$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for granting access to a resource 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0891347 (1992-05-29)
발명자 / 주소
  • McNair Bruce E. (Holmdel NJ)
출원인 / 주소
  • AT&T Corp. (Murray Hill NJ 02)
인용정보 피인용 횟수 : 197  인용 특허 : 0

초록

An access control system is implemented with a maximum-likelihood “soft”decision process that determines whether a user\s actions are most like those of a valid user or most like those of a hacker. Data obtained from transactions involving both valid users and hackers is clustered in a multidimensio

대표청구항

A system for controlling access by a user to a resource based upon attributes of said user, comprising means (101) for storing data representing attributes of persons eligible for access and persons ineligible for access; signal processing means (110) for processing signals representing data stored

이 특허를 인용한 특허 (197)

  1. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  3. Katoh, Taku, Access control for an information processing device.
  4. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Activity stream-based recommendations system and method.
  5. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive commerce systems and methods.
  6. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive experimentation method and system.
  7. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive expertise clustering system and method.
  8. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive fuzzy network system and method.
  9. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive recommendation explanations.
  10. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive recommendations systems.
  11. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive recommendations systems.
  12. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive self-modifying and recombinant systems.
  13. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive self-modifying and recombinant systems.
  14. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive social and process network systems.
  15. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive social and process network systems.
  16. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive social computing methods.
  17. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Adaptive social computing methods.
  18. Flynn, Steven Dennis; Moneypenny, Naomi Felina, Affinity propagation in adaptive network-based systems.
  19. Kawaba, Motoyuki, Analysis-program storing recording medium, analyzing apparatus, and analytic method.
  20. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint a.
  21. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  22. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  23. Sweeney Christopher Lee ; Stodghill Scott A. ; DeShazer Kurt A. ; Marimuthu Aravindan, Application and database security and integrity system and method.
  24. Watanabe,Isao, Authentication method, apparatus, and system.
  25. Ross, David Justin, Authentication query strategizer and results compiler.
  26. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated and selective intervention in transaction-based networks.
  27. Baulier Gerald Donald ; Cahill Michael H. ; Ferrara Virginia Kay ; Lambert Diane, Automated fraud management in transaction-based networks.
  28. Boatwright, John T., Call security system.
  29. Boatwright, John T., Call security system.
  30. Frederick Max B., Cellular telephone anti-fraud system.
  31. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  32. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  33. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  34. Dickinson, Alexander G; Berger, Brian; Dobson, Robert T, Context sensitive dynamic authentication in a cryptographic system.
  35. Dickinson,Alexander G.; Berger,Brian; Dobson, Jr.,Robert T., Context sensitive dynamic authentication in a cryptographic system.
  36. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Contextual commerce systems and methods.
  37. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Contextual scope-based discovery systems.
  38. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Contextually integrated learning layer.
  39. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Contextually transformed learning layer.
  40. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  41. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  42. Biebesheimer, Debra L.; Jasura, Donn P.; Keller, Neal M.; Oblinger, Daniel A.; Podlaseck, Mark E.; Rolando, Stephen J., Customer self service iconic interface for portal entry and search specification.
  43. Biebesheimer, Debra L.; Keller, Neal M.; Oblinger, Daniel A.; Podlaseck, Mark E.; Rolando, Stephen J., Customer self service subsystem for classifying user contexts.
  44. Oblinger, Daniel A., Customer self service subsystem for context cluster discovery and validation.
  45. Oblinger, Daniel A., Customer self service subsystem for response set ordering and annotation.
  46. Sheppard Colin P.,GBX, Data analysis system and method.
  47. Hashimoto Sunao,JPX ; Hazama Tan,JPX, Data routing apparatus, server and data terminal equipment.
  48. Hoogerwerf David N. ; Stanhope David M. ; McKernan Randy, Detection and prevention of channel grabbing in a wireless communications system.
  49. Bansal, Pradeep K.; Begeja, Lee; Creswell, Carroll W.; Farah, Jeffrey Joseph; Stern, Benjamin J.; Wilpon, Jay, Digital signatures for communications using text-independent speaker verification.
