$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for policy-based inter-realm authentication within a distributed processing system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/14
  • H04L-009/00
  • H04L-012/22
출원번호 US-0239669 (1994-05-09)
발명자 / 주소
  • Cheng Pau-Chen (Yorktown Heights NY) Luan Shyh-Wei (San Jose CA)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 317  인용 특허 : 0

초록

A system and method for defining a platform-independent policy framework for authentication of principals to servers in another realm, within a distributed data processing system. The present invention may be implemented on top of the Kerberos protocol, or any trusted third party network authenticat

대표청구항

In a distributed computing system wherein individual computers are linked together by a communication network, a method for inter-realm authentication comprising the steps of: a) requesting, by a client, an application server policy for an application server from a policy server; b) when a policy re

이 특허를 인용한 특허 (317)

  1. Hannel, Clifford Lee; May, Anthony, Access control.
  2. Libin, Phil; Micali, Silvio, Access control.
  3. Weller, Kevin D.; Ryan, Stephen W.; Hill, Peter R.; Manessis, Thomas J.; Lewis, Tony D.; Dominguez, Benedicto H.; Bray, Peter; Reno, James Donald; Redford, Liane; Levy, Philippe; Hill, Trudy, Account authentication service with chip card.
  4. Libin,Phil, Actuating a security system using a wireless device.
  5. Zuili Patrick,FRX ; Ice Edward, Adaptive communication system enabling dissimilar devices to exchange information over a network.
  6. Schneck Phyllis A. ; Schwan Karsten ; Chokhani Santosh, Adaptive data security system and method.
  7. Damico Thomas ; Kopelman Joshua ; Wamoglu Sheryl F. ; Weinberger Marvin I., Apparatus for capturing, storing and processing co-marketing information associated with a user of an on-line computer s.
  8. Schanze Martin Lee, Asynchronous message system for menu-assisted resource control program.
  9. Carter, Stephen R., Attested identities.
  10. Carter, Stephen R., Attested identities.
  11. Crane, Michael A.; Milman, Ivan Matthew, Authentication framework for managing authentication requests from multiple authentication devices.
  12. Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
  13. Albisu, Luis F.; Furst, Cheryl L.; Holloway, James W.; Hurr, Tien Y.; Lee, Jonathan C.; Wallace, Michael F.; Drake, II, Alton W., Authentication management platform for managed security service providers.
  14. McGarvey, John Ryan, Authentication method to enable servers using public key authentication to obtain user-delegated tickets.
  15. Dawson,Thomas Patrick, Authentication of mobile wireless network component.
  16. Barcelou, David M., Automated transaction machine.
  17. Barcelou, David M., Automated transaction machine.
  18. Barcelou, David M., Automated transaction machine.
  19. Barcelou, David M., Automated transaction machine.
  20. Barcelou, David M., Automated transaction machine.
  21. Barcelou, David M., Automated transaction machine.
  22. Barcelou, David M., Automated transaction machine.
  23. Barcelou, David M., Automated transaction machine.
  24. Barcelou, David M., Automated transaction machine.
  25. Barcelou, David M., Automated transaction machine.
  26. Barcelou, David M., Automated transaction machine.
  27. Barcelou, David M., Automated transaction machine.
  28. Barcelou, David M., Automated transaction machine.
  29. Barcelou, David M., Automated transaction machine.
  30. Barcelou, David M., Automated transaction machine.
  31. Barcelou, David M., Automated transaction machine.
  32. Barcelou, David M., Automated transaction machine.
  33. Barcelou, David M., Automated transaction machine.
  34. Barcelou, David M., Automated transaction machine.
  35. Barcelou, David M., Automated transaction machine.
  36. Barcelou, David M., Automated transaction machine.
  37. Barcelou, David M., Automated transaction machine.
  38. Petite, Thomas David; Huff, Richard M, Automotive diagnostic data monitoring systems and methods.
  39. David Buckley, Martin John; Ingo, Tambet; Mercado, Jose H.; Montero-Luque, Carlos Enrique, Autonomous policy discovery.
  40. Slate,Michael L., Cellular telephone download locker.
  41. Micali Silvio, Certificate issue lists.
  42. Micali Silvio, Certificate revocation system.
  43. Micali Silvio, Certificate revocation system.
  44. Micali, Silvio, Certificate revocation system.
  45. Algie, Teague S.; Viraraghavan, Praveen, Combining deduplication with locality for efficient and fast storage.
  46. Hartman, Peri; Bezos, Jeffrey P.; Kaphan, Sheldon J.; Spiegel, Joel R., Combining disparate purchases into a single purchase order for billing and shipment.
  47. Green, Christopher Samuel; Qureshi, Farhan Haleem; SenGupta, Sucharit; Soy, Nirmal Rajesh; Healy, Michael J., Conditional access to services based on device claims.
  48. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  49. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  50. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  51. Carter, Stephen R.; Burch, Lloyd Leon; Olds, Dale Robert, Crafted identities.
  52. Selman, Daniel; Bergman, Robert; O'Neil, Edward K., Data synchronization.
  53. Selman,Daniel; Bergman,Robert; O'Neil,Edward K., Data synchronization.
  54. Dawson, Thomas Patrick, De-authentication of network component.
  55. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  56. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  57. Crawford, James, Direct file transfer between subscribers of a communications system.
  58. Crawford,James, Direct file transfer between subscribers of a communications system.
  59. Crawford, James, Direct file transfer between subscribers of a communications systems.
  60. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  61. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  62. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  63. Engberg, David, Distributed delegated path discovery and validation.
  64. Carter,Stephen R, Distributed dynamic security for document collaboration.
  65. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  66. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  67. Petite, Thomas David; Huff, Richard M; Aldoretta, David P, Dual-mode communication devices, methods and systems.
  68. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  69. Micali,Silvio, Efficient certificate revocation.
  70. Sasmazel Levent M D ; Schneider David H., Electronic ticketing, authentication and/or authorization security system for internet applications.
  71. Griffin,Philip B.; Hallock,Troy; Posner,Brad; Osborne,Patrick; Libouban,Olivