$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for restricting database access to managed object information using a permissions table that specifies access rights to the managed objects 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0465672 (1999-12-16)
발명자 / 주소
  • Bapat Subodh
  • Fisher Bart Lee
출원인 / 주소
  • Sun Microsystems, Inc.
대리인 / 주소
    Pennie & Edmonds LLP
인용정보 피인용 횟수 : 230  인용 특허 : 11

초록

An access control database has access control objects that collectively store information that specifies access rights by users to specified sets of the managed objects. The specified access rights include access rights to obtain management information from the network. An access control server prov

대표청구항

[ What is claimed is:] [1.]1. A computer program product for controlling access to managed objects in a distributed network, the computer program product for use in conjunction with a computer system, the computer program product comprising a computer readable storage medium and a computer program m

이 특허에 인용된 특허 (11)

  1. Bapat Subodh (Fort Lauderdale FL), Dynamic translation of network management primitives to queries to a database.
  2. Henderson Gregory Scott ; Perry Wayne B. ; Franklin Thomas Dennie ; Sanders ; Jr. Ed J. ; Cooley Von A., Network management system.
  3. Henderson Gregory Scott ; Perry Wayne B. ; Franklin Thomas Dennie ; Sanders ; Jr. Ed J. ; Cooley Von A., Network management system.
  4. Vesterinen Timo (Espoo FIX), Network management system.
  5. Henderson Gregory Scott, Selector switch control using priority table.
  6. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  7. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  8. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  9. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  10. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  11. Garner William B. ; Tisdale William R., Virtual network configuration and management system for satellite communication system.

이 특허를 인용한 특허 (230)

  1. Ribot, Stephan, Access control in client-server systems.
  2. Ribot, Stephan, Access control in client-server systems.
  3. Kudoh, Michiharu; Amano, Tomio, Access control system and methods.
  4. Kudoh,Michiharu; Amano,Tomio, Access control system and methods.
  5. Kawabata, Hiroyuki; Uchida, Hisashi; Emori, Kiyoshi; Inui, Kazuo, Access control system, access managing method, image forming device and computer program product.
  6. Hakala, Kimmo, Access rights.
  7. Yokoshi,Noriyuki, Apparatus and method for managing state of external apparatus.
  8. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Application installation system, method and computer program product for allowing a package to be installed by a third party.
  9. Johnson,Richard C., Architecture for computer-implemented authentication and authorization.
  10. Van Der Linden, Robbert; Vickery, Brian S., Associating information related to components in structured documents stored in their native format in a database.
  11. Buchholz, Cristina; Buchholz, Frank, Authorization data model.
  12. Denton, Guy S., Autonomic self-healing network.
  13. Rao, Pramod S.; Sandhir, Gaurav, Command interface.
  14. Seshadri, Srinivasan; Silberschatz, Abraham, Computer network management.
  15. Satoh, Yoshihiro, Computer system with access control mechanism.
  16. Terrill, Bernard James, Contact details service.
  17. Goger,Karl, Controlling access to electronic documents.
  18. Gaonkar, Vinay; McCloghrie, Keith; Joshi, Sanjeev Chidambar, Controlling access to managed objects in networked devices.
  19. Gaonkar, Vinay; McCloghrie, Keith; Joshi, Sanjeev Chidambar, Controlling access to managed objects in networked devices.
  20. Perell, William S.; Hayden, Neil S.; Benvin, Walter D., Data certification and verification system having a multiple-user-controlled data interface.
  21. Hofmann, Christoph H., Data processing system including explicit and generic grants of action authorization.
  22. Branson, Michael J.; Santosuosso, John M., Data security for a database in a multi-nodal environment.
  23. Branson, Michael J.; Santosuosso, John M., Data security in a multi-nodal environment.
  24. Branson, Michael J.; Santosuosso, John M., Data security in a multi-nodal environment.
  25. Aboujaoude, Roger; Eslambolchi, Hossein; McCanuel, John; Morris, Michael; Shariati, Saeid, Database application security.
