$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for providing nested types for content management 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 UP-0438593 (2006-05-22)
등록번호 US-7818344 (2010-11-08)
발명자 / 주소
  • McVeigh, Ryan Sean
  • Roth, Steven L.
  • Patadia, Jalpesh
  • Saarva, Tanya
  • Zhou, Xiaojiang
  • Posner, Brad
출원인 / 주소
  • BEA Systems, Inc.
대리인 / 주소
    Fliesler Meyer LLP
인용정보 피인용 횟수 : 4  인용 특허 : 275

초록

In accordance with embodiments, there are provided mechanisms and methods for providing nested variables in a content management system. These mechanisms and methods for providing nested variables in a content management system can enable users to model types that can be used within other type defin

대표청구항

The invention claimed is: 1. A method for providing nested types in a content management system, the method comprising: providing a virtual content repository (VCR) that models content in a plurality of content repositories, wherein the VCR includes a plurality of nodes that are associated with a p

이 특허에 인용된 특허 (275)

  1. Abadi Martin (Palo Alto CA) Burrows Michael (Menlo Park CA) Wobber Edward P. (Menlo Park CA), Access control subsystem and method for distributed computer system using compound principals.
  2. Proctor, Paul E., Adaptive feedback security system and method.
  3. Mitchem Terrance ; Carney Michael R. ; Loe Brian J., Adaptive security system having a hierarchy of security servers.
  4. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  5. Horstmann Cay, Advertising-subsidized and advertising-enabled software.
  6. Thuraisingham Bhavani M. (Lexington MA), Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system.
  7. Somalwar,Kiran; Sinha,Dinesh, Application independent write monitoring method for fast backup and synchronization of files.
  8. Lenz Michael A., Automatic client configuration system.
  9. Chen, Shyh-Kwei; Chung, Jen-Yao; Cohen, Mitchell A.; Fu, Shiwa S.; Gottemukkala, Vibby, Automatic display script and style sheet generation.
  10. Nachenberg Carey S. ; Sobel William E., Backtracked incremental updating.
  11. Rosenthal Kathryn A.,GBX ; Berner Andrew J., Business query tool, using policy objects to provide query responses.
  12. Dave Wecker ; David Tuniman, Channel definition architecture extension.
  13. Kent Fillmore Hayes, Jr. ; Brett Graham King, Client-server system for maintaining a user desktop consistent with server application user access permissions.
  14. Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
  15. Kizu, Sachio; Muranaga, Tetsuro; Takabatake, Yoshiaki; Natsubori, Shigeyasu; Imai, Toru; Amano, Shinya, Communication method for data synchronization processing and electronic device therefor.
  16. Coppinger, Paul D.; Klingen, Michael S.; Spinella, Rinaldo, Communication systems, components, and methods operative with programmable wireless devices.
  17. Barrett Merwin John ; Cason Stanley Philip ; D'Andria Karen Marie ; Gearing Michael Wayne ; Ho Keith Ky Trieu ; Miller Hope Eleanor ; Paradis Rosemary DeSantis ; Woisard Eric, Compliance-to-policy detection method and system.
  18. Andrews, Anthony D., Composable roles.
  19. Hoyle Martin David, Computer interface method and apparatus with targeted advertising.
  20. Brownlie Michael,CAX ; Hillier Stephen,CAX ; Van Oorschot Paul C.,CAX, Computer network security system and method having unilateral enforceable security policy provision.
  21. Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
  22. Gerace Thomas A., Computer program apparatus for determining behavioral profile of a computer user.
  23. Brown,Daniel; Zapata,Fernando, Computer security system.
  24. Mwaura, James G., Computer software framework and method for synchronizing data across multiple databases.
  25. Merel Peter A., Computer-implemented system for controlling resources and policies.
  26. Huberman Steven A. ; Bauer Jonathan A., Concise dynamic user interface for comparing hierarchically structured collections of objects.
  27. Marl,Dennis Craig; Deo,Vinay; Lung,Tak Chung; Phillips,Jeffry Blaine; Thomson,Michael, Configuration and management systems for mobile and embedded devices.
  28. Goh, Cheh; Marco, Casassa Mont; Baldwin, Adrian John, Configuring computer systems.
  29. Mandal Kallol ; Poggio Andrew A. ; Bressler Robert D., Controlling devices on a network through policies.
  30. Davidson Harold R. ; Penn Derek, Creating and configuring component-based applications using a text-based descriptive attribute grammar.
  31. Gary A. Van Huben ; Joseph L. Mueller, Data management interoperability methods for heterogeneous directory structures.
