$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for controlling access to and interconnection of computer system resources 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/32
출원번호 US-0186663 (1994-01-24)
발명자 / 주소
  • Rosenow Peter D. (Edmonds WA) Trafton Roger M. (Kirkland WA)
출원인 / 주소
  • Paralon Technologies, Inc. (Bellevue WA 02)
인용정보 피인용 횟수 : 182  인용 특허 : 0

초록

A compact, physically secure, high-performance access controller (16, 18) is electrically connected to each access-managed resource (12, 14) or group of resources (10) in a computer system. Whenever access managed resources attempt to establish communications, their associated access controllers exc

대표청구항

A system for transferring secure data across a data communication medium between first and second computer system resources, comprising: first and second access controllers electrically connected to the data communication medium and to respective ones of the first and second resources, for transferr

이 특허를 인용한 특허 (182)

  1. Dubhashi, Kendarnath A.; Raman, Balan Sethu; Leach, Paul J.; Krishnan, Prasanna V., Access control list inheritance thru object(s).
  2. Siefert, David M.; McCollum, Tab A., Access key codes for computer resources.
  3. de Jong,Eduard K., Accessing in a rights locker system for digital content access control.
  4. Durkin, David P., Administrative control and security of modems.
  5. Chou Wayne W. ; Elteto Laszlo ; Kulinets Joseph M. ; LaRussa Joseph, Apparatus and method for preventing theft of computer devices.
  6. Yarom Yuval,ILX, Apparatus for and method of providing user exits on an operating system platform.
  7. Yarom Yuval,ILX, Apparatus for and method of providing user exits on an operating system platform.
  8. Ahlberg, Axel H.; Becar, Allyn P.; Brand, Gregory L.; Fenley, Douglas B.; Jones, Chester L.; Wyrick, Robert E., Authentication and entitlement for users of web based data management programs.
  9. Bumbulis, Peter, Cache management system providing improved page latching methodology.
  10. Bate,Lyle; Carter,Stephen R.; Nevarez,Carlos A., Caching and accessing rights in a distributed computing system.
  11. Davis Derek L., Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package.
  12. Karolak Dale W. (Ft. Wayne IN) Shirey Carl L. (Ft. Wayne IN) Steiner Wesley D. (Ft. Wayne IN) Rue Robert T. (Ft. Wayne IN), Communications management system architecture.
  13. Barnett, Howard S., Computer network security system and method.
  14. Reasons,John D.; Vineyard,James L., Connected support entitlement system and method of operation.
  15. Reasons,John D.; Vineyard,James L., Connected support entitlement system method of operation.
  16. Devine,Carol Y.; Shoulberg,Richard W.; Shifrin,Gerald A.; Pfister,Robert A.; Fenley,Douglas B.; Suscheck,Charles A.; Delano,P. Alex; Kennington,W. Russell; Brandt,Andre R.; Pillai,Sajan J.; Schwarz,Edward; Shamash,Arieh, Customer interface system for managing communications services including toll free services.
  17. Ferren, Bran; Jung, Edward K. Y., Data recovery systems.
  18. Ferren, Bran; Jung, Edward K. Y., Data retrieval methods.
  19. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  20. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  21. Klein, Dean A, Data security for digital data storage.
  22. Klein, Dean A., Data security for digital data storage.
  23. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  24. Umbreit, Timothy F., Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party.
  25. Durkin,David P., Determining whether a telephony call is permitted based on permission data.
  26. Iwamoto,Neil Y.; Seikh,Attaullah; Paek,Jeanette Y.; Martinez,Martin; Slick,Royce E.; Chern,Wei Jhy; Khosrova,Eliza; Yang,Joseph, Device access based on centralized authentication.
  27. Harp, Steven Alex; Haigh, J Thomas; Gohde, Johnathan A; O'Brien, Richard C; Payne, Jr., Charles N; VanRiper, Ryan A, Device for preventing, detecting and responding to security threats.
  28. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  29. Chua, Roy Liang; Convery, Sean Joseph; Pearce, Andrew Keith; Thusoo, Ashish, Distributed authentication, authorization and accounting.
  30. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Distributed directory service using junction nodes for providing network users with an integrated hierarchical directory services.
  31. Yang Ming-Chung, Duplicate device detection system.
  32. Scanlan Thomas K., Dynamic assignment of security parameters to web pages.
  33. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  34. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  35. Huffman James R. ; Cruickshank Ronald D. ; Jambhekar Shrirang Nikanth ; Collins Russell L., Electronic book and method of capturing and storing a quote therein.
  36. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  37. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  38. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  39. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  40. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  41. Bladow Chad R. ; Devine Carol Y. ; Schwarz Edward ; Shamash Arieh ; Shoulberg Richard W. ; Wood Jeffrey A., Graphical user interface for Web enabled applications.
  42. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Devine, Carol Y.; Studness, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated business system for web based telecommunications management.
  43. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  44. Devine, Carol Y.; Shoulberg, Richard W.; Shifrin, Gerald A.; Pfister, Robert A.; Fenley, Douglas B.; Suscheck, Charles A.; Delano, P. Alex; Kennington, W. Russell; Brandt, Andre R.; Pillai, Sajan J.;, Integrated customer interface system for communications network management.
  45. Baker,Thomas E.; Chaffee,Susan L.; Chen,Yuchien; Gruber,Charles J.; Fishman,Howard P., Integrated customer web station for web based call management.
  46. Cogger Timothy John ; Kunkel ; III Isaac A. ; Miller David Todd ; Patil Suma P., Integrated interface for Web based customer care and trouble management.
  47. Combar, Curtis T.; Devine, Carol Y.; Pfister, Robert A., Integrated interface for real time web based viewing of telecommunications network call traffic.
  48. Cogger, Timothy John; Kunkel, III, Isaac A.; Miller, David Todd; Patil, Suma P., Integrated interface for web based customer care and trouble management.
