$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for collecting information from computer systems based on a trusted relationship 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0044760 (2008-03-07)
등록번호 US7962571 (2011-05-31)
발명자 / 주소
  • Yuan, Chun
  • Wang, Jiahe Helen
  • Wang, Yi-Min
  • Zhang, Zheng
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Perkins Coie LLP
인용정보 피인용 횟수 : 1  인용 특허 : 56

초록

A method and system for retrieving data from devices in a way that seeks to preserve privacy and ensure the integrity of the retrieved data is provided. A retrieval system is implemented on a network of devices that communicate with each other via a secure communications link. Each device is directl

대표청구항

We claim: 1. A method for retrieving data from devices, at each device the method comprising:receiving at this device from a previous device a request for data, the request requesting that data is to be collected from the device and returned to a requesting device;when this device is to provide the

이 특허에 인용된 특허 (56)

  1. Wang, Jiahe Helen; Borisov, Nikita; Huang, Qiang; Jao, David, Aggregating information from a cluster of peers.
  2. Ackaouy,Emmanuel; Amdur,Matthew B.; Prakash,Ashish; Ayyar,Kartik, Apparatus and method for tandem operation in a storage network.
  3. Nakano, Takashige, Apparatus for detecting abnormal execution of program.
  4. Thubert, Pascal; Wetterwald, Patrick, Arrangement in a router for establishing multicast group hierarchy and coalescence.
  5. Kampe,Mark A.; Herrmann,Frederic; Nguyen,Gia Khanh; Barrat,Frederic; Bethmangalkar,Ramachandra; Chitloor,Ravi V., Cluster configuration repository.
  6. Yasuda,Shigeru, Computer recovery method and system for recovering automatically from fault, and fault monitoring apparatus and program used in computer system.
  7. Swildens, Eric Sven-Johan; Day, Richard David; Gupta, Ajit K., Content delivery and global traffic management network system.
  8. Deo,Ajay P.; Dugan,Andrew; Holmes,Allen; Porter,Kelvin R.; Robb,Terence A., Deploying service modules among service nodes distributed in an intelligent network.
  9. Micali Silvio, Distributed split-key cryptosystem and applications.
  10. Shigenori Uchiyama JP; Tatsuaki Okamoto JP, Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon.
  11. Diep, Thanh A.; Botros, Sherif M.; Izenson, Martin D., Features generation for use in computer network intrusion detection.
  12. Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
  13. Viswanathan Srinivasan ; Nazari Siamak ; Swaroop Anil ; Khalidi Yousef, Global file system-based system and method for rendering devices on a cluster globally visible.
  14. Szor,Peter, Host-based detection and prevention of malicious code propagation.
  15. Gupta Kalyan Moy,CAX ; Langley Alan Mark,CAX ; Ching John Yen,CAX, Knowledge-based information retrieval system.
  16. Needham, Bradford H.; Lewis, Mark, Limiting request propagation in a distributed file system.
  17. Cypher,Robert E., Mechanism and method employing a plurality of hash functions for cache snoop filtering.
  18. Chen,Priscilla L.; Hester,Lance E.; Huang,Yan, Method and apparatus for a communication network with nodes capable of selective cluster head operation.
  19. Asawa Manjari, Method and apparatus for analyzing the performance of an information system.
  20. Unkle,C. Richard; Roddy,Nicholas Edward, Method and apparatus for diagnosing difficult to diagnose faults in a complex system.
  21. Lowery,Keith A.; Davidson,David K.; Saxena,Avinash C., Method and apparatus for dynamic data flow control using prioritization of data requests.
  22. Okmianski, Anton; Morris, Greg; Webb, Timothy; Graham, Mickael; Bainbridge, David K.; Taylor, Adam L., Method and apparatus for dynamically configuring customer premises network equipment.
  23. Hansen Peter A., Method and apparatus for guided configuration of unconfigured network and internetwork devices.
  24. Schmitz, Peter O.; Cafarelli, Dominick A.; Anderson, James P.; Rosenthal, Elazar, Method and apparatus for monitoring different channels in an IEEE 802.11 wireless LAN.
  25. Matena Vladimir, Method and apparatus for reliable disk fencing in a multicomputer system.
  26. Arnold,William C.; Chess,David M.; Morar,John F.; Segal,Alla; Whalley,Ian N.; White,Steve R., Method and apparatus for the automatic determination of potentially worm-like behavior of a program.
