$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Protector system for computer access and use 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
출원번호 US-0612200 (1984-05-21)
발명자 / 주소
  • Alsberg Peter (Urbana IL)
출원인 / 주소
  • Gould Inc. (Rolling Meadows IL 02)
인용정보 피인용 횟수 : 251  인용 특허 : 9

초록

A protector device as described for enhancing the security of a computer system which includes one or more user terminals in one or more host computers. The protector device includes a detection means for monitoring communications between the terminals and the host computers in which the detection m

대표청구항

A protector device for enhancing the security of a terminal computer system, the terminal computer system including at least one user terminal and at lest one computer, the protector device being external to the terminal computer system and comprising: data transmission means; at least one access no

이 특허에 인용된 특허 (9)

  1. Check ; Jr. Frank T. (Orange CT), Computer accessing system.
  2. Konheim Alan G. (Yorktown Heights NY) Tuckerman ; III Louis B. (Briarcliff Manor NY), Cryptographic architecture for use with a high security personal identification system.
  3. Jacoby Edward A. (Santa Clara CA), Electronic data processing security system and method.
  4. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  5. Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY), Method for authenticating the identity of a user of an information system.
  6. Trenkamp Robert H. (Cleveland Heights OH), Security means for transaction terminal system.
  7. Campbell Carl M. (Newtown Square PA), Security system for electronic funds transfer system.
  8. Gorgens Richard A. (Bedford MA), Security system for remote cash dispensers.
  9. Sendrow Marvin (4609 Logsdon Dr. Annandale VA 22003), System for authenticating users and devices in on-line transaction networks.

이 특허를 인용한 특허 (251)

