$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enforcing access control on resources at a location other than the source location 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0238012 (1999-01-26)
발명자 / 주소
  • Srikanth Shoroff
  • F. Soner Terek
  • Sankrant Sanu
  • Andrew Wallace
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Workman, Nydegger, Seeley
인용정보 피인용 횟수 : 147  인용 특허 : 11

초록

Systems and methods for enforcing access control on secured documents that are stored outside of the direct control of the original application that would normally store and govern access to the documents. Access security can be enforced at a search engine associated with an indexing system that com

대표청구항

1. In a networked computing environment having a first data storage location and an indexing system, wherein the first data storage location employs a first access control system to control access to documents stored at the first data storage location, and wherein the indexing system employs a secon

이 특허에 인용된 특허 (11)

  1. Bodamer Roger ; Draaijer Jacco ; Voss Eric ; Mani Raghu, Apparatus and method for transparent access of foreign databases in a heterogeneous database system.
  2. Ratnaraj Paul J. ; McCartney William Gerard ; To Son ; Crispi Steven J. ; Akhavein Jalal D., Authenticated access to internet based research and data services.
  3. Proust Philippe,FRX ; Laget Anne,FRX ; Huet Cedric,FRX, Communication system for managing safely and independently a plurality of applications by each user card and corresponding user card and management method.
  4. Nukui Harumi (Kanagawa JPX), Computer network capable of accessing file remotely between computer systems.
  5. Noble William B. (Santa Monica CA) Patel Bhadra K. (Anaheim CA) Wang Jenny K. (Cerritos CA), Federated information management (FIM) system and method for providing data site filtering and translation for heterogen.
  6. Chang Daniel T. ; Donn Siyi Terry ; Hembry Douglas Michael ; Lee Tae Jae ; Soetarman Basuki N. ; Summers Robert N. ; Tung Frank C., Federated searching of heterogeneous datastores using a federated datastore object.
  7. Morgenstern Matthew, Integration platform for heterogeneous databases.
  8. Gladney Henry Martin, Method and system for a federated digital library by managing links.
  9. Blakley ; III George R. (Austin TX) Hickerson L. Brooks (Austin TX) Milman Ivan M. (Austin TX) Gittins Robert S. (Woodland Park CO) Scheer Douglas B. (Boynton Beach FL) Wilson John H. (Austin TX), Method and system for providing a user access to multiple secured subsystems.
  10. Gladney Henry Martin ; Reimer James Allen, Object-oriented access control method and system for military and commercial file systems.
  11. Shklar Leon ; Makower David, System for indexing and displaying requested data having heterogeneous content and representation.

이 특허를 인용한 특허 (147)

