$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Methods, systems and computer program products for management of configurable application programs on a network

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
  • G06F-015/16
출원번호 US-0211529 (1998-12-14)
발명자 / 주소
  • Cox David E.
  • Hayes
  • Jr. Kent F.
  • Kaminsky David L.
  • Lindquist David B.
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Ray-Yarletts
인용정보 피인용 횟수 : 86  인용 특허 : 34

초록

Management of configurable applications programs on a network is provided by using two program files for each configurable application program. The two program files are provided to a network server station which operates as the on-demand server for software deployment and may also act as the applic

대표청구항

[ That which is claimed:] [1.]1. A method for management of configurable application programs on a network comprising the steps of:installing an application program having a plurality of configurable preferences and a plurality of authorized users on a server coupled to the network;distributing an a

이 특허에 인용된 특허 (34)

  1. Reps Steven M. ; Luzzi Joseph ; Vedati Keshavprasad, Client-based application availability and response monitoring and reporting for distributed computing environments.
  2. Hayes ; Jr. Kent Fillmore, Client-server system for maintaining application preferences in a hierarchical data structure according to user and user group or terminal and terminal group contexts.
  3. Hayes ; Jr. Kent Fillmore, Client-server system with central application management and providing export agent capability for retrofitting existing hardware and applications into the system.
  4. Hayes ; Jr. Kent Fillmore, Client-server system with central application management and using fully qualified class names of object-oriented applications for determining permanent server storage locations for application confi.
  5. Regnier Barbara Ann (Mazeppa MN) Youngers David Nicholas (Rochester MN), Client/server computer systems having control of client-based application programs, and application-program control mean.
  6. Johnson Judy J. ; McElroy ; Jr. James R., Computer based records management system method.
  7. Williams Antony S. ; Atkinson Robert G., Data transfer utilizing a single functionally independent data transfer mechanism.
  8. Marlin James Warden (Longmont CO) Knudson Raymond Lowell (Boulder CO) Ruehle Thomas Michael (Boulder CO) Stuart Anthony Franke (Jamestown CO) Hughes ; III Edward Thomas (Arvada CO), Desktop management of host applications.
  9. Bladow Chad R. ; Devine Carol Y. ; Schwarz Edward ; Shamash Arieh ; Shoulberg Richard W. ; Wood Jeffrey A., Graphical user interface for Web enabled applications.
  10. Brandt Marcia Lynn ; Carmack ; Jr. Charles Embrey ; DiCecco Joseph Vincent ; Hansen Jason Robert ; Moskalik Thomas Michael ; O'Keefe Timothy Jude ; Olson Diane Elaine ; Snyder Devon Daniel, Hierarchy of preferences and preference groups.
  11. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  12. Franklin Nicholas Huston ; Bodine Bill Guy ; Cook Randall R. ; Gaisford Calvin R. ; Brooks Matthew G. ; Heesch Carla M. ; Sonderegger Kelly E., Licensing controller using network directory services.
  13. Ciscon Larry A. (Houston TX) Wise ; Jr. James D. (Houston TX) Johnson Don H. (Houston TX), Managing and distributing data objects of different types between computers connected to a network.
  14. Fawcett Philip E., Method and system for identifying and obtaining computer software from a remote computer.
  15. Wyman Robert M., Method and system for managing execution of licensed programs.
  16. Williams Evelyn L. ; Besaw Lawrence M. ; Raymond Robert ; Hermann Alfred,DEX, Method and system to provide functionality access based on user approach to network and system management tasks.
  17. Fanshier Stephen R. ; Pare My Tien ; Nacional Anthony Bautista ; Klekas Steven Lynn, Method for systems management of object-based computer networks.
  18. Beck Robert E. (Arlington Heights IL) Schoenberger Ronald L. (Clarendon Hills IL), Method of maintaining updated set-up configurations in workgroups on a network.
  19. Luzzi Joseph ; Zhu Gengxin, Method, system and program product for establishing a data reporting and display communication over a network.
  20. Horn Michael S., Network communications system manager.
  21. Kulkarni Abhay S. ; Hsu Willie, Network topology management system through a database of managed network resources including logical topolgies.
  22. Hogan Keith ; Scholl Thomas H. ; Witowsky William E., Real-time embedded software respository with attribute searching apparatus and method.
  23. Erickson Alan K., Remote computer management system.
  24. May Gregory J. ; I'Anson Colin,GB2, Remote installation of software by a management information system into a remote computer.
  25. Daly Una T. ; Huang Ying-Kuei Ann ; Parker Robert D. ; Firenze Mary E., Remote network administration methods and apparatus.
  26. Dean Jeffrey Randell ; Howard Jeffrey Langdon ; Rodriguez Ingrid Milagros, Simultaneous installation and configuration of programs and components into a network of server and client computers.
  27. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  28. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  29. Oh Chang-kook,KRX ; Lee Eun-young,KRX, System and method for manufacturing hard disk master by downloading selected programs and drivers from a host through a network.
  30. Kells Timothy Roger ; Peebles Thomas Frank, System and method for supporting distributed computing mechanisms in a local area network server environment.
  31. Dickey Conwell J., System for installation of software on a remote computer system over a network using checksums and password protection.
  32. Bonnell David N. (Houston TX) Tatarinov Kirill L. (Bellaire TX) Picard Martin W. (Bellaire TX), System for monitoring and managing computer resources and applications across a distributed computing environment using.
  33. Janis Frederick L. (Keller TX), System for providing user access control within a distributed data processing system having multiple resource managers.
  34. Kohar Handoko (Eindhoven NLX) Wegner Philippe (Eindhoven NLX) Smit Leon (Eindhoven NLX), System for setting ambient parameters.