  1. Koji Otani JP; Hiroyasu Sugano JP; Madoka Mitsuoka JP, Access administration method and device therefor to provide access administration services on a computer network.
  2. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  3. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  4. Dauerer Norman J. (Hopewell Junction NY) Kelley Edward E. (Wappingers Falls NY), Automated generation on file access control system commands in a data processing system with front end processing of a m.
  5. David W. Deaton ; Rodney G. Gabriel, Check transaction processing, database building and marketing method and system utilizing automatic check reading.
  6. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Check transaction processing, database building and marketing method and system utilizing automatic check reading.
  7. Kaditz, Jeffrey; Kachachi, Bashar J; Soderberg, Joel M., Client health validation using historical data.
  8. Depta, Robert, Computer including at least one connector for a replaceable storage medium, and method for starting and operating a computer via a replaceable storage medium.
  9. Chapman Sydney George,GBX ; Taylor Michael George,GBX, Control of access to a networked system.
  10. Collart,Todd, Controlling playback of content stored on a portable storage medium.
  11. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  12. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  13. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  14. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  15. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  16. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  17. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  18. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Data quality assurance.
  19. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Detecting corrupted data before transmission to a client.
  20. Hoffberg, Steven M., Detection and alert of automobile braking event.
  21. Shin, Kil-ho; Kobayashi, Kenichi; Aratani, Toru, Device and method for authenticating user's access rights to resources.
  22. Etchegoyen, Craig S., Device-specific content delivery.
  23. Etchegoyen, Craig S., Device-specific content delivery.
  24. La Joie Leslie T. (4203 Dauphine Dr. Austin TX 78727) Miller Eugene M. (13112 Marble Falls Cove Austin TX 78729) Dobbs Carl S. (1101 S. Capital of Texas Hwy. ; Bldg. J. Suite 220 Austin TX 78746) Sol, Diagnostic system for run-time monitoring of computer operations.
  25. La Joie Leslie T. ; Miller Eugene M. ; Dobbs Carl S. ; Solka Michael B., Diagnostic system for run-time monitoring of computer operations.
  26. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  27. Rothschild, Leigh, Digital media communication protocol.
  28. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  29. Kritt, Barry Alan; Law, Douglas Alan; Vargas, Juan F., Enabling access to removable hard disk drives.
  30. Rothschild, Leigh M., Enabling social interactive wireless communications.
  31. Schneier Bruce ; Kelsey John M., Event auditing system.
  32. Teng Henry Shao-Lin, Expert system having a plurality of security inspectors for detecting security flaws in a computer system.
  33. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, False statement detection system.
  34. Hoffberg, Steven M., Game theoretic prioritization system and method.
  35. Ben-Natan, Ron; Segal, Ury, Identifying attribute propagation for multi-tier processing.
  36. Allbery ; Jr. James D. (Farmington Hills MI) Troisi Peter A. (Westford MA) Johnson Susan J. (Novi MI) Cullen James H. (Bedford MA) Butler Richard L. (Toledo OH) Ferreira James P. (Amherst NH) Ellison, Intelligent process control communication system and method having capability to time align corresponding data sets.
  37. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  38. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  39. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  40. Rothschild Leigh M., Interactive, remote, computer interface system.
  41. Popp, Shane M., Manufacturing execution system for validation, quality and risk assessment and monitoring of pharmaceutical manufacturing processes.
  42. Blumenau Trevor, Metering of internet content using a control.
  43. Ford, Tobias; Hayes, Greg; Dahl, Erik, Method and apparatus for authorizing and reporting changes to device configurations.
  44. Wilhelm, Jeffrey; Nachenberg, Carey, Method and apparatus for detecting leakage of sensitive information.
  45. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for determining an identity of a network device.
  46. Tsang, Michael H., Method and apparatus for generating secured attention sequence.
  47. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for identifying network devices on a storage network.
  48. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  49. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  50. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  51. Khirman,Stanislav; Stone,Mark Ronald; Arial,Oren; Cohen,Ori, Method and apparatus for providing additional information in response to an application server request.
  52. Gewickey,Greg; Collart,Todd, Method and apparatus for providing content-owner control in a networked device.
  53. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  54. Corbeil, Ryn C., Method and apparatus for sharing authentication session state in a global distributed network.
  55. Kurtzberg Jerome M. ; Levanoni Menachem, Method and apparatus for testing the integrity of computer security alarm systems.
  56. Johnson William J. ; Keller Robert Scott ; Manthuruthil George C. ; Williams Marvin L., Method and system for access validation in a computer system.
  57. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive.
  58. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving one of a plurality of thresholds.
  59. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving threshold.
  60. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving threshold.
  61. Deaton, David W.; Gabriel, Rodney G., Method and system for accumulating marginal discounts and applying an associated incentive upon achieving threshold.
  62. Gilbert, Arthur Miles; Whitmore, James J., Method and system for architecting a secure solution.
  63. Gilbert,Arthur Miles; Whitmore,James J., Method and system for architecting a secure solution.
  64. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database and performing marketing based upon prior shopping history.
  65. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database for use with selective incentive marketing in response to customer shopping hi.
  66. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database for use with selective incentive marketing in response to customer shopping hi.
  67. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for building a database for use with selective incentive marketing in response to customer shopping hi.
  68. Deaton David W. ; Gabriel Rodney G., Method and system for building a database for use with selective incentive marketing in response to customer shopping histories.
  69. Cromer Daryl C. ; Locker Howard ; Ward James P. ; Steinmetz Michael J., Method and system for detecting an authorized tamper event.
  70. Deaton,David W.; Gabriel,Rodney G., Method and system for facilitating consumer purchases.
  71. Seminaro, Michael D.; Mar, Christopher E.; Greaves, Jon D., Method and system for filtering and suppression of telemetry data.
  72. Deaton David W. ; Gabriel Rodney G., Method and system for generating incentives based on substantially real-time product purchase information.
