$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computationally efficient method for trusted and dynamic digital objects dissemination 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0011800 (1998-02-14)
우선권정보 SG-0010167 (1996-06-27)
국제출원번호 PCT/SG97/00029 (1997-06-26)
§371/§102 date 19980214 (19980214)
국제공개번호 WO-9750036 (1997-12-31)
발명자 / 주소
  • Narasimhalu Arcot Desai,SGX
  • Deng Huijie,SGX
  • Wang Weiguo,SGX
출원인 / 주소
  • Kent Ridge Digital Labs, SGX
인용정보 피인용 횟수 : 74  인용 특허 : 4

초록

A computationally efficient method for trusted and dynamic dissemination of digital objects. Related digital objects of various types are grouped, based on their usage and functionality, by an information provider into distribution packages. Trustworthiness of objects contained in a distribution pac

대표청구항

[ We claim:] [18.] In a system for dissemination of digital objects over a transmission channel, said system including at least one information provider, end user, and trusted third party, where the information provider groups digital objects into distribution packages, and obtains a single certific

이 특허에 인용된 특허 (4)

  1. Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Controlled dissemination of digital information.
  2. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
  3. Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information.
  4. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.

이 특허를 인용한 특허 (74)

  1. Kenneth C. R. C. Arnold ; Ann M. Wollrath ; James H. Waldo, Apparatus and method for dynamically verifying information in a distributed system.
  2. Moses, Timothy E., Apparatus and method for electronic transaction evidence archival and retrieval.
  3. O'Sullivan, Bryan; Scheifler, Robert; Jones, Peter C.; Wollrath, Ann M.; Arnold, Kenneth C. R. C.; Waldo, James H., Apparatus and method for providing downloadable code for use in communicating with a device in a distributed system.
  4. Winger, Lowell L.; El Badawy, Ossama E. A.; Pai, Cheng-Yu, Baseband signal quantizer estimation.
  5. Winger, Lowell L.; El Badawy, Ossama E. A.; Pai, Cheng-Yu, Baseband signal quantizer estimation.
  6. Platt, David C., Cryptographically signed filesystem.
  7. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  8. Arnold, Kenneth C. R. C.; Waldo, James H.; Scheifler, Robert; Wollrath, Ann M., Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system.
  9. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in a distributed system.
  10. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in a distributed system.
  11. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in distributed system.
  12. Clarke, James B., Dynamic provisioning for filtering and consolidating events.
  13. Clarke, James B.; Clark, Sean E., Dynamic provisioning of identification services in a distributed system.
  14. Ishiguro,Ryuji, Information processing apparatus and method for managing grouped devices in an encrypted environment.
  15. Felsher, David Paul, Information record infrastructure, system and method.
  16. James H. Waldo ; John W. F. McClain, Lease renewal service.
  17. James H. Waldo ; John W. F. McClain, Lease renewal service.
  18. Wollrath, Ann M.; Jones, Peter C., Method and apparatus for determining status of remote objects in a distributed system.
  19. Arnold,Kenneth C. R. C.; Waldo,James H.; Wollrath,Ann M.; Jones,Peter C., Method and apparatus for dynamic distributed computing over a network.
  20. Jones, Peter C.; Wollrath, Ann M.; Scheifler, Robert W., Method and system for deterministic hashes to identify remote methods.
  21. Scheifler, Robert W.; Waldo, James H.; Jones, Peter C., Method and system for establishing trust in downloaded proxy code.
  22. Scheifler, Robert W.; Wollrath, Ann M.; Waldo, James H., Method and system for facilitating access to a lookup service.
  23. Le Pennec, Jean-Fran?ois; Hericourt, Olivier; Fieschi, Jacques, Method and system for generating and using a virus free file certificate.
  24. Le Pennec,Jean Fran챌ois; Hericourt,Olivier; Fieschi,Jacques, Method and system for generating and using a virus free file certificate integrated within a file.
  25. Scheifler, Robert W.; Arnold, Kenneth C. R. C.; Waldo, James H., Method and system for in-place modifications in a database.
  26. Kuno, Harumi; Sahai, Akhil; Deng, Yu, Method and system for integrating policies across systems.
  27. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  28. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  29. Robert W. Scheifler ; Kenneth C. R. C. Arnold ; James H. Waldo, Method and system for multi-entry and multi-template matching in a database.
  30. Colley,Adrian E.; Jones,Peter C.; Schiefler,Robert W.; Warres,Michael P.; Wollrath,Ann M., Method and system for passing objects in a distributed system using serialization contexts.
