$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for community centric resource sharing based on a publishing subscription model 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-003/048
  • G06Q-010/10
  • G06F-003/0484
  • G06F-015/16
출원번호 US-0598379 (2012-08-29)
등록번호 US-9576271 (2017-02-21)
발명자 / 주소
  • Feng, Andrew
  • Bhandari, Atul
  • Kucharewski, Valerie
출원인 / 주소
  • GOOGLE INC.
대리인 / 주소
    Morgan, Lewis & Bockius LLP
인용정보 피인용 횟수 : 0  인용 특허 : 157

초록

The invention provides a Web service which enables a publisher to share his digital resources such as an address card or a calendar with a number of subscribers based on different sharing relationships. The Web service includes a host-based interface called “My Community”, for example, with which th

대표청구항

1. A system for sharing digital resources of a publisher through a web service, the system comprising: one or more processors; andone or more memories operatively coupled to at least one of the one or more processors and having instructions stored thereon that, when executed by at least one of the o

이 특허에 인용된 특허 (157)

  1. Stump Gregory S ; Allen Christopher T., Apparatus and method for controlling an underground boring tool.
  2. Paul Sunil, Apparatus and method for controlling delivery of unsolicited electronic mail.
  3. Roberts, Jr., Evans V., Apparatus and method for interrupting data transmissions.
  4. Davis Derek L., Apparatus and method for providing secured communications.
  5. Davis Derek L. (Phoenix AZ), Apparatus and method for providing secured communications.
  6. Frezza William A. (Warminster PA), Apparatus and method for restricting access to a communication network.
  7. Funk Paul, Apparatus and methods for verifying the identity of a party.
  8. McCollum Tab ; Jury Thomas W., Assigning security levels to particular documents on a document by document basis in a database.
  9. Hellman Martin E., Authentication using random challenges.
  10. Geiger Fred J. ; Wood William K. ; Tandon Sonjaya T., Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments.
  11. Schutzman Jeffrey A. (Topsfield MA) Lee Eugene H. (Cambridge MA), Automatic electronic messaging system with feedback and work flow administration.
  12. Quinn Ken,CAX ITX S7M 1L6, Automatic notification of receipt of electronic mail (e-mail) via telephone system without requiring log-on to e-mail s.
  13. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  14. Iketani Akira (Higashiosaka JPX) Mizuki Hiromasa (Tokushima JPX), Block error detector.
  15. Alspector,Joshua; Kolcz,Aleksander; Chowdhury,Abdur, Classifier tuning based on data similarities.
  16. Jackowski Steven J. ; Thomas Christopher N., Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control.
  17. Hall Robert J., Communications addressing system.
  18. Papierniak Karen A. ; Thaisz James E. ; Chiang Luo-Jen, Computer architecture and method for validating and collecting and metadata and data about the internet and electronic commerce environments (data discoverer).
  19. Pang Stephen Y., Computer code for removing junk e-mail messages.
  20. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  21. Siefert David M., Computer system for management of resources.
  22. Sammon ; Jr. Thomas M. ; Scurlock Bradley W., Consumer profiling system with analytic decision processor.
  23. Leonardo C. Massarani, Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine.
  24. Glazer,Benjamin Lee; Glazer,Dov, Customer driven, sponsor controlled network-based graphical scheduling system and method.
  25. Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
  26. Girling Robert Marcus ; Mead Jennifer Ruth ; Duane Nicholas Paul ; Lee Se-Wai ; Brennan David John ; Van Doren Eric ; Leu Michael Gene, Desktop information manager for recording and viewing important events data structure.
  27. Kazuo Takaragi JP; Hiroyuki Kurumatani JP, Digital signature generating/verifying method and system using public key encryption.
  28. Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Tuchman Walter L. (Woodstock NY), Digital signature system and apparatus.
  29. William B. McCormick ; David Kopans ; George Stojanoff, E-mail filter and method thereof.
  30. Barchi, Ronald S., E-mail usage pattern detection.
  31. Marsh, David, E-mail virus detection utility.
  32. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage and export contact information.
