$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Access control subsystem and method for distributed computer system using locally cached authentication credentials 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0917767 (1992-07-21)
발명자 / 주소
  • Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA)
출원인 / 주소
  • Digital Equipment Corporation (Maynard MA 02)
인용정보 피인용 횟수 : 459  인용 특허 : 0

초록

A distributed computer system has a number of computers coupled thereto at distinct nodes. The computer at each node of the distributed system has a trusted computing base that includes an authentication agent for authenticating requests received from principals at other nodes in the system. Request

대표청구항

In a distributed computer system having a multiplicity of interconnected computers, security apparatus comprising: a plurality of processes, each process running on one of said multiplicity of computers, said plurality of processes including requester processes and server processes; secure channels

이 특허를 인용한 특허 (459)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Williams Charles S., Access control system and method using hierarchical arrangement of security devices.
  3. Watanave, Yuji; Numao, Masayuki; Yuriyama, Madoka; Dohmen, Keitaroh, Access management system, access administration apparatus, access administration program, access administration method, and recording medium.
  4. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  5. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  6. Bigus Joseph Phillip ; Cragun Brian John ; Delp Helen Roxlo, Apparatus and method for communicating between an intelligent agent and client computer process using disguised messages.
  7. Bigus Joseph Phillip ; Cragun Brian John ; Delp Helen Roxlo, Apparatus and method for optimizing the performance of computer tasks using multiple intelligent agents having varied degrees of domain knowledge.
  8. Alegre Alfred A. ; Sha Rong Q. ; Soley William R., Apparatus and method for providing trusted network security.
  9. Sriram, Tv; Kondapalli, Aswinikumar, Authenticated session replication.
  10. Isaacson, Scott Alan; Fritch, Daniel Gene; Henderson, Larry Hal; Crabb, Lynn Wells; Nyland, Jr., James Duane, Authentication cache and authentication on demand in a distributed network environment.
  11. Etchegoyen, Craig S., Authentication of computing and communications hardware.
  12. Isaacson,Scott A.; Fritch,Daniel G.; Henderson,Larry Hal; Crabb,Lynn W.; Nyland, Jr.,James D., Authentication on demand in a distributed network environment.
  13. Faruqi, Aziza; Ramanathan, Jayashree; Readshaw, Neil; Rich, Bruce, Authentication with credentials in Java messaging service.
  14. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, Authorizing administrative operations using a split knowledge protocol.
  15. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Cluster key synchronization.
  16. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  17. Bradee,Robert L., Computer security system.
  18. Kemper,Stefan, Computer security with local and remote authentication.
  19. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  20. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  21. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  22. Stefik,Mark J., Content rendering device with usage rights.
  23. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  24. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  25. Bramhill,Ian Duncan; Sims,Matthew Robert Charles, Copy protection of data.
  26. Bramhill,Ian Duncan; Sims,Matthew Robert Charles, Copy protection of data.
  27. Haramaty, Zachy; Kriss, Roy; Abramovich, Noam Katz; Elias, George; Ravid, Ran, Credit based flow control for long-haul links.
  28. Bojinov, Hristo; Plotkin, Serge; Wood, Robert, Data storage and/or retrieval.
  29. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  30. Brickell,Ernie F.; Deklotz,Wesley; Glover,Jeff U.; Premi,Michael R.; Wood,Matthew D.; Shimoda,Marion H., Delegating digital credentials.
  31. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  32. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  33. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  34. Etchegoyen, Craig S., Device authentication using device environment information.
  35. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  36. Rowe, Richard E., Digital identification of unique game characteristics.
  37. Rowe,Richard E., Digital identification of unique game characteristics.
  38. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  39. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  40. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  41. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  42. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  43. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  44. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  45. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  46. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  47. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  48. Mastors Robert N. ; Stillwell Michael J., Disconnected write authorization in a client/server computing system.
  49. Mizuno, Makio, Disk control unit.
  50. Mizuno,Makio, Disk control unit.
  51. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  52. Burnett Rodney Carlton ; Pehkonen Jean Elvira, Distributed file system translator with extended attribute support.
  53. Sussland, Robert J.; Silberman, Joshua Oran; Subramanian, Ananthan; Chang, Lawrence Wen-Hao, Distributed management of crypto module white lists.
