$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure domain join for computing devices 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
출원번호 UP-0853931 (2004-05-25)
등록번호 US-7669235 (2010-04-09)
발명자 / 주소
  • Hunt, Galen C.
  • Simon, Jeff
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee & Hayes, PLLC
인용정보 피인용 횟수 : 8  인용 특허 : 310

초록

A technique is provided for acquiring security domain access credentials on a computing device. The security domain access credentials are acquired by storing a persistent identity on the computing device, and deriving data that includes the security domain access credentials from the persistent ide

대표청구항

The invention claimed is: 1. A method comprising: acquiring security domain access credentials on a computing device by: storing a persistent identity on the computing device, deriving data that includes the security domain access credentials from the persistent identity, and transferring the deriv

이 특허에 인용된 특허 (310)

  1. Murthy V. Devarakonda ; Daniel Manuel Dias ; German Sergio Goldszmidt ; Guerney Douglass Holloway Hunt ; Arun Kwangil Iyengar ; Richard Pervin King ; Rajat Mukherjee, Affinity-based router and routing method.
  2. Williams,Lyndsay, Altering a display on a viewing device based upon a user proximity to the viewing device.
  3. Aoki, Ryuichi, Apparatus and method for depositing encryption keys.
  4. Harple Daniel L. ; Pizzarro Richard H., Apparatus for collaborative computing.
  5. Makoto Saito JP, Apparatus for data copyright management system.
  6. Fung,Henry T., Apparatus, architecture, and method for integrated modular server system providing dynamically power-managed and work-load managed network devices.
  7. Farkas,Keith Istvan; Ranganathan,Parthasarathy, Application management based on power consumption.
  8. Heller, Howard A.; Proctor, Jr., James A., Applying session services based on packet flows.
  9. Brown,Mathilde C.; Chase,Charlie D.; Grealish,Kevin; Hunt,Galen C.; Hydrie,Aamer; Noble,David; Outhred,Geoffrey; Peterson,Glenn R.; Tabbara,Bassam; Torone,Alexander; Welland,Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  10. Brown,Mathilde C.; Chase,Charlie D.; Grealish,Kevin; Hunt,Galen C.; Hydrie,Aamer; Noble,David; Outhred,Geoffrey; Peterson,Glenn R.; Tabbara,Bassam; Torone,Alexander; Welland,Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  11. Brown,Mathilde C.; Chase,Charlie D.; Grealish,Kevin; Hunt,Galen C.; Hydrie,Aamer; Noble,David; Outhred,Geoffrey; Peterson,Glenn R.; Tabbara,Bassam; Torone,Alexander; Welland,Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  12. Keith Franklin Falck ; Chinmei Chen Lee, Arrangement of delivering internet protocol datagrams for multimedia services to the same server.
  13. Brendel, Juergen, Atomic session-start operation combining clear-text and encrypted sessions to provide id visibility to middleware such as load-balancers.
  14. Kryskow, Jr.,Joseph M.; Hudnall,Richard E.; Kopp,Lowell, Auto control of network monitoring and simulation.
  15. Bixler David C. ; Hilger Eufemia P. ; Smith Jeffrey A. ; Wittlin Mark R. ; Siegel Neil G., Automated configuration of internet-like computer networks.
  16. Suorsa,Raymond E., Automated provisioning framework for internet site servers.
  17. Suorsa,Raymond E.; LeVasseur,Joshua T., Automated provisioning of computing networks according to customer accounts using a network database data model.
  18. Suorsa,Raymond E.; Poskanzer,Harold; Ferguson,Glenn; LeVasseur,Joshua T., Automated provisioning of computing networks using a network database model.
  19. Hunt Galen C., Automatic detection of per-unit location constraints.
  20. Hegde, Gopal D., Automatic filtering and creation of virtual LANs among a plurality of switch ports.
  21. Salo, Randy; Van Hamersveld, Chris; Shelton, Barry K.; Herbinaux, Larry; Deacon, D. Brian; Fayal, Jr., Kenneth Eugene, CLIENTS REMOTE ACCESS TO ENTERPRISE NETWORKS EMPLOYING ENTERPRISE GATEWAY SERVERS IN A CENTRALIZED DATA CENTER CONVERTING PLURALITY OF DATA REQUESTS FOR MESSAGING AND COLLABORATION INTO A SINGLE REQU.
  22. Saitoh Fumihiko (Ryuuohchou JPX), Character recognition system using the generalized hough transformation and method.
  23. Abily Jack,FRX ; Qian Jean Yujun,FRX, Circuit for moving data between remote memories and a computer.
  24. Timothy Roy Block ; Rodney Lee Rabe, Cluster node distress signal.
  25. Asai, Rieko; Omura, Takeshi; Horiuchi, Masaki, Cluster server apparatus.
  26. Nguyen, Nam; Kosacek, Michael, Cluster-based system and method of recovery from server failures.
  27. Hayball Clive Colin,GBX ; Tattersfield Peter Jamieson,GBX ; Bragg Nigel Lawrence,GBX, Communications network having management system architecture supporting reuse.
  28. Rittie Kevin J. ; Chmilewski Michael ; Walsh Jeff ; MacAnespie Alan, Computer implemented object oriented visualization system and method.
  29. Corynen, Guy Charles, Computer method and user interface for decision analysis and for global system optimization.
  30. Kodosky,Jeffrey L.; Shah,Darshan; Rogers,Steven W., Configuration diagram which graphically displays program relationship.
