$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for controlling access to data entities in a computer network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0516573 (1995-08-18)
발명자 / 주소
  • Brown Ross M.
  • Greenberg Richard G.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Leydig, Voit & Mayer, Ltd.
인용정보 피인용 횟수 : 576  인용 특허 : 73

초록

Access rights of users of a computer network with respect to data entities are specified by a relational database stored on one or more security servers. Application servers on the network that provide user access to the data entities generate queries to the relational database in order to obtain ac

대표청구항

[ What is claimed is:] [1.] A method for controlling user access to a plurality of data entities in a computer network, said plurality of data entities stored on a plurality of application servers, said method comprising the steps of:sending an access rights query from an application server to a sec

이 특허에 인용된 특허 (73)

  1. Stein Scott A. (Phoenix AZ) Carlson Bruce M. (Phoenix AZ) Yen Chung S. (Bedford MA) Farrington Kevin M. (Williamsville NY), Ally mechanism for interconnecting non-distributed computing environment (DCE) and DCE systems to operate in a network s.
  2. DiChiara Joseph G. (Burlington MA) Brown Harry W. (East Weymouth MA) Valentine Joseph M. (Framingham MA), Apparatus and method for preventing computer access by unauthorized personnel.
  3. Skeen Marion D. (3826 Magnolia Dr. Palo Alto CA 94306) Bowles Mark (30 Tripp Ct. Woodside CA 94062), Apparatus and method for providing decoupling of data exchange details for providing high performance communication betw.
  4. Dao Son K. (Northridge CA) Ebeid Nader (Westlake Village CA), Apparatus and method for providing users with transparent integrated access to heterogeneous database management systems.
  5. Andrade Juan M. (Chatham NJ) Carges Mark T. (New Providence NJ) Felts Stephen D. (Rockaway NJ), Apparatus and methods for performing an application-defined operation on data as part of a system-defined operation on t.
  6. Shachnai Hadas (Somers NY) Wolf Joel L. (Goldens Bridge NY) Yu Philip S. (Chappaqua NY), Baton passing optimization scheme for load balancing/configuration planning in a video-on-demand computer system.
  7. Pitkin Richard P. (Lowell MA) Morency John P. (Chelmsford MA), Broker for computer network server selection.
  8. Russell Edward A. (Acton MA) Tang Raymond Ting-Foo (Chelmsford MA), Client/server connection sharing.
  9. Hodges Clark Douglas (Redmond WA) Williams Antony S. (Redmond WA) Posch Johann (Mercer Island WA), Concurrency management component for use by a computer program during the transfer of a message.
  10. Lim Alexander I. (Brentwood TN) DeVos Richard (Murfreesboro TN) Scott Jeffrey B. (Antioch TN), Condensing unit using cross-flow blower.
  11. Pag Peter (Darmstadt DEX) Warns Ruediger (Alsbach DEX) Kennedy Terence G. (Darmstadt DEX) Ejtemai-Jandaghi Omid (Darmstadt DEX), Cooperative processing interface and communication broker for heterogeneous computing environments.
  12. Cohen Amy S. C. (Silver Spring MD) Gleason Christopher F. (Gaithersburg MD) Hyatt Donald R. (Silver Spring MD) Moran Michael E. (Woodstock NY) Stevens Jeffrey N. (Gaithersburg MD) Wecker Alan J. (Hai, Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedi.
  13. Beard Marian H. (Sunnyvale CA) Caro Perry A. (Palo Alto CA) Hsiao Jennifer B. (San Jose CA) Mackey Kevin J. (Palo Alto CA) Sandman ; Jr. James G. (Palo Alto CA) Steinbach Gary R. (Mountain View CA) W, Data processor having a user interface display with metaphoric objects.
  14. Kobayashi Seiichi (Kodaira JPX), Data recovery system and method of distributed transaction processing system.
  15. Baxter ; II Ward (Carlisle MA) Clancy Gerald F. (Saratoga CA) Gruner Ronald H. (Cary NC) Mundie Craig J. (Cary NC) Bachman Brett L. (Boston MA) Redfield Stephen R. (San Jose CA) Coder William N. (Ral, Digital data processing system.
  16. Johnson Donavon W. (Georgetown TX) Shaheen-Gouda Amal A. (Austin TX) Smith Todd A. (Austin TX), Directory cache management in a distributed data processing system.
  17. Lamping John O. (Los Altos CA) Rao Ramana B. (San Francisco CA), Displaying node-link structure with region of greater spacings and peripheral branches.
  18. Miller Steven P. (Newton MA) Lampson Butler W. (Cambridge MA), Distributed configuration profile for computing system.
  19. Belove Edward (Cambridge MA) Culbert James A. (Lynnfield MA) Johnson R. Patrick (Manchester MA) Heath David M. (Nashua NH) Kraley Michael F. (Lexington MA) Mndez Deborah (Malden MA) Pant Sangam (Winc, Distributed, intermittently connected, object-oriented database and management system.
  20. Johnson ; Jr. David B. (Wakefield MA) Chasse Dennis W. (Litchfield NH) Kwan Tommy W. (Billerica MA), Distribution of communications connections over multiple service access points by choosing remote and local access point.
  21. Kandasamy David R. (San Ramon CA) Butler Mitchel B. (Sunnyvale CA) Foss Andrew L. (Yarrow Point WA) Peterson Bradley M. (Los Altos CA) Patwardhan Chintamani M. (Sunnyvale CA) Ribble Michael T. (Los G, Fault tolerant NFS server system and mirroring protocol.
  22. Major Drew (Orem UT) Powell Kyle (Orem UT) Neibaur Dale (Orem UT), Fault tolerant computer system.
  23. Hemphill John M. (Spring TX) Stewart Gregory Mart (Houston TX) Lawler Thomas S. (Houston TX), Fault tolerant multiple network servers.
  24. Cohen-Levy Leon (New York NY), File directory structure generator and retrevial tool with document locator module mapping the directory structure of fi.
  25. Akizawa Mitsuru (Hachioji JPX) Yamashita Hirofumi (Yokohama JPX) Kawaguchi Hisamitsu (Sagamihara JPX) Tada Katsumi (Yokohama JPX) Kato Kanji (Yokohama JPX) Kito Akira (Ebina JPX) Yamada Hidenori (Had, File server system and file access control method of the same.
  26. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  27. Yasrebi Mehrad (Scarborough CAX), High performance machine for switched communications in a heterogeneous data processing network gateway.
  28. Yasrebi Mehrad (Scarborough CAX), High performance machine for switched communications in a heterogeneous data processing network gateway.
  29. Wagner Richard J. (West St. Paul MN) Melberg Robert A. (Bloomington MN), Integrating I/O element.
  30. Shavit Eyal (New York NY) Teichner Lester (Chicago IL), Interactive market management system.
  31. Siefert David M. (Englewood OH), Launching computer program upon download of data created by program.
  32. Gopal Gita (Wayne NJ) Wuu Sze-Ying (Branchburg NJ), Linking system and method for accessing directory information about an object in one context when information in another.
  33. Dan Asit (West Harrison NY) Sitaram Dinkar (Yorktown Heights NY), Load balancing in video-on-demand servers by allocating buffer to streams with successively larger buffer requirements u.
  34. Baratz Alan E. (Chappaqua NY) Gopal Inder S. (Fort Lee NJ) Gray James P. (Chapel Hill NC) Grover George A. (Mahopac NY) Jaffe Jeffrey M. (Monsey NY) Lorrain Jean A. (Raleigh NC) Pollard Melinda R. (R, Locating resources in computer networks.
  35. Heath David M. (Nashua NH) Kraley Michael F. (Lexington MA) Pant Sangam (Winchester MA), Management facility for server entry and application utilization in a multi-node server configuration.
  36. Sudama Ram (Concord MA) Magid David L. (Worcester MA) Ouellette Kenneth W. (Groton MA), Mechanism for locating without search discrete application resources known by common name only in a distributed network.
  37. Tan Kwang G. (Poughkeepsie NY), Memory configuration, address interleaving, relocation and access control system.
  38. Hayden Peter C. (Mont Vernon NH), Method and apparatus for detecting and executing cross-domain calls in a computer system.
  39. Jennings Kevin F. (Novi MI), Method and apparatus for efficiently interfacing variable width data streams to a fixed width memory.
  40. Hann J. David (Vienna VA) Holdahl Theodore S. (Bethesda MD) Lum James C. P. (Herndon VA), Method and apparatus for enhancing security of communications in a packet-switched data communications system.
