$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method providing automatic policy enforcement in a multi-computer service application 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/177
출원번호 US-0696752 (2000-10-24)
발명자 / 주소
  • Hunt, Galen C.
  • Hydrie, Aamer
  • Levi, Steven P.
  • Tabbara, Bassam
  • Van Antwerp, Mark D.
  • Welland, Robert V.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee &
인용정보 피인용 횟수 : 49  인용 특허 : 38

초록

A system and procedure to automatically enforce policy in distributed multi-computer service applications. Such service applications include multiple software modules that execute on multiple computers. The computers have access to communications media that allow data communications between the comp

대표청구항

1. A method of enforcing policy in a multi-computer service application having a plurality of software modules that execute on a plurality of computers, the multi-computer service application further having access to a communications medium that allows data communications between different ones of t

이 특허에 인용된 특허 (38)

  1. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  2. Saitoh Fumihiko (Ryuuohchou JPX), Character recognition system using the generalized hough transformation and method.
  3. Mark Robert Funk ; Gera Goft IL; Dimitry Kloper IL; Shlomit Pinter IL; Esther Yeger-Lotem IL, Delivery of configuration change in a group.
  4. Hossein Moiin ; Ronald Widyono ; Ramin Modiri, Determining cluster membership in a distributed computer system.
  5. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  6. Pulsipher Eric A. ; Smith Darren D. ; Ruffatto Dominic L., Distributed internet monitoring system and method.
  7. Stuart Eichert ; Danny M. Nessett ; Wenjun Luo ; Elaine Lusher, Dynamic policy management apparatus and method using active network devices.
  8. Liu Howard T. (San Marino CA) Silvester John A. (Los Angeles CA), Dynamic resource allocation scheme for distributed heterogeneous computer systems.
  9. Hacherl Donald J., Floating single master operation.
  10. Michael F. Deering ; Nathaniel David Naegle ; Scott R. Nelson, Graphics system configured to perform parallel sample to pixel calculation.
  11. Bal, Subhash; Iyer, Raghunath; Iyer, Sundar; Rao, Ramana, Method and apparatus for high-speed network rule processing.
  12. Chopra, Vikram; Desai, Ajay; Iyer, Raghunath; Iyer, Sundar; Jiandani, Moti; Shelat, Ajit; Yadav, Navneet, Method and apparatus for high-speed network rule processing.
  13. Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
  14. Otsuka Kazuhiro,JPX ; Horikoshi Tsutomu,JPX ; Suzuki Satoshi,JPX, Method and equipment for extracting image features from image sequence.
  15. Saito Naoki ; Bennett Nicholas N. ; Burridge Robert, Method of determining dips and azimuths of fractures from borehole images.
  16. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  17. Rowland Patricia J. ; Kreeger Kevin A. ; Sanders Albert R., Model-based feature tracking system.
  18. Sarit Mukherjee ; Ibrahim Kamel ; Prasant Mohapatra, Multimedia file systems using file managers located on clients for managing network attached storage devices.
  19. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  20. Gong Li, Protection domains to provide security in a computer system.
  21. Ernest C. Coskrey, IV ; Vernon K. Boland ; Harold B. Raynor ; Steven R. McDowell, Quorum arbitrator for a high availability system.
  22. van Ingen, Catharine; Kusters, Norbert P.; Gamache, Rod N.; Rinne, Robert D., Quorum resource arbiter within a storage network.
  23. Saeki Takao (Ann Arbor MI), Real time implementation of the hough transform.
  24. Epstein, III, Edwin A.; Souvannavong, Souk; Lu, Chia-Sheng, Resistance cell architecture.
  25. Ernest C. Coskrey, IV, Resource protection in a cluster environment.
  26. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  27. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Sending instructions from a service manager to forwarding agents on a need to know basis.
  28. Matsunaga Shinichi,JPX, Straight line detecting method.
  29. Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
  30. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  31. Modiri Ramin ; Moiin Hossein,GBX, System and method for determining cluster membership in a heterogeneous distributed system.
  32. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  33. Moiin Hossein, System and method for modifying membership in a clustered distributed computer system and updating system configuration.
  34. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  35. Paul Weschler, System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles.
  36. Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
  37. Christopher Sean Johnson, Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for implementing language capabilities using the same.
  38. Audebert, Yves, Terminal and system for performing secure electronic transactions.

