$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for secure storage of data 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0777414 (1996-12-30)
발명자 / 주소
  • Goldstein Benjamin D.
대리인 / 주소
    Schwartz
인용정보 피인용 횟수 : 199  인용 특허 : 5

초록

A mechanism and method for encrypting database information such that the data can be directly processed while still in an encrypted form. The mechanism and method make use of a distributed computing network. Internal level database information is located remotely from users in the form of property-o

대표청구항

[ What is claimed is:] [13.] An apparatus for data storage comprising:a database having a semantically represented store of data;a database mechanism for performing database operations with the semantically represented data, said database mechanism connected with said database; andan access mechanis

이 특허에 인용된 특허 (5)

  1. Amirghodsi Siamak (Prairie View IL) Daneshbodi Farnoud (Prairie View IL), Adaptive natural language computer interface system.
  2. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  3. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  4. Bailey ; III John E. (207 Leafmore Rd. Rome GA 30165), Method and system for creating and storing a backup copy of file data stored on a computer.
  5. Quimby John (Acton MA), Signature data object.

이 특허를 인용한 특허 (199)

  1. Luna, Michael; Fiatal, Trevor A., 3D mobile user interface with configurable workspace management.
  2. Molnar, Ladislau; Conlan, Patrick; Sourov, Alexander, Adding extrinsic data columns to an existing database schema using a temporary column pool.
  3. Luna, Michael; Tervahauta, Mikko, Aligning data transfer to optimize connections established for transmission over a wireless network.
  4. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  5. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  6. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  7. Backholm, Ari; Liang, Sheng, Application discovery on mobile devices.
  8. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Application or context aware fast dormancy.
  9. Luna, Michael; Bott, Ross, Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network.
  10. Fiatal, Trevor, Bandwidth measurement.
  11. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  12. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  13. Luna, Michael, Cache state management on a mobile device to preserve user experience.
  14. Langford, Glenn C., Centralized secure backup system and method.
  15. Moloney, David, Circuit for compressing data and a processor employing same.
  16. Browning, James, Compression of encrypted data in database management systems.
  17. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
  18. Fiatal, Trevor, Content delivery to a mobile device from a content service.
  19. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Context aware data presentation.
  20. Ross,David Justin; Love,Jack; Billester,Stephen E. M.; Smith,Brent R., Controlled-access database system and method.
  21. Fleming, Michael, Cross-platform event engine.
  22. Cardno, Andrew John; Singh, Ashok Kumar, Data obfuscation system, method, and computer implementation of data obfuscation for secret databases.
  23. Dahl, Ulf, Data security system for a database.
  24. Owens,Timothy C.; Harrison,Bruce E., Data structure and management system for a superset of relational databases.
  25. Nishizawa,Itaru; Ushijima,Kazutomo; Shintani,Takahiko, Database access method and system capable of concealing the contents of query.
  26. Sato,Makoto; Takeda,Tsuneharu; Mori,Junji; Kurosawa,Kazuo, Database management apparatus and encrypting/decrypting system.
  27. Luna, Michael, Detecting and preserving state for satisfying application requests in a distributed proxy and cache system.
  28. Luna, Michael; Bott, Ross, Detection and management of user interactions with foreground applications on a mobile device in distributed caching.
  29. Luna, Michael; Bott, Ross, Device resources sharing for network resource conservation.
  30. Subramanian, Ananthan, Discarding sensitive data from persistent point-in-time image.
  31. Subramanian, Ananthan, Discarding sensitive data from persistent point-in-time image.
  32. Luna, Michael; Haines, John, Distributed caching for resource and mobile network traffic management.
  33. Luna, Michael; Tsõmbaljuk, Andrei, Distributed caching in a wireless network of content delivered for a mobile application over a long-held request.
  34. Backholm, Ari; Luna, Michael, Distributed implementation of dynamic wireless traffic policy.
  35. Luna, Michael; Tervahauta, Mikko, Distributed management of keep-alive message signaling for mobile network resource conservation and optimization.
  36. Luna, Michael; Ponomarenko, Andrei, Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  37. Luna, Michael, Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications.
