$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure file system server architecture and methods 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • G06F-017/30
  • H04K-001/00
  • G06F-007/04
  • G06F-007/02
출원번호 UP-0584971 (2006-10-23)
등록번호 US-7565532 (2009-07-29)
발명자 / 주소
  • Pham, Duc
  • Nguyen, Tien Le
  • Zhang, Pu Paul
  • Lo, Mingchen
출원인 / 주소
  • Vormetric, Inc.
대리인 / 주소
    NewTechLaw
인용정보 피인용 횟수 : 9  인용 특허 : 109

초록

A data server platform includes a security file system layer interposed between the platform operating system kernel and file system. The secure file system layer is structured to implement a file access control function that selectively constrains data transfer operations initiated through the ope

대표청구항

The invention claimed is: 1. A method of securing the transfer of persistently stored data between a computer system and a persistent data store, wherein said computer system includes a processor supporting the execution of an operating system kernel and a file system to transfer data with respect

이 특허에 인용된 특허 (109)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  3. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  4. Chin Hon Wah, Arrangement for rendering forwarding decisions for packets transferred among network switches.
  5. Hauser Stephen A. ; Caldara Stephen A. ; Manning Thomas A. ; McClure Robert B., Asynchronous transfer mode based service consolidation switch.
  6. Buhle Gordon ; Wessman Richard R., Authentication and authorization in a multi-tier relational database management system.
  7. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  8. Gauvin William J. ; Cheung Raymond ; Brosnan Kevin P. ; Taranto Edward J., Client application program mobilizer.
  9. Ballard Clinton L., Client-side load-balancing in client server network.
  10. Sanchaita Datta ; Ragula Bhaskar, Combining routers to increase concurrency and redundancy in external network access.
  11. Lin Cher-Wen ; Ramaswamy Kumar ; Rahman Mizanur Mohammed ; Rettberg Randall David ; Doolittle Robert Arthur, Computer data packet switching and load balancing system using a general-purpose multiprocessor architecture.
  12. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  13. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  14. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Connection authorizer for controlling access to system resources.
  15. Peirce, Jr., Kenneth L.; Xu, Yingchun; Mortsolf, Timothy Glenn; Harper, Matthew, Control and coordination of encryption and compression between network entities.
  16. Ballard C. Bare, Cost propagation switch protocols.
  17. Bellovin Steven M. (Westfield NJ) Merritt Michael J. (Berkeley Heights NJ), Cryptographic protocol for remote authentication.
  18. Thomas Collins ; John Gregory ; Ralph Bestock, Cryptographic system.
  19. Randal Chilton Burns ; Edward Gustav Chron ; Darrell Long ; Benjamin Clay Reed, Decentralized remotely encrypted file system.
  20. Paul Kanevsky ; Anthony C. Pizi ; Thomas Tsao ; Daniel Tyler, Distributed adaptive computing.
  21. Knight, John; Roden, Thomas Anthony; Shively, II, Darrell Myers; Chen, Pauline; Patil, Kavita Shekhar; Bui, Sonny, Distributed database system with authoritative node.
  22. Raz Yoav ; Vishlitzky Natan ; Alterescu Bruno, Dynamic load balancing.
  23. Bedard Fran.cedilla.ois,CAX ; Regnier Jean,CAX ; Caron France,CAX, Dynamically controlled routing using dynamic management of intra-link traffic to virtual destination nodes.
  24. Engel, Robert; Barzilai, Tsipora P.; Kandlur, Dilip Dinkar; Mehra, Ashish, Efficient classification, manipulation, and control of network transmissions by associating network flows with rule based functions.
  25. Wei-Ting Yu TW, Electrical connector.
  26. Brundrett Peter ; Garg Praerit ; Gu Jianrong ; Kelly ; Jr. James W. ; Kaplan Keith S. ; Reichel Robert P. ; Andrew Brian ; Kimura Gary D. ; Miller Thomas J., Encrypting file system and method.
  27. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  28. Atalla Martin M. (Atherton CA), File access security method and means.
  29. Nozawa Masafumi (Odawara JPX) Shimada Akinobu (Hiratsuka JPX) Nishimura Toshifumi (Minamiashigara JPX) Kakuse Katsuharu (Hadano JPX) Tsukiyama Tokuhiro (Kanagawa JPX) Yata Kiyoshi (Hadano JPX) Ishii , File encryption method and file cryptographic system.
  30. Dahlgren Kent Blair ; Bedell Daniel J., Hierarchical address translation system for a network switch.
  31. Sindhu Pradeep S. ; Anand Ramalingam K. ; Ferguson Dennis C. ; Liencres Bjorn O., High speed switching device.
  32. Pi-Yu Chung ; Om P. Damani ; Yennun Huang ; Chandra M. Kintala ; Yi-Min Wang, Hosting a network service on a cluster of servers using a single-address image.
  33. Raz Uri, Information transfer systems and method with dynamic distribution of data, control and management of information.