  26. Aboujaoude, Roger; Eslambolchi, Hossein; McCanuel, John; Morris, Michael; Shariati, Saeid, Database application security.
  27. Matsuno, Hideki, Database server processing system, method, program and program storage device.
  28. Hirano,Hideyuki; Hashimoto,Shinji, Document distribution method and document management method.
  29. Shimomura,Osamu; Sakai,Hidenori, Document management system.
  30. Shutt,Michael J., Document management system and method.
  31. Smith,Michael David; Anonsen,Steven P., Dynamic filtering in a database system.
  32. Namini, Borsu Asisi, Global information management system and method.
  33. Namini, Borsu Asisi, Global information management system and method.
  34. Namini, Borsu Asisi, Global information management system and method.
  35. Namini, Borsu Asisi, Global information management system and method.
  36. Anuff, Ed; Harbaugh, Edith; Vonderweid, Ethan; Petersen, John; Phillips, Amy; Guyot, Noah; Moses, Dean; MacLeod, Dave; Chaudhary, Siddharth Rishi Raj, Graphical user interface for performing administration on web components of web sites in a portal framework.
  37. Anuff, Ed; Harbaugh, Edith; Vonderweid, Ethan; Petersen, John; Phillips, Amy; Guyot, Noah; Moses, Dean; MacLeod, Dave; Chaudhary, Siddharth Rishi Raj, Graphical user interface for performing administration on web components of web sites in a portal framework.
  38. Malik,Dale W., Group access management system.
  39. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  40. Ishiguro, Kazuhiro; Nabeshima, Takayuki; Toriyama, Hideyuki; Suzuki, Hiroyuki; Saka, Masaaki, Image processing apparatus, image processing method, and recording medium.
  41. Ishiguro, Kazuhiro; Nabeshima, Takayuki; Toriyama, Hideyuki; Suzuki, Hiroyuki; Saka, Masaaki, Image processing apparatus, image processing method, and recording medium.
  42. Hayashi, Toshio; Doi, Koji; Funamizu, Yoshihiro; Tsuruno, Kunio; Kanno, Satoru; Mori, Akihito; Murata, Mitsushige, Image reading apparatus, image forming apparatus incorporating the same, image reading control method therefor, and program implementing the method.
  43. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, Improving a multi-tenant database query using contextual knowledge about tenant data.
  44. Foster,Douglas R.; Heddleston,Kurt A.; Moore,Jeffrey K.; Pedersen,Richard; Schwartz,Michael I., Information access, collaboration and integration system and method.
  45. Imamichi, Takahiro, Information processing apparatus, information acquiring method, and computer program product.
  46. Hirata,Masafumi, Information providing apparatus.
  47. Brayton, D. Dwight, Integrated acceptance testing.
  48. Dettinger, Richard D.; Stevens, Richard J., Intelligent use of user data to pre-emptively prevent execution of a query violating access controls.
  49. Serani, Scott M.; McMillin, Leslie S.; Blish, III, Charles D., Interactive key control system and method of managing access to secured locations.
  50. Shaji, Ullattil; Gupta, Rahul; Cheng, Derek C. Y.; Whalen, William J.; Tanner, Carey; Treit, Jr., Mike A., Interfaces and methods for group policy management.
  51. Wiley, William L.; Bugenhagen, Michael K., Managing voice over internet protocol (VoIP) communications.
  52. Plasek, James M.; Rust, John C., Method and apparatus for administration of database partitions.
  53. Wong, Daniel ManHung; Ganesh, Amit; Sinha, Bipul; Chui, Chi Ching, Method and apparatus for automatically classifying data.
  54. Cohen, Paul M.; Kluck, Joseph R.; Nerenberg, William J.; Dent, David E.; Vora, Sanjay V., Method and apparatus for cheating an information report resulting from a diagnostic session.