  31. Medvinsky,Alexander, Method of preventing unauthorized distribution and use of electronic keys using a key seed.
  32. Hersent,Olivier, Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method.
  33. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Method, apparatus, and product for leasing of group membership in a distributed system.
  34. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Method, apparatus, and product for leasing of group membership in a distributed system.
  35. Ann M. Wollrath ; Peter C. Jones, Methods and apparatus for remote method invocation.
  36. Pitsos,Errikos, Methods and system for providing a public key fingerprint list in a PK system.
  37. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  38. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  39. Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  40. Beattie,Douglas; Creighton, Jr.,Neal; Bailey,Christopher; Remy,David; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  41. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Methods and systems for distributed failure detection and recovery using leasing techniques.
  42. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, Methods, apparatus, and product for distributed garbage collection.
  43. Wollrath, Ann W.; Waldo, James H.; Riggs, Roger, Methods, apparatus, and product for distributed garbage collection.
  44. Wollrath,Ann M.; Waldo,James H.; Riggs,Roger, Methods, apparatus, and product for distributed garbage collection.
  45. Hoffberg, Steven M., Multifactorial optimization system and method.
  46. Waldo, James H.; McClain, John W. F., Network proxy.
  47. Hayes Roth,Frederick, Personal portal and secure information exchange.
  48. Kenneth Arnold ; James H. Waldo, Polymorphic token based control.
  49. Wollrath, Ann M.; Jones, Peter C.; Waldo, James H.; Scheifler, Robert W., Remote object activation in a distributed system.
  50. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, SYSTEM AND METHOD FOR FACILITATING DYNAMIC LOADING OF “STUB” INFORMATION TO ENABLE A PROGRAM OPERATING IN ONE ADDRESS SPACE TO INVOKE PROCESSING OF A REMOTE METHOD OR PROCEDURE IN ANOTHER ADDRESS S.
  51. Schlarb, John M.; Bacon, Kinney C., Secure escrow and recovery of media device content keys.
  52. Pinder, Howard G.; Maholski, Andrew D., Securing media content using interchangeable encryption key.
  53. Rowan, Michael J.; Bailey, Christopher T. M.; Chen, Kefeng; Creighton, Neal, Security systems and services to provide identity and uniform resource identifier verification.
  54. Robert W. Scheifler ; Li Gong, Stack based access control using code and executor identifiers.
  55. Scheifler, Robert W.; Gong, Li, Stack-based access control using code and executor identifiers.
  56. Duane,William M.; R��stin,Peter, System and method for certificate exchange.
  57. Hoffberg, Steven M., System and method for determining contingent relevance.
  58. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space.
  59. Wollrath,Ann M.; Waldo,James H.; Riggs,Roger, System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another space.
  60. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  61. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  62. Sohail B. Mohammed ; Kipley J. Olson, System and method for regulating a network service provider's ability to host distributed applications in a distributed processing environment.
  63. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  64. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  65. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  66. Addington, Timothy; Lehrman, Ira, Systems and methods for distributing software for a host device in a cable system.
  67. Reedy, Dennis G.; Mitchell, Larry J., Systems and methods for providing dynamic quality of service for a distributed system.
  68. Addington, Timothy; Lehrman, Ira, Systems and methods for providing flexible provisioning architectures for a host in a cable system.
  69. Addington, Timothy; Lehrman, Ira, Systems and methods for provisioning a host device for enhanced services in a cable system.
  70. Mourad,Magda M.; Munson,Jonathan P.; Nadeem,Tamer; Pacifici,Giovanni; Pistoia,Marco; Youssef,Alaa S., Transparent digital rights management for extendible content viewers.
  71. Bowen, Peter Zachary, Validation for requests.
  72. Freeman Martin, Verification of software agents and agent activities.
  73. Rosenberg, Jonathan B.; Harrison, John; Remy, David L.; Creighton, Neal L., Web site identity assurance.
  74. Rosenberg,Jonathan B.; Harrison,John C.; Remy,David L.; Creighton, Jr.,Neal L., Web site identity assurance.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로