$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0593968 (1996-01-30)
발명자 / 주소
  • Dyer Landon M.
  • Welland Robert V.
출원인 / 주소
  • Wayfarer Communications, Inc.
대리인 / 주소
    Fenwick & West LLP
인용정보 피인용 횟수 : 195  인용 특허 : 0

초록

An object for use in a computer memory and for transmission between computers flexibly stores a large variety of different types of data, in such a manner as to allow easy and efficient transfer and copying of the data between computers. The object includes any number of data elements, each of which

대표청구항

[ We claim:] [1.] A computer readable memory having a plurality of contiguous storage locations and storing an object including:at least one data element each data element comprising:a) in at least one first storage location a type code defining a type of a data for the data element, the type being

이 특허를 인용한 특허 (195)

  1. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Pouyoul, Eric, Addressing message gates in a distributed computing environment.
  2. Nock, Clifton Malcolm; Smith, Christopher Robert, Apparatus and method for communicating between computer systems using active datastreams.
  3. Kenneth C. R. C. Arnold ; Ann M. Wollrath ; James H. Waldo, Apparatus and method for dynamically verifying information in a distributed system.
  4. O'Sullivan, Bryan; Scheifler, Robert; Jones, Peter C.; Wollrath, Ann M.; Arnold, Kenneth C. R. C.; Waldo, James H., Apparatus and method for providing downloadable code for use in communicating with a device in a distributed system.
  5. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric; Duigou,Michael J., Automatic lease renewal with message gates in a distributed computing environment.
  6. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M.; Duigou,Michael J., Bridging between a data representation language message-based distributed computing environment and other computing environments using proxy service.
  7. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Caching mechanism for a virtual heap.
  8. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Caching mechanism for a virtual heap.
  9. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Duigou, Michael J., Client-specified display services in a distributed computing environment.
  10. Guha, Ramanathan V., Contextual searching by determining intersections of search results.
  11. Nilsson, Michael E; Jebb, Timothy R, Data streaming system and method.
  12. Nilsson, Michael Erling; Jebb, Timothy Ralph, Data streaming system and method.
  13. Walker, Matthew D; Urzaiz, Eduardo, Data transmission.
  14. Yamada, Masazumi; Iketani, Akira; Usui, Akira; Kobayashi, Masaaki; Takeda, Hidetoshi, Data transmitter, data receiver, processor, equipment managing device, equipment managing system, data transmitting-receiving system, and medium.
  15. Bruso, Kelsey L.; Conner, Ralph W., Database management system and method for databases having large objects.
  16. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Database store for a virtual heap.
  17. Jones Peter C. ; Wollrath Ann M. ; Waldo James H. ; Arnold Kenneth C. R. C., Deferred reconstruction of objects and remote loading for event notification in a distributed system.
  18. Wollrath Ann M. ; Waldo James H. ; Arnold Kenneth C. R. C. ; Jones Peter C., Deferred reconstruction of objects and remote loading in a distributed system.
  19. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  20. Arnold, Kenneth C. R. C.; Waldo, James H.; Scheifler, Robert; Wollrath, Ann M., Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system.
  21. Kenneth C. R. C. Arnold ; James H. Waldo ; Robert Scheifler ; Ann M. Wollrath, Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system.
  22. Abdelaziz, Mohamed M.; Slaughter, Gregory L.; Traversat, Bernard A.; Saulpaugh, Thomas E., Dynamic displays in a distributed computing environment.
  23. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in a distributed system.
  24. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in a distributed system.
  25. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in distributed system.
  26. Clarke, James B., Dynamic provisioning for filtering and consolidating events.
  27. Clarke, James B.; Clark, Sean E., Dynamic provisioning of identification services in a distributed system.
  28. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Efficient construction of message endpoints.
  29. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Pouyoul, Eric, Event message endpoints in a distributed computing environment.
  30. Duffy, John Joseph; Detlefs, David; Magruder, Michael M., Finalizable object usage in software transactions.
  31. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Garbage collection using nursery regions for new objects in a virtual heap.
  32. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Garbage collector for a virtual heap.
  33. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Generating results gates in a distributed computing environment.