  55. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  56. Minium, Dennis W.; Shelepov, Bulat Y.; Fu, Xiongjian, Method and apparatus for extensible security authorization grouping.
  57. Pederson, Donald R.; Kaufmann, Fred S.; Milby, Gregory H., Method and apparatus for protecting data retrieved from a database.
  58. Boldyrev, Sergey; Mannermaa, Mika Juhani; Kolesnikov, Dmitry, Method and apparatus for providing data access via multi-user views.
  59. Morgan, Dennis; Ross, Alan D., Method and apparatus for securely accessing data.
  60. Kavasseri,Ramanathan, Method and apparatus for value-based access to network management information.
  61. Markkanen,Panu S., Method and arrangement for securing a digital data file having financial value, terminal operating in the arrangement, and software application employing the method.
  62. Walter A. Hubis ; William G. Deitz, Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access .
  63. Moses,Dean; Petersen,John; Harbaugh,Edith; Chaston,Miles; Akesson,Hans; Shue,David; Chauhan,Sandeep; Tessier,Jean, Method and system for deploying web components between portals in a portal framework.
  64. Goel, Purushottam, Method and system for enhancing quorum based access control to a database.
  65. Shaji, Ullattil; Gupta, Rahul; Whalen, William J., Method and system for implementing group policy operations.
  66. Loeser,Henrik; Van der Linden,Robbert C.; Vickery,Brian S., Method and system for processing structured documents in a native database.
  67. Hada, Satoshi; Kudo, Michiharu; Seki, Naishin; Tozawa, Akihiko; Van der Linden, Robbert C., Method and system for providing path-level access control for structured documents stored in a database.
  68. Van Der Linden, Robbert C.; Mayr, Stefan Tobias; Vickery, Brain S., Method and system for querying structured documents stored in their native format in a database.
  69. Moses, Dean; Anuff, Ed; Griffin, Fergus; Tessier, Jean; Akesson, Hans; Petersen, John; Belunis, Tom; Harbaugh, Edith; Guyot, Noah; MacLeod, Dave; Phillips, Amy; Vonderweid, Ethan, Method and system for sharing different web components between different web sites in a portal framework.
  70. Moses, Dean; Anuff, Ed; Griffin, Fergus; Tessier, Jean; Akesson, Hans; Petersen, John; Belunis, Tom; Harbaugh, Edith; Guyot, Noah; MacLeod, Dave; Phillips, Amy; Vonderweid, Ethan, Method and system for sharing different web components between different web sites in a portal framework.
  71. Moses, Dean; Anuff, Ed; Griffin, Fergus; Tessier, Jean; Akesson, Hans; Petersen, John; Belunis, Tom; Harbaugh, Edith; Guyot, Noah; MacLeod, David; Phillips, Amy; Vonderweid, Ethan, Method and system for sharing different web components between different web sites in a portal framework.
  72. Moses, Dean; Anuff, Ed; Griffin, Fergus; Tessier, Jean; Akesson, Hans; Petersen, John; Belunis, Tom; Harbaugh, Edith; Guyot, Noah; MacLeod, Dave; Phillips, Amy; Vonderweid, Ethan, Method and system for sharing web components between web sites.
  73. Van Der Linden, Robbert C.; Vickery, Brian S., Method and system for storing structured documents in their native format in a database.
  74. Bird, Paul Miller; Chen, Yao-Ching Stephen; Kiernan, George Gerald; Logan, Scott Ian; Luniewski, Allen William; Rjaibi, Walid, Method and system for using fine-grained access control (FGAC) to control access to data in a database.
  75. Van der Linden, Robbert C., Method and system for utilizing a cache for path-level access control to structured documents stored in a database.
  76. Nolan, Shari J.; Nespor, Jeffrey S.; Harris, Jr., George W.; Lane, Jerry Parker; Merrell, Alan R.; Lagueux, Jr., Richard A.; Panas, Michael G., Method for configuration and management of storage resources in a storage network.
