$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Authorization system for obtaining in single step both identification and access rights of client to server directly fro 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/14
  • H04L-009/00
출원번호 US-0143163 (1993-11-03)
발명자 / 주소
  • Russell Edward A. (Acton MA)
출원인 / 주소
  • Wang Laboratories, Inc. (Billerica MA 02)
인용정보 피인용 횟수 : 435  인용 특허 : 0

초록

An authorization mechanism for providing authorization information for a client requesting access to a server resource in a server, including a directory server for storing client information required by the server in executing an operation call, including client access rights, and a generating a re

대표청구항

In a data processing system including a client mechanism, a server mechanism including a server resource, and an authorization mechanism, the authorization mechanism including a directory server for storing and providing access rights of the client mechanism to the server resource and the client mec

이 특허를 인용한 특허 (435)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Medvinsky, Alexander; Peterka, Petr; Moroney, Paul, Access control and key management system for streaming media.
  3. Naedele, Martin, Access control protocol for embedded devices.
  4. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  5. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  6. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  7. Pilkington, Adam J., Access to a computer network.
  8. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  9. Imbimbo, Amedeo; Attanasio, Francesco, Apparatuses, methods, and computer program products for data retention and lawful intercept for law enforcement agencies.
  10. Medvinsky,Alexander; Peterka,Petr, Association of security parameters for a collection of related streaming protocols.
  11. Thaweethai Ladavan (Milpltas CA), Authentication apparatus and process.
  12. Yin, Jianwen; Liu, Gang, Authentication management methods and media.
  13. Brown, Andrew James Guy; Fogel, Christopher M.; Parry, Thomas Owen, Authentication server and methods for granting tokens comprising location data.
  14. Everson,John; Norris,James W., Authentication, application-authorization, and user profiling using dynamic directory services.
  15. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  16. Agarwal,Sachin; Lee,Michele C., Automatic configuration of attribute sets.
  17. Beckman, Brian C.; Andrews, Anthony D.; Armanasu, Alexander A., Automatic object caller chain with declarative impersonation and transitive trust.
  18. Brian C. Beckman ; Anthony D. Andrews ; Alexander A. Armanasu, Automatic object caller chain with declarative impersonation and transitive trust.
  19. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  20. Franceschelli, Jr., Anthony J.; Phillips, Jeffrey S.; Bouchard, Peter; Doyle, Serena, Backup reporting framework graphical user interface.
  21. Franceschelli, Jr.,Anthony J.; Phillips,Jeffrey S.; Bouchard,Peter; Doyle,Serena, Backup reporting framework graphical user interface.
  22. Tung Loo,Elise Y.; Lee,Chi Cheng; Agarwal,Sachin, Blocking cache flush requests until completing current pending requests in a local server and remote server.
  23. Hirsh, Robert Bruce, Brokering a connection to access a secured service.
  24. Hsu Yung-Kao ; Seymour Stephen, Certification process.
  25. Li, Zhiyong; Williams, R. Stanley, Chemical-analysis device integrated with metallic-nanofinger device for chemical sensing.
  26. Li, Zhiyong; Williams, R. Stanley, Chemical-analysis device integrated with metallic-nanofinger device for chemical sensing.
  27. Hosoe Makoto,JPX, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  28. Hosoe, Makoto, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  29. Regnier Barbara Ann ; Youngers David Nicholas ; Dettinger Richard Dean ; Spors Daniel Arlan ; Thorson John David, Client/server computer system having personalizable and securable views of database data.
  30. Long, Joe Dennis, Compensating resource managers.
  31. Limprecht,Rodney T.; Helland,Patrick James; Agsen,Mohsen M., Component self-deactivation while client holds a returned reference.
  32. Andrews, Anthony D., Composable roles.
  33. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  34. Saito Katsumi,JPX, Computer network system having a small of amount of data in a network.
