$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for providing restricted access to a storage medium 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/00
출원번호 US-0431387 (2009-04-28)
등록번호 US-8234477 (2012-07-31)
우선권정보 CA-2244626 (1998-07-31)
발명자 / 주소
  • Shaath, Kamel
출원인 / 주소
  • KOM Networks, Inc.
대리인 / 주소
    Albrecht Tousi & Farnum PLLC
인용정보 피인용 횟수 : 15  인용 특허 : 230

초록

A method of restricting file access is disclosed wherein a set of file write access commands are determined from data stored within a storage medium. The set of file write access commands are for the entire storage medium. Any matching file write access command provided to the file system for that s

대표청구항

1. A method for applying an operation access privilege to a storage medium, comprises: associating an access privilege with at least a portion of the storage medium;intercepting an attempted operation on said at least a portion of the storage medium, wherein said intercepting occurs regardless of an

이 특허에 인용된 특허 (230)

  1. Ogawa,Junji; Matsunami,Naoto; Iwasaki,Masaaki; Sonoda,Koji; Tsukiji,Kenichi, Access to disk storage using file attribute information.
  2. Bodin,William Kress, Ad hoc data sharing in virtual team rooms.
  3. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  4. Laney Clifton W. ; Leszczynski Larry M. ; Madison Mary J., Apparatus and a method for allowing an operating system of a computer system to persist across a power off and on cycle.
  5. Vasudevan Rangaswamy (Sunnyvale CA), Apparatus and method for a federated naming system which can resolve a composite name composed of names from any number.
  6. Rohatgi Pankaj (Sunnyvale CA) Dureau Vincent (Vemas CA), Apparatus and method for authenticating transmitting applications in an interactive TV system.
  7. Menand Jean-Rene (Marina Del Rey CA) Joseph Kuriacose (Plainsboro NJ) Jessup ; Jr. Ansley W. (Willingboro NJ), Apparatus and method for formulating an interactive TV signal.
  8. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  9. Anderson Eric D., Apparatus and method to determine cause of failed boot sequence to improve likelihood of successful subsequent boot att.
  10. Yuval Ofek ; Zoran Cakeljic ; Samuel Krikler IL; Sharon Galtzur IL; Michael Hirsch IL; Dan Arnon ; Peter Kamvysselis, Apparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size.
  11. May Michael D. (9 Eaton Crescent Clifton ; Bristol BS8 2EJ GBX) Parsons Brian J. (Flat 7 ; 7 Rodney Place Clifton ; Bristol BS8 4HY GBX) Thompson Peter W. (47 Wessex Avenue Horfield ; Bristol BS7 ODE, Apparatus providing addressable storage locations as virtual links and storing predefined destination information for an.
  12. Bergler Frank (Niefern DEX), Application program interface.
  13. Crosswy Wm. Caldwell (Spring TX) Barron Dwight L. (Houston TX) Abmayr David W. (Spring TX) Rosenblum Harvey M. (Spring TX) Burckhartt David M. (Houston TX), Automatic development of operating system boot image.
  14. Kikinis Dan, Automatic recovery for network appliances.
  15. Cannon David Maxwell ; Kaczmarski Michael Allen ; Warren ; Jr. Donald Paul, Availability and recovery of files using copy storage pools.
  16. Kitajima Hiroyuki (Yokohama) Yamamoto Akira (Yokohama) Doi Takashi (Hadano) Nozawa Masafumi (Odawara JPX), Buffered peripheral system and method for backing up and retrieving data to and from backup memory device.
  17. Ofek Yuval, Bundling of write data from channel commands in a command chain for transmission over a data link between data storage s.
  18. Westby Judy Lynn, CRC checking using a CRC generator in a multi-port design.
  19. Candelaria Susan Kay (Tucson AZ) Legvold Vernon John (Tucson AZ) Stanley Warren Keith (Tucson AZ), Cache queue entry linking for DASD record updates.
  20. Tribble E. Dean ; Miller Mark S. ; Hardy Norman ; Hibbert Christopher T. ; Hill Eric C., Capability security for transparent distributed object systems.
  21. Shah, Lacky Vasant; Arai, Daniel Takeo; Benitez, Manuel Enrique; Holler, Anne Marie; Wohlgemuth, Robert Curtis, Client-side performance optimization system for streamed applications.
  22. Joiner,Herbert V., Comprehensive enterprise network analyzer, scanner and intrusion detection framework.
  23. Squibb Mark, Computer apparatus and method for merging system deltas.
  24. Johnson Judy J. ; McElroy ; Jr. James R., Computer based records management system method.
  25. Elizabeth Lynn Borowsky ; Richard Andrew Golding ; Dushyanth Narayanan, Computer data storage system with migration plan generator.
