$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Data enclave and trusted path system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/02
출원번호 US-0870556 (1992-04-17)
발명자 / 주소
  • Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN)
출원인 / 주소
  • Secure Computing Corporation (Roseville MN 02)
인용정보 피인용 횟수 : 401  인용 특허 : 0

초록

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user\s Workstation. The com

대표청구항

A data enclave for securing data carried on physical units of fixed and removable media in a network including a server and one or more workstations, one or more of the workstations including the physical units of fixed media, comprising: protected storage in the server and in each of the workstatio

이 특허를 인용한 특허 (401)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  9. Larson,Victor; Short, III,Robert Dunham; Munger,Edmund Colby; Williamson,Michael, Agile network protocol for secure communications using secure domain names.
  10. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  11. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  12. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  13. Munger,Edmund Colby; Sabio,Vincent J.; Short, III,Robert Dunham; Gligor,Virgil D.; Schmidt,Douglas Charles, Agile network protocol for secure communications with assured system availability.
  14. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  15. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  16. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  17. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  18. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  19. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  20. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  21. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  22. Mark Andrew R., Auto-dialer housing.
  23. Stockwell Edward B. ; Boebert William E. ; Vanyo Heidi A., Binary filter using pattern recognition.
  24. Lovrien, Kurt A.; Martinez, Richard K.; Omoniyi, Oladimeji O.; Ward, Matthew J., Communication between key manager and storage subsystem kernal via management console.
  25. Lovrien, Kurt A.; Martinez, Richard K.; Omoniyi, Oladimeji O.; Ward, Matthew J., Communication between key manager and storage subsystem kernel via management console.
  26. Lovrien, Kurt A.; Martinez, Richard K.; Omoniyi, Oladimeji O.; Ward, Matthew J., Communication between key manager and storage subsystem kernel via management console.
  27. Anderson, Mark Stephen; Yesberg, John Desborough; Marriott, Damian; Nayda, Lisa; Hayman, Ken; Stevens, Malcolm; Beahan, Brendan, Communications security and trusted path method and means.
  28. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  29. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  30. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  31. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  32. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  33. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  34. Stefik,Mark J., Content rendering device with usage rights.
  35. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  36. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  37. Follendore ; III Roy D., Cryptographic access and labeling system.
  38. Tochikubo,Kouya; Endoh,Naoki, Cryptographic communication terminal, cryptographic communication center apparatus, cryptographic communication system, and storage medium.
  39. Klemba Keith ; Merkling Roger, Cryptographic unit touch point logic.
  40. Lee, Peter; Mehra, Vinod; Woollen, Rob, Customizing enterprise level business information networking.
  41. Barday, Kabir A., Data processing and communications systems and methods for the efficient implementation of privacy by design.
  42. Barday, Kabir A., Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments.
  43. Barday, Kabir A., Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments.
  44. Barday, Kabir A., Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design.
  45. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design.
  46. Barday, Kabir A., Data processing systems and methods for efficiently assessing the risk of privacy campaigns.
  47. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems and methods for efficiently assessing the risk of privacy campaigns.
  48. Barday, Kabir A., Data processing systems and methods for generating personal data inventories for organizations and other entities.
  49. Barday, Kabir A., Data processing systems and methods for implementing audit schedules for privacy campaigns.
  50. Barday, Kabir A., Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design.
  51. Barday, Kabir A., Data processing systems and methods for operationalizing privacy compliance and assessing the risk of various respective privacy campaigns.
  52. Barday, Kabir A., Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications.
  53. Barday, Kabir A., Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications.
  54. Barday, Kabir A., Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance.
  55. Barday, Kabir A., Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance.
  56. Barday, Kabir A.; Sabourin, Jason L.; Brannon, Jonathan Blake; Karanjkar, Mihir S.; Jones, Kevin, Data processing systems for fulfilling data subject access requests and related methods.
  57. Barday, Kabir A.; Karanjkar, Mihir S.; Finch, Steven W.; Browne, Ken A.; Heard, Nathan W.; Patel, Aakash H.; Sabourin, Jason L.; Daniel, Richard L.; Patton-Kuhl, Dylan D.; Brannon, Jonathan Blake, Data processing systems for generating and populating a data inventory.
