$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for delegating authorization from one entity to another through the use of session encryption keys 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/30
  • H04L-009/32
출원번호 US-0589925 (1990-09-28)
발명자 / 주소
  • Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA)
출원인 / 주소
  • Digital Equipment Corporation (Maynard MA 02)
인용정보 피인용 횟수 : 306  인용 특허 : 0

초록

A method for delegating authorization from one entity in a distributed computing system to another for a computing session is disclosed wherein a session public/private encryption key pair is utilized for each computing session. The private encryption key is erased to terminate the computing session

대표청구항

A workstation in a distributed computing system comprising: (a) means for receiving a nonce challenge from a first entity in the distributed system; (b) means for generating a public and private encryption key pair in response to the received challenge; (c) means for issuing a response to the first

이 특허를 인용한 특허 (306)

  1. Brickell Ernest F. ; Sudia Frank W. ; Kravitz David William ; Freund Peter C. ; Angeles Patrick J., Adaptive multi-step digital signature system and method of operation thereof.
  2. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  3. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  4. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  5. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  6. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  7. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  8. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  9. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  10. Crews, Tim; Edwards, Judith; Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert; Crallie, Charles E., Apparatus and method for verifying components of an ATM.
  11. Makoto Saito JP, Apparatus for data copyright management system.
  12. Makoto Saito JP, Apparatus for data copyright management system.
  13. Saito Makoto,JPX, Apparatus for data copyright management system.
  14. Saito Makoto,JPX ; Momiki Shunichi,JPX, Apparatus for data copyright management system.
  15. Saito, Makoto, Apparatus for data copyright management system.
  16. Ben-Itzhak, Yuval, Application layer security method and system.
  17. Ben Itzhak,Yuval, Application-layer security method and system.
  18. Pettus Christopher E. (San Francisco CA), Authentication of users with dynamically configurable protocol stack.
  19. Corella,Francisco, Authorization infrastructure based on public key cryptography.
  20. Doland, Anne E.; McGinley, Joseph A.; Konecny, Robert J.; Crallie, Charles E.; Edwards, Judith; Crews, Tim, Automated banking machine that operates responsive to data bearing records.
  21. Greco, Paul M.; Jaquette, Glen A., Automated data storage library with target of opportunity recognition.
  22. Greco, Paul Merrill; Jaquette, Glen Alan, Automated data storage library with target of opportunity recognition.
  23. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  24. Anderson,Anne H.; Devaraj,Balasubramanian, Automated policy constraint matching for computing resources.
  25. Hsu Yung-Kao ; Seymour Stephen, Certification process.
  26. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  27. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  28. Leyland,Paul Christopher; Needham,Roger Michael, Collapsing chained credentials.
  29. Kunzelman Kevin ; Hutto Sterling, Common session token system and protocol.
  30. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  31. Stefik,Mark J., Content rendering device with usage rights.
  32. Saito, Makoto, Controlling database copyrights.
  33. Saito, Makoto, Controlling database copyrights.
  34. Saito, Makoto, Controlling database copyrights.
  35. Saito, Makoto, Data copyright management.
  36. Saito, Makoto, Data copyright management.
  37. Makoto Saito JP, Data copyright management system.
  38. Saito Makoto,JPX, Data copyright management system.
  39. Saito, Makoto, Data copyright management system.
  40. Saito, Makoto, Data copyright management system.
  41. Saito,Makoto, Data copyright management system.
  42. Saito, Makoto, Data management.
  43. Saito Makoto,JPX, Data management system.
  44. Saito, Makoto, Data management system.
  45. Saito, Makoto, Data management system.
  46. Saito, Makoto, Data management system.
  47. Saito, Makoto, Data management system.
  48. Saito, Makoto, Data management system.
  49. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  50. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  51. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  52. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  53. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  54. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  55. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  56. Greco, Paul M.; Jaquette, Glen A., Data storage drive with target of opportunity recognition.
  57. Greco, Paul Merrill; Jaquette, Glen Alan, Data storage drive with target of opportunity recognition.
  58. Brickell,Ernie F.; Deklotz,Wesley; Glover,Jeff U.; Premi,Michael R.; Wood,Matthew D.; Shimoda,Marion H., Delegating digital credentials.