이 특허를 인용한 특허 (86)

  1. Kembel, John Albert; Kembel, George Andrew; Kim, Daniel S.; Russell, John; Wobbrock, Jake; Kembel, Geoffrey S.; Kembel, Jeremy L.; Gabbay, Lynn D., Accessing and displaying network content.
  2. Kembel, John Albert; Kembel, George Andrew; Kim, Daniel S.; Russell, John; Wobbrock, Jake; Kembel, Geoffrey S.; Kembel, Jeremy L.; Gabbay, Lynn D.; Malloy, Scot J.; Chipkin, Adam M., Apparatus and method for dynamically coordinating the delivery of computer readable media.
  3. Giammaria, Alberto, Apparatus for automatically generating restore process during software depolyment and method therefor.
  4. Rasch, Tobias; Hinkel, Wolfram, Application configuration deployment monitor.
  5. Maeda,Naoto, Application distribution system, and distribution server and distribution method thereof.
  6. Chang,Shean Guang; Wells,John R.; Felts,Stephen, Application messaging system with flexible message header structure.
  7. Isaacson, Scott Alan; Fritch, Daniel Gene; Henderson, Larry Hal; Crabb, Lynn Wells; Nyland, Jr., James Duane, Authentication cache and authentication on demand in a distributed network environment.
  8. Isaacson,Scott A.; Fritch,Daniel G.; Henderson,Larry Hal; Crabb,Lynn W.; Nyland, Jr.,James D., Authentication on demand in a distributed network environment.
  9. Schmidt, Rene W.; Muller, Hans E.; Violet, Scott R., Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer.
  10. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  11. Culbreth, Aaron; Ahdieh, II, Keumars A.; Wiest, Peter M.; Toll, Roderick M.; Wynn, Roger H.; Pennington, Stan Dale; Gill, Timothy Arthur, Compliance interface for compliant applications.
  12. Culbreth, Aaron; Ahdieh, II, Keumars A.; Wiest, Peter M.; Toll, Roderick M.; Wynn, Roger H.; Pennington, Stan Dale; Gill, Timothy Arthur, Compliance interface for compliant applications.
  13. Cansler, Leslie Dean; Feiner, Stephen A., Computationally efficient process and apparatus for configuring a product over a computer network.
  14. Lange, Stephan; Lang, Klaus-Peter; Eschenroeder, Klaus; Wagner, Frank; Fitzer, Joachim, Configuration change without disruption of incomplete processes.
  15. Gwozdz, Kazimierz K.; Jager, Marcus Jon; Srivastava, Durgesh, Configuration system.
  16. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, Data migration.
  17. Ukis, Vladyslav, Data processing network and method for operating such.
  18. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, Delta layering.
  19. Clarisse, Olivier Bernard Henri; Westergren, Bruce A., Distributed network application management system.
  20. Eng, May D., Distributed run-time licensing.
  21. Eng,May D., Distributed run-time licensing.
  22. Newcombe, Christopher Richard; Jones, Paul David; Ellis, Richard Donald; Birum, Derrick Jason, Enabling content security in a distributed system.
  23. Block, Meinolf; Bestfleisch, Urlich; Hutzel, Daniel; Klein, Udo, File-based transport of table content.
  24. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, Formular update.
  25. Sobel, William E.; Satish, Sourabh, Geolocation-based application streaming systems, apparatus, and methods.
  26. Wang, Kevin Kuan; Stillion, Cameron Dee; Srirangam, Vijaysundar R.; Wu, Edward; Gorbet, David Paul Harris, Layered architectures for remote dynamic administration of distributed client configurations.
  27. Steeb,Curt A.; Prabu,Munisamy; Xu,Zeyong; Holladay,Martin L.; Sutton,Paul C.; Pedrizetti,Raymond D., Managing multiple devices on which operating systems can be automatically deployed.
  28. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  29. Okmianski, Anton; Morris, Greg; Webb, Timothy; Graham, Mickael; Bainbridge, David K.; Taylor, Adam L., Method and apparatus for dynamically configuring customer premises network equipment.