  33. Ono, Takatoshi; Saijo, Takeshi, ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, CRYPTOGRAPHY SYSTEM, COMPUTER-READABLE RECORDING MEDIUM STORING ENCRYPTION PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM .
  34. Cree Charles M. N. (Austin TX) Landry Grady J. (Austin TX) Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Electronic calendaring method for confirmation of resource availability during event calendaring.
  35. Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Electronic calendaring method to establish calendar floating triggers for calendared events and processes.
  36. Cree Charles M. N. (Austin TX) Landry Grady J. (Austin TX) Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Electronic calendaring method which provides for automatic assignment of alternates in requested events.
  37. Sakaguchi Manabu,JPX ; Sawada Akira,JPX ; Fujii Fujiki,JPX ; Hori Masaki,JPX, Electronic mail determination method and system and storage medium.
  38. Kirsch, Steven T.; Kiraly, Kenneth P., Electronic mail filtering system and methods.
  39. Kane John R. (Wellington FL), Electronic mail message delivery system.
  40. Kiyoshi Toyoda JP; Tatsuo Bando JP; Toshihisa Sawada JP, Electronic mail system.
  41. Hyde-Thomson Henry C. A. (11 North Terrace London SW3 2BA GB2), Electronic mail system having integrated voice messages.
  42. Maller,Steven T., Email filtering methods and systems.
  43. Joffe, Neil Raymond; Umansky, Ilya, Email to fax processing when no secondary storage is available.
  44. Stauffer Michael K. (Redwood City CA), FSK Voiceband modem using digital filters.
  45. Shin Dong-Myong,KRX, Facsimile mail system and method for controlling the same.
  46. Heiner Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  47. Pinard Deborah L. (Kanata CAX) Peres Eliana M. O. (Kanata CAX) Evans Ronald A. (Kanata CAX), Human machine interface for telephone feature invocation.
  48. McBrearty, Gerald Francis; Mullen, Shawn Patrick; Shieh, Johnny Meng-Han, Indicator to show that a cached file is being displayed on a client system.
  49. Horvitz, Eric, Integration of a computer-based message priority system with mobile electronic devices.
  50. Rothwell,Anton C.; Jagger,Luke D.; Dennis,William R.; Clarke,David R., Intelligent SPAM detection system using statistical analysis.
  51. Jinbo Wang CN, Intelligent method for computer file compression.
  52. Wheeler ; Jr. David F. (Silver Spring MD), Intelligent peripheral in video dial tone network.
  53. Levinson Richard J., Intelligent planning and calendaring system with cueing feature and floating tasks.
  54. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  55. David Montville ; Adam Montville, Interoperable full-featured web-based and client-side e-mail system.
  56. Ideta Masako (Tokyo JPX), Interrupt processing device for controlling the timing of an interrupt signal initiated by a debugging break point in an.
  57. Robert G. Leeds, Junk electronic mail detector and eliminator.
  58. Chaney Garnet R. ; Richardson Robert F., Language independent phrase extraction.
  59. Fleming ; III Hoyt A., Laptop with buttons configured for use with multiple pointing devices.
  60. Hotaling Brock (Lowell MA) Denier Sighle (Lowell MA) Ottaviano Gerald J. (Burlington MA) Demetriou George (Westford MA), Meeting management device.
  61. McDonough, John C.; McDonough, Suzanne K.; O'Brien, Erin D., Message passing over secure connections using a network server.
  62. Slutsman,Lev; Burg,Frederick M.; Meier Hellstern,Kathleen S., Method and apparatus for a conference call mediation service.
  63. Kantrowitz, Mark, Method and apparatus for efficient identification of duplicate and near-duplicate documents and text spans using high-discriminability text fragments.
  64. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  65. Donaldson Albert L., Method and apparatus for filtering junk email.
  66. Movalli, Michael; Movalli, Brian, Method and apparatus for generating secure endorsed transactions.
  67. Jakob Nielsen, Method and apparatus for identifying and discarding junk electronic mail.
  68. Ellis Michael D. (Boulder CO) Dunn Stephen M. (Boulder CO) Fellinger Michael W. (Boulder CO) Younglove Fancy B. (Boulder CO) James David M. (Fort Collins CO) Clifton David L. (Boulder CO) Land Richar, Method and apparatus for producing a signature characterizing an interval of a video signal while compensating for pictu.
