1
Stephen J Bowen, Don R Brown: Keyword searches of structured databases. PartNet, Computer Law, July 25, 2000: US06094649 (457 worldwide citation)

Methods and systems are provided for supporting keyword searches of data items in a structured database, such as a relational database. Selected data items are retrieved using an SQL query or other mechanism. The retrieved data values are documented using a markup language such as HTML. The document ...


2
Anand Subramaniam, Hashem M Ebrahimi: Secure intranet access. Novell, Computer Law, June 27, 2000: US06081900 (400 worldwide citation)

Methods, signals, devices, and systems are provided for secure access to a network from an external client. Requests for access to confidential data may be redirected from a target server to a border server, after which a secure sockets layer connection between the border server and the external cli ...


3
Stephen R Carter: Method and apparatus for collaborative document control. Novell, Computer Law, July 28, 1998: US05787175 (339 worldwide citation)

A method and apparatus are disclosed for controlling collaborative access to a work group document by the users of a computer system. A combination of public-key cryptographic methods, symmetric cryptographic methods, and message digest generation methods are used. The document has a data portion an ...


4
Stephen PW Draper, Dale A Lowry: Distributed database using indexed into tags to tracks events according to type, update cache, create virtual update log on demand. Novell, Computer Law, July 13, 1999: US05924096 (309 worldwide citation)

Methods and systems are provided for synchronizing local copies of a distributed database, such as a master copy and a partial copy stored in a replica or in a cache. Each data item in the database has an associated timestamp or other tag. An index into the tags in maintained. The tag index may be u ...


5
John W L Ogilvie, Genie L Ogilvie: Self-removing email verified or designated as such by a message distributor for the convenience of a recipient. Computer Law &plus &plus, November 27, 2001: US06324569 (251 worldwide citation)

Methods, articles, signals, and systems are provided for providing email message originators and distributors with default control over message removal at a message recipient's location, regardless of whether the message has been opened. For instance, a self-removing message is designated as su ...


6
Patrick T Falls, Brian J Collins, Stephen P W Draper: Transaction synchronization in a disconnectable computer and network. Novell, Computer Law, November 23, 1999: US05991771 (246 worldwide citation)

A method and apparatus are disclosed for synchronizing transactions in a disconnectable network. Each transaction includes operations that were performed on a database replica on one computer while that computer was disconnected from another computer and hence from that other computer's replica. Tra ...


7
Kelly Ervin Sonderegger: Method for managing globally distributed software components. Novell, Computer Law, June 2, 1998: US05761499 (220 worldwide citation)

A method and apparatus are disclosed for managing software components in a network of computers such as a local area network or the Internet. Each software component includes a binary object and at least one interface to the binary object. Suitable software components include OLE components. The net ...


8
Robert A Wipfel, David Murphy: Resource management in a clustered computer system. Novell, Computer Law, November 21, 2000: US06151688 (187 worldwide citation)

Methods, systems, and devices are provided for managing resources in a computing cluster. The managed resources include cluster nodes themselves, as well as sharable resources such as memory buffers and bandwidth credits that may be used by one or more nodes. Resource management includes detecting f ...


9
Dale R Olds: Controlling access to objects in a hierarchical database. Novell, Computer Law, March 2, 1999: US05878415 (182 worldwide citation)

Methods and systems are provided for controlling access to objects in a hierarchical database. The database may include a directory services repository, and/or synchronized partitions. An access constraint propagator reads an access control property of an ancestor of a target object. The access cont ...


10
Stephen P W Draper, Brian J Collins, Patrick T Falls: Transaction clash management in a disconnectable computer and network. Novell, Computer Law, March 2, 1999: US05878434 (179 worldwide citation)

A method and apparatus are disclosed for detecting and handling clashes that may occur when transactions performed on disconnected replicas of a database are merged after the computers carrying the replicas are reconnected. A variety of clashes are addressed, including those which arise from inconsi ...