  30. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  31. Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason, Method and system for controlling bandwidth on client and server.
  32. Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
  33. Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
  34. Erin Marie Bourke-Dunphy ; Kartik Nadipuram Raghavan ; George Jenkins ; Bill Ingle ; Keith Logan, Method and system for integrating a client computer into a computer network.
  35. Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason; Thompson, Mikel Howard, Method and system for preloading resources.
  36. Greschler,David M.; Mysliwy,Owen; Schaefer,Stuart, Method and system for serving software applications to client computers.
  37. Sebastian Dewhurst ; Matthew Gerring GB; Ian Robert Hawkins GB, Method for accessing complex software applications through a client user interface.
  38. Flockhart, Andrew Derek; Foster, Robin H.; Mathews, Eugene P.; Taylor, John Z., Method for providing customer treatment based on specified rules in conjunction with network source address of a request originator.
  39. Greschler,David M.; Schaefer,Stuart, Method for serving third party software applications from servers to client computers.
  40. Chang,Kyusun; Dasari,Jagadish; Madduri,Hari Haranath; Mendoza,Alfredo V.; Mims,John Alan, Method of transforming an application into an on-demand service.
  41. Wyatt, Douglas K.; Hayes, Barry; McGregor, Scott, Methods and systems for adaptation, diagnosis, optimization, and prescription technology for network-based applications.
  42. Kamenetsky, Mark L.; Kusumi, Timothy J.; Pang, Adeline; Pickett, Scott K.; Kumarasamy, Uthayakumar, Methods for managing a plurality of devices using protectable communication protocol, including determination of marketing feedback to assess a response to an advertisement.
  43. Kembel, John Albert; Kembel, George Andrew; Kim, Daniel S.; Russell, John; Wobbrock, Jake; Kembel, Geoffrey S.; Kembel, Jeremy L.; Gabbay, Lynn D., Methods of obtaining application media packages.
  44. Hayes, Jr., Kent F., Methods, systems and computer program products for controlling applications/preferences of a pervasive computing device.
  45. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  46. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  47. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  48. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  49. Kembel, John Albert; Kembel, George Andrew; Kim, Daniel S.; Russell, John; Wobbrock, Jake; Kembel, Geoffrey S.; Kembel, Jeremy L.; Bella, Joseph A.; Devulkar, Sridhar T.; Wallin, Mark, Server including components for accessing and displaying internet content and for providing same to a client.
  50. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  51. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  52. Schuelein, Horst; Gartner, Klaus; Strobl, Gerhard, Software upgrades with centralized preparation.
  53. Neill, Richard W., System and associated methods for remotely enabling features.
  54. Neill, Richard W., System and associated methods for remotely enabling features.
  55. Dougherty,Charles B.; Payne,Christopher, System and method for a web-based application development and deployment tracking tool.
  56. Daniell,William T.; Daigle,Brian K., System and method for categorizing security profile rules within a computer system.
  57. Franco,Louis M.; Rose,Frank Leon; Brittan,Philip S. J.; Cunningham,Mark; Bulkin,Alex; Baskin,Mat; Blonder,Greg, System and method for delivering remotely stored applications and information.
  58. McGill,Kevin S.; Zhu,Hong; Roberts,Mark E.; Ellis,Ty H.; Townsend,Steve P.; Romanek,David A., System and method for distributing application objects.