  32. Multer, David L.; Garner, Robert E.; Ridgard, Leighton A.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M., Data package including synchronization data.
  33. Nordin,Richard J.; Bauer,Andreas L.; Krishnan,Sriram; Lazar,Gregory W., Data replication facility for distributed computing environments.
  34. Papierniak, Karen, Data warehouse portal.
  35. Mandal, Kallol; Jalali, Caveh F.; Ramarao, Prashant, Database for executing policies for controlling devices on a network.
  36. Brodersen Robert A. ; Chatterjee Prashant ; Lim Peter S., Database management system which synchronizes an enterprise server and a workgroup user client using a docking agent.
  37. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  38. Barnett, Janet Arlie; Vivier, Barbara Jean; Aggour, Kareem Sherif; Kornfein, Mark Mitchell, Delegated administration of information in a database directory.
  39. Hayashi Katsumi,JPX ; Saitou Kazuhiko,JPX ; Ohsato Hiroshi,JPX ; Mitani Masaaki,JPX ; Hayashi Tomohiro,JPX ; Obata Takashi,JPX ; Sekine Yutaka,JPX ; Ura Mitsuhiro,JPX ; Ishii Takuji,JPX, Derived data base processing system enabling one program to access a plurality of data basis.
  40. Tada Hitoshi,JPX ; Ogura Hiromi,JPX, Dielectric filter having an inner conductor with two open-circuited inner ends.
  41. Watts ; Jr. Charles E., Difference capture timer.
  42. Harrah, Richard D.; Sanchez, II, Humberto A; Finz, Jeffrey R.; Robb, Mary Thomas; Lister, Terence E.; Curtis, Paula B.; Drees, Douglas P., Disabling tool execution via roles.
  43. Thomas Anthony Roden ; John Knight ; David Cates, Disconnect policy for distributed computing systems.
  44. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  45. Charisius,Dietrich; Aptus,Alexander, Distributed computing component system with diagrammatic graphical representation of code with separate delineated display area by type.
  46. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  47. Beach, Brian; Platt, David C., Distributed database management system.
  48. Satoshi Kikuchi JP; Hiromichi Ito JP; Keiichi Nakane JP; Hisashi Hashimoto JP; Eisaku Nishiyama JP, Distributed database management system including logical database constituted by a group of physical databases.
  49. Prabhu,Manish S.; Anand,Tarun; Kakivaya,Gopala Krishna R., Distributed types and proxy refinement.
  50. Fenger, Russell J.; Durham, David M., Distributing policy information in a communication network.
  51. Watanabe,Shinichi; Nagatsuka,Toshio, Document transmission apparatus and a cellular phone apparatus.
  52. Horowitz Damon M. ; Rennison Earl F. ; Ruffles Joseph W. ; Strausfeld Lisa S., Dynamic generation of contextual links in hypertext documents.
  53. Stuart Eichert ; Danny M. Nessett ; Wenjun Luo ; Elaine Lusher, Dynamic policy management apparatus and method using active network devices.
  54. Bogrett, Steven W., Dynamic query model and method.
  55. Frieder Gideon (Syracuse NY) Frieder Ophir (Basking Ridge NJ), Dynamic query optimization using partial information.
  56. Garrison, John M.; Swart, Rose Anne, Dynamic, policy based management of administrative procedures within a distributed computing environment.
  57. Hardy Ann Ewing ; Hardy Norman ; Tribble E. Dean, Electronic authority server.
  58. Bluhm,Mark; Getting,Bruce; Hayft,Mark; Walz,Shirley, Electronic document repository management and access system.
  59. Lewis Jonathan Rhys,GBX, Enhanced security for computer system resources with a resource access authorization control facility that creates files and provides increased granularity of resource permission.
  60. Consentino Sharon Renee ; Fohn Steffen Michael ; Greef Arthur Reginald ; Hansen Gregory Christopher, Enhanced tree control system for navigating lattices data structures and displaying configurable lattice-node labels.
  61. Carl A. Gideon, Event management in a system with application and graphical user interface processing adapted to display predefined graphical elements resides separately on server and client machine.
  62. Clifford P. Van Dyke ; Peter T. Brundrett ; Michael M. Swift ; Praerit Garg ; Richard B. Ward, Extensible security system and method for controlling access to objects in a computing environment.
  63. Kim,Hong J.; Huang,Evan S., Extensible stylesheet designs using meta-tag and/or associated meta-tag information.
  64. Gore ; Jr. Robert C., File system and method for file system object customization which automatically invokes procedures in response to acces.