  34. Guha Ramanathan V., Hash-based system and method with primary and secondary hash functions for rapidly identifying the existence and location of an item in a file.
  35. Kennedy, Philip T.; Gerke, Joseph A.; Snyder, David M., High bandwidth data transport system.
  36. Kennedy, Philip T.; Gerke, Joseph A.; Snyder, David M.; Baych, Leslie D.; Melick, Bruce D.; Probst, Gregory P., High bandwidth data transport system.
  37. Kennedy, Philip T.; Gerke, Joseph A.; Snyder, David M.; Stanford, Jon G.; Song, Xuejie; Probst, Gregory P., High bandwidth data transport system.
  38. Kennedy, Philip T.; Gerke, Joseph A.; Snyder, David M.; Stanford, Jon G.; Song, Xuejie; Probst, Gregory P., High bandwidth data transport system.
  39. James H. Waldo ; John W. F. McClain, Lease renewal service.
  40. Waldo James H. ; McClain John W. F., Lease renewal service.
  41. Murphy, Brian T.; Scheifler, Robert W., Lookup discovery service in a distributed system having a plurality of lookup services each with associated characteristics and services.
  42. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Duigou,Michael J., Mechanism and apparatus for URI-addressable repositories of service advertisements and other content in a distributed computing environment.
  43. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for accessing and addressing services in a distributed computing environment.
  44. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for returning results of services in a distributed computing environment.
  45. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for security of newly spawned repository spaces in a distributed computing environment.
  46. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J., Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment.
  47. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for web-based searching of URI-addressable repositories in a distributed computing environment.
  48. Traversat, Bernard A.; Saulpaugh, Thomas E.; Duigou, Michael J.; Slaughter, Gregory L., Message authentication using message gates in a distributed computing environment.
  49. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Pouyoul, Eric, Message conductors in a distributed computing environment.
  50. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Message gates in a distributed computing environment.
  51. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Message gates using a shared transport in a distributed computing environment.
  52. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Duigou, Michael J., Message-based leasing of resources in a distributed computing environment.
  53. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Messaging system using pairs of message gates in a distributed computing environment.
  54. Nguyen Cuong The ; Miriyala Srinivas ; Starkweather James Alan, Method and apparatus for constructing a device management information base in a network management station.
  55. Caron, Ilan Gabriel, Method and apparatus for creating, sending, and using self-descriptive objects as messages over a message queuing network.
  56. Caron, Ilan Gabriel, Method and apparatus for creating, sending, and using self-descriptive objects as messages over a message queuing network.
  57. Caron, Ilan Gabriel, Method and apparatus for creating, sending, and using self-descriptive objects as messages over a message queuing network.
  58. Caron, Ilan Gabriel, Method and apparatus for creating, sending, and using self-descriptive objects as messages over a message queuing network.
  59. Wollrath, Ann M.; Jones, Peter C., Method and apparatus for determining status of remote objects in a distributed system.
  60. Arnold,Kenneth C. R. C.; Waldo,James H.; Wollrath,Ann M.; Jones,Peter C., Method and apparatus for dynamic distributed computing over a network.
  61. Kenneth C. R. C. Arnold ; James H. Waldo ; Ann M. Wollrath ; Peter C. Jones, Method and apparatus for dynamic distributed computing over a network.
  62. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Duigou,Michael J., Method and apparatus for obtaining space advertisements.
  63. Duigou,Michael J.; Abdelaziz,Mohamed M.; Traversat,Bernard A.; Saulpaugh,Thomas E.; Slaughter,Gregory L., Method and apparatus for proximity discovery of services.
  64. Wollrath Ann M. ; Arnold Kenneth C. R. C., Method and apparatus for the suspension and continuation of remote processes.
  65. Ann M. Wollrath ; James H. Waldo ; Peter C. Jones ; Kenneth C.R.C. Arnold, Method and apparatus for transporting behavior in an event-based distributed system.
  66. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Abdelaziz, Mohamed M.; Traversat, Bernard A., Method and apparatus to discover services and negotiate capabilities.
  67. Saulpaugh, Thomas E.; Slaughter, Gregory L., Method and apparatus to discover services using flexible search criteria.
  68. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Abdelaziz,Mohamed M.; Traversat,Bernard A., Method and apparatus to obtain negotiated service advertisement.