  58. Barday, Kabir A.; Karanjkar, Mihir S.; Finch, Steven W.; Browne, Ken A.; Heard, Nathan W.; Patel, Aakash H.; Sabourin, Jason L.; Daniel, Richard L.; Patton-Kuhl, Dylan D.; Brannon, Jonathan Blake, Data processing systems for generating and populating a data inventory for processing data access requests.
  59. Beaumont, Richard; Mannix, John; Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems for identifying whether cookies contain personally identifying information.
  60. Barday, Kabir A., Data processing systems for measuring privacy maturity within an organization.
  61. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems for measuring privacy maturity within an organization.
  62. Barday, Kabir A., Data processing systems for modifying privacy campaign data via electronic messaging systems.
  63. Barday, Kabir A.; Brannon, Jonathan Blake, Data processing systems for modifying privacy campaign data via electronic messaging systems.
  64. Barday, Kabir A.; Sabourin, Jason L.; Brannon, Jonathan Blake; Karanjkar, Mihir S.; Jones, Kevin, Data processing systems for prioritizing data subject access requests for fulfillment and related methods.
  65. Beaumont, Richard; Mannix, John, Data processing systems for tracking reputational risk via scanning and registry lookup.
  66. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  67. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  68. Kang,En Seung; Byun,Jin Young, Digital content cryptograph and process.
  69. Rowe, Richard E., Digital identification of unique game characteristics.
  70. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  71. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  72. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  73. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  74. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  75. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  76. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  77. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  78. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  79. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  80. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  81. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  82. van der Horst, Timothy W.; Seamons, Kent Eldon, Encrypted email based upon trusted overlays.
  83. Schwartzman Nikolai L., Encryption key system and method.
  84. Latham Daren Wayne ; Gooderum Mark P. ; Andreas Glenn, Enhanced security network time synchronization device and method.
  85. Munger,Edward Colby; Short, III,Robert Dunham; Larson,Victor; Williamson,Michael, Establishment of a secure communication link based on a domain name service (DNS) request.
  86. Matthews, Brian L.; Olechowski, Scott; Ullman, Cayce M., Fallback key retrieval.
  87. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  88. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  89. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  90. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  91. Brookner, George M.; Frey, Lorenz R., Generation and management of customer pin's.
  92. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  93. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  94. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  95. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  96. Rossmann, Alain, Hybrid systems for securing digital assets.
  97. Mark Andrew R., Information storage device for storing personal identification information.
  98. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  99. Daniel Wayne Bertram ; David Paul Dutcher ; Scott Alan Lenharth ; James Michael Rolette, Jr. ; Stanley Alan Smith ; Courtney Joseph Spooner, Management of authentication discovery policy in a computer network.
  100. Kelly, Tadhg; Snook, Don; McPherson, James; Sung, Wai Kong, Management system for distributed out-of-band security databases.
  101. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  102. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  103. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  104. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  105. Kotzin,Michael D., Method and apparatus for communicating information by splitting information among a plurality of proximal units.
  106. Matt,Brian J., Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique.
  107. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  108. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  109. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  110. Dawson Bryan J., Method and apparatus for dynamically controlling a remote system's access to shared applications on a host system.
  111. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  112. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  113. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  114. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  115. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  116. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  117. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  118. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  119. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  120. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  121. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for password based authentication in a distributed system.
  122. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  123. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  124. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  125. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  126. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  127. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  128. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  129. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  130. Mark Andrew R. (205 W. End Ave. New York NY 10023), Method and apparatus for the secure communication of data.
  131. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  132. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  133. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  134. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  135. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  136. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  137. Dhanakshirur, Girish; Garrabrant, Jason; Otte, Andrew; Schoonmaker, Melissa, Method and apparatus to implement secured, layered logout from a computer system.
  138. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  139. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  140. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for authenticating a personal security device vis-��-vis at least one remote computer system.
  141. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for authentication through a communications pipe.
  142. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  143. Mark Andrew R., Method and system for compensating for signal deviations in tone signals over a transmission channel.
  144. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  145. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  146. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  147. Audebert, Yves Louis Gabriel; Clemot, Olivier, Method and system for establishing a communications pipe between a personal security device and a remote computer system.