  1. Plumb, Graham Charles; Keyes, Warren Leslie, Access control based on operation expiry data.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Adding information or functionality to a rendered document via association with an electronic counterpart.
  4. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Adding value to a rendered document.
  5. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Aggregate analysis of text captures performed by multiple users from rendered documents.
  6. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Applying scanned information to identify content.
  7. Fontoura, Marcus Felipe; Neumann, Andreas; Rajagopalan, Sridhar; Shekita, Eugene J.; Zien, Jason Yeong, Architecture for an indexer.
  8. Fontoura,Marcus F.; Neumann,Andreas; Rajagopalan,Sridhar; Shekita,Eugene J.; Zien,Jason Yeong, Architecture for an indexer with fixed width sort and variable width sort.
  9. King, Martin; Grover, Dale; Kushler, Clifford; Stafford-Fraser, James; Mannby, Claes-Fredrik, Archive of text captures from rendered documents.
  10. King,Martin T.; Grover,Dale L.; Kushler,Clifford A.; Stafford Fraser,James Q., Archive of text captures from rendered documents.
  11. Van Der Linden, Robbert; Vickery, Brian S., Associating information related to components in structured documents stored in their native format in a database.
  12. Zeller, Mark Jeremy; Kapadia, Arshish Cyrus; Dasan, Shajan, Associating security trimmers with documents in an enterprise search system.
  13. Zeller, Mark Jeremy; Kapadia, Arshish Cyrus; Dasan, Shajan, Associating security trimmers with documents in an enterprise search system.
  14. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Association of a portable scanner with input/output and storage devices.
  15. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Association of a portable scanner with input/output and storage devices.
  16. Grinchenko, Pavlo O.; Kraemer, Erin H.; Hyman, Michael I.; Bezos, Jeffrey P.; Schoenbaum, Ronald J., Automated processes for seeking authorization to make printed publications searchable on a network.
  17. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Automatic modification of web pages.
  18. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Automatic modification of web pages.
  19. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Automatic modification of web pages.
  20. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Automatically capturing information, such as capturing information using a document-aware device.
  21. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J.; Daley-Watson, Christopher J., Automatically providing content associated with captured information, such as information captured in real-time.
  22. Baltar, Alexandre de Queiroz; Bianchi, Silvia Cristina Sardela; Gomes, Marcio da Ros; Paraiso, Marcos Vinicius Landivar; Varga, Sergio, Autonomous trust evaluation engine to grant access to user private data.
  23. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Capturing text from rendered documents using supplement information.
  24. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Capturing text from rendered documents using supplemental information.
  25. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Capturing text from rendered documents using supplemental information.
  26. Fujita, Takeshi; Kawachi, Tsutomu; Ogawa, Keiichi, Command execution program and command execution method.
  27. Chu, William W. Y., Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions.
  28. Chu, William W. Y., Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions.
  29. Chu, William W. Y., Computer system including CPU or peripheral bridge directly connected to a low voltage differential signal channel that communicates serial bits of a peripheral component interconnect bus transaction in opposite directions.
  30. Chu, William W. Y., Computer system including peripheral bridge to communicate serial bits of peripheral component interconnect bus transaction and low voltage differential signal channel to convey the serial bits.
  31. Chu,William W. Y., Computer system utilizing multiple computer modules functioning independently.
  32. Chu,William W. Y., Computer system utilizing multiple computer modules with password protection.
  33. Chu,William W. Y., Computer system utilizing multiple computer modules with serial interface.
  34. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Content access with handheld document data capture devices.
  35. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Data capture from rendered documents using handheld device.
  36. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Data capture from rendered documents using handheld device.
  37. Chu, William W. Y., Data security method and device for computer modules.
  38. Chu, William W. Y., Data security method and device for computer modules.
  39. Chu, William W. Y., Data security method and device for computer modules.
  40. Chu, William W. Y., Data security method and device for computer modules.
  41. Chu, William W. Y., Data security method and device for computer modules.
  42. Chu, William W. Y., Data security method and device for computer modules.
  43. Chu, William W. Y., Data security method and device for computer modules.
  44. Chu, William W. Y., Data security method and device for computer modules.
  45. Chu, William W. Y., Data security method and device for computer modules.
  46. Chu, William W. Y., Data security method and device for computer modules.
  47. Gajjala, Vijay K.; Della-Libera, Giovanni M.; Balayoghan, Vaithialingam B.; Janczuk, Tomasz, Digests to identify elements in a signature process.
  48. Gajjala, Vijay K.; Della-Libera, Giovanni M.; Balayoghan, Vaithialingam; Janczuk, Tomasz, Digests to identify elements in a signature process.
  49. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Distributed document version control.