  69. Redd ; Jr. James C. (Silver Spring MD) McConnell Von (Leawood KS) Brohan Liam P. (Forks Township PA), Method and apparatus for selectively blocking incoming telephone calls.
  70. Dane, Mark; Hennessy, Michael; Crossman, David W., Method and apparatus for sending and tracking resume data sent via URL.
  71. Wang Wu ; Chiu Chan ; Morris Steve ; Kongara Prasad, Method and apparatus for transferring digital images on a network.
  72. Rochkind Mark Meier, Method and apparatus providing personalized mailbox filters.
  73. Wang Wu ; Kongara Prasad, Method and apparatuses for transferring data for multiple applications through a single communication link in response to authentication information.
  74. Cragun,Brian John; Day,Paul Reuben, Method and meeting scheduler for automated meeting insertion and rescheduling for busy calendars.
  75. Robert P. Morris, Method and system allowing a client computer to access a portable digital image capture unit over a network.
  76. Donaldson,Albert L., Method and system for blocking e-mail having a nonexistent sender address.
  77. Cirasole Peter ; DeRosa Robert ; Fox Robert, Method and system for content filtering information retrieved from an internet computer network.
  78. Mayle Neil L. ; Rose David L., Method and system for creating messages including image information.
  79. Cobb Christopher Alan, Method and system for filtering electronic messages.
  80. Fleming ; III Hoyt A., Method and system for filtering unauthorized electronic mail messages.
  81. David Mosberger ; James D. Salehi, Method and system for managing accesses to a data service system that supports persistent connections.
  82. Wolff Richard S. (West Caldwell NJ) Gifford Warren S. (Holmdel NJ) Kramer Michael (Bronx NJ) Miller David S. (Bedminster NJ) Ramirez Gerardo (Bridgewater NJ) Turock David L. (Highland Park NJ), Method and system for managing telecommunications such as telephone calls.
  83. Hartman Peri ; Bezos Jeffrey P. ; Kaphan Shel ; Spiegel Joel, Method and system for placing a purchase order via a communications network.
  84. Johnson William J. (Flower Mound TX) Weber Owen W. (Coppell TX), Method and system for prioritization of email items by selectively associating priority attribute with at least one and.
  85. Kim, Do K.; Pearce, Christopher L.; Constantine, Jeffrey J., Method and system for protecting a computer using a remote e-mail scanning device.
  86. Elkan,Charles, Method and system for selecting documents by measuring document quality.
  87. Kirsch, Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  88. Cree Charles M. N. (Austin TX) Landry Grady J. (Austin TX) Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Method for automatically reconciling entries on two copies of independently maintained electronic calendars.
  89. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  90. Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Method for concurrently displaying entries from a plurality of different electronic calendars based on interactively ent.
  91. Jenson Scott A. (Redwood City CA), Method for controlling a computerized organizer.
  92. Jude Gerard Dieterman, Method for controlling the delivery of electronic mail messages.
  93. Scully Keith J. (Austin TX) Singh Harinder S. (Boca Raton FL), Method for developing automatic replies in an interactive electronic calendaring system.
  94. Bauer Thomas Michael ; Cartwright Elroy P. ; Taylor Walter C., Method for interrupting a telephone call after receiving a busy signal.
  95. Henrick Robert F. ; Jain Ajay, Method for performing targeted marketing over a large computer network.
  96. Strope Gerald C. (Grapvine TX) Murray Donna F. (Euless TX), Method for presenting compressed electronic day calendar information in an interactive information handling system.
  97. Murray Donna F. (Euless TX) Pringle Joseph M. (Irving TX) Strope Gerald C. (Grapevine TX) Berkson Stephen P. (Toronto CAX), Method for presenting electronic calendar information in an interactive information handling system.