  54. Galvin, Thomas A.; Copeland, Bruce W., Distributed services authorization management.
  55. Brassil John T. (Berkeley Heights NJ) Low Steven H. (Bridgewater NJ) Maxemchuk Nicholas F. (Mountainside NJ) O\Gorman Lawrence P. (Madison NJ), Document copying deterrent method using line and word shift techniques.
  56. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  57. Hirano,Hideyuki; Hashimoto,Shinji, Document distribution method and document management method.
  58. Berbec Robert R. ; Brady John L. ; Caffrey James M. ; Crimi Joanne T. ; Fenaroli Arthur P. ; Iatridis Matthew C. ; Puchkoff Gary S. ; Sanchez Roberto J. ; Whalen Madeline R. ; Williams Joseph A., Dynamic server-managed access control for a distributed file system.
  59. Alcorn Allan E. ; Barnett Michael ; Giacalone ; Jr. Louis D. ; Levinthal Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  60. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  61. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  62. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  63. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  64. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  65. Alcorn, Allan E.; Jenkins, Harry H., Electronic gaming apparatus having authentication data sets.
  66. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  67. Boesch Brian Paul ; Crocker Stephen David ; Eastlake ; III Donald Eggleston ; Hart ; Jr. Alden Sherburne ; Lindenberg Robert A. ; Paredes Denise Marie, Electronic transfer system and method.
  68. Plotkin, Serge; Avida, Dan, Encryption based security system for network storage.
  69. Plotkin, Serge; Avida, Dan, Encryption based security system for network storage.
  70. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  71. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  72. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  73. Martinek,Michael G.; Jackson,Mark D., Encryption in a secure computerized gaming system.
  74. Bukspan, Ido; Wertheim, Oded; Koren, Benny; Rabenstein, Itamar; Marelli, Amiad; Flint, Omri; Aharoni, Dror, End-to-end cache for network elements.
  75. Barr Adam D. ; Swift Michael M. ; Lenzmeier Charles T., Ensuring the integrity of remote boot client data.
  76. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  77. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  78. Cannon, Lee E., Gaming apparatus with encryption and method.
  79. Alcorn,Allan E.; Jenkins,Harry H., Gaming apparatus with portrait-mode display.
  80. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  81. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  82. Reiche Albert,CAX, HTTP distributed remote user authentication system.
  83. Harjanto, Dono; Davis, Bradley Craig, Hardware identity in multi-factor authentication at the application layer.
  84. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  85. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  86. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  87. Gandhasri, Rajamohan, Host based rekeying.
  88. Narasimhan, Srinivasan, Host entry synchronization.
  89. Narasimhan, Srinivasan; Hejmadi, Parthiv; Porwal, Vinod Kumar A., Host information collection.
  90. Narasimhan, Srinivasan; Hejmadi, Parthiv; Sreenath, Sheshadri, Host state monitoring.
  91. Etchegoyen, Craig Stephen, Identification of embedded system devices.
  92. Aoki, Yoshinori; Dohmen, Keitaroh; Numao, Masayuki; Watanabe, Yuji; Yuriyama, Madoka, Information acquisition enabled/disabled inspection system.
  93. Malcolm, Peter Bryan, Information management system.
  94. Malcolm, Peter Bryan, Information management system.
  95. Malcolm, Peter Bryan, Information management system.
  96. Malcolm, Peter Bryan, Information management system.
  97. Malcolm, Peter Bryan; Napier, John A.; Stickler, Andrew M.; Tamblin, Nathan J.; Beadle, Paul James O.; Crocker, Jason P., Information management system.
  98. Malcolm, Peter Bryan; Napier, John Anthony; Stickler, Andrew Mark; Tamblin, Natahan John; Beadle, Paul James Owen; Crocker, Jason Paul, Information management system.
  99. Malcolm, Peter Bryan; Napier, John Anthony; Stickler, Andrew Mark; Tamblin, Nathan John; Beadle, Paul James Owen; Crocker, Jason Paul, Information management system.
  100. Malcolm,Peter, Information management system.
  101. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  102. Joseph Phillip Bigus ; Brian John Cragun ; Helen Roxlo Delp, Intelligent agent with negotiation capability and method of negotiation therewith.
  103. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  104. Beck, Robert D.; Lewis, Scott B., Inter-object messaging.