  38. Luna, Michael; Bott, Ross, Dynamic categorization of applications for network access in a mobile network.
  39. Mizell, David, Dynamic graph system for a semantic database.
  40. Mizell, David, Dynamic graph system for a semantic database.
  41. Chung,Ki Hyun, Dynamically storing PIM/address book data by type.
  42. Gong, Shia-San; Mancisidor, Rodolfo Augusto; Murthy, Chetan Ram; Shi, Shaw-Ben, Efficient schema for storing multi-value attributes in a directory service backing store.
  43. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  44. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  45. Koyfman, Andrew, Encrypted table indexes and searching encrypted tables.
  46. Bott, Ross, Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network.
  47. Lock, Hendrik; Matic, Dragon, Error handling for intermittently connected mobile applications.
  48. Ariel, Ido; van Gent, Robert Paul, Extending user relationships.
  49. Luna, Michael, Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation.
  50. Krishnaprasad, Muralidhar; Davis, Mark; Ture, Mark; Hsin, Cindy; Bhavsar, Meeten; Koide, Hiroshi; Delgado, Joaquin; Yang, Chi-Ming; Nimani, Visar; Ouyang, Hui; Bhatkar, Sachin; Chang, Thomas, Flexible authentication framework.
  51. Krishnaprasad, Muralidhar; Davis, Mark; Ture, Mark; Hsin, Cindy; Bhavsar, Meeten; Koide, Hiroshi; Delgado, Joaquin; Yang, Chi-Ming; Nimani, Visar; Ouyang, Hui; Bhatkar, Sachin; Chang, Thomas, Flexible authentication framework.
  52. Krishnaprasad, Muralidhar; Davis, Mark; Ture, Mark; Hsin, Cindy; Bhavsar, Meeten; Koide, Hiroshi; Delgado, Joaquin; Yang, Chi-Ming; Nimani, Visar; Ouyang, Hui; Bhatkar, Sachin; Chang, Thomas, Flexible authentication framework.
  53. Krishnaprasad, Muralidhar; Davis, Mark; Ture, Mark; Hsin, Cindy; Bhavsar, Meeten; Koide, Hiroshi; Delgado, Joaquin; Yang, Chi-Ming; Nimani, Visar; Ouyang, Hui; Bhatkar, Sachin; Chang, Thomas, Flexible authentication framework.
  54. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, Flexible billing architecture.
  55. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  56. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  57. Cideciyan, Roy D.; Jaquette, Glen A.; Mittelholzer, Thomas, Generating a code alphabet of symbols to generate codewords for words used with a program.
  58. Cideciyan, Roy D.; Jaquette, Glen A.; Mittelholzer, Thomas, Generating a code alphabet of symbols to generate codewords for words used with a program.
  59. Cideciyan, Roy D.; Jaquette, Glen A.; Mittelholzer, Thomas, Generating a code alphabet of symbols to generate codewords for words used with a program.
  60. Cideciyan, Roy D.; Jaquette, Glen A.; Mittelholzer, Thomas, Generating a code alphabet of symbols to generate codewords for words used with a program.
  61. Amundsen, Lance Christopher; Bestgen, Robert Joseph; Driesch, Jr., Robert Douglas; Abdo, Abdo Esmail; Toft, Daniel Virgil, Generating join queries using tensor representations.
  62. Luna, Michael; Bott, Ross, Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization.
  63. Nair, Sushil; Zolotusky, Anatol; Charpentier, Claude; Metzger, Brian, High performance data encryption server and method for transparently encrypting/decrypting data.
  64. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  65. Liao, Ciya; Chang, Thomas; Krishnaprasad, Muralidhar; Bhavsar, Meeten, Indexing secure enterprise documents using generic references.
  66. Shah, Ajit S.; Thakur, Madhukar; Hu, Dave; Thom, Joyce, Information exchange engine providing a critical infrastructure layer and methods of use thereof.
  67. Agrawal, Rakesh; Evfimievski, Alexandre Valentinovich; Srikant, Ramakrishnan, Information integration across autonomous enterprises.