  59. Tompkins, David, System and method for facilitating distributed server administration of server systems that are scalable and version independent.
  60. Delandro,Kwame; Cummiskey,Carol; Zupa,Anthony M., System and method for integrating a power system over a network.
  61. Mankovski, Serguei, System and method for managing, scheduling, controlling and monitoring execution of jobs by a job scheduler utilizing a publish/subscription interface.
  62. Wells,John R.; Felt,Edward P., System and method for message encryption and signing in a transaction processing system.
  63. Mankovskii, Serguei; Banger, Colin; Steele, Jody; Gray, Tomas, System and method for modifying execution of scripts for a job scheduler using deontic logic.
  64. Daniell,William T.; Daigle,Brian K.; Sevounts,Gary, System and method for protecting a security profile of a computer system.
  65. Daniell,William T.; Daigle,Brian K.; Sevounts,Gary; Frank,Mitchell R., System and method for recovering a security profile of a computer system.
  66. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  67. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  68. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  69. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  70. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  71. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  72. Franco, Louis M; Rose, Frank Leon; Brittan, Philip S. J.; Cunningham, Mark; Bulkin, Alex; Baskin, Mat; Blonder, Greg, System and method providing user interactivity across a network.
  73. Kembel, John Albert; Kembel, George Andrew; Kim, Daniel S.; Russell, John; Wobbrock, Jake; Kembel, Geoffrey S.; Kembel, Jeremy L.; Bella, Joseph A.; Devulkar, Sridhar T.; Wallin, Mark, System and methods for creating and authorizing internet content using application media packages.
  74. Gaffga, Joachim; Sattler, Juergen; Markert, Frank; Viehmann, Robert; Wolf, Werner, System configuration comparison to identify process variation.
  75. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, System on the fly.
  76. Kakimoto, Atsushi; Kikuchi, Koji, System used in plural information processing devices for commonly using peripheral device in network.
  77. Kamenetsky, Mark L.; Kusumi, Timothy J.; Pang, Adeline; Pickett, Scott K.; Kumarasamy, Uthayakumar; Atemasov, Dolores Seraphina, Systems and methods for improved multisite management and reporting of converged communication systems and computer systems.
  78. Pickett, Scott K., Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses.
  79. Nelson, Edward T.; Pickett, Scott K., Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same.
  80. Ahlert, Dirk; Guenther, Christian; Kountz, Jochen, Systems and methods for personalizing software programs.
  81. Sattler, Juergen; Gaffga, Joachim; Viehmann, Robert; Markert, Frank; Riemann, Steffen, Test engine.
  82. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, Transformation layer.
  83. Gaffga, Joachim; Sattler, Juergen; Markert, Frank; Viehmann, Robert; Wolf, Werner, Unified configuration of multiple applications.
  84. Prabu, Munisamy; Gallop, Michael J.; Pedrizetti, Raymond D.; Steeb, Curt A.; Xu, Zeyong; Sutton, Paul C.; Holladay, Martin L., Using task sequences to manage devices.
  85. Prabu, Munisamy; Gallop, Michael J.; Pedrizetti, Raymond D.; Steeb, Curt A.; Xu, Zeyong; Sutton, Paul C.; Holladay, Martin L., Using task sequences to manage devices.
  86. Peterson,Charlotte G.; Reddy,Sada; Demko,Lisa; Pumphrey,Jeannie; Kornish,Douglas R.; Hatti,Harsha; Giancaspro,Kim; Stanard,Christopher L., Web-based system for managing software assets.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트