  105. Beck, Robert D.; Lewis, Scott B., Inter-object messaging.
  106. Beck,Robert D.; Lewis,Scott B., Inter-object messaging.
  107. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  108. Garrison, John Michael; Skibbie, Donna E., Lightweight directory access protocol, (LDAP) trusted processing of unique identifiers.
  109. Alikhani, Kayvan, Local and remote verification.
  110. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  111. Brickell,Erine F.; Deklotz,Wesley, Managed authentication service.
  112. Buickel Larry Lee ; Godwin Debbie Ann ; Hamilton Howard Daniel ; Hansen Kathryn Isobel ; Harvey ; Jr. Charlie Buddy, Management of network distributed agents in a distributed computing environment.
  113. Ellis, John R.; Gifford, David K.; Treese, G. Winfield, Managing transfers of information in a communications network.
  114. Ellis, John R.; Gifford, David K.; Treese, G. Winfield, Managing transfers of information in a communications network.
  115. Ellis,John R.; Gifford,David K.; Treese,G. Winfield, Managing transfers of information in a communications network.
  116. Gensler, Jr.,Robert R.; Maerean,Serban C.; Parker, Jr.,Clarence B.; Suri,Hemant R., Mechanism independent cluster security services.
  117. Klug, John R., Media content notification via communications network.
  118. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  119. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  120. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  121. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  122. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  123. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  124. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  125. Liao, Hanqing; King, Peter F.; Greer, Russell S., Method and apparatus for caching credentials in proxy servers for wireless user agents.
  126. Donald Fred Ault ; John Carr Dayka ; Eric Charles Finkelstein AU; Richard Henry Guski, Method and apparatus for controlling server access to a resource in a client/server system.
  127. Carolan, Sean E.; Garrett, John W.; Kalmanek, Jr., Charles Robert; Nguyen, Han Q.; Ramakrishnan, Kadangode K., Method and apparatus for coordinating a change in service provider between a client and a server with identity based service access management.
  128. Carolan, Sean E.; Garrett, John W.; Kalmanek, Jr., Charles Robert; Nguyen, Han Q.; Ramakrishnan, Kadangode K., Method and apparatus for coordinating a change in service provider between a client and a server with identity based service access management.
  129. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  130. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  131. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  132. Rich Bruce Arland ; Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rosiles Mickella Ann ; Shi Shaw-Ben ; Burnett Rodney Carl, Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure acces.
  133. Marcu, Adrian R., Method and apparatus for encoding vouchers in a casino gaming system.
  134. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  135. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  136. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  137. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  138. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  139. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  140. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  141. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  142. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  143. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  144. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  145. Carley William J. ; Lyon James M. ; McCline Matthew C. ; Skarpelos Michael J., Method and apparatus for preventing inadvertent changes to system-critical files in a computing system.
  146. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  147. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  148. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  149. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  150. Pasieka,Michael S., Method and apparatus for revocation list management.
  151. Frank Richard ; Arun Gopalan ; Anderson Richard ; Mediouni Rabah ; Klein Stephen, Method and apparatus for selective data caching implemented with noncacheable and cacheable data for improved cache performance in a computer networking system.
  152. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  153. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  154. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  155. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  156. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  157. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  158. Bush, Steve; Jung, Edward; Knight, Holly, Method and system for account management.
  159. Glasser Daniel S. ; Reardon Thomas R. ; Ogus Aaron W. ; McKelvie Samuel J. ; Joy George, Method and system for adding a secure network server to an existing computer network.
  160. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  161. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  162. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  163. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  164. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  165. Smith Jeffrey C. ; Bandini Jean-Christophe, Method and system for dynamic server document encryption.
  166. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  167. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  168. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  169. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  170. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  171. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  172. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  173. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  174. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  175. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Method and system for providing certificates holding authentication and authorization information for users/machines.
  176. Lao, Guillermo, Method and system for subscription digital rights management.
  177. Lao, Guillermo, Method and system for subscription digital rights management.
  178. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  179. Shrader,Theodore Jack London; Cohen,Richard Jay, Method and system for web-based DCE management.
  180. Dujari, Rajeev; Wang, Biao; Hawkins, John M.; Rouskov, Yordan; Erdogan, Samim, Method and system of integrating third party authentication into internet browser code.
