$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Retrospective changing of previously sent messages 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/173
  • G06F-015/16
  • G06Q-010/10
  • G06Q-010/00
  • H04L-012/58
출원번호 US-0546318 (2009-08-24)
등록번호 US-9477947 (2016-10-25)
발명자 / 주소
  • Farrell, Colm
  • Harpur, Liam
  • O'Sullivan, Patrick Joseph
  • Raguillat, Fred
  • Srikanth, Hema
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    DeLizio Law, PLLC
인용정보 피인용 횟수 : 0  인용 특허 : 99

초록

Functionality can be implemented in email applications to allow sent messages to be updated, even if the sent messages have been read. When a request to update a sent message is received, a message update unit can update information in the message according to the notification. The message update un

대표청구항

1. A method comprising: receiving a request to update a previously sent message;determining changes to be applied to the previously sent message based on the request;updating the previously sent message based on the changes;notifying a recipient that the previously sent message has been updated;dete

이 특허에 인용된 특허 (99)

  1. Ahmed, Walid; Doshi, Bharat Tarachand; Jiang, Hong; Monogioudis, Pantelis; Rege, Kiran M., Address option for use in an internet protocol-based multimedia mobile network.
  2. Ahmed, Walid; Doshi, Bharat Tarachand; Jiang, Hong; Monogioudis, Pantelis; Rege, Kiran M., Addressing techniques for use in an internet protocol-based multimedia mobile network.
  3. Fernholz Erhard Robert, Apparatus and accompanying methods for automatically modifying a financial portfolio through dynamic re-weighting base.
  4. Duane R. Condon ; Frank D. Julian ; Joseph P. Ismert, Apparatus and method for connecting shower heads and tub spouts to a stub out.
  5. Tannenbaum,Alan Richard, Apparatus and method for correcting previously sent messages in a real-time messaging system.
  6. Novicov Aleksey ; Rivlin John Michael ; Conboy Garth ; Sachs James, Authentication for information exchange over a communication network.
  7. Suorsa,Raymond E., Automated provisioning framework for internet site servers.
  8. Suorsa,Raymond E.; LeVasseur,Joshua T., Automated provisioning of computing networks according to customer accounts using a network database data model.
  9. Suorsa,Raymond E.; Poskanzer,Harold; Ferguson,Glenn; LeVasseur,Joshua T., Automated provisioning of computing networks using a network database model.
  10. Alexander, Geoffrey D.; Doss, J. Smith; Kovales, Renee M.; Ogle, David M.; Pozefsky, Diane P.; Sundstrom, Robert J., Calendar-driven application technique for preparing responses to incoming events.
  11. Ingerman,Aleksandr; Millett,Thomas Welles; McCall,Keith A., Categorizing electronic messages based on trust between electronic messaging entities.
  12. Nakajima,Kei; Miyoshi,Takao; Naka,Yuji; Maekawa,Shiro; Yabuno,Katsumi, Character communication device.
  13. Wertheimer,Jeremy; DeMarcken,Carl G., Competitive availability tools.
  14. Nykanen, Petri; Paloniemi, Jari; Kangas, Petri, Context sensitive web services.
  15. Axler Mark W. (Troy MI) Nansour Anthony L. (Clawson MI) Zink Donald J. (Berkley MI), Coupon dispensing machine with feedback.
  16. Klemba Keith ; Merkling Roger, Cryptographic unit touch point logic.
  17. O'Shea Cynthia A. ; Fortenberry Keith N. ; Szabo Robert M. ; Robertson Sheldon I. ; Toohey James J., Data type conversion for enhancement of network communication systems.
  18. Yeager,William J.; Chen,Rita Y., Distributed trust mechanism for decentralized networks.
  19. Budka, Kenneth; Murti, Kamala; Das, Arnab, Downlink power control method for wireless packet data network.
  20. Chow Kit M. ; Meyer Michael W. ; Muller P. Keith ; Adamson Alan P., Dynamic and consistent naming of fabric attached storage by a file system on a compute node storing information mapping API system I/O calls for data objects with a globally unique identification.
  21. Caronni Germano ; Waldvogel Marcel,CHX, Efficient, secure multicasting with minimal knowledge.
  22. Henderson Walter G. (Corvallis OR) Archer ; II John Q. (Salem OR) Daum Gerald R. (Salem OR) Ellson George A. (Salem OR) Gray John E. (Salem OR) Larson Wayne F. (Salem OR) Olds Rockne M. (Salem OR) Sc, Electronic key with interactive graphic user interface.
  23. Barrett Philip D. (Salem OR) Henderson Walter G. (Salem OR) Larson Wayne F. (Salem OR), Electronic lock system with improved data dissemination.
  24. Henderson Walter G. (Corvallis OR) Archer ; II John Q. (Salem OR) Daum Gerald R. (Salem OR) Ellson George A. (Salem OR) Gray John E. (Salem OR) Larson Wayne F. (Salem OR) Olds Rockne M. (Salem OR) Sc, Electronic security system with configurable key.
