$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for controlling group access to objects using group access control folder and group identification as individual 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0807685 (1991-12-16)
발명자 / 주소
  • Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 232  인용 특허 : 0

초록

A method and system for controlling access by groups of users to multiple objects stored within a data processing system implemented library wherein each object has an access list associated therewith explicitly listing individual users permitted access to that object. A group identification is esta

대표청구항

A method in a data processing system of controlling access by groups of users to a plurality of objects stored within a data processing system library service wherein each of said plurality of objects within said data processing system library service includes associated therewith an explicit list o

이 특허를 인용한 특허 (232)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  3. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Apparatus and method for configuring and editing a control system with live data.
  4. Yarom Yuval,ILX, Apparatus for and method of providing user exits on an operating system platform.
  5. Yarom Yuval,ILX, Apparatus for and method of providing user exits on an operating system platform.
  6. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Apparatus for control systems with objects that are associated with live data.
  7. Sweeney Christopher Lee ; Stodghill Scott A. ; DeShazer Kurt A. ; Marimuthu Aravindan, Application and database security and integrity system and method.
  8. Alimpich Claudia C. ; Goddard Joan Stagaman ; Neuhard Deborah Elizabeth ; Steinmeyer Cheryl ; Vo Minh Trong ; Wittig James Philip ; Yang Rachel Youngran, Application and method for creating a list from pre-defined and user values.
  9. DeBie, Tod, Applying multiple disposition schedules to documents.
  10. Botz, Patrick S.; Dayka, John C.; Dillenberger, Donna N.; Guski, Richard H.; Hahn, Timothy J.; LaBelle, Margaret K.; Nelson, Mark A., Authenticated identity propagation and translation within a multiple computing unit environment.
  11. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Authentication mechanisms to enable sharing personal information via a networked computer system.
  12. Corella,Francisco, Authorization infrastructure based on public key cryptography.
  13. Bradley, II, Charles B., Authorized data access based on the rights of a user and a location.
  14. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  15. Lei,Chon Hei; Wong,Daniel Manhung, Caching the results of security policy functions.
  16. Simonoff,Adam J., Collaborative development network for widely dispersed users and methods therefor.
  17. Lei,Chon Hei; Wong,Daniel Manhung; Keefe,Thomas; Edwards,Kristy Browder, Column masking of tables.
  18. Bachman, George E.; DeRemer, Robert A.; LeMert, Paul W.; Long, James C.; Weinrich, Steven M.; Wright, Julia, Component object model communication method for a control system.
  19. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  20. Robertson, Brian D.; Adams, Warren W., Computer services for assisting users in identifying contacts of their respective contacts.
  21. Chapman Sydney George,GBX ; Taylor Michael George,GBX, Control of access to a networked system.
  22. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Control system configurator and methods with edit selection.
  23. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Control system configurator and methods with object characteristic swapping.
  24. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Control systems and methods with composite blocks.
  25. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Control systems and methods with smart blocks.
  26. Eldridge, Keith; Mackay, Brian; Johnson, Mark; Volk, Scott; Burke, Kenneth A.; Meskonis, Paul; Hall, Robert; Dardinski, Steven, Control systems and methods with versioning.
  27. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  28. Montague David S. (Bellevue WA) Misra Pradyumna K. (Issaquah WA) Swift Michael M. (Bellevue WA), Controlling access to objects on multiple operating systems.
  29. Montague David S. ; Misra Pradyumna K. ; Swift Michael M. ; Reichel Robert P., Controlling access to objects on multiple operating systems.
  30. Elko, David A.; Goss, Steven N.; Jordan, Michael J.; Kurdt, Georgette L.; Nick, Jeffrey M.; Pushong, Kelly B.; Surman, David H., Controlling the state of duplexing of coupling facility structures.
  31. Elko, David A.; Goss, Steven N.; Jordan, Michael J.; Kurdt, Georgette L.; Nick, Jeffrey M.; Pushong, Kelly B.; Surman, David H., Controlling the state of duplexing of coupling facility structures.
  32. Elko, David A.; Goss, Steven N.; Jordan, Michael J.; Kurdt, Georgette L.; Nick, Jeffrey M.; Pushong, Kelly B.; Surman, David H., Controlling the state of duplexing of coupling facility structures.
  33. Elko, David A.; Goss, Steven N.; Jordan, Michael J.; Kurdt, Georgette L.; Nick, Jeffrey M.; Pushong, Kelly B.; Surman, David H., Controlling the state of duplexing of coupling facility structures.
  34. Kimmel, Gerald D.; Adamouski, Francis J.; Domangue, Ersin L.; Kimmel, Wayne R.; Lightburn, James G.; Viola, Leonard R., Cryptographic key management.