  73. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  74. Tran, Dang; Gava, Fabio; Zhu, Yingnan; Shelansky, Andrew; Lovelace, Michael; Zheng, Esther, Method and system for multi-user, multi-device login and content access control and metering and blocking.
  75. Shelansky, Andrew R.; Tran, Dang Van; Gava, Fabio, Method and system for providing users login access to multiple devices via a communication system.
  76. David W. Deaton ; Rodney G. Gabriel, Method and system for selective incentive point-of-sale marketing in response to customer shopping histories.
  77. David W. Deaton ; Rodney G. Gabriel, Method and system for selective incentive point-of-sale marketing in response to customer shopping histories.
  78. Deaton David W. (Abilene TX) Gabriel Rodney G. (Abilene TX), Method and system for selective incentive point-of-sale marketing in response to customer shopping histories.
  79. Trevor Blumenau, Method and system for the discovery of cookies and other client information.
  80. Bruce Lee Peterson ; Christina Ellen Clayton ; Michael Stephan Farmer, Method and system for tracking computer system usage through a remote access security device.
  81. Peterson,Bruce Lee; Clayton,Christina Ellen; Farmer,Michael Stephan, Method and system for tracking computer system usage through a remote access security device.
  82. Peterson,Bruce Lee; Clayton,Christina Ellen; Farmer,Michael Stephan, Method and system for tracking computer system usage through a remote access security device.
  83. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  84. Cox, Dennis; McClanahan, Kip, Method for blocking denial of service and address spoofing attacks on a private network.
  85. Kasiraj Chander (Grapevine TX) Wolf Timothy J. (Bedford TX), Method for providing notification of classified electronic message delivery restriction.
  86. Shambroom,W. David, Method for providing simultaneous parallel secure command execution on multiple remote hosts.
  87. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  88. Quak Jacobus T. W.,NLX ; Muller Frank,NLX ; Rombaut Willem,NLX, Method of loading commands in the security module of a terminal.
  89. Caprella, Ettore Elio; De Lutiis, Paolo; Leone, Manuel; Zaccone, Pier Luigi, Method, system, network and computer program product for securing administrative transactions over a network.
  90. Donald, James Lawrence; Wright, David Howell, Methods and apparatus for metering computer-based media presentation.
  91. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  92. Alla, Madhusudhan Reddy; Burbank, John R., Methods and apparatus to collect distributed user information for media impressions.
  93. Splaine, Steven J.; Swift, Adrian, Methods and apparatus to collect distributed user information for media impressions.
  94. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  95. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  96. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  97. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  98. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  99. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  100. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  101. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  102. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  103. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  104. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  105. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  106. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  107. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  108. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  109. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  110. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  111. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  112. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  113. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  114. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  115. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  116. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Goli, Narasimha Reddy, Methods and apparatus to measure exposure to streaming media.
  117. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Narasimha, Goli Reddy, Methods and apparatus to measure exposure to streaming media.
  118. Hannan, Kevin Michael; Papakostas, Achilleas; Perez, Albert Ronald; Yonker, Michael Andrew; Albino, Austin William, Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles.
  119. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and system for use in network management of content.
  120. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  121. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  122. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  123. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  124. Randall, Bruce W.; Taylor, James H.; Ely, Mark N.; Oetzel, Kenneth G., Methods and systems for use in maintaining media data quality upon conversion to a different data format.
  125. Randall, Bruce W.; Taylor, James H.; Ely, Mark N.; Oetzel, Kenneth G., Methods and systems for use in maintaining media data quality upon conversion to a different data format.
  126. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and systems for use in network management of content.
  127. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  128. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  129. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  130. Corthell David, Methods, software, and apparatus for secure communication over a computer network.
  131. Popp,Shane M., Methods, systems, and software program for validation and monitoring of pharmaceutical manufacturing processes.
  132. Hoffberg, Steven M., Mobile communication device.
  133. Jain, Anand; Stavropoulos, John; Neuhauser, Alan; Lynch, Wendell; Kuznetsov, Vladimir; Crystal, Jack, Monitoring media exposure using wireless communications.
  134. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  135. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  136. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  137. Hagiuda Tadashi,JPX ; Otani Masatoshi,JPX ; Maekawa Yoshito,JPX ; Takahashi Yoshinori,JPX ; Hamada Noboru,JPX ; Hirai Masahito,JPX, Network data base control device and method thereof.
  138. Igarashi,Toshiaki; Sugiyama,Akira; Iizuka,Yoshio; Torii,Minoru, Network data base control device and method thereof.
  139. Igarashi, Toshiaki; Sugiyama, Akira; Iizuka, Yoshio; Torii, Minoru, Network database control device and method thereof.
  140. Ben-Natan, Ron, Network intrusion blocking security overlay.
  141. Picazo ; Jr. Jose J. ; Lee Paul Kakul ; Zager Robert P., Network packet switch using shared memory for repeating and bridging packets at media rate.
  142. Nickles Alfred E., Network security and integration method and system.
  143. Ben-Natan, Ron, Nondestructive interception of secure data in transit.
  144. Wigur Jan (Norsborg SEX), Operator console with paired modules including means for ciphering and deciphering messages therebetween based on a mutu.
  145. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  146. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  147. Kelley,Edward Emile; McAuliffe,Wayne Anthony, Password protection.
  148. Shambroom,W. David, Platform-neutral system and method for providing secure remote operations over an insecure computer network.
  149. Deaton, David W.; Gabriel, Rodney G., Point-of-sale server and method.
  150. Deaton,David W.; Gabriel,Rodney G., Point-of-sale server and method.
  151. Morisawa Toshikazu,JPX ; Yamaki Masayo,JPX ; Tsukada Hiroyuki,JPX ; Mamata Tohru,JPX ; Kawawa Tatsuya,JPX, Portable computer system having password control means for holding one or more passwords such that the passwords are un.