  181. Dujari,Rajeev; Wang,Biao; Hawkins,John M.; Rouskov,Yordan; Erdogan,Samim, Method and system of integrating third party authentication into internet browser code.
  182. Schull,Jonathan, Method for adapting a software product to an environment.
  183. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  184. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  185. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  186. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  187. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  188. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  189. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  190. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  191. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  192. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  193. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  194. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  195. Klug, John R.; Klug, Noah H., Method for providing node targeted content in an addressable network.
  196. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  197. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  198. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  199. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  200. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  201. Yoon Chang Woo,KRX ; Kim Young Hoon,KRX ; Kim Dae Ung,KRX, Method of authenticating and charging a client using a web infoshop service system.
  202. Felger, David, Method of billing a purchase made over a computer network.
  203. Felger, David, Method of billing a purchase made over a computer network.
  204. Felger, David, Method of billing a purchase made over a computer network.
  205. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  206. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  207. O'Toole, Jr.,James W., Methods and apparatus for providing security in a caching device.
  208. Alikhani, Kayvan, Methods and apparatus for rules-based multi-factor verification.
  209. Alikhani, Kayvan, Methods and apparatus for verification of a user at a first device based on input received from a second device.
  210. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  211. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  212. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  213. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  214. Runte Richard M. ; Hubbard Henry ; Dennert R. Bruce, Motorcycle rocker assembly.
  215. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  216. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  217. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  218. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  219. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  220. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  221. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  222. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,GBX, Multi-view personalized communications agent.
  223. Etchegoyen, Craig S., Network access protection.
  224. Thatcher, Jonathan; Maeckel, Clay, Network copy protection for database programs.
  225. Kudo, Yasuhiro; Miyazawa, Masafumi, Network device, information processing device, and computer readable storage medium therefor.
  226. Narasimhan, Srinivasan, Nonce generation.
  227. Bigus,Joseph Phillip; Cragun,Brian John; Delp,Helen Roxlo, Optimizing the performance of computer tasks using intelligent agent with multiple program modules having varied degrees of domain knowledge.
  228. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  229. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Peer to peer key synchronization.
  230. Malcolm, Peter Bryan, Persistent data storage for data files of application data.
  231. Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Personal access management system.
  232. Johnson William Cedric ; Marx Donald L., Personal access management systems.
  233. Davis, Derek L.; Herbert, Howard C., Platform and method for assuring integrity of trusted agent communications.
  234. Derek L. Davis ; Howard C. Herbert, Platform and method for assuring integrity of trusted agent communications.
  235. Grawrock, David W., Platform and method for securely transmitting an authorization secret.
  236. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  237. Olson,Erik B.; Zinda,Eric K., Prevention of software tampering.
  238. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  239. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  240. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  241. Narasimhan, Srinivasan, Probe election in failover configuration.
  242. Narasimhan, Srinivasan, Probe election in failover configuration.
  243. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  244. Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Kaplan, Keith; Kurien, Varugis; Marr, Michael David, Projection of trustworthiness from a trusted environment to an untrusted environment.
  245. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  246. Merkle Ralph C., Protected shareware.
  247. Plotkin, Serge; Bojinov, Hristo; Frandzel, Yuval; Narver, Andrew; Yang, Zi-Bin, Protocol translation.
  248. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  249. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  250. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  251. Etchegoyen, Craig S.; Harjanto, Dono, Registration and authentication of computing devices using a digital skeleton key.
  252. Etchegoyen, Craig S.; Harjanto, Dono, Registration and authentication of computing devices using a digital skeleton key.
  253. White Peter Duncan, Reliability enhanced processing system and method for optimizing.
  254. Hicks, Christian Bielefeldt; Creath, Peter Janssen, Remote authorization for unlocking electronic data system and method.
  255. Hicks,Christian Bielefeldt; Creath,Peter Janssen, Remote authorization for unlocking electronic data system and method.
  256. Harjanto, Dono; Etchegoyen, Craig S., Remote recognition of an association between remote devices.
  257. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  258. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  259. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  260. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  261. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  262. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  263. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  264. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  265. Boyle, Frank J.; Brunson, Gordon; Chavez, David; Durney, Stephen; Weber, Gregory, SIP signaling without constant re-authentication.
