$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for certificate based alias detection 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04Q-001/00
출원번호 US-0358040 (1994-12-15)
발명자 / 주소
  • Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA)
출원인 / 주소
  • Digital Equipment Corporation (Maynard MA 02)
인용정보 피인용 횟수 : 261  인용 특허 : 0

초록

A distributed computer system employs certificate based alias detection to ensure a policy of separation of duties. Biometric information is collected during computer user account creation that is converted to canonical form and digitized. This digitized canonical form, along with account data and a

대표청구항

A method of operating a distributed computer system having alias detection, comprising the steps of: A) storing, in a user account store of said computer system, identification information associated with each of a plurality of user accounts, said identification information for each said user accoun

이 특허를 인용한 특허 (261)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Hannel, Clifford Lee; May, Anthony, Access control.
  6. Saeedi, Ehsan; Ehyaie, Danial; Ho, Harvey, Access management and resource sharing system based on biometric identity.
  7. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  11. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  12. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  13. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  14. Tsukamura, Yoshihiro; Funahashi, Takeshi, Authentication system, fingerprint identification unit, and authentication method.
  15. Jonas, Jeffrey J., Authorized anonymous authentication.
  16. Jonas, Jeffrey J., Authorized anonymous authentication.
  17. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Biometric based multi-party authentication.
  18. Musgrave Clyde, Biometric certifying authorities.
  19. Musgrave,Clyde, Biometric certifying authorities.
  20. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  21. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  22. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  23. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  24. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  25. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  26. Slate,Michael L., Cellular telephone download locker.
  27. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  28. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  29. Doyle Ronald Patrick ; Hind John Raithel ; King Julie Hayes, Certificate based security in SNA data flows.
  30. Paulino, Roderick Carlos, Common organization estimation at registration.
  31. Rouse, John D.; Delaney, Raymond P., Confidence-based authentication.
  32. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  33. Bjorn, Vance C.; Lopez, Daniel, Crypto-proxy server and method of using the same.
  34. Jonas,Jeffrey James, Data set comparison and net change processing.
  35. Obilisetty, Sridhar, Definition and distribution of business rules while enforcing syntactic and semantic validation.
  36. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  37. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information.
  38. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  39. Ateniese, Giuseppe; Chiaramonte, Michael T.; Treat, David; Magri, Bernardo; Venturi, Daniele, Distributed key secret for rewritable blockchain.
  40. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan, Dynamic creation of a user account in a client following authentication from a non-native server domain.
  41. Sethi, Vincent, Electronic vouchers and a system and method for issuing the same.
  42. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  43. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  44. Yamaguchi Masahiko,JPX ; Ooka Yasuo,JPX ; Uchida Naoya,JPX ; Ogawa Atsushi,JPX ; Taniguchi Kiyohide,JPX, Fingerprint registering method and fingerprint checking device.
  45. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  46. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  47. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  48. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  49. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  50. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  51. Deputat, Jurij M.; Ponessa, Steven J., Identifying and resolving separation of duties conflicts in a multi-application environment.
  52. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  53. Asano, Tomoyuki, Information processing apparatus, information processing method, and program.
  54. Felsher, David Paul, Information record infrastructure, system and method.
  55. Feller, Todd Stacy Leo, Initiating operating system commands based on browser cookies.
  56. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  57. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  58. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  59. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  60. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  61. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  62. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  63. Wallace, Colleen; Friman, Harry; Chou, Gee Kin; Devin, Beth; Chapman, Janet, Method and apparatus for a new accounts program.
  64. Lange, Daniel H., Method and apparatus for electro-biometric identity recognition.
  65. Lange,Daniel H., Method and apparatus for electro-biometric identity recognition.
  66. Wallace, Colleen; Friman, Harry; Chou, Gee Kin; Devin, Beth; Chapman, Janet, Method and apparatus for new accounts program.
  67. Foltz Richard Campbell ; Gengler William Harold ; Lucas ; Jr. Joseph Christopher ; Meegan John Vincent ; Reish Troy Gary ; Rolette ; Jr. James Michael, Method and apparatus for resource management for a lan server enterprise.
  68. Roux, Pierre; Fratti, Marco; Nakhjiri, Madjid F., Method and apparatus for user authentication.
  69. Bjorn,Vance C., Method and apparatus for using a third party authentication server.
  70. Bush, Steve; Jung, Edward; Knight, Holly, Method and system for account management.
  71. Mikhail,Grinshetyn; Chang,Matthias E.; Wong,Hok Yee; Chao,Anthony; Graham,Mark, Method and system for data capture with hidden applets.
  72. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for delayed cookie transmission in a client-server architecture.
  73. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for determining receipt of a delayed cookie in a client-server architecture.
  74. Miura, Junichi, Method and system for electronic authentification.
  75. O'Leary, Denis; D'Agostino, Vincent; Re, S. Richard; Burney, Jessica; Hoffman, Adam, Method and system for processing internet payments.
  76. Prager, Scott Howard, Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information.
  77. Rosenberg,Greg, Method and system for signing and authenticating electronic documents.
  78. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  79. Flink,Yona; Gerber,Itzhak; Maroely,Yariv, Method for carrying out secure digital signature and a system therefor.