  148. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  149. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  150. Mark Andrew R., Method and system for generation of tone signals over a transmission channel.
  151. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  152. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  153. Vainstein, Klimenty, Method and system for managing security tiers.
  154. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  155. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  156. Nath, Satyajit, Method and system for providing document retention using cryptography.
  157. Nath, Satyajit, Method and system for providing document retention using cryptography.
  158. Dennis, Gary J., Method and system for publishing an electronic file attached to an electronic message.
  159. Dennis, Gary J., Method and system for publishing an electronic file attached to an electronic message.
  160. Audebert, Yves Louis Gabriel; Clemot, Olivier, Method and system for remote activation and management of personal security devices.
  161. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for remote management of personal security devices.
  162. Audebert,Yves Louis Gabriel; Clemot,Olivier, Method and system for scripting commands and data for use by a personal security device.
  163. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  164. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  165. Lao, Guillermo, Method and system for subscription digital rights management.
  166. Lao, Guillermo, Method and system for subscription digital rights management.
  167. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  168. Mark Andrew R., Method and system for the secure communication of data.
  169. Gitelman, Alex, Method and system for updating a filter logic expression representing a boolean filter.
  170. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  171. Sigaud, Alain, Method enabling secure access by a station to at least one server, and device using same.
  172. Howard Shelton Lambert GB; James Ronald Lewis Orchard GB, Method for controlling access to electronically provided services and system for implementing such method.
  173. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  174. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  175. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  176. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  177. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  178. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  179. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  180. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  181. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  182. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  183. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  184. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  185. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  186. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  187. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  188. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  189. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  190. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  191. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  192. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  193. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  194. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  195. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  196. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  197. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  198. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  199. van der Horst, Timothy; Seamons, Kent, Multi-channel user authentication apparatus system and method.
  200. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  201. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  202. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  203. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  204. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  205. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  206. Matthews, Brian L; Olechowski, Scott; Ullman, Cayce M, Multiple password documents.
  207. Overton, John K.; Bailey, Stephen W., Network distributed tracking wire transfer protocol.
  208. Friedman Aharon ; Bozoki Eva, Network security device.
  209. Angert Joseph C., Pad encryption method and software.
  210. Johnson William C. (Los Angeles CA) Marx Donald L. (Redondo Beach CA), Personal access management system.
  211. Johnson William Cedric (Los Angeles CA) Marx Donald L. (Redondo Beach CA), Personal access management system.
  212. Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Personal access management system.
  213. Johnson William Cedric (Los Angeles CA) McMullen Charles C. (Colorado Springs CO), Personal access management system.
  214. Johnson William Cedric ; Marx Donald L., Personal access management systems.
  215. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  216. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  217. Pascal Thoniel,FRX ; Thierry Cottreau,FRX, Process and authentication device for secured authentication between two terminals.
  218. Mizuno, Fumio; Isogai, Seiji; Watanabe, Kenji; Yoshitake, Yasuhiro; Asakawa, Terushige; Ohyama, Yuichi; Sugimoto, Hidekuni; Ishikawa, Seiji; Shiba, Masataka; Nakazato, Jun; Ariga, Makoto; Yokouchi, T, Process control system.
  219. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  220. Girard, Luke E., Protection of laptop computers from theft in the stream of commerce.
  221. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  222. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  223. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  224. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  225. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  226. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  227. Sugiyama, Koichi; Sakamoto, Etsurou, Recording medium and apparatus for protecting copyrighted digital data.
  228. Sugiyama,Koichi; Sakamoto,Etsurou, Recording medium and apparatus for protecting copyrighted digital data.
  229. Sugiyama,Koichi; Sakamoto,Etsurou, Recording medium and apparatus for protecting copyrighted digital data.
  230. Sugiyama,Koichi; Sakamoto,Etsurou, Recording medium and apparatus for protecting copyrighted digital data.
  231. Sugiyama,Koichi; Sakamoto,Etsurou, Recording medium and apparatus for protecting copyrighted digital data.
  232. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  233. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  234. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  235. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  236. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Secure delivery of information in a network.
  237. Chakrabarti, Somnath; Vij, Mona; Rozas, Carlos V.; Baker, Brandon; Scarlata, Vincent R.; McKeen, Francis X.; Johnson, Simon P., Secure domain manager.