  34. Wright Steven R. ; Brook Christopher T., Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network.
  35. Kevin Michael Jordan ; Kun-Lung Wu ; Philip Shi-Lung Yu, Load balancing cooperating cache servers by shifting forwarded request.
  36. Jindal Anita ; Lim Swee Boon ; Radia Sanjay ; Chang Whei-Ling, Load balancing in a network environment.
  37. Allon David (Jerusalem ILX) Bach Moshe (Haifa ILX) Moatti Yosef (Haifa ILX) Teperman Abraham (Haifa ILX), Load balancing of network by maintaining in each computer information regarding current load on the computer and load on.
  38. Philip Shi-Lung Yu, Loading balancing across servers in a computer network.
  39. Ullum Daniel ; Edsall Thomas J. ; Hang Soei-Shin, Look up mechanism and associated hash table for a network switch.
  40. Bakke Mark A. (Maple Grove MN) Fiore Edward J. (Ramsey MN), Method and apparatus for accelerated packet forwarding.
  41. Adelman Kenneth Allen ; Kashtan David Lyon ; Palter William L. ; Piper ; II Derrell D., Method and apparatus for an internet protocol (IP) network clustering system.
  42. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  43. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  44. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  45. Pedersen Bradley J., Method and apparatus for connecting a client node to a server node based on load levels.
  46. Yu Philip Shi-Lung, Method and apparatus for dynamic interval-based load balancing.
  47. Timothy E. Moses CA; Glenn C. Langford CA, Method and apparatus for facilitating information security policy control on a per security engine user basis.
  48. Schibler Ross M. (San Mateo CA) Topol A. Mitchell (Mountain View CA) Duffie P. Kingston (Palo Alto CA), Method and apparatus for generating route information for asynchronous transfer mode cell processing.
  49. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for identifying network devices on a storage network.
  50. Crichton Joseph M. ; Garvin Peter F. ; Staten Jeffrey W. ; Wright Waiki L., Method and apparatus for lightweight secure communication tunneling over the internet.
  51. Partridge Craig ; Milliken Walter C., Method and apparatus for multiplexing bytes over parallel communications links using data slices.
  52. Arnold Todd Weston, Method and apparatus for protecting application data in secure storage areas.
  53. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  54. Watson Colin (Issaquah WA) Herron Andrew M. (Issaquah WA), Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
  55. Malkin Gary ; Kossack Nancy ; Raison Paul ; Tran Thuan ; Wong Ellis L., Method and apparatus for transparently providing mobile network functionality.
  56. Nikander Pekka,FIX ; Ylonen Tatu,FIX, Method and arrangement for implementing IPSEC policy management using filter code.
  57. Tatu Ylonen FI; Tero Kivinen FI, Method and arrangement for secure tunneling of data between virtual routers.
  58. Peirce Kenneth L. ; Calhoun Patrick ; Harper Matthew H. ; Schoo Daniel L. ; Vakil Sumit, Method and system for coordination and control of data streams that terminate at different termination units using virtual tunneling.
  59. Takashima Youichi (Kanagawaken JPX) Ishii Shinji (Kanagawaken JPX) Yamanaka Kiyoshi (Kanagawaken JPX), Method and system for digital information protection.
  60. Gorczyca Robert ; Rashid Aamir Arshad ; Rodgers Kevin Forress ; Warnsman Stuart ; Weaver Thomas Van, Method and system for dynamically reconfiguring a cluster of computer systems.
  61. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  62. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  63. Raman Anant ; Rungta Sanjay, Method for determining a networking capability index for each of a plurality of networked computers and load balancing.
  64. Bass Walter E. (Sunnyvale CA) Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Method for establishing user authenication with composite session keys among cryptographically communicating nodes.
  65. Witte Martin (Ulm DEX) Oehlerich Joerg (Stockdorf DEX) Held Walter (Geretsried DEX), Method for load balancing in a multi-processor system where arising jobs are processed by a plurality of processors unde.
  66. Puhl Larry C. (Sleepy Hollow IL) Finkelstein Louis D. (Wheeling IL) Dabbish Ezzat A. (Cary IL), Method for providing blind access to an encryption key.
  67. Case Jeffrey D., Method for secure key production.
  68. Johnson, Kirk L.; Kaashoek, M. Franz, Methods and apparatus for routing requests in a network.
  69. Kent K. Leung, Mobile IP mobility agent standby protocol.
  70. Matti Turunen FI, Mobile internet access.
  71. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  72. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  73. Williams Timothy C., Multi-level security network system.
  74. Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
  75. Dellacona Richard, Network information server.
