$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure data processing system architecture with format control 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-001/00
  • H04L-009/00
출원번호 US-0703638 (1985-02-21)
발명자 / 주소
  • Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN)
출원인 / 주소
  • Honeywell Inc. (Minneapolis MN 02)
인용정보 피인용 횟수 : 277  인용 특허 : 2

초록

Means and methods of securing protected system files in a data processing system are disclosed, wherein the information determining access rights of system users to the protected systems files remains at all times within a secure processor. Provision is also made for allowing the display or labeling

대표청구항

A data processing system having protected system files, wherein each protected system file is associated with a data format and wherein said data processing system operates in response to programs or groups of programs which perform specific tasks, comprising: identification means for identifying a

이 특허에 인용된 특허 (2)

  1. Markstein ; Peter Willy ; Tritter ; Alan Levi, Hierarchical security mechanism for dynamically assigning security levels to object programs.
  2. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture.

이 특허를 인용한 특허 (277)

  1. Keronen, Seppo Reino, Apparatus and method for preventing disclosure of protected information.
  2. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  3. Rahtgen Preben (V rlose DKX), Apparatus for communicating with data systems and a method of communicating with data systems.
  4. Yarsa, Julianne; Rich, Bruce Arland; Shrader, Theodore Jack London; Skibbie, Donna, Architecture for denied permissions in Java.
  5. Hardt, Dick C., Auditable privacy policies in a distributed hierarchical identity management system.
  6. Dauerer Norman J. (Hopewell Junction NY) Kelley Edward E. (Wappingers Falls NY), Automated generation on file access control system commands in a data processing system with front end processing of a m.
  7. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  8. Walker Robin D. (Glasgow GB6), Code operated access control system for electronic data store.
  9. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  10. Fritch Daniel Gene ; Green Tammy Anita ; Schell Roger R., Computer network graded authentication system and method.
  11. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  12. Stefik,Mark J., Content rendering device with usage rights.
  13. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  14. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  15. Follendore ; III Roy D., Cryptographic access and labeling system.
  16. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  17. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  18. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split binding process and apparatus.
  19. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  20. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  21. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  22. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  23. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  24. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  25. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  26. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  27. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  28. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  29. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  30. Hardt, Dick C., Distributed contact information management.
  31. Shanton M. Greg, Distributed cryptographic object method.
  32. Shanton M. Greg, Distributed cryptographic object method.
  33. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  34. Hardt, Dick C., Distributed hierarchical identity management.
  35. Bains Jeffrey E. (Madison AL) Case Willard W. (Madison AL), Distributed license administration system using a local policy server to communicate with a license server and control e.
  36. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  37. McKelvey Mark Ambrose, Embedded security processor.
  38. Latham Daren Wayne ; Gooderum Mark P. ; Andreas Glenn, Enhanced security network time synchronization device and method.
  39. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  40. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  41. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  42. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  43. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  44. Hardt, Dick C., Graduated authentication in an identity management system.
  45. Hardt, Dick C., Graduated authentication in an identity management system.
  46. Hardt, Dick C., Graduated authentication in an identity management system.
  47. Kurosawa Takahiro,JPX ; Sato Hiroaki,JPX, Group environment setting method and system thereof to provide an equivalent environment for plural participants.
  48. Holtzman, Michael; Barzilai, Ron; Elhamias, Reuven; Cohen, Niv, Hardware driver integrity check of memory card controller firmware.
  49. Craft,David John, Hardware-based secure code authentication.
  50. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  51. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  52. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  53. Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  54. Vasic, Ognjen; Ansari, Suhail; Gan, Ping; Hu, Jinhui; Khulusi, Bassam; Madoukh, Adam A.; Tyshlek, Alexander, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  55. Shimizu, Yusuke, Information processing device and method for reading information recorded on an information recording medium.
  56. Steele, Nick; Hawkins, Stan; Maranville, Joe; Bradnan, Andrew, Initiation of an information transaction over a network via a wireless device.
  57. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  58. Allbery ; Jr. James D. (Farmington Hills MI) Troisi Peter A. (Westford MA) Johnson Susan J. (Novi MI) Cullen James H. (Bedford MA) Butler Richard L. (Toledo OH) Ferreira James P. (Amherst NH) Ellison, Intelligent process control communication system and method having capability to time align corresponding data sets.
  59. Cross, David B.; Nath, Satyajit; Li, George Z.; Dutta, Tanmoy; Gottumukkala, Sunil, Labeling of data objects to apply and enforce policies.
  60. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  61. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  62. Nessett Dan M. ; Callsen Christian J. ; Cavanaugh ; III Ken M., Mechanism for locating objects in a secure fashion.
  63. Takagi, Yoshihiko; Kikuchi, Takafumi, Memory, information apparatus for access to the memory, and method for the information apparatus.
  64. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  65. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  66. McClung Charles R. (Baldwin NY) Roberts Peter H. (Brooklyn NY), Method and apparatus for controlled access to a computer system.
  67. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  68. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  69. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  70. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  71. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  72. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  73. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  74. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  75. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  76. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  77. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  78. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  79. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  80. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  81. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  82. Krig, Scott A., Method and apparatus for providing secure register access.
