$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Programmable distributed personal security 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0267788 (1994-06-28)
발명자 / 주소
  • Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX)
출원인 / 주소
  • National Semiconductor Corporation (Santa Clara CA 02)
인용정보 피인용 횟수 : 269  인용 특허 : 0

초록

The present invention is embodied in a Secured Processing Unit (SPU) chip, a microprocessor designed especially for secure data processing. By integrating keys, encryption/decryption engines and algorithms in the SPU, the entire security process is rendered portable and easily distributed across phy

대표청구항

A system for processing and storing sensitive information, including messages received and generated by the system and keys used to encrypt and decrypt the messages, and securing the information against potential attacks, the system comprising: (a) a cryptographic engine for performing cryptographic

이 특허를 인용한 특허 (269)

  1. Vasudevan, Barathram, Access techniques using a mobile communication device.
  2. Vasudevan, Barathram, Access techniques using a mobile communication device.
  3. Sutherland Mark J., Active erasure of electronically stored data upon tamper detection.
  4. Timothy J. Townsend, Adaptive countermeasure selection method and apparatus.
  5. Townsend, Timothy J., Adaptive countermeasure selection method and apparatus.
  6. Thomas, Anil Francis; Kramer, Michael; Costea, Mihai; Hudis, Efim; Bahl, Pradeep; Dadhia, Rajesh K.; Edery, Yigal, Aggregating the knowledge base of computer systems to proactively protect a computer from malware.
  7. Thomas, Anil Francis; Kramer, Michael; Costea, Mihai; Hudis, Efim; Bahl, Pradeep; Dadhia, Rajesh K; Edery, Yigal, Aggregating the knowledge base of computer systems to proactively protect a computer from malware.
  8. Candelore Brant, Anti-tamper bond wire shield for an integrated circuit.
  9. Sion, Radu, Anti-tamper system.
  10. Candelore, Brant, Apparatus and method for an iterative cryptographic block.
  11. Bhargava, Prashant; Arora, Mohit, Apparatus and method for decoupling asynchronous clock domains.
  12. Henry, G. Glenn; Parks, Terry, Apparatus and method for disabling a microprocessor that provides for a secure execution mode.
  13. Henry, G. Glenn; Parks, Terry, Apparatus and method for managing a microprocessor providing for a secure execution mode.
  14. Henry, G. Glenn; Parks, Terry, Apparatus and method for precluding execution of certain instructions in a secure execution mode microprocessor.
  15. Davis,Derek L., Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format.
  16. Rosen Sholom S., Apparatus and method for secure transacting.
  17. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  18. Asperger, Karl; Kiemes, Jochen; Lange, Roland; Lindinger, Andreas; Rombach, Gerhard, Arrangement comprising an integrated circuit.
  19. Rudelic, John, Authenticated operations and event counters.
  20. Devadas, Srinivas; Gassend, Blaise, Authentication of integrated circuits.
  21. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  22. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  23. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  24. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  25. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  26. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  27. Bernstein Jason D. ; Richardson Alexander D. ; Blodgett Paul W. ; McGuire Joseph P., Browser kiosk system.
  28. Bernstein Jason D. ; Richardson Alexander D. ; Blodgett Paul W. ; McGuire Joseph P., Browser kiosk system.
  29. Baker Thomas H., Calendar clock circuit for computer workstations.
  30. Mai Chao C. ; Scherpenberg Francis A. ; Hui Titkuan ; Mendenhall Wayne, Card cradle system and method.
  31. Marquot Alexis,FRX ; Tarbouriech Jean-Claude,FRX ; Dechamps Paul,FRX, Circuit and method of latching a bit line in a non-volatile memory.
  32. Stidl, Wolfgang; Rottschäfer, Thomas, Circuit arrangement and method for protecting electronic components against illicit manipulation.
  33. Manca, Mark; Woolsey, Les G., Communication with an external source application.
  34. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  35. Eskicioglu,Ahmet Mursit; Wehmeyer,Keith Reynolds; Virag,David Emery, Conditional access system for set-top boxes.
  36. Rubin, Owen Robert; Murray, Eric; Uhrig, Nalini Praba, Consumer product distribution in the embedded system market.
  37. Triandopoulos, Nikolaos; Brainard, John, Controlling user access to protected resource based on outcome of one-time passcode authentication token and predefined access policy.
  38. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Data security and access tracking in memory.
  39. Yin John, Data security system and method.
  40. Saito,Nobuyuki; Oka,Yoshimi, Data transfer control device, electronic instrument, and data transfer control method.
  41. Cross,David B.; Gu,Jianrong; Benaloh,Josh D.; Jones,Thomas C.; Leach,Paul J.; Pittaway,Glenn D., Deriving a symmetric key from an asymmetric key for file encryption or decryption.