  65. Aridor,Yariv; Azagury,Alain Charles; Factor,Michael Edward; Maarek,Yoelle; Mandler,Benjamin, File system with access and retrieval of XML documents.
  66. Chang, David Yu; Chao, Ching-Yun; Chung, Hyen Vui; Mason, Carlton Keith; Venkataramappa, Vishwanath; Williamson, Leigh Allen, Fine grained role-based access to system resources.
  67. Peter Van Horne ; Edwin James Van Horne, Forced network portal.
  68. Klemm,Dirk M.; Chang,Richard A., Framework for integrating existing and new information technology applications and systems.
  69. Sidana Ashmeet S., General purpose web annotations without modifying browser.
  70. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  71. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  72. Scott L. Wiegel, Graphical network security policy management.
  73. Pachauri Kush, Graphical user interface for managing security in a database system.
  74. Mahon, Hugh F; Durham, David M; Tang, Puqi, Grouping targets of management policies.
  75. Brassard, Michel; Shingarov, Boris, Hierarchically structured control information editor.
  76. Ng Bernard Ignatius,SGX ; Sha Rong Qiang ; Maritzen Lynn Michael ; Sponheim Claire Jean, Hierarchy navigation system.
  77. Rangan P. Venkat ; Shastri Vijnan ; Sampath-Kumar P. Srihari ; Ashwani Arya, Hyperlinks resolution at and by a special network server in order to enable diverse sophisticated hyperlinking upon a digital network.
  78. Kuhn D. Richard, Implementation of role-based access control in multi-level secure systems.
  79. Barkley John ; Cincotta Anthony V., Implementation of role/group permission association using object access type.
  80. Venson M. Shaw ; Steven M. Shaw, Information processing system for directing information request from a particular user/application, and searching/forwarding/retrieving information from unknown and large number of information resour.
  81. Wiederhold Gio, Information sharing system and method with requester dependent sharing and security rules.
  82. Yasuhiro Ihara JP; Akihiro Suzuki JP; Nobuyuki Nakano JP; Hisaya Fukuda JP, Information terminal device and method for route guidance.
  83. Raz Uri, Information transfer systems and method with dynamic distribution of data, control and management of information.
  84. Karp Alan H. ; Gupta Rajiv ; Banerji Arindam ; Mak Ernest ; Kumar Sandeep ; Rozas Guillermo ; Chao Chia-Chiang ; Krishnan Venkatesh ; Bronstein Alexandre, Infrastructure for an open digital services marketplace.
  85. Schreiber,Marcel Zvi; Meir,Rannen Yosef, Instance browser for ontology.
  86. Weiss Kenneth P. (Newton MA), Integrated network security system.
  87. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  88. Alcorn,Robert L.; Cane,Daniel E.; Chasen,Michael L.; Chi,Timothy R.; Gilfus,Stephen R.; Perian,Scott; Pittinsky,Matthew L., Internet-based education support system and methods.
  89. Louise E. Moser ; Peter M. Melliar-Smith, Live upgrade process for object-oriented programs.
  90. Shyam Sundar Sarkar, METHOD AND APPARATUS FOR PROCESSING MARKUP LANGUAGE SPECIFICATIONS FOR DATA AND METADATA USED INSIDE MULTIPLE RELATED INTERNET DOCUMENTS TO NAVIGATE, QUERY AND MANIPULATE INFORMATION FROM A PLURALITY.
  91. Hemphill John M. ; Stupek ; Jr. Richard Allen ; Rozzi James A. ; Fairchild Steven E., Management event notification system using event notification messages written using a markup language.
  92. Bell, Carol A.; Shipley, Michael D.; Hahn, Scott D., Managing policy rules in a network.
  93. Jenkins Elwyn D., Marketing systems and methods that preserve consumer privacy.
  94. Shelton James A. ; Ingrassia ; Jr. Michael I. ; Rowland Thomas M., Mechanism for dependably managing web synchronization and tracking operations among multiple browsers.
  95. Liu, Sharon S.; Luehe, Jan, Mechanism for determining restrictions to impose on an implementation of a service.
  96. Murthy,Ravi; Krishnaprasad,Muralidhar; Chandrasekar,Sivasankaran; Sedlar,Eric; Krishnamurthy,Viswanathan; Agarwal,Nipun, Mechanism for mapping XML schemas to object-relational database systems.
  97. Liu, Sharon S.; Luehe, Jan, Mechanism for merging multiple policies.
  98. Harper,Jonathan E; Pope,Benjamin R; Wavell,Rufus S, Message integration framework for multi-application systems.
  99. Donohue Seamus Brendan,IEX, Method and a mechanism for synchronized updating of interoperating software.
  100. Zhao, Yan, Method and an apparatus for providing personalized service.
  101. McBride, Stephen Larry; Polson, Russell Glen; Davidson, Troy, Method and apparatus for automatically synchronizing data from a host computer to two or more backup data storage locations.
