최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0187221 (2002-06-28) |
등록번호 | US-9886309 (2018-02-06) |
발명자 / 주소 |
|
출원인 / 주소 |
|
인용정보 | 피인용 횟수 : 3 인용 특허 : 340 |
A system, method and related data structures for discovering and describing computing resources available at various computing devices, and for exposing those resources as services that are addressable by software applications. The data describing the resources is arranged according to an identity-b
A system, method and related data structures for discovering and describing computing resources available at various computing devices, and for exposing those resources as services that are addressable by software applications. The data describing the resources is arranged according to an identity-based schema. The computing resources may include, for example, storage capacity, bandwidth, processing power, input methods and mechanism, and rendering methods. The method and system are identity-based, whereby a user (with an identity) has access to the distributed resources commensurate with that identity.
1. A method comprising: discovering, at a first computing device, a resource located at a second computing device;communicating a request to the second computing device to employ the resource located at the second computing device;communicating identity information to the second computing device to
1. A method comprising: discovering, at a first computing device, a resource located at a second computing device;communicating a request to the second computing device to employ the resource located at the second computing device;communicating identity information to the second computing device to enable the second computing device to determine whether the first computing device has access to the resource based on the identity information;receiving data from the second computing device when the second computing device approves access to the resource by the first computing device, the data including resource information associated with the resource at the second computing device formatted according to a resource-based schema understood by the first computing device, the resource-based schema being organized by resource and including information about the second computing device that corresponds to respective resources;interpreting the data to access the resource located at the second computing device; andexecuting a process, at the first device, using the resource of the second computing device. 2. The method of claim 1 wherein the first computing device uses the resource until the second computing device disables access to the resource by the first computing device. 3. The method of claim 2 further comprising informing the second computing device that the first computing device no longer needs to use the resource effective to cause the second computing device to disable the access to the resource. 4. The method of claim 1 wherein the identity information corresponds to credentials. 5. The method of claim 4 wherein the credentials are provided by an authentication service. 6. The method of claim 1 wherein the resource of the second computing device comprises a processing resource, a storage resource, a memory resource, or a bandwidth resource. 7. The method of claim 1 wherein executing the process comprises accessing a web page at a remote server using bandwidth of the second computing device. 8. The method of claim 7, wherein the second computing device acts as a proxy to the remote server for the first computing device. 9. The method of claim 7 wherein bandwidth from the second computing device to the remote server is greater than bandwidth from the first computing device to the remote server. 10. A method for sharing resources between computing devices, comprising: receiving a request from a first computing device at a second computing device to employ a resource located at the second computing device, the request including identity information associated with the first computing device, the identity information including a first credential provided by an authentication service;determining, by the second computing device, whether the first computing device is permitted to access the resource based on the identity information, the determining the access comprising validating the first credential;sending, by the second computing device, resource information associated with the resource to the first computing device responsive to determining that the first computing device is permitted to access the resource, the resource information formatted according to a resource-based schema understood by the first computing device, the resource-based schema being organized by resource and including information about the second computing device in relation to respective resources;allowing, by the second computing device, the first computing device to access the resource to execute a process by employing the resource; anddynamically monitoring the resource to determine whether the resource is exhausted for the request. 11. The method of claim 10 further comprising determining that the resource is no longer available to the first computing device when a time limit to access the resource by the first computing device expires. 12. The method of claim 10 wherein the resource located at the second computing device comprises a processing resource, a storage resource, a memory resource, or a bandwidth resource. 13. The method of claim 10 wherein allowing the first computing device to access the resource to execute the process by employing the resource further comprises allowing the first computing device to access a web page at a remote server using bandwidth of the second computing device. 14. The method of claim 13, wherein the second computing device acts as a proxy to the remote server for the first computing device. 15. The method of claim 13 wherein bandwidth from the second computing device to the remote server is greater than bandwidth from the first computing device to the remote server.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.