  42. Cross,David B.; Gu,Jianrong; Benaloh,Josh D.; Jones,Thomas C.; Leach,Paul J.; Pittaway,Glenn D., Deriving a symmetric key from an asymmetric key for file encryption or decryption.
  43. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  44. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  45. Croguennec, Alexandre; Fusella, Yves, Detecting radiation-based attacks.
  46. Sin,Lim Eng, Die anti-tampering sensor.
  47. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  48. Tagawa, Kenji; Minami, Masataka; Kozuka, Masayuki, Digital data recording apparatus, digital data recording method, and computer-readable recording medium.
  49. Tagawa, Kenji; Minami, Masataka; Kozuka, Masayuki, Digital data recording apparatus, digital data recording method, and computer-readable recording medium.
  50. Tagawa,Kenji; Minami,Masataka; Kozuka,Masayuki, Digital data recording apparatus, digital data recording method, and computer-readable recording medium.
  51. Loubet Moundi, Philippe, Dynamic change of security configurations.
  52. Le An Van ; Sweet William B. ; Herbert Howard Crompton, Dynamic configuration of a secure processing unit for operations in various environments.
  53. Murray, Bruce, Electronic device provided with cryptographic circuit and method of establishing the same.
  54. Suominen, Edwin A, Encryption and authentication systems and methods.
  55. Suominen, Edwin A., Encryption and authentication systems and methods.
  56. Suominen, Edwin A., Encryption and authentication systems and methods.
  57. Suominen,Edwin A., Encryption and authentication systems and methods.
  58. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Error correction with non-volatile memory on an integrated circuit.
  59. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Flexible processors and flexible memory.
  60. Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  61. Vasic, Ognjen; Ansari, Suhail; Gan, Ping; Hu, Jinhui; Khulusi, Bassam; Madoukh, Adam A.; Tyshlek, Alexander, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  62. Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  63. Johnson, Barry W.; Olvera, Kristen R.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  64. Johnson, Barry W.; Riemenschneider, Kristen R. O.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  65. Johnson, Barry W.; Riemenschneider, Kristen R. O.; Russell, David C.; Tillack, Jonathan A., In-circuit security system and methods for controlling access to and use of sensitive data.
  66. Akashika, Hideki; Ogishima, Jun; Hanaki, Naofumi, Information management apparatus, information management method, and program for managing an integrated circuit.
  67. Felsher, David Paul, Information record infrastructure, system and method.
  68. Henry, G. Glenn; Parks, Terry, Initialization of a microprocessor providing for execution of secure code.
  69. Shona Yoshihiro,JPX, Integrated circuit for embedding in smart cards, and method of issuing smart cards.
  70. Horvat,Helmut; Wallstab,Stefan, Integrated security circuit.
  71. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Intelligent monitoring for computation in memory.
  72. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  73. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  74. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  75. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  76. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  77. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  78. Timothy Philip Richards GB, Key transformation unit for an IC card.
  79. Baweja Gunjeet, Maintaining a memory while in a power management mode.
  80. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Memory circuitry including computational circuitry for performing supplemental functions.
  81. Vergnes, Alain, Method and apparatus for a variable processing period in an integrated circuit.
  82. Baweja Gunjeet, Method and apparatus for logic and power isolation during power management.
  83. Kim, Jae Heon; Han, Jae Woo; Kim, Dong Chan; Park, Sang Woo, Method and apparatus for secure communication between cryptographic systems using real time clock.
  84. Treadwell, William S., Method and apparatus for the protection of information in a device upon separation from a network.
  85. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  86. Choukalos Charles N. ; Dean Alvar A. ; Tetreault Scott A. ; Ventrone Sebastian T., Method and circuit for providing copy protection in an application-specific integrated circuit.
  87. Choukalos, Charles N.; Dean, Alvar A.; Tetreault, Scott A.; Ventrone, Sebastian T., Method and circuit for providing copy protection in an application-specific integrated circuit.
  88. Thiebeauld de la Crouee, Hugues; Chamley, Oliver, Method and device for protection of a microcircuit against attacks.
  89. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  90. Conti, Gregory R., Method and system for preventing unauthorized processor mode switches.
  91. Stiles Ian James, Method and system of a computer system for establishing communications between a service provider and a central service factory and registry in a computer system.
  92. Bernabeu, Gil, Method and token for managing one processing relating to an application supported or to be supported by a token.
  93. Heiko Fibranz DE, Method for carrying out auto refresh sequences on a DRAM.
  94. Barau, Emmanuel; Granet, Olivier; Soquet, Patrick, Method for detecting an attempted attack, recording medium, and security processor for said method.
  95. Pellegrino, Frank J.; Fletcher, Robert W., Method for determining the risk associated with licensing or enforcing intellectual property.
