$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Public key/signature cryptosystem with enhanced digital signature certification 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0155467 (1988-02-12)
발명자 / 주소
  • Fischer Addison M. (60 14th Ave. South Naples FL 33942)
인용정보 피인용 횟수 : 433  인용 특허 : 10

초록

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign

대표청구항

In a communication system having a plurality of terminal devices coupled to a channel over which users of said terminal devices may exchange messages, at least some users having a public key and an associated key, an improved method for managing authority by digitally signing and certifying a messag

이 특허에 인용된 특허 (10)

  1. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  2. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  3. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91306), Blind signature systems.
  4. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Blind unanticipated signature systems.
  5. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  6. Matyas Stephen M. (Kingston NY), Initialization of cryptographic variables in an EFT/POS network with a large number of terminals.
  7. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305) Bach Carl E. (Albany CA), Method and apparatus for use in public-key data encryption system.
  8. Hazard Michel (Mareil/Mauldre FRX), Method and system for diversification of a basic key and for authentication of a thus-diversified key.
  9. Okamoto Tatsuaki (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Shiraishi Akira (Yokosuka JPX) Kawaoka Tsukasa (Yokosuka JPX), Signed document transmission system.
  10. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.

이 특허를 인용한 특허 (433)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  6. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  11. Tumey,David M.; Xu,Tianning, Animated toy utilizing artificial intelligence and facial image recognition.
  12. Holloway Christopher J.,GBX ; Matyas ; Jr. Stephen Michael, Apparatus and method for authentication of printed documents.
  13. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  14. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  15. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  16. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  17. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  18. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  19. Rosen Sholom S., Apparatus and method for secure transacting.
  20. Dillaway, Blair B., Auditing authorization decisions.
  21. Watsen, Kent A.; Kolchinsky, Alex, Authenticating third-party programs for platforms.
  22. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  23. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  24. Durst, David I.; Kaish, Norman; Fraser, Jay; Hoffberg, Michael; Rodricks, Brian, Authentication method and system.
  25. Durst,David I.; Kaish,Norman; Fraser,Jay, Authentication method and system.
  26. Durst,David I.; Kaish,Norman; Fraser,Jay; Hoffberg,Michael; Rodricks,Brian, Authentication method and system.
  27. Fraser, Jay, Authentication method and system.
  28. Fraser, Jay, Authentication method and system.
  29. Fraser, Jay; Weber, Larry, Authentication method and system.
  30. Fraser, Jay; Weber, Larry, Authentication method and system.
  31. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  32. Ohta Kazuo (Fujisawa JPX) Okamoto Tatsuaki (Yokosuka JPX), Authentication system and apparatus therefor.
  33. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  34. Kelley, Raymond H; Sutton, III, John C.; Bruce, Donna L.; Ardalan, Sasan H., Automated on-site meter registration confirmation using a portable, wireless computing device.
  35. Shuey,Kenneth C., Bias technique for electric utility meter.
  36. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  37. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  38. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  39. Relyea, Robert, Certificate generation using virtual attributes.
  40. Micali Silvio, Certificate issue lists.
  41. Sharifi Mehr, Nima, Cipher suite negotiation.
  42. Grajek, Garret Florian; Moore, Stephen; Lambiase, Mark V.; Lund, Craig J., Configuring a valid duration period for a digital certificate.
  43. Grajek, Garret Florian; Moore, Stephen; Lambiase, Mark V.; Lund, Craig J., Configuring a valid duration period for a digital certificate.
  44. Moore, Stephen; Graiek, Garret; Lambiase, Mark; Lund, Craig, Configuring a valid duration period for a digital certificate.
  45. Dillaway, Blair B.; Becker, Moritz Y.; Gordon, Andrew D.; Fournet, Cedric, Controlling the delegation of rights.
  46. Yamaguchi, Takahiro; Yamamoto, Masaya; Ugawa, Sanzo; Nakano, Toshihisa; Murase, Kaoru, Copyright protection data processing system and reproduction device.
  47. Sharifi Mehr, Nima, Countersigned certificates.
  48. Brown,Richard; Harrison,Keith Alexander, Credential transfer method and apparatus including sender-derived index.
  49. Kruys Johannes P. (Gt. Harmelen NLX), Cryptographic key management apparatus and methods.
  50. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  51. Mason, Jr.,Robert T.; Hodges,Eugene W.; Smith,Kathryn J.; Borleske,Andrew J., Data collector for an automated meter reading system.