  35. Crane Christina Heidi ; Philpot ; Jr. Edwin Michael ; Sirkin Stephna Jeanne ; Walker ; Jr. Kenneth, Configuration and unconfiguration of distributed computing environment components.
  36. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  37. Stefik,Mark J., Content rendering device with usage rights.
  38. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  39. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  40. O'Toole ; Jr. James W. ; Gifford David K., Controlled transfer of information in computer networks.
  41. O'Toole, Jr.,James W.; Gifford,David K., Controlled transfer of information in computer networks.
  42. Hinman,Brian L.; Romano,Pasquale; Bednarz,Philip, Controlling wireless access to a network.
  43. Leveridge,Philip C.; Strange,Michael I.; Parkinson,David W.; Roberts,David; Kenning,Michael J.; Tibbitt Eggleton,Robert I., Data communications.
  44. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  45. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  46. Delany,Shawn P.; Ahmed,Sajeed, Determining a user's groups.
  47. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Determining group membership.
  48. Jones, Thomas C., Differentiated authentication for compartmentalized computing resources.
  49. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  50. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  51. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  52. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  53. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  54. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  55. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  56. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  57. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen, Disabling and enabling transaction committal in transactional application components.
  58. Bertram Daniel Wayne ; Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan ; Spooner Courtney Joseph, Discovery of authentication server domains in a computer network.
  59. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  60. Billings Roger E., Distributed data processing network.
  61. Pettus Christopher E., Distributed object networking service.
  62. Pettus Christopher E., Distributed object networking service.
  63. Chrin, David Michael; Jackson, Philip Eric; Orszag, Steven A., Distributing files across multiple, permissibly heterogeneous, storage devices.
  64. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  65. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  66. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  67. Berbec Robert R. ; Brady John L. ; Caffrey James M. ; Crimi Joanne T. ; Fenaroli Arthur P. ; Iatridis Matthew C. ; Puchkoff Gary S. ; Sanchez Roberto J. ; Whalen Madeline R. ; Williams Joseph A., Dynamic server-managed access control for a distributed file system.
  68. Sinn, Richard P.; Teng, Joan C.; Remahl, Thomas B., Employing electronic certificate workflows.
  69. Sinn, Richard P., Employing job code attributes in provisioning.
  70. Agarwal,Sachin; Remahl,Thomas; Teng,Joan, Employing local data stores to maintain data during workflows.
  71. Sinn, Richard; Yuen, Stan; Lee, Chi-Cheng, Employing wrapper profiles.
  72. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  73. Medvinsky,Alexander; Peterka,Petr, Encryption of streaming control protocols and their headers.
  74. Chapman,Diana M.; Barbir,Abulkadev, End-to-end security in data networks.
  75. Satish R. Thatte ; Richard D. Hill ; Jan S. Gray ; Gopal Krishna R. Kakivaya ; Craig H. Wittenberg ; James M. Lyon ; Rebecca A. Norlander ; Eric W. Johnson ; Scott G. Robinson, Environment extensibility and automatic services for component applications using contexts, policies and activators.
  76. Homer, Gregg S., Even more subscription media on demand.
  77. Srinivasan, Sudhir; Zuckerman, Boris; Oratovsky, Vitaly; Ye, Manny; Venkatesh, Dinesh; Shea, Kevin J.; John, Shaji O., File replication in a distributed segmented file system.
  78. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  79. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  80. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  81. Franceschelli, Jr.,Anthony J.; Phillips,Jeffrey S., Generating and launching remote method invocation servers for individual client applications.
  82. Franceschelli, Jr., Anthony J.; Phillips, Jeffrey S., Generic mechanism for reporting on backups.
  83. Franceschelli, Jr.,Anthony J.; Phillips,Jeffrey S., Generic mechanism for reporting on backups.
  84. Smyers Scott D., Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network.
  85. Dellacona, Richard, High speed fault tolerant mass storage network information server.
  86. Dellacona,Richard, High speed information processing and mass storage system and method, particularly for information and application servers.