  96. Schepers,J철rg, Method for preventing illegitimate use of chip cards.
  97. Case Jeffrey D., Method for secure key production.
  98. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  99. Schneider, Klaus; Knauss, Matthias; Poinstingl, Peter, Method of protecting a microcomputer system against manipulation of data stored in a memory arrangement.
  100. Pelletier, Hervé; Dumas, Pascal, Method, device and non-transitory computer readable storage medium for masking the end of life transition of a electronic device.
  101. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  102. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  103. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  104. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  105. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  106. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  107. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  108. Henry, G. Glenn; Parks, Terry, Microprocessor apparatus for secure on-die real-time clock.
  109. Henry, G. Glenn; Parks, Terry, Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels.
  110. Henry, G. Glenn; Parks, Terry, Microprocessor having internal secure memory.
  111. Henry, G. Glenn; Parks, Terry, Microprocessor having secure non-volatile storage access.
  112. Henry, G. Glenn; Parks, Terry, Microprocessor providing isolated timers and counters for execution of secure code.
  113. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  114. Sabella, Vito; Khoo, Aaron; Henry, Johnathon Christopher; Gu, Chao; Thompson, Ray, Multi-threaded detection of a game software debugger.
  115. Hoffberg, Steven M., Multifactorial optimization system and method.
  116. Reardon David C., Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place.
  117. Bender, Michael S.; Vibhuti, Shivaputtrappa; Klissner, Paul, Non-invasive testing of smart cards.
  118. McDonald John Robert ; Zeller John Lowell ; Gee Thomas Scott, Nonvolatile memory implementation for electronic devices.
  119. Henry, G. Glenn; Parks, Terry, On-die cryptographic apparatus in a secure microprocessor.
  120. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  121. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  122. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  123. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  124. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  125. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  126. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  127. Mangell,Efraim, Personalized hardware.
  128. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  129. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  130. Tilford Arthur R. ; Allen James D. ; Kuether David J., Portable satellite earth station.
  131. Kuether, David J.; Rosner, Rick; Schein, Steven M.; Morenstein, Joshua T.; Puttorngul, Pichaya; Edahiro, Naoya, Portable satellite earth station and methods of using the same.
  132. Rudelic, John, Power cycling event counters for invoking security action.
  133. Shapiro,Yigal; Elbaum,Reuven, Prevention of tampering in electronic devices.
  134. Henry, G. Glenn; Parks, Terry, Processor with non-volatile mode enable register entering secure execution mode and encrypting secure program for storage in secure memory via private bus.
  135. Harrison David Michael ; Greenwood ; Jr. James Edward ; Johns-Vano Kerry Lucille, Programmable cryptographic processing system and method.
  136. Pedersen, Bruce B., Programmable logic device with improved security.
  137. Bar On,Gershon, Protection of data on media recording disks.
  138. Bar On,Gershon, Protection of data on media recording disks.
  139. Bar-On, Gershon, Protection of data on media recording disks.
  140. Bar-On, Gershon, Protection of data on media recording disks.
  141. Marshall, Alan L.; Zargahi, Kamran Rajabi; Abel, Miller Thomas; Krishnan, Murali; Anantha, Anoop, Provisioning techniques.
  142. Freeny, Jr., Charles C., Proximity service provider system.
  143. Freeny, Jr., Charles C., Proximity service provider system.
  144. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Random number generator functions in memory.
  145. Walsh, James J., Real time clock (RTC) having several highly desirable timekeeping dependability and security attributes, and methods for accessing a register thereof.
  146. Hyde, Roderick A.; Pasch, Nicholas F.; Tegreene, Clarence T., Redundancy for loss-tolerant data in non-volatile memory.
  147. Mantin, Itsik; Grabovsky, Aharon, Robust cipher design.
  148. Andersson, Stefan; Johansson, Werner; Lindgren, Stefan, Secure digital certificate storing scheme for flash memory and electronic apparatus.
  149. Anantha, Anoop; Krishnan, Murali R.; Marshall, Alan L.; Zargahi, Kamran Rajabi; Abel, Miller Thomas, Secure element authentication.
  150. Galasso, Leonard J., Secure memory.
  151. Suominen, Edwin A., Secure messaging with disposable keys.
  152. Mantin, Itsik; Smith, Perry; Sella, Yaron; Waisbard, Erez, Secure read-write storage device.
  153. Mantin, Itsik; Smith, Perry; Sella, Yaron; Waisbard, Erez, Secure read-write storage device.
  154. Master, Paul L.; Murray, Eric; Mehegan, Joseph; Plunkett, Robert Thomas, Secure storage of program code for an embedded system.