  266. Williams,Matthew, Saw blade case.
  267. Bereiter, Thomas W., Scaleable and extensible system management architecture with dataless endpoints.
  268. Caronni Germano,CHX ; Skrenta Rich ; Markson Tom ; Aziz Ashar,PKX, Scheme to allow two computers on a network to upgrade from a non-secured to a secured session.
  269. Guthery, Scott B.; Robinton, Mark; Davis, Michael Lawrence; Andresky, David, Secure Wiegand communications.
  270. Leach, Linda Karen; Koehler, Kristopher Lee, Secure access infrastructure.
  271. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure file system server architecture and methods.
  272. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Secure file system server architecture and methods.
  273. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  274. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  275. Davis, Michael; Andresky, David; Guthery, Scott B.; Robinton, Mark, Secure wiegand communications.
  276. Guthery, Scott B.; Robinton, Mark; Davis, Michael Lawrence; Andresky, David, Secure wiegand communications.
  277. Deo Umesh, Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems.
  278. Garg, Praerit; Dyke, Cliff Van; Jaganathan, Karthik; Pustilnik, Mark; Schmidt, Donald E., Selective cross-realm authentication.
  279. Hirota, Teruto; Tatebayashi, Makoto; Yugawa, Taihei; Minami, Masataka; Kozuka, Masayuki, Semiconductor memory card and data reading apparatus, and data reading/reproducing apparatus.
  280. Hirota, Teruto; Tatebayashi, Makoto; Yugawa, Taihei; Minami, Masataka; Kozuka, Masayuki, Semiconductor memory card and data reading apparatus, and data reading/reproducing apparatus.
  281. Field Scott ; Thomlinson Matthew W. ; Cooper Allan, Server verification of requesting clients.
  282. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  283. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  284. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  285. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  286. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  287. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  288. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  289. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  290. Benson, Greg; Franklin, Martin; Knauft, Christopher L., System and method for authenticating peer components.
  291. Schull,Jonathan, System and method for controlling access to protected information.
  292. Schull,Jonathan, System and method for creating and running protected information.
  293. Chawla, Rajeev; Framba, Marco; Talla, Venky; Speeter, Tom, System and method for delegating a user authentication process for a networked application to an authentication agent.
  294. Cooper, Geoffrey Howard; Diehl, David Frederick; Green, Michael W.; Ma, Robert, System and method for determining and using local reputations of users and hosts to protect information in a network environment.
  295. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  296. Schull, Jonathan, System and method for distributing protected information.
  297. Wang,Xin, System and method for document distribution.
  298. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  299. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, System and method for generating a single use password based on a challenge/response protocol.
  300. Subramanian, Ananthan; Chang, Lawrence Wen-Hao, System and method for initial key establishment using a split knowledge protocol.
  301. Alperovitch, Dmitri; Krasser, Sven, System and method for malware and network reputation correlation.
  302. Burns, Randal Chilton; Long, Darrell, System and method for managing authentication and coherency in a storage area network.
  303. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  304. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  305. Schull,Jonathan, System and method for operating a licensing server.
  306. Tolfmans, Joakim Bengt Lennart, System and method for parallel compression of a single data stream.
  307. Schull,Jonathan, System and method for processing protected audio information.
  308. Schull, Jonathan, System and method for processing protected text information.
  309. Schull,Jonathan, System and method for processing protected video information.
  310. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  311. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  312. Wang, Xin, System and method for protection of digital works.
  313. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  314. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  315. Hicks Christian Bielefeldt ; Creath Peter Janssen, System and method for remote authorization for unlocking electronic data.
  316. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  317. van Hoff Arthur A. ; Shaio Sami ; Hamilton Graham ; Mueller Marianne, System and method for secure peer-to-peer communication between downloaded programs.
  318. Shoemaker, Daniel D.; O'Donnell, Lee Thomas; Broder, James P.; Shoemaker, Scott D., System and method for secure reciprocal exchange of data.
  319. Shoemaker, Daniel D.; O'Donnell, Lee Thomas; Broder, James P.; Shoemaker, Scott D., System and method for secure reciprocal exchange of data.
  320. Shoemaker, Daniel D.; O'Donnell, Lee Thomas; Broder, James P.; Shoemaker, Scott D., System and method for secure reciprocal exchange of data.