  52. Rix, Simon Paul Ashley, Data communication system.
  53. Roth, Gregory Branchek; Brandwine, Eric Jason; Wren, Matthew James, Data loss prevention techniques.
  54. Roth, Gregory Branchek; Brandwine, Eric Jason; Wren, Matthew James, Data loss prevention techniques.
  55. Roth, Gregory Branchek; Brandwine, Eric Jason; Wren, Matthew James, Data loss prevention techniques.
  56. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Data security service.
  57. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Data security service.
  58. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Data security with a security module.
  59. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  60. Sandford ; II Maxwell T. ; Handel Theodore G., Data validation.
  61. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Delayed data access.
  62. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Delayed data access.
  63. Agrawal, Ashish; Frederick, Robert, Detection of fraudulent attempts to initiate transactions using modified display objects.
  64. Keronen, Seppo Reino; Demetriou, Stamatios, Device and method for authenticating and certifying printed documents.
  65. Etchegoyen, Craig S., Device-specific content delivery.
  66. Etchegoyen, Craig S., Device-specific content delivery.
  67. Jones, Thomas C., Differentiated authentication for compartmentalized computing resources.
  68. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  69. de Silva, Mahinda K.; Moskovitz, Ram A., Digital certificate cross-referencing.
  70. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  71. Mont,Marco Casassa; Brown,Richard; Monahan,Brian Quentin, Digital certificates.
  72. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  73. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  74. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  75. Kazuo Takaragi JP; Hiroyuki Kurumatani JP, Digital signature generating/verifying method and system using public key encryption.
  76. Vanstone Scott A.,CAX ; Qu Minghua,CAX, Digital signature protocol with reduced bandwidth.
  77. Albanese Andres ; Oppliger Rolf,CHX, Distributed registration and key distribution system and method.
  78. Campagna, Matthew John; Roth, Gregory Branchek, Distributed system web of trust provisioning.
  79. Smithies Christopher Paul Kenneth,GBX ; Newman Jeremy Mark,GBX, Document and signature data capture system and method.
  80. Smithies Christopher Paul Kenneth,GB2 ; Newman Jeremy Mark,GB2, Document and signature verification system and method.
  81. Han, Shocky; Ku, Pon Chun, Document authentication using electronic signature.
  82. Shuey,Kenneth C.; Hemminger,Rodney C.; Mason, Jr.,Robert T.; Hodges,Eugene W., Dynamic self-configuring metering network.
  83. Shuey,Kenneth C.; Hemminger,Rodney C.; Mason, Jr.,Robert T.; Hodges,Eugene W., Dynamic self-configuring metering network.
  84. Shuey,Kenneth C.; Hemminger,Rodney C.; Mason, Jr.,Robert T.; Hodges,Eugene W., Dynamic self-configuring metering network.
  85. Aisaka Kazuo,JPX, Electronic authentication system.
  86. Wray,Michael, Electronic certificate.
  87. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  88. Rosen,Sholom S., Electronic ticket vending system.
  89. Rosen,Sholom S., Electronic transaction apparatus for electronic commerce.
  90. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  91. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  92. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  93. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  94. Rudran,Dileep; Scoggins,Sean M; Christopher,Russell G, Ensuring automatic season change demand resets in a mesh type network of telemetry devices.
  95. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  96. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  97. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  98. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  99. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  100. Lund, Craig; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  101. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Federated key management.
  102. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Federated key management.
  103. Roth, Gregory B.; Baer, Graeme D.; Brandwine, Eric Jason, Flexibly configurable data modification services.
  104. Sekar Chandersekaran ; Sarbari Gupta, Framework-based cryptographic key recovery system.
  105. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  106. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  107. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  108. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  109. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  110. Valente, Luis, Hierarchical open security information delegation and acquisition.
  111. Grajek, Garret Florian; Lo, Jeffrey Chiwai; Lambiase, Mark V., Identity-based certificate management.
  112. Grajek, Garret Florian; Lo, Jeffrey Chiwai; Lambiase, Mark V., Identity-based certificate management.
  113. Grajek, Garrett F.; Lo, Jeff C.; Lambiase, Mark V., Identity-based certificate management.
  114. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  115. Borleske,Andrew J.; Shuey,Kenneth C.; Mason, Jr.,Robert T., In-home display communicates with a fixed network meter reading system.