  26. Burckhartt David M. (Houston TX) Perez Lazaro D. (Houston TX) Emerson Theodore F. (Houston TX) Dow Randolph O. (Cypress TX) Stimac Gary A. (Montgomery TX), Computer failure recovery and alert system.
  27. Burckhartt David M. ; Perez Lazaro D. ; Emerson Theodore F. ; Dow Randolph O. ; Stimac Gary A., Computer failure recovery and alert system.
  28. Senator Steven T. ; Fuller Billy J., Computer system method and apparatus providing for various versions of a file without requiring data copy or log operati.
  29. Fecteau Jean G. (Toronto NY CAX) Gdaniec Joseph M. (Vestal NY) Hennessy James P. (Endicott NY) MacDonald John F. (Vestal NY) Osisek Damian L. (Vestal NY), Computer system which supports asynchronous commitment of data.
  30. Orita Yukio (Tokyo JPX), Computer system with file security function.
  31. Park Jee-Kyoung,KRX, Computer with multi booting function.
  32. Hitz, David; Malcolm, Michael; Lau, James; Rakitzis, Byron, Copy on write file system consistency and block usage.
  33. Crighton Ian Peter,GBX, Data backup system.
  34. Gagne, Mathieu; Ofek, Yuval, Data processing method and apparatus for enabling independent access to replicated data.
  35. Mineo Akira (Sagamihara JPX), Data processing security system for automatically transferring software protection data from removable store into intern.
  36. Lisle Linda Arnold ; Martin Shirley L. ; Mullaly John Martin, Data processing system and method for implementing an informative container for a file system.
  37. Lisle Linda Arnold ; Martin Shirley Lynn ; Mullaly John Martin, Data processing system having a logical containment system and method therefor.
  38. Koseki, Michihiko; Yokoyama, Mamoru; Sumi, Masashi; Yamaguchi, Satoru; Taniwaki, Sadayoshi; Hamanaka, Seishiro, Data processing system with mechanism for restoring file systems based on transaction logs.
  39. Dunphy William E. (Westminster CO) Halladay Steven M. (Louisville CO) Moy Michael E. (Lafayette CO) Munro Frederick G. (Broomfield CO), Data storage and protection system.
  40. Blickenstaff Ronald L. ; Brant Catherine Irlam ; Dodd Paul David ; Kirchner Anton H. ; Montez Jennifer Kay ; Trede Brian Eldred ; Winter Richard Allen, Data storage management for network interconnected processors.
  41. Yanai Moshe (Framingham MA) Vishlitzky Natan (Brookline MA) Alterescu Bruno (Newton MA) Castel Daniel (Framingham MA) Shklarsky Gadi (Brookline MA), Data storage system controlled remote data mirroring with respectively maintained data indices.
  42. Ng Fred K. (Naperville IL), Database backup method.
  43. Sawdon, Wayne A.; Schmuck, Frank B., Deferred copy-on-write of a snapshot.
  44. Belsan Jay S. (Nederland) Rudeseal George A. (Boulder) Milligan Charles A. (Golden) Pedersen Mogens H. (Longmont CO) Kitchen John F. (Lindfield AUX) Ludlam Henry S. (Longmont CO), Deleted data file space release system for a dynamically mapped virtual data storage subsystem.
  45. Kenley Gregory (Northboro MA) Ericson George (Schrewsbury MA) Fortier Richard (Acton MA) Holland Chuck (Northboro MA) Mastors Robert (Ayer MA) Pownell James (Natick MA) Taylor Tracy (Upton MA) Wallac, Digital data storage system with improved data migration.
  46. Dunphy ; Jr. Robert H. (Holland PA) Walsh Robert (Boulder CO) Bowers John H. (Clarksburg NJ), Disk drive memory.
  47. Jones Scott A. (Cambridge MA) Picard Donald P. (Medford MA), Distributed control and storage for a large capacity messaging system.
  48. Agranat Ian (Weston MA) Zimmerman Karl E. (Hopedale MA), Distributed data processing system providing a distributed stream software environment to enable application on a first.
  49. Whitney Alan (Bellevue WA) Neeman Yuval (Bellevue WA) Koneru Sudheer (Redmond WA) Shah Milan (Redmond WA) Cook Peter J. (Redmond WA) Miller Arnold S. (Bellevue WA), Distributed file system providing a unified name space with efficient name resolution.
  50. Whitney Alan ; Neeman Yuval ; Koneru Sudheer ; Shah Milan ; Cook Peter J. ; Miller Arnold S., Distributed file system providing a unified name space with efficient name resolution.
  51. Krawczyk Hugo M. (Riverdale NY), Distributed fingerprints for information integrity verification.
  52. Kennedy Barry (Santa Ana CA), Distributed multi-processor boot system for booting each processor in sequence including watchdog timer for resetting ea.
  53. Edward Robert Segal, Distributed security system for a communication network.
  54. Sung,Feng Kuang; Kao,John; Chang,Ching Chung; Chiu,Cheng Hui, Document management and access control by document's attributes for document query system.
