$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure computer interface 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0676885 (1991-03-28)
발명자 / 주소
  • Boerbert William E. (Minneapolis MN)
출원인 / 주소
  • Secure Computing Corporation (Arden Hills MN 02)
인용정보 피인용 횟수 : 122  인용 특허 : 5

초록

Communication elements for secure data communication between remote nodes of a computer system on a standard communications medium. Terminals, workstations and personal computers are connected through a user-side terminator to a standard unsecured communications medium. Processors are connected thro

대표청구항

A method of continual mutual authentication in communication over an unsecured communications medium between a data entry node, including a token reader, and a multi-level secure computer having a Secure Kernel, the method comprising the steps of: providing a user token which can be used to gain acc

이 특허에 인용된 특허 (5)

  1. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  2. Weiss Kenneth P. (7 Park Ave. Newton MA 02150), Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics.
  3. Atalla Martin M. (18 Monte Vista Ave. Atherton CA 94025) Hopkins Webster D. (2425 Rick Dr. Morgan Hill CA 95020), Multilevel security apparatus and method with personal key.
  4. Burger Wilhelm F. (Bethesda MD) Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD) Stokes Ellen J. (Liberty Hill TX), Remote trusted path mechanism for telnet.
  5. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.

이 특허를 인용한 특허 (122)