  116. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  117. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  118. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Key rotation techniques.
  119. Johnson, Donald B., Key validation scheme.
  120. Johnson, Donald B., Key validation scheme.
  121. Johnson,Donald B., Key validation scheme.
  122. Chaum David, Limited-traceability systems.
  123. Chaum David, Limited-traceability systems.
  124. Chaum David, Limited-traceability systems.
  125. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  126. Shuey, Kenneth C.; Borleske, Andrew J.; Mason, Jr., Robert T.; Hart, David G., Load control unit in communication with a fixed network meter reading system.
  127. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, Machine-readable checks.
  128. Rowley, Peter Andrew, Mail certificate responder.
  129. Carter, Stephen R, Maintaining a soft-token private key store in a distributed environment.
  130. Carter, Stephen R., Maintaining a soft-token private key store in a distributed environment.
  131. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  132. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  133. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  134. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  135. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  136. Jevans, David, Mechanism for efficient private bulk messaging.
  137. Jevans, David, Mechanism for efficient private bulk messaging.
  138. Appenzeller, Guido; Choi, Timothy Y.; Pauker, Matthew J., Message authentication using signatures.
  139. Appenzeller, Guido; Choi, Timothy Y.; Pauker, Matthew J., Message authentication using signatures.
  140. Hamilton, Michael; Ricart, Glenn; Boland, Walter E., Message routing.
  141. Hamilton, Michael; Ricart, Glenn; Boland, Walter E., Message routing.
  142. Daniello, Rudy; Desmonceau, Sophie; Janin, Benoit; Jullien, René; Ruscica, Brigitte, Method allowing validation in a production database of new entered data prior to their release.
  143. Walker, Jay S.; Schneier, Bruce; Jorasch, James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce.
  144. Walker, Jay S.; Schneier, Bruce; Jorasch, James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce.
  145. Wray,Michael, Method and apparatus for a secure communications session with a remote system via an access-controlling intermediate system.
  146. Kingdon Kevin, Method and apparatus for authentication of client server communication.
  147. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  148. Wray,Michael, Method and apparatus for discovering a trust chain imparting a required attribute to a subject.
  149. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for password based authentication in a distributed system.
  150. Lewis, David Otto; Remfert, Jeffrey Earl, Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device.
  151. Ronald M. Smith, Sr. ; Edward J. D'Avignon ; Robert S. DeBellis ; Randall J. Easter ; Lucina L. Green ; Michael J. Kelly ; William A. Merz ; Vincent A. Spano ; Phil Chi-Chung Yeh, Method and apparatus for providing public key security control for a cryptographic processor.
  152. Lewis, David Otto; Remfert, Jeffrey Earl, Method and apparatus for providing television services using an authenticating television receiver device.
  153. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  154. Kent, Stephen Thomas, Method and apparatus for supporting authorities in a public key infrastructure.
  155. Lewis, David Otto; Remfert, Jeffrey Earl, Method and apparatus for uniquely and authoritatively identifying tangible objects.
  156. Lewis,David Otto; Remfert,Jeffrey Earl, Method and apparatus for uniquely and authoritatively identifying tangible objects.
  157. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  158. Fischer Addison M., Method and apparatus for validating travelling object-oriented programs with digital signatures.
  159. Fischer Addison M., Method and apparatus for validating travelling object-oriented programs with digital signatures.
  160. Kobozev,Alexey; Zavalkovsky,Arthur; Frenkel,Ilan, Method and apparatus for verifying revocation status of a digital certificate.
  161. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  162. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  163. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  164. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  165. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  166. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  167. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  168. Mason, Jr.,Robert T.; Borleske,Andrew J., Method and system for configurable qualification and registration in a fixed network automated meter reading system.
  169. Yoshio Takahashi JP; Hidemi Moribatake JP, Method and system for controlling key for electronic signature.
  170. Benantar, Messaoud; Gindin, Thomas L.; Milman, Ivan, Method and system for coupling an X.509 digital certificate with a host identity.
  171. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  172. Meyer, Peter Ronald, Method and system for improving wireless data packet delivery.