  68. Agrawal,Rakesh; Evfimievski,Alexandre Valentinovich; Srikant,Ramakrishnan, Information integration across autonomous enterprises.
  69. Ma, Hengli, Information matrix cryptogram.
  70. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  71. Fiatal, Trevor, Integrated messaging.
  72. Fiatal, Trevor, Integrated messaging.
  73. Fleming, Michael, Intelligent rendering of information in a limited display environment.
  74. Long, Men; Durham, David, Intruder traceability for shared security associations.
  75. Fiatal, Trevor; Guesman, Jason, Location-based operations and messaging.
  76. Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Maintaining an IP connection in a mobile network.
  77. Backholm, Ari; Ahonen, Jukka; Groeber, Marcus; Salorinne, Seppo; Vuornos, Lauri; Saarlilahti, Antti; Ketonen, Marko; Salmi, Petri, Maintaining mobile terminal information for secure communications.
  78. Luna, Michael; Bott, Ross, Managing cache to prevent overloading of a wireless network due to user activity.
  79. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Managing user-to-user contact with inferred presence information.
  80. Trepetin, Stan; Reston, Mark, Mathematical method for performing homomorphic operations.
  81. Fiatal, Trevor A.; Sutaria, Jay; Nanjundeswaran, Sridhar; Bavadekar, Shailesh, Method and apparatus for intercepting events in a communication system.
  82. Wong, Daniel ManHung, Method and apparatus for protecting data from unauthorized modification.
  83. Boneh, Dan; Chawla, Rajeev; Frindell, Alan; Goh, Eu-Jin; Modadugu, Nagendra; Tsirigotis, Panagiotis, Method and apparatus for transparent encryption.
  84. Luna, Michael; Tervahauta, Mikko; Pan, Yixin, Method and system for management of a virtual network connection without heartbeat messages.
  85. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  86. Hansen, Lynda A.; Lee, Thomas S.; Shah, Mayank V., Method and system for supporting multivalue attributes in a database system.
  87. Hansen,Lynda A.; Lee,Thomas S.; Shah,Mayank V., Method and system for supporting multivalue attributes in a database system.
  88. Kirk, Steve; Burkhard, Neil, Method for accelerating queries containing local range conditions using subtraction of cumulative bitmaps.
  89. Vion-Dury, Jean-Yves; Chanod, Jean-Pierre, Method for generating presentation oriented XML schemas through a graphical user interface.
  90. Gupta, Pramod S., Method for order invariant correlated encrypting of data and SQL queries for maintaining data privacy and securely resolving customer defects.
  91. Valfridsson, Thomas; Mattsson, Ulf, Method for reencryption of a database.
  92. Ture, Mark; Krishnaprasad, Muralidhar; Krishnamurthy, Vishu, Method for suggesting web links and alternate terms for matching search queries.
  93. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  94. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  95. Jaquette,Glen Alan, Method, system, and program, for encoding and decoding input data.
  96. Fleming, James S.; Huang, Yen-min, Methods, systems and computer program products for providing a distributed associative memory base.
  97. Haruki, Hiroyoshi; Hashimoto, Mikio; Kawabata, Takeshi, Microprocessor.
  98. Ture, Mark; Krishnamurthy, Sriram; Krishnaprasad, Muralidhar; Krishnamurthy, Vishu, Minimum lifespan credentials for crawling data repositories.
  99. Luna, Michael, Mobile application traffic optimization.
  100. Luna, Michael; Ylinen, Heikki; Salorinne, Seppo, Mobile application traffic optimization.
  101. Luna, Michael, Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation.
  102. Fiatal, Trevor, Mobile device configured for communicating with another mobile device associated with an associated user.
  103. Alisawi, Rami, Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network.
  104. Luna, Michael, Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor.
  105. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
  106. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Mobile device with application or context aware fast dormancy.
  107. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management.
  108. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management with optimized polling intervals.
