$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Message processing in a service oriented architecture 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0133109 (2005-05-19)
등록번호 US-7310684 (2007-12-18)
발명자 / 주소
  • Patrick,Paul B
  • Aletty,Ashok
  • Kasi,Jayaram
  • Kapoor,Chet
  • Urhan,Tolga
  • Mihic,Matthew
출원인 / 주소
  • BEA Systems, Inc.
대리인 / 주소
    Fliesler Meyer LLP
인용정보 피인용 횟수 : 59  인용 특허 : 25

초록

A system, method and media for a service oriented architecture. This description is not intended to be a complete description of, or limit the scope of, the invention. Other features, aspects and objects of the invention can be obtained from a review of the specification, the figures and the claims

대표청구항

What is claimed is: 1. A method for processing messages, comprising: conveying a message in a first direction along a first path in a message processing graph wherein the first path includes at least one message processing node; affording each one of the at least one message processing node the opp

이 특허에 인용된 특허 (25)

  1. Andrade Juan M. (Chatham NJ) Carges Mark T. (New Providence NJ) Felts Stephen D. (Rockaway NJ), Apparatus and methods for performing an application-defined operation on data as part of a system-defined operation on t.
  2. Reiter Bernadette G. (Longmont CO) Castor John W. (Pine CO) Blume R. J. Carter (Aurora CO) Schewe Roy A. (Boulder CO) Shepley Leonard D. (Littleton CO), Associative data access method (ADAM) and its means of implementation.
  3. Bird Raymond F. (Durham NC) Britton Kathryn H. (Chapel Hill NC) Chung Tein-Yaw D. (Cary NC) Edwards Allan K. (Raleigh NC) Mathew Johny (Chapel Hill NC) Pozefsky Diane P. (Chapel Hill NC) Sarkar Soumi, Compensation for mismatched transport protocols in a data communications network.
  4. Schreiber Benn L. (Issaquah WA) Bismuth Robert (Redmond WA) Cockcroft Claire R. (Redmond WA) Ozur Mark C. (Redmond WA) Doherty Dennis J. (Bellevue WA), Computer network providing transparent operation on a compute server and associated method.
  5. Pag Peter (Darmstadt DEX) Warns Ruediger (Alsbach DEX) Kennedy Terence G. (Darmstadt DEX) Ejtemai-Jandaghi Omid (Darmstadt DEX), Cooperative processing interface and communication broker for heterogeneous computing environments.
  6. Alao,Rachad; Delpuch,Alain; Dureau,Vincent; Henrard,Jose; Huntington,Matthew; Lam,Waiman, Digital television application protocol for interactive television.
  7. Gardner Jonathan, Enhanced user view/update capability for managing data from relational tables.
  8. Mitra, Kanchan, Framework for applying operations to nodes of an object model.
  9. Hu, Carl, Lock free data structure maintenance.
  10. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  11. Smith, Jeffrey C., Method and apparatus for effecting secure document format conversion.
  12. Robergé, James; Soble, Jeffrey; Donati, Alessandro Davide, Method and system for generation of medical reports from data in a hierarchically-organized database.
  13. Kim, Young-Eun, Method for data synchronization in web-based communications management system.
  14. Bourbonnais,Serge; Hamel,Elizabeth Belva; Lindsay,Bruce G.; Liu,Chengfei; Stankiewitz,Jens; Truong,Tuong Chanh, Method, system, and program for merging log entries from multiple recovery log files.
  15. Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA) Ewald Alan N. (Ashby MA), Methods and apparatus for implementing data bases to provide object-oriented invocation of applications.
  16. Bernstein, Philip A.; Madhavan, Jayant, Methods and system for model matching.
  17. Holden James M. ; Levin Stephen E. ; Wrench ; Jr. Edwin H. ; Snow ; deceased David W., Mixed enclave operation in a computer network with multi-level network security.
  18. Barrett Linda (Raleigh NC) Long Lynn D. (Chapel Hill NC) Menditto Louis F. (Raleigh NC) Stagg Arthur J. (Raleigh NC) Ward Raymond E. (Durham NC), Multi-path channel (MPC) interface with user transparent, unbalanced, dynamically alterable computer input/output channe.
  19. Ashton James L. (Cary NC) Gibbs Robert T. (Raleigh NC) Gierlach Michael F. (Raleigh NC) Gray James P. (Chapel Hill NC) Knauth Jeffrey G. (Raleigh NC) Platel Guy (La Gaude NC FRX) Pretzman Stuart W. (, Non-disruptive session recovery.
  20. Kaplan, Marc A.; Shaw, Kelly Anne; Sturman, Daniel C., Reduction and optimization of information processing systems.
  21. Abdelnur Alejandro ; Gupta Abhay ; Callaghan Brent, Resources sharing on the internet via the HTTP.
  22. Aridor, Yariv; Factor, Michael; Eilam, Tamar; Schuster, Assaf; Teperman, Avi, Speculative caching of individual fields in a distributed object system.
  23. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
  24. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information acce.
  25. Laggis George E. (Naperville IL) Meyer Paul F. (Wheaton IL), User and application program transparent resource sharing multiple computer interface architecture with kernel process l.

