$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method providing automatic policy enforcement in a multi-computer service application

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/173
  • G06F-015/16
출원번호 US-0843715 (2004-05-11)
발명자 / 주소
  • Hunt,Galen C.
  • Hydrie,Aamer
  • Levi,Steven P.
  • Tabbara,Bassam
  • Van Antwerp,Mark D.
  • Welland,Robert V.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee &
인용정보 피인용 횟수 : 35  인용 특허 : 75

초록

Systems and methods to enforce policy in a multi-computer service application are described. The application includes multiple software modules that execute on multiple computers. The multi-computer service application has access to a communications medium that allows data communications between dif

대표청구항

The invention claimed is: 1. A computer-implemented method of enforcing policy in a multi-computer service application, the method comprising: monitoring, by a policy module, operation of an application during runtime, the application comprising multiple software modules configured to execute on re

이 특허에 인용된 특허 (75)

  1. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  2. Bixler David C. ; Hilger Eufemia P. ; Smith Jeffrey A. ; Wittlin Mark R. ; Siegel Neil G., Automated configuration of internet-like computer networks.
  3. Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
  4. Saitoh Fumihiko (Ryuuohchou JPX), Character recognition system using the generalized hough transformation and method.
  5. Nguyen, Nam; Kosacek, Michael, Cluster-based system and method of recovery from server failures.
  6. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  7. Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
  8. Mark Robert Funk ; Gera Goft IL; Dimitry Kloper IL; Shlomit Pinter IL; Esther Yeger-Lotem IL, Delivery of configuration change in a group.
  9. Hossein Moiin ; Ronald Widyono ; Ramin Modiri, Determining cluster membership in a distributed computer system.
  10. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  11. Pulsipher Eric A. ; Smith Darren D. ; Ruffatto Dominic L., Distributed internet monitoring system and method.
  12. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  13. Stuart Eichert ; Danny M. Nessett ; Wenjun Luo ; Elaine Lusher, Dynamic policy management apparatus and method using active network devices.
  14. Liu Howard T. (San Marino CA) Silvester John A. (Los Angeles CA), Dynamic resource allocation scheme for distributed heterogeneous computer systems.
  15. Bedarida, Lorenzo; Bartoli, Simone; Caser, Fabio T; Mognoni, Sabina, Flash memory architecture with page mode erase using NMOS and PMOS row decoding scheme.
  16. Hacherl Donald J., Floating single master operation.
  17. Scott L. Wiegel, Graphical network security policy management.
  18. Michael F. Deering ; Nathaniel David Naegle ; Scott R. Nelson, Graphics system configured to perform parallel sample to pixel calculation.
  19. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  20. James W. Arendt ; Ching-Yun Chao ; Rodolfo Ausgusto Mancisidor, Highly scalable and highly available cluster system management scheme.
  21. Walker ; Jr. Kenneth ; Wilson Gregory Alan, Method and apparatus for an account managed object class model in a distributed computing environment.
  22. Abu El Ata Nabil A., Method and apparatus for designing and analyzing information systems using multi-layer mathematical models.
  23. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L., Method and apparatus for dynamically altering configurations of clustered computer systems.
  24. Bal, Subhash; Iyer, Raghunath; Iyer, Sundar; Rao, Ramana, Method and apparatus for high-speed network rule processing.
  25. Chopra, Vikram; Desai, Ajay; Iyer, Raghunath; Iyer, Sundar; Jiandani, Moti; Shelat, Ajit; Yadav, Navneet, Method and apparatus for high-speed network rule processing.
  26. Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  27. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L.; Block, Robert, Method and apparatus for managing operations of clustered computer systems.
  28. Arad Naveh ; Itzhak Parnafes ; Shai Mohaban ; Steven M. Woo, Method and apparatus for policy-based management of quality of service treatments of network data traffic flows by integrating policies with application programs.
  29. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
  30. Schmidt Thomas J., Method and apparatus for secure remote programming of firmware and configurations of a computer over a network.
  31. Otsuka Kazuhiro,JPX ; Horikoshi Tsutomu,JPX ; Suzuki Satoshi,JPX, Method and equipment for extracting image features from image sequence.
  32. Short Robert T. ; Gamache Rod ; Massa Michael T. ; Vert John D., Method and system for resource monitoring of disparate resources in a server cluster.
  33. Saito Naoki ; Bennett Nicholas N. ; Burridge Robert, Method of determining dips and azimuths of fractures from borehole images.
  34. Sheikh, Tahir Q.; Johnson, Karl S.; Nguyen, Ken, Method of remote access and control of environmental conditions.
  35. Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
  36. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with stateful packet filtering.
  37. Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
  38. Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
  39. Callis, Gregory M.; Franks, Jon Kevin; Huynh, Lap Thiet; Nguyen, Loan; Shannon, Diane Iupe; Yang, David Yu Pin, Methods systems and computer program products for processing an event based on policy rules using hashing.
  40. Kumar, Arush; Larsen, Loren Douglas; Lynch, Jeffrey James, Methods, systems and computer program products for selecting an aggregator interface.
  41. Rowland Patricia J. ; Kreeger Kevin A. ; Sanders Albert R., Model-based feature tracking system.
  42. Sarit Mukherjee ; Ibrahim Kamel ; Prasant Mohapatra, Multimedia file systems using file managers located on clients for managing network attached storage devices.
  43. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  44. Waldo James H. (Dracut MA) Arnold Kenneth C. (Newton Centre MA) Erdos Marlena E. (Somerville MA) Robinson Douglas B. (Hollis NH) Hoffman D. Jeffrey (Nashua NH) Smith Lamar D. (San Jose CA) Showman Pe, Object oriented distributed computing system processing request to other object model with code mapping by object manage.
  45. Gong Li, Protection domains to provide security in a computer system.
  46. Ernest C. Coskrey, IV ; Vernon K. Boland ; Harold B. Raynor ; Steven R. McDowell, Quorum arbitrator for a high availability system.
  47. van Ingen, Catharine; Kusters, Norbert P.; Gamache, Rod N.; Rinne, Robert D., Quorum resource arbiter within a storage network.
  48. Saeki Takao (Ann Arbor MI), Real time implementation of the hough transform.
  49. Epstein, III, Edwin A.; Souvannavong, Souk; Lu, Chia-Sheng, Resistance cell architecture.
  50. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  51. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  52. Wipfel Robert A ; Murphy David, Resource management in a clustered computer system.
  53. McNally Michael ; Vetter Brian Jay, Resource model configuration and deployment in a distributed computer network.
  54. Ernest C. Coskrey, IV, Resource protection in a cluster environment.
  55. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  56. Van Renesse, Robbert, Scalable computer network resource monitoring and location system.
  57. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  58. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  59. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Sending instructions from a service manager to forwarding agents on a need to know basis.
  60. Matsunaga Shinichi,JPX, Straight line detecting method.
  61. Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
  62. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  63. Modiri Ramin ; Moiin Hossein,GBX, System and method for determining cluster membership in a heterogeneous distributed system.
  64. Nassar, Ayman, System and method for dynamic simultaneous connection to multiple service providers.
  65. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  66. Moiin Hossein, System and method for modifying membership in a clustered distributed computer system and updating system configuration.
  67. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  68. Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
  69. Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
  70. Paul Weschler, System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles.
  71. Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
  72. Christopher Sean Johnson, Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for implementing language capabilities using the same.
  73. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  74. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.
  75. Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.