  31. McGuire, Jacob, Console mapping tool for automated deployment and management of network devices.
  32. Bishop Thomas P. (Aurora IL) Davis Mark H. (Warrenville IL) Peterson James S. (Aurora IL) Surratt Grover T. (West Chicago IL), Controlled dynamic load balancing for a multiprocessor system.
  33. Chandra, Tushar Deepak; Fakhouri, Sameh Afif; Fong, Liana Liyow; Jerome, William Francis; Krishnakumar, Srirama Mandyam; Naik, Vijay Krishnarao; Pershing, Jr., John Arthur; Turek, John Joseph Edward, Controlling a number of instances of an application running in a computing environment.
  34. Krause Michael R., Creation and migration of distributed streams in clusters of networked computers.
  35. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  36. Bandhole,Jagadish; Nanja,Sekaran; Balasubramaniam,Shan, Cross-spectrum application model for dynamic computing environments in software lifecycle.
  37. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  38. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  39. Srini Krishnamurthy ; Sunil Sharad Mehta ; Cary Bailey O'Brien, DEVICE MANAGEMENT SYSTEM FOR MANAGING STANDARDS-COMPLIANT AND NON-COMPLIANT NETWORK ELEMENTS USING STANDARD MANAGEMENT PROTOCOLS AND A UNIVERSAL SITE SERVER WHICH IS CONFIGURABLE FROM REMOTE LOCATION.
  40. Christopher James Holloway GB, Data communications system using public key cryptography in a web environment.
  41. Saito Makoto,JPX, Data copyright management method.
  42. Makoto Saito JP, Data copyright management system.
  43. Humenansky,Brian S; Bowen,David S; Pearson,George Duncan; Sandles,Jon M; Aschenbrener,Clarence A; Antrobus,Mark, Deploying multiple enterprise planning models across clusters of application servers.
  44. Kloth Raymond, Derived VLAN mapping technique.
  45. Leung,Ying Tat; Parija,Gyana Ranjan; Sharma,Samir, Diagnosis of equipment failures using an integrated approach of case based reasoning and reliability analysis.
  46. Aseem Vaid ; Sanjeev Putta ; Gregory Rakoshitz, Directory enabled policy management tool for intelligent traffic management.
  47. Kuga Kaeko (Kyoto JPX), Display apparatus.
  48. Azer Bestavros ; Mark E. Crovella, Distributed routing.
  49. Couland Ghislaine,FRX ; Hunt Guerney Douglass Holloway ; Levy-Abegnoli Eric Michel,FRX ; Jean-Marie Mauduit Daniel Georges,FRX, Distributed scalable device for selecting a server from a server cluster and a switched path to the selected server.
  50. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  51. Narisi, Anthony; Coyne, Lois B.; Jennion, Susan; Kain, Michael T.; Parker, Charles Austin, Distributed transport communications manager with messaging subsystem for high-speed communications between heterogeneous computer systems.
  52. Kubota, Yasuo; Shiba, Nobuo, Distributed-object development system and computer-readable recording medium recorded with program for making computer execute distributed-object development.
  53. David Zager ; Robert Kostes, Dynamic modeling of complex networks and prediction of impacts of faults therein.
  54. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; Yu Philip Shi-Lung, Dynamic push filtering based on information exchanged among nodes in a proxy hierarchy.
  55. Liu Howard T. (San Marino CA) Silvester John A. (Los Angeles CA), Dynamic resource allocation scheme for distributed heterogeneous computer systems.
  56. Westberg Lars,SEX, Efficient transport of internet protocol packets using asynchronous transfer mode adaptation layer two.
  57. Bishop,David A.; Hoover,Kelvin M., Enterprise management system.
  58. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  59. McNeill Thomas G. ; Ekstrom Joseph J. ; Moss Stephen S., Establishing connectivity in networks.
  60. Brandon L. Buteau ; Christine S. Moulton, Evaluation of enterprise architecture model including relational database.
  61. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  62. Aziz, Ashar; Markson, Tom; Patterson, Martin, Extensible computing system.
  63. Schoening Charles B. ; Smith ; Jr. Richard J. ; Schleimer Stephen I., Extensible network management system.
  64. Mashayekhi, Victor; Hsieh, Jenwei; Rooholamini, Mohamad Reza, Failover system and method for cluster environment.
  65. Mashayekhi,Victor; Hsieh,Jenwei; Rooholamini,Mohamad Reza, Failover system and method for cluster environment.
  66. Mashayekhi,Victor; Hsieh,Jenwei; Rooholamini,Mohamad Reza, Failover system and method for cluster environment.
  67. Hunt,Galen C.; Simon,Jeff, Filters to isolate untrusted ports of switches.
  68. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  69. Axnix,Christine; Kuebl,Klaus Jurgen; Muehlbach,Andreas; Probst,Juergen Josef; Hollenback,Carl J.; Kubala,Jeffrey P., Flexible temporary capacity upgrade/downgrade in a computer system without involvement of the operating system.
  70. Zinky, John A.; Schantz, Richard R.; Bakken, David E.; Loyall, Joseph P., Framework for providing quality of service requirements in a distributed object-oriented computer system.
  71. Beelitz Alan E. ; Maia Paul J., Generation of a compatible order for a computer system.
  72. Patterson,Martin, Graphical editor for defining and creating a computer system.
  73. Scott L. Wiegel, Graphical network security policy management.
  74. Kodosky,Jeffrey L.; Shah,Darshan; Rogers,Steven W., Graphically deploying programs on devices in a system.
  75. Harkins Dan, Group key distribution.
  76. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  77. Kamiwada, Toru; Fujita, Takushi, Gui display, and recording medium including a computerized method stored therein for realizing the gui display.