  41. Attanasio Clement R. (Peekskill NY) Smith Stephen E. (Mahopac NY), Method and apparatus for making a cluster of computers appear as a single host on a network.
  42. Prasad Ranjan (Sandy UT) Olds Dale R. (Sandy UT), Method and apparatus for moving subtrees in a distributed network directory.
  43. Davidson Thomas J. (Austin TX) Kelley Michael T. (Austin TX), Method and system for implementing remote procedure calls in a distributed computer system.
  44. Meske ; Jr. Carl F. (San Jose CA) Hooper Philip J. (Santa Clara CA) Opperman Mark R. (Palo Alto CA), Method for extracting profiles and topics from a first file written in a first markup language and generating files in d.
  45. Terry Douglas B. (San Carlos CA) Demers Alan J. (Boulder Creek CA) Petersen Karin (Menlo Park CA) Spreitzer Michael J. (Tracy CA) Theimer Marvin M. (Mountain View CA) Welch Brent B. (Mountain View CA, Method for providing session consistency guarantees.
  46. Daniell Thomas P. (Palo Alto CA) Harding ; Jr. Robert C. (Cupertino CA) Lewis Neil J. (Oakland CA) Nauckhoff Sven H. H. (San Jose CA), Method for the dynamic replication of data under distributed system control to control utilization of resources in a mul.
  47. Agrawal Rakesh (Chatham NJ) Ezzat Ahmed K. (New Providence NJ), Method of propagating resource information in a computer network.
  48. Shorter David U. (Lewisville TX) Kapernick John S. (Brewester NY), Method to provide concurrent execution of distributed application programs by a host computer and an intelligent work st.
  49. Ekrot Alexander C. (Humble TX) Singer James H. (Houston TX) Hemphill John M. (Spring TX) Autor Jeffrey S. (Houston TX) Galloway William C. (Houston TX) Alexander Dennis J. (Spring TX), Multi-server fault tolerance using in-band signalling.
  50. Nakamura Yasuo (Yokohama JPX), Network system having a gateway apparatus for momitoring a local area network.
  51. Nguyen Frank T. (Campbell CA), Object-oriented locator system.
  52. Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
  53. Daley Kathleen (Manassass VA), Operation support system for service creation and network provisioning for video dial tone networks.
  54. Ozur Mark C. (Redmond WA) Lenzmeier Charles T. (Bothwell WA) Miller Thomas J. (Bellevue WA), RPC based computer system using transparent callback and associated method.
  55. Filepp Robert (Springfield NJ) Gordon Michael L. (Dobbs Ferry NY) Bidwell Alexander W. (New York NY) Young Francis C. (Pearl River NY) Wolf Allan M. (Ridgefield CT) Meo Sam (New York NY) Tiemann Duan, Reception system for an interactive computer network and method of operation.
  56. Russell Edward A. (Acton MA) Tang Raymond T. (Chelmsford MA), Server for executing client operation calls, having a dispatcher, worker tasks, dispatcher shared memory area and worker.
  57. East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
  58. Devarakonda Murthy V. (Ossining NY) Kish William A. (Millerton NY) Mohindra Ajay (Tarrytown NY) Zlotek Anthony J. (Pleasant Valley NY), Simultaneous updates to the modification time attribute of a shared file in a cluster having a server and client nodes.
  59. Midgely Christopher W. (Framingham MA) Holland Charles (Northboro MA) Holberger Kenneth D. (Grafton MA), Stand-in Computer file server providing fast recovery from computer file server failures.
  60. Midgely Christopher W. (Framingham MA) Webb John W. (Sutton MA) Acott John L. (Westborough MA), Stand-in computer server.
  61. Li Anthony J. (Sunnyvale CA) Cole Bruce A. (Menlo Park CA), Standby router protocol.
  62. Wei Yi-Hsiu (Austin TX), System and method for calling selected service procedure remotely by utilizing conditional construct switch statement to.
  63. Shaheen Amal A. (Austin TX) Yellepeddy Krishna K. (Austin TX), System and method for maintaining replicated data coherency in a data processing system.
  64. Ault Michael B. (Austin TX) Plassmann Ernst R. (Pflugerville TX) Rich Bruce A. (Round Rock TX) Wilkes Michael D. (Austin TX), System and method for supporting file attributes on a distributed file system without native support therefor.
  65. Pettus Christopher E. (San Francisco CA), System for activating new service in client server network by reconfiguring the multilayer network protocol stack dynami.
  66. Dickinson Robert D. (Hayward CA), System for browsing a network resource book with tabs attached to pages.
  67. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  68. Kurihara Jun\ichi (Mitaka JPX) Hirosawa Toshio (Machida JPX) Shibamiya Minoru (Yokohama JPX), System for dynamically switching logical sessions between terminal device and a processor which stops its operation to a.
  69. Berteau C. Donals (Sebastian FL), System for managing network computer applications.
  70. Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
  71. Pytlik Bogdan (Lowell MA) O\Hara Abigail L. (Andover MA) LaValle Arthur R. (Chelmsford MA), System for updating local views from a global database using time stamps to determine when a change has occurred.
  72. Ankney Richard C. (Chantilly VA) Bonica Ronald P. (Falls Church VA) Kay Douglas E. (Chevy Chase MD) Pashayan Patricia A. (Herndon VA) Spitzer Roy L. (Vienna VA), Telecommunication access management system for a packet switching network.
  73. Judson David H. (6823 Northport Dallas TX 75230), Web browser with dynamic display of information objects during linking.

이 특허를 인용한 특허 (576)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Stephenson, John W.; Chusing, Trevett B., Access control and entitlement determination for hierarchically organized content.
  3. Tang,Puqi; Diep,Timothy; Hlasnik,Wayne, Access control management system utilizing network and application layer access control lists.
  4. Shannon Steven, Access control of networked data.
  5. Shenfield, Michael; Fritsch, Brindusa; Bibr, Viera, Access control system and method for wireless application provisioning.
  6. Shenfield, Michael; Fritsch, Laura Brindusa; Bibr, Viera, Access control system and method for wireless application provisioning.
  7. Trossen, Dirk; Mehta, Kuleen, Access right control using access control alerts.
  8. Trossen, Dirk; Mehta, Kuleen, Access right control using access control alerts.
  9. Cornelius, Richard D.; Stepniczka, Andreas; Chu, Kevin, Account settlement and financing in an e-commerce environment.
  10. Jeffrey Getchius ; Cary Scofield, Adaptive partitioning techniques in performing query requests and request routing.
  11. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  12. Osentoski, Dennis D., Adjusting results based on a drop point.
  13. Deen, Brian J.; Sanders, Henry L.; Soderberg, Joel M.; Van, Van C., Apparatus and computer-readable media for processing HTTP requests.
  14. Deen, Brian J.; Sanders, Henry L.; Soderberg, Joel M.; Van, Van C., Apparatus and computer-readable media for processing HTTP requests determine scoping mapping between a mapped resource name extension and a content type.
  15. Taranto, Edward James; Gauvin, William Joseph; Smith, Ursula; Sullivan, David J.; Lemaire, Louise, Apparatus and method for filtering downloaded network sites.
  16. Ben-Itzhak, Yuval, Application layer security method and system.
  17. Friedmann, Björn; Rehm, Werner; Föbel, Florian; Goldbach, Christian; Rinck, Matthias; Müller, Jochen; Hartig, Martin; Braemer, Achim, Application server runlevel framework.
  18. Ben Itzhak,Yuval, Application-layer security method and system.
  19. Carbone, Kenneth; Greenlee, Robert D.; Katchay, Marc A.; Morgan, Harry G.; Quillen, Scott A., Asynchronous data protocol.
  20. Bowman, Brian Payton; Boozer, John Forrest, Authorization caching in a multithreaded object server.
  21. Bowman, Brian Payton; Boozer, John Forrest, Authorization caching in a multithreaded object server.
  22. Ponte, Jay Michael, Automatic index term augmentation in document retrieval.
  23. Beckman, Brian C.; Andrews, Anthony D.; Armanasu, Alexander A., Automatic object caller chain with declarative impersonation and transitive trust.
  24. Brian C. Beckman ; Anthony D. Andrews ; Alexander A. Armanasu, Automatic object caller chain with declarative impersonation and transitive trust.
  25. Zhang, Hongqiang, Automatic test system for distributed comprehensive service and method thereof.
  26. Dhupelia, Shekhar V.; Datta, Glen Van; Fernandes, Brian; Kato, Eiko Erika; McCarroll, William, Balancing distribution of participants in a gaming environment.