  173. Micali, Silvio; Rivest, Ronald L., Method and system for micropayment transactions.
  174. Spitz, Charles F., Method and system for obtaining digital signatures.
  175. Spitz,Charles F., Method and system for obtaining digital signatures.
  176. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  177. Falch, Konrad; Lemberg, Trond; Liberg, Hakon; Lie, Anund; Myrseth, Per; Olnes, Jon, Method and system for the authentication of a public key certificate.
  178. Christopher Paul Kenneth Smithies GB; Jeremy Mark Newman GB, Method and system for the capture, storage, transport and authentication of handwritten signatures.
  179. Dare, Peter R.; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  180. Dare, Peter R.; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  181. Dare, Peter Roy; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  182. Dare, Peter Roy; Owlett, John; Tyabji, Imran F., Method and system for the supply of data, transactions and electronic voting.
  183. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  184. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  185. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  186. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  187. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  188. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  189. Dare, Peter Roy; Owlett, John; Tyabji, Imran Faiz, Method and system for the supply of data, transactions and electronic voting.
  190. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  191. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  192. Knechtel, Harry; Hofmann, Marco; Kuhls, Burkhard, Method for authenticating, in particular, software components that can be loaded into a control unit of a motor vehicle.
  193. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  194. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  195. Spagna, Richard L.; Rettig, Paul R.; Rodgers, Jeremy; Best, Arthur; Best, II, Arthur R., Method for determining internet users geographic region.
  196. Van Oorschot Paul C. (Ottawa CAX) Ford Warwick S. (Nepean CAX) Hillier Stephen W. (Ottawa CAX) Otway Josanne (Ottawa CAX), Method for efficient management of certificate revocation lists and update information.
  197. Sholom S. Rosen, Method for electronic merchandise dispute resolution.
  198. Takaragi Kazuo (Ebina JPX) Sasaki Ryoichi (Fujisawa JPX), Method for electronic transaction with digital signature.
  199. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
  200. Hills, Alexander H.; Schlegel, Jon P.; Jenkins, Benjamin C., Method for estimating signal strengths.
  201. Mertes, Paul; Mettken, Werner, Method for generating asymmetrical cryptographic keys by the user.
  202. Rix,Simon Paul Ashley; Glasspool,Andrew; Davies,Donald Watts, Method for providing a secure communication between two devices and application of this method.
  203. Simon Paul Ashley Rix ZA; Andrew Glasspool GB; Donald Watts Davies GB, Method for providing a secure communication between two devices and application of this method.
  204. Crosson Smith,Steven A., Method for remotely authorizing a payment transaction file over an open network.
  205. Barkan Mordhay,ILX, Method for safe communications.
  206. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  207. Bao,Feng; Deng,Huijie, Method of exchanging digital data.
  208. Falch,Konrad; Lemberg,Trond; Liberg,H책kon; Lie,Anund; Myrseth,Per; Olnes,Jon, Method, system and service for the authentication of a public key certificate.
  209. DeTreville,John D., Method, system, and apparatus for providing secure access to a digital work.
  210. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  211. Pitsos,Errikos, Methods and system for providing a public key fingerprint list in a PK system.
  212. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  213. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  214. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  215. Jakobsson, Bjorn Markus, Minimalistic electronic commerce system.
  216. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  217. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  218. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  219. Borleske,Andrew J., Multipurpose interface for an automated meter reading device.
  220. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  221. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  222. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Negotiating a session with a cryptographic domain.
  223. Carpenter,Richard Christopher; Kelley,Raymond; Scoggins,Sean Michael; Ardalan,Sasan, Network-enabled, extensible metering system.
  224. Carpenter,Richard Christopher; Kelley,Raymond; Scoggins,Sean Michael; Ardalan,Sasan, Network-enabled, extensible metering system.
  225. Borleske, Andrew J.; Shuey, Kenneth C.; Mason, Jr., Robert T.; Uy, David V., Optimized data collection in a wireless fixed network metering system.
  226. Richeson, Keith D.; Uy, David; Borleske, Andrew J.; Brian, Brent R.; Mason, Jr., Robert T.; Hemminger, Rodney C.; Christopher, Russell G.; Kelley, Raymond, Over the air microcontroller flash memory updates.
  227. Gindin,Thomas L.; Benantar,Messaoud; Sweeny,James W.; Dayka,John C., Password exposure elimination for digital signature coupling with a host identity.