  321. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  322. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  323. Schull,Jonathan, System and method for selling protected information in an oem context.
  324. Silberman, Joshua; Subramanian, Ananthan; Okushi, Fumiaki, System and method for signing a message to provide one-time approval to a plurality of parties.
  325. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  326. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  327. Kells Timothy Roger ; Peebles Thomas Frank, System and method for supporting distributed computing mechanisms in a local area network server environment.
  328. Wang,Xin, System and method for transferring the right to decode messages.
  329. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  330. Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for using a second resource to store a data element from a first resource in a first-in first-out queue.
  331. Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for using a second resource to store a data element from a first resource in a first-in first-out queue.
  332. Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for using a second resource to store a data element from a first resource in a first-in last-out stack.
  333. Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for using a second resource to store a data element from a first resource in a first-in last-out stack.
  334. Shah, Mehul K.; Lorenzo, Austin; Rodrigues, Ruchir; Bolduc, Paul; Anumala, Srinivas; Goyal, Vishnu, System and method for web services management.
  335. Davis,Michael; Hulusi,Tam, System and method of extending communications with the wiegand protocol.
  336. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  337. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  338. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  339. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  340. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  341. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  342. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  343. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  344. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  345. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  346. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  347. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  348. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  349. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  350. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  351. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  352. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  353. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  354. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  355. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  356. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  357. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  358. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  359. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  360. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  361. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  362. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  363. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  364. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for analyzing data from network-based structured message stream.
  365. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for auditing XML messages in a network-based message stream.
  366. Dick,Kevin Stewart; Rescorla,Eric Kenneth, System, method and computer program product for auditing XML messages in a network-based message stream.
  367. Dick, Kevin Stewart; Rescorla, Eric, System, method and computer program product for guaranteeing electronic transactions.
  368. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for guaranteeing electronic transactions.
  369. Dick, Kevin Stewart; Rescorla, Eric Kenneth, System, method and computer program product for providing an efficient trading market.
  370. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  371. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  372. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  373. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  374. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  375. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  376. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  377. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  378. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  379. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  380. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  381. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  382. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  383. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  384. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  385. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  386. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  387. Judge, Paul, Systems and methods for message threat management.
  388. Judge, Paul, Systems and methods for message threat management.
  389. Judge, Paul, Systems and methods for message threat management.
  390. Judge, Paul, Systems and methods for message threat management.
  391. Judge,Paul, Systems and methods for message threat management.
  392. Judge,Paul, Systems and methods for message threat management.
  393. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  394. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  395. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  396. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  397. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  398. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  399. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  400. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  401. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  402. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  403. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  404. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  405. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  406. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  407. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  408. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  409. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  410. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  411. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  412. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  413. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  414. Judge,Paul, Systems and methods for upstream threat pushback.
  415. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  416. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  417. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  418. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  419. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  420. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  421. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  422. Ellis,John R.; Gifford,David K.; Treese,G. Winfield, Transfers of information in a communications network.
  423. Kent Eldon Seamons ; William Hale Winsborough, Trust negotiation in a client/server data processing network using automatic incremental credential disclosure.
  424. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  425. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  426. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  427. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  428. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  429. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  430. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  431. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  432. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  433. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  434. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  435. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  436. Le Saint, Eric F.; Wen, Wu, Universal secure messaging for cryptographic modules.
  437. Le Saint, Eric; Wen, Wu, Universal secure messaging for cryptographic modules.
  438. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  439. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  440. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  441. Alikhani, Kayvan, Verification based on input comprising captured images, captured audio and tracked eye movement.
  442. Alikhani, Kayvan, Verification platform having interface adapted for communication with verification agent.
  443. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.
  444. Alikhani, Kayvan, Verifying requests to remove applications from a device.
  445. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  446. Shah, Mehul K.; Lorenzo, Austin; Rodrigues, Ruchir; Bolduc, Paul; Anumala, Srinivas; Goyal, Vishnu, Web services security system and method.
  447. Shrader Theodore Jack London ; Cohen Richard Jay, Web-based DCE management.
  448. Wells, William R.; Griswold, Chauncey W., Wide screen gaming apparatus.
  449. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  450. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  451. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  452. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  453. Klug John R. ; Peterson Thad D., World Wide Web registration information processing system.
  454. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  455. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  456. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  457. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  458. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  459. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로