  59. Dillaway, Blair Brewster; LaMacchia, Brian; Paramasivam, Muthukrishnan; Rose, III, Charles F.; Pandya, Ravindra Nath, Delegating right to access resource or the like in access management system.
  60. Carter, Stephen R.; Nevarez, Carlos A., Deputization in a distributed computing system.
  61. Carter, Stephen R; Nevarez, Carlos A, Deputization in a distributed computing system.
  62. Hoffberg, Steven M., Detection and alert of automobile braking event.
  63. Kaufman Charles W. ; Matyas ; Jr. Stephen M., Differential work factor cryptography method and system.
  64. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  65. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  66. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  67. Saito, Makoto, Digital content management system and apparatus.
  68. Saito, Makoto, Digital content management system and apparatus.
  69. Saito, Makoto, Digital content management system and apparatus.
  70. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  71. Brickell, Ernie F.; Deklotz, Wesley, Digital credential usage reporting.
  72. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  73. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  74. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  75. Albanese Andres ; Oppliger Rolf,CHX, Distributed registration and key distribution system and method.
  76. Girard,Pierre; Giraud,Jean Luc, Dynamic management of access rights lists in a portable electronic object.
  77. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  78. Benson Glenn Stuart,DEX, Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software.
  79. Bruwer Frederick Johannes,ZAX ; Smit Willem,ZAX ; Kuhn Gideon Jacobus,ZAX, Encoder and decoder microchips and remote control devices for secure unidirectional communication.
  80. Barber-Mingo, Cynthia E.; Denne, Arno; Harpur, Liam S.; Kennedy, John; Prendergast, Paula, Event triggered notifications for collaborative processes.
  81. Barber-Mingo, Cynthia E.; Denne, Arno; Harpur, Liam S.; Kennedy, John; Prendergast, Paula, Event triggered notifications for collaborative processes.
  82. Samar,Vipin, Facilitating single sign-on by using authenticated code to access a password store.
  83. Hoffberg, Steven M., Game theoretic prioritization system and method.
  84. Hopkins,Dale W.; Collins,Thomas W.; Wierenga,Steven W., Group signature generation system using multiple primes.
  85. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  86. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  87. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  88. Valente, Luis, Hierarchical open security information delegation and acquisition.
  89. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  90. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  91. Shimamura, Katsuya, Key pair management method and image forming device.
  92. Modi, Prashant; Hampton, Kathryn, Key-configured topology with connection management.
  93. Corella, Francisco, Lightweight public key infrastructure employing disposable certificates.
  94. Corella,Francisco, Lightweight public key infrastructure employing unsigned certificates.
  95. Brickell,Erine F.; Deklotz,Wesley, Managed authentication service.
  96. Roskind, James A., Master key trust grants and revocations for minor keys.
  97. Roskind, James A., Master key trust grants and revocations for minor keys.
  98. Nguyen, Kim, Method and apparatus for accessing an electronic device by a data terminal.
  99. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  100. Donald Fred Ault ; John Carr Dayka ; Eric Charles Finkelstein AU; Richard Henry Guski, Method and apparatus for controlling server access to a resource in a client/server system.
  101. Dolan Donald T. ; French Dale A. ; Lawton Kathryn V., Method and apparatus for ensuring debiting in a postage meter prior to its printing a postal indicia.
  102. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  103. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  104. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  105. Corella, Francisco, Method and apparatus for providing field confidentiality in digital certificates.
  106. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  107. Duke,Andrew; Stephens,George, Method and apparatus for storing and updating information in a multi-cast system.
  108. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  109. Van Oorschot Paul C.,CAX ; Wiener Michael J.,CAX ; Curry Ian,CAX, Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths.
  110. Montgomery,David, Method and apparatus improving efficiency of end-user certificate validation.
  111. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  112. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  113. Kugai, Masami, Method and system for authenticating user and providing service.
  114. Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
  115. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  116. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  117. Bailey,Ronn H., Method and system for detecting and preventing an intrusion in multiple platform computing environments.
  118. Elley, Yassir K.; Anderson, Anne H.; Hanna, Stephen R.; Mullan, Sean J.; Perlman, Radia J., Method and system for dynamic issuance of group certificates.