  55. Saulpaugh Thomas E. (San Jose CA) Knight Holly (La Honda CA) Banks Jano (San Jose CA) Hochsprung Ron (Los Gatos CA), Dynamic device matching using driver candidate lists.
  56. Janis Frederick L. (Keller TX) Aman Jeffery D. (Wappingers Falls NY) Cox Daryl R. (Bedford TX), Dynamic link libraries system and method.
  57. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  58. Joiner, Herbert V.; Raghuraman, Praveen; Elwell, Ken W., Enterprise interface for network analysis reporting.
  59. Joiner, Herbert V.; Verma, Ravi; Raghuraman, Praveen; Elwell, Ken W., Enterprise network analyzer agent system and method.
  60. Joiner, Herbert V.; Elwell, Ken W., Enterprise network analyzer architecture framework.
  61. Joiner, Herbert V.; Elwell, Ken W.; Verma, Ravi; Raghuraman, Praveen, Enterprise network analyzer host controller/agent interface system and method.
  62. Elwell, Ken W.; Joiner, Herbert V., Enterprise network analyzer host controller/zone controller interface system and method.
  63. Joiner,Herbert V.; Elwell,Ken W., Enterprise network analyzer zone controller system and method.
  64. Zook Christopher P., Error correction and concurrent verification of a product code.
  65. Shimada Akinobu (Minami-ashigara JPX) Nozawa Masafumi (Odawara JPX) Nakano Toshio (Odawara JPX), External storage unit comprising active and inactive storage wherein data is stored in an active storage if in use and a.
  66. Bramnick Arnold H. (Boca Raton FL) Elkins Douglas G. (Plantation FL) Ure J. Robert (Coral Springs FL), Fail-safe computer boot apparatus and method.
  67. Kandasamy David R. (San Ramon CA) Butler Mitchel B. (Sunnyvale CA) Foss Andrew L. (Yarrow Point WA) Peterson Bradley M. (Los Altos CA) Patwardhan Chintamani M. (Sunnyvale CA) Ribble Michael T. (Los G, Fault tolerant NFS server system and mirroring protocol.
  68. Horton James A. (Bethlehem PA) Getz Stephen M. (Pittsburgh PA), Fault tolerant computer backup system.
  69. Major Drew (Orem UT) Powell Kyle (Orem UT) Neibaur Dale (Orem UT), Fault tolerant computer system.
  70. Hemphill John M. (Spring TX) Stewart Gregory Mart (Houston TX) Lawler Thomas S. (Houston TX), Fault tolerant multiple network servers.
  71. Ogawa,Junji; Matsunami,Naoto; Iwasaki,Masaaki; Sonoda,Koji; Tsukiji,Kenichi, File access method in storage-device system, and programs for the file access.
  72. Carpenter J. Wiltse (Palo Alto CA) Eich Brendan O. (Santa Clara CA) Karsh Bruce D. (Los Altos CA) Manolis Eva (San Francisco CA), File alteration monitor for computer operating and file management system.
  73. Chen, Ray; Edwards, John K.; Patel, Kayuri, File deletion and truncation using a zombie file space.
  74. Nishiyama Kenji,JPX, File management device.
  75. Uchida Yoshiaki (Kawasaki JPX) Utsumi Kenichi (Kawasaki JPX) Nakada Masahiro (Kawasaki JPX), File management system for a partially rewritable storage medium where file management information is created in a rewri.
  76. Potter Cathy (Los Altos CA) Harrison Brian (Scotts Valley CA) Whelan Charles (Placerville CA), File menu support for encapsulated applications.
  77. Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
  78. McDowell Steven R., File system filter driver apparatus and method.
  79. Balk Michael W. (Piscataway NJ), File system for a data storage device having a power fail recovery mechanism for write/replace operations.
  80. Cabrera Luis Felipe ; Kimura Gary D., File system primitive allowing reprocessing of I/O requests by multiple drivers in a layered driver I/O system.
  81. Kamel Shaath CA, File-based virtual storage file system, method and computer program product for automated file management on multiple file system storage devices.
  82. Garside Christopher M. (Preston GBX) Rhodes Arthur N. (Preston GBX), Fuel storage means.
  83. Urevig Paul D. ; Malnati James R. ; Ethen Donald J. ; Weber Herbert L., Grouping shared resources into one or more pools and automatically re-assigning shared resources from where they are not currently needed to where they are needed.
  84. Zaitsev, Oleg V., Hardware-based anti-virus system.
  85. Bendert Edward Joseph (Vestal NY) Bennett Robert Bradley (Endwell NY) Berman Eve Suzanne (Binghamton NY) Farrell Susan Marie (Vestal NY) Johnson Eugene (Vestal NY) Nugent Robert Michael (Nichols NY) , Heterogeneous filing system with common API and reconciled file management rules.