  27. Moore, Richard G.; Mumsford, Gregory L.; Gunasekar, Duraisamy, Billing system for communications services involving telephony and instant communications.
  28. Wall, Larry Marvin; Buhlmann, Glen; Duncan, Nicholas; Roomp, Kristof, Caching based on access rights in connection with a content management server system or the like.
  29. Wall,Larry Marvin; Buhlmann,Glen; Duncan,Nicholas; Roomp,Kristof, Caching based on access rights in connection with a content management server system or the like.
  30. Moore, Richard G.; Mumford, Gregory L.; Gunasekar, Duraisamy, Call completion via instant communications client.
  31. Grimaud,Gilles; Hagimont,Daniel; Vandewalle,Jean Jacques, Capability-based access control for applications in particular co-operating applications in a chip card.
  32. Rao, Sunil K.; Rao, Raman K., Capturing and sharing images with mobile device users including for a limited duration of time.
  33. Patterson,Andrew John; Day,Hilton; Cameron,Nicola, Certification validation system.
  34. Patadia, Jalpesh, Client server conversion for representing hierarchical data structures.
  35. Hayes ; Jr. Kent Fillmore, Client--server system with central application management allowing an administrator to configure end user applications by executing them in the context of users and groups.
  36. Simonoff,Adam J.; Hebert, Jr.,Julian B., Collaborative environment implemented on a distributed computer network and software therefor.
  37. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  38. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  39. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  40. Dhupelia, Shekhar V.; Van Datta, Glen; Fernandes, Brian; Kato, Eiko Erika; McCarroll, William, Communication across multiple game applications.
  41. Moore, Richard G.; Mumford, Gregory L.; Gunasekar, Duraisamy, Communication converter for converting audio information/textual information to corresponding textual information/audio information.
  42. Moore, Richard G.; Mumsford, Gregory L.; Gunasekar, Duraisamy, Communication converter for converting audio information/textual information to corresponding textual information/audio information.
  43. Mimura, Atsuhiko; Kumagai, Naoko; Kotani, Hiroki, Communication device, communication system and method for managing access authority data.
  44. Murakami, Masahiko; Matsumoto, Yasuhide; Kihara, Hideto, Communication support method and system.
  45. Suzuki Gen,JPX ; Tanigawa Hiroya,JPX ; Nakase Atsuhito,JPX ; Ohkuvo Yoshinori,JPX ; Yamagata Takashi,JPX, Communication system and communication method.
  46. Moore, Richard G.; Mumsford, Gregory L.; Gunasekar, Duraisamy, Communications gateway with messaging communications interface.
  47. Marks, Daniel L, Communications system.
  48. Long, Joe Dennis, Compensating resource managers.
  49. Limprecht,Rodney T.; Helland,Patrick James; Agsen,Mohsen M., Component self-deactivation while client holds a returned reference.
  50. Andrews, Anthony D., Composable roles.
  51. Darago, Vincent S; Jenkins, Christopher, Computer architecture for managing courseware in a shared use operating environment.
  52. Boozer, John F.; Bowman, Brian P., Computer-implemented authorization systems and methods using associations.
  53. Rajkumar, Vijay; Stieber, Rhonda; Srinivasaraghavan, Ashok; Sundaramoorthy, Arun Kumar; Kekkar, Sanjay; Kodlyan, John; Patangey, Dayanand, Computer-implemented methods and systems for identifying and reporting deviations from standards and policies for contracts, agreements and other business documents.
  54. Brocklebank, John C., Computer-implemented system and method for web activity assessment.
  55. Brocklebank, John C., Computer-implemented system and method for web activity assessment.
  56. Brocklebank, John C., Computer-implemented system and method for web activity assessment.
  57. Troup, James, Configurable frame work for testing and analysis of client-side web browser page performance.
  58. Tien, Ian; Hulen, Corey; Lim, Chen-I, Consolidating data source queries for multidimensional scorecards.
  59. Shah, Baiju; Horner, Ryan, Content bank for objects.
  60. Shah, Baiju; Horner, Ryan, Content bank for objects.
  61. Shah,Baiju; Horner,Ryan C., Content bank for objects.
  62. Parupudi, Gopal; Evans, Stephen S.; Holtgrewe, Burdette J.; Reus, Edward F., Context aware systems and methods utilizing hierarchical tree structures.
  63. Shannon, Steven, Controlling client access to networked data based on content subject matter categorization.
  64. Dhupelia, Shekhar V.; Van Datta, Glen; Fernandes, Brian; Kato, Eiko Erika; McCarroll, William, Creating an interactive gaming environment.
  65. Hayler, Don L.; Vu, Daniel, Credential vault encryption.
  66. Niall G McGee GB, Data access control.
  67. Mizuno, Takafumi, Data processing apparatus, control method, and program.
  68. Vogel,Matthias; Drittler,Bernhard; Kupke,Markus, Data structure for access control.
  69. Brodersen, Karen; Rothwein, Thomas M.; Malden, Matthew S.; Chen, Mingte J.; Annadata, Anil, Database access method and system for user role defined access.
  70. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  71. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  72. Abou Mahmoud, Alaa; Bastide, Paul R.; Lu, Fang, Delegated updates.
  73. Medin, Jr., Milo S., Delivering multimedia services.
  74. Medin, Jr., Milo S., Delivering multimedia services.
  75. Corson, Greg, Delivery of digital content.
  76. Hoffberg, Steven M., Detection and alert of automobile braking event.
  77. Mimura, Atsuhiko; Kumagai, Naoko; Kotani, Hiroki, Device and method for controlling access to open and non-open network segments.
  78. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  79. Rowe, Richard E., Digital identification of unique game characteristics.
  80. Rowe,Richard E., Digital identification of unique game characteristics.
  81. Styles, Andrew G.; Phillips, Christian G., Direction-conscious information sharing.
  82. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  83. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen, Disabling and enabling transaction committal in transactional application components.
  84. Zhuk,Jeff (Yefim), Distributed active knowledge and process base allowing system elements to be shared within a collaborative framework.
  85. David S. Schneider ; Michael B. Ribet ; Laurence R. Lipstone ; Daniel Jensen, Distributed administration of access to information.
  86. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  87. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Distributed directory service using junction nodes for providing network users with an integrated hierarchical directory services.
  88. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  89. Patterson David M. ; Williams Eugene E., Distributed method of and system for maintaining application program security.
  90. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Distributive storage techniques for multi-tenant databases.
  91. Saito, Kazumi; Suzuki, Toshimitsu; Yashiro, Sadao; Muramoto, Takahide; Goto, Masatomo, Document management apparatus and document management program storage medium.
  92. Gross, Thomas; Lovatt, Brook M.; Moran, Anthony Scott; Schunter, Matthias, Dynamic access decision information module.
  93. Liesche, Stefan; Nauerz, Andreas; Schaeck, Jurgen, Dynamic context-sensitive integration of content into a web portal application.
  94. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  95. Rowe, Richard E., Dynamic player notices for operational changes in gaming machines.
  96. Rowe, Richard E., Dynamic player notices for operational changes in gaming machines.
  97. Levin, David; Christensen, Erik B.; Nog, Saurab; Box, Donald F.; Kaler, Christopher G.; Della-Libera, Giovanni M.; Lee, IV, Alfred; Wortendyke, David, Dynamic protocol construction.
  98. Levin,David; Christensen,Erik B.; Nog,Saurab; Box,Donald F.; Kaler,Christopher G.; Della Libera,Giovanni M.; Lee, IV,Alfred; Wortendyke,David, Dynamic protocol construction.
  99. Faitelson, Yakov; Korkus, Ohad; Bass, David; Kretzer-Katzir, Ophir, Enterprise level data management.
  100. Korkus, Ohad; Faitelson, Yakov; Kretzer-Katzir, Ophir; Bass, David, Enterprise level data management.
  101. Korkus, Ohad; Faitelson, Yakov; Kretzer-Katzir, Ophir; Bass, David, Enterprise level data management.
  102. Krishnamoorthy, Venkatanarayanan; Varadrajan, Srinivasan; Zucknovich, Stephen; Leisy, Jacques; Jornitski, Vladimir, Entitled data cache management.
  103. Krishnamoorthy, Venkatanarayanan; Varadrajan, Srinivasan; Zucknovich, Stephen; Leisy, Jacques; Jornitski, Vladimir, Entitled data cache management.