  77. Gupta,Arun Kumar, Method for controlling access to information.
  78. Loeser,Henrik; Van der Linden,Robbert C.; Vickery,Brian S., Method for processing structured documents stored in a database.
  79. Iyoda, Satoshi; Hibi, Yoshinobu; Naitou, Masayuki; Yoshikawa, Shigehiro, Method, apparatus, and computer product for managing operation.
  80. Von Kaenel, Tim A.; Dyrnaes, David Neil; Kumar, C. Suresh; Wayman, Jared Paul; Goodwin, Jonathan David; Trivelpiece, Craig Evan; Mihalich, Joseph; Jenkins, Anthony Page; Odom, Jr., Richard Hoyt; Stier, Mark Andrew; Obee, Anne Janetta, Method, system, and program for an improved enterprise spatial system.
  81. Von Kaenel, Tim A.; Dyrnaes, David Neil; Kumar, C. Suresh; Wayman, Jared Paul; Goodwin, Jonathan David; Trivelpiece, Craig Evan; Mihalich, Joseph; Jenkins, Anthony Page; Odom, Jr., Richard Hoyt; Stier, Mark Andrew; Obee, Anne Janetta, Method, system, and program for an improved enterprise spatial system.
  82. von Kaenel, Tim A.; Dyrnaes, David Neil; Kumar, C. Suresh; Wayman, Jared Paul; Goodwin, Jonathan David; Trivelpiece, Craig Evan; Mihalich, Joseph; Jenkins, Anthony Page; Odom, Jr., Richard Hoyt; Stier, Mark Andrew; Obee, Anne Janetta, Method, system, and program for an improved enterprise spatial system.
  83. von Kaenel, Tim A.; Dyrnaes, David Neil; Kumar, C. Suresh; Wayman, Jared Paul; Goodwin, Jonathan David; Trivelpiece, Craig Evan; Mihalich, Joseph; Jenkins, Anthony Page; Odom, Jr., Richard Hoyt; Stier, Mark Andrew; Obee, Anne Janetta, Method, system, and program for an improved enterprise spatial system.
  84. von Kaenel, Tim A.; Dyrnaes, David Neil; Kumar, C. Suresh; Wayman, Jared Paul; Goodwin, Jonathan David; Trivelpiece, Craig Evan; Mihalich, Joseph; Jenkins, Anthony Page; Odom, Jr., Richard Hoyt; Stier, Mark Andrew; Obee, Anne Janetta, Method, system, and program for an improved enterprise spatial system.
  85. von Kaenel,Tim A.; Dyrnaes,David Neil; Kumar,C. Suresh; Wayman,Jared Paul; Goodwin,Jonathan David; Trivelpiece,Craig Evan; Mihalich,Joseph; Jenkins,Anthony Page; Odom, Jr.,Richard Hoyt; Stier,Mark An, Method, system, and program for an improved enterprise spatial system.
  86. Salazar, Fernando J., Method, system, and program product for managing access to data items in a database.
  87. Kahn,Clifford E., Methods and apparatus for controlling access to a resource.
  88. Weissman, Craig; Oliver, Kevin; Jasik, Benji; Doshi, Kedar, Methods and systems for controlling access to custom objects in a database.
  89. Weissman, Craig; Oliver, Kevin; Jasik, Benji; Doshi, Kedar, Methods and systems for controlling access to custom objects in a database.
  90. Arrouye, Yan; Giampaolo, Dominic; Carol, Andrew, Methods and systems for managing data.
  91. Arrouye, Yan; Giampaolo, Dominic; Carol, Andrew, Methods and systems for managing data.
  92. Arrouye, Yan; Giampaolo, Dominic; Carol, Andrew, Methods and systems for managing data.
  93. Arrouye, Yan; Giampaolo, Dominic; Carol, Andrew; Zellers, Steve, Methods and systems for managing data.
  94. Kimberly Lynn Gajda ; Robert Tod Thorpe, Methods, systems and computer program products for logical access of data sources utilizing standard relational database management systems.