이 특허를 인용한 특허 (59)

  1. Little, Mark Cameron, Addressable dispatchers in distributed computing.
  2. Khapre, Vishal Dilip; Olson, John Curtis, Alert event platform.
  3. Mercuri, Marc, Allocation of resources between web services in a composite service.
  4. Cawlfield, Kevin J.; Chen, Chang W.; Harding, Mitchell P.; Hollinger, Michael C.; Reddock, Michael R., Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment.
  5. Cawlfield, Kevin J.; Chen, Chang W.; Harding, Mitchell P.; Hollinger, Michael C.; Reddock, Michael R., Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment.
  6. De Armas, Mario E.; Groeger, Steven; Kreger, Heather M.; Laird, Robert G.; Le Hors, Arnaud J., Association of service policies based on the application of message content filters.
  7. De Armas, Mario E.; Groeger, Steven; Kreger, Heather Marie; Laird, Robert G.; Le Hors, Arnaud J., Association of service policies based on the application of message content filters.
  8. Slick, Royce; Matsubayashi, Don; Piazza, Kevin; Dusberger, Dariusz; Iwamoto, Neil, Authenticating a device with a server over a network.
  9. Paramasivam, Kartik; Katti, Jayteerth N.; Shanbhag, Vinod; Poornalingam, Ramasubramaniam, Automatically re-starting services.
  10. Wada, Hiroshi; Weber, Ingo, Checking undoability of an API-controlled computing system.
  11. Mercuri, Marc, Communication and coordination between web services in a cloud-based computing environment.
  12. Cardone,Richard J.; Hermann,Reto; Schade,Andreas; Trautman,William F., Consistent snapshots of dynamic heterogeneously managed data.
  13. Duggal, Dave M.; Malyk, William J., Declarative software application meta-model and system for self-modification.
  14. Duggal, Dave M.; Malyk, William J., Declarative software application meta-model and system for self-modification.
  15. Duggal, Dave M; Malyk, William J, Declarative software application meta-model and system for self-modification.
  16. Goldberg, Arnold; Asok, Satish; Lee, David T., Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof.
  17. Pfitzmann, Birgit M., Determining an applicable policy for an incoming message.
  18. Mercuri, Marc, Dynamic rerouting of service requests between service endpoints for web services in a composite service.
  19. Mercuri, Marc, Dynamic rerouting of service requests between service endpoints for web services in a composite service.
  20. Beaty, Kirk A.; Bobroff, Norman; Kar, Gautam; Khanna, Gunjan; Kochut, Andrzej, Dynamically managing virtual machines.
  21. Cawlfield, Kevin J.; Chen, Chang W.; Harding, Mitchell P.; Hollinger, Michael C.; Reddock, Michael R., Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost history.
  22. Cawlfield, Kevin J.; Chen, Chang W.; Harding, Mitchell P.; Hollinger, Michael C.; Reddock, Michael R., Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost history.
  23. Cawlfield, Kevin J.; Chen, Chang W.; Harding, Mitchell P.; Hollinger, Michael C.; Reddock, Michael R., Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost history.
  24. Cawlfield, Kevin J.; Chen, Chang W.; Harding, Mitchell P.; Hollinger, Michael C.; Reddock, Michael R., Estimating migration costs for migrating logical partitions within a virtualized computing environment based on a migration cost history.
  25. Mackenzie, David; Smith, Benjamin Campbell; Bishopric, Anthony, File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform.
  26. Stallings, Jared D., HLA to XML conversion.
  27. Smith, Benjamin Campbell; Mackenzie, David; Lu, Yiming; Potrebic, Peter; Jourda, Florian; Parmar, Kunal, Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform.
  28. Blinick, Stephen L.; Dickey, Clement L.; Hu, Xioa-Yu; Ioannou, Nikolas; Koltsidas, Ioannis; Muench, Paul H.; Pletka, Roman; Seshadri, Sangeetha, Managing metadata for caching devices during shutdown and restart procedures.