  104. Satish R. Thatte ; Richard D. Hill ; Jan S. Gray ; Gopal Krishna R. Kakivaya ; Craig H. Wittenberg ; James M. Lyon ; Rebecca A. Norlander ; Eric W. Johnson ; Scott G. Robinson, Environment extensibility and automatic services for component applications using contexts, policies and activators.
  105. Parupudi, Gopal; Evans, Stephen S.; Reus, Edward F., Environment-interactive context-aware devices and methods.
  106. McClintock, Jon Arron; Brezinski, Dominique Imjya; Sethi, Tushaar; Van Horenbeeck, Maarten, Event-based data path detection.
  107. Cockerille, Warner R.; Rowe, Richard E., Executing multiple applications and their variations in computing environments.
  108. Cockerille, Warner R.; Rowe, Richard E., Executing multiple applications and their variations in computing environments.
  109. Agrawal,Rakesh; Bird,Paul Miller; Grandison,Tyrone W. A.; Kiernan,Gerald George; Logan,Scott Ian; Rjaibi,Walid, Extending relational database systems to automatically enforce privacy policies.
  110. Frank, Stefan; Manoharan, Rani, Facilitating role-based sharing of content segments.
  111. Owen, James; Smith, Gregory P.; McCauley, Rodney; Toussaint, Alexandre; Conti, Joseph; Patadia, Jalpesh, Federated management of content repositories.
  112. Owen,James; Smith,Gregory; McCauley,Rodney; Toussaint,Alexander; Conti,Joseph; Patadia,Jalpesh, Federated management of content repositories.
  113. Saegusa, Takuya, Fiber channel connection magnetic disk device and fiber channel connection magnetic disk controller.
  114. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  115. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  116. Hoffberg, Steven M., Game theoretic prioritization system and method.
  117. Rowe, Richard E., Gaming terminal data repository and information distribution system.
  118. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  119. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  120. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  121. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  122. Holden, Arthur L., Genetic profiling and banking system and method.
  123. Holden, Arthur L., Genetic profiling and banking system and method.
  124. Holden, Arthur L., Genetic profiling and banking system and method.
  125. Holden, Arthur L., Genetic profiling and banking system and method.
  126. O'Donnell,William; Wilks,Daniel, Granting access rights to unattended software.
  127. Malik,Dale W., Group access management system.
  128. Marks, Daniel L., Group communications multiplexing system.
  129. Tien, Ian; Blood, Robert Alan; Hulen, Corey; Lim, Chen-I, Grouping and display of logically defined reports.
  130. Sposetti, Jeffrey Thomas; Greysman, Lev, Groupware portlets for integrating a portal with groupware systems.
  131. Rao, Sunil K.; Rao, Rekha K.; Rao, Raman K., Image and augmented reality based networks using mobile devices and intelligent electronic glasses.
  132. Rao, Sunil K.; Rao, Raman K., Image networks for mobile communication.
  133. Rao, Sunil K.; Rao, Raman K., Image networks for mobile communication.
  134. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, Improving a multi-tenant database query using contextual knowledge about tenant data.
  135. Watanabe, Yasuo; Kodama, Shoji, Information apparatus.
  136. Imamichi, Takahiro, Information processing apparatus, information processing method, and function expansion program.
  137. Nakamura,Ikuo, Information processing apparatus, method thereof, network system, record medium, and program.
  138. Ebata, Jun, Information processing apparatus, operation permission generating method, operation permission generation determining method, operation permission generating program product and computer-readable recording medium, and generation permission determining program product and computer-readable recording medium.
  139. Katsumi Tada JP; Kazuhiro Hashimoto JP; Shigeru Kameda JP; Noriyuki Yamasaki JP; Akio Azuma JP, Information registration method and document information processing apparatus.
  140. Tada Katsumi,JPX ; Hashimoto Kazuhiro,JPX ; Kameda Shigeru,JPX ; Yamasaki Noriyuki,JPX ; Azuma Akio,JPX, Information registration method and document information processing apparatus.
  141. Tada Katsumi,JPX ; Hashimoto Kazuhiro,JPX ; Kameda Shigeru,JPX ; Yamasaki Noriyuki,JPX ; Azuma Akio,JPX, Information registration method and document information processing apparatus.
  142. Matsui,Kazuki; Sugano,Hiroyasu; Mitsuoka,Madoka, Information service system, information service participation management apparatus, information service providing apparatus, and recording medium.
  143. Aoike,Kunio; Kogami,Hideki; Kuniyoshi,Yoshio; Yoshino,Eiji, Information-display system, an information-display method, an information-display server, and an information-display program.
  144. Cornelius,Richard D.; Stepniczka,Andreas; Chu,Kevin, Initiating an agreement in an e-commerce environment.
  145. Choy David M., Integrated method and system for controlling information access and distribution.
  146. Pandrangi, Phani; Lossos, Michael; Hayler, Don L.; Vu, Daniel; Adjie-Winoto, William, Interstitial pages.
  147. Schlimmer, Jeffrey C.; Levin, David; Lee, IV, Alfred; Christensen, Erik B.; Lovering, Bradford H., Invalid policy detection.
  148. Leeds, Robert G., Junk electronic mail detector and eliminator.
  149. Leeds, Robert G., Junk electronic mail detector and eliminator.
  150. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Russell, Wilfred G.; Gray, Jan Stephen, Just-in-time activation and as-soon-as-possible deactivation or server application components.
  151. Rettig,Bjorn C.; Guo,Yong; Pournasseh,Houman, Language or script-based character set conversions per-application program.
  152. Swift Michael M., Least privilege via restricted tokens.
  153. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  154. Kijima, Shigeo, Login process apparatus, login process method, and program.
  155. Futty, Michael Edward, Management of class of service.
  156. Vogel,Matthias; Drittler,Bernhard; Kupke,Markus, Managing access control information.
  157. Kumar, Apurva; Laredo, Jim A.; Luan, Laura Z.; Mukherjea, Sougata, Managing access of user information by third party applications.
  158. Heusermann, Knut; Bruss, Ingo; Kuntz Mayr, Christiane; Brechtel, Joachim, Managing data administration.
  159. Chatani, Masayuki; Van Datta, Glen, Managing participants in an online session.
  160. Chatani, Masayuki; Van Datta, Glen, Managing participants in an online session.
  161. Kinnunen,Tero Matti, Managing the configuration of a shared network node.
  162. Dhupelia, Shekhar V.; Van Datta, Glen; Fernandes, Brian; Kato, Eiko Erika; McCarroll, William, Managing users in a multi-user network game environment.
  163. Herbach, Jonathan D.; Koon, Betty Y., Mechanism for visible users and groups.
  164. Herbach, Jonathan D.; Koon, Betty Y., Mechanism for visible users and groups.
  165. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  166. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  167. Moore, Richard G.; Mumford, Gregory L.; Gunasekar, Duraisamy, Messaging response system.
  168. Moore, Richard G.; Mumford, Gregory L.; Gunasekar, Duraisamy, Messaging response system providing translation and conversion written language into different spoken language.
  169. Black, Robert Barth, Method and aparatus for presence based resource management.
  170. Germscheid,Paul S.; Gretter,Eugene J.; Kress,Daryl J.; Guhl,Timothy J.; Behr,Gail L., Method and apparatus for a web application server to provide for web user validation.
  171. Han, Bing, Method and apparatus for accessing a chat room.
  172. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  173. Smith, Michael R, Method and apparatus for best effort propagation of security group information.
  174. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  175. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  176. Smith, Michael R., Method and apparatus for best effort propagation of security group information.
  177. Gusler, Carl Phillip; Hamilton, II, Rick Allen, Method and apparatus for dynamic modification of internet firewalls using variably-weighted text rules.
  178. Kay, James, Method and apparatus for electronic mail filtering.
  179. Kay, James, Method and apparatus for electronic mail filtering.
  180. Kay, James, Method and apparatus for electronic mail filtering.
  181. Liang, Tao; Bayrakeri, Sadik; Swales, Jing, Method and apparatus for implementing multi-user grouping nodes in a multimedia player.
  182. Smith, Michael R., Method and apparatus for ingress filtering using security group information.
  183. Smith, Michael R., Method and apparatus for ingress filtering using security group information.
  184. Gunturu, Anilkumar, Method and apparatus for load balancing based on XML content in a packet.
  185. Gunturu, Anilkumar, Method and apparatus for load balancing based on packet header content.
  186. Gunturu,Anilkumar, Method and apparatus for load balancing based on packet header content.
  187. Gai, Silvano; McCloghrie, Keith; Kanekar, Bhushan M., Method and apparatus for organizing, storing and evaluating access control lists.