  49. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  50. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  51. Andre R. Brandt ; Sajan J. Pillai, Integrated proxy interface for web based data management reports.
  52. Combar,Curtis T.; Devine,Carol Y.; Flentje,William P.; Pfister,Robert A., Integrated proxy interface for web based data management reports.
  53. Devine, Carol Y.; Dollar, Tammy E.; Munguia, Wayne J.; Schwarz, Edward, Integrated proxy interface for web based report requester tool set.
  54. Delano, P. Alex; Devine, Carol Y.; Hall, Robert W.; Pfister, Robert A.; Venn, Garrison M., Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client.
  55. Curtis T. Combar ; Robert A. Pfister, Integrated proxy interface for web based telecommunications management tools.
  56. Wayne J. Munguia ; Robert A. Pfister ; Charles A. Suscheck, Integrated proxy interface for web based telecommunications network management.
  57. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  58. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  59. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  60. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  61. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  62. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  63. Richard A. Stokes, Magnetic optical encryption/decryption disk drive arrangement.
  64. Ferren, Bran; Jung, Edward K. Y., Memory device activation and deactivation.
  65. Larsen,Vincent Alan, Method and apparatus for implementing process-based security in a computer system.
  66. Howard,Robert James; Reid,Stanley, Method and apparatus for preventing un-authorized attachment of computer peripherals.
  67. Grube Gary W. (Palatine IL) Markison Timothy W. (Austin TX) Rybicki Mathew A. (Austin TX), Method and apparatus for preventing unauthorized monitoring of wireless data transmissions.
  68. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method and apparatus for providing fungible intercourse over a network.
  69. Ronald M. Smith, Sr. ; Edward J. D'Avignon ; Robert S. DeBellis ; Randall J. Easter ; Lucina L. Green ; Michael J. Kelly ; William A. Merz ; Vincent A. Spano ; Phil Chi-Chung Yeh, Method and apparatus for providing public key security control for a cryptographic processor.
  70. Kurtzberg Jerome M. ; Levanoni Menachem, Method and apparatus for realizing computer security.
  71. Moore, Charles R. J.; O'Connor, Peter V., Method and system for a policy enforcing module.
  72. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  73. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  74. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  75. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  76. Pigin, Vlad, Method and system for digital rights management of documents.
  77. Pigin, Vlad, Method and system for digital rights management of documents.
  78. Pigin, Vlad, Method and system for digital rights management of documents.
  79. Huffman James R. ; Jambhekar Shrirang Nikanth, Method and system for encoding a book for reading using an electronic book.
  80. Bialick, William P.; Housley, Russell D.; Moore, Charles R. J.; Linsenbardt, Duane J., Method and system for enforcing access to a computing resource using a licensing attribute certificate.
  81. Bialick,William P.; Housley,Russell D.; Moore,Charles R. J.; Linsenbardt,Duane J., Method and system for enforcing access to a computing resource using a licensing attribute certificate.
  82. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  83. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  84. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  85. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  86. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  87. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  88. Ferren,Bran; Goodall,Eleanor V.; Jung,Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  89. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  90. Schwob Pierre R.,HKX, Method and system to provide internet access to users via non-home service providers.
  91. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method for accessing a digital network by way of one or more Internet service providers.
  92. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  93. Addington, Timothy Hall, Method for delivery of IP data over MPEG-2 transport networks.
  94. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Method for downloading an icon corresponding to a hierarchical directory structure from a directory service.
  95. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  96. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  97. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  98. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  99. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  100. Gmuender, John Everett; Selgas, Thomas Drennan; Massing, Michael Brian, Method for providing a network address.
  101. Klein,Yaron, Method for securing data storage in a storage area network.
  102. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of accessing a selected network.
  103. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of connecting a user to a network.
  104. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  105. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  106. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device including structured data and primary and secondary read-support information.
  107. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  108. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  109. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of obtaining a network address.
  110. Huffman James R. ; Cruickshank Ronald D. ; Jambhekar Shrirang Nikanth ; Collins Russell L., Method of substituting names in an electronic book.
  111. Banwell, Thomas C.; Dori, Ariel; Mistry, Keku M.; Robe, Thomas J., Method, apparatus, and system for filtering incoming telephone calls.
  112. Ferren, Bran; Jung, Edward K. Y., Modifiable memory devices having limited expected lifetime.
  113. Buckler Jeffrey M., Monitor for fluid dispensing system.
  114. Carol Y. Devine ; Tammy E. Dollar ; Wayne J. Munguia, Multi-threaded web based user inbox for report management.