  29. West, III, Earle H., Method and apparatus for measuring the end-to-end performance and capacity of complex network service.
  30. West, III, Earle H., Method and apparatus for measuring the end-to-end performance and capacity of complex network service.
  31. Dorman, Griffin, Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment.
  32. Hamada, Masaki; Fuji, Hitoshi; Iwamura, Makoto, Method and system for detecting denial-of-service attack.
  33. Ji, Minwen; Waldspurger, Carl A.; Zedlewski, John, Method and system for determining a cost-benefit metric for potential virtual machine migrations.
  34. Gura, Gerald Alan, Method and system for validating tasks.
  35. Smith, Michael, Mobile platform file and folder selection functionalities for offline access and synchronization.
  36. Mercuri, Marc, Optimized consumption of third-party web services in a composite service.
  37. Mercuri, Marc, Optimized consumption of third-party web services in a composite service.
  38. Little, Mark Cameron, Policy enforcement in a distributed computing system.
  39. Isci, Canturk; Wang, Chengwei; Bhatt, Chirag; Shanmuganathan, Ganesha; Holler, Anne, Process demand prediction for distributed power and resource management.
  40. Isci, Canturk; Wang, Chengwei; Bhatt, Chirag; Shanmuganathan, Ganesha; Holler, Anne Marie, Process demand prediction for distributed power and resource management.
  41. Mercuri, Marc, Providing a monitoring service in a cloud-based computing environment.
  42. Mercuri, Marc, Providing a monitoring service in a cloud-based computing environment.
  43. Mercuri, Marc, Providing a monitoring service in a cloud-based computing environment.
  44. Mercuri, Marc, Providing a monitoring service in a cloud-based computing environment.
  45. Duggal, Dave M.; Malyk, William J., Resource processing using an intermediary for context-based customization of interaction deliverables.
  46. Duggal, Dave M; Malyk, William J, Resource processing using an intermediary for context-based customization of interaction deliverables.
  47. Stauth, Sean Alexander; Wee, Sewook, Secure and automated credential information transfer mechanism.
  48. Stauth, Sean; Wee, Sewook, Secure and automated credential information transfer mechanism.
  49. Chern, Wei-Jhy, Security token destined for multiple or group of service providers.
  50. Little, Mark Cameron, Service oriented architecture with dynamic policy enforcement points.
  51. Kiang, Andy; Tu, Kevin; Sheffield, Philip; Vaughn, Alexander; Heilig, Timothy; Tatarchenko, Elena Andreevna; Duvall, Matthew Taro; Vinnik, Natalia, System and method for advanced control tools for administrators in a cloud-based service.
  52. Mays, James J.; Williams, Michael L.; Forsman, Michael L., System and method for allocating resources in a distributed computing system.
  53. Williams, Michael L.; Forsman, Michael L.; Mays, James J., System for allocating resources in a distributed computing system.
  54. Gura, Gerald Alan; Roth, Robert Edward, Validating a baseline of a project.
  55. Wurth, Emmanuel, Verifying a security token.
  56. De Armas, Mario E.; Ketchuck, Christopher M.; Roach, Thomas L., Visualization of runtime resource policy attachments and applied policy details.
  57. De Armas, Mario E.; Ketchuck, Christopher M.; Roach, Thomas L., Visualization of runtime resource policy attachments and applied policy details.
  58. De Armas, Mario E.; Ketchuck, Christopher M.; Roach, Thomas L., Visualization of runtime resource policy attachments and applied policy details.
  59. De Armas, Mario E.; Ketchuck, Christopher M.; Roach, Thomas L., Visualization of runtime resource policy attachments and applied policy details.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로