  152. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  153. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  154. Carter Steven Howard,GB3 ; Lockyer Terence Denning,GB3 ; Gahan Christopher John,GB3, Repeaters for secure local area networks.
  155. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  156. Hearn, Michael Alfred; Kabzinski, Richard, Security system and method for computers.
  157. Ben-Natan, Ron; Tarandach, Izar, Selective local database access restriction.
  158. Lamkin,Allan; Collart,Todd; Blair,Jeff, Software engine for combining video or audio content with programmatic content.
  159. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  160. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  161. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  162. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  163. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  164. Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Supporting authentication across multiple network access servers.
  165. Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Supporting load sharing across multiple network access servers.
  166. Hoffberg, Steven M., System and method for determining contingent relevance.
  167. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition.
  168. Bunch, Clinton D., System and method for monitoring the internet access of a computer.
  169. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  170. Bunch, Clinton D., System and method for user behavioral management in a computing environment.
  171. Irwin, Fred; Johnson, Mark; Potter, Neil D.; Raynor, Peter E.; Torremante, Maria, System and method of interfacing for client application programs to access a data management system.
  172. Hamilton,Jeffrey L., System and methodology providing audit recording and tracking in real time industrial controller environment.
  173. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  174. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  175. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  176. Yoshimoto Masahiko,JPX, System for controlling the authority of a terminal capable of simultaneously operating a plurality of client softwares which transmit service requests.
  177. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a business layer component in a multimedia synchronization framework.
  178. Lamkin,Allan B.; Collart,Todd R., System, method and article of manufacture for a common cross platform framework for development of DVD-Video content integrated with ROM content.
  179. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a synchronizer component in a multimedia synchronization framework.
  180. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for java/javascript component in a multimedia synchronization framework.
  181. Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R.; Lewis, Michael J., System, method and article of manufacture for remote control and navigation of local content.
  182. Getsin,Evgeniy M.; Lamkin,Allan B.; Collart,Todd R.; Lewis,Michael J., System, method and article of manufacture for remote control and navigation of local content.
  183. Collart, Todd, System, method and article of manufacture for updating content stored on a portable storage medium.
  184. Collart,Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  185. Deaton, David W.; Wood, Robert Scott, System, method, and database for processing transactions.
  186. Kolessar, Ronald S.; Jensen, James M.; Lynch, Wendell D., Systems and methods for gathering audience measurement data.
  187. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  188. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  189. Goldberg, Andrew V.; Hartline, Jason D.; Wright, Andrew K., Systems and methods for pricing and selling digital goods.
  190. Goldberg,Andrew V.; Hartline,Jason D.; Wright,Andrew K., Systems and methods for pricing and selling digital goods.
  191. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  192. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  193. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  194. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  195. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  196. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  197. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  198. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  199. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  200. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  201. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  202. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  203. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  204. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  205. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  206. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  207. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  208. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  209. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  210. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  211. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  212. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  213. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  214. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  215. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  216. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  217. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  218. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  219. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  220. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  221. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  222. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  223. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  224. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  225. Sibert, W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  226. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  227. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  228. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  229. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  230. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  231. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  232. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  233. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  234. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  235. O'Connor William Y. ; Stanford Donald L. ; Khan Tariq M. ; Hutton Michael A. ; Beason Steve W. ; Angell Robert C., Technique for secure network transactions.
  236. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  237. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  238. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  239. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  240. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  241. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  242. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  243. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  244. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  245. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  246. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  247. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  248. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  249. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  250. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  251. Blumenau, Steve; Cohen, Steve; Lindholm, Jason D.; Ofer, Erez, User interface for managing storage in a storage system coupled to a network.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로