  76. Nguyen Minhtam C. (335 Elan Village La. ; Apt. 217 San Jose CA 95134), Network with secure communications sessions.
  77. Madoukh Ashraf T., Object-based security system.
  78. Madoukh, Ashraf T., Object-based security system.
  79. Narad Charles E. ; Fall Kevin ; MacAvoy Neil ; Shankar Pradip ; Rand Leonard M. ; Hall Jerry J., Packet processing system including a policy engine having a classification unit.
  80. Lumelsky, Leon L.; Manohar, Nelson R.; Wood, Stephen P., Policy-based multivariate application-level QoS negotiation for multimedia services.
  81. Warrier Padmanand ; Richter Roger, Scaleable network system for remote access of a local network.
  82. Burns Randal Chilton ; Chron Edward Gustav ; Long Darrell ; Reed Benjamin Clay, Secure array of remotely encrypted storage devices.
  83. Cane David ; Hirschman David ; Speare Philip ; Vaitzblit Lev, Secure file archive through encryption key management.
  84. McManis Charles E. (Sunnyvale CA), Secure network protocol system and method.
  85. Andrew W. Trieger, Secure session tracking method and system for client-server environment.
  86. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  87. Elgamal Taher ; Hickman Kipp E.B., Secure socket layer application program apparatus and method.
  88. Chan Steve S. C. (P.O. Box 34620 Chicago IL 60634), Secured data storage devices.
  89. Pravetz James D. ; Malloy Thomas J., Secured document access control using recipient lists.
  90. Dan Linh Nguyen, Security between client and server in a computer network.
  91. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  92. Inala Suman Kumar ; Rangan P Venkat ; Satyavolu Ramakrishna, Server-side web summary generation and presentation.
  93. Stanton Leroy K. ; Wright Steven R. ; Brook Christopher T. ; Loane Russell F., Session key recovery system and method.
  94. Kumar Ramaswamy ; Cher-Wen Lin ; Randall David Rettberg ; Mizanur Mohammed Rahman, Software interface between switching module and operating system of a data packet switching and load balancing system.
  95. Locklear ; Jr. Robert H. ; Cantrell Craig S. ; McClanahan Kip R. ; Brewer William K. ; Carew Anthony J. P., Switched architecture access server.
  96. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  97. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  98. Harrison, Bret Elliott; Reed, William Donald; Temoshenko, Leo, System and method for generation VPN network policies.
  99. Wright Tim ; Marconi Peter ; Conlin Richard ; Opalka Zbigniew, System architecture for and method of dual path data processing and management of packets and/or cells and the like.
  100. Opalka Zbigniew ; Aggarwal Vijay ; Kong Thomas ; Firth Christopher ; Costantino Carl, System architecture for and method of processing packets and/or cells in a common switch.
  101. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  102. Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
  103. Scheifler Robert W., System for separately designating security requirements for methods invoked on a computer.
  104. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  105. Chipman Richard R. ; Mankofsky Alan ; Karandikar Harshavardhan M.,DEX ; Warren Gary, System, method, and medium for retrieving, organizing, and utilizing networked data.
  106. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  107. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  108. Morris C. Carson (Broad Run VA) Bielsker Barry H. (Vienna VA) Cole Donald A. (Rockville MD), Two-tiered communication security employing asymmetric session keys.
  109. Peirce, Jr., Kenneth L.; Harper, Matthew; Mortsolf, Timothy G.; Xu, Yingchun; Dynarski, Richard J., Virtual home agent service using software-replicated home agents.

이 특허를 인용한 특허 (9)

  1. Rollins, Doug L., Data security for digital data storage.
  2. Rollins, Doug L., Data security for digital data storage.
  3. Sonwane, Abhilash Vijay; Mahadevia, Jimit Hareshkumau; Malek, Sarfaraz Mohammedhanif; Pandya, Sumit; Shah, Nishit Shantibhai; Modhwadiya, Rajesh Hardasbhai, Identity and policy-based network security and management system and method.
  4. Khosravi, Hormuzd M.; Edwards, David A.; Gokulrangan, Venkat R.; Rasheed, Yasser, Method and apparatus for secure scan of data storage device from remote server.
  5. Molnar, Ingo, Method and system for a kernel lock validator.
  6. Muth, Robert; Schimpf, Karl M.; Sehr, David C.; Biffle, Clifford L., Predicated control flow and store instructions for native code module security.
  7. Muth, Robert; Schmipf, Karl; Sehr, David C.; Biffle, Clifford L., Predicated control flow and store instructions for native code module security.
  8. Cherian, Jacob; Marks, Kevin, System and method for providing data integrity.
  9. Cherian, Jacob; Marks, Kevin, System and method for providing data integrity.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로