  35. Honda Yasuaki,JPX, Cyberspace system for accessing virtual reality objects.
  36. Jebens John H. ; Carlson Lowell D. ; James Jeffrey Scott, Data management and order delivery system.
  37. Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
  38. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  39. Lei, Chon Hei; McMahon, Douglas James, Database fine-grained access control.
  40. Lei,Chon Hei; McMahon,Douglas James, Database fine-grained access control.
  41. Mahajan Sameer S. ; Donahoo Michael J. ; Navathe Shamkant B. ; Ammar Mostafa H. ; McGeough Frank H. ; Malik Sanjoy, Database synchronization and organization system and method.
  42. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  43. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  44. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  45. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  46. Kagan, Harris D.; Hardin, David, Digital data processing apparatus and methods for improving plant performance.
  47. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  48. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  49. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  50. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  51. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  52. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  53. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information.
  54. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  55. Chua, Roy Liang; Convery, Sean Joseph; Pearce, Andrew Keith; Thusoo, Ashish, Distributed authentication, authorization and accounting.
  56. Patterson David M. ; Williams Eugene E., Distributed method of and system for maintaining application program security.
  57. Yamamoto,Yohei, Document management device and method, program therefor, and storage medium.
  58. Wong, Daniel Manhung; Lei, Chon Hei, Dynamic generation of optimizer hints.
  59. Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Wittig James Philip, Dynamically modifying a graphical user interface window title.
  60. Henry P. Vellandi, Electronic bookshelf with multi-user features.
  61. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  62. Kurokawa Takeshi,JPX, Electronic document management system.
  63. McCaughan Daniel Vincent,GBX ; Unitt Brian Michael,GBX ; Dean Robert John,GBX ; Kanabar Yashvant,GBX, Electronic sealed envelope.
  64. Farber, David A.; Lachman, Ronald D., Enforcement and policing of licensed content using content-based identifiers.
  65. Wong, Daniel Manhung; Lei, Chon Hei; Vissapragada, Rama, Enforcing data privacy aggregations.
  66. DeBie, Tod, File plan import and sync over multiple systems.
  67. Rose, Anthony, Filter for a distributed network.
  68. Rose, Anthony, Filter for a distributed network.
  69. Rose, Anthony, Filter for a distributed network.
  70. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  71. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  72. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  73. Goddard Joan Stagaman ; Vo Minh Trong, Graphical interface method, apparatus and application for creating and modifying a list of values with multiple compone.
  74. Almpich Claudia C. ; Goddard Joan Stagaman ; Vo Minh Trong ; Wittig James Philip ; Yang Rachel Youngran, Graphical interface method, apparatus and application for creating and modifying a multiple-value text list.
  75. Alimpich Claudia C. ; Goddard Joan Stagaman ; Vo Minh Trong ; Wittig James Philip ; Yang Rachel Youngran, Graphical interface method, apparatus and application for creating multiple value list from superset list.
  76. Alimpich Claudia C. ; Goddard Joan Stagaman ; Vo Minh Trong ; Wittig James Philip ; Yang Rachel Youngran, Graphical interface method, apparatus and application for opening window of all designated container objects.
  77. Alimpich Claudia ; Goddard Joan Stagaman ; Yang Rachel Youngran, Graphical interface method, apparatus and application for selection of target object.
  78. Malik,Dale W., Group access management system.
  79. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  80. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  81. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  82. Buzsaki George ; Godwin Clifford, Hierarchical protection of seed data.
  83. Betz, Linda; Dayka, John C.; Farrell, Walter B.; Guski, Richard H.; Karjoth, Guenter; Nelson, Mark A.; Pfitzmann, Birgit M.; Waidner, Michael P.; Schunter, Matthias, Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets.
  84. Betz,Linda; Dayka,John C.; Farrell,Walter B.; Guski,Richard H.; Karjoth,Guenter; Nelson,Mark A.; Pfitzmann,Birgit M.; Schunter,Matthias; Waidner,Michael P., Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets.
  85. Barkley John ; Cincotta Anthony V., Implementation of role/group permission association using object access type.
  86. Kashiwagi, Takaaki; Sekijima, Akifumi, Information processing apparatus, information processing method, computer readable medium, and computer data signal.
  87. Kimmel, Gerald D.; Domangue, Ersin L.; Adamouski, Francis J., Information-centric security.
  88. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  89. Swift Michael M., Least privilege via restricted tokens.
  90. Corella, Francisco, Lightweight public key infrastructure employing disposable certificates.
  91. Corella,Francisco, Lightweight public key infrastructure employing unsigned certificates.
  92. Metcalf, Christopher D., Managing shared resource in an operating system by distributing reference to object and setting protection levels.