  80. Narayanan,Lakshmi, Method for controlled and audited access to privileged accounts on computer systems.
  81. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  82. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  83. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  84. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  85. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  86. Bublitz Hermann,DEX ; Rindtorff Klaus,DEX, Method for simplifying communication with chip cards.
  87. Shanahan, Michael E., Methods and apparatus for programming user-defined information into electronic devices.
  88. Shanahan,Michael E., Methods and apparatus for programming user-defined information into electronic devices.
  89. Michael E. Shanahan, Methods and apparatuses for programming user-defined information into electronic devices.
  90. Shanahan, Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  91. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  92. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  93. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  94. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  95. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  96. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  97. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  98. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  99. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  100. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  101. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  102. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  103. Shanahan,Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  104. Shanahan,Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  105. Shanahan,Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  106. Shanahan,Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  107. Bowie Britton,Simon, Methods and systems for managing successful completion of a network of processes.
  108. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  109. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  110. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  111. Mann, II,William Frederick; Hirka,Jeffrey L., Methods for providing cardless payment.
  112. Hoffberg, Steven M., Multifactorial optimization system and method.
  113. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  114. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  115. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  116. Takahashi, Hideo; Nitta, Jun; Tasaka, Mitsunobu; Takeda, Kei, Personal information controlling method and personal information controlling apparatus.
  117. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  118. Benson, Glenn Stuart; Calaceto, Joseph R.; Logar, Russell M., Portable security transaction protocol.
  119. Lowensohn,Brent A.; Bellenger,David A.; Braun,Jimmy E.; Grosser,Richard C.; Thompson,David L.; Woodmancy,William J.; Pomerantz,Steven R., Portable wireless access to computer-based systems.
  120. Jonas, Jeffrey J., Post-anonymous fuzzy comparisons without the use of pre-anonymization variants.
  121. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  122. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  123. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  124. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  125. Jonas, Jeffrey J., Real time data warehousing.
  126. Jonas, Jeffrey James, Real time data warehousing.
  127. Jonas, Jeffrey James, Real time data warehousing.
  128. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  129. Nakamura, Hiroshi; Fujii, Teruko; Sadakane, Tetsuo; Baba, Yoshimasa, Remote authentication system.
  130. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  131. Ateniese, Giuseppe; Chiaramonte, Michael T.; Treat, David; Magri, Bernardo; Venturi, Daniele, Rewritable blockchain.
  132. Henry R. Tumblin ; Michael S. Rothman ; Fred J. Pinkett ; James M. Geary ; Steve R. Artick, Seamless integration of application programs with security key infrastructure.
  133. Jonas, Jeffrey J.; Dunham, Steven Bruce, Secure coordinate identification method, system and program.
  134. Libenzi, Davide; Kouznetsov, Victor, Secure signature server system and associated method.
  135. Garg, Praerit; Dyke, Cliff Van; Jaganathan, Karthik; Pustilnik, Mark; Schmidt, Donald E., Selective cross-realm authentication.
  136. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  137. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  138. Magennis,Gerard; Buchendorfer,Thomas, Setuid-filter method for providing secure access to a credentials store for computer systems.
  139. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  140. Maehiro, Kazutoyo, Status notifying method in communication system, status notifying server and communication system.
  141. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  142. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Hilton, Walter J.; Szebenyi, Joshua, System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components.
  143. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  144. Benson, Glenn S., System and method for anti-phishing authentication.
  145. Benson, Glenn S., System and method for anti-phishing authentication.
  146. Benson, Glenn S., System and method for anti-phishing authentication.
  147. Benson, Glenn S., System and method for anti-phishing authentication.
  148. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  149. Davida, George I., System and method for authenticated and privacy preserving biometric identification systems.
  150. Davida, George I.; Frankel, Yair, System and method for authenticated and privacy preserving biometric identification systems.
  151. Musgrave Clyde ; Dulude Robert S., System and method for authenticating electronic transactions using biometric certificates.
  152. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  153. Brown, Timothy J.; Jensen, Gregory C.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  154. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  155. Gendler, Joseph, System and method for automatic financial project management.
  156. Hoffberg, Steven M., System and method for determining contingent relevance.
  157. Bisbee Stephen F. ; Moskowitz Jack J. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission storage and retrieval of authenticated documents.
  158. Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
  159. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  160. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  161. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  162. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  163. Warren, Mary Carter; Barrett, Donna M.; Schmitt, Donald H.; Ehemann, Karen R., System and method for establishing or modifying an account with user selectable terms.
