$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for managing files in a distributed system using prioritization 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0356183 (1999-07-16)
발명자 / 주소
  • Chess, David Michael
  • Kephart, Jeffrey Owen
  • Morar, John Frederick
  • Pring, Edward John
  • White, Steve Richard
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Zarick, Gail H.Harrington & Smith, LLP
인용정보 피인용 횟수 : 52  인용 특허 : 14

초록

In a network-connected distributed system including nodes through which digital data flow, one or more of the nodes adapted to process the digital data, a method for efficiently managing the transmission of units of digital data from node to node includes the steps of receiving, at one of the one or

대표청구항

In a network-connected distributed system including nodes through which digital data flow, one or more of the nodes adapted to process the digital data, a method for efficiently managing the transmission of units of digital data from node to node includes the steps of receiving, at one of the one or

이 특허에 인용된 특허 (14)

  1. Dan Asit ; Sitaram Dinkar ; Yu Philip Shi-lung, Fileserver buffer manager based on file access operation statistics.
  2. Kidney Paul D. (Dublin IEX) Rowlands Andrew S. (Dublin IEX) Mills William P. (Dublin IEX), Image processing and map production systems.
  3. Maloney Michael P. ; Suit John M. ; Scott Christopher J. ; Woodus Francis M. ; Rubel Rich ; Karolchik Joseph, Information security analysis system.
  4. Wei Edward,TWX ; Huang Gary C.,TWX, Inter-network bridge connector provided for dynamically prioritizing frame transmission adaptive to current network transmission-state.
  5. Sorber Gordon P.,SEX, Message buffering for prioritized message transmission and congestion management.
  6. Gulick Robert C. ; Bauman Mitchell A. ; Morrissey Douglas E., Message flow protocol for avoiding deadlocks.
  7. Donaldson Albert L., Method and apparatus for filtering junk email.
  8. Sorber Gordon P.,SEX, Method and apparatus for managing control messages in a communication system.
  9. Ostrovsky Rafail ; Kushilevitz Eyal,ILX, Method and apparatus for private information retrieval from a single electronic storage device.
  10. Angelo Michael F. ; Wolford Jeff W., Method and apparatus for providing secure and private keyboard communications in computer systems.
  11. Kidder Jeff ; Adams Robert, Method and apparatus for transmitting data having minimal bandwidth requirements.
  12. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  13. Tonchev Theodore G. ; Kobata Hiroshi, Prioritized delivery and content auto select system.
  14. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.

이 특허를 인용한 특허 (52)

  1. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  2. Rihn, Jennifer; Oliver, Jonathan J., Analyzing traffic patterns to detect infectious messages.
  3. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  4. Keohane, Susann Marie; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Murillo, Jessica; Shieh, Johnny Meng-Han, Automated electronic message filing system.
  5. Keohane, Susann Marie; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Murillo, Jessica; Shieh, Johnny Meng-Han, Automated electronic message filing system.
  6. Keohane, Susann Marie; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Murillo, Jessica; Shieh, Johnny Meng-Han, Automated electronic message filing system.
  7. Grupe, Robert, Content scanning of copied data.
  8. Zhuge, John; Mu, Paul Yuedong, Controlling access to storage resources by using access pattern based quotas.
  9. Muhlestein,Mark, Decentralized appliance virus scanning.
  10. Muhlestein, Mark, Decentralized virus scanning for stored data.
  11. Tarbotton, Lee Codel Lawson; Gudgion, Kevin Andrew, Detecting malware carried by an E-mail message.
  12. Cheng, Yi-Hung, Detection of file modifications performed by malicious codes.
  13. Kennedy, Mark; Szor, Peter, Distributed anti-malware.
  14. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  15. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  16. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  17. Lavelle,Gary E.; Yuan,James, Internet based access point management system.
  18. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  19. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  20. Rihn, Jennifer; Oliver, Jonathan J., Managing infectious forwarded messages.
  21. Rihn,Jennifer; Oliver,Jonathan J., Managing infectious messages as identified by an attachment.
  22. Choi, Sung Wone, Message managing system, message managing method and recording medium storing program for that method execution.
  23. Miettinen, Markus Juhani, Method and apparatus for analyzing and detecting malicious software.
  24. Obrecht, Mark Eric; Alagna, Michael Anthony; Payne, Charles Andrew, Method and apparatus for detecting malicious code in an information handling system.
  25. Cambridge,Rodney D., Method and system for bi-directional updating of antivirus database.
  26. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  27. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  28. Alagna,Michael Anthony; Obrecht,Mark Eric; Payne,Charles Andrew; Norwood,Peter, Method, system and computer program product for security in a global computer network transaction.
  29. Wei, Peter Shaohong; Soubramanien, Viswa; Yan, Wei, Methods and apparatus for providing mitigations to particular computers.
  30. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  31. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  32. Armitano, Robert M.; Mihajlovic, Dejan L.; Muhlestein, Mark; Thompson, Timothy J.; Uren, James T.; Yoder, Alan G., Policy engine to control the servicing of requests received by a storage server.
  33. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  34. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  35. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  36. Grupe, Robert, Scanning computer files for specified content.
  37. Hungerford, Sean; Murphy, Thomas P.; Young, Rebecca Lynne, System and method for controlling updates on a mobile device.
  38. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  39. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  40. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  41. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  42. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  43. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  44. Gupta, Manish, System, method and computer program product for updating a security system definition database based on prioritized instances of known unwanted data.
  45. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  46. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  47. Rihn, Jennifer; Oliver, Jonathan J., Time zero classification of messages.
  48. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  49. Rihn, Jennifer; Oliver, Jonathan J., Time zero detection of infectious messages.
  50. Adams, David E.; Ericson, Bryan C.; Hanson, Chad J.; Kamis, George P.; Maple, James E.; Serbe, Victor A.; Yekkirala, Venkatesh S., Trusted file relabeler.
  51. Pagan, William Gabriel, Virus scanning in a computer system.
  52. Edwards,Jonathan; White,Edmund; Turner,Shawna, Virus scanning prioritization using pre-processor checking.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로