  188. Black, Robert Barth, Method and apparatus for presence based resource management.
  189. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  190. Porter, Swain W., Method and apparatus for protectively operating a data/information processing device.
  191. Sathish, Sailesh Kumar, Method and apparatus for providing context access with property and interface obfuscation.
  192. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  193. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  194. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  195. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  196. Smith, Michael R., Method and apparatus for providing network security using role-based access control.
  197. Smith, Michael R., Method and apparatus for providing network security using security labeling.
  198. Smith, Michael R., Method and apparatus for providing network security using security labeling.
  199. Rymon, Ron, Method and apparatus for role grouping by shared resource utilization.
  200. Scott D. Mainwaring ; Debby Hindus ; Christian Mogensen NO; Colin Burns GB, Method and apparatus for sending and receiving lightweight messages.
  201. Kohavi,Itai; Bar David,Yosh, Method and apparatus for the composition and sale of travel-oriented packages.
  202. Van Horne, III,Edwin J.; King,Matthew; Bendelac,Chaim, Method and apparatus providing policy-based determination of network addresses.
  203. Bhatia, Gaurav; Swaminathan, Arun; Desai, Ajay, Method and apparatus to facilitate security-enabled content caching.
  204. Kotler, Hilik; Suchowski, Ron Shay, Method and device for questioning a plurality of computerized devices.
  205. Suchowski, Ron Shay; Kotler, Hilik, Method and device for questioning a plurality of computerized devices.
  206. Suchowski, Ron Shay; Kotler, Hilik, Method and device for scanning a plurality of computerized devices connected to a network.
  207. Brown, Ralph W.; Keller, Robert; Medin, Milo S., Method and system for authorizing and authenticating users.
  208. Bommireddipalli, Vijay R.; Brodsky, Stephen A.; Chang, David W.; Dawra, Anshul; Horman, Randall W.; Leung, Tony K.; Ostler, Paul A., Method and system for centralized control of database applications.
  209. Morrison,Michael C., Method and system for conducting a transaction over a network.
  210. Yancey, Scott; Doshi, Kedar, Method and system for controlling access to a multi-tenant database system using a virtual portal.
  211. Dockter Michael Jon ; Farber Joel Frank ; Lynn Ronald William ; Richardt Randal James, Method and system for controlling access to data resources and protecting computing system resources from unauthorized access.
  212. Martini, Giovanni; Elia, Gabriele; Marchetti, Marco, Method and system for enabling a user to get information about entities of predefined categories.
  213. Patton, Charles; Roschelle, Jeremy; Pea, Roy D.; Vahey, Phil, Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment.
  214. Kathail, Pradeep K.; Yiu, Shoou; Valencia, Andrew, Method and system for executing, tracking and restoring temporary router configuration change using a centralized database.
  215. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  216. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  217. Smith, Michael R., Method and system for generating user group identifiers.
  218. Smith, Michael R., Method and system for generating user group permission lists.
  219. Finn, Norman W.; Smith, Michael R., Method and system for including network security information in a frame.
  220. Finn, Norman W.; Smith, Michael R., Method and system for including network security information in a frame.
  221. Finn, Norman W.; Smith, Michael R., Method and system for including network security information in a frame.
  222. Smith, Michael R.; Nallur, Padmanabha; Kok, Wilson; Fine, Michael, Method and system for including security information with a packet.
  223. Smith, Michael R.; Nallur, Padmanabha; Kok, Wilson; Fine, Michael, Method and system for including security information with a packet.
  224. Smith, Michael R.; Nallur, Padmanabha; Kok, Wilson; Fine, Michael, Method and system for including security information with a packet.
  225. Judd,Steven G.; Harjanto,Andy, Method and system for integrated service administration via a directory service.
  226. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, Method and system for interacting with a virtual content repository.
  227. Chan, Joseph Lim Cho, Method and system for monitoring performance of processes across multiple environments and servers.
  228. Mukai,Syunichi, Method and system for music distribution.
  229. Chong, James C.; Chan, Joseph L.; Patel, Tushar M.; Heler, Jean-Jacques; So, Chi Hong; Tsang, Arthur; Lam, Robert S.; Chow, Raymond; Tsang, Henry, Method and system for problem determination in distributed enterprise applications.
  230. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  231. Wang, Ping; Yue, Xu Qiang; Zhu, Chen; Wu, Gan; Hua, Wei Wen; Wang, Jia, Method and system for providing object information on the internet.
  232. Wang, Ping; Yue, Xu Qiang; Zhu, Chen; Wu, Gan; Hua, Wei Wen; Wang, Jia, Method and system for providing object information on the internet.
  233. Campbell, R. David L.; Onnen, Paul E.; Sarausad, Edward M.; Plate, Steven W., Method and system for providing remote access to the facilities of a server computer.
  234. Brown, Ralph W.; Keller, Robert; Medin, Milo S.; Temkin, David, Method and system for restricting access to user resources.
  235. Brown, Ralph William; Medin, Jr., Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  236. Brown, Ralph William; Medin, Jr., Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  237. Brown, Ralph William; Medin, Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  238. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  239. Smith, Michael R.; Nemat, Awais B.; Fine, Michael, Method and system for the assignment of security group information using a proxy.
  240. Smith, Michael R.; Nemat, Awais B.; Fine, Michael, Method and system for the assignment of security group information using a proxy.
  241. Simpson,Nigel D., Method and system for voice control of software applications.
  242. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  243. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for delegated administration.
  244. Hu, Tawei; Nelson, Kenneth Carlin; Tao, Tracee; Vo, Mimi Phuong Thao; Wang, Yuping, Method for delegation of administrative operations in user enrollment tasks.
  245. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Method for downloading an icon corresponding to a hierarchical directory structure from a directory service.
  246. Hafeman, Joseph E.; Iannucci, Louis; Melfi, Mark; Shippee, Carl; Kulkarni, Rajandra Laxman, Method for establishing a person as a user in a system.
  247. Getchius, Jeffrey; Scofield, Cary, Method for performing a data query.
  248. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  249. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  250. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for role and resource policy management optimization.
  251. Brocklebank, John C.; Weir, Bruce S.; Czika, Wendy, Method for selecting node variables in a binary decision tree structure.
  252. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  253. Getchius, Jeffrey; Scofield, Cary, Method for using data from a data query cache.
  254. Trossen, Dirk; Pavel, Dana, Method, system and computer program to enable querying of resources in a certain context by definition of SIP even package.
  255. Chong, James C.; Banks, Jerome D.; Chan, Joseph L.; Chow, Raymond; Heler, Jean-Jacques; Lam, Robert S.; Patel, Tushar M.; So, Chi Hong; Tang, Henry; Tsang, Arthur; Zychowski, Christopher M., Method, system, and computer program for monitoring performance of applications in a distributed environment.
  256. Chong, James C.; Chan, Joseph L.; Patel, Tushar M.; Heler, Jean Jacques; So, Chi Hong; Tsang, Arthur; Lam, Robert S.; Chow, Raymond; Banks, Jerome D.; Zychowski, Christopher M.; Tang, Henry, Method, system, and computer program for monitoring performance of applications in a distributed environment.
  257. Chong, James C.; Chan, Joseph L.; Patel, Tushar M.; Heler, Jean Jacques; So, Chi Hong; Tsang, Arthur; Lam, Robert S.; Chow, Raymond; Banks, Jerome D.; Zychowski, Christopher M.; Tang, Henry, Method, system, and computer program for monitoring performance of applications in a distributed environment.
  258. Von Kaenel, Tim A.; Dyrnaes, David Neil; Kumar, C. Suresh; Wayman, Jared Paul; Goodwin, Jonathan David; Trivelpiece, Craig Evan; Mihalich, Joseph; Jenkins, Anthony Page; Odom, Jr., Richard Hoyt; Stier, Mark Andrew; Obee, Anne Janetta, Method, system, and program for an improved enterprise spatial system.
  259. Salazar, Fernando J., Method, system, and program product for managing access to data items in a database.
  260. Long, Darrell; Dolsen, Lee; Moen, Doug, Methods and systems for obtaining URL filtering information.
  261. Tanaka, Jay, Methods and systems for providing time and date specific software user interfaces.
  262. Tanaka, Jay, Methods and systems for providing time and date specific software user interfaces.
  263. Nichols,Isaac; Kuppusamy,Ashok; Olsen,Thomas; Roma,Ricard, Methods and systems for sharing a network resource with a user without current access.