  78. James W. Arendt ; Ching-Yun Chao ; Rodolfo Ausgusto Mancisidor, Highly scalable and highly available cluster system management scheme.
  79. Tormasov,Alexander; Lunev,Dennis; Beloussov,Serguei; Protassov,Stanislav; Pudgorodsky,Yuri, Hosting service providing platform system and method.
  80. Chandy, K. Mani; Kiniry, Joseph; Rifkin, Adam; Zimmerman, Daniel; Tanaka, Wesley; Weisman, Luke, Infospheres distributed object system.
  81. Dynarski, Richard J.; Harper, Matthew; Bezaitis, Andrew; Xu, Yingchun; Peirce, Jr., Kenneth L., Instant activation of point-to point protocol (PPP) connection using existing PPP state.
  82. Avery, IV, Albert M.; Adelson, Jay Steven; Vogt, Derrald Curtis, Internet co-location facility security system.
  83. Abramson, Nathan; Chung, Joseph T., Internet server session backup apparatus.
  84. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system with verification by comparison.
  85. Matsumoto Tatsuro,JPX, Key management server, chat system terminal unit, chat system and recording medium.
  86. Takaragi Kazuo,JPX ; Kurumatani Hiroyuki,JPX, Key recovery method and system.
  87. Ando Hiroyuki,JPX ; Morita Ichirou,JPX ; Kuroda Yasutsugu,JPX ; Torii Naoya,JPX ; Yamazaki Masashi,JPX ; Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Sei, Key recovery system.
  88. Kazemi,Saied; Wright,Alan; Ngo,Dai; Sabdar,Reza; Sadri,Reza; Higgins,Steven, Load balancing in a dynamic session redirector.
  89. Jindal Anita ; Lim Swee Boon ; Radia Sanjay ; Chang Whei-Ling, Load balancing in a network environment.
  90. Okano, Tetsuya; Ochi, Akiyoshi; Mochizuki, Tomotsugu; Takaba, Koichi, Load balancing system.
  91. LeBlanc Frederick W. ; Dupray Dennis J. ; Karr Charles L., Location of a mobile station using a plurality of commercial wireless infrastructures.
  92. Goldszmidt,German; Lorrain,Jean A.; Maruyama,Kiyoshi; Verma,Dinesh Chandra, METHOD AND APPARATUS FOR DYNAMICALLY ADJUSTING RESOURCES ASSIGNED TO PLURALITY OF CUSTOMERS, FOR MEETING SERVICE LEVEL AGREEMENTS (SLAS) WITH MINIMAL RESOURCES, AND ALLOWING COMMON POOLS OF RESOURCES.
  93. Fakhouri,Sameh A.; Jerome,William F.; Kummamuru,Krishna; Naik,Vijay K.; Pershing, Jr.,John A.; Raina,Ajay; Varma,Pradeep; Badovinatz,Peter R.; Kumar,Vijay, Managing a cluster of networked resources and resource groups using rule-base constraints in a scalable clustering environment.
  94. Yadav, Satyendra; Tang, Puqi, Managing data traffic on multiple ports.
  95. Agarwal,Vikas; Chafle,Girish; Karnik,Neeran Mohan; Kumar,Arun; Kundu,Ashish; Shahabuddin,Johara; Varma,Pradeep, Managing server resources for hosted applications.
  96. Davis,Andrew T.; Parikh,Jay G.; Thirumalai,Srikanth; Weihl,William E.; Tsimelzon,Mark, Managing web tier session state objects in a content delivery network (CDN).
  97. Goss Lois, Manufacturing system and method for assembly of computer systems in a build-to-order environment.
  98. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  99. Cuomo,Gennaro A.; Fraenkel,Michael L.; Martin,Brian Keith, Method and apparatus for affinity of users to application servers.
  100. Boland, Vernon K., Method and apparatus for allocating network resources and changing the allocation based on dynamic workload changes.
  101. Downs Terry ; Kisor Gregory Hurst, Method and apparatus for allocating tasks to remote networked processors.
  102. Bhat Kabekode V. (Naperville IL), Method and apparatus for capacity planning for multiprocessor computer systems in client/server environments.
  103. Abu El Ata Nabil A., Method and apparatus for designing and analyzing information systems using multi-layer mathematical models.
  104. Wood Michael, Method and apparatus for determining accurate topology features of a network.
  105. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for determining an identity of a network device.
  106. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  107. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L., Method and apparatus for dynamically altering configurations of clustered computer systems.
  108. Balfanz,Dirk; Smetters,Diana K.; Stewart,Paul Joseph; Durfee,Glenn E.; Grinter,Rebecca E.; Wong,Hao Chi, Method and apparatus for establishing and using a secure credential infrastructure.
  109. Bal, Subhash; Iyer, Raghunath; Iyer, Sundar; Rao, Ramana, Method and apparatus for high-speed network rule processing.
  110. Gai, Silvano; McCloghrie, Keith; Mohaban, Shai, Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows.
  111. Lovy,David M.; Fagan,Brant M.; Bojanek,Robert J., Method and apparatus for identifying problems in computer networks.
  112. Lovy,David M.; Fagan,Brant M.; Bojanek,Robert J., Method and apparatus for identifying problems in computer networks.