  69. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Abdelaziz, Mohamed M.; Traversat, Bernard A., Method and apparatus to obtain service capability credentials.
  70. Jones, Peter C.; Wollrath, Ann M.; Scheifler, Robert W., Method and system for deterministic hashes to identify remote methods.
  71. Jones, Peter C.; Wollrath, Ann M.; Scheifler, Robert W., Method and system for dynamic proxy classes.
  72. Scheifler, Robert W.; Waldo, James H.; Jones, Peter C., Method and system for establishing trust in downloaded proxy code.
  73. Thompson, Jeffrey B., Method and system for extendable class-based shared data-types.
  74. Scheifler, Robert W.; Wollrath, Ann M.; Waldo, James H., Method and system for facilitating access to a lookup service.
  75. Scheifler, Robert W.; Arnold, Kenneth C. R. C.; Waldo, James H., Method and system for in-place modifications in a database.
  76. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  77. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  78. Robert W. Scheifler ; Kenneth C. R. C. Arnold ; James H. Waldo, Method and system for multi-entry and multi-template matching in a database.
  79. Colley,Adrian E.; Jones,Peter C.; Schiefler,Robert W.; Warres,Michael P.; Wollrath,Ann M., Method and system for passing objects in a distributed system using serialization contexts.
  80. Scheifler, Robert W.; Arnold, Kenneth C.R.C.; Waldo, James H., Method and system for typesafe attribute matching.
  81. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method for communications using a communication protocol.
  82. Funk, Conley Jack, Method for determining and protecting proprietary source code using mnemonic identifiers.
  83. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method for routing data packets using an IP address based on geo position.
  84. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method for routing data packets using an IP address based on geo position.
  85. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method for routing data packets using an IP address based on geo position.
  86. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  87. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method of transmitting data including a structured linear database.
  88. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method of transmitting data including a structured linear database.
  89. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method of transmitting data including a structured linear database.
  90. Melick, Bruce D.; Snyder, David M.; Baych, Leslie D., Method of transmitting data including a structured linear database.
  91. Waldo James H. ; Wollrath Ann M. ; Scheifler Robert, Method, apparatus, and product for leasing of delegation certificates in a distributed system.
  92. James H. Waldo ; Ann M. Wollrath ; Robert Scheifler ; Kenneth C. R. C. Arnold, Method, apparatus, and product for leasing of group membership in a distributed system.
  93. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Method, apparatus, and product for leasing of group membership in a distributed system.
  94. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Method, apparatus, and product for leasing of group membership in a distributed system.
  95. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  96. Ann M. Wollrath ; Peter C. Jones, Methods and apparatus for remote method invocation.
  97. Waldo James H. ; Wollrath Ann M. ; Scheifler Robert ; Arnold Kenneth C. R. C., Methods and systems for distributed failure detection and recovery using leasing.
  98. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Methods and systems for distributed failure detection and recovery using leasing techniques.
  99. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  100. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  101. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  102. Wollrath Ann M. ; Waldo James H. ; Riggs Roger, Methods, apparatus, and product for distributed garbage collection.
  103. Wollrath Ann M. ; Waldo James H. ; Riggs Roger, Methods, apparatus, and product for distributed garbage collection.
  104. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, Methods, apparatus, and product for distributed garbage collection.
  105. Wollrath, Ann W.; Waldo, James H.; Riggs, Roger, Methods, apparatus, and product for distributed garbage collection.
  106. Wollrath,Ann M.; Waldo,James H.; Riggs,Roger, Methods, apparatus, and product for distributed garbage collection.
  107. Bostian, Joseph A., Methods, systems, and computer program products for accessing a multi-format data object.
  108. Bostian, Joseph A.; Larsson, Christopher B., Methods, systems, and computer program products for automatic parsing of markup language documents.
  109. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Migrating processes using data representation language representations of the processes in a distributed computing environment.
  110. Waldo, James H.; McClain, John W. F., Network proxy.
  111. Halstead, Mark A. B., Persistent representations for complex data structures as interpreted programs.
  112. Halstead,Mark A B, Persistent representations for complex data structures as interpreted programs.
  113. Kenneth Arnold ; James H. Waldo, Polymorphic token based control.
  114. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Duigou, Michael J., Pre-generated message endpoints.