  87. Delaney, Shawn P.; Summers, Robert, Identifying dynamic groups.
  88. Delaney,Shawn P.; Summers,Robert, Identifying dynamic groups.
  89. Villavicencio, Francisco J., Impersonation in an access system.
  90. Villavicencio,Francisco J., Impersonation in an access system.
  91. Bhaghavan, Rupa; Hu, Tawei; Nelson, Kenneth Carlin; Richardt, Randal James, Implementing access control for queries to a content management system.
  92. Srinivasan, Sudhir; Zuckerman, Boris; Orszag, Steven A.; Jackson, Philip Eric, Independent data access in a segmented file system.
  93. Ikenoya, Kazuyuki, Information providing apparatus, information providing method, information providing program, and recording medium.
  94. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  95. Clark Paul C., Intelligent token protected system with network authentication.
  96. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  97. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  98. Michael M. Chlan ; Richard E. Davis, Internet web server cache storage and session management system.
  99. Hodges, Jeffrey D., Intrusion threat detection.
  100. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Russell, Wilfred G.; Gray, Jan Stephen, Just-in-time activation and as-soon-as-possible deactivation or server application components.
  101. Tania Trinh Ly, Kerberos command structure and method for enabling specialized Kerbero service requests.
  102. Medvinsky,Alexander; Peterka,Petr; Moroney,Paul; Sprunk,Eric, Key management protocol and authentication system for secure internet protocol rights management architecture.
  103. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  104. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  105. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  106. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  107. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  108. Rothfarb, Neil Barry, Lock-and-key consumer billing data protection system having data encryption capability.
  109. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  110. Dircks, Charles E.; Osmann, Eric E., Logon authentication and security system and method.
  111. Daniel Wayne Bertram ; David Paul Dutcher ; Scott Alan Lenharth ; James Michael Rolette, Jr. ; Stanley Alan Smith ; Courtney Joseph Spooner, Management of authentication discovery policy in a computer network.
  112. Klug, John R., Media content notification via communications network.
  113. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  114. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  115. Li, Zhiyong; Williams, R. Stanley, Metallic-nanofinger device for chemical sensing.
  116. Freeman, Thomas D.; Pedersen, Bradley Jay; Woodbury, Daniel Nicholes; Ungerman, Anthony, Method and apparatus for administering a server having a subsystem in communication with an event channel.
  117. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  118. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  119. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for communicating among a network of servers.
  120. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for communicating among a network of servers.
  121. Oliver,Huw Edward, Method and apparatus for controlling content consumption.
  122. Hinman, Brian L.; Romano, Pasquale; Bednarz, Philip, Method and apparatus for controlling wireless access to a network.
  123. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for delivering local and remote server events in a similar fashion.
  124. Grube Gary W. (Palatine IL) Markison Timothy W. (Austin TX) Rybicki Mathew A. (Austin TX), Method and apparatus for detecting unauthorized distribution of data.
  125. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for determining an identity of a network device.
  126. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  127. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  128. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  129. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  130. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  131. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  132. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  133. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  134. Carino ; Jr. Felipe ; Sterling Warren M. ; Rollins Anthony L., Method and apparatus for extending a database management system to operate with diverse object servers.
  135. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  136. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  137. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  138. Blumenau, Steve; Cohen, Steve; Ofer, Erez, Method and apparatus for identifying network devices on a storage network.
  139. Vora, Kumar; Raman, Rajesh; Ramamurthy, Prakash; Swadi, Praveen R.; Shandony, Michael J.; Joshi, Vrinda S.; Moatazedi, Shahram; Stone, Adam C., Method and apparatus for implementing a corporate directory and service center.
  140. Vora,Kumar; Raman,Rajesh; Ramamurthy,Prakash; Swadi,Praveen R.; Shandony,Michael J.; Joshi,Vrinda S.; Moatazedi,Shahram; Stone,Adam C., Method and apparatus for implementing a corporate directory and service center.
  141. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  142. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  143. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  144. Freeman, Thomas D.; Gulkis, Daniel Alec; Pedersen, Bradley Jay, Method and apparatus for managing server load.