  113. Mangipudi,Krishna; Basani,Vijay, Method and apparatus for implementing a service-level agreement.
  114. Vilhuber,Jan; Pritikin,Max, Method and apparatus for integrated provisioning of a network device with configuration information and identity certification.
  115. Kumar, Krishna; Murphy, Declan J.; Hisgen, Andrew L.; Block, Robert, Method and apparatus for managing operations of clustered computer systems.
  116. Mayer,Alain Jules, Method and apparatus for network wide policy-based analysis of configurations of devices.
  117. Henson Ken, Method and apparatus for providing customer configured machines at an internet site.
  118. Gusler, Carl Phillip; Hamilton, II, Rick Allen, Method and apparatus for providing user support based on contextual information.
  119. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
  120. Bailey, R. Andrew; Giambrone, Leonard T., Method and apparatus for remote installation of an operating system over a network connection.
  121. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
  122. Ben Nun, Michael; Ravid, Sagi; Barak, Itzhak; Weill, Ofer, Method and apparatus for scalable process flow load balancing of a multiplicity of parallel packet processors in a digital communication network.
  123. Schmidt Thomas J., Method and apparatus for secure remote programming of firmware and configurations of a computer over a network.
  124. Challener David Carroll ; Desai Dhruv Manmohandas ; Rohatgi Pankaj ; Safford David Robert, Method and apparatus for securing communication utilizing a security processor.
  125. Olkin Jeffrey C. ; Porter Mark A., Method and apparatus for storing and transferring data on a network.
  126. Einkauf Robert L. (Fremont CA) Riley Glen M. (Los Gatos CA) Von De Bur James M. (San Jose CA), Method and apparatus for storing interface information in a computer system.
  127. Robert A. Dolin, Jr. ; Robert L. Einkauf ; Glen M. Riley, Method and apparatus for treating a logical programming expression as an event in an event-driven computer environment.
  128. Al-Hilali Hilal ; Clarke Perry ; Guimbellot David Edward ; Howell David Andrew, Method and computer program product for estimating total resource usage requirements of a server application in a hypothetical user configuration.
  129. Otsuka Kazuhiro,JPX ; Horikoshi Tsutomu,JPX ; Suzuki Satoshi,JPX, Method and equipment for extracting image features from image sequence.
  130. Bond, William C., Method and estimator for providing capacacity modeling and planning.
  131. Graupner,Sven; Kotov,Vadim; Trinks,Holger, Method and framework for generating an optimized deployment of software applications in a distributed computing environment using layered model descriptions of services and servers.
  132. Kampe, Mark A.; Gien, Michel; Penkler, David; Jacquemot, Christian; Herrmann, Frederic; Armand, Francois; Fenart, Jean-Marc; Campbell, David F.; Baltz, Lawrence E., Method and system for achieving high availability in a networked computer system.
  133. Lin,Paul; Hon,Henry, Method and system for controlling access to data stored on a data storage device.
  134. Kassan,Peter; Youchnow,Steven, Method and system for correlating job accounting information with software license information.
  135. Pace,Charles P.; Pizzorni,Paolo R.; Deforest,Darin S.; Chen,Shuang, Method and system for deploying an asset over a multi-tiered network.
  136. Gorczyca Robert ; Rashid Aamir Arshad ; Rodgers Kevin Forress ; Warnsman Stuart ; Weaver Thomas Van, Method and system for dynamically reconfiguring a cluster of computer systems.
  137. Ma, Lucern K.; Duvvury, Murali, Method and system for high reliability cluster management.
  138. Vrhel, Jr., Thomas; Barajas, Gaston M., Method and system for installing and testing build-to-order components in a defined configuration computer system.
  139. Lawson, Todd C.; Cave, Warren D.; Fisher, Kamika Layne, Method and system for intelligent global event notification and control within a distributed computing environment.
  140. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  141. Hosein, Patrick A., Method and system for network traffic rate control based on fractional tokens.
  142. Lin Ho-Shyan,TWX, Method and system for performing the transmission of private data over a public network.
  143. Draves Richard P., Method and system for providing secure access to computer resources.
  144. Peterson, Glenn R.; Gamache, Rod; Massa, Michael T.; Kusters, Norbert P., Method and system for remote access to computer devices via client managed server buffers exclusively allocated to the client.
  145. Short Robert T. ; Gamache Rod ; Massa Michael T. ; Vert John D., Method and system for resource monitoring of disparate resources in a server cluster.
  146. Waugh, Donald Craig; Roberts, Michael Albert; Alibhai, Rahim, Method and system for restricting access to the private key of a user in a public key infrastructure.
  147. Tuckner Steven A., Method for connecting a plurality of communication applications with an actual communication port by emulating a plurality of virtual modems.
  148. Dobbins Kurt ; Andlauer Phil ; Skubisz Michael, Method for establishing restricted broadcast groups in a switched network.
  149. Rajamadam C. Venkatram ; Ravi Viswanath ; Unmesh Sahasrabuddhe ; Ashish Warty ; Rahul Khandkar, Method for generating secure symmetric encryption and decryption.
  150. Shimabukuro Jun (Kawasaki JPX) Nagamatsu Yuji (Sagamihara JPX) Ikeuchi Yoshimi (Yokohama JPX) Kondo Kazuyuki (Yokohama JPX), Method for making test environmental programs.
  151. Bavant,Marc; Delattre,Michel, Method for the routing of IP frames between the users of a variable graph network.
  152. Han Mi-Sook,KRX ; Lee Eon-Kyung,KRX ; Oh Moon-Kyun,KRX, Method of assigning connection identifier in asynchronous transfer mode switching system.