  93. Metcalf, Christopher D., Managing shared resources in an operating system.
  94. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  95. Ganesh,Amit; Ngai,Gary C.; Gawlick,Dieter, Method and apparatus for making available data that was locked by a dead transaction before rolling back the entire dead transaction.
  96. Corella, Francisco, Method and apparatus for providing field confidentiality in digital certificates.
  97. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  98. Jebens,John H.; Carlson,Lowell D.; James,Jeffrey Scott, Method and apparatus for routing and distributing digital images.
  99. Jebens John H. ; James Jeffrey Scott ; Carlson Lowell D., Method and apparatus for storing and printing digital images.
  100. Rierden William ; Marusin Mark ; Gollob David, Method and apparatus for transaction processing in a distributed database system.
  101. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  102. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  103. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  104. Gladney Henry Martin, Method and system for a federated digital library by managing links.
  105. Dockter Michael Jon ; Farber Joel Frank ; Lynn Ronald William ; Richardt Randal James, Method and system for controlling access to data resources and protecting computing system resources from unauthorized access.
  106. Bohannon James ; Chang Eric, Method and system for distributing a plurality of software products, and limiting access thereto.
  107. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for online document collaboration.
  108. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for recording and using a traveler's travel preferences.
  109. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  110. Lao, Guillermo, Method and system for subscription digital rights management.
  111. Lao, Guillermo, Method and system for subscription digital rights management.
  112. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  113. Daniel Forthman ; Richard Matthews, Method and system for supporting multiple, historical, and future designs in a relational database.
  114. Galietti,Raymond A., Method and system for text data management and processing.
  115. Rosenthal Kathryn A., Method and system of determining access to records of members of a community.
  116. Howard,Kathryn A., Method and system of providing access privileges to records of members of a community.
  117. Schuyler, Paula D.; Stone, David E.; Tara, Marisa S., Method and system of routing requests for authorized approval.
  118. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  119. Gupta, Arun Kumar, Method for controlling access to information.
  120. Gupta,Arun Kumar, Method for controlling access to information.
  121. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  122. Alimpich Claudia C. ; Boldt Gerald D. ; Doescher Calvin Larry ; Goddard Joan Stagaman ; Vigil Luana L. ; Vo Minh Trong ; Wittig James Philip, Method, apparatus and application for object selective but global attribute modification.
  123. Doll, Benno; Kostadinov, Vladimir; Eldridge, Keith E., Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware.
  124. Kostadinov, Vladimir; Eldridge, Keith E., Methods and apparatus for control configuration with enhanced change-tracking.
  125. Eldridge,Keith; Meskonis,Paul; Hall,Robert; Burke,Kenneth A.; Volk,Scott; Johnson,Mark; Mackay,Brian; Dardinski,Steven, Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects.
  126. Johnson, Alexander; Badavas, Paul C.; Christiansen, T. Eric; Hansen, Peter D.; Kinney, Thomas B.; Keyghobad, Seyamak; Ling, Bo; Thibault, Richard L., Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network.
  127. de Kerf, Anthony A., Methods and arrangements for managing and maintaining a switch environment.
  128. de Kerf, Anthony A., Methods and arrangements for managing automated switching.
  129. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  130. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  131. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  132. Thibault, Richard L.; Canna, Bruce S.; Couper, Gerald S., Methods for process control with change updates.
  133. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  134. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  135. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  136. Malik, Dale W.; Friedman, Lee G., Network update manager.
  137. Robertson,Brian D.; Adams,Warren W., Network-based personal contact manager and associated methods.
  138. Stokes Randall Kay, Object system capable of using different object authorization systems.
  139. Gladney Henry Martin ; Reimer James Allen, Object-oriented access control method and system for military and commercial file systems.
  140. Endicott John C. ; Halter Steven L. ; Munroe Steven J. ; Voldal Erik Edward, Object-oriented method routing mechanism for automatically performing supervisory functions during method calls.
  141. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online electronic health record.
  142. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  143. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  144. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online personal library.
  145. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  146. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  147. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information and access of information stored therein.
  148. Ozbutun, Cetin, Partial query caching.
  149. Wong, Daniel Manhung; Lei, Chon Hei, Partitioned access control to a database.
  150. DeBie, Tod, Physical to electronic record content management.
  151. Keohane, Susann Marie; McBrearty, Gerald Francis; Murillo, Jessica Carol; Mullen, Shawn Patrick; Shieh, Johnny Meng-Han, Preventing replay attacks in encrypted file systems.
  152. Dardinski, Steven; Eldridge, Keith; Hall, Robert; Johnson, Mark; Mackay, Brian; Meskonis, Paul; Volk, Scott, Process control configuration system with connection validation and configuration.