  50. Bansal, Pradeep K.; Begeja, Lee; Creswell, Carroll W.; Farah, Jeffrey; Stern, Benjamin J.; Wilpon, Jay, Digital signatures for communications using text-independent speaker verification.
  51. Pierce, John Clifton, Distributed behavior based anomaly detection.
  52. Xidos John,CAX ; MacDougall Ross,CAX ; Carrigan David,CAX ; Hammond Gary,CAX ; Little Pamela,CAX ; Reid Bruce,CAX, Distributed gaming system.
  53. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  54. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Environment-responsive people matching system and method.
  55. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Expertise discovery methods and systems.
  56. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Explanatory people matching system and method.
  57. Diep, Thanh A.; Botros, Sherif M.; Izenson, Martin D., Features generation for use in computer network intrusion detection.
  58. Nishiyama Kenji,JPX, File management device.
  59. Arthur, Bruce; Marcos, Paul; Christie, Greg; Bellegarda, Jerome R; Silverman, Kim E. A.; Forstall, Scott; Tiene, Kevin, Filtering of data.
  60. Copeland, III,John A., Flow-based detection of network intrusions.
  61. Prezioso Robert T. (Long Valley NJ), Fuzzy logic entity behavior profiler.
  62. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  63. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  64. Mathur, Siddhartha; Sterling, David A.; Yang, Lu; Zhu, Zhengwen; Nunez Tejerina, David; Ozhan, Ozan; Butler, Michael, Identifying and throttling tasks based on task interactivity.
  65. Hughes, Patrick Alan; Elswick, Paul Blair, Inappropriate site management software.
  66. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Integrated interest and expertise-based discovery system and method.
  67. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Integrated search and adaptive discovery system and method.
  68. Dircks, Charles E.; Osmann, Eric E., Logon authentication and security system and method.
  69. Kaminsky William J., Method and apparatus for exchanging RF signatures between cellular telephone systems.
  70. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  71. Kaminsky William J. ; Sanpore Jeffrey G. ; Daniels David L. ; Kennedy Mary H., Method and apparatus for fraud control in cellular telephone systems.
  72. Rudokas Ronald S. (Alamo CA) Storch John A. (Laguna Niguel CA) Daniels David L. (Placentia CA), Method and apparatus for fraud control in cellular telephone systems.
  73. Rudokas Ronald Steven ; Storch John Adam ; Daniels David Leighton, Method and apparatus for fraud control in cellular telephone systems.
  74. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  75. Patrick Alan Hughes ; Paul Blair Elswick, Method and system for identifying and locating inappropriate content.
  76. Barrett, Michael Richard; Armes, David; Bishop, Fred; Shelby, James; Glazer, Elliott; Seitz, Philip W; Gibbons, Stephen P, Method and system for implementing and managing an enterprise identity management for distributed security.
  77. Barrett, Michael Richard; Armes, David; Bishop, Fred; Shelby, James; Glazer, Elliott; Steitz, Phillip W.; Gibbons, Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
  78. Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
  79. Barrett, Michael Richard; Armes, David; Bishop, Fred; Shelby, James; Glazer, Elliot; Steitz, Philip W.; Gibbons, Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security in a computer system.
  80. Barrett, Michael Richard; Armes, David; Bishop, Fred; Shelby, James; Glazer, Elliott; Steitz, Philip W.; Gibbons, Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security in a computer system.
  81. Temares,Mark E.; Newman,Alan B.; Menai,Noor A., Method and system for purchase-based segmentation.
  82. Singh, Dalvinder; Mishra, Vinod Kumar, Method and system for rendering a web page free of inappropriate URLs.
  83. Golobrodsky, Oleg; Ronen, David, Method for detecting a behavior of interest in telecommunication networks.
  84. Pinault, Francis; Boulet, Jean-Louis, Method for dynamically providing a terminal connected to a public communication network, with services offered by a private telecommunication network.
  85. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
  86. Theimer Marvin M. (Mountain View CA) Spreitzer Michael J. (Tracy CA) Weiser Mark D. (Palo Alto CA) Goldstein Richard J. (San Francisco CA) Elrod Scott A. (Redwood City CA) Swinehart Daniel C. (Palo A, Method for granting a user request having locational and contextual attributes consistent with user policies for devices.