  264. Edwards, Jr.,Robert Blair; Kaczmarski,Michael Allen; Vargas,Omar Bond, Methods for authenticating a user's credentials against multiple sets of credentials.
  265. Hoffberg, Steven M., Mobile communication device.
  266. Rao, Sunil K.; Rao, Rekha K.; Rao, Raman K., Mobile device image capture and image modification including filters, superimposing and geofenced comments in augmented reality.
  267. Shan,Xueshan, Mobile gateway for secure extension of enterprise services to mobile devices.
  268. Chong, James C.; Chan, Joseph L.; Patel, Tushar M.; Heler, Jean Jacques; So, Chi Hong; Tsang, Arthur; Lam, Robert S.; Chow, Raymond; Banks, Jerome D.; Zychowski, Christopher M.; Tang, Henry, Monitoring performance of applications in a distributed environment.
  269. Doyle, Judy; Politano, Remo; Gifford, Doug, Multi-authoring within benefits content system.
  270. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Reed, David R., Multi-user server application architecture with single-user object tier.
  271. Tien, Ian; Lim, Chen-I; Hulen, Corey; Tang, Zhenyu, Multidimensional metrics-based annotation.
  272. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  273. Nakamura, Katsuichi; Yamamura, Shinya; Sato, Yoshiharu, Network access control method, network system using the method and apparatuses configuring the system.
  274. Lamb,Richard H.; Guzovsky,Eduard, Network access control using network address translation.
  275. Janes,Sherman M., Network communications security agent.
  276. Janes,Sherman M., Network communications security agent.
  277. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  278. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  279. Henderson, Charles E., Network operating system and method.
  280. Henderson, Charles E., Network operating system and method.
  281. Cook,Fred S., Network shell.
  282. Nagaoka, Akihiro; Nishimura, Mitsuhiko, Network system and method for limiting the execution of commands.
  283. Malik, Dale W.; Friedman, Lee G., Network update manager.
  284. Strittmatter, Andre, Nitride semiconductor structure.
  285. Meyer, David; Stanko, Joseph A.; Pandrangi, Phani; McDermott, Adrian Peter; Hayler, Don L.; Quigley, Thomas; Amend, Michael Ryan, Non-invasive insertion of pagelets.
  286. Mohsen Al-Ghosein ; Jan S. Gray ; Amit Mital ; Rodney Limprecht, Object load balancing.
  287. Andrews, Anthony D.; Thatte, Satish R.; Hill, Richard D.; Norlander, Rebecca A.; Armanasu, Alexander A., Object security boundaries.
  288. Anthony D. Andrews ; Satish R. Thatte ; Richard D. Hill ; Rebecca A. Norlander ; Alexander A. Armanasu, Object security boundaries.
  289. Teegan, Hugh A.; Matsumoto, Scott R., Object-based software management.
  290. Teegan,Hugh A.; Matsumoto,Scott, Object-based software management.
  291. Truong, Phong Kim; Wang, Eileen HongLian, Optimizing a compiled access control table in a content management system.
  292. Ponte, Jay Michael, Page aggregation for web sites.
  293. Meyer, David; Stanko, Joseph A.; Pandrangi, Phani; McDermott, Adrian Peter; Hayler, Don L., Pagelets in adaptive tags in non-portal reverse proxy.
  294. Behrend, George G.; DeRobertis, Christopher V., Plural/alternate files registry creation and management.
  295. Lee, IV,Alfred; Levin,David; Christensen,Erik B.; Wong,Sara, Policy application across multiple nodes.
  296. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  297. Jacobs, Richard, Policy management.
  298. Kaplan, Marc A.; Sawdon, Wayne A., Posixly secure open and access files by inode number.
  299. Tien, Ian; Hulen, Corey; Lim, Chen-I, Presentation generation using scorecard elements.
  300. Marcjan, Cezary; Cheng, Lili, Privacy model that grants access rights and provides security to shared content.
  301. Chong, James C.; Chan, Joseph L.; Patel, Tushar M.; Heler, Jean-Jacques; So, Chi H.; Tsang, Arthur; Lam, Robert S.; Chow, Raymond; Tang, Henry, Problem determination in distributed enterprise applications.
  302. Chong, James C.; Chan, Joseph L.; Patel, Tushar M.; Heler, Jean-Jacques; So, Chi Hong; Tsang, Arthur; Lam, Robert S.; Chow, Raymond; Tang, Henry, Problem determination in distributed enterprise applications.
  303. Acker, Liane Elizabeth Haynes; Knutson, James Irwin; LeBlanc, Karalee Brown, Process and system for providing name service scoping behavior in java object-oriented environment.
  304. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  305. Tatsubori, Michiaki; Takase, Toshiroh; Nakamura, Yuhichi, Processing call requests with respect to objects.
  306. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  307. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  308. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  309. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  310. Moore, Richard G.; Mumford, Gregory L.; Gunasekar, Duraisamy, Providing of presence information to a telephony services system.
  311. Drakeley, Erin E.; Amatucci, Mike; Iannucci, Lou; McLure, David; McDonough, John, Providing one party access to an account of another party.
  312. Fleurant, Karen; Politano, Remo; Bennett, Jason, Quality control of authoring work flow within a benefits content system.
  313. Dettinger, Richard D.; Kolz, Daniel P., Query conditions-based security.
  314. Dettinger, Richard D.; Kolz, Daniel P., Query conditions-based security.
  315. Dettinger, Richard D.; Kolz, Daniel P., Query conditions-based security.
  316. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  317. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  318. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  319. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  320. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  321. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  322. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  323. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  324. Tien, Ian; Hulen, Corey J.; Lim, Chen-I, Real time collaboration using embedded data visualizations.
  325. Tien, Ian; Hulen, Corey J.; Lim, Chen-I, Real time collaboration using embedded data visualizations.
  326. Marks, Daniel L, Real time communications system.
  327. Marks, Daniel L, Real time communications system.
  328. Marks, Daniel L, Real time communications system.
  329. Marks, Daniel L, Real time communications system.
  330. Limprecht,Rodney T.; Helland,Patrick James; Agsen,Mohsen M., Recycling components after self-deactivation.
  331. Harry W. Morris ; Eric Bosco ; David Lowell Lippke ; Colin Anthony Steele, Regulating users of online forums.
  332. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Regulating users of online forums.
  333. Herman, Shane; Walavalkar, Mahesh, Remote computer system management through an FTP internet connection.
  334. Herman,Shane; Walavalkar,Mahesh, Remote computer system management through an FTP internet connection.
  335. Nelson, Dwayne R.; Kiely, Daryn; Rowe, Richard E., Remote configuration of gaming terminals.
  336. Nelson, Dwayne R.; Kiely, Daryn; Rowe, Richard E., Remote configuration of gaming terminals.
  337. Le Stum, Guillaume, Report preview caching techniques in a multi-tenant database.
  338. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  339. Lortz,Victor B., Resource authorization.
  340. Malik, Dale W., Resource list management system.
  341. Malik, Dale W., Resource list management system.
  342. Malik,Dale W., Resource list management system.
  343. Roever, Stefan; Watson, David, Rights based system.
  344. Roever, Stefan; Watson, David, Rights-based system.
  345. Lee, Ade; Fu, Christina, Role-based access control utilizing token profiles.
  346. Lee, Ade; Fu, Christina, Role-based access control utilizing token profiles having predefined roles.
  347. Deen, Brian; Hopmann, Alex; Soderberg, Joel, Routing client requests to back-end servers.
  348. Deen, Brian; Hopmann, Alex; Soderberg, Joel, Routing client requests to back-end servers.
  349. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  350. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  351. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  352. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  353. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  354. Amano, Takaaki; Maeda, Yoshiharu, SERVER SYSTEM FOR CLASSIFYING ACCEPTED USERS BASED ON IDENTIFICATION INFORMATION INTO PREDETERMINED GROUPS IN ACCORDANCE WITH A COUNTING RESULT OBTAINED BY COUNTING A NUMBER OF STORED IDENTIFICATION .
  355. Jacob, Mark Lester; Roy, Ronald Joseph; Harris, Adam Pierce, Seamless host migration based on NAT type.
  356. Jacob, Mark Lester; Roy, Ronald Joseph; Harris, Adam Pierce, Seamless host migration based on NAT type.
  357. Vivier, Barbara Jean; Aggour, Kareem Sherif, Searching and matching a set of query strings used for accessing information in a database directory.