  95. Roth, Gregory Branchek; Wren, Matthew James, Multiple authority data security and access.
  96. Tony Vuong ; Subodh Bapat ; Rajeev Angal, Name service for network management architecture.
  97. Binns, Roger, Network acceleration device having logically separate views of a cache space.
  98. Ben-Natan, Ron, Network intrusion blocking security overlay.
  99. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  100. Whitmyer, Jr., Wesley W., Onsite backup for third party internet-based systems.
  101. Haran, Onn; Maislos, Ariel; Khermosh, Lior, Operation methods in an ethernet passive optical network that includes a network unit with multiple entities.
  102. Haran, Onn; Maislos, Ariel; Khermosh, Lior, Operations method in an ethernet passive optical network that includes a network unit with multiple entities.
  103. Haran, Onn; Maislos, Ariel; Khermosh, Lior, Operations method in an ethernet passive optical network that includes a network unit with multiple entities.
  104. Bugenhagen, Michael K.; Wiley, William L., Pin-hole firewall for communicating data packets on a packet network.
  105. Bugenhagen, Michael K.; Wiley, William L., Pin-hole firewall for communicating data packets on a packet network.
  106. Loeser, Henrik; Van der Linden, Robbert C.; Vickery, Brian S., Processing structured documents stored in a database.
  107. Loeser, Henrik; Van der Linden, Robbert C.; Vickery, Brian S., Processing structured documents stored in a database.
  108. Jooste, Sarel Kobus, Protected execution environments within a computer system.
  109. Jooste,Sarel Kobus, Protected execution environments within a computer system.
  110. Jooste,Sarel Kobus, Protected execution environments within a computer system.
  111. Jooste,Sarel Kobus, Protected execution environments within a computer system.
  112. Hada, Satoshi; Kudo, Michiharu; Seki, Naishin; Tozawa, Akihiko; Van Der Linden, Robbert C., Providing path-level access control for structured documents stored in a database.
  113. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  114. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  115. Weissman, Craig; Moellenhoff, Dave; Wong, Simon; Nakada, Paul, Query optimization in a multi-tenant database system.
  116. Schullian, John M.; St. Leger-Andrews, David; Weseloh, Christopher J., Railcar transport telematics system.
  117. Schullian, John M.; St. Leger-Andrews, David; Weseloh, Christopher J., Railcar transport telematics system.
  118. Barsness, Eric L.; Santosuosso, John M., Recoverable return code tracking and notification for autonomic systems.
  119. Barsness,Eric L.; Santosuosso,John M., Recoverable return code tracking and notification for autonomic systems.
  120. Skaria, Simon; Hunter, Jason T.; Dubhashi, Kedarnath A., Relational lockdown for an item store.
  121. Amit, Neta J.; Frank, Alexander, Reliable, secure and scalable infrastructure for event registration and propagation in a distributed enterprise.
  122. Johnson, David R.; Day, Robert F.; Hoefnagels, Stephan; McKee, Timothy P., Resource handling for taking permissions.
  123. Malik, Dale W., Resource list management system.
  124. Malik, Dale W., Resource list management system.
  125. Dettinger, Richard D.; Glowacki, Janice R.; Kolz, Daniel P.; Rao, Padma S.; Sperber, Marci L.; Wenzel, Shannon E., Restricting access to sensitive data.
  126. Tang,Puqi; Liu,Hsin Yuo, Security enabled network access control.
  127. Fifield, Davin J.; Macias, Marcos Calderon; Brown, Steven D., Security view-based, external enforcement of business application security rules.
  128. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  129. Bugenhagen, Michael K.; Morrill, Robert J.; Wiley, William L., System and method for adjusting CODEC speed in a transmission path during call set-up due to reduced transmission performance.
  130. Bugenhagen, Michael K.; Morrill, Robert J.; Wiley, William L., System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance.