  102. Silberstein,Eric M.; Liu,Kenneth Y.; Shan,Chung Cheih; Song,Jimmy J.; Riney,Ryan S.; Pimlott,Andrew W.; Ross,Russell G., Method and apparatus for automatically updating website content.
  103. Hummel, Jr., Henry John; Singh, Karamjeet; Lamoureux, Thomas L.; Zettel, Hubert A.; Kelly, Michael E.; Ploetz, Lawrence E.; Mehring, David T.; Palliyal, Sunil Melepatt, Method and apparatus for community management in remote system servicing.
  104. Connor, William H., Method and apparatus for concurrency control in a policy-based management system.
  105. Stickler, Patrick, Method and apparatus for content repository with versioning and data modeling.
  106. Thomas C. Douglass, Method and apparatus for customization of information content provided to a requestor over a network using demographic information yet the user remains anonymous to the server.
  107. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  108. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  109. Gai Silvano,ITX ; McCloghrie Keith, Method and apparatus for defining and implementing high-level quality of service policies in computer networks.
  110. Chen,Shigang; Bhattacharya,Partha, Method and apparatus for deploying configuration instructions to security devices in order to implement a security policy on a network.
  111. Gerace Thomas A., Method and apparatus for determining behavioral profile of a computer user.
  112. Masayuki Ishikawa JP, Method and apparatus for editing data used in creating a three-dimensional virtual reality environment.
  113. Paul Zellweger, Method and apparatus for end-user management of a content menu on a network.
  114. Lewis James D. ; Reznik Bogdan N. ; Librach Eran ; Bonnet Bryce H. ; Lewis Nancy J., Method and apparatus for graphically representing information stored in electronic media.
  115. Reeves,Drue A.; Davenport,Christopher; Neufeld,E. David, Method and apparatus for increasing the functionality and ease of use of lights out management in a directory enabled environment.
  116. Sim, Siew Yong; Chan, Desmond Cho-Hung, Method and apparatus for initializing a new node in a network.
  117. Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Commons Brink GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Method and apparatus for object-oriented invocation of a server application by a client application.
  118. Bahrs,Peter; Lillie,Brian Thomas; Van Horn,Isabel Berdeen, Method and apparatus for portable universal resource locator and coding across runtime environments.
  119. Ko, Cheuk W.; Rho, Jaisook, Method and apparatus for providing a policy-driven intrusion detection system.
  120. Ananda, Mohan, Method and apparatus for secure data storage and retrieval.
  121. Oshimi Kiyoshi,JPX ; Kida Hiroyuki,JPX ; Watanabe Masaki,JPX ; Kozuka Shinichi,JPX, Method and apparatus for synchronizing databases within intelligent network.
  122. Weinreb Daniel L. (Arlington MA) Haradhvala Sam J. (Weston MA), Method and apparatus for virtual memory mapping and transaction management in an object-oriented database system.
  123. Christie David ; Winner Jeffrey, Method and apparatus for workgroup information replication.
  124. Archibald William Charles ; Spielman Terence Paul ; Spielman Jason, Method and apparatus that accounts for usage of digital applications.
  125. Nikander Pekka,FIX ; Ylonen Tatu,FIX, Method and arrangement for implementing IPSEC policy management using filter code.
  126. Hotti, Timo; Parkkinen, Jarmo, Method and arrangement for the management of database schemas.
  127. Teruyuki Kawagoe JP, Method and device for synchronizing databases in a network management system.
  128. Deinhart Klaus,DEX ; Gligor Virgil ; Lingenfelder Christoph,DEX ; Lorenz Sven,DEX, Method and system for advanced role-based access control in distributed and centralized computer systems.
  129. Cambridge,Rodney D., Method and system for bi-directional updating of antivirus database.
  130. Mason, Robert; Hung, Natalya; Berkovitz, Joseph, Method and system for constructing personalized result sets.
  131. Kanada,Yasusi; O'Keefe,Brian J., Method and system for controlling a policy-based network.
  132. Karabulut, Yuecel, Method and system for delegating authority in an online collaborative environment.
  133. Amy Rubert ; Bren Dykes ; Saraswatula V. Sastry ; Shreedev G. Nair ; Shane Hatch, Method and system for efficiently retrieving information from multiple databases.