  87. Baffes, Paul T.; Garrison, John Michael; Gilfix, Michael; Hsu, Allan; Stading, Tyron Jerrod, Method for providing access control to single sign-on computer networks.
  88. Baffes,Paul T.; Garrison,John Michael; Gilfix,Michael; Hsu,Allan; Stading,Tyron Jerrod, Method for providing access control to single sign-on computer networks.
  89. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  90. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  91. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  92. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  93. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  94. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Mutual interest inferencing system and method.
  95. Flinn,Steven Dennis; Moneypenny,Naomi Felina, Mutually adaptive systems.
  96. Copeland, III, John A., Network port profiling.
  97. Dircks, Charles E.; Osmann, Eric E., Network provider loop security system and method.
  98. Jerrim, John; Copeland, John A., Network service zone locking.
  99. Copeland,John A.; Jerrim,John, Packet sampling flow-based detection of network intrusions.
  100. Flinn, Steven Dennis; Moneypenny, Naomi Felina, People matching in subscription-based communities.
  101. Morley Richard E. ; Hill Lawrence W., Personal identification system using multiple parameters having low cross-correlation.
  102. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  103. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  104. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Portable inferred interest and expertise profiles.
  105. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Proximity-based people matching system and method.
  106. Tseng Wei-Jerng,TWX ; Lee Jun-Yih,TWX ; Wang Ching-Feng,TWX, Real time broadcasting system on an internet.
  107. Sterling, David A.; Boctor, Victor; Mathur, Siddhartha; Ozhan, Ozan; Prokopenko, Vitali; Tejerina, David Nunez; Yazicioglu, Selim, Resource health based scheduling of workload tasks.
  108. Sterling, David Andrew; Boctor, Victor; Mathur, Siddhartha; Ozhan, Ozan; Prokopenko, Vitali V.; Tejerina, David Nunez; Yazicioglu, Selim, Resource health based scheduling of workload tasks.
  109. Jankowitz Charles M. ; Mandelbaum Richard, Risk management technique for network access.
  110. Razmov, Valentin Nikolaev; Williams, III, Sam Franklin; Saliba, Hani; Erlandson, Aaron Everett; Nedzlek, Chad Arthur; Venkata, Kiran Akella, Routing users to receive online services based on online behavior.
  111. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Search-based people matching system and method.
  112. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  113. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  114. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  115. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  116. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  117. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  118. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  119. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  120. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  121. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  122. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  123. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  124. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  125. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  126. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  127. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  128. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  129. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  130. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  131. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  132. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  133. Ross, David Justin; Cornell, Bill G., Secure, confidential authentication with private data.
  134. Hayman Kenneth John ; Keene Michael Donovan ; Lewine Eric Scott ; Meyers William James ; Spencer Jon Frederick ; Taylor ; II Millard Cranford, Security system for computer systems.
  135. Flinn, Steven Dennis; Moneypenny, Naomi Felina, Serendipitous recommendations system and method.
  136. Botros, Sherif M.; Diep, Thanh A.; Izenson, Martin D., Synthesis of anomalous data to create artificial feature sets and use of same in computer network intrusion detection systems.
  137. Harrison, Clifford A.; Weber, Emery J.; Bush, Phillip M., System and method for computer-aided technician dispatch and communication.
  138. Harrison,Clifford A.; Weber,Emery J.; Bush,Phillip M., System and method for computer-aided technician dispatch and communication.
  139. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A.; Van Arkel, Hans; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terril J.; Wagner, James J., System and method for detecting and managing fraud.
  140. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A; Arkel, Hans Van; Herrington, Cheryl; Mahone, Saralyn; Curtis, Terrill J; Wagner, James J, System and method for detecting and managing fraud.
  141. Gavan,John; Paul,Kevin; Richards,Jim; Dallas,Charles A; Van Arkel,Hans; Herrington,Cheryl; Mahone,Saralyn; Curtis,Terrell J; Wagner,James J, System and method for detecting and managing fraud.