  358. Leach, Linda Karen; Koehler, Kristopher Lee, Secure access infrastructure.
  359. Selgas, Thomas Drennan; Heintz, John D., Secure cloud data sharing.
  360. Selgas, Thomas D.; Cutrer, Jonathan, Secure credentials control method.
  361. Selgas, Thomas D.; Cutrer, Jonathan, Secure email communication system.
  362. Selgas, Thomas Drennan; Cutrer, Jonathan, Secure email communication system.
  363. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure file system server architecture and methods.
  364. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Secure file system server architecture and methods.
  365. Lee, Glenn E.; Long, William L.; King, Patrick S., Secure multi-user cable modem configuration editor and viewer.
  366. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  367. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  368. Dutta, Tanmoy; Garcia, Raul; Li, Ziquan; Chander, Girish, Security execution context for a database management system.
  369. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  370. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  371. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  372. Chern, Wei-Jhy, Security token destined for multiple or group of service providers.
  373. Massard,Yves, Security token sharable data and synchronization cache.
  374. Maluf, David A.; Gawdiak, Yuri O., Selective access and editing in a database.
  375. Harry W. Morris ; Eric Bosco ; David Lowell Lippke ; Colin Anthony Steele, Self-policing, rate limiting online forums.
  376. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  377. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  378. Morris, Harry W.; Bosco, Eric; Lippke, David Lowell; Steele, Colin Anthony, Self-policing, rate limiting online forums.
  379. Ponte, Jay Michael, Semi-automatic index term augmentation in document retrieval.
  380. Ponte, Jay Michael, Semi-automatic index term augmentation in document retrieval.
  381. Limprecht, Rodney; Helland, Patrick James; Al-Ghosein, Mohsen, Server application components with control over state duration.
  382. Limprecht,Rodney; Helland,Patrick James; Al Ghosein,Mohsen, Server application components with control over state duration.
  383. Tien, Ian; Hulen, Corey; Lim, Chen-I, Service architecture based metric views.
  384. Rahman,Mohamed Anisur; LaBombard,Bruce M., Service creation and negotiation in a wireless network.
  385. Trantow, Wayne D., Servicing device aggregates.
  386. Johnson, Jeremy T.; Medin, Milo S., Sharing IP network resources.
  387. Miura, Victor O. S.; Sargaison, Stewart, Simplified run-time program translation for emulating complex processor pipelines.
  388. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  389. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  390. Varadharajan, Arunkumaran, Software and framework for reusable automated testing of computer software systems.
  391. Russell,Wilfred G.; Helland,Patrick J.; Hope,Greg; Limprecht,Rodney; Al Ghosein,Mohsen M.; Gray,Jan S., Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment.
  392. Russell,Wilfred G.; Helland,Patrick James; Hope,Greg; Limprecht,Rodney; Al Ghosein,Mohsen; Gray,Jan Stephen, Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment.
  393. Pandya, Suketu J.; Lakshmanan, Hariharan, Software, systems and methods for managing a distributed network.
  394. Pandya,Suketu J.; Joshi,Varad V., Software, systems and methods for managing a distributed network.
  395. Collins, Kevin; Haven, Richard C.; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; OKelley, Brian, Software, systems, and methods for processing digital bearer instruments.
  396. Collins, Kevin; Haven, Richard; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; O'Kelly, Brian, Software, systems, and methods for processing digital bearer instruments.
  397. Henry Lee, State-based implementation of transactions on a file system.
  398. Press, William A.; Geh, Nicholas B., Synonym supported searches.
  399. Griffin,Philip B., System and method for XML data representation of portlets.
  400. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  401. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  402. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  403. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  404. Flanagan,William J.; Conklin,Jeffrey; Foucher,David; Foucher,Daniel, System and method for an automated system of record.
  405. Randall F. Mears ; Jaye D. Hicks, System and method for an interactive knowledgebase.
  406. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  407. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  408. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  409. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  410. Flanagan,William J.; Conklin,Jeffrey; Foucher,David; Foucher,Daniel, System and method for automated, iterative development negotiations.
  411. Benson, Amanda; Benson, Gregory P.; Heller, Melissa, System and method for collecting and accessing product information in a database.
  412. Benson, Amanda; Benson, Gregory P.; Schmidt, Melissa, System and method for collecting and accessing product information in a database.
  413. Chen,An Feng I; Hu,Tawei; Liang,Lily; Lin,Jy Jine James; Perry,Edward Joseph; Wang,Yuping; Yaung,Alan Tsu I; Zhang,Howard Hao, System and method for configurable binding of access control lists in a content management system.
  414. Flanagan,William J.; Conklin,Jeffrey; Foucher,David; Foucher,Daniel, System and method for contract authority.
  415. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  416. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  417. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  418. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  419. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  420. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  421. Hoffberg, Steven M., System and method for determining contingent relevance.
  422. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  423. Patrick, Paul B., System and method for dynamic data redaction.
  424. Nelson, Kenneth Carlin; Noronha, Marilene Araujo, System and method for ensuring security with multiple authentication schemes.
  425. Nelson,Kenneth Carlin; Noronha,Marilene Araujo, System and method for ensuring security with multiple authentication schemes.
  426. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  427. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  428. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  429. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  430. Wandel, Matthias; Mousseau, Gary P., System and method for implementing local base stations.
  431. Choy,David Mun Hien; Hu,Tawei; Lin,Jy Jine James; Wang,Yuping; Yaung,Alan Tsu I, System and method for incremental refresh of a compiled access control table in a content management system.
  432. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  433. McVeigh,Ryan Sean; Roth,Steven Leslie; Patadia,Jalpesh; Saarva,Tanya; Zhou,Xiaojiang; Posner,Brad, System and method for lightweight loading for managing content.
  434. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  435. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  436. Chen, An Feng-I; Choy, David Mun-Hien; Hu, Tawei; Lin, Jy-Jine James; Nelson, Kenneth Carlin; Wang, Yuping; Yaung, Alan Tsu-I, System and method for managing application specific privileges in a content management system.
  437. Chen, An Feng-I; Choy, David Mun-Hien; Hu, Tawei; Lin, Jy-Jine James; Nelson, Kenneth Carlin; Wang, Yuping; Yaung, Alan Tsu-I, System and method for managing application specific privileges in a content management system.
  438. Zak, Bruce; Zak, Regina, System and method for managing content on a network interface.
  439. Moses, Fred, System and method for managing objects and resources with access rights embedded in nodes within a hierarchical tree structure.
  440. Gene D. Kavner, System and method for performing remote requests with an on-line service network.
  441. Haut,John; Griffin,Philip B.; Patadia,Jalpesh; Willcox,Steven; Breeden,Timothy, System and method for portal page layout.
  442. Le Saint, Eric F., System and method for privilege delegation and control.
  443. Flanagan,William J.; Conklin,Jeffrey; Foucher,David; Foucher,Daniel, System and method for process mining.
  444. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing SPI extensions for content management system.
  445. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  446. McVeigh, Ryan Sean; Roth, Steven L.; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing nested types for content management.
  447. Joy,George; Dasgupta,Mukkul; Shell,Scott; Gopalan,Yadhu, System and method for providing security to an application.
  448. Griffin,Philip B.; Devgan,Manish; Howes,Jason; Dunbar,Scott, System and method for rule-based entitlements.
  449. McCauley, Rodney; Owen, James; Bales, Christopher E., System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories.
  450. Dunn, Melissa W., System and method for user-centric authorization to access user-specific information.
  451. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  452. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  453. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  454. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  455. Hubbard, Dan, System and method of controlling access to the internet.
  456. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  457. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  458. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  459. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  460. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  461. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  462. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  463. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  464. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  465. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  466. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  467. Megiddo, Nimrod, System and methodology for video conferencing and internet chatting in a cocktail party style.
  468. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, System and methods of improving a multi-tenant database query using contextual knowledge about non-homogeneously distributed tenant data.
  469. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, System and methods of improving a multi-tenant database query using contextual knowledge about non-homogeneously distributed tenant data.
  470. Dowedeit, Bernd; Haibl, Roland; Schneider, Juergen; Schueppen, Walter, System and procedure for controlling and monitoring programs in a computer network.
  471. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  472. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  473. Oliver, David M.; Densmore, William P.; Callahan, Michael J., System for management of alternatively priced transactions on network.
  474. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., System for providing users an integrated directory service containing content nodes located in different groups of application servers in computer network.
  475. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  476. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  477. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  478. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  479. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  480. Fuchs, Axel; Andrews, Scott Sturges, System, method and computer program product for sharing information in a distributed framework.
  481. Fuchs, Axel; Andrews, Scott Sturges, System, method and computer program product for sharing information in a distributed framework.