  164. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  165. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  166. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  167. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  168. Allen, Brian J.; Buroker, Bruce A.; Flood, John P.; Gentz, Scott A.; Lidman, Gina M.; Teichman, William J., System and method for generating graphical user interface.
  169. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  170. Stratigos William N. ; Mann Richard L., System and method for integrating paper-based business documents with computer-readable data entered via a computer network.
  171. Stratigos, William N.; Mann, Richard L., System and method for integrating paper-based business documents with computer-readable data entered via a computer network.
  172. Scott, Kelly W., System and method for network-based project management.
  173. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  174. Skingle, Bruce James, System and method for portal infrastructure tracking.
  175. Skingle,Bruce James, System and method for portal infrastructure tracking.
  176. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  177. Allen, Brian J.; Buroker, Bruce A.; Flood, John P.; Gentz, Scott A.; Lidman, Gina M.; Teichman, William J., System and method for processing applicant input information.
  178. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  179. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  180. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  181. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  182. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  183. Premkumar V. Uppaluru, System and method for providing and using universally accessible voice and speech data files.
  184. Uppaluru Premkumar V., System and method for providing and using universally accessible voice and speech data files.
  185. Uppaluru, Premkumar V., System and method for providing and using universally accessible voice and speech data files.
  186. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  187. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  188. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  189. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  190. Bowers,Theodore J.; Ilijasic,Dean; Sanders,Shelley F., System and method for providing discriminated content to network users.
  191. Gendler,Joseph, System and method for providing funding approval associated with a project based on a document collection.
  192. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  193. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  194. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  195. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  196. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  197. Lehman, Dean K.; McCullough, Joseph R.; Orth, Nancy A., System and method for sending money via E-mail over the internet.
  198. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  199. Skingle,Bruce James, System and method for single session sign-on with cryptography.
  200. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  201. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  202. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  203. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  204. Ellmore,Kimberly, System and method for single sign on process for websites with multiples applications and services.
  205. Colcord, Brian, System and method for testing applications.
  206. Ellingson,Robert E., System and method for thwarting identity theft and other identity misrepresentations.
  207. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  208. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  209. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  210. Musgrave, Clyde; Cambier, James L., System and method of fast biometric database searching using digital certificates.
  211. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  212. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  213. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  214. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  215. Mann, III,William Frederick; Hirka,Jeffrey L., System for providing cardless payment.
  216. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  217. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  218. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  219. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  220. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  221. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  222. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  223. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  224. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  225. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  226. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  227. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  228. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  229. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  230. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  231. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  232. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  233. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  234. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  235. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  236. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  237. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  238. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  239. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  240. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  241. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  242. Kao, I-Lung, Techniques for implementing separation of duties using prime numbers.
  243. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  244. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  245. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  246. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  247. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  248. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  249. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  250. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  251. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  252. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  253. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  254. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  255. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  256. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  257. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  258. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  259. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  260. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  261. Murphy Michael D., Vehicle use control.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로