Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Inventions On Using Ldap For Different Purposes-Part-1, Umakant Mishra
Inventions On Using Ldap For Different Purposes-Part-1, Umakant Mishra
Umakant Mishra
The objective of this article is to know how is LDAP used for applications in e-commerce and Policy Management. The analysis of patents shows which Inventive Principles have been used to solve those inventions. Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for …
Inventions On Ldap Data Management- A Triz Based Analysis, Umakant Mishra
Inventions On Ldap Data Management- A Triz Based Analysis, Umakant Mishra
Umakant Mishra
The data model of LDAP is same as X.500 data model. The LDAP protocol assumes there are one or more servers, which jointly provide access to a Directory Information Tree (DIT). The tree is made up of entries. Entries have relative distinguished name (RDN), which must be unique among all its siblings. The concatenation of the relative distinguished names from a particular entry to an immediate subordinate of the root of the tree forms the Distinguished Name (DN) for that entry. (IETF, RFC 2251).
LDAP provides add, delete and modify operations for data modification. Each of these LDAP update operation …
Inventions On Using Ldap For Different Purposes-Part-3, Umakant Mishra
Inventions On Using Ldap For Different Purposes-Part-3, Umakant Mishra
Umakant Mishra
Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for “Network Management” and “Telecommunications”. The third part of the article includes 11 patents using LDAP for “World Wide Web” and “Java and CORBA”. This is the third part of the article which analyses patents …
Inventions On Using Ldap For Different Purposes (Part-2) - A Triz Based Analysis Of Us Patents, Umakant Mishra
Inventions On Using Ldap For Different Purposes (Part-2) - A Triz Based Analysis Of Us Patents, Umakant Mishra
Umakant Mishra
The objective of this article is to know how is LDAP used for Network Management and Telecommunications. The analysis of patents shows which Inventive Principles have been used to solve those inventions. Unlike other parts of the study which have tried to improve certain aspect of LDAP technology and application, this article includes the inventions that use LDAP for various different purposes. This article is divided into 3 parts for convenience of size. The first part of the article includes 6 patents using LDAP for “e-commerce” and “Policy Management”. The second part includes 10 patents using LDAP for “Network Management” …
Inventions On Integrating Ldap With Other Directories - A Triz Based Analysis Of Us Patents, Umakant Mishra
Inventions On Integrating Ldap With Other Directories - A Triz Based Analysis Of Us Patents, Umakant Mishra
Umakant Mishra
Thus the LDAP architecture allows multiple LDAP servers work together on the same directory tree or multiple directory trees. Besides, LDAP being built on an open architecture, it is quite possible to integrate with other directory servers. LDAP can be mapped onto any other directory system so long as the X.500 data and service model as used in LDAP is not violated in LDAP interface. LDAP server may store data in a Flat file, in RDBMS or in any other database. The LDAP client applications can use LDAP directory interface without having knowledge on the underlying data storage mechanism. However, …