  119. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  120. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  121. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Method and system for providing certificates holding authentication and authorization information for users/machines.
  122. Basso ; Jr. Micheal R. ; Lee Joonho ; Li Chunhua, Method and system for providing controlled access to information stored on a portable recording medium.
  123. Elley,Yassir K.; Anderson,Anne H.; Hanna,Stephen R.; Mullan,Sean J.; Perlman,Radia J., Method and system for proving membership in a nested group using chains of credentials.
  124. Elley,Yassir K.; Anderson,Anne H.; Hanna,Stephen R.; Mullan,Sean J.; Perlman,Radia Joy, Method ans system for pro-active credential refreshing.
  125. Saito, Makoto, Method for controlling database copyrights.
  126. Saito,Makoto, Method for controlling database copyrights.
  127. Saito,Makoto, Method for controlling database copyrights.
  128. Saito,Makoto, Method for controlling database copyrights.
  129. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  130. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  131. Spagna, Richard L.; Rettig, Paul R.; Rodgers, Jeremy; Best, Arthur; Best, II, Arthur R., Method for determining internet users geographic region.
  132. Rankl,Wolfgang, Method for exchanging at least one secret initial value between a processing station and a chip card.
  133. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  134. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  135. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  136. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  137. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  138. Sudama Ram (Hudson MA) Griffin David M. (Maynard MA) Johnson Brad (Westerly RI) Sealy Dexter (Boston MA) Shelhamer James (Maynard MA) Tallman Owen H. (Lunenburg MA), Method for providing a security facility for a network of management servers utilizing a database of trust relations to.
  139. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  140. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  141. Bruwer, Frederick Johannes, Method of and apparatus for transferring data.
  142. Ernest F. Brickell, Method of changing key fragments in a multi-step digital signature system.
  143. Bruwer,Frederick, Method of communication using an encoder microchip and a decoder microchip.
  144. Bathrick Erwin W. ; Garber John W. ; Huang Cheng-Chi ; Kung Kenneth C. ; Matthews Todd E. ; Zmuda James E. ; Matthews Regina L., Method of protected distribution of keying and certificate material.
  145. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  146. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  147. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  148. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  149. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  150. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  151. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  152. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  153. Bruwer Frederick, Microchips and remote control devices comprising same.
  154. Hoffberg, Steven M., Mobile communication device.
  155. Son, Kyoung-ho; Yook, Hyun-gyoo; Lee, Sung-Min; Oh, Seung-Jae; Han, Se-Hee, Mode-based access control method and device.
  156. Son, Kyoung-ho; Yook, Hyun-gyoo; Lee, Sung-min; Oh, Seung-jae; Han, Se-hee, Mode-based access control method and device.
  157. Runte Richard M. ; Hubbard Henry ; Dennert R. Bruce, Motorcycle rocker assembly.
  158. Sudia Frank W. ; Freund Peter C. ; Huang Stuart T. F., Multi-step digital signature method and system.
  159. Sudia Frank W. ; Freund Peter C. ; Huang Stuart T.F., Multi-step digital signature method and system.
  160. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  161. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  162. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  163. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  164. Dircks, Charles E.; Osmann, Eric E., Network provider loop security system and method.
  165. Kawamoto, Yoji; Hidaka, Isao; Tsunoda, Tomohiro, Network system including a terminal device capable of registering with a server.
  166. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  167. Frankel Yair ; Yung Marcel M., Optimal-resilience, proactive, public-key cryptographic system and method.
  168. Martin Euchner DE; Volker Kessler DE, Process for cryptographic code management between a first computer unit and a second computer unit.
  169. Euchner Martin,DEX ; Klasen Wolfgang,DEX ; Kessler Volker,DEX, Process for group-based cryptographic code management between a first computer unit and group computer units.
  170. Guski, Richard H.; Hahn, Timothy J., Public key infrastructure delegation.
  171. Corella,Francisco, Public key validation service.
  172. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  173. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  174. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  175. Waggamon Dennis W. ; Marneweck Willem J. ; Delport Vivien N. ; Bruwer Frederick J., Remote controlled garage door opening system.
  176. Waggamon, Dennis W.; Marneweck, Willem J.; Delport, Vivien N.; Bruwer, Frederick J., Remote controlled garage door opening system.