  115. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Process persistence in a virtual machine.
  116. Dresselhaus,Albert; Wegener,Reinhold, Program coupling method.
  117. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Remote function invocation with messaging in a distributed computing environment.
  118. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Duigou,Michael J., Remote method invocation with secure messaging in a distributed computing environment.
  119. Wollrath, Ann M.; Jones, Peter C.; Waldo, James H.; Scheifler, Robert W., Remote object activation in a distributed system.
  120. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, SYSTEM AND METHOD FOR FACILITATING DYNAMIC LOADING OF “STUB” INFORMATION TO ENABLE A PROGRAM OPERATING IN ONE ADDRESS SPACE TO INVOKE PROCESSING OF A REMOTE METHOD OR PROCEDURE IN ANOTHER ADDRESS S.
  121. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Secure access of objects generated from data representation language representations of the objects in a distributed computing environment.
  122. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  123. King, Kevin D., Software-based methodology for the storage and retrieval of diverse information.
  124. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Spawning new repository spaces using information provided in advertisement schema messages.
  125. Robert W. Scheifler ; Li Gong, Stack based access control using code and executor identifiers.
  126. Scheifler, Robert W.; Gong, Li, Stack-based access control using code and executor identifiers.
  127. Scheifler Robert W., Stack-based system and method to combine security requirements of methods.
  128. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  129. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  130. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  131. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  132. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  133. Schreiber,Robert Walter, System and method for caching a network connection.
  134. Schreiber, Robert Walter, System and method for enabling multi-indexing of objects.
  135. Schreiber, Robert Walter, System and method for enabling statistical matching.
  136. Schreiber, Robert Walter, System and method for enabling unified access to multiple types of data.
  137. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space.
  138. Wollrath,Ann M.; Waldo,James H.; Riggs,Roger, System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another space.
  139. Schreiber, Robert Walter, System and method for managing hierarchical objects.
  140. Schreiber, Robert Walter, System and method for managing hierarchical objects.
  141. Bulusu Krishna Mohan ; Mahapatro Neelamadhaba, System and method for manipulating a categorized data set.
  142. Guha Ramanathan V., System and method for rapidly identifying the existence and location of an item in a file.
  143. Guha, Ramanathan V., System and method for rapidly identifying the existence and location of an item in a file.
  144. Schreiber, Robert Walter, System and method for searching extended regular expressions.
  145. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., System and method for secure message-based leasing of resources in a distributed computing environment.
  146. Schreiber,Robert Walter, System and method for storing conceptual information.
  147. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  148. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  149. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  150. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  151. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  152. Reedy, Dennis G.; Mitchell, Larry J., Systems and methods for providing dynamic quality of service for a distributed system.
  153. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  154. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  155. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  156. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  157. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  158. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  159. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  160. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  161. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  162. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  163. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  164. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  165. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  166. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  167. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  168. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  169. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  170. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  171. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  172. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  173. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  174. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  175. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  176. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  177. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  178. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  179. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  180. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Duigou,Michael J.; Abdelaziz,Mohamed M., Transformation of objects between a computer programming language and a data representation language.
  181. Walker, Matthew D; Jacobs, Richard J; Nilsson, Michael E, Transmitting and receiving real-time data.
  182. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  183. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  184. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  185. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  186. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Traversat, Bernard A.; Pouyoul, Eric, Trusted construction of message endpoints in a distributed computing environment.
  187. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  188. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  189. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  190. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  191. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  192. Kennedy, Philip T.; Gerke, Joseph A.; Snyder, David M.; Baych, Leslie D.; Melick, Bruce D., Ultra wideband radio frequency identification system, method, and apparatus.
  193. Kennedy, Philip T.; Gerke, Joseph A.; Snyder, David M.; Baych, Leslie D.; Melick, Bruce D., Ultra wideband radio frequency identification system, method, and apparatus.
  194. Hudis, Irena; Boshier, Alan Geoffrey; Novik, Lev; Wu, Yunxin, Uniform transfer of data independent of the transfer mechanism.
  195. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Virtual heap for a virtual machine.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로