  228. Sweeny,James W.; Benantar,Messaoud; Petreshock,John J.; Gindin,Thomas L.; Dayka,John C., Password exposure elimination for digital signature coupling with a host identity.
  229. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  230. Kruse, William Frederick; Mehr, Nima Sharifi, Policy approval layer.
  231. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Policy enforcement with associated data.
  232. Paya, Cem; Benaloh, Josh, Prevention of unauthorized forwarding and authentication of signatures.
  233. Brookner George ; Brown Michael ; Eskandari Fetneh ; Schwartz Robert, Printing postage with cryptographic clocking security.
  234. McClintock, Jon Arron; Canavor, Darren Ernest; Hitchcock, Daniel Wade; Kozolchyk, Jonathan, Privilege distribution through signed permissions grants.
  235. Roth, Gregory Branchek, Probabilistic key rotation.
  236. Roth, Gregory Branchek, Probabilistic key rotation.
  237. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  238. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi; Oka,Makoto, Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium.
  239. Guski, Richard H.; Hahn, Timothy J., Public key infrastructure delegation.
  240. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  241. Abdo, Nadim Y.; Albu, Voicu Anton, RDP bitmap hash acceleration using SIMD instructions.
  242. Shuey,Kenneth C., Reducing power consumption of electrical meters.
  243. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  244. Ardalan,Sasan H.; Van den Bout,David E., Remote access to electronic meters using a TCP/IP protocol suite.
  245. Eldridge Alan D. ; Kaufman Charles W., Removable media for password based authentication in a distributed system.
  246. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  247. Weinstein Jeff ; Weinstein Tom ; Elgamal Taher, SSL step-up.
  248. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  249. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  250. Carroll, Robert B.; Bacha, Hamid; Briggs, Robert, Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller.
  251. Brands Stefanus Alfonsus (Ioa Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secure cryptographic methods for electronic transfer of information.
  252. Faynberg, Igor; Lu, Hui-Lan, Secure dynamic authority delegation.
  253. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  254. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  255. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason; Pratt, Brian Irl, Secure management of information using a security module.
  256. Liu, Gary G.; Cook, David P., Secure pipeline processing.
  257. Carroll Robert B., Secure server and method of operation for a distributed information system.
  258. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  259. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  260. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  261. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  262. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  263. Cordery,Robert A.; Lee,David K.; Pintsov,Leon A.; Ryan, Jr.,Frederick W.; Weiant, Jr.,Monroe A., Secure user certification for electronic commerce employing value metering system.
  264. Maruyama, Hiroshi; Munetoh, Seiji; Yoshihama, Sachiko, Security and ticketing system control and management.
  265. Dillaway, Blair B.; Becker, Moritz Y.; Gordon, Andrew D.; Fournet, Cedric, Security authorization queries.
  266. Quach, Allen Yu; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark, Security device provisioning.
  267. Quach, Allen Yu; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark V., Security device provisioning.
  268. Becker, Moritz Y.; Dillaway, Blair B.; Fournet, Cedric; Gordon, Andrew D., Security language expressions for logic resolution.
  269. Becker, Moritz Y.; Dillaway, Blair B.; Fournet, Cedric; Gordon, Andrew D.; Mackay, Jason F., Security language translations with logic resolution.
  270. Becker, Moritz Y.; Dillaway, Blair B.; Fournet, Cedric; Gordon, Andrew D.; Mackay, Jason F., Security language translations with logic resolution.
  271. Wray, Michael, Security protocol.
  272. Wray,Michael; Ferguson,Niels, Security protocol.
  273. Cross, David B.; Novak, Mark F.; Shekel, Oded Ye; Leach, Paul J.; Luther, Andreas; Jones, Thomas C., Selective authorization based on authentication input attributes.
  274. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  275. Smith, Jeffrey C.; Bandini, Jean-Christophe, Sender driven certification enrollment system.
  276. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  277. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  278. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  279. Lambiase, Mark V.; Grajek, Garret Florian; Lo, Jeffrey Chiwai; Hsiang Wu, Tommy Ching, Single sign on with multiple authentication factors.
  280. Lambiase, Mark V.; Grajek, Garret Florian; Lo, Jeffrey Chiwai; Hsiang Wu, Tommy Ching, Single sign on with multiple authentication factors.