  145. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  146. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  147. Perlman,Radia J.; Hanna,Stephen R., Method and apparatus for providing a key distribution center without storing long-term server secrets.
  148. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  149. Van Wyngarden Amy, Method and apparatus for providing and accessing data at an internet site.
  150. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  151. Carino ; Jr. Felipe ; Rollins Anthony L., Method and apparatus for providing database information to non-requesting clients.
  152. Carino ; Jr. Felipe ; Rollins Anthony L., Method and apparatus for providing shared data to a requesting client.
  153. Carino, Jr., Felipe; Rollins, Anthony L., Method and apparatus for providing shared data to a requesting client.
  154. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  155. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  156. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  157. Ananda, Mohan, Method and apparatus for secure data storage and retrieval.
  158. Pedersen Bradley J. ; Bloomfield Marc A., Method and apparatus for simultaneously providing anonymous user login for multiple users.
  159. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  160. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  161. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  162. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  163. Pope,David E.; Treder,Terry N.; Pedersen,Bradley J., Method and apparatus for transmitting authentication credentials of a user across communication sessions.
  164. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  165. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  166. Glasser Daniel S. ; Reardon Thomas R. ; Ogus Aaron W. ; McKelvie Samuel J. ; Joy George, Method and system for adding a secure network server to an existing computer network.
  167. Bauchner Renee ; Weinberger Henry ; Wright Wilbur E. ; Newman Al, Method and system for analyzing and handling the customer files of a financial institution.
  168. Dare Timothy S. (Damascus MD) Ek Eric B. (New Market MD) Luckenbaugh Gary L. (Gaithersburg MD), Method and system for authenticating users to multiple computer servers via a single sign-on.
  169. Dharmarajan,Baskaran, Method and system for authorizing a client computer to access a server computer.
  170. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  171. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  172. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  173. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  174. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  175. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Method and system for counting web access requests.
  176. Benantar, Messaoud; Gindin, Thomas L.; Milman, Ivan, Method and system for coupling an X.509 digital certificate with a host identity.
  177. Jardin, Cary A., Method and system for establishing secure communication over computer networks.
  178. Lister,Terence E.; Sanchez, II,Humberto A; Drees,Douglas P.; Finz,Jeffrey R., Method and system for executing tools in a service control manager module.
  179. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  180. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  181. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  182. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  183. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  184. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  185. Draves Richard P., Method and system for providing secure access to computer resources.
  186. Cain Michael Eugene, Method and system for providing secured access to a server connected to a private computer network.
  187. Shamsaasef, Rafie; Manglore, Geetha; Peterka, Petr; Medvinsky, Alexander, Method and system for providing third party authentication of authorization.
  188. Van Wyngarden, Amy, Method and system for receiving and providing access to information at a web site.
  189. Van Wyngarden,Amy, Method and system for receiving and providing access to information at a web site.
  190. Wyngarden, Amy Van, Method and system for receiving and providing access to information at a web site.
  191. Wyngarden, Amy Van, Method and system for receiving and providing access to information at a web site.
  192. Lao, Guillermo, Method and system for subscription digital rights management.
  193. Lao, Guillermo, Method and system for subscription digital rights management.
  194. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  195. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  196. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  197. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  198. Nuttall,Fran챌ois Xavier, Method for computer network operation basis for usage fees.
  199. Nuttall, François Xavier, Method for computer network operation providing basis for usage fees.
  200. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  201. Bhaghavan,Rupa; Hu,Tawei; Nelson,Kenneth Carlin; Richardt,Randal James, Method for implementing access control for queries to a content management system.
  202. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  203. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  204. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  205. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  206. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  207. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  208. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  209. Krstic, Ivan; Jennings, Austin G.; Vidrine, Jacques Anthony, Method for managing computer resources accessed by a program operating in a restricted environment.