  177. Farris Bradford L. ; Fitzgibbon James J., Rolling code security system.
  178. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  179. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  180. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  181. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  182. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  183. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  184. Farris,Bradford L.; Fitzgibbon,James J., Rolling code security system.
  185. Farris,Bradford L.; Fitzgibbon,James J., Rolling code security system.
  186. Fitzgibbon,James J., Rolling code security system.
  187. Robert Shaw, Secure data downloading, recovery and upgrading.
  188. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  189. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  190. Bruwer Frederick, Secure self learning system.
  191. Bruwer Frederick Johannes (Montana ZAX), Secure self learning system.
  192. Bruwer Frederick Johannes,ZAX, Secure self learning system.
  193. Rosen, Sholom S., Security systems and methods applicable to an electronic monetary system.
  194. Garg, Praerit; Dyke, Cliff Van; Jaganathan, Karthik; Pustilnik, Mark; Schmidt, Donald E., Selective cross-realm authentication.
  195. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  196. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  197. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  198. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  199. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  200. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  201. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  202. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  203. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  204. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  205. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  206. Hoffberg, Steven M., System and method for determining contingent relevance.
  207. Brown, Michael K.; Adams, Neil P.; Little, Herbert A., System and method for encrypted smart card PIN entry.
  208. Brown, Michael K.; Adams, Neil P.; Little, Herbert A., System and method for encrypted smart card pin entry.
  209. Brown, Michael Kenneth; Adams, Neil Patrick; Little, Herbert Anthony, System and method for encrypted smart card pin entry.
  210. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition.
  211. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  212. Premkumar V. Uppaluru, System and method for providing and using universally accessible voice and speech data files.
  213. Uppaluru Premkumar V., System and method for providing and using universally accessible voice and speech data files.
  214. Uppaluru, Premkumar V., System and method for providing and using universally accessible voice and speech data files.
  215. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  216. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  217. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  218. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  219. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  220. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  221. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  222. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  223. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  224. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  225. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  226. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  227. Miyazaki,Shingo; Endo,Naoki; Kato,Takehisa; Yoshii,Daigo; Noguchi,Koichi; Shimizu,Hideo; Kambayashi,Toru; Suzuki,Yasuhiko; Okazaki,Akio; Hiramatsu,Kenichi; Wada,Sunao; Mikami,Koji; Toshima,Akira; Suga,Masao; Kasahara,Akihiro, System of authentication, apparatus, program and method.
  228. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  229. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  230. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  231. Eastham, W. Bryant; Simister, James L., Systems and methods for determining a time delay for sending a key update request.
  232. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  233. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  234. Goldberg, Andrew V.; Hartline, Jason D.; Wright, Andrew K., Systems and methods for pricing and selling digital goods.
  235. Goldberg,Andrew V.; Hartline,Jason D.; Wright,Andrew K., Systems and methods for pricing and selling digital goods.
  236. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  237. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  238. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  239. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  240. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  241. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  242. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  243. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  244. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  245. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  246. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  247. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  248. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  249. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  250. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  251. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  252. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  253. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  254. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  255. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  256. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  257. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  258. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  259. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  260. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  261. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  262. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  263. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  264. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  265. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  266. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  267. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  268. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  269. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  270. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  271. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  272. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  273. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  274. Sibert, W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  275. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  276. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  277. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  278. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  279. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  280. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  281. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  282. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  283. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  284. Greco, Paul Merrill; Jaquette, Glen Alan, Target of opportunity in an automated data storage library.
  285. Greco, Paul Merrill; Jaquette, Glen Alan, Target of opportunity recognition during an encryption related process.
  286. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  287. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  288. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  289. Wesley Joseph S. ; Chiu Dah Ming ; Kadansky Miriam C. ; Hurst Stephen A. ; Perlman Radia J. ; Provino Joseph E. ; Rosenzweig Philip M., Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority.
  290. Roskind,James A., Trust grant and revocation from a master key to secondary keys.
  291. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  292. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  293. Xiao, Sihai, Trust information delivery scheme for certificate validation.
  294. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  295. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  296. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  297. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  298. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  299. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  300. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  301. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  302. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  303. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  304. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  305. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  306. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로