  115. Baumgartner, Yoanna; Elman, Anna; Harris, Glen Douglas, Non-uniform memory access (NUMA) data processing system that holds and reissues requests at a target processing node in response to a retry.
  116. Davis Derek L., Optimized security functionality in an electronic system.
  117. O'Neil,Kevin P.; Seidman,Glenn R., Personal information security and exchange tool.
  118. Enmei, Toshiharu, Portable communicator.
  119. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Privacy and identification in a data communications network.
  120. Joseph Joshy, Processing customized uniform resource locators.
  121. Raju, Kartik; Un, Mehmet, Processors for network communications.
  122. de Jong, Eduard; Cooley, Aaron; Bostrom, Jon, Repositing for digital content access control.
  123. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Repositing for digital content access control.
  124. de Jong,Eduard K., Rights locker for digital content access control.
  125. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  126. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  127. Ferren,Bran; Jung,Edward K. Y.; Tegreene,Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  128. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  129. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  130. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  131. Cotner, Curt; Miller, Roger Lee, Row-level security in a relational database management system.
  132. Cotner,Curt; Miller,Roger Lee, Row-level security in a relational database management system.
  133. Cotner,Curt; Miller,Roger Lee, Row-level security in a relational database management system.
  134. Benjamin Shani IL, Secure broadband communication.
  135. Estakhri, Petro; Le, Ngon, Secure compact flash.
  136. Estakhri, Petro; Le, Ngon, Secure compact flash.
  137. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT), Secure computer communication method and system.
  138. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for Web based data management.
  139. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  140. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  141. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  142. Noble,William B.; Mayerski,Elizabeth R.; Vu,Hiep T., Secure data sharing system.
  143. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  144. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  145. Whitaker,David J; Anspach,Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  146. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  147. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  148. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  149. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  150. Barrett, John, Security management tool for managing security attributes in computer systems.
  151. Lee, Woo-Hyun; Kim, Ji-Soo; Yu, Bum-Seok, Solid state disk and input/output method.
  152. Poder, James, Stateful home phone service.
  153. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Synchronizing for digital content access control.
  154. Choy, David Mun-Hien, System and method for RDBMS to protect records in accordance with non-RDBMS access control rules.
  155. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  156. Pollet, Cody; Burgess, Charles; Roach, Courtney; Hart, Brandon, System and method for enhanced data protection.
  157. Choy,David Mun Hien; Raghavan,Sriram, System and method for ensuring referential integrity for heterogeneously scoped references in an information management system.
  158. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  159. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  160. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  161. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  162. Choy, David Mun-Hien, System and method for inheriting access control rules.
  163. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  164. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  165. Mousseau,Gary P.; Ferguson,Tabitha K.; Linkert,Barry; Vander Veen,Raymond P.; Castell,William D.; Lazaridis,Mihal, System and method for pushing information from a host system to a mobile data communication device.
  166. Mousseau,Gary P.; Lazaridis,Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  167. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  168. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, System and method of accessing a network by way of different service providers.
  169. Allegre Fran.cedilla.ois,FRX ; Campana Mireille,FRX ; Roy Jean-Michel,FRX, System for control of access to computer machines which are connected in a private network.
  170. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
  171. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, System for digital content access control.
  172. Bacha, Hamid; Carroll, Robert Bruce; Mirlas, Lev; Tchao, Sung Wei, System for electronic repository of data enforcing access control on data search and retrieval.
  173. Prokupets, Rudy; Regelski, Michael, System for integrating security and access for facilities and information systems.
  174. Prokupets,Rudy; Regelski,Michael, System for integrating security and access for facilities and information systems.
  175. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  176. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., System for providing users an integrated directory service containing content nodes located in different groups of application servers in computer network.
  177. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., System for providing users with a filtered view of interactive network directory obtains from remote properties cache that provided by an on-line service.
  178. Robert F. Groshon ; L. Aaron Philipp ; Jason C. Stone, Systems and methods for preventing transmission of compromised data in a computer network.
  179. Ellison Carl, Tamper resistant method and apparatus.
  180. Odom, Gary, User selectable signature.
  181. Alanara Seppo (Oulu FIX) Berson Thomas (Palo Alto CA), Variable security level encryption.
  182. Gobin, Parmeshwar; Hall, Henry Huntington; Hauryluck, Carla Reale; Kanze, Daniel Robert; Liburd, Steven William; Sandt, Kirk Van; Swei, Jia Huei, Web based integrated customer interface for invoice reporting.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로