  86. Yeager William J., High performance message store.
  87. Muller P. Keith ; Chow Kit M., I/O protocol for highly configurable multi-node processing system.
  88. Kanfi Arnon (Randolph NJ), Incremental computer file backup using check words.
  89. Mutoh Hideo (Yokohama JPX) Moki Keiji (Kawasaki JPX) Shibayama Takehiko (Yamato JPX), Information life cycle processor and information organizing method using it.
  90. Imai Yoshihiko (Hirakata JPX) Nakano Yoshio (Takatsuki JPX) Ando Makoto (Itami JPX) Iwamura Yoshiyuki (Ibaraki JPX) Ishida Takashi (Kadoma JPX), Information recording/reproducing apparatus.
  91. John W. Merrill ; Alok Prakash ; Mark J. Sullivan, Initializing and restarting operating systems.
  92. Merrill John W., Initializing and restarting operating systems.
  93. Kerrigan Michael (Wappingers Falls NY) Lebizay Gerald (Nice NY FR) MacSorley Olin Lowe (Lake Katrine NY) Weiss Alfred (Poughkeepsie NY), Input/output port control.
  94. Vladimir Chtchetkine ; Alan Kucheck ; Guennadi Terechtenko, Installable file system having virtual file system drive, virtual device driver, and virtual disks.
  95. Choy David M., Integrated method and system for controlling information access and distribution.
  96. Lim, Mario, Integrating heterogeneous authentication and authorization mechanisms into an application access control system.
  97. Khoyi Dana (Dracut MA) Soucie Marc S. (Tyngsboro MA) Surprenant Carolyn E. (Dracut MA) Stern Laura O. (Woburn MA) Pham Ly-Huong T. (Chelmsford MA), Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object t.
  98. Ellis,Michael D., Interactive television systems with digital video recording and adjustable reminders.
  99. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  100. Kanellos,Nick; Saunders,Steve, Life-cycle management engine.
  101. Baratz Alan E. (Chappaqua NY) Gopal Inder S. (Fort Lee NJ) Gray James P. (Chapel Hill NC) Grover George A. (Mahopac NY) Jaffe Jeffrey M. (Monsey NY) Lorrain Jean A. (Raleigh NC) Pollard Melinda R. (R, Locating resources in computer networks.
  102. Gramlich Wayne C. (Sunnyvale CA) Tirfing Soren J. (Palo Alto CA), Locking mechanism for the prevention of race conditions.
  103. Oshinsky, David Alan; Ignatius, Paul; Prahlad, Anand; May, Andreas, Logical view and access to data managed by a modular data and storage management system.
  104. Ignatius, Paul; Theisen, Marjorie H.; Oshinsky, David Alan; Kavuri, Srinivas, Logical view and access to physical storage in modular data and storage management system.
  105. Kedem Nadav,ILX, Mass storage subsystem and backup arrangement for digital data processing system which permits information to be backed up while host computer(s) continue(s) operating in connection with information .
  106. Pletcher Richard A. (Redmond WA) Lipe Ralph A. (Kirkland WA), Mechanism for using common code to handle hardware interrupts in multiple processor modes.
  107. Glaise Rene,FRX, Method and apparatus for a simple calculation of CRC-10.
  108. Harrison David F. (Boulder Creek CA) Williams Russell T. (San Jose CA) Saulpaugh Thomas E. (San Jose CA), Method and apparatus for consolidated buffer handling for computer device input/output.
  109. Hutchinson Wayne Leslie ; Boggs Gary Lee ; Brinkman David Neal ; Janvrin Jeffrey Kittridge, Method and apparatus for creating alternate boot environments in a computer.
  110. Dion David ; Khalidi Yousef A. ; Talluri Madhusudhan ; Swaroop Anil, Method and apparatus for file system disaster recovery.
  111. Matthews Gareth Christopher ; Medina David ; Wynn Allen Chester, Method and apparatus for hibernation within a distributed data processing system.
  112. Szalwinski Bruce ; Winslett Michael E., Method and apparatus for hierarchical storage of data for efficient archiving and retrieval of data.
  113. Stakuis Chrisopher J. ; Stearns Kevin M., Method and apparatus for high-speed access to and sharing of storage devices on a networked digital data processing syst.
  114. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  115. Stiles Ian J. (Salem UT), Method and apparatus for network file recovery.
  116. Saxon Paul David, Method and apparatus for performing retroactive backups in a computer system.
  117. Yoshida Tadao (Kanagawa JPX), Method and apparatus for preventing copying of an optical disk.
  118. Carley William J. ; Lyon James M. ; McCline Matthew C. ; Skarpelos Michael J., Method and apparatus for preventing inadvertent changes to system-critical files in a computing system.
  119. Walsh James E. ; Altberg Ebbe H. A., Method and apparatus for protecting data files on a computer from virus infection.