  98. Anderson Mark Stephen,AUX ; Yesberg John Desborough,AUX ; Pope Michael,AUX ; Nayda Lisa,AUX ; Hayman Ken,AUX ; Beahan Brendan,AUX, Method for providing message document security by deleting predetermined header portions and attaching predetermined hea.
  99. Drummond, Kirk; Fields, Duane Kimbell; Gregg, Thomas Preston; Kolb, Mark Andrew, Method for restricting delivery of unsolicited E-mail.
  100. Hetherington David James ; Kumhyr David Bruce, Method for scheduling holidays in distributed computer enterprise locales.
  101. Lillibridge Mark D. ; Abadi Martin ; Bharat Krishna ; Broder Andrei Z., Method for selectively restricting access to computer systems.
  102. Scully Keith J. (Austin TX) Singh Harinder S. (Chapel Hill NC), Method of exchanging entries from a plurality of different electronic calendars based on interactively entered criteria.
  103. Agraharam Sanjay ; Balagopalan Prasad ; Croak Marian Rogers ; Evslin Tom ; Gurey Stephen M. ; Hu Ping Benjamin ; Ramamurthy Ram S. ; Roca Richard T. ; Shur David Hilton ; Sibal Sandeep ; Stuntebeck P, Method of providing seamless cross-service connectivity in telecommunications network.
  104. McGaughey ; III Harry S. (Raleigh NC) Melkus Lovie A. (Carrollton TX) Torres Robert J. (Colleyville TX), Method to facilitate a reply to electronic meeting invitation in an interactive multi-terminal system employing electron.
  105. Brown, Michael Wayne; Dutta, Rabindranath; Paolini, Michael A., Method, system, and program for mining data in a personal information manager database.
  106. Joyce, James B., Methods and apparatus for heuristic firewall.
  107. Khosla Aditya ; Lei James ; Narayen Shantanu ; Morris Steve ; Wang Wu, Methods and apparatuses for creating a collection of media.
  108. Morris Steve ; Lei James ; Narayen Shantanu ; Khosla Aditya, Methods and apparatuses for presenting a collection of digital media in a media container.
  109. Chiu Chan ; Morris Steve ; Wang Wu, Methods and apparatuses for transferring data between data processing systems which transfer a representation of the data before transferring the data.
  110. Lemmons Thomas R. ; Allison Donald W. ; Henshaw Jerry D. ; Marshall Connie T., Methods and systems for presenting program schedule information corresponding to a day selection.
  111. Slater, Charles S.; Clegg, Paul J.; Evans, Brennan H.; Schlampp, Peter, Monitoring the flow of messages received at a server.
  112. Robertson Brian D., Networked personal contact manager.
  113. Tam,Tommy H.; Mok,Ricky; Luk,Sherman C., On-line appointment system with electronic notifications.
  114. Douglas Andre Devillier ; Okechukwu U. Ikeako, Online call routing apparatus and method.
  115. Jacobs, Simon; Thomas, John; Anthony, Rob, Order scheduling system and method for scheduling appointments over multiple days.
  116. Brennan Paul M. (Toronto CAX) Mark Raymond M. (Mississauga CAX), Personal communication service with mobility manager.
  117. Sterner, John R.; Singleton, Jr., Charles W., Portable computer docking station with protected connector.
  118. Cotten William D., Preventing delivery of unwanted bulk e-mail.
  119. Klein, Adrian C.; Kyne, Fajen M.; Michel, Theodore L., Retrieval of relevant information categories.
  120. Skalecki Darek Robert,CAX ; Fedyk Donald W.,CAX ; Ashwood-Smith Peter J.,CAX ; Matas Yair,CAX, Route selection for path balancing in connection-oriented packet switching networks.
  121. Blair Steven Cameron ; Hetherington David James ; Kumhyr David Bruce, Runtime locale-sensitive switching of calendars in a distributed computer enterprise environment.
  122. Desmond D. Cummings, Jr. ; Robert H. Shelton, Scheduling interface system and method for medical professionals.
  123. Rasansky Richard A. ; Denton ; III Leet E. ; Morris Robert M., Scheduling system for use between users on the web.
  124. Olkin, Terry M.; Moreh, Jahanshah, Secure e-mail system.
  125. Liu, Gary G.; Cook, David P., Secure transmission system.
  126. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall ; Richard F. Rashid ; Nathan P. Myhrvold ; David A. Goebel, Single instance store for file systems.