  134. Elgressy Doron,ILX ; Jospe Asher,ILX, Method and system for enforcing a communication security policy.
  135. Kawasaki, Charles, Method and system for generating and using a computer user's personal interest profile.
  136. Poulsen,Thomas J., Method and system for portal web site generation.
  137. LeMole Suzanne L. ; Nurenberg Steven Howard ; O'Neil Joseph Thomas ; Stuntebeck Peter H., Method and system for presenting customized advertising to a user on the world wide web.
  138. Frauenhofer Thomas Valentine ; Marques Joaquin Manuel ; Moran Michael Edward ; Palchowdhury Subhas ; Schaffer Jeffrey Stephen, Method and system for providing access for categorized information from online internet and intranet sources.
  139. Hodges Vernon ; O'Donnell Shawn, Method and system for providing automated updating and upgrading of antivirus applications using a computer network.
  140. Yu, Jin; Chen, Jun; Chen, Hseuping, Method and system for providing virtual access to information distributed across heterogeneous catalog servers.
  141. Miller, Clint; Renteria, Ray; Castoe, Mark; Rodney, Daniel; Dalton, Craig; Reynolds, Shad; Ellerbee, Jeff, Method and system for querying an applied data model.
  142. Brett Howard CA; Paul Kierstead CA; Gabor Solymar CA; Andrew Robison CA; Roy Pereira CA; Lucien Marcotte CA, Method and system for secure network policy implementation.
  143. Guedalia Isaac David,ILX ; Hashkes Jonathan,ILX, Method and system for server access control and tracking.
  144. Osborne, II, Theodore M.; Glik, Michael V.; Vahey, Walter G.; Baker, Caren H.; Friedman, George, Method and system for software object testing.
  145. Chuck Y. Chan ; Krishna Ganugapati ; Margaret K. Johnson ; Steven G. Judd ; Stuart L. S. Kwan ; Colin Watson, Method and system for uniformly accessing multiple directory services.
  146. Dixon, III,Walter; Murren,Brian, Method and system for verifying a computer program.
  147. Heckerman David E. ; Chickering David Maxwell ; Fayyad Usama M. ; Meek Christopher A., Method and system for visualization of clusters and classifications.
  148. Garry L. Child ; Theodore Jack London Shrader ; Davis Kent Soper, Method for changing a security policy during processing of a transaction request.
  149. Rubin, Andrew E.; Britt, Jr., Joe Freeman; Hershenson, Matthew J., Method for configuring and authenticating newly delivered portal device.
  150. Van Huben Gary Alan ; Mueller Joseph Lawrence, Method for managing a plurality of data processes residing in heterogeneous data repositories.
  151. Capek Peter George, Method for providing individually customized content in a network.
  152. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for role and resource policy management.
  153. Winkler,Kay Hans Peter, Method for the administration of a data base.
  154. Sampson Wesley C. ; Douthat Dean Z., Method for the organizational indexing, storage, and retrieval of data according to data pattern signatures.
  155. D'Arlach Carmen Ximena ; Kershner Stephen Kenneth ; Singh Sameer Satyendra, Method of creating and editing a web site in a client-server environment using customizable web site templates.
  156. Golshani Forouzan ; Friesen Oris D. ; Howell Thomas H., Method of integrating schemas of distributed heterogeneous databases.
  157. Rochberger Haim,ILX, Method of topology database synchronization in an asynchronous transfer mode network.
  158. Brian John Cragun, Method, apparatus and computer program product for providing document user role indication.
  159. Yun-Wu Huang ; Philip Shi-lung Yu, Method, apparatus and program storage device for a client and adaptive synchronization and transformation server.
  160. Kahn,Clifford E., Methods and apparatus for controlling access to a resource.
  161. DeGroot Michael ; Lemke Ralph, Methods and apparatus for declarative programming techniques in an object oriented environment.
  162. Travis ; Jr. Robert L. (Concord MA) Wilson Andrew P. (Burghfield Common NH GB2) Jacobson Neal F. (Nashua NH) Renzullo Michael J. (Ashland MA), Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment.
  163. O'Neill, Alan; Corson, M. Scott; Park, Vincent; Tsirtsis, George, Methods and apparatus for supporting session signaling and mobility management in a communications system.
  164. Howard, Michael; Brown, Don L.; Clark, Quentin J.; Dillingham, Lara N.; Meijer, Ronald; Multerer, Boyd C.; Sellers, Timothy D., Methods and apparatus for synchronizing access control in a web server.
  165. Glasser Daniel S. ; McCurdy Ann Elizabeth ; Price Robert M., Methods and arrangements for controlling resource access in a networked computing environment.