이 특허를 인용한 특허 (35)

  1. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  2. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  3. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  4. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  5. Shukla, Dharma; Sagar, Akash Jeevan; Talbert, Nathan C.; Annamalai, Muthukaruppan; Schmidt, Robert B.; Bhandarkar, Aditya; Jawahar, Asad, Distributed application definition.
  6. Shukla, Dharma; Sagar, Akash Jeevan; Talbert, Nathan C.; Annamalai, Muthukaruppan; Schmidt, Robert B.; Bhandarkar, Aditya; Jawahar, Asad, Distributed component model.
  7. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  8. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  9. Boykin, James R.; Giammaria, Alberto; Griffin, Patricia D.; Lindquist, David B.; Orr, Robert L., Managing computer resources in a distributed computing system.
  10. Boykin, James R.; Giammaria, Alberto; Griffin, Patricia D.; Lindquist, David B.; Orr, Robert L., Managing computer resources in a distributed computing system.
  11. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  12. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  13. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  14. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  15. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  16. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  17. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  18. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  19. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  20. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  21. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  22. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  23. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  24. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  25. Larson, Douglas V.; Johnson, Robert, Processor acquisition of ownership of access coordinator for shared resource.
  26. Morimura, Tomohiro; Nagai, Takayuki; Sugauchi, Kiminori; Kuroda, Takaki; Arato, Yoshihiro, Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained.
  27. Morimura, Tomohiro; Nagai, Takayuki; Sugauchi, Kiminori; Kuroda, Takaki; Arato, Yoshihiro, Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained.
  28. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  29. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  30. Freund, Gregor P., Security system with methodology for interprocess communication control.
  31. Zorn, Benjamin, Specification, abstraction, and enforcement in a data center operating system.
  32. Shukla, Dharma; Sagar, Akash Jeevan; Talbert, Nathan C.; Annamalai, Muthukaruppan; Schmidt, Robert B.; Bhandarkar, Aditya; Jawahar, Asad, Stateful component authoring and execution.
  33. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  34. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  35. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트