  120. Keene,Catherine M.; Lin,Raymond; Sadhureddly,Rao, Method and apparatus for providing controlled access to software objects and associated documents.
  121. Ofer Erez ; Fitzgerald John ; Halligan Kenneth, Method and apparatus for providing logical devices spanning several physical volumes.
  122. Kullick Steven E. ; Spirakis Charles S. ; Titus Diane J., Method and apparatus for transferring archival data among an arbitrarily large number of computer devices in a networked.
  123. Dyson Patrick (Mountain View CA), Method and apparatus for verifying the integrity of a file stored separately from a computer.
  124. Obermarck Ronald L. (Los Altos CA) Strickland Jimmy P. (Saratoga CA) Watts Vern L. (Los Gatos CA), Method and means for the sharing of data resources in a multiprocessing, multiprogramming environment.
  125. Singh Jagdeep ; Bhide Chandrashekhar W., Method and product for enchancing performance of computer networks including shared storage objects.
  126. Eastridge Lawrence E. (Tucson AZ) Kern Robert F. (Tucson AZ) Kern Ronald M. (Tucson AZ) Mikkelsen Claus W. (Morgan Hill CA) Ratliff James M. (Tucson AZ), Method and system for automated backup copy ordering in a time zero backup copy session.
  127. Eastridge Lawrence E. (Tucson AZ) Kern Robert F. (Tucson AZ) Micka William F. (Tucson AZ) Mikkelsen Claus W. (Morgan Hill CA) Ratliff James M. (Tucson AZ), Method and system for automated termination and resumption in a time zero backup copy process.
  128. Wilde Michael J., Method and system for computer file management, including file migration, special handling, and associating extended at.
  129. Crick Andrew P. R. ; Glass Mike ; Shea Thomas J. ; Shah Shishir, Method and system for configuring device driver by selecting a plurality of component drivers to be included in the devi.
  130. Walter A. Hubis ; William G. Deitz, Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access .
  131. Kodama,Shoji, Method and system for data lifecycle management in an external storage linkage environment.
  132. David, Anja, Method and system for managing documents in a system using at least one database.
  133. Ukai Hiromi,JPX ; Yagawa Yuichi,JPX, Method and system for managing files by version and programs therefor.
  134. Shaath, Kamel; Gossage, Jonathan; Walker, Tony; Lulu, Yasser; Yaqun, Fu, Method and system for providing restricted access to a storage medium.
  135. Shaath, Kamel; Gossage, Jonathan; Walker, Tony; Lulu, Yasser; Yaqun, Fu, Method and system for providing restricted access to a storage medium.
  136. Shaath,Kamel; Gossage,Jonathan; Walker,Tony; Lulu,Yasser; Yaqun,Fu, Method and system for providing restricted access to a storage medium.
  137. Kamel Shaath CA; Jonathan Gossage CA; Tony Walker CA; Yasser Lulu CA; Fu Yaqun CA, Method and system for providing restricted write access to a storage medium.
  138. Sallam, Ahmed, Method and system for the detection of file system filter driver based rootkits.
  139. Reardon David C. (50 Nottingham Springfield IL 62704), Method for limiting computer access to peripheral devices.
  140. Hsieh Vincent, Method for security shield implementation in computer system's software.
  141. Solan Michael Thomas ; Winarski Daniel James, Method for storing multiple files without header information and for each storage medium maintaining a separate stored i.
  142. Aoyama Yuki,JPX ; Takahashi Toru,JPX ; Wakayama Satoshi,JPX, Method of and an apparatus for displaying version information and configuration information and a computer-readable recording medium on which a version and configuration information display program i.
  143. O'Connor, Michael A., Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network.
  144. Agrawal Rakesh (Chatham NJ) Ezzat Ahmed K. (New Providence NJ), Method of file access in a distributed processing computer network.
  145. Brewer Susan C. (Keller TX) Brink Kathy A. (Coppell TX) Krebs ; Jr. William H. (Euless TX) Welch Robert P. (Colleyville TX), Method of graphically accessing electronic data.
  146. Kanfi Arnon (7 Elaine Ct. Randolph NJ 07869), Method of making a backup copy of a memory over a plurality of copying sessions.
  147. Ito Masahiro,JPX ; Shigeyoshi Tanaka,JPX, Method, apparatus, medium for storing and controlling accessibility to a removable medium.
  148. Kaliski ; Jr. Burton S. ; Yin Yiqun Lisa, Methods and apparatus for efficient finite field basis conversion.
  149. Jhingan,Nikhil; Vasnani,Vinod U.; Lim,Chee Siang; Arora,Neeraj; Rao,E. Vijay; Mongia,Amit, Methods and systems for email attachment distribution and management.
  150. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  151. Douglas,Kevin, Modular system for detecting, filtering and providing notice about attack events associated with network security.