  131. Coppage, Carl M.; Kozisek, Steven E.; Morrill, Robert J., System and method for adjusting communication parameters.
  132. Coppage, Carl M.; Kozisek, Steven E.; Morrill, Robert J.; Bugenhagen, Michael K., System and method for adjusting radio frequency parameters.
  133. Ray, Amar N.; Bugenhagen, Michael K.; Morrill, Robert J.; Chakravarthy, Cadathur V., System and method for adjusting the window size of a TCP packet through network elements.
  134. Ray, Amar N.; Bugenhagen, Michael K.; Morrill, Robert J.; Chakravarthy, Cadathur V., System and method for adjusting the window size of a TCP packet through network elements.
  135. Ray, Amar N.; Bugenhagen, Michael K.; Morrill, Robert J.; Chakravarthy, Cadathur V., System and method for adjusting the window size of a TCP packet through remote network elements.
  136. Bugenhagen, Michael K., System and method for automatically regulating messages between networks.
  137. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for call routing based on transmission performance of a packet network.
  138. Edwards, Stephen K.; Morrill, Robert J.; Bugenhagen, Michael K., System and method for collecting and managing network performance information.
  139. Bugenhagen, Michael K.; Morrill, Robert J.; Wiley, William L., System and method for collecting network performance information.
  140. Bugenhagen, Michael K.; Morrill, Robert J.; Wiley, William L., System and method for communicating network performance information over a packet network.
  141. Arnold, Timothy Kyle, System and method for contextual workflow automation.
  142. McNaughton, James L.; Heinz, John M., System and method for controlling network bandwidth with a connection admission control engine.
  143. Morrill, Robert J.; Bugenhagen, Michael K., System and method for differentiated billing.
  144. Bugenhagen, Michael K.; Morrill, Robert J.; Edwards, Stephen K., System and method for displaying a graphical representation of a network to identify nodes and node segments on the network that are not operating normally.
  145. Ciaramitaro,Barbara L.; Gruskin,Michael A.; Wolfe,Edward C., System and method for electronically managing privileged and non-privileged documents.
  146. Edwards, Stephen K.; Morrill, Robert J.; Bugenhagen, Michael K., System and method for enabling communications over a number of packet networks.
  147. Edwards, Stephen K.; Morrill, Robert J.; Bugenhagen, Michael K., System and method for enabling communications over a number of packet networks.
  148. Edwards, Stephen K.; Morrill, Robert J.; Bugenhagen, Michael K., System and method for enabling reciprocal billing for different types of communications over a packet network.
  149. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for establishing a call being received by a trunk on a packet network.
  150. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for establishing a call being received by a trunk on a packet network.
  151. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for establishing a call on a packet network.
  152. Bugenhagen, Michael K.; Stevens, Michael A.; Wiley, William L., System and method for establishing a communications session with an end-user based on the state of a network connection.
  153. Morrill, Robert J.; Coppage, Carl M.; Ray, Amar N.; Wiley, William L., System and method for establishing calls over a call path having best path metrics.
  154. Morrill, Robert J.; Coppage, Carl M.; Ray, Amar N.; Wiley, William L., System and method for establishing calls over a call path having best path metrics.
  155. Edwards, Stephen K.; Bugenhagen, Michael K., System and method for generating a graphical user interface representative of network performance.
  156. Edwards, Stephen K.; Bugenhagen, Michael K., System and method for generating a graphical user interface representative of network performance.
  157. McNaughton, James L.; Heinz, John M.; Bugenhagen, Michael K., System and method for handling communications requests.
  158. McNaughton, James L.; Heinz, John M.; Bugenhagen, Michael K., System and method for handling reservation requests with a connection admission control engine.
  159. Calderaro,Michael Joseph; Castro,Robert John; Krumenacker,Corrine Glavin; Lepore,Lynn P.; Ordway, Jr.,William Daniel; Vickers,Patricia E., System and method for improved matrix management of personnel planning factors.
  160. Morrill, Robert J., System and method for improving network performance.
  161. Heinz, John M.; McNaughton, James L., System and method for improving network performance using a connection admission control engine.