  166. Van Huben Gary A. ; Mueller Joseph L., Methods for shared data management in a pervasive computing environment.
  167. Parker, Thomas Anthony, Migration from in-clear to encrypted working over a communications link.
  168. Van Huben, Gary A.; Mueller, Joseph L., Modular scalable system for managing data in a heterogeneous environment with generic structure for control repository access transactions.
  169. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  170. Ngo Teodora ; Winiger Gary W., Multilevel security attribute passing methods, apparatuses, and computer program products in a stream.
  171. Voas Ed ; Gourdol Arnaud, Multiple theme engine graphical user interface architecture.
  172. Rogers Lawrence D. (13644 Boquita Dr. Del Mar CA 92014) Wellington-Oguri Roger (7931 Nightingale Way San Diego CA 92123), Network policy implementation system for performing network control operations in response to changes in network state.
  173. Jacobson, Andrea M., Network policy management and effectiveness system.
  174. H체tsch,Matthias; Hofmann,Ralf; Sommerfeld,Kai, Network portal system and methods.
  175. Tanaka, Ryoju; Tamura, Yasuo, Node representation system, node monitor system, the methods and storage medium.
  176. Mohsen Al-Ghosein ; Jan S. Gray ; Amit Mital ; Rodney Limprecht, Object load balancing.
  177. Danno, Hirofumi; Yuura, Katsuhiko; Iwabuchi, Fumihiko, Object oriented technology analysis and design supporting method.
  178. Luckenbaugh Gary L., Object-oriented trusted application framework.
  179. Row Edward J. (Mountain View CA) Boucher Laurence B. (Saratoga CA) Pitts William M. (Los Altos CA) Blightman Stephen E. (San Jose CA), Parallel I/O network file server architecture.
  180. Chaum David ; Ferguson Niels T.,NLX ; Schoenmakers Berry,NLX ; Voskuil Erik W.,NLX, Partitioned information storage systems with controlled retrieval.
  181. Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan ; Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Dev Roger ; Ibe Oliver ; Aggarwal Ajay ; Wohlers Todd, Policy management and conflict resolution in computer networks.
  182. Bruce F. Bahlmann, Policy management method and system for internet service providers.
  183. Watts, Jr.,La Vaughn F.; Dailey,James E., Portable computer system with hierarchical and token-based security policies.
  184. Anuff Ed ; Taylor John Dean ; Chaston Miles ; MacLeod David ; Leiser Peter ; Muoto Oliver ; Ladygo Seth ; Slesinsky Brian ; Joyce Terry, Portal server that provides a customizable user Interface for access to computer networks.
  185. Acker, Liane Elizabeth Haynes; Knutson, James Irwin; LeBlanc, Karalee Brown, Process and system for providing name service scoping behavior in java object-oriented environment.
  186. Grimm Robert ; Bershad Brian N., Process for transparently enforcing protection domains and access control as well as auditing operations in software components.
  187. Fletcher,James C.; Lindquist,David B.; Wanderski,Michael C.; Wesley,Ajamu A., Programmatic management of software resources in a content framework environment.
  188. Torango Lawrence J., Progressive wagering system.
  189. Hambrick Geoffrey Martin (Round Rock TX) Rogers Judd Thomas (Austin TX), Project management tool implementing authority for a people oriented work environment tool.
  190. Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Publication network control system using domain and client side communications resource locator lists for managing infor.
  191. Ahlstrom John K. ; Schleimer Stephen I., Recognizing and processing conflicts in network management policies.
  192. Roy H. Scott ; Harvey William D., Reducing latency when synchronizing access to a multi-user database over a network.
  193. Halim Chris ; Stossel John W., Remote data access and synchronization.
  194. Lortz, Victor B., Resource policy management using a centralized policy data structure.
  195. John R. Hind ; David Bruce Lection ; Leonard Douglas Tidwell, II ; Brad B. Topol ; Ajamu A. Wesley, Retrieval of style sheets from directories based upon partial characteristic matching.
  196. High, Jr.,Robert Howard; Nadalin,Anthony Joseph; Nagaratnam,Nataraj, Role-permission model for security policy administration and enforcement.
  197. Schaefer Marvin ; Martel Paul A. ; Kanawati Antoun J. ; Wade Sandra A., Secure multilevel object oriented database management system.
  198. Eric M. Olden, Security and access management system for web-enabled and non-web-enabled applications and content on a computer network.