  281. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  282. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  283. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  284. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  285. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  286. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  287. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  288. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  289. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  290. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  291. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  292. Appenzeller, Guido; Spies, Terence, Subscription management service for secure messaging system.
  293. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  294. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  295. Roth, Gregory Branchek; Campagna, Matthew John; Seidenberg, Benjamin Elias, Supporting a fixed transaction rate with a variably-backed logical cryptographic key.
  296. Roth, Gregory Branchek; Campagna, Matthew John; Seidenberg, Benjamin Elias, Supporting a fixed transaction rate with a variably-backed logical cryptographic key.
  297. Shuey,Kenneth C., Switch to bypass optical diode for reducing power consumption of electrical meters.
  298. Moffat, Darren J.; Belgaied, Kais; Sangster, Paul, System and computer readable medium for verifying access to signed ELF objects.
  299. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  300. Musgrave Clyde ; Dulude Robert S., System and method for authenticating electronic transactions using biometric certificates.
  301. Scoggins, Sean M.; Christopher, Russell G.; Garianov, Alexei; Rudran, Dileep, System and method for automated configuration of meters.
  302. Duane,William M.; R��stin,Peter, System and method for certificate exchange.
  303. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for certifying content of hard-copy documents.
  304. Grajek, Garret; Lund, Craig; Moore, Steven; Lambiase, Mark, System and method for configuring a valid duration period for a digital certificate.
  305. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  306. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  307. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling the use of a digital work in accordance with usage rights associated with the digital work.
  308. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  309. Christopher,Russell G.; Kelley,Raymond; Rudran,Dileep; Nemecz,Susane K., System and method for creating multiple operating territories within a meter reading system.
  310. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  311. Davis Derek L., System and method for digitally signing a digital agreement between remotely located nodes.
  312. Borleske,Andrew J.; Scoggins,Sean M.; Uy,David, System and method for efficient configuration in a fixed network automated meter reading system.
  313. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  314. Lund, Craig; Grajek, Garret; Moore, Stephen, System and method for facilitating secure online transactions.
  315. Ross Paul C., System and method for fingerprint data verification.
  316. Barkan Yuval,ILX ; Barkan Moromay,ILX, System and method for handling permits.
  317. Brian,Brent R.; Borleske,Andrew J.; Mason, Jr.,Robert T., System and method for improved transmission of meter data.
  318. Scott, Kelly W., System and method for network-based project management.
  319. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content.
  320. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  321. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  322. Brown, Michael Kenneth; Brown, Michael Stephen; Kirkup, Michael Grant, System and method for processing messages being composed by a user.
  323. Brown, Michael Kenneth; Brown, Michael Stephen; Kirkup, Michael Grant, System and method for processing messages being composed by a user.
  324. Nagel,Robert H., System and method for production and authentication of original documents.
  325. Nagel,Robert H., System and method for production and authentication of original documents.
  326. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  327. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  328. Yu Quach, Allen; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark V., System and method for provisioning a security token.
  329. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  330. Apperson Norman ; Beckman Brian C., System and method for safety distributing executable objects.
  331. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  332. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  333. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  334. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  335. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  336. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  337. Neumann, Helmut, System and method for using digital signatures to assign permissions.
  338. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for verifying signatures on documents.
  339. Paul C. Drews, System and method for verifying the integrity and authorization of software before execution in a local platform.
  340. Musgrave, Clyde; Cambier, James L., System and method of fast biometric database searching using digital certificates.
  341. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., System and method of indicating the strength of encryption.
  342. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., System and method of indicating the strength of encryption.
  343. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony; Brown, Michael Kenneth, System and method of indicating the strength of encryption.
  344. Kumar,Navaneet; Kelley,Raymond; Rudran,Dileep; Scoggins,Sean M., System and method of providing a geographic view of nodes in a wireless network.
  345. Scoggins,Sean M., System and method of visualizing network layout and performance characteristics in a wireless network.
  346. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  347. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  348. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  349. Scoggins, Sean M.; Christopher, Russell G.; Garianov, Alexei; Smith, Kathryn J.; Nemecz, Susane K.; Rudran, Dileep, System for automated management of spontaneous node migration in a distributed fixed wireless network.
  350. Scoggins,Sean M.; Mills,Stuart; Mason,Robert T.; Borleske,Andrew J.; Smith,Kathryn J.; Rudran,Dileep, System for automatically enforcing a demand reset in a fixed network of electricity meters.