  162. Bugenhagen, Michael K.; Edwards, Stephen K.; Wiley, William L.; McNaughton, James L.; Heinz, John M.; Kozisek, Steven E., System and method for initiating diagnostics on a packet network node.
  163. Heinz, John M.; McNaughton, James L., System and method for load balancing network resources using a connection admission control engine.
  164. Heinz, John M.; McNaughton, James L., System and method for load balancing network resources using a connection admission control engine.
  165. Wiley, William L.; Bugenhagen, Michael K., System and method for managing network communications.
  166. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for managing network communications.
  167. Coppage, Carl M.; Kozisek, Steven E.; Morrill, Robert J., System and method for managing radio frequency windows.
  168. LaMastres,Daniel G.; Everson,John Michael; Norris,James W., System and method for managing security access for users to network systems.
  169. Bugenhagen, Michael K., System and method for modifying connectivity fault management packets.
  170. Bugenhagen, Michael K., System and method for modifying connectivity fault management packets.
  171. Ray, Amar, System and method for modifying network traffic.
  172. Edwards, Stephen K.; Bugenhagen, Michael K., System and method for monitoring and altering performance of a packet network.
  173. Edwards, Stephen K.; Bugenhagen, Michael K., System and method for monitoring and altering performance of a packet network.
  174. Kozisek, Steven E.; Coppage, Carl M.; Morrill, Robert J., System and method for monitoring and optimizing network performance to a wireless device.
  175. Kozisek, Steven E.; Coppage, Carl M.; Morrill, Robert J., System and method for monitoring and optimizing network performance to a wireless device.
  176. Kozisek, Steven E.; Coppage, Carl M.; Morrill, Robert J., System and method for monitoring and optimizing network performance to a wireless device.
  177. Kozisek, Steven E.; Coppage, Carl M.; Morrill, Robert J., System and method for monitoring and optimizing network performance to a wireless device.
  178. Ray, Amar N.; Chakravarthy, Cadathur V., System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets.
  179. Morrill, Robert J.; Ray, Amar N.; Coppage, Carl M., System and method for monitoring and optimizing network performance with vector performance tables and engines.
  180. Morrill, Robert J., System and method for monitoring interlayer devices and optimizing network performance.
  181. Bugenhagen, Michael K., System and method for monitoring the connection of an end-user to a remote network.
  182. Calderaro,Michael Joseph; Castro,Robert John; Krumenacker,Corrine Glavin; Lepore,Lynn P.; Ordway, Jr.,William Daniel; Vickers,Patricia E.; Baritell,Catherine Marshall; Spivey,Ann Haigler, System and method for organizational risk based on personnel planning factors.
  183. Calderaro,Michael Joseph; Castro,Robert John; Krumenacker,Corrine Glavin; Lepore,Lynn P.; Ordway, Jr.,William Daniel; Vickers,Patricia E., System and method for personnel management collaboration.
  184. Heinz, John M.; McNaughton, James L., System and method for provisioning resources of a packet network based on collected network performance information.
  185. Heinz, John M.; McNaughton, James L., System and method for provisioning resources of a packet network based on collected network performance information.
  186. Anuff, Ed; Harbaugh, Edith; Vonderweid, Ethan; Petersen, John; Phillips, Amy; Guyot, Noah; Moses, Dean; MacLeod, Dave; Chaudhary, Siddharth Rishi Raj, System and method for provisioning user access to web site components in a portal framework.
  187. Wiley, William L.; Bugenhagen, Michael K., System and method for re-routing calls.
  188. Wiley, William L.; Bugenhagen, Michael K., System and method for re-routing calls.
  189. Wiley, William L.; Bugenhagen, Michael K., System and method for re-routing calls.
  190. Bugenhagen, Michael K., System and method for regulating messages between networks.
  191. McNaughton, James L.; Heinz, John M.; Bugenhagen, Michael K.; Wiley, William L., System and method for remotely controlling network operators.