  83. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  84. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  85. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  86. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  87. Holtzman, Michael; Jogand-Coulomb, Fabrice, Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications.
  88. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  89. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  90. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  91. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  92. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  93. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  94. Craft,David John, Method and system for ensuring security of code in a system on a chip.
  95. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  96. Yachida Masuyoshi,JPX, Method and system for preventing unauthorized access to information stored in a computer.
  97. Lao, Guillermo, Method and system for subscription digital rights management.
  98. Lao, Guillermo, Method and system for subscription digital rights management.
  99. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  100. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  101. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  102. Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
  103. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  104. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  105. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  106. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  107. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  108. Vincent James P. (Arlington TX), Method for providing information security protocols to an electronic calendar.
  109. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  110. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for transparently managing outbound traffic from an internal user of a private network destined for a public network.
  111. Holtzman, Michael; Barzilai, Ron; Elhamias, Reuven; Cohen, Niv, Method of hardware driver integrity check of memory card controller firmware.
  112. Hamid Laurence,CAX ; Hillhouse Robert D.,CAX, Method of providing secure user access.
  113. Laurence Hamid CA; Robert D. Hillhouse CA, Method of providing secure user access.
  114. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  115. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  116. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  117. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  118. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  119. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Methods used in a mass storage device with automated credentials loading.
  120. Holtzman, Micky; Cohen, Baruch Boris; Barzilai, Ron; Bar-El, Hagai; Deitcher, David, Methods used in a secure memory card with life cycle phases.
  121. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  122. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  123. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  124. Vahalia Uresh K. ; Gupta Uday ; Porat Betti ; Tzelnic Percy, Network file server sharing local caches of file access information in data processors assigned to respective file systems.
  125. Friedman Aharon ; Bozoki Eva, Network security device.
  126. Endicott, John Clarence; Halter, Steven Lester; Munroe, Steven Jay; Voldal, Erik Edward; Xu, Xin, Object encapsulation protection apparatus.
  127. Dinges, Clemens; Feld, Joachim; Lange, Ronald; Schlereth, Michael, Object processing system using an object model.
  128. Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Johnson Donald B. (Manassas VA) Karne Ramesh K. (Herndon VA) Le An V. (Arlington VA) Prymak Rostislaw (Dumfries VA) Thomas Julian (Lagra, Personal identification number processing using control vectors.
  129. Lambert,John J.; Garg,Praerit; Lawson,Jeffrey A., Policies for secure software execution.
  130. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  131. Clifford, Thomas G.; Wu, Weibao, Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication.
  132. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  133. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  134. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  135. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  136. Craft, David J., Secure code authentication.
  137. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  138. Matsuzaki,Natsume; Sakushima,Kazuo; Tatebayashi,Makoto, Secure device.
  139. Scott Glenn C. ; Stoltz Benjamin J., Secure file system.
  140. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  141. Matyas Stephen M. (Manassas VA) Abraham Dennis G. (Concord NC) Arnold William C. (Mahopac NY) Johnson Donald B. (Manassas VA) Karne Ramesh K. (Herndon VA) Le An V. (Arlington VA) Prymak Rostislaw (Du, Secure management of keys using extended control vectors.
  142. Holtzman, Micky; Cohen, Baruch Boris; Barzilai, Ron, Secure memory card with life cycle phases.
  143. Holtzman, Micky; Cohen, Baruch Boris; Barzilai, Ron; Bar-El, Hagai; Deitcher, David, Secure memory card with life cycle phases.
  144. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  145. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  146. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  147. Aoyama Mitsunobu (Oome JPX), Security administrator for automatically updating security levels associated with operator personal identification data.
  148. Kim, Kwan Ho; Kim, Seok Min; Lee, Heon Soo, Security management unit, host controller interface including same, method operating host controller interface, and devices including host controller interface.
  149. Kim, Kwan Ho; Kim, Seok Min; Lee, Heon Soo, Security management unit, host controller interface including same, method operating host controller interface, and devices including host controller interface.
  150. Hayman Kenneth John ; Keene Michael Donovan ; Lewine Eric Scott ; Meyers William James ; Spencer Jon Frederick ; Taylor ; II Millard Cranford, Security system for computer systems.
  151. Clifford, Thomas G., Selectively protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication.
  152. Hidekazu Takata JP; Ken Sumitani JP, Semiconductor device and control device for use therewith.
  153. Steele, Nick; Hawkins, Stan; Maranville, Joe; Bradnan, Andrew, Single sign-on for access to a central data repository.
  154. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  155. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  156. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  157. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  158. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  159. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  160. Steele, Nick; Hawkins, Stan; Maranville, Joe; Bradnan, Andrew, Storage, management and distribution of consumer information.