  50. Herbach, Jonathan D.; Gilchrist, Gary, Distributed document version control.
  51. Canning, William P.; Mowers, David R.; Yip, Geeman; Ungureanasu, Cezar, Distributing permission information a metadirectory.
  52. Hirano,Hideyuki; Hashimoto,Shinji, Document distribution method and document management method.
  53. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Document enhancement system and method.
  54. Lempel, Ronny; Leyba, Todd; McPherson, Jr., John A.; Perez, Justo Luis, Enforcing native access control to indexed documents.
  55. Schlesinger, David; Waite, Timothy; Thangarathinam, Thiru, Entitlement security and control.
  56. Schlesinger, David; Waite, Timothy; Thangarathinam, Thiru, Entitlement security and control.
  57. Schlesinger, David; Waite, Timothy; Thangarathinam, Thiru, Entitlement security and control.
  58. Schlesinger,David; Waite,Timothy; Thangarathinam,Thiru, Entitlement security and control.
  59. Schlesinger,David, Entitlement security and control for information system entitlement.
  60. Shapiro, William M., Family of encryption keys.
  61. Morimoto, Masahiro; Shirai, Yoshikatsu; Takeda, Hideki, Forensic system, forensic method, and forensic program.
  62. Della Libera, Giovanni M.; Gajjala, Vijay K.; Janczuk, Tomasz; Lambert, John R.; Waingold, Elliot, Generic security claim processing model.
  63. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Handheld device for capturing text from both a document printed on paper and a document displayed on a dynamic display device.
  64. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Identifying a document by performing spectral analysis on the contents of the document.
  65. King, Martin T.; Mannby, Claes-Fredrik; Smith, Michael J., Image search using text-based elements within the contents of images.
  66. King, Martin T.; Stafford Fraser, James Q.; Kushler, Clifford A.; Grover, Dale L., Information gathering system and method.
  67. Kapadia, Arshish Cyrus; Burke, Jonah Sarbin, Integrating enterprise search systems with custom access control application programming interfaces.
  68. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  69. Yoon, Hyun-sik; Cho, Joon-ho; Yi, Kyoung-hoon; Choi, Sang-hoon, Method and apparatus for accessing home storage or internet storage.
  70. Gunturu, Anilkumar, Method and apparatus for load balancing based on XML content in a packet.
  71. Gunturu, Anilkumar, Method and apparatus for load balancing based on packet header content.
  72. Gunturu,Anilkumar, Method and apparatus for load balancing based on packet header content.
  73. Aggarwal, Neerav, Method and apparatus for location-based digital rights management.
  74. Gai, Silvano; McCloghrie, Keith; Kanekar, Bhushan M., Method and apparatus for organizing, storing and evaluating access control lists.
  75. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  76. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Method and system for character recognition.
  77. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Method and system for character recognition.
  78. Drepper, Ulrich, Method and system for kernel level filtering.
  79. Wardrop, Patrick Ryan, Method and system for peer-to-peer authorization.
  80. Wardrop,Patrick Ryan, Method and system for peer-to-peer authorization.
  81. Hada, Satoshi; Kudo, Michiharu; Seki, Naishin; Tozawa, Akihiko; Van der Linden, Robbert C., Method and system for providing path-level access control for structured documents stored in a database.
  82. Van Der Linden, Robbert C.; Mayr, Stefan Tobias; Vickery, Brain S., Method and system for querying structured documents stored in their native format in a database.
  83. Van Der Linden, Robbert C.; Vickery, Brian S., Method and system for storing structured documents in their native format in a database.
  84. Gerthe, John David, Method and system for transparent file proxying.
  85. Van der Linden, Robbert C., Method and system for utilizing a cache for path-level access control to structured documents stored in a database.
  86. Kraft,Reiner; Neumann,Andreas, Method for handling anchor text.
  87. Browne, Michael E.; Wightwick, Glenn R., Method for managing data access requests utilizing storage meta data processing.
  88. Fontoura,Marcus Felipe; Lempel,Ronny; Qi,Runping; Zien,Jason Yeong, Method for searching documents for ranges of numeric values.
  89. Lection,David B.; Masselle,Eric L., Method, system and program product for controlling web content usage.
  90. Fontoura, Marcus F.; Neumann, Andreas; Qi, Runping; Shekita, Eugene J., Method, system, and program for handling redirects in a search engine.
  91. King,Martin T.; Grover,Dale L.; Kushler,Clifford A.; Stafford Fraser,James Q., Methods, systems and computer program products for data gathering in a digital and hard copy document environment.
  92. Chu,William W. Y., Multiple module computer system and method.
  93. Chu,William W. Y., Multiple module computer system and method.
  94. Chu, William W. Y., Multiple module computer system and method including differential signal channel comprising undirectional serial bit channels.
  95. Chu, William W. Y., Multiple module computer system and method including differential signal channel comprising unidirectional serial bit channels to transmit encoded peripheral component interconnect bus transaction data.
  96. Chu, William W. Y., Multiple module computer system and method using differential signal channel including unidirectional, serial bit channels.
  97. Ackaouy, Emmanuel; Amdur, Matthew; Ayyar, Kartik; Grunwald, David; Prakash, Ashish; Quirion, Brian, Network caching device including translation mechanism to provide indirection between client-side object handles and server-side object handles.
  98. Ezaki,Toshihiro; Ito,Asanobu; Nishioka,Minoru, Network management system having access manager for managing access to recording medium apparatus.
  99. Shapiro, William M.; Donahue, James; Herbach, Jonathan D., Offline access in a document control system.