  153. Dent, Paul W.; Rydbeck, Nils, Method of bilateral identity authentication.
  154. Saito Naoki ; Bennett Nicholas N. ; Burridge Robert, Method of determining dips and azimuths of fractures from borehole images.
  155. Martin Sean James,GBX ; Stanford-Clark Andrew James,GBX, Method of load balancing across the processors of a server.
  156. Sheikh, Tahir Q.; Johnson, Karl S.; Nguyen, Ken, Method of remote access and control of environmental conditions.
  157. Shamir Yoram,ILX ; Barkai Sharon,ILX ; Shani Sarit,ILX, Method of resolving split virtual LANs utilizing a network management system.
  158. Zara,Anna M.; Singhal,Sharad, Method to map an inventory management system to a configuration management system.
  159. Chiu, Willy W.; Halim, Nagui; Hellerstein, Joseph L.; Krueger, Jr., LeRoy Albert; Mills, III, W. Nathaniel; Squillante, Mark S., Method, computer program product, and system for deriving web transaction performance metrics.
  160. Maves Walter,CAX ; McGuirk Fred,CAX ; Bennett James,CAX ; Clarke Matthew,CAX, Method, system and data structures for computer software application development and execution.
  161. Novaes, Marcos N.; Laib, Gregory D.; Lucash, Jeffrey S.; Goering, Ronald T.; Sohos, George, Method, system and program products for defining nodes to a cluster.
  162. Rodney A. DeKoning ; Ray M. Jantz ; William V. Courtright, II, Methods and apparatus for committing configuration changes to managed devices prior to completion of the configuration change.
  163. Ronald Leonard Westfall CA; Paul Terry CA; John M. Siu CA; Aaron S. Mar CA, Methods and apparatus for deploying quality of service policies on a data communication network.
  164. Coleman,David Wiley; Froehlich,Steven E.; Hellerstein,Joseph L.; Hsiung,Lawrence S.; Lassettre,Edwin Richie; Mummert,Todd William; Raghavachari,Mukund; Russell,Lance Warren; Surendra,Maheswaran; Wadia,Noshir Cavas; Ye,Peng, Methods and apparatus for managing computing deployment in presence of variable workload.
  165. Jantz, Ray M.; DeKoning, Rodney A.; Courtright, II, William V.; Markus, Matthew A., Methods and apparatus for performing mass operations on a plurality of managed devices on a network.
  166. Thomsen, Brant D., Methods of determining whether a network interface card entry within the system registry pertains to physical hardware or to a virtual device.
  167. Callis, Gregory M.; Franks, Jon Kevin; Huynh, Lap Thiet; Nguyen, Loan; Shannon, Diane Iupe; Yang, David Yu Pin, Methods systems and computer program products for processing an event based on policy rules using hashing.
  168. Kumar, Arush; Larsen, Loren Douglas; Lynch, Jeffrey James, Methods, systems and computer program products for selecting an aggregator interface.
  169. So,Tricci Y.; Roberts,Lawrence G.; Lakhani,Faizel Z.; McBrayne,John A.; Croke,Gary G., Micro-flow label switching.
  170. Roberts, Lawrence G., Micro-flow management.
  171. Rowland Patricia J. ; Kreeger Kevin A. ; Sanders Albert R., Model-based feature tracking system.
  172. Contreras, Alfredo; White, Jeffrey Alan; Williams, William Bradley, Modeling objects, systems, and simulations by establishing relationships in an event-driven graph in a computer implemented graphics system.
  173. Krontz Jeoff M. ; Emerson Theodore F., Modem sharing.
  174. Whitted,William H.; Aigner,Gerald, Modular data center.
  175. O'Brien, Eric David; Tryon, Jr., James Robert, Modular framework for dynamically processing network events using action sets in a distributed computing environment.
  176. Stone, Bradley A., Monitoring and control engine for multi-tiered service-level management of distributed web-application servers.
  177. Chase,Jeffrey S.; Doyle,Ronald P.; Ims,Steven D., Multi-tier service level agreement method and system.
  178. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R., Multi-user, multiple tier distributed application architecture with single-user access control of middle tier objects.
  179. Hirschfeld,Robert A.; McCrory,Dave D., Near on-line server.
  180. McDysan,Dave; Thomas,Howard Lee; Yao,Lei, Network access system including a programmable access device having distributed service control.
  181. Curtis David C. ; Curtis Kathleen P. ; Denunzio David D. ; Reed William P. ; Wolak Robert A., Network configuration management system for digital communication networks.
  182. Rimmer, Todd, Network data flow optimization.
  183. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  184. Hasan,Taqi; Gannesan,Elango; Rochkind,Allen B.; Golla,Sagar, Network management system.
  185. Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
  186. Engel Ferdinand ; Jones Kendall S. ; Robertson Kary ; Thompson David M. ; White Gerard, Network monitoring.
  187. Dowd,Alan; Markham,Thomas R.; Foote Lennox,Tomo; Apostal,David; Lu,Raymond, Network security modeling system and method.
  188. Hinson, Gerald L.; Al-Ghosein, Mohsen; Dumitru, Donald W.; McCrady, Donald J.; Pollack, Seth B.; Swartz, Stephen T., Object connectivity through loosely coupled publish and subscribe events.