  238. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  239. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  240. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  241. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  242. Garcia,Denis Jacques Paul, Secured data format for access control.
  243. Lee, Peter; Mehra, Vinod; Woollen, Rob, Security in enterprise level business information networking.
  244. Nguyen-Thai Binh,FRX ; Girault Marc,FRX ; Millan Bruno,FRX, Security protected system for interconnection of local networks via a public transmission network.
  245. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  246. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  247. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  248. Fieres Helmut ; Merckling Roger ; Klemba Keith, Software level touchpoints for an international cryptography frameworks.
  249. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  250. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  251. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  252. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  253. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  254. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  255. Togawa, Yoshifusa; Miyamoto, Takayuki; Ando, Kuriko, Storage device having function for coping with computer virus.
  256. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Storage medium for preventing an illegal use by a third party.
  257. Hasebe Takayuki,JPX ; Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Storage medium for preventing an irregular use by a third party.
  258. Hasebe,Takayuki; Akiyama,Ryota; Yoshioka,Makoto, Storage medium for preventing an irregular use by a third party.
  259. Moffat, Darren J.; Belgaied, Kais; Sangster, Paul, System and computer readable medium for verifying access to signed ELF objects.
  260. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  261. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  262. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  263. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  264. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  265. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  266. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  267. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  268. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  269. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  270. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  271. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  272. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  273. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  274. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  275. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  276. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  277. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  278. Wang,Xin, System and method for document distribution.
  279. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  280. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  281. Audebert, Yves Louis Gabriel; Clemot, Olivier, System and method for establishing a remote connection over a network with a personal security device connected to a local client without using a local APDU interface or local cryptography.
  282. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  283. Overton, John; Roizen, Michael F., System and method for establishing and retrieving data based on global indices.
  284. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  285. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  286. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  287. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  288. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  289. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  290. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  291. Wang, Xin, System and method for protection of digital works.
  292. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  293. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  294. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  295. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  296. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  297. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  298. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  299. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  300. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  301. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  302. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  303. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  304. Mark Andrew R., System and method for selecting and generating telephone access numbers for limiting access to a telephone service.
  305. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  306. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  307. Wang,Xin, System and method for transferring the right to decode messages.
  308. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  309. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  310. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  311. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  312. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  313. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  314. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  315. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  316. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  317. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  318. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  319. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  320. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  321. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  322. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  323. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  324. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  325. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  326. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  327. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  328. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  329. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  330. Ripberger Richard A., System for providing access protection on media storage devices by selecting from a set of generated control parameters in accordance with application attributes.
  331. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  332. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  333. Foltz Richard C. ; Lin Sy Long ; Meegan John Vincent ; Wadood Syed Abdul, System for providing synchronization between a local area network and a distributing computer environment.
  334. Subrahmanyam Pasupathi Ananta, System for universal archival service where transfer is initiated by user or service and storing information at multiple.
  335. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  336. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  337. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  338. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  339. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  340. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  341. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  342. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  343. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  344. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  345. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  346. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  347. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  348. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  349. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  350. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  351. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  352. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  353. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  354. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  355. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  356. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  357. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  358. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  359. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  360. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  361. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  362. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  363. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  364. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  365. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  366. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  367. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  368. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  369. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  370. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  371. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  372. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  373. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  374. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  375. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  376. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  377. Johnson, Simon P.; Savagaonkar, Uday R.; Scarlata, Vincent R.; McKeen, Francis X.; Rozas, Carlos V., Technique for supporting multiple secure enclaves.
  378. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  379. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  380. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  381. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  382. Comlekoglu, Fatih, Trustable communities for a computer system.
  383. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  384. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  385. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  386. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  387. Comlekoglu, Fatih, Trusted enclave for a computer system.
  388. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  389. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  390. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  391. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  392. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  393. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  394. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  395. Boebert William E. ; Hanson Mark H. ; Markham Thomas R., Trusted path subsystem for workstations.
  396. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  397. Le Saint, Eric; Wen, Wu, Universal secure messaging for cryptographic modules.
  398. Wen, Wu; Le Saint, Eric F.; Becquart, Jerome Antoine Marie, Universal secure messaging for remote security tokens.
  399. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  400. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  401. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로