  161. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  162. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  163. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  164. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  165. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  166. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  167. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  168. Wang,Xin, System and method for document distribution.
  169. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  170. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  171. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  172. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  173. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  174. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  175. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  176. Wang, Xin, System and method for protection of digital works.
  177. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  178. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  179. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  180. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  181. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  182. Mueller Marianne ; Connelly David, System and method for securing a program's execution in a network environment.
  183. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  184. Badger Lee ; Sterne Daniel F. ; Sherman David L. ; Tajalli Homayoon ; Dalva David I., System and method for superimposing attributes on hierarchically organized file systems.
  185. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  186. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  187. Wang,Xin, System and method for transferring the right to decode messages.
  188. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  189. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  190. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  191. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  192. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  193. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  194. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  195. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  196. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  197. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  198. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  199. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  200. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  201. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  202. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  203. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  204. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  205. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  206. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  207. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  208. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  209. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  210. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  211. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  212. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Silk,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  213. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  214. Byrne Shannon,CAX, System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers.
  215. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  216. Bennett, Peter; Dellow, Andrew, System for restricting data access.
  217. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  218. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  219. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  220. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  221. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  222. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  223. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  224. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  225. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  226. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  227. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  228. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  229. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  230. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  231. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  232. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  233. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  234. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  235. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  236. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  237. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  238. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  239. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  240. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  241. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  242. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  243. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  244. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  245. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  246. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  247. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  248. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  249. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  250. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  251. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  252. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  253. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  254. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  255. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  256. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  257. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  258. Enescu Michael A. (Sunnyvale CA) Lum James (Redwood City CA), Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstation.
  259. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  260. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  261. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  262. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  263. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  264. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  265. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  266. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  267. Miyazaki,Kunihiko; Itoh,Shinji; Yoshiura,Hiroshi; Takaragi,Kazuo; Arai,Masato; Arai,Toshiaki; Matsuki,Takeshi; Toyoshima,Hisashi, Trusted computer system.
  268. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  269. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  270. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  271. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  272. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  273. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  274. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  275. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  276. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  277. Kolouch, James L., XML encryption scheme.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로