  351. Simon Paul Ashley Rix ZA; Andrew Augustine Wajs NL, System for broadcasting data signals in a secure manner.
  352. Banerjee,Dwip N.; Dutta,Rabindranath; Spring,Eduardo N., System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail.
  353. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  354. Stefik, Mark J.; Pirolli, Peter L. T., System, apparatus, and media for granting access to and utilizing content.
  355. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for analyzing data from network-based structured message stream.
  356. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for auditing XML messages in a network-based message stream.
  357. Dick, Kevin Stewart; Rescorla, Eric, System, method and computer program product for guaranteeing electronic transactions.
  358. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for guaranteeing electronic transactions.
  359. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for guaranteeing electronic transactions.
  360. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for providing an efficient trading market.
  361. Ross, Jr.,Robert C., System, method, and computer program product for providing a multi-user e-mail system.
  362. Greene,Daniel H.; Goldberg,David; Bern,Marshall W., Systems and methods for authenticating documents.
  363. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  364. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  365. Krishnaswamy,Vinay; Narin,Attila; Kostal,Gregory; Yarmolenko,Vladimir; Cottrille,Scott C., Systems and methods for providing secure server key operations.
  366. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  367. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  368. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  369. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  370. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  371. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  372. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  373. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  374. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  375. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  376. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  377. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  378. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  379. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  380. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  381. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  382. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  383. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  384. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  385. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  386. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  387. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  388. Greene,Daniel H.; Goldberg,David; Bern,Marshall W., Systems and methods for verifying documents.
  389. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  390. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  391. Bender, Christopher L.; Brown, Michael K.; Brown, Michael S., Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function.
  392. Bender, Christopher L.; Brown, Michael K.; Brown, Michael S., Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function.
  393. Rosen Sholom S., Tamper-proof devices for unique identification.
  394. Rosen Sholom S., Tamper-proof electronic processing device.
  395. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  396. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  397. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  398. Mason, Jr., Robert T.; Richeson, Keith D.; Minton, III, Charlie E., Techniques for limiting demand from an electricity meter with an installed relay.
  399. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  400. Judah Levine, Time-stamp service for the national information network.
  401. Saito, Mika; Watanabe, Yuji; Yuriyama, Madoka; Yoshizawa, Takeo, Traceability verification system, method and program for the same.
  402. Saito, Mika; Watanabe, Yuji; Yuriyama, Madoka; Yoshizawa, Takeo, Traceability verification system, method and program for the same.
  403. Lemaire,Charles A.; Lundberg,Steven W., Transaction-based object-oriented multipart database method and apparatus.
  404. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  405. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  406. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  407. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  408. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  409. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  410. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  411. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  412. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  413. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  414. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  415. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  416. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  417. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  418. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  419. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  420. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  421. Kuhls, Burkhard; Knechtel, Harry; Kiessling, Horst; Kalverkamp, Thomas, Updating and/or expanding the functionality of sequence control of at least one control unit.
  422. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  423. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  424. Mason, Jr.,Robert T; Borleske,Andrew J; Shuey,Kenneth C, Using a fixed network wireless data collection system to improve utility responsiveness to power outages.
  425. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.
  426. Paresh Patel GB; Ku Lee ; Roger Reider ; Drew Kittel ; Lolo Lasida, Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system.
  427. Fisk,Mark; Carroll,Robert; Maruyama,Hirosi; Ghafir,Hatem, Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system.
  428. Ghafir Hatem ; Poetzschke Dieter, Vault controller dispatcher and methods of operation for handling interaction between browser sessions and vault processes in electronic business systems.
  429. Bacha, Hamid; Carroll, Robert B., Vault controller secure depositor for managing secure communication.
  430. Bacha, Hamid; Burns, Robert; Carroll, Robert B.; Fisk, Mark, Vault controller supervisor and method of operation for managing multiple independent vault processes and browser sessions for users in an electronic business system.
  431. Roth, Gregory Branchek; Brandwine, Eric Jason; Wren, Matthew James, Virtual service provider zones.
  432. Roth, Gregory Branchek; Brandwine, Eric Jason; Wren, Matthew James, Virtual service provider zones.
  433. Bragg, Steven D.; Yost, Robert W., Wakeup and interrogation of meter-reading devices using licensed narrowband and unlicensed wideband radio communication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로