  127. Smith, Jeffrey C.; Bandini, Jean-Christophe, Solicited authentication of a specific user.
  128. Oliver, Jonathan James; Buntine, Wray Lindsay; Roumeliotis, George, System and method for adaptive text recommendation.
  129. Horvitz, Eric J.; Jacobs, Andrew W.; Baribault, Gregory P., System and method for constructing and personalizing a universal information classifier.
  130. Jungck, Peder J., System and method for dynamic compression of data.
  131. Joel R. Spiegel ; Lauri E. Bortscheller ; Ruben E. Ortega, System and method for exposing popular nodes within a browse tree.
  132. Paul Sunil, System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing.
  133. Kephart, Jeffrey Owen, System and method for hindering undesired transmission or receipt of electronic messages.
  134. Silverberg Steven Mark, System and method for publishing calendar information to a publicly accessible location.
  135. Desai, Nimesh; Udani, Sanjay; Kimble, Jr., James David; Werges, Thomas P.; Richardson, David Dean; Gustafson, Jeffrey A., System and method for selective information exchange.
  136. Malik,Dale W., System and method for sorting e-mail using a vendor registration code and a vendor registration purpose code previously assigned by a recipient.
  137. Townshend, Brent, System and method of automatically generating the criteria to identify bulk electronic mail.
  138. Tang John ; Isaacs Ellen ; Morris Trevor ; Rodriguez Thomas ; Ruberg Alan ; Levenson Rick, System and method providing a computer user interface enabling access to distributed workgroup members.
  139. DeWitt Constance Ann ; Norman Victor Lee ; Rajagopal Ravi Chander ; Jarett Keith, System for customer configuration of call routing in a telecommunications network.
  140. Burge Gary L. ; Luddy William A., System for customizing computer displays in accordance with user preferences.
  141. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
  142. Vance ; Jr. Robert B. ; Pampuch John C. ; MacNaughton Bruce A., System for integrating access to proprietary and internet resources.
  143. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, System, method, and computer program product for automatically updating software on a client computer system.
  144. Davis Jason O'Neal ; Gold Brian Keith, Systems, methods and computer program products for updating hypertext documents via electronic mail.
  145. Al Kofahi,Khalid; Jackson,Peter; Travers,Timothy Earl; Tyrell,Alex, Systems, methods, and software for classifying text from judicial opinions and other documents.
  146. Horvitz Eric ; Heckerman David E. ; Dumais Susan T. ; Sahami Mehran ; Platt John C., Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set.
  147. Ng, David Way, Third-party e-mail authentication service provider using checksum and unknown pad characters with removal of quotation indents.
  148. Hunter, Michael J., Timer connect-disconnect for telephone, cable and network connections.
  149. DeLorme David M. ; Gray Keith A. ; Ferguson T. Angus, Travel reservation information and planning system.
  150. Patel,Ashvinkumar P.; Woods,Brian R.; Manber,Udi, Unsolicited electronic mail reduction.
  151. Irlam, Gordon Raymond; Maggi, Brian; Petry, Scott, Value-added electronic messaging services and transparent implementation thereof using intermediate server.
  152. Nicolas Georg Arnold ; Peter A. Daley ; Narendra K. Ghosh ; William Hsu ; Michael C. Lai, Verification system for information transfers over a computer network.
  153. Yoo, Kyung Dong, Vertical transistor and method of manufacturing thereof.
  154. Wang Shou-Chung ; Hseush Wenwey ; Ma Anthony, Web calendar architecture and uses thereof.
  155. Wang Shou-Chung ; Hseush Wenwey ; Ma Anthony, Web calendar architecture and uses thereof.
  156. Yu,Tonny, Web page filtering including substitution of user-entered email address.
  157. Gilchrist, Raymond T.; Ness, Leonard J., Zero backlash assembly.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로