  142. Otterson Scott D. ; Kaplan Dmitry, System and method for detection of fraud in a wireless telephone system.
  143. Kaplan Dmitry ; Sharma Chetan ; McKernan Randy, System and method for detection of redial fraud in a cellular telephone system.
  144. Hahn,Timothy James, System and method for granting access to resources.
  145. Krantz David R., System and method for providing object authorization in a distributed computed network.
  146. Kaplan Dmitry ; Stanhope David M. ; McKernan Randolph W. ; Wilburn Howard L. ; Green Evan R., System and method for the verification of authentic telephone numbers in a wireless telephone system.
  147. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  148. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  149. Doliov, Stephan, System and method to determine the validity of an interaction on a network.
  150. Doliov,Stephan, System and method to determine the validity of an interaction on a network.
  151. Doliov,Stephan, System and method to determine the validity of an interaction on a network.
  152. Steven, Doliov, System and method to determine the validity of an interaction on a network.
  153. Palazzo, Robert Charles; Luu, Michael Sea, System and methods for computer network security involving user confirmation of network connections.
  154. Yamauchi Kazuhiko (Neyagawa JPX) Kozuka Masayuki (Neyagawa JPX) Kobayashi Ryousuke (Tokyo JPX) Donnelly Stuart (Edinburgh GBX), System for outputting reproduction data by judging whether a second data group is outputted after first data group is ou.
  155. Fisher Thomas D. ; Mowry Dearborn R. ; Spiess Jeffrey J., System for permitting access to a common resource in response to speaker identification and verification.
  156. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  157. Gavan, John; Paul, Kevin; Richards, Jim; Dallas, Charles A.; Van Arkel, Hans; Herrington, Cheryl; Mahone, Saralyn M.; Curtis, Terrill J.; Wagner, James J., System, method and computer program product for processing event records.
  158. Gavan,John; Paul,Kevin; Richards,Jim; Dallas,Charles A.; Arkel,Hans Van; Herrington,Cheryl; Mahone,Saralyn M.; Curtis,Terrill J.; Wagner,James J., System, method and computer program product for processing event records.
  159. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for a cryptographic file system layer.
  160. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  161. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  162. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  163. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  164. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  165. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  166. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  167. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  168. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  169. Orsini, Rick L.; O'Hare, Mark S.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  170. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  171. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  172. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  173. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  174. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  175. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  176. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  177. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  178. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  179. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  180. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  181. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  182. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  183. Ashok, Guru S.; Dunki-Jacobs, Raymond P.; Milne, Robert J.; Nahar, Rahul; Shah, Ashit M.; Tandel, Shreesh S.; Venkatachalam, Muthuswamy, Systems and methods of securing resources through passwords.
  184. Ashok,Guru S.; Dunki Jacobs,Raymond P.; Milne,Robert J.; Nahar,Rahul; Shah,Ashit M.; Tandel,Shreesh S.; Venkatachalam,Muthuswamy, Systems and methods of securing resources through passwords.
  185. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  186. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  187. Murad, Uzi; Pinkas, Gadi, Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud.
  188. Murad,Uzi; Pinkas,Gadi, Telecommunications system for generating a three-level customer behavior profile and for detecting deviation from the profile to identify fraud.
  189. Salamatov, Andrew A.; De Souza Sana, Giselli Panontini; Sterling, David A.; Mathias, Razvan, Throttling usage of resources.
  190. Salamatov, Andrew; De Souza Sana, Giselli Panontini; Sterling, David Andrew; Mathias, Razvan, Throttling usage of resources.
  191. Sterling, David A.; Mathur, Siddhartha; Boctor, Victor, Traffic shaping based on request resource usage.
  192. Sterling, David A.; Mathur, Siddhartha; Boctor, Victor, Traffic shaping based on request resource usage.
  193. Bellegarda, Jerome R.; Forstall, Scott; Silverman, Kim E. A.; Tiene, Kevin; Serlet, Bertrand, Training a computer storage system for automatic filing of data using graphical representations of storage locations.
  194. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  195. Ross, David Justin, Verification engine for user authentication.
  196. Ross, David Justin, Verification engine for user authentication.
  197. Kaplan Dmitry ; Stanhope David M., Waveform collection for use in wireless telephone identification.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로