  192. McNaughton, James L.; Heinz, John M.; Bugenhagen, Michael K.; Wiley, William L., System and method for remotely controlling network operators.
  193. McNaughton, James L.; Heinz, John M.; Bugenhagen, Michael K.; Wiley, William L., System and method for remotely controlling network operators.
  194. Wiley, William L.; Bugenhagen, Michael K., System and method for restricting access to network performance information.
  195. Wiley, William L.; Bugenhagen, Michael K., System and method for restricting access to network performance information tables.
  196. Wiley, William L.; Bugenhagen, Michael K., System and method for routing calls if potential call paths are impaired or congested.
  197. Bugenhagen, Michael K.; Morrill, Robert J., System and method for routing communications between packet networks based on intercarrier agreements.
  198. Bugenhagen, Michael K.; Morrill, Robert J., System and method for routing communications between packet networks based on real time pricing.
  199. Morrill, Robert J.; Wiley, William L.; Bugenhagen, Michael K., System and method for routing data on a packet network.
  200. Morrill, Robert J.; Wiley, William L.; Bugenhagen, Michael K., System and method for routing data on a packet network.
  201. Morrill, Robert J.; Wiley, William L.; Bugenhagen, Michael K., System and method for routing data on a packet network.
  202. Morrill, Robert J.; Bugenhagen, Michael K., System and method for selecting a content delivery network.
  203. Morrill, Robert J.; Bugenhagen, Michael K., System and method for selecting a content delivery network.
  204. Morrill, Robert J.; Bugenhagen, Michael K., System and method for selecting a content delivery network.
  205. Wiley, William L.; Bugenhagen, Michael K., System and method for selecting network egress.
  206. Wiley, William L.; Bugenhagen, Michael K., System and method for selecting network ingress and egress.
  207. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  208. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  209. Heinz, John M.; McNaughton, James L., System and method for tracking application resource usage.
  210. Allen, Eugene Bradley, System and method for user file access and tracking.
  211. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for using centralized network performance tables to manage network communications.
  212. Wiley, William L.; Bugenhagen, Michael K.; Morrill, Robert J., System and method for using centralized network performance tables to manage network communications.
  213. Morrill, Robert J.; Wiley, William L.; Bugenhagen, Michael K., System and method for using distributed network performance information tables to manage network communications.
  214. Bugenhagen, Michael, System and method for using network derivations to determine path states.
  215. Bugenhagen, Michael, System and method for using network performance information to determine improved measures of path states.
  216. Weissman, Craig; Moellenhoff, Dave; Wong, Simon, System and methods of improving a multi-tenant database query using contextual knowledge about non-homogeneously distributed tenant data.
  217. Oulahal, Rachid, System for controlled access to information contained in a terminal.
  218. Chisholm, Gordon D.; Han, Richard A.; Monaghan, Andrew, System for providing secure access.
  219. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  220. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  221. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
  222. Pineau, Stephen; Lee, David, System, method and database for managing permissions to use physical devices and logical assets.
  223. Bugenhagen, Michael K.; Morrill, Robert J.; Wiley, William L., System, method for compiling network performancing information for communications with customer premise equipment.
  224. Brooks, David; Jasik, Benji; Bezar, Eric David; Chasman, Douglas; Hansma, Scott; Tamm, Steven; Tucker, Lewis Wiley; Mason, Timothy; Tzuo, Tien; Gross, Adam; Wong, Simon, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  225. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  226. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  227. Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
  228. Tang,Puqi; Liu,Hsin Yuo, Systems and methods for updating routing and forwarding information.
  229. DeGiulio, Vincent E.; Boushka, Michael E.; Karl, Nikkole K.; Cosillo, Edy S.; Bayham, Christopher A.; Alladin, Christopher F.; Matinpour, Bardia; Bushey, Jeffrey S.; Hennings, Jay J., Tracking system incorporating business intelligence.
  230. Liu, Kan; Hornung, Zelidrag, Using a web application as the default handler of local content.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로