  100. King, Martin T.; Mannby, Claes-Fredrik; Arends, Thomas C.; Bajorins, David P.; Fox, Daniel C., Optical scanners, such as hand-held optical scanners.
  101. Plumb, Graham Charles, Over network operation restriction enforcement.
  102. Chu, William W. Y., Password protected modular computer method and device.
  103. Chu, William W. Y., Password protected modular computer method and device.
  104. Chu, William W. Y., Password protected modular computer method and device.
  105. Chu, William W. Y., Password protected modular computer method and device.
  106. Chu, William W. Y., Password protected modular computer method and device.
  107. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Performing actions based on capturing information from rendered documents, such as documents under copyright.
  108. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Performing actions based on capturing information from rendered documents, such as documents under copyright.
  109. Fontoura, Marcus Felipe; Kraft, Reiner; Leung, Tony Kai-Chi; McPherson, Jr., John A.; Neumann, Andreas; Qi, Runping; Rajagopalan, Sridhar; Shekita, Eugene J.; Zien, Jason Yeong, Pipelined architecture for global analysis and index building.
  110. Fontoura,Marcus F.; Kraft,Reiner; Leung,Tony K.; McPherson, Jr.,John Ai; Neumann,Andreas; Qi,Runping; Rajagopalan,Sridhar; Shekita,Eugene J.; Zien,Jason Yeong, Pipelined architecture for global analysis and index building.
  111. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Portable scanning device.
  112. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Processing techniques for text capture from a rendered document.
  113. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Processing techniques for text capture from a rendered document.
  114. King, Martin Towle; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Quentin, Processing techniques for text capture from a rendered document.
  115. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Q.; Grover, Dale L., Processing techniques for visual capture data from a rendered document.
  116. King, Martin T.; Kushler, Clifford A.; Stafford-Fraser, James Q.; Grover, Dale L., Processing techniques for visual capture data from a rendered document.
  117. Hada, Satoshi; Kudo, Michiharu; Seki, Naishin; Tozawa, Akihiko; Van Der Linden, Robbert C., Providing path-level access control for structured documents stored in a database.
  118. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Publishing techniques for adding value to a rendered document.
  119. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Search engines and systems with handheld document data capture devices.
  120. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Search engines and systems with handheld document data capture devices.
  121. Fontoura, Marcus F.; Lempel, Ronny; Qi, Runping; Zien, Jason Y., Searching documents for ranges of numeric values.
  122. Fontoura, Marcus Felipe; Lempel, Ronny; Qi, Runping; Zien, Jason Yeong, Searching documents for ranges of numeric values.
  123. Fontoura, Marcus Felipe; Lempel, Ronny; Qi, Runping; Zien, Jason Yeong, Searching documents for ranges of numeric values.
  124. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Secure data gathering from rendered documents.
  125. Etheridge,James K., Secure network access control.
  126. Della-Libera, Giovanni M.; Gajjala, Vijay K.; Janczuk, Tomasz; Lambert, John R., Security scopes and profiles.
  127. Shelton, Robert, Standing order database search system and method for internet and intranet application.
  128. Shelton, Robert H., Standing order database search system and method for internet and intranet application.
  129. Holbrook,Hugh, Statistics-preserving ACL flattening system and method.
  130. Frey, Bridget J.; Markoff, Matthew S.; Smedberg, Michael E., System and method for administering security in a corporate portal.
  131. Gursky,Dennis; Peltonen,Kyle G.; Samsonov,Yevgeniy A., System and method for secure full-text indexing.
  132. Knauft, Christopher L.; Franklin, Martin, System and method of dynamically generating index information.
  133. Knauft, Christopher L.; Franklin, Martin, System and method of dynamically generating index information.
  134. Bess, Dwayne Lamarr; Brischke, Harold Allan; Keller, Andrew Charles; Wagner-Krankel, Dale Alan; Tijerina, Jacob Garza; Connolly, Jr., Billy Ray; O'Connor, Karen Ann; McDaniel, James William; Lewis, R, System and method of providing electronic access to one or more documents.
  135. Kraft, Reiner; Neumann, Andreas, System and program for handling anchor text.
  136. Sinclair,Michael J., Tactile overlay for an imaging display.
  137. Ellison, Carl M.; Leach, Paul J.; Lampson, Butler W.; Dunn, Melissa W.; Pandya, Ravindra Nath; Kaufman, Charles William, Transformation of sequential access control lists utilizing certificates.
  138. Ellison, Carl Melvin; Leach, Paul J.; Lampson, Butler Wright; Dunn, Melissa W.; Pandya, Ravindra Nath; Kaufman, Charles William, Transformation of sequential access control lists utilizing certificates.
  139. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Transparent authentication process integration.
  140. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Transparent authentication process integration.
  141. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  142. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  143. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  144. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  145. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Triggering actions in response to optically or acoustically capturing keywords from a rendered document.
  146. Dowds, Mark; Davey, Paul Richard; Maxwell, Ian Ronald, Using a communications network to verify a user searching data.
  147. King, Martin T.; Mannby, Claes-Fredrik; Valenti, William, Using gestalt information to identify locations in printed information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로