  109. Backholm, Ari; Bott, Ross; Luna, Michael, Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system.
  110. Backholm, Ari; Luna, Michael; Ylinen, Heikki, Mobile network traffic coordination across multiple applications.
  111. Luna, Michael, Mobile network traffic coordination across multiple applications.
  112. Luna, Michael; Backholm, Ari, Mobile traffic categorization and policy for network use optimization while preserving user experience.
  113. Fiatal, Trevor, Mobile virtual network operator.
  114. Fiatal, Trevor, Mobile virtual network operator.
  115. Luna, Michael; Bott, Ross, Monitoring mobile application activities for malicious traffic on a mobile device.
  116. Frindell, Alan H.; Hill, Dan; Gopalakrishnan, Venkitachalam; Laqtib, Abdesalam; Murray, Eric, Multikey support for multiple office system.
  117. Sutaria, Jay; Gustafson, Brian Daniel; van Gent, Robert Paul; Lin, Ruth; Merriwether, David; Sawhney, Parvinder, Multiple data store authentication.
  118. Ben-Natan, Ron, Network intrusion blocking security overlay.
  119. Bojinov, Hristo; Subramanian, Ananthan, Network storage server with integrated encryption, compression and deduplication capability.
  120. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  121. Whitmyer, Jr., Wesley W., Onsite backup for internet-based data processing.
  122. Whitmyer, Jr., Wesley W., Onsite backup for third party internet-based systems.
  123. Whitmyer, Jr., Wesley W., Onsite backup for third party internet-based systems.
  124. Whitmyer, Jr., Wesley W., Onsite backup of internet-based data in a requested format.
  125. Bott, Ross; Luna, Michael, Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic.
  126. Luna, Michael, Optimization of mobile traffic directed to private networks and operator configurability thereof.
  127. Luna, Michael; Campbell, Stan, Optimization of resource polling intervals to satisfy mobile device requests.
  128. Wendling, Michael; Kokhanovskyi, Andrii; Backholm, Ari; Bott, Ross, Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion.
  129. Fiatal, Trevor, Policy based content service.
  130. Fiatal, Trevor, Polling.
  131. Fiatal, Trevor, Predictive content delivery.
  132. Sakuma, Jun; Uramoto, Naohiko, Program, classification method and system.
  133. Krishnaprasad, Muralidhar; Bhatkar, Sachin; Nimani, Visar; Chang, Thomas; Bhavsar, Meeten, Propagating user identities in a secure federated search system.
  134. Backholm, Ari, Provisioning applications for a mobile device.
  135. Backholm, Ari, Provisioning applications for a mobile device.
  136. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  137. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  138. Alisawi, Rami, Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network.
  139. van Gent, Robert Paul; Ariel, Ido, Publishing data in an information community.
  140. Hacigumus, Vahit Hakan; Iyer, Balakrishna Raghavendra; Mehrotra, Sharad, Query optimization in encrypted database systems.
  141. Hacigumus, Vahit Hakan; Iyer, Balakrishna Raghavendra; Mehrotra, Sharad, Querying encrypted data in a relational database system.
  142. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  143. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  144. Roeder, Thomas; Ion, Mihaela, Range-based queries for searchable symmetric encryption.
  145. Owens, Timothy C.; Anderson, Duane, Registration and maintenance of address data for each service point in a territory.
  146. Luna, Michael; Tsõmbaljuk, Andrei, Request and response characteristics based adaptation of distributed caching in a mobile network.
  147. Farrell, Colm; Harpur, Liam; O'Sullivan, Patrick Joseph; Raguillat, Fred; Srikanth, Hema, Retrospective changing of previously sent messages.
  148. Farrell, Colm; Harpur, Liam; O'Sullivan, Patrick Joseph; Raguillat, Fred; Srikanth, Hema, Retrospective changing of previously sent messages.
  149. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  150. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  151. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  152. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  153. Ture, Mark; Krishnaprasad, Muralidhar; Delgado, Joaquin, Search hit URL modification for secure application integration.
  154. Ture, Mark; Krishnaprasad, Muralidhar; Delgado, Joaquin, Search hit URL modification for secure application integration.
  155. Ito, Takashi; Hattori, Mitsuhiro; Matsuda, Nori; Ota, Kazuo; Sakai, Yusuke, Search system, search method of search system, and information processing device.
