$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for importing and exporting data between an object oriented computing environment and an external comp 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/44
  • G06F-015/16
출원번호 US-0009592 (1993-01-26)
발명자 / 주소
  • Mitchell Herman (Lithonia GA) Rich William L. (Charlotte NC) Shackelford Floyd W. (Beauford GA)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 149  인용 특허 : 0

초록

A system and method for importing and exporting data between an object oriented computing environment and an external computing environment encapsulates the validation, conversion, and update control mechanisms for objects in metadata about the objects. Metadata logic operates identically on a varie

대표청구항

A system for importing and exporting data between an external computing environment operating on one or more computer platforms and an object oriented computing environment operating on one or more computing platforms, said data importing and exporting system comprising: datalist generating means fo

이 특허를 인용한 특허 (149)

  1. Brown, William B.; Grubbs, Mark Allen; McBrearty, Gerald Francis; Zheng, Wu, Apparatus and method of exporting file systems without first mounting the file systems.
  2. Ponte, Jay Michael, Automatic index term augmentation in document retrieval.
  3. Muhlestein, Mark, Backup and restore for heterogeneous file server environment.
  4. Kobayashi, Yoshifumi, Batch processing apparatus.
  5. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; White Steve R. ; Yu Philip Shi-Lung ; Palmer Charles Campbell, Collaborative server processing of content and meta-information with application to virus checking in a server network.
  6. Reed Drummond Shattuck ; Heyman Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Communications system for transferring information between memories according to processes transferred with the information.
  7. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  8. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  9. Bussler,Chris; Bodamer,Roger, Coordinated collaboration system in an integration platform.
  10. Brodersen,Robert; Coyle,Mark; Tulac,Sanjin, Data adapter.
  11. Blount, Harry; Shanahan, Travis; Clark, James; Guido, Dana, Data augmentation based on second-phase metadata.
  12. Saffer, Jeffrey D.; Calaprist, Augustin J.; Chen, Guang; Crow, Vernon L.; McCall, Jonathon D.; Miller, Nancy E.; Monroe, Philip J.; Nowell, Lucille T.; Payne, Deborah A.; Scarberry, Randall E.; Still, Data import system for data analysis system.
  13. Dieter Gawlick ; Samuel Defazio ; Pankaj Tandon, Database having an integrated transformation engine using pickling and unpickling of data.
  14. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  15. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  16. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  17. Dewey Douglas William (Tucson AZ) Doumas William Mark (Tucson AZ), Dynamic Meta commands for peripheral devices.
  18. Anderson, Jeffrey R.; Healy, John A.; Honeyman, John W.; Munson, Ryan A., Entity agent.
  19. Munson, Ryan A.; Anderson, Jeffrey R.; Healy, John A.; Honeyman, Josh W., Entity projection.
  20. Finn, Peter G.; Hamilton, II, Rick A.; Katz, Neil A.; Seaman, James W., Externalizing virtual object tags relating to virtual objects.
  21. Finn, Peter G.; Hamilton, II, Rick A.; Katz, Neil A.; Seaman, James W., Externalizing virtual object tags relating to virtual objects.
  22. Maier, Andreas; Reichert, Wolfgang; Brush, David; Kapernick, John; Lalovic, Milos; Nettles, William B., File tagging and automatic conversion of data or files.
  23. Christensen Steve W. ; Dasher John M. ; Martherus Robin E., File wrapper containing cataloging information for content searching across multiple platforms.
  24. Hoang Phu T. ; Kiernan John F., Hard drive upgrade system.
  25. Hunt,Galen C., Heavyweight and lightweight instrumentation.
  26. Hunt,Galen C., Heavyweight and lightweight instrumentation.
  27. Ponte, Jay, Hybrid category mapping for on-line query tool.
  28. Black Norman R. H. ; Rothschild Jeffrey J., Latency server and matchmaker.
  29. Black Norman R. H. ; Rothschild Jeffrey J., Latency server and matchmaker.
  30. Dovich Ronald J. ; Eppele Peter J., Metadata-driven data presentation module for database system.
  31. Cohen, Marc L.; Cooper, Michael R.; Nogay, Patrick Edward; Vanderwiele, Mark Wayne, Method and apparatus for compacting a metadatas stream in a data processing system.
  32. Cooper Michael R. ; Hamzy Mark Joseph ; Nogay Patrick Edward ; Vanderwiele Mark Wayne, Method and apparatus for creating metadata streams with embedded device information.
  33. Bhalchandra Ghatate, Method and apparatus for managing functions.
  34. Ghatate, Bhalchandra, Method and apparatus for managing functions.
  35. Samuel Daniel Joseph ; Wolf Michael Andrew ; Clark Donald Peregrine, Method and apparatus for match making.
  36. Williams Dale L. ; Peterson Michael E., Method and apparatus for rationalizing different data formats in a data management system.
  37. Cohen, Marc L.; Cooper, Michael R.; Nogay, Patrick Edward; Vanderwiele, Mark Wayne, Method and apparatus in a data processing system for generating metadata streams with per page data.
  38. Marc L. Cohen ; Michael R. Cooper ; Patrick Edward Nogay ; Mark Wayne Vanderwiele, Method and apparatus in a data processing system for generating metadata streams with per page data.
  39. Kilgore, William Bruce; Kearns, Daniel, Method and code generator for integrating different enterprise business applications.
  40. Chow ChungHen, Method and system for object oriented notification.
  41. Fischer,Jeffrey Michael; Coyle,Mark, Method and system for using integration objects with enterprise business applications.
  42. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  43. Reisman, Richard R., Method for distributing content to a user station.
  44. Reisman, Richard R., Method for distributing content to a user station.
  45. Reisman, Richard R., Method for distributing content to a user station.
  46. Puri, Arvind Nath; Hom, Matthew; Subramanian, Ashok; Rajan, Sundera; Kumar, Palnisamy Murali Senthil, Method for loosely coupling object oriented and non-object oriented applications in a messaging-based communication infrastructure.
  47. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  48. Tan, Hee Beng Kuan, Method for using a data flow net to specify and assemble computer software.
  49. Chadwick,Henry Dexter, Method, system and program product for extracting essence from a multimedia file received in a first format, creating a metadata file in a second file format and using a unique identifier assigned to.
  50. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  51. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  52. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  53. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  54. Reisman, Richard R., Methods for transacting electronic commerce.
  55. Yarnall, David; Babcock, Donald K., Modularized data retrieval method and apparatus with multiple source capability.
  56. Grimm Steven Michael ; Rothschild Jeffrey Jackiel ; Samuel Daniel Joseph ; Wolf Michael Andrew, Network match maker.