이 특허를 인용한 특허 (49)

  1. D'Alo,Salvadore; Donatelli,Alessandro; Lanfranchi,Giovanni; Marinelli,Claudio, Adaptive management method and system with automatic dependency resolution.
  2. Donatelli, Alessandro; Marinelli, Claudio; Di Balsamo, Arcangelo; D'Alo′, Salvatore, Adaptive resource management.
  3. Donatelli,Alessandro; Marinelli,Claudio; Di Balsamo,Arcangelo; D'Alo',Salvatore, Adaptive resource management method.
  4. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  5. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  6. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  7. Kunze, Tobias; Ranganathan, Ram, Automated scaling of an application and its support components.
  8. Burger, Douglas C.; Putnam, Andrew R.; Heil, Stephen F., Data processing system having a hardware acceleration plane and a software plane.
  9. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  10. Koushik, Sheshadri Supreeth; Shah, Jaimin Paresh; Lin, Yang; Shrivastava, Abhinav; Sahijwani, Vikram Vijay; Peng, Hao; Pessis, David, Desktop application fulfillment platform with multiple authentication mechanisms.
  11. Gajjala, Vijay K.; Della-Libera, Giovanni M.; Balayoghan, Vaithialingam B.; Janczuk, Tomasz, Digests to identify elements in a signature process.
  12. Gajjala, Vijay K.; Della-Libera, Giovanni M.; Balayoghan, Vaithialingam; Janczuk, Tomasz, Digests to identify elements in a signature process.
  13. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  14. Della Libera, Giovanni M.; Gajjala, Vijay K.; Janczuk, Tomasz; Lambert, John R.; Waingold, Elliot, Generic security claim processing model.
  15. Chiou, Derek T.; Lanka, Sitaram V.; Burger, Douglas C., Handling tenant requests in a system that uses hardware acceleration components.
  16. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  17. Banerjee, Debasish; Frey, Jeffrey Alan; High, Jr., Robert Howard; Schuerfeld, Ute; Zavala, David Alan, Localization in distributed computer environments.
  18. Boykin, James R.; Giammaria, Alberto; Griffin, Patricia D.; Lindquist, David B.; Orr, Robert L., Managing computer resources in a distributed computing system.
  19. Boykin, James R.; Giammaria, Alberto; Griffin, Patricia D.; Lindquist, David B.; Orr, Robert L., Managing computer resources in a distributed computing system.
  20. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  21. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  22. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  23. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  24. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  25. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  26. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  27. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  28. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  29. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  30. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  31. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  32. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  33. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  34. Kumar,Raj; Creighton,Jonathan; Srivastava,Alok K., Online instance addition and deletion in a multi-instance computer system.
  35. Kumar, Raj; Creighton, Jonathan; Srivastava, Alok K., Online instance deletion in a multi-instance computer system.
  36. Chiou, Derek T.; Lanka, Sitaram V.; Caulfield, Adrian M.; Putnam, Andrew R.; Burger, Douglas C., Partially reconfiguring acceleration components.
  37. Ezzat, Ahmed K., Providing a flexible protection model in a computer system by decoupling protection from computer privilege level.
  38. Santos, Cipriano A.; Zhu, Xiaoyun; Crowder, Harlan, Resource allocation in data centers using models.
  39. Donatelli,Alessandro; Marinelli,Claudio; Di Balsamo,Arcangelo; D'Alo',Salvatore, Resource management method and system with rule based consistency check.
  40. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  41. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  42. Della-Libera, Giovanni M.; Gajjala, Vijay K.; Janczuk, Tomasz; Lambert, John R., Security scopes and profiles.
  43. Neerincx, Matthew A.; Santos, Luiz F.; Ignat, Oleg; Lomet, David B.; Bradley, Quetzalcoatl; Ram, Raghu; Mumford, Chadwin J.; Gvozdjak, Peter; Mugundan, Balendran, Smart error recovery for database applications.
  44. Neerincx, Matthew A.; Santos, Luiz F.; Ignat, Oleg; Lomet, David B.; Bradley, Quetzalcoatl; Ram, Raghu; Mumford, Chadwin J.; Gvozdjak, Peter; Mugundan, Balendran, Smart error recovery for database applications.
  45. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  46. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  47. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  48. Greenblatt,Bruce; Chandra,Claudia; Cheng,Wen, Techniques for performing policy automated operations.
  49. Leung,Albert; Paliska,Giovanni; Greenblatt,Bruce; Chandra,Claudia, Techniques for storing data based upon storage policies.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로