  189. Mohsen Al-Ghosein ; Jan S. Gray ; Amit Mital ; Rodney Limprecht, Object load balancing.
  190. Sero,Pascal; Dangeard,Marc; Walsh,Kevin, One click deployment.
  191. Demizu Noritoshi,JPX, Packet-Transmission control method and packet-transmission control apparatus.
  192. Araujo Kenneth ; Wang Peter Si-Sheng, Point-to-point protocol with a signaling channel.
  193. Natarajan, Shankar; Harvey, Andrew G.; Lee, Hsuan-Chung; Rawat, Vipin; Pereira, Leo, Policy engine which supports application specific plug-ins for enforcing policies in a feedback-based, adaptive data network.
  194. Dardinski,Steven; Eldridge,Keith; Hall,Robert; Johnson,Mark; McKay,Brian; Meskonis,Paul; Volk,Scott, Process control configuration system with connection validation and configuration.
  195. Sonty Atashi C. (Pittsford NY) Faria Jose A. (Rochester NY) Willett Alan W. (Rochester NY) Ciulla Kim P. (Honcoye Falls NY) Comparetta Christopher (Pittsford NY) Latone Jack T. (Rochester NY), Process for configuration management.
  196. Black,Darryl; Winiewicz,Anne K, Processing network management data in accordance with metadata files.
  197. Pfeil John M. ; Mennenga Kenneth A., Production of statistically-based network maps.
  198. Doli ; Jr. Robert A. (Menlo Park CA) Einkauf Robert L. (Fremont CA) Riley Glen M. (Los Gatos CA), Programming language structures for use in a network for communicating, sensing and controlling information.
  199. Gong Li, Protection domains to provide security in a computer system.
  200. St. Pierre, Robert P., Protocol for a remote control device to enable control of network attached devices.
  201. Peter K. Craft ; Olive M. Philbrick ; Laurence B. Boucher ; David A. Higgen, Protocol processing stack for use with intelligent network interface device.
  202. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., Providing automatic policy enforcement in a multi-computer service application.
  203. Fortinsky Michael S.,ILX, Provision of secure access to external resources from a distributed computing environment.
  204. Christensen Brent Ray ; Davis Howard Rollin ; Harral Adam Lee, Proxy cache cluster.
  205. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  206. Zheng, Qin; Willis, Steven R.; Kastenholz, Frank; Crawley, Eric, Quality of service facility in a device for performing IP forwarding and ATM switching.
  207. Stein, Mitchell Jay, Reactive user interface control based on environmental sensing.
  208. Saeki Takao (Ann Arbor MI), Real time implementation of the hough transform.
  209. Garg,Pankaj K.; Santos,Cipriano A.; Tang,Hsiu Khuern; Zhang,Alex, Resource allocation for multiple applications.
  210. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  211. Robert A Wipfel ; David Murphy, Resource management in a clustered computer system.
  212. Wipfel Robert A ; Murphy David, Resource management in a clustered computer system.
  213. Ernest C. Coskrey, IV, Resource protection in a cluster environment.
  214. Sharma, Rosen; Keshav, Srinivasan, Restricting communication between network devices on a common network.
  215. Walsh,Robert; O'Sullivan,Bryan, Revision control system for large-scale systems management.
  216. Van Renesse, Robbert, Scalable computer network resource monitoring and location system.
  217. Layton, Jeffrey S.; Dube, Shawn J., Scalable environmental data calculation method customized by system configuration.
  218. Gennaro, Rosario; Halevi, Shai; Rabin, Tal, Secure hash-and-sign signatures.
  219. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  220. Gage William W. A.,CAX ; Wollensak Martin,CAX ; Himbeault Lee,CAX, Secure virtual LANs.
  221. Albert, Mark; Howes, Richard A.; Jordan, James A.; Kersey, Edward A.; Menditto, Louis F.; O'Rourke, Chris; Tiwari, Pranav Kumar; Tsang, Tzu-Ming, Sending instructions from a service manager to forwarding agents on a need to know basis.
  222. Anderson,Jeffrey Wayne; Chu,Simon; Dayan,Richard Alan; Donovan,Peter Thomas, Server blade network boot method that minimizes required network bandwidth.
  223. Hirschfeld,Robert A.; Pollan,C. Evan; McCrory,Dave D., Server file management.
  224. Hussain,Zahid; Millet,Tim, Service processing switch.
  225. Bahl,Pradeep, Session load balancing and use of VIP as source address for inter-cluster traffic through the use of a session identifier.
  226. Black, Darryl; Perry, Thomas R.; Glaser, David, Shared database usage in network devices.
  227. Charron,Frederic; Modica,Stephanie, Site integration management system for operational support service in an internet data center.
  228. Lee,Sharon Marie; Eismann,Leonard Eugene; McDonald,Kathryn Ann, Solution generation method for thin client sizing tool.
  229. Shah, Rajendra; Shanumgam, Udayakumar; Apsani, Lavanya, State transition protocol for high availability units.
  230. Radhakrishnan,Rakesh, Strategic technology architecture roadmap.
  231. Myrick,Conrad B.; Hixon, Jr.,Harry W.; Koll,Christopher M.; Whittle, Jr.,Ralph L., Structure and method of modeling integrated business and information technology frameworks and architecture in support of a business.
  232. Luke,Stanley; Hall,Howard; Cochrane,Christopher; Ferrari,Stephen; Condylis,Mitchell; Merhar,Milan, Switching system.
  233. Grosner,George; Wood,Douglas, Switching system method for discovering and accessing SCSI devices in response to query.
  234. Boden Edward B. ; Brzozowski Wesley A. ; Bullock Mark C. ; Parks Scott B. ; Williams Michael D., System and method for IP network address translation and IP filtering with dynamic address resolution.