  210. Zhan, Kaijun; Harper, James, Method for managing data in a shared computing environment.
  211. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  212. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  213. Klug, John R.; Klug, Noah H., Method for providing node targeted content in an addressable network.
  214. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  215. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  216. Homer, Gregg S., Method for subscription media on-demand.
  217. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  218. Cacace-Bailey, Melissa; Obrea, Andrei; Carvell, Rebecca E.; Gardner, David P.; Pierce, Jeffrey, Method of authenticating membership for providing access to a secure environment by authenticating membership to an associated secure environment.
  219. Felger, David, Method of billing a purchase made over a computer network.
  220. Felger, David, Method of billing a purchase made over a computer network.
  221. Felger, David, Method of billing a purchase made over a computer network.
  222. Zunke, Michael, Method of operating a computer system and computer system.
  223. Meier Michael S., Method of walking-up a call stack for a client/server program that uses remote procedure call.
  224. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  225. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  226. Perlman Radia J. ; Hanna Stephen R., Methods and systems for establishing a shared secret using an authentication token.
  227. Thapliyal, Ashish V.; Mittal, Vishal; Spataro, Tony; Kennedy, John, Methods and systems for providing scalable authentication.
  228. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  229. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  230. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  231. Srinivasan, Sudhir; Orszag, Steven A., Migration of control in a distributed segmented file system.
  232. Homer, Gregg S., More subscription media on demand.
  233. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  234. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  235. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  236. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  237. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Reed, David R., Multi-user server application architecture with single-user object tier.
  238. Blanco, Marcos Ares; Marco, Regis, Network access authentication system.
  239. Janes,Sherman M., Network communications security agent.
  240. Janes,Sherman M., Network communications security agent.
  241. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  242. Dircks Charles E. ; Osmann Eric E., Network desktop management security system and method.
  243. Dellacona Richard, Network information server.
  244. Dircks, Charles E.; Osmann, Eric E., Network provider loop security system and method.
  245. Hinson, Gerald L.; Al-Ghosein, Mohsen; Dumitru, Donald W.; McCrady, Donald J.; Pollack, Seth B.; Swartz, Stephen T., Object connectivity through loosely coupled publish and subscribe events.
  246. Hinson,Gerald L.; Al Ghosein,Mohsen M.; Dumitru,Donald W.; McCrady,Donald J.; Pollack,Seth B.; Swartz,Stephen T., Object connectivity through loosely coupled publish and subscribe events.
  247. Hinson,Gerald L.; Al Ghosein,Mohsen M.; Dumitru,Donald W.; McCrady,Donald J.; Pollack,Seth B.; Swartz,Stephen T., Object connectivity through loosely coupled publish and subscribe events.
  248. Hinson, Gerald L.; McCrady, Donald J.; Swartz, Stephen T., Object connectivity through loosely coupled publish and subscribe events with filtering.
  249. Andrews, Anthony D.; Thatte, Satish R.; Hill, Richard D.; Norlander, Rebecca A.; Armanasu, Alexander A., Object security boundaries.
  250. Anthony D. Andrews ; Satish R. Thatte ; Richard D. Hill ; Rebecca A. Norlander ; Alexander A. Armanasu, Object security boundaries.
  251. Sinn,Richard P., Obtaining and maintaining real time certificate status.
  252. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  253. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  254. Ghatare,Sanjay P., Partitioning data access requests.
  255. Ocepek,Steven R.; Lauer,Brian A.; Dziadziola,David A., Peer connected device for protecting access to local area networks.
  256. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  257. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  258. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Policies for modifying group membership.
  259. Eberhard, Martin F., Portable information display device with ergonomic bezel.
  260. Tsang,Andy; Barber,Brandon, Portal bridge.
  261. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  262. Lee, Michele C., Preparing output XML based on selected programs and XML templates.
  263. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  264. Joshi,Vrinda S.; Thiyagarajan,Lakshmi Velandai, Providing data to applications from an access system.