  482. Fuchs, Axel; Andrews, Scott Sturges, System, method and computer program product for sharing information in a distributed framework.
  483. Fuchs, Axel; Andrews, Scott Sturges, System, method and computer program product for sharing information in a distributed framework.
  484. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  485. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  486. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  487. Prats, Diego; Prats, Eduardo; Guido, Oscar; LaCasse, Nicolas; Yoder, Daniel, Systems and methods for anchoring content objects to structured documents.
  488. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  489. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  490. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  491. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  492. Morrison, Daniel; Sielaff, Martin; Fletcher, Todd, Systems and methods for enabling dialog amongst different participant groups.
  493. Brooks, David; Jasik, Benji; Bezar, Eric David; Chasman, Douglas; Hansma, Scott; Tamm, Steven; Tucker, Lewis Wiley; Mason, Timothy; Tzuo, Tien; Gross, Adam; Wong, Simon, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  494. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  495. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  496. Dutta, Tanmoy; Cunningham, Conor; Stefani, Stefano; Chander, Girish; Hanson, Eric N., Systems and methods for fine grained access control of data stored in relational databases.
  497. Dutta,Tanmoy; Cunningham,Conor; Stefani,Stefano; Chander,Girish; Hanson,Eric N., Systems and methods for fine grained access control of data stored in relational databases.
  498. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  499. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  500. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  501. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  502. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  503. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  504. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  505. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  506. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  507. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  508. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  509. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  510. Jacob, Mark Lester; Roy, Ronald Joseph; Harris, Adam Pierce, Systems and methods for seamless host migration.
  511. Jacob, Mark Lester; Roy, Ronald Joseph; Harris, Adam Pierce, Systems and methods for seamless host migration.
  512. Jacob, Mark Lester; Roy, Ronald Joseph; Harris, Adam Pierce, Systems and methods for seamless host migration.
  513. Jacob, Mark Lester; Roy, Ronald Joseph; Harris, Adam Pierce, Systems and methods for seamless host migration.
  514. Guido, Oscar; Prats, Eduardo; Prats, Diego; LaCasse, Nicolas; Tipping, Spencer, Systems and methods for sharing user generated slide objects over a network.
  515. Ramaswamy, Venkat, Systems and methods for spreading messages online.
  516. Chen, Pehong; Henderson, Tucker; Wu, William; Chu, Peter, Systems and methods for the secure sharing of data.
  517. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  518. Dutta, Tanmoy; Chander, Girish; Cristofor, Laurentiu Bogdan; Kline, Rodger N.; Hamilton, James R., Systems and methods that optimize row level database security.
  519. Dutta, Tanmoy; Chander, Girish; Hamilton, James R.; Comeau, Alain C., Systems and methods that specify row level database security.
  520. Edwards, Jr., Robert Clair; Kaczmarski, Michael Allen; Vargas, Omar Bond, Systems for authenticating a user's credentials against multiple sets of credentials.
  521. Burrell, Brandon Mitchell, Systems, methods, and computer program products for managing the display of information output by a computer program.
  522. Ponte, Jay; Getchius, Jeffrey; Koyfman, Lazar, Targeted banner advertisements.
  523. Taylor, Jacob; Oram, Clinton; Roberts, John, Team based row level security system and method.
  524. Taylor,Jacob; Oram,Clinton; Roberts,Johri, Team based row level security system and method.
  525. Sullivan, Francis X.; Bereiter, Thomas William; Vetter, Brian Jay, Technical support chain automation with guided self-help capability and option to escalate to live help.
  526. Francis X. Sullivan ; Brian Jay Vetter, Technical support chain automation with guided self-help capability using active content.
  527. Sullivan, Francis X., Technical support chain automation with guided self-help capability using active content assertions.
  528. Sullivan, Francis X.; Vetter, Brian Jay, Technical support chain automation with guided self-help capability using active content developed for specific audiences.
  529. Sullivan, Francis X.; Bereiter, Thomas William; Vetter, Brian Jay, Technical support chain automation with guided self-help capability via a system-supplied search string.
  530. Sullivan,Francis X.; Vetter,Brian Jay, Technical support chain automation with guided self-help capability, escalation to live help, and active journaling.
  531. Durdik, Paul; Josephson, Daryl, Techniques for changing perceivable stimuli associated with a user interface for an on-demand database service.
  532. Durdik, Paul; Josephson, Daryl, Techniques for changing perceivable stimuli associated with a user interfave for an on-demand database service.
  533. Williams, Alexis; Mastrogiovanni, Analia; Hatton, James, Techniques for distributing information in a computer network related to a software anomaly.
  534. Yancey, Scott, Techniques for establishing a parallel processing framework for a multi-tenant on-demand database system.
  535. Tanaka, Jay, Techniques for interpreting signals from computer input devices.
  536. Yancey, Scott; Doshi, Kedar; Wu, Yongsheng, Techniques for processing group membership data in a multi-tenant database system.
  537. Yancey, Scott; Doshi, Kedar; Wu, Yongsheng, Techniques for processing group membership data in a multi-tenant database system.
  538. Dettinger, Richard D.; Djugash, Judy I.; Kolz, Daniel P., Techniques for sharing persistently stored query results between multiple users.
  539. Dettinger, Richard D.; Djugash, Judy I.; Kolz, Daniel P., Techniques for sharing persistently stored query results between multiple users.
  540. Dettinger,Richard D.; Djugash,Judy I.; Kolz,Daniel P., Techniques for sharing persistently stored query results between multiple users.
  541. Yancey, Scott, Techniques for utilizing computational resources in a multi-tenant on-demand database system.
  542. Chipalkatti, Renu; Getchius, Jeffrey; Ponte, Jay, Techniques for web site integration.
  543. Chipalkatti, Renu; Getchius, Jeffrey; Ponte, Jay, Techniques for web site integration.
  544. Chipalkatti, Renu; Getchius, Jeffrey; Ponte, Jay, Techniques for web site integration.
  545. Moore,Richard G.; Mumsford,Gregory L.; Gunasekar,Duraisamy, Telephony services system with instant communications enhancements.
  546. Peden, George H.; Marshall, Robert A., Ticketing and keying for orchestrating distribution of network content.
  547. Peden,George H.; Marshall,Robert A., Ticketing and keying for orchestrating distribution of network content.
  548. Collins, Kevin; Roever, Stefan; Wray, Kevin; Clark, Alex F.; Ginter, Karl, Title materials embedded within media formats and related applications.
  549. Roever, Stefan; Ginter, Karl, Title-enabled networking.
  550. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Russell, Wilfred G., Transaction processing of distributed objects with declarative transactional attributes.
  551. Dutta, Tanmoy; Chander, Girish; Garcia, Raul; Li, Ziquan, Trust model for a database management system supporting multiple authorization domains.
  552. Adams, David E.; Ericson, Bryan C.; Hanson, Chad J.; Kamis, George P.; Maple, James E.; Serbe, Victor A.; Yekkirala, Venkatesh S., Trusted file relabeler.
  553. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  554. Ponte, Jay Michael, Use of generalized term frequency scores in information retrieval systems.
  555. Hayler, Don L.; Vu, Daniel, User role mapping in web applications.
  556. Hayler, Don L.; Vu, Daniel, User role mapping in web applications.
  557. Dunn, Melissa W., User-centric consent management system and method.
  558. Dunn,Melissa W., User-centric consent management system and method.
  559. Tarin, Stephen A., Value-instance-connectivity computer-implemented database.
  560. Patadia, Jalpesh; McCauley, Rodney; Toussaint, Alexander, Virtual content repository browser.
  561. Owen,James; Choe,Chang, Virtual repository complex content model.
  562. Owen,James; Choe,Chang, Virtual repository content model.
  563. Wieland, Martin, Virtual smart card to perform security-critical operations.
  564. Desai,Ajay M.; Lei,Ming; Goell,Ric; Jacobs,Lawrence, Web object access authorization protocol based on an HTTP validation model.
  565. Furui,Yohnosuke; Takahashi,Junichi, Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor.
  566. Fuerst Carol, Web survey tool builder and result compiler.
  567. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  568. Haghpassand, Joshua, Web-based security and filtering system with proxy chaining.
  569. Rowe, Richard E., Wide area program distribution and game information communication system.
  570. Rowe,Richard E., Wide area program distribution and game information communication system.
  571. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  572. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  573. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  574. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  575. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  576. Teegan,Hugh A.; Matsumoto,Scott, Wrapped object for observing object events.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로