  152. Taniguchi Yasushi (Kawasaki JPX) Hirabayashi Keiji (Tokyo JPX), Mold for forming an optical element.
  153. Bonke Carl E. (9 Via Nandina Rancho Santa Margarita CA 92688) Worrell Devon (8842 Williamsburg Westminister CA 92683) D\Souza Kenneth (29 Yorktown Irvine CA 92720) Nguyen Kiem (17859 Oak St. Fountain, Multi-drive controller with encoder circuitry that generates ECC check bytes using the finite field for optical data for.
  154. Arumainayagam Allen T. (Malden MA) Cap Jos (Pelham NH) Penfield Robert F. (Maynard MA) Deigh Anthony N. (Groton MA), Multi-system network addressing.
  155. Nakashima Kazuo,JPX ; Utsumi Kenichi,JPX, Multiple format interchangeable optical recording medium and method of controlling same.
  156. Loucks Larry K. (Austin TX) Shaheen-Gouda Amal A. (Austin TX), Name resolution for a multisystem network.
  157. Nguyen, Thai; Raymond, Robert M.; Leonhardt, Michael L., Network attached virtual data storage subsystem.
  158. Webber Neil F. (Hudson MA) Israel Robert K. (Westford MA) Kenley Gregory (Northborough MA) Taylor Tracy M. (Upton MA) Foster Antony W. (Framingham MA), Network file migration system.
  159. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  160. Gladney Henry Martin ; Reimer James Allen, Object-oriented access control method and system for military and commercial file systems.
  161. Yoshimoto Kyosuke,JPX ; Rao M. C.,JPX ; Ohata Hiroyuki,JPX ; Nakane Kazuhiko,JPX ; Furukawa Teruo,JPX ; Kondo Junichi,JPX ; Ototake Masafumi,JPX, Optical disk and optical disk drive device.
  162. Yoshimoto Kyosuke,JPX ; Rao M. C.,JPX ; Ohata Hiroyuki,JPX ; Nakane Kazuhiko,JPX ; Furukawa Teruo,JPX ; Kondo Junichi,JPX ; Ototake Masafumi,JPX, Optical disk and optical disk drive device.
  163. Nakashima Kazuo (Atsugi JPX) Hashimoto Yasunobu (Sagamihara JPX) Maeda Miyozo (Atsugi JPX) Ogawa Seiya (Kawasaki JPX), Optical disk having read-exclusive and write-enable regions.
  164. Cruess Michael W. (Austin TX) Moyer William C. (Austin TX) Zolnowsky John (Milpitas CA), Paged memory management unit which evaluates access permissions when creating translator.
  165. Scheidt Edward M. (McLean VA) McCullough Charles E. (Woodbridge VA) Wack C. Jay (Clarksburg MD), Personal computer access control system.
  166. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  167. Rodriguez,Andres; Orenstein,Jack A.; Shaw,David M.; Bernhard,Benjamin K. D., Policy-based management of a redundant array of independent nodes.
  168. Vishlitzky Natan ; Wilson Robert ; Tzelnic Percy, Prefetching to service multiple video streams from an integrated cached disk array.
  169. Buote, William; Rapp, Kenneth N.; Hutchins, Burleigh M., Process-linked data management system.
  170. Buote,William; Rapp,Kenneth N.; Hutchins,Burleigh M., Process-linked data management system.
  171. Fecteau Jean Gilles (Toronto CAX) Kligerman Eugene (North York CAX) Kollar Lubor (North York CAX), Product for global updating modified data object represented in concatenated multiple virtual space by segment mapping.
  172. Britton Kathryn H. (Chapel Hill NC) Chung Tein-Yaw D. (Taoyuan TWX) Doeringer Willibald A. (Langnau CHX) Dykeman Douglas H. (Reuschlikon NC CHX) Edwards Allan K. (Raleigh NC) Mathew Johny (Chapel Hil, Protocol selection and address resolution for programs running in heterogeneous networks.
  173. Braithwaite David G. ; Bruderer Clark C. ; Allen Gregory M. ; Thompson David A., Read/write protect scheme for a disk cartridge and drive.
  174. Blott, Stephen M.; Breitbart, Yuri; Cliff, Jr., Thomas M.; Frastaci, Jr., Frank; Korth, Henry F., Real-time event processing system with service authoring environment.
  175. Takayama, Yoshihisa; Yamada, Masaki; Obata, Yuko; Toshitani, Nobuhisa, Recording and reproducing apparatus and file managing method using the same.
  176. Vahalia Uresh K. ; Gupta Uday ; Ting Dennis P. J., Recovery from failure of a data processor in a network server.
  177. Sallam, Ahmed, Regulating remote registry access over a computer network.
  178. Ishidoshiro,Takashi, Remote access system, remote access method, and medium containing remote access program.
  179. Teresa Win ; Emilio Belmonte, Role-based navigation of information resources.
  180. Millard John, Secure access to software modules.
  181. Worely, Jr.,William S.; Worley,John S.; Magenheimer,Daniel J.; Hyser,Chris D.; Christian,Tom; McKee,Bret; Gardner,Robert, Secure machine platform that interfaces to operating systems and customized control programs.