  199. Sharma,Rahul, Security architecture for integration of enterprise information system with J2EE platform.
  200. Saito Yoko,JPX ; Shimizu Michihiro,JPX ; Ikeuchi Manabu,JPX, Security management method for network system.
  201. Erfani, Shervin, Security management system and method.
  202. Danieli, Damon V., Security services and policy enforcement for electronic data.
  203. Tripp, Gary W.; Meadway, Michael D.; Duguay, Claude E., Sending to a central indexing site meta data or signatures from objects on a computer network.
  204. Adya,Atul; Bolosky,William J.; Cermak,Gerald; Douceur,John R.; Theimer,Marvin M.; Wattenhofer,Roger P., Serverless distributed file system.
  205. Clark, Michael S.; Braum, Philip E.; Davis, Larry W., Service portal with application framework for facilitating application and feature development.
  206. Gvily,Yaniv, Snippet selection.
  207. Stubblebine Stuart Gerald, Specifying security protocols and policy constraints in distributed systems.
  208. Stubblebine Stuart Gerald, Specifying security protocols and policy constraints in distributed systems.
  209. Dunham, Douglas Paul; Dunn, Andrew; Dunton, Tina Lynn; Perkins, Jason Michael; Yip, Ophelia K., Storage area network methods and apparatus for display and management of a hierarchical file system extension policy.
  210. Gustman, Samuel; DeLury, Barbara, Surveying system and method.
  211. Kudo Miki,JPX ; Kamijo Akinori,JPX ; Kamata Masaharu,JPX ; Mizuma Keiji,JPX ; Kozaki Yoshihiro,JPX, Synchronization method applied to databases in network management system.
  212. Buchanan David D., Synchronization of server database with client database using distribution tables.
  213. Flanagin, Stephen D.; Ginsberg, Michael, Synchronizing a store with write generations.
  214. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  215. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  216. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  217. Hamilton Graham, System and method for automatic configuration of home network computers.
  218. Yost Kyle N. ; Wilding Peter G. ; Trenkamp Robert G., System and method for automatic transmission of personalized OLAP report output.
  219. Bernardo Richard S. ; Macphee David A. ; Smith Jennifer J., System and method for building a web site with automated help.
  220. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  221. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  222. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  223. Arcuri Michael P. ; McBride Christopher Michael ; van Tilburg Martijn E., System and method for customizing controls on a toolbar.
  224. Bowman William B. (Herndon VA), System and method for detecting fraudulent network usage patterns using real-time network monitoring.
  225. Timmons, Michael, System and method for dynamic content retrieval.
  226. Stapel, Kevin; Gormsen, Ed, System and method for dynamic generation of structured documents.
  227. Skufca, Jim; Smith, David; Bugh, Rob; Buslawski, John, System and method for dynamically securing dynamic-multi-sourced persisted EJBS.
  228. McLauchlin, Andrew William, System and method for efficient integration of government administrative and program systems.
  229. Du Weimin ; Davis James W. ; Shan Ming-Chien, System and method for enterprise workflow resource management.
  230. Kim, Jae Hoon, System and method for exchanging online information over private network.
  231. Birnbaum William C., System and method for implementing a hierarchical policy for computer system administration.
  232. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  233. Peel, Jr., James W.; Langston, Melanie, System and method for interactive electronic media extraction for web page generation.
  234. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  235. Reuter, James E.; Thiel, David W.; Wrenn, Richard F.; St. Martin, Andrew C., System and method for managing virtual storage.
  236. Zothner, Eric R., System and method for notification subscription filtering based on user role.
  237. Arthur Koeppel ; Jonathan Turner, System and method for performing dynamic Web marketing and advertising.
  238. Cheng Pau-Chen (Yorktown Heights NY) Luan Shyh-Wei (San Jose CA), System and method for policy-based inter-realm authentication within a distributed processing system.
  239. Robert N. Goldberg ; Gloria Y. Lam, System and method for providing a query object development environment.
  240. Craig Russell O., System and method for providing a synchronized display to a plurality of computers over a global computer network.
  241. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  242. Gullotta, Tony J.; Bohren, Jeffrey S.; Chen, Liangtong; Curie, Jeffrey C., System and method for provisioning resources to users based on policies, roles, organizational information, and attributes.
  243. Nishizawa, Itaru; Inohara, Shigekazu; Sagawa, Nobutoshi; Shimizu, Akira, System and method for query processing using virtual table interface.
  244. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  245. Johnson Robert D., System and method for security control in a data processing system.
  246. Wotring, Steven C.; Ripley, John R., System and method for sharing, mapping, transforming data between relational and hierarchical databases.
  247. Shi,Shepherd S. B.; Rinkevich,Debora B.; Droste,William M., System and method for synchronizing data of wireless devices.
  248. Wotring, Steve C.; Ripley, John R., System and method for transforming a relational database to a hierarchical database.