  235. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  236. Pancha, Girish; Wilson, A. Adam; Suresh, Sankaran; Lord, Spencer A., System and method for coupling remote data stores and mobile devices via an internet based server.
  237. Tabbara,Bassam, System and method for custom installation of an operating system on a remote client.
  238. Rappaport, Theodore; Skidmore, Roger; Henty, Benjamin, System and method for design, tracking, measurement, prediction and optimization of data communication networks.
  239. Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V.; Tabbara, Bassam; Levi, Steven P.; Rehof, Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
  240. Hunt,Galen C.; Hydrie,Aamer; Welland,Robert V.; Tabbara,Bassam; Levi,Steven P.; Rehof,Jakob, System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model.
  241. Modiri Ramin ; Moiin Hossein,GBX, System and method for determining cluster membership in a heterogeneous distributed system.
  242. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
  243. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
  244. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Tabbara,Bassam; Welland,Robert V., System and method for distributed management of shared computers.
  245. Primak, Leonard; Chen, Kailai; Gnip, John, System and method for dynamic content routing.
  246. Murphy,Richard C.; Carter,Scott M.; Ornelas,Mario G.; Deshpande,Shrikant, System and method for dynamic resource configuration using a dependency graph.
  247. Nassar, Ayman, System and method for dynamic simultaneous connection to multiple service providers.
  248. Friedrich Richard J. ; Matinka Joseph J. ; Sienknecht Tracy F., System and method for efficiently monitoring quality of service in a distributed processing environment.
  249. Vu, Ky Quy, System and method for encryption using transparent keys.
  250. Hunt,Galen C.; Hydrie,Aamer; Welland,Robert V.; Tabbara,Bassam; Levi,Steven P.; Rehof,Jakob, System and method for logical modeling of distributed computer systems.
  251. Courts Howard R. ; Dholakia Neil K. ; Dunn Craig L. ; Huddleston Brian J. ; Huddleston Erik L. ; Macartney-Filgate Bruce C. ; McHyde Timothy J. ; Poorte Jacob, System and method for maintaining a state for a user session using a web system having a global session server.
  252. Jorgenson,Daniel Scott, System and method for maintaining consistent independent server-side state among collaborating servers.
  253. Dimitroff, John; Nguyen, Minh Chau Alvin, System and method for managing data flow and measuring service in a storage network.
  254. Anderson Brady ; Gaisford Calvin, System and method for managing user accounts in a communication network.
  255. Abu El Ata,Nabil A.; Zelechoski,Peter M., System and method for multi-phase system development with predictive modeling.
  256. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  257. Dutta, Partha P.; Vidovic, Nino; Vrsalovic, Dalibor F., System and method for network load balancing.
  258. Krishna, Gopal S.; Chow, Peter Ka-Fai; Viswanath, Somnath; Tzeng, Shr-Jie; Kanuri, Mrudula, System and method for network management of local area networks having non-blocking network switches configured for switching data packets between subnetworks based on management policies.
  259. Dumarot Daniel Peter ; Stevenson David Alan ; Dono Nicholas Richard ; Moulic James Randall ; Pickover Clifford Alan ; Schneider Bengt-Olaf ; Smith Adelbert, System and method for optimizing computer software and hardware.
  260. Randal Lee Bertram ; Frederick Scott Hunter Krauss ; Gregory J. McKnight, System and method for predicting computer system performance and for making recommendations for improving its performance.
  261. Bishop, David A.; Darcy, Paul B., System and method for remote management.
  262. Tabbara, Bassam; Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Welland, Robert V., System and method for restricting data transfers and managing software components of distributed computers.
  263. Tabbara,Bassam; Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Welland,Robert V., System and method for restricting data transfers and managing software components of distributed computers.
  264. Tabbara,Bassam; Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Stutz,David S.; Welland,Robert V., System and method for restricting data transfers and managing software components of distributed computers.
  265. Gibson William,GB2 ; Marshall David R. ; Turner Steve,GB2 ; Dawson William N. ; Hogan Patrick M., System and method for the creation and use of surrogate information system objects.
  266. Ferguson, Donald F.; Byrappagari, Anand; Dixon, Graeme, System and method for upgrading software in a distributed computer system.
  267. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Tabbara, Bassam; Van Antwerp, Mark D.; Welland, Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
  268. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
  269. Hunt,Galen C.; Hydrie,Aamer; Levi,Steven P.; Tabbara,Bassam; Van Antwerp,Mark D.; Welland,Robert V., System and method providing automatic policy enforcement in a multi-computer service application.
  270. Miyamoto,Carleton; Lin,Chang; Blume,William; Bandhole,Jagadish, System for dynamic provisioning of secure, scalable, and extensible networked computer environments.
  271. Slater, Charles; Chennapragada, Krishna Rao, System for managing cluster of network switches using IP address for commander switch and redirecting a managing request via forwarding an HTTP connection to an expansion switch.
  272. Peter J. Wilson GB; Paul J. Moran GB, System for providing fair access for VLANs to a shared transmission medium.
  273. Raghavendra Sondur ; Akhil Arora ; Rajeev Angal ; Balaji Pagadala ; Bart Fisher, System for representing device topology in a computer network operable independent of network management software.
  274. Leon L. Lumelsky ; Nelson R. Manohar, System for seamless streaming of data stored on a network of distributed primary and target servers using segmentation information exchanged among all servers during streaming.