  57. Steven Michael Grimm ; Jeffrey Jackiel Rothschild ; Daniel Joseph Samuel ; Michael Andrew Wolf, Network match maker.
  58. Grimm Stephen M. ; Rothschild Jeffrey J. ; Samuel Daniel J. ; Wolf Michael A., Network match maker matching requesters based on communication attribute between the requesters.
  59. Bryce Allen Curtis ; Jimmy M. D. Hsu, Objects oriented programming system with objects for storing compressed data files and self-extracting the data files.
  60. Campbell R. David L., On-line database updating network system and method.
  61. Campbell R. David L. (Stamford CT), On-line database updating network system and method.
  62. R. David L. Campbell, On-line database updating network system and method.
  63. Govindarajan,Rajagopalan; Krishnamurthy,Viswanathan; Nori,Anil, Opaque types.
  64. Ponte, Jay Michael, Page aggregation for web sites.
  65. Davis, Don W.; Gerlek, Michael P.; Cunningham, Ryan, Programmatic data discovery platforms for computing applications.
  66. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  67. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  68. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  69. Bussler,Chris; Bodamer,Roger, Role based integrated platform.
  70. Ponte, Jay Michael, Semi-automatic index term augmentation in document retrieval.
  71. Ponte, Jay Michael, Semi-automatic index term augmentation in document retrieval.
  72. Ponte,Jay Michael, Semi-automatic index term augmentation in document retrieval.
  73. Brealey, Christopher Lawrence; Mostafia, Zina, Separate encapsulation of communication operations in computer algorithms.
  74. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  75. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  76. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  77. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  78. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  79. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  80. Reisman, Richard R., Software distribution over a network.
  81. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  82. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  83. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  84. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  85. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  86. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  87. Gabriel Velasco, System and method for automatically synchronizing different classes of databases utilizing a repository database.
  88. Blazejewski, Edward; Angle, Thomas, System and method for delivering results of a search query in an information management system.
  89. Blazejewski, Edward; Angle, Thomas, System and method for delivering results of a search query in an information management system.
  90. Eisner, Mark; Oancea, Gabriel, System and method for exchanging information among exchange applications.
  91. Eisner, Mark; Oancea, Gabriel, System and method for exchanging information among exchange applications.
  92. Eisner, Mark; Oancea, Gabriel, System and method for exchanging information among exchange applications.
  93. Eisner, Mark; Oancea, Gabriel, System and method for exchanging information among exchange applications.
  94. Eisner, Mark; Oancea, Gabriel, System and method for exchanging information among exchange applications.
  95. Heenehan, Jaime W., System and method for importing data.
  96. Suda, Aruna Rohra; Jeyachandran, Suresh; Joseph, Prem Anand, System and method for saving browsed data.
  97. Finn, Peter G.; Hamilton, II, Rick A.; Katz, Neil A.; Seaman, James W., System and method for tagging objects for heterogeneous searches.
  98. Bowman Amuah,Michel K., System and method for transaction services patterns in a netcentric environment.
  99. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  100. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  101. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  102. Ellis Darin,CAX ; Doyle Michael,CAX, System for transforming and exchanging data between distributed heterogeneous computer systems.
  103. Reisman Richard R., System for transporting information objects between a user station and multiple remote sources based upon user modifiable object manifest stored in the user station.
  104. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  105. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  106. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  107. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  108. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  109. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  110. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  111. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  112. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  113. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  114. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  115. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  116. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  117. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  118. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  119. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  120. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  121. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  122. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  123. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  124. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  125. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  126. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  127. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  128. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  129. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  130. Ponte, Jay; Getchius, Jeffrey; Koyfman, Lazar, Targeted banner advertisements.
  131. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  132. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  133. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  134. Chipalkatti, Renu; Getchius, Jeffrey; Ponte, Jay, Techniques for web site integration.
  135. Chipalkatti, Renu; Getchius, Jeffrey; Ponte, Jay, Techniques for web site integration.
  136. Chipalkatti, Renu; Getchius, Jeffrey; Ponte, Jay, Techniques for web site integration.
  137. Hunt, Galen C., Tools and techniques for instrumenting interfaces of units of a software program.
  138. Hunt,Galen C., Tools and techniques for instrumenting interfaces of units of a software program.
  139. Marmaros, David, Transferring data between applications.
  140. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  141. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  142. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  143. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  144. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  145. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  146. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  147. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  148. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  149. Ponte, Jay Michael, Use of generalized term frequency scores in information retrieval systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로