  249. Yost Kyle N. ; Wilding Peter G. ; Trenkamp Robert G., System and method of adapting automatic output of service related OLAP reports to disparate output devices.
  250. Paul M. Gervais ; Alexander C. Barrentine ; Martin S. Cox ; R. Scott Coyle ; Kenneth J. Hawley ; Gerald O. Neild, Jr. ; Michael Leslie Richards ; Jay Joseph Thomas, System and method to provide secure navigation to resources on the internet.
  251. Vasudevan, Narayanan; Malik, Sohail, System and method to support varying maximum cryptographic strength for common data security architecture (CDSA) applications.
  252. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  253. Herrmann, Conrad K.; Baharestan, Kaveh; Bentley, Joseph E.; Leroy, Jess A., System and methods providing anti-virus cooperative enforcement.
  254. Alexander, Vlad, System and process for managing content organized in a tag-delimited template using metadata.
  255. Nehab Smadar ; Wickramaratne Manjula G. ; Klark Paul L., System for generating a custom formatted hypertext document by using a personal profile to retrieve hierarchical documents.
  256. Thuraisngham Bhavani M. (209 Katardin Rd. Lexington MA 02173) Ford William R. B. (13 Coach Rd. Billerica MA 01862) Collins Marie S. (4452 Wordsworth Rd. Plano TX 75093) O\Keeffe Jonathan P. (70 JFK B, System for multilevel secure database management using a knowledge base with release-based and other security constraint.
  257. Flynn Rex A. (Belmont MA) Anick Peter G. (Marlboro MA), System for reconstructing prior versions of indexes using records indicating changes between successive versions of the.
  258. Feiertag, Richard J.; Thomas, Roshan; Rho, Jaisook; Cohen, Eve L.; Rosset, Sebastien T.; Redmond, Timothy, System, method and computer program product for secure communications using a security service provider manager.
  259. Friedman,Gregory S.; Negrin,Richard L., Systems and methods for granular changes within a data storage system.
  260. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  261. Sezgin, Beysim; Altudov, Denis Y.; Blakeley, Jose A.; Venkatesh, Ramachandran; Yu, Wei, Systems and methods for supporting inheritance for user-defined types.
  262. Scott Roderick Keith (Durham NC) Tai Ling-Ching Wang (Cary NC), Systems and methods for synchronizing databases in a receive-only network.
  263. Baber Stephen C. ; Blount Brian ; Britton Kathryn Heninger ; Kaminsky David Louis ; O'Meara Ann Marie, Systems, methods and computer program products for assigning, generating and delivering content to intranet users.
  264. Austin Pamela Sue, Systems, methods, and computer program products for delivering information in a preferred medium.
  265. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  266. Ahlstrom John K. ; Schleimer Stephen I., Verifying that a network management policy used by a computer system can be satisfied and is feasible for use.
  267. Pressmar, Peter, Virtual database of heterogeneous data structures.
  268. Michael P. Salisbury ; James P. Dourish ; Warren K. Edwards ; Anthony G. LaMarca ; John O. Lamping ; Karin Petersen ; Douglas B. Terry ; James D. Thornton, Virtual documents generated via combined documents or portions of documents retrieved from data repositories.
  269. Paul Haverstock ; Miguel Estrada ; Julio Estrada, Web server providing role-based multi-level security.
  270. Bernardo, Richard S.; MacPhee, David A., Web site creator using templates.
  271. Azuma,Tomihiko, Web-content providing method and web-content providing system.
  272. Stewart,Rocky; Takacsi Nagy,Pal; Metsaportti,Timo; Price,Adrian, Workflow integration system for enterprise wide electronic collaboration.
  273. Barkley John, Workflow management employing role-based access control.
  274. Choquier, Philippe; Sleeman, Martin J., XML methods and systems for synchronizing multiple computing devices.
  275. Bata, Anthony P.; Boyd, Clayton T., XML presentation of general-purpose data sources.

이 특허를 인용한 특허 (4)

  1. Boyer, John E.; Kelley, Edward E.; Lane, Eoin, Dynamically mapping and maintaining a customized method set of tags particular to an extention point.
  2. Sutton-Shearer, Drake, System and method for hosting a social networking website having a theme of achievement.
  3. Chintala, Sreekanth; Vijjapurapu, Rama; Price, Todd; Angstadt, Nathan; Rao, Hari Charan Ramachandra, Systems and methods for integration of business applications with enterprise content management systems.
  4. Sutton-Shearer, Drake, Virtual goods having nested content and system and method for distributing the same.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로