  25. Kamath, Vivek P.; Brown, Craig S.; Pence, John B.; Shekaran, M. Chandra; Lorimor, Thomas G.; Firman, Thomas R.; Gentile, Elizabeth J.; Toussaint, Keith M., Extended file system.
  26. Earle Dennis M. (Secaucus NJ), Financial transaction network.
  27. Hacherl Donald J., Floating single master operation.
  28. Amit,Neta; Frank,Alexander; Peled,Yifat, Guaranteed exactly once delivery of messages.
  29. Muller P. Keith ; Chow Kit M. ; Meyer Michael W. ; Adamson Alan P., Highly-scalable parallel processing computer system architecture.
  30. Fieres Helmut,DEX ; Merckling Roger ; Klemba Keith, Host system elements for an international cryptography framework.
  31. Muller P. Keith ; Chow Kit M., I/O protocol for highly configurable multi-node processing system.
  32. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  33. Eakin, Aaron A.; Lehmann, Sebastian; Fang, Peter C., Inhibiting inappropriate communications between users involving tranactions.
  34. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  35. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  36. Akhtar,Haseeb; Qaddoura,Emad A.; Coffin,Russell C.; Le,Liem Q.; Zhu,Zemin, Internet protocol mobility architecture framework.
  37. Nielsen Jakob, Method and apparatus for altering sent electronic mail messages.
  38. Barrett Philip D. (Salem OR) Daum Gerald R. (Salem OR) Larson Wayne F. (Salem OR), Method and apparatus for compiling data relating to operation of an electronic lock system.
  39. Sumner, Terence Edward, Method and apparatus for delivering a subscriber-customized group message in a selective call messaging system.
  40. Carl G. DeMarcken ; Gregory R. Galperin, Method and apparatus for providing availability of airline seats.
  41. Chan, Kevin; Hepworth, Neil; Laveau, Stephane C., Method and apparatus for restriction of message distribution for security.
  42. Goldstein Benjamin D., Method and apparatus for secure storage of data.
  43. Mark T. Gross ; Robert A. Jacobs, Method and apparatus for sharing music content between devices.
  44. Chow, Kit M.; Muller, P. Keith; Meyer, Michael W.; Boggs, Gary L., Method and apparatus for write-back caching with minimal interrupts.
  45. Daniels, Fonda J.; Lyle, Ruthie D.; Ramseur, Demethria J., Method and program product for tracking a file attachment in an e-mail.
  46. Herzberg Amir (Bronx NY) Jarecki Stanislaw M. (Cambridge MA) Krawczyk Hugo M. (Riverdale NY) Yung Marcel M. (New York NY), Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret s.
  47. DeCaprio,Donald Joseph, Method and system for authenticating and authorizing requestors interacting with content servers.
  48. Ryan, Jr.,Frederick W., Method and system for dispensing virtual stamps.
  49. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  50. Naor Moni,ILX ; Nissim Yaacov,ILX, Method for authentication item.
  51. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
  52. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
  53. Lauper,Karin Busch; Etique,Pierre Alain; Cantini,Renato, Method for verifying in a mobile device the authenticity of electronic certificates issued by a certification authority and corresponding identification module.
  54. Natanson, Sarit Shani; Katzri, Lior; Gershon, Benny; Aizicovich, Ronit, Method of MPOA status change notification.
  55. Brogne, Nicolas; Kelles, Jean Pierre; Sutter, Emmanuel; Lemke, Andreas C., Method of manipulating an already sent e-mail and a corresponding server.
  56. Ahmed, Walid; Doshi, Bharat Tarachand; Jiang, Hong; Monogioudis, Pantelis; Rege, Kiran M., Mobility management techniques for use in an internet protocol-based multimedia mobile network.
  57. Murli D. Satagopan ; Dave D. Straube ; Colin H. Brace ; Chris L. Mayhall ; Donald J. Hacherl, Multi-master unique identifier allocation.
  58. Muller P. Keith ; Chow Kit M. ; Meyer Michael W., Name service for multinode system segmented into I/O and compute nodes, generating guid at I/O node and exporting guid to compute nodes via interconnect fabric.
  59. Yeager,William J.; Chen,Rita Y., Peer trust evaluation using mobile agents in peer-to-peer networks.
  60. Yeager,William J.; Chen,Rita Y., Propagating and updating trust relationships in distributed peer-to-peer networks.
  61. Chow, Kit M.; Hornek.ae butted.r, Niels Haahr; With, Morten Sk.o slashed.ien, Protocol for dynamic binding of shared resources.