  275. Badovinatz Peter Richard ; Brenner Larry Bert ; Chandra Tushar Deepak ; Kirby Orvalle Theodore ; Pershing ; Jr. John Arthur, System for utilizing batch requests to present membership changes to process groups.
  276. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  277. Masuoka Yoshimasa,JPX ; Kagimasa Toyohiko,JPX ; Kitai Katsuyoshi,JPX ; Noda Fumio,JPX, System using environment manager with resource table in each computer for managing distributed computing resources managed for each application.
  278. Fung,Henry T., System, architecture, and method for logical server and other network devices in a dynamically configurable multi-server network environment.
  279. Bowman-Amuah Michel K., System, method and article of manufacture for configuration management in a development architecture framework.
  280. Michel K. Bowman-Amuah, System, method and article of manufacture for managing an environment of a development architecture framework.
  281. Rappaport, Theodore S.; Gold, Brian T.; Skidmore, Roger R., System, method, and apparatus for portable design, deployment, test, and optimization of a communication network.
  282. Christopher Ambler ; Andrew Wallace, System, method, and computer program product for workflow processing using internet interoperable electronic messaging with mime multiple content type.
  283. Acharya,Anurag; Cocosel,Bogdan; Popescu,Catalin T.; Jhong,Eugene L.; Sim,Peng Toh, Systems and methods for automatic repair and replacement of networked machines.
  284. Berman Jeremy S., Systems and methods for generating and displaying a symbolic representation of a network model.
  285. Christopher Sean Johnson, Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for implementing language capabilities using the same.
  286. Wong, Joseph D.; Put, Peter A., Systems and methods for providing an automated diagnostic audit for cluster computer systems.
  287. Wong, Joseph D.; Put, Peter A., Systems and methods for providing automated diagnostic services for a cluster computer system.
  288. Wong,Joseph D.; Put,Peter A., Systems and methods for providing automated diagnostic services for a cluster computer system.
  289. Weldon,Phyllis Marie Dyer; Shankle, III,Edwin Bruce; Klein, Jr.,James Arthur, Systems, methods and computer program products for designing, deploying and managing interactive voice response (IVR) systems.
  290. Marin Gerald A. ; Onvural Raif O. ; Roginsky Allen Leonid ; Srinivasan Vijay, Systems, methods and computer program products for distributing connection information between ATM nodes.
  291. Watson Gary E., Telephone tone security device.
  292. Deborah L. Caswell ; Srinivas Ramanathan ; James D. Hunter ; Scott S. Neal ; Frederick A. Sieker ; Mark D. Smith, Template-driven approach for generating models on network services.
  293. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  294. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  295. Vassallo,Godfrey, Tracking system and method for electrically powered equipment.
  296. Lee, David C.; Wang, Peter S. S.; O'Connell, Anne G., Transparent access to network attached devices.
  297. Slonim Edwin,ILX, Transparent communication with multiple devices over a single serial or parallel port of a computer.
  298. Hendel Ariel ; Hejza Leo A. ; Kumar Sampath H. K., Trunking ethernet-compatible networks.
  299. Narayanaswamy,Sreedhara Srinivasulu; Boyd,Gerald L., Universal deployment tool.
  300. Ekstrom Joseph J. ; Gille J. Bernard, User-based binding of network stations to broadcast domains.
  301. Desai, Keyur B., Using and generating finite state machines to monitor system status.
  302. Hydrie,Aamer; Hunt,Galen C.; Levi,Steven P.; Tabbara,Bassam; Welland,Robert V., Using packet filters and network virtualization to restrict network communications.
  303. Tanimoto Shigeaki,JPX ; Nakajima Hikoyuki,JPX ; Isoda Kunihiko,JPX ; Nagai Kouichi,JPX ; Masui Takashi,JPX, VLAN control system and method.
  304. Yuasa Hiroyoshi,JPX ; Satake Tadashi,JPX ; Cardona Mario Jose,JPX ; Fujii Hisataka,JPX ; Yasuda Akira,JPX ; Yamashita Koji,JPX ; Suzaki Satoru,JPX ; Ikezawa Hideki,JPX ; Ohno Masami,JPX ; Matsuzaki A, Virtual LAN system.
  305. Miyake, Shigeru; Morisada, Tomohiro; Tezuka, Satoru; Miyazaki, Satoshi; Kurosaki, Yoshiyuki, Virtual network displaying system.
  306. Seid Howard A. ; Lespagnol Albert,FRX, Virtual private network.
  307. Hirschfeld, Robert A.; McCrory, Dave D., Virtualized logical server cloud providing non-deterministic allocation of logical attributes of logical servers to physical resources.
  308. Sheard Nicolas C. ; Fischer Larry J. ; Matthews Richard W. ; Gurla Himabindu ; Hu Qilin ; Zheng Wendy J. ; Mow Boyle Y., Visual data integration system and method.
  309. Kamal Emile Dimitri ; John Edward Kulakowski ; Rodney Jerome Means, Wireless communication between multiple intelligent pickers and with a central job queue in an automated data storage library.
  310. Brendel Juergen ; Kring Charles J. ; Liu Zaide ; Marino Christopher C., World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-n.

이 특허를 인용한 특허 (8)

  1. Brown, Andrew; Hansen, Peter, Disabling counterfeit cartridges.
  2. Brown, Andrew; Hansen, Peter, Disabling counterfeit cartridges.
  3. Sangubhatla, Murali, Domain access system.
  4. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  5. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  6. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  7. Schneider, James Paul, Stateless challenge-response broadcast protocol.
  8. Schneider, James P., Stateless challenge-response protocol.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로