  156. Roeder, Thomas M.; Kamara, Seny F., Searchable symmetric encryption with dynamic updating.
  157. Chen,Paul; Tebo,Christopher, Secure and searchable storage system and method.
  158. Friday, Victor, Secure data storage device.
  159. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  160. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  161. Yagawa, Yuichi; Yoshimura, Mitsuhiko; Maeda, Akira; Hayashi, Shigetoshi, Secure multi database system including a client, multi database server, and database server.
  162. Yagawa,Yuichi; Yoshimura,Mitsuhiko; Maeda,Akira; Hayashi,Shigetoshi, Secure multi database system including a plurality of database devices.
  163. Koide, Hiroshi; Ture, Mark; Krishnaprasad, Muralidhar; Davis, Mark; Hsin, Cindy; Bhavsar, Meeten; Yang, Steve; Nimani, Visar; Ouyang, Hui; Bhatkar, Sachin; Chang, Thomas; Baby, Thomas; Liao, David, Secure search performance improvement.
  164. Ross, David Justin; Love, Jack; Billester, Stephen E. M.; Smith, Brent R., Secure, limited-access database system and method.
  165. Luna, Michael, Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic.
  166. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  167. Backholm, Ari, Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols.
  168. Luna, Michael; Bott, Ross, Social caching for device resource sharing and management.
  169. Kogelnik, Christoph, Sub-volume level security for deduplicated data.
  170. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  171. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  172. Fujihara, Mutsumi; Kamimura, Shuichi, System and method for data management.
  173. Fleming, Michael, System and method for executing commands that are non-native to the native environment of a mobile device.
  174. Agrawal, Rakesh; Kiernan, Gerald George, System and method for fast querying of encrypted databases.
  175. Agrawal,Rakesh; Kiernan,Gerald George, System and method for fast querying of encrypted databases.
  176. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  177. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  178. Gruenwald, Bjorn J., System and method for organizing data.
  179. Gruenwald, Bjorn J., System and method for organizing data.
  180. Fiatal, Trevor, System and method for providing a network service in a distributed fashion to a mobile device.
  181. Luna, Michael; Diederich, Anton, System and method for reduction of mobile network traffic used for domain name system (DNS) queries.
  182. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, System and method for tracking billing events in a mobile wireless network for a network operator.
  183. Fiatal, Trevor, System and method of a relay server for managing communications and notification between a mobile device and a web access server.
  184. Trepetin, Stan; Reston, Mark, System and method of analyzing encrypted data in a database in near real-time.
  185. Weicher,Neil, System for encrypting data files of application programs.
  186. Fiatal, Trevor, System for providing policy based content service in a mobile network.
  187. Luna, Michael, System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation.
  188. Backholm, Ari; Alisawi, Rami, Systems and methods for application management of mobile device radio state promotion and demotion.
  189. Liu, Zhen Hua; Gawlick, Dieter, Tables with unlimited number of sparse columns and techniques for an efficient implementation.
  190. Luna, Michael; Tervahauta, Mikko, Timing of keep-alive messages used in a system for mobile network resource conservation and optimization.
  191. Selene K. Makarios ; Robert C. Fitzwilson ; Heather L. Downs, Tuple-based information space for data exchange between applications.
  192. Alvarado, Billy; Ariel, Ido; Gent, Robert Paul van, Universal data aggregation.
  193. Luna, Michael; Bott, Ross, User as an end point for profiling and optimizing the delivery of content and data in a wireless network.
  194. Jaquette, Glen A., Using variable encodings to compress an input data stream to a compressed output data stream.
  195. Jaquette, Glen A., Using variable encodings to compress an input data stream to a compressed output data stream.
  196. Jaquette, Glen A., Using variable length code tables to compress an input data stream to a compressed output data stream.
  197. Jaquette, Glen A., Using variable length encoding to compress an input data stream to a compressed output data stream.
  198. Fiatal, Trevor, Web-based access to data objects.
  199. Luna, Michael, Wireless traffic management system cache optimization using http headers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로