  182. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  183. Golan Gilad,ILX, Security monitor.
  184. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  185. Hunt,Galen C.; Roeder,Thomas; Larus,James R.; Fahndrich,Manuel; DeTreville,John D.; Levi,Steven P.; Zorn,Benjamin; Grieskamp,Wolfgang, Self-describing artifacts and application abstractions.
  186. Abnous,Razmik; Merhoff,Eric; Spivak,Victor; Moore,Kristy; Robertson,Don; Shao,Howard I Hui, Smart containers.
  187. Lay Tatchi Placido ; Muschett Brien Henry ; Ramlow Allen Justin ; Tran Cuong Huu, Software-enabled fast boot.
  188. Thomason Jon G. (Redmond WA) Horton Earle R. (Redmond WA), Standardized protected-mode interrupt manager.
  189. McKaughan Robert M. ; Foltz Forrest, State governing the performance of optional booting operations.
  190. Raz,Yoav; Blumenau,Steven M.; Fisher,Michel F.; Butchart,David C., Storage based apparatus for antivirus.
  191. Tevis Gregory J. (Tucson AZ) Waldo Ellen J. (Tucson AZ), Storage management of a first file system using a second file system containing surrogate files and catalog management i.
  192. Cannon David Maxwell ; Martin Howard Newton, Storage management system with file aggregation and space reclamation within aggregated files.
  193. Robert Frederic Kern ; Mark Anthony Sovik, Storage system with data-dependent security.
  194. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  195. Johnson Donavon W. (Georgetown TX) Neuman Grover H. (Austin TX) Sauer Charles H. (Austin TX) Shaheen-Gouda Amal A. (Austin TX) Smith Todd A. (Austin TX), System and method for accessing remote files in a distributed networking environment.
  196. Kottomtharayil,Rajiv; Gokhale,Parag; Prahlad,Anand; Vijayan Retnamma,Manoj Kumar; Ngo,David; Devassy,Varghese, System and method for dynamically performing storage operations in a computer network.
  197. Senator Steven T., System and method for file system fix-on-panic for a computer operating system.
  198. Reynaud Alan ; Nielson Joe ; Han Randy ; Kuwano Tad ; Worsham James M. ; Beyda Wiliam J., System and method for intelligent and reliable booting.
  199. Yammine Ghassan A. (Pflugerville TX) Morris Gregory L. (Round Rock TX), System and method for maintaining file data access in case of dynamic critical sector failure.
  200. Perks Michael Albert, System and method for managing critical files.
  201. Richard J. Huebsch ; Robert J. Prieve ; Leonard Kampa, System and method for multiplexed data back-up to a storage tape and restore operations using client identification tags.
  202. Mutalik Madhav ; Senie Faith M., System and method for performing file-handling operations in a digital data processing system using an operating system-independent file map.
  203. Shlomo Touboul IL, System and method for protecting a client during runtime from hostile downloadables.
  204. Aronoff,Eyal M.; Collings,James W., System and method for reconciling transactions between a replication system and a recovered database.
  205. Morris Robert J. T., System and method for reducing storage requirement in backup subsystems utilizing segmented compression and differencing.
  206. Pham, Thien Huu; Wilson, Philip Douglas, System and method for replicating monitored registry keys.
  207. Chen,Raymond C.; Patel,Kayuri; Kahn,Andy C.; Edwards,John K., System and method for restoring a single file from a snapshot.
  208. Mittra Suvo, System and method for secure group communications via multicast or broadcast.
  209. Wied William J. ; Loa Kanchei, System and method of communicating between trusted and untrusted computer systems.
  210. Clyde Robert A. (Orem UT), System for effectively paralleling computer terminal devices.
  211. Murray,Thomas J.; Farnum,William C., System for information life cycle management model for data migration and replication.
  212. Choi Owen H. (Raleigh NC) Drake ; Jr. John E. (Pittsboro NC) Fletcher James C. (Cary NC) Harter Johnathan L. (Raleigh NC) Knauth Jeffrey G. (Raleigh NC) Kramer Dirk K. (Raleigh NC) Lerner Michael A. , System for locating a node containing a requested resource and for selectively verifying the presence of the resource at.
  213. Card Stuart K. ; York William M. ; Robertson George G., System for moving document objects in a 3-D workspace.
  214. Hahn Samuel S. ; LeGault Kenn ; Wheeler Maxon ; Degenhardt Jon R., System for organizing document icons with suggestions, folders, drawers, and cabinets.