  27. Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
  28. Mohaban,Shai; Parnafes,Itzhak; Kahane,Opher, Method and apparatus providing media aggregation in a packet-switched network.
  29. Liang, Charles, Method and architecture for monitoring the health of servers across data networks.
  30. Yuan,Chun; Wang,Jiahe Helen; Wang,Yi Min; Zhang,Zheng, Method and system for collecting information from computer systems based on a trusted relationship.
  31. Shvodian,William M., Method and system for dynamic aggregation in a wireless network.
  32. Kathail, Pradeep K.; Yiu, Shoou; Valencia, Andrew, Method and system for executing, tracking and restoring temporary router configuration change using a centralized database.
  33. Skinner,Steven George; Goodman,Donna Lynn, Method for diagnosing hardware configuration in a clustered system.
  34. Mattsson,Ulf, Method for intrusion detection in a database system.
  35. Dewey,Douglas William, Method, system, and program for allocating tasks to a plurality of processors.
  36. McCollum,Raymond W.; Palanca,Radu R.; Pfenning,Jorg T.; Sutton,Alexander M.; Brown,Mark R., Model-based management of computer systems and distributed applications.
  37. Adams,Mark, Network model audit and reconciliation using state analysis.
  38. Egbert Chandan ; Chow Peter Ka-Fai ; Kerstein Denise, Network switch port configured for generating an index key for a network switch routing table using a programmable hash function.
  39. Kumar,Ajay; Susarla,Hanumantha Rao; Khemani,Prakash, Object mutation determination for incremental state saves.
  40. Gupta,Rohit; Gavrilescu,Alexandru; Miller,John L.; Wheeler,Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
  41. Bernklau-halvor, David I., Printer diagnostics method.
  42. Wang, Jiahe Helen; Huang, Qiang; Jao, David, Privacy-preserving data aggregation using homomorphic encryption.
  43. Barford, Lee A.; Smith, David R., Probabilistic diagnosis, in particular for embedded and remote applications.
  44. Subramanian, Siva; Lavian, Tal I., Routing architecture including a compute plane configured for high-speed processing of packets to provide application layer support.
  45. Kraft, IV, George, Software configuration monitor.
  46. de Leeuw van Weenen Marcus J. (Salford GB2) Glynn Kevin (Manchester GB2) Jenkins Gareth I. (Bracknell GB2), Status monitoring arrangement for a data processing system comprising a number of managed objects.
  47. Todd David K. ; Terrell Michael R., System and method for distributing configuration-dependent software revisions to a computer system.
  48. Aldred Barry Keith,GBX ; Bonsall Gordon,GBX ; Lambert Howard Shelton,GBX ; Mitchell Harry David,GB2, System and method for establishing a communication channel over a heterogeneous network between a source node and a des.
  49. Rasiklal Punjalal Shah ; Vipin Kewal Ramani ; Susan Teeter Wallenslager ; Christopher James Dailey, System and method for integrating a plurality of diagnostic related information.
  50. Wang, Xin, System and method for protection of digital works.
  51. Voas, Jeffrey M.; Ghosh, Anup K., System and method for software certification.
  52. Golender,Valery; Moshe,Ido Ben; Wygodny,Shlomo, System and method for troubleshooting software configuration problems using application tracing.
  53. Honig,Andrew; Howard,Andrew; Eskin,Eleazar; Stolfo,Salvatore J., System and methods for adaptive model generation for detecting intrusions in computer systems.
  54. Raden,Gary P.; da Fonseca Melo,Eduardo; Ekmekci,Tolga Bayram; Soemo,Thomas M.; Butler,Lisa M.; Moerloos, Jr.,Richard J., Systems and methods for health monitor alert management for networked systems.
  55. Berkman,Peter C.; Nalbandian,Gevik H.; Waldorf,Jerry A.; Srihari,Rangaswamy; Demetriades,Alexander, Systems and methods for providing centralized management of heterogeneous distributed enterprise application integration objects.
  56. Dutt,Bala; Kumar,Ajay; K.,Venugopal Rao; Bhogi,Sankara R.; Kannan,Srinivasan, Utility for configuring and verifying data sources.

이 특허를 인용한 특허 (1)

  1. Okachi, Yuji; Sawada, Hayashi; Tsuchiya, Kouhei, Software updating system, software updating method, and software updating program.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로