  1. Candelore Brant, Anti-tamper bond wire shield for an integrated circuit.
  2. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  8. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  9. Jun Kamada JP; Yasutsugu Kuroda JP; Etsuo Ono JP, Apparatus method and computer readable storage medium with recorded program for managing files with alteration preventing/detecting functions.
  10. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  11. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  12. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  13. Regev, Shmuel; Klein, Amit, Computer network cross-boundary protection.
  14. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  15. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  16. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  17. Woolston, Thomas G., Computer-implement method and system for conducting auctions on the internet.
  18. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  19. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with multiple independent levels of security.
  20. Redlich, Ron M.; Nemzow, Martin A., Data security system and with territorial, geographic and triggering event protocol.
  21. Michael E. See ; John W. Bailey ; Charles L. Panza ; Yuri Pikover ; Geoffrey C. Stone, Deterministic user authentication service for communication network.
  22. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C., Deterministic user authentication service for communication network.
  23. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C.; Goodwin, Michele Wright; Sangroniz, Robert Leon, Deterministic user authentication service for communication network.
  24. Schier,John E, Device, system, and method for capturing email borne viruses.
  25. Schwartzman Nikolai L., Encryption key system and method.
  26. Latham Daren Wayne ; Gooderum Mark P. ; Andreas Glenn, Enhanced security network time synchronization device and method.
  27. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  28. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  29. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  30. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  31. Wakai, Masanori; Suda, Aruna Rohra; Jeyachandran, Suresh, Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor.
  32. Woolston, Thomas G., Marketing goods with bar codes.
  33. Woolston, Thomas G., Marketplace payments.
  34. Jacobs, Stuart J.; Mannix, Jr., Francis Leo; Christoffel, Thomas William; Belgard, Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  35. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  36. Wettergren, Christian, Method and security system for processing a security critical activity.
  37. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  38. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  39. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  40. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  41. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  42. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  43. Woolston, Thomas G., Method and system for retrieving information regarding an item posted for sale.
  44. Lita,Christian; Vepstas,Linas, Method for client delegation of security to a proxy.
  45. Woolston, Thomas G., Method for facilitating commerce at an internet-based auction.
  46. M철dl,Albert; Stephan,Elmar; M체ller,Robert, Method, data carrier and system for authentication of a user and a terminal.
  47. Woolston, Thomas G., Methods and systems for searching for goods.
  48. Woolston, Thomas G., Methods and systems for searching for goods and services.
  49. Woolston, Thomas G., Methods and systems for searching for goods in a virtual marketplace.
  50. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  51. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  52. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  53. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  54. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  55. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  56. Hoffberg, Steven M., Multifactorial optimization system and method.
  57. Friedman Aharon ; Bozoki Eva, Network security device.
  58. Wagner, Richard Hiers, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
  59. Wagner, Richard Hiers, Open network system and method for I/O operations with non-standard I/O devices using an extended open network protocol.
  60. Angert Joseph C., Pad encryption method and software.
  61. Jakobsson, Bjorn Markus, Password check by decomposing password.
  62. Jakobsson, Bjorn Markus, Password check by decomposing password.
  63. Ozolins, Helmars E., Portable access device.
  64. Ozolins, Helmars E., Portable access device.
  65. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  66. Morisawa Toshikazu,JPX ; Yamaki Masayo,JPX ; Tsukada Hiroyuki,JPX ; Mamata Tohru,JPX ; Kawawa Tatsuya,JPX, Portable computer system having password control means for holding one or more passwords such that the passwords are un.
  67. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  68. Dickson, Bruce; Kaminsky, David Louis; Peters Stockton, Marcia Lambert, Protecting secret data entry from infrared and audio eavesdropping.
  69. Dickson, Bruce; Kaminsky, David Louis; Peters Stockton, Marcia Lambert, Protecting secret data entry from infrared and audio eavesdropping.
  70. Dickson,Bruce; Kaminsky,David Louis; Peters,Marcia Lambert, Protecting secret data entry from infrared and audio eavesdropping.
  71. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  72. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  73. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  74. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  75. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  76. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  77. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  78. Chen, Liqun; Harrison, Keith Alexander, Security method and apparatus using biometric data.
  79. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  80. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  81. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  82. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  83. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  84. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  85. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  86. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  87. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  88. Hoffberg, Steven M., System and method for determining contingent relevance.
  89. Wagner, Richard Hiers, System and method for enabling transactions between a web server and a smart card, telephone, or personal digital assistant over the internet.
  90. Wagner, Richard Hiers, System and method for enabling transactions between a web server and an automated teller machine over the internet.
  91. Ross Paul C., System and method for fingerprint data verification.
  92. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  93. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  94. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  95. Fujimori, Junichi, System and method for preventing unauthorized data copying using communication network.
  96. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  97. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  98. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  99. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  100. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  101. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  102. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  103. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  104. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  105. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  106. Wagner, Richard Hiers, System and method for transacting communication over an open network.
  107. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  108. Wagner, Richard Hiers, System for enabling smart card transactions to occur over the internet and associated method.
  109. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  110. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  111. Castell, William D.; Mousseau, Gary P.; Lazaridis, Mihal, System, method and mobile device for remote control of a voice mail system.
  112. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  113. Warner, Shannon L.; Black, Marc R.; Mellas, Lisa; Mazour, James L.; Viswanathan, Rajkumar; Salters, Michael D.; Berg, Glenda L.; Bailey, Ann Elizabeth; Greeder, Michael T., Systems and methods for providing a user incentive program using circuit chip technology.
  114. Warner, Shannon L; Black, Marc R; Mellas, Lisa; Mazour, James L; Viswanathan, Rajkumar; Salters, Michael D; Berg, Glenda L; Bailey, Ann Elizabeth; Greeder, Michael T, Systems and methods for providing a user incentive program using smart card technology.
  115. Hsing, Michael Chi-Pei; Yaung, Alan Tsu-I, Technique of password encryption and decryption for user authentication in a federated content management system.
  116. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  117. Pearson,Siani Lynne; Chen,Liqun, Trusted system.
  118. Bissell, Robert Andrew; Bosworth, Kevin Paul; Britnell, Michael John; Harding, Peter Maxwell; Hicks, Richard Middleton; Kingan, Jonathan James; Meyerstein, Michael Victor; Nolde, Keith Eric; Rabson, , User authentication in a communications network.
  119. Newton Farrell ; Williams Gareth, User identification and authentication system using ultra long identification keys and ultra large databases of identif.
  120. Harris, Scott C., Wireless network having multiple communication allowances.
  121. Harris,Scott C., Wireless network having multiple communication allowances.
  122. Joseph C. Kawan, Wireless transaction and information system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로