  265. Teng,Joan C.; Lee,Chi Cheng, Proxy system.
  266. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  267. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  268. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  269. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  270. Dievendorff, Richard; Helland, Patrick J.; Chopra, Gagan; Al Ghosein, Mohsen M., Queued component interface passing for results outflow from queued method invocations.
  271. Richard Dievendorff ; Patrick J. Helland ; Gagan Chopra ; Mohsen Al-Ghosein, Queued method invocations on distributed component applications.
  272. Homer, Gregg S., Rechargeable media distribution and play system.
  273. Limprecht,Rodney T.; Helland,Patrick James; Agsen,Mohsen M., Recycling components after self-deactivation.
  274. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  275. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  276. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  277. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  278. Sinn,Richard P.; Remahl,Thomas B.; Tsang,Andy M., Rule based data management.
  279. Delany,Shawn P.; Ahmed,Sajeed, Runtime modification of entries in an identity system.
  280. Andrew W. Trieger, Secure session tracking method and system for client-server environment.
  281. Trieger Andrew W., Secure session tracking method and system for client-server environment.
  282. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  283. Lee,Michele C.; Ahmed,Sajeed, Securely persisting network resource identifiers.
  284. Ocepek,Steven R.; Lauer,Brian A.; Dziadziola,David A., Security apparatus and method for local area networks.
  285. Te-Kai Liu, Security profile for web browser.
  286. He Jingsha ; Hall Randle D., Security system and method for network element access.
  287. Hayman Kenneth John ; Keene Michael Donovan ; Lewine Eric Scott ; Meyers William James ; Spencer Jon Frederick ; Taylor ; II Millard Cranford, Security system for computer systems.
  288. Cross, David B.; Novak, Mark F.; Shekel, Oded Ye; Leach, Paul J.; Luther, Andreas; Jones, Thomas C., Selective authorization based on authentication input attributes.
  289. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  290. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  291. Li, Zhiyong; Hu, Min; Ou, Fung Suong; Wu, Wei, Self-arranging, luminescence-enhancement device for surface-enhanced luminescence.
  292. Limprecht, Rodney; Helland, Patrick James; Al-Ghosein, Mohsen, Server application components with control over state duration.
  293. Limprecht,Rodney; Helland,Patrick James; Al Ghosein,Mohsen, Server application components with control over state duration.
  294. Drozd, Michal J; Roche, Michael G; Shtop, Aliaksandr, Session tickets for a backup and recovery system.
  295. Russell,Wilfred G.; Helland,Patrick J.; Hope,Greg; Limprecht,Rodney; Al Ghosein,Mohsen M.; Gray,Jan S., Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment.
  296. Russell,Wilfred G.; Helland,Patrick James; Hope,Greg; Limprecht,Rodney; Al Ghosein,Mohsen; Gray,Jan Stephen, Software component execution management using context objects for tracking externally-defined intrinsic properties of executing software components within an execution environment.
  297. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  298. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  299. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  300. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  301. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  302. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  303. Srinivasan,Sudhir; Orszag,Steven A.; Jackson,Philip Eric, Storage allocation in a distributed segmented file system.
  304. Otway,David John; Bull,John Albert, Strong mutual authentication of devices.
  305. Otway,David; Bull,John, Strong mutual authentication of devices.
  306. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  307. Lee, Chi-Cheng; Tsang, Andy M.; Remahl, Thomas B., Support for multiple data stores.
  308. Agarwal,Sachin; Thiyagarajan,Lakshmi V., Support for multiple mechanisms for accessing data stores.
  309. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  310. Gava, Fabio M.; Suleiman, Mohammad, System and method for authenticating transactions.
  311. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  312. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  313. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  314. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  315. Wang,Xin, System and method for document distribution.
  316. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  317. Barkan Yuval,ILX ; Barkan Moromay,ILX, System and method for handling permits.
  318. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  319. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  320. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  321. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  322. Wang, Xin, System and method for protection of digital works.
  323. Medvinsky,Alexander, System and method for providing key management protocol with client verification of authorization.