  155. Whitfield, Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  156. Whitfield,Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  157. Kudelski, Andre, Secure system-on-chip.
  158. Kudelski, André, Secure system-on-chip.
  159. Kudelski, André, Secure system-on-chip.
  160. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  161. Erhart, George; Matula, Valentine; Skiba, David, Securing a device based on atypical user behavior.
  162. Kawaguchi,Kenichi, Semiconductor integrated circuit device, program delivery method, and program delivery system.
  163. Maletsky, Kerry David; Durant, David; Landreman, John; Badam, Balaji, Single pin communication mechanism.
  164. Maletsky, Kerry; Durant, David; Landreman, John; Badam, Balaji, Single pin communication mechanism.
  165. Grawrock,David W.; Poisner,David I., Sleep protection.
  166. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  167. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  168. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  169. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  170. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  171. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  172. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  173. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  174. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  175. French Jennifer ; Wilder Jone, System and method for authentication of network users.
  176. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  177. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  178. Jennifer French ; Jone Wilder, System and method for authentication of network users.
  179. French Jennifer ; Wilder Jone, System and method for authentication of network users and issuing a digital certificate.
  180. French Jennifer ; Wilder Jone, System and method for authentication of network users with preprocessing.
  181. Buer, Mark; Frank, Ed, System and method for authentication via a proximate device.
  182. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  183. Gillon,William M.; Perlman,Stephen G., System and method for conditional access key encryption.
  184. Hoffberg, Steven M., System and method for determining contingent relevance.
  185. Khulusi, Bassam; Vasic, Ognjen, System and method for dis-identifying sensitive information and associated records.
  186. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  187. Perlman, Stephen G., System and method for improved multi-stream multimedia transmission and processing.
  188. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  189. Perlman,Stephen G., System and method for multimedia content simulcast.
  190. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  191. Ryan, Jr., Frederick W., System and method for preventing differential power analysis attacks (DPA) on a cryptographic device.
  192. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  193. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  194. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  195. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  196. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  197. Fayad, Camil; Li, John K.; Sutter, Siegfried, System and method for providing dynamically authorized access to functionality present on an integrated circuit chip.
  198. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  199. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  200. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  201. Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A.; Twarog, Edward J., System and method for suppressing conducted emissions by a cryptographic device.
  202. Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A.; Twarog, Edward J., System and method for suppressing conducted emissions by a cryptographic device comprising an integrated circuit.
  203. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  204. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  205. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  206. Moran, Douglas B., System and method for using timestamps to detect attacks.
  207. Moran,Douglas B., System and method for using timestamps to detect attacks.
  208. Russell, David C.; Johnson, Barry W.; Olvera, Kristen R., System and methods for assignation and use of media content subscription service privileges.
  209. Russell, David C.; Johnson, Barry W.; Olvera, Kristen R., System and methods for assignation and use of media content subscription service privileges.
  210. Russell, David C.; Johnson, Barry W.; Olvera, Kristen R., System and methods for assignation and use of media content subscription service privileges.
  211. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  212. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  213. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  214. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  215. Tarnovsky, George V.; Tarnovsky, Christopher G., System for testing, verifying legitimacy of smart card in-situ and for storing data therein.
  216. Buer, Mark; Frank, Ed; Seshadri, Nambi, System, method, and apparatus for allowing a service provider system to authenticate that a credential is from a proximate device.
  217. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  218. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  219. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  220. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  221. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  222. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  223. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  224. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  225. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  226. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  227. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  228. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  229. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  230. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  231. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  232. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  233. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  234. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  235. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  236. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  237. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  238. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  239. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  240. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  241. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  242. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  243. Gillen,Robert Joseph; Grimes,Todd Scott, Tamper resistant circuit boards.
  244. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  245. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  246. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  247. Henry, G. Glenn; Parks, Terry, Termination of secure execution mode in a microprocessor providing for execution of secure code.
  248. Ecker, Robert Michael; Patil, Kaustubh R.; Hamilton, John Robert; Reinke, James D.; Davis, Timothy, Timing coordination of implantable medical sensor modules.
  249. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  250. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  251. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  252. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  253. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  254. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  255. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  256. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  257. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  258. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  259. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  260. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  261. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  262. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  263. Poisner,David I., Trusted system clock.
  264. Honarvar,Laurence Toraj; Witte,Brandon Raymond; Fatigante,Steve Chance; Harless,Gary Lynn, User authentication system and methods thereof.
  265. Colson, Christen J., Verification and authentication systems and methods.
  266. Colson, Christen J., Verification and authentication systems and methods.
  267. Suominen, Edwin A., Verification of signed digital documents.
  268. Suominen, Edwin A., Verification of signed video streams.
  269. Fusella, Yves; Croguennec, Alexandre, Verifying data integrity in a data storage device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로