  62. West Julian Wray ; Kemp Bradford H. ; Howard Carol M. ; Jones ; Jr. Paul R. ; Mullen Jeffrey M. ; Currier ; Jr. Ronald L., Remote computer communication.
  63. West, Julian Wray; Kemp, Bradford H.; Howard, Carol M.; Jones, Jr., Paul R.; Mullen, Jeffrey M.; Currier, Jr., Ronald L., Remote computer communication.
  64. Gulcu, Ceki; Droz, Patrick; Haas, Robert, Scheme for blocking the use of lost or stolen network-connectable computer systems.
  65. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  66. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  67. Jensen Del ; Carter Stephen R, Secure distribution and use of weighted network topology information.
  68. Malkin Wayne Allan,CAX ; Perman Charles David,CAX, Secure electronic forms permitting layout revision.
  69. Henderson, Walter G.; Larson, Wayne F.; Barrett, Philip D., Secure entry system with radio reprogramming.
  70. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  71. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  72. Drews, Paul C., Secure transfer of trust in a computing system.
  73. Muftic Sead,SEX, Security infrastructure for electronic transactions.
  74. Howard Shelton Lambert GB; Steven Wright GB, Security mechanisms in a web server.
  75. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  76. Link, II, Charles M.; Meadows, Vernon; Feidler, Mark, System and method for automated pre-paid wireless replenishment with notification.
  77. Carleton Ronald Robert ; Beyda William Joseph ; Shaffer Shmuel, System and method for changing the priority of voice mail messages within the recipient's mailbox.
  78. Ransom,Douglas S., System and method for federated security in an energy management system.
  79. Morse Gary James ; Kampe Frederick Loring ; Nelms Robert Nathan ; Ohel Hagai ; Greene Kenneth, System and method for including origination time and update lifetime with updateable messages.
  80. Shmuel Shaffer ; William Joseph Beyda, System and method for multimedia messaging system collaboration including proposal approval.
  81. Sneh,Iftah, System and method for providing offline web application, page, and form access in a networked environment.
  82. Mordechay Miron IL, System and method for quick downloading of electronic files.
  83. Ransom,Douglas S.; Chivers,David A.; Forth,J. Bradford; Giles,David W.; Teachman,Michael E.; Yeo,Jeffrey W.; Ki,Chuen Shan Simon, System and method for securing energy management systems.
  84. Brown,Michael S.; Adams,Neil P.; Little,Herbert A., System and method of secure message processing.
  85. Judge,Paul, Systems and methods for message threat management.
  86. Chesnais,Pascal; Herot,Christopher; Qidwai,Imran; Randall,Joshua; Ayad,Kamal; Ciarlante,John, Systems and methods for routing messages to communications devices over a communications network.
  87. Beck,Randy; Feldman,Gennye Hannover; Holt,Elizabeth Anne; Miller,Sven; Page,Clyde; Rubner,Marc; Rose,John R.; Vollmer,Nicole Milne, Systems, methods, and devices for selling transaction instruments via web-based tool.
  88. Leah,Robert C.; McGarvey,John Ryan, Technique for synchronizing security credentials from a master directory, platform, or registry.
  89. Leah,Robert C.; McGarvey,John Ryan, Technique for synchronizing security credentials using a trusted authenticating domain.
  90. Byrd Marc, Time stamp authority hierarchy protocol and associated validating system.
  91. Yeager,William J.; Chen,Rita Y., Trust mechanisms for a peer-to-peer network computing platform.
  92. Akhtar, Haseeb; Qaddoura, Emad A.; Coffin, Russell C.; Le, Liem Q.; Zhu, Zemin, Unified directory services architecture for an IP mobility architecture framework.
  93. Shewchuk,John P.; Della Libera,Giovanni M.; Kaler,Christopher G., Uniformly representing and transferring security assertion and security response information.
  94. Vogel, Keith R.; Chase, Charlie D.; Yiu, Kelvin S.; Hallin, Philip J.; Thomas, Louis K., Updating trusted root certificates on a client computer.
  95. Vogel,Keith R.; Chase,Charlie D.; Yiu,Kelvin S.; Hallin,Philip J.; Thomas,Louis K., Updating trusted root certificates on a client computer.
  96. Hind, John R.; Peters, Marcia L., Using device certificates for automated authentication of communicating devices.
  97. Hind, John R.; Peters, Marcia L., Using device certificates to authenticate servers before automatic address assignment.
  98. Chen,Tianwei; Fan,Changpeng; Sch?fer,G?nter, Verifying check-in authentication by using an access authentication token.
  99. Frazier John D., Volume set configuration using a single operational view.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로