  324. Hernandez Brian S. ; Hurley Anne, System and method for remote information access.
  325. Truong Timothy M., System and method for remotely executing a command.
  326. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  327. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  328. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  329. Wang,Xin, System and method for transferring the right to decode messages.
  330. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  331. Kramer,Andre; Harwood,Will, System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel.
  332. John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
  333. John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
  334. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  335. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  336. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  337. Nuttall, Francois-Xavier; Collier, David Charles; Fenney, Robert J.; Capitant, Patrice J., System and methods providing secure delivery of licenses and content.
  338. Nuttall,Francois Xavier; Collier,David Charles; Fenney,Robert J.; Capitant,Patrice J., System and methods providing secure delivery of licenses and content.
  339. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  340. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  341. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  342. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  343. Stefik Mark J. ; Pirolli Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  344. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  345. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  346. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  347. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  348. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  349. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  350. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  351. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  352. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  353. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  354. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  355. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  356. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  357. Oakes, III, Charles L.; Medina, III, Reynaldo; Billman, Bradly J., Systems and methods for deployment of secure shell devices.
  358. Oakes, III, Charles L.; Medina, III, Reynaldo; Billman, Bradly J., Systems and methods for deployment of secure shell devices.
  359. Oakes, III, Charles L.; Medina, III, Reynaldo; Billman, Bradly J., Systems and methods for deployment of secure shell devices.
  360. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  361. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  362. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  363. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  364. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  365. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  366. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  367. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  368. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  369. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  370. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  371. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  372. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  373. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  374. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  375. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  376. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  377. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  378. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  379. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  380. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  381. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  382. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  383. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  384. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  385. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  386. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  387. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  388. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  389. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  390. Hsing, Michael Chi-Pei; Yaung, Alan Tsu-I, Technique of password encryption and decryption for user authentication in a federated content management system.
  391. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  392. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  393. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  394. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  395. Teng, Joan C., Template based workflow definition.
  396. Peden, George H.; Marshall, Robert A., Ticketing and keying for orchestrating distribution of network content.
  397. Peden,George H.; Marshall,Robert A., Ticketing and keying for orchestrating distribution of network content.
  398. Sipponen,Juha Pekka, Ticketing with printing option.
  399. Wang, I-Shin Andy; Lin, Jy-Jine James, Tracking and propagating updates to a message-driven system of interdependent components.
  400. Helland, Patrick James; Limprecht, Rodney; Al-Ghosein, Mohsen; Russell, Wilfred G., Transaction processing of distributed objects with declarative transactional attributes.
  401. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  402. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  403. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  404. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  405. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  406. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  407. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  408. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  409. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  410. Marchev, Nikola I.; Petrov, Miroslav R.; Ivanov, Biser E.; Minov, Jasen S.; Neichev, Nikolai V., Tunneling apparatus and method for client-server communication.
  411. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  412. Stone, Andrew; Cooper, Brett; Miller, Christopher; McCarthy, Timothy Daniel; Cannon, Clifford Randall, Universal authorization and access control security measure for applications.
  413. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  414. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  415. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  416. Glitho Roch,CAX ; Leduc Francois,CAX ; Crowe Thomas,IEX ; Hogberg Lena,SEX, Use of web technology for subscriber management activities.
  417. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  418. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  419. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  420. Blumenau, Steve; Cohen, Steve; Lindholm, Jason D.; Ofer, Erez, User interface for managing storage in a storage system coupled to a network.
  421. Durrett Charles M., User portal device for the world wide web to communicate with a website server.
  422. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  423. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  424. Vilhuber, Jan, Validating connections to a network system.
  425. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.
  426. Vaeth J. Stuart ; Walton Charles S., Virtual certificate authority.
  427. Vaeth J. Stuart ; Walton Charles S., Virtual certificate authority.
  428. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  429. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen J.; Payne, Andrew C.; Treese, George W., Web advertising method.
  430. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  431. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  432. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  433. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  434. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  435. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로