  153. Khuti, Bharat; Coleman, Clayton; Rath, David; Rakaczky, Ernest; Leslie, Jim; Peralta, Juan; Simpson, George, Process control methods and apparatus for intrusion detection, protection and network hardening.
  154. Corella,Francisco, Public key validation service.
  155. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  156. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  157. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  158. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  159. Goddard Joan Stagaman ; Vo Minh Trong, Refresh and select-all actions in graphical user interface.
  160. Malik, Dale W., Resource list management system.
  161. Malik, Dale W., Resource list management system.
  162. Malik,Dale W., Resource list management system.
  163. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Restricting use of a digital item stored in a client computer by sending an instruction from a server computer via a network.
  164. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  165. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  166. King, Nigel; Buzsaki, George; Wigenstam, Roger, Secure normal forms.
  167. Wood, Douglas Andrew, Security and authorization in management agents.
  168. Siefert David M., Security aspects of computer resource repositories.
  169. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  170. Deo Umesh, Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems.
  171. Maluf, David A.; Gawdiak, Yuri O., Selective access and editing in a database.
  172. Sansone,Ronald P.; Cordery,Robert A.; Mackay,Donald G., Sender elected messaging services.
  173. Wong, Daniel Manhung, Sending control information with database statement.
  174. Silvestro, Michael; Dearth, Joshua Steven; Stanek, Christopher E.; Belcher, John Ethan; Bliss, Ronald E.; Brooks, Jeffery William; Visoky, Jack Michael, Sequential function chart (SFC) online editing without reset.
  175. Robertson, Brian D.; Adams, Warren W., Social networking system.
  176. Robertson, Brian D.; Adams, Warren W., Social networking system capable of notifying a user of profile updates made by the user's contacts.
  177. Robertson, Brian D.; Adams, Warren W., Social networking system capable of notifying users of profile updates made by their contacts.
  178. Robertson, Brian D.; Adams, Warren W., Social networking system capable of providing location-based notifications.
  179. Robertson, Brian D.; Adams, Warren William, Social networking system capable of providing location-based notifications.
  180. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  181. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  182. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  183. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  184. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  185. Harrison, Clifford A.; Weber, Emery J.; Bush, Phillip M., System and method for computer-aided technician dispatch and communication.
  186. Harrison,Clifford A.; Weber,Emery J.; Bush,Phillip M., System and method for computer-aided technician dispatch and communication.
  187. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  188. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  189. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  190. Powers, Michael C.; Sudberry, Douglas A.; Eiler, James A.; Bennett, Robert S.; Phillips, Clifford R., System and method for providing access privileges for users in a performance evaluation system.
  191. Krantz David R., System and method for providing object authorization in a distributed computed network.
  192. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  193. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  194. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  196. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  197. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
  198. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  199. Rovaglio, Maurizio; Scheele, Tobias, Systems and methods for immersive interaction with actual and/or simulated facilities for process, environmental and industrial control.
  200. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  201. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  202. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  203. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  204. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  205. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  206. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  207. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  208. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  209. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  210. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  211. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  212. Sumner-Moore, Scott, Technique for simplifying the management and control of fine-grained access.
  213. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  214. Guthrie, Christine Pae; Andersen, Jesper; McMahon, Douglas James, Techniques for managing resources for multiple exclusive groups.
  215. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  216. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  217. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  218. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  219. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  220. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  221. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  222. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  223. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  224. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  225. DeBie, Tod, Using an access control list rule to generate an access control list for a document included in a file plan.
  226. O'Sullivan, Joseph K.; Khaliq, Siraj; Smith, Adam M.; MacGillivray, Alexander; Sriver, Joe, Variable user interface based on document access privileges.
  227. O'Sullivan, Joseph K.; Khaliq, Siraj; Smith, Adam M.; MacGillivray, Alexander; Sriver, Joe, Variable user interface based on document access privileges.
  228. O'Sullivan, Joseph; Khaliq, Siraj; Smith, Adam M.; MacGillivray, Alexander; Sriver, Joe, Variable user interface based on document access privileges.
  229. O'Sullivan, Joseph; Khaliq, Siraj; Smith, Adam; MacGillivray, Alexander; Sriver, Joe, Variable user interface based on document access privileges.
  230. Whitten, Alma W.; O'Sullivan, Joseph K., Variably controlling access to content.
  231. Byun, Ji-Won; Chui, Chi Ching; Wong, Daniel M., View mechanism for data security, privacy and utilization.
  232. Guthrie, Christine Pae; Andersen, Jesper; Lei, Chon Hei; McMahon, Douglas James, Virtually partitioning user data in a database system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로