  215. Bauer Eric J. (Tinton Falls NJ), System for parsing extended file names in an operating system.
  216. Crick Andrew P. R. (Woodinville WA) Harikrishnan Seetharaman (Bellevue WA) Naidu Harish K. (Redmond WA) Parry William G. (Redmond WA), System for providing intercommunication of I/O access factors stored in a shared data structure, accessed and maintained.
  217. Flynn Rex A. (Belmont MA) Anick Peter G. (Marlboro MA), System for reconstructing prior versions of indexes using records indicating changes between successive versions of the.
  218. Uzzo,Anthony M.; Uzzo, Jr.,Anthony M.; Gregory,James D., System for remotely managing bulk product storage.
  219. Chen Weilin (Longmont CO) Marlin James W. (Longmont CO) Parrish Ronald D. (Niwot CO) Shook Frankie S. (Longmont CO) Stone David E. (Longmont CO), System for selectively processing nested print commands and buffered post-print commands thereafter and resending select.
  220. Aziz Ashar (Fremont CA) Mulligan Geoffrey (Fremont CA) Patterson Martin (Grenoble FRX) Scott Glenn (Sunnyvale CA), System for signatureless transmission and reception of data packets between computer networks.
  221. Tso Michael Man-Hak ; Bakshi Bikram Singh, System for virus-checking network data during download to a client device.
  222. Feeney James William (Endicott NY) Wilhelm ; Jr. George William (Endwell NY), System having device driver operates in first mode for allowing concurrent access to adapter by applications and second.
  223. Saether Christian D. (Seattle WA) Stoppani ; Jr. Peter (Woodinville WA), System of device independent file directories using a tag between the directories and file descriptors that migrate with.
  224. Stolarz Edwin J., System, software and apparatus for organizing, storing and retrieving information from a computer database.
  225. Prahlad, Anand; Ngo, David, Systems and methods for performing data replication.
  226. Fuller Billy J., Transaction device driver technique for a journaling file system to ensure atomicity of write operations to a computer m.
  227. Buote, William; Rapp, Kenneth N.; Hutchins, Burleigh M., Unified data acquisition system.
  228. See Deborah ; Martin Rina, Virtual small block file manager for flash memory array.
  229. Dunham Scott R., Virtual storage and block level direct access of secondary storage for recovery of backup data.
  230. Frazier John D., Volume set configuration using a single operational view.

이 특허를 인용한 특허 (15)

  1. Fok Ah Chuen, Frederic; Lecroart, Benoit; Perron, Olivier, Access management system.
  2. Adam, Preston Derek; Novotney, Peter J.; Ide, Nathan J.; Basmov, Innokentiy; Acharya, Narendra S.; Ureche, Octavian T.; Sinha, Saurav; Kannan, Gopinathan; Macaulay, Christopher R.; Grass, Michael J., Data protection for organizations on computing devices.
  3. Adam, Preston Derek; Teran, Adrian F.; Mehta, Yogesh A.; Spaith, John C.; May, Steve Roger, Intelligent deletion of revoked data.
  4. Basmov, Innokentiy; Nyström, Magnus Bo Gustaf; Semenko, Alex M.; MacIver, Douglas M.; Li, Donghui, Map-based rapid data encryption policy compliance.
  5. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  6. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  7. Stuart, Alan L.; Marek, Toby Lyn; Hochberg, Avishai Haim; Cannon, David Maxwell; Martin, Howard Newton, Method, system, and program for implementing retention policies to archive records.
  8. Semenko, Alex M.; Adam, Preston Derek; Basmov, Innokentiy; Acharya, Narendra S.; Novotney, Peter J.; Bhagurkar, Salil Arun; Mehta, Yogesh A., Passive encryption of organization data.
  9. Adam, Preston Derek; Acharya, Narendra S.; Basmov, Innokentiy; Ureche, Octavian T.; Mehta, Yogesh A.; Semenko, Alex M., Preserving data protection with policy.
  10. Mehta, Yogesh A.; Ureche, Octavian T.; Adam, Preston Derek; Acharya, Narendra S., Roaming content wipe actions across devices.
  11. Basmov, Innokentiy; Nyström, Magnus Bo Gustaf; Semenko, Alex M.; MacIver, Douglas M.; Li, Donghui, Sector map-based rapid data encryption policy compliance.
  12. Basmov, Innokentiy; Nyström, Magnus Bo Gustaf; Semenko, Alex M.; MacIver, Douglas M.; Li, Donghui, Sector map-based rapid data encryption policy compliance.
  13. Dias, Paulo Miguel Cordeiro, Secure erasure and repair of non-mechanical storage media.
  14. Mehta, Yogesh A.; Basmov, Innokentiy; Ureche, Octavian T.; Novotney, Peter J.; Adam, Preston Derek; Lakhani, Mugdha; Sinha, Saurav; Acharya, Narendra S.; Singh, Karanbir, Secure key management for roaming protected content.
  15. Brusilovsky, Mikhail, System and method for graphical rights indication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로