Alexandre; Divey, Brynmor K. B.; Hoole, Quinton Robin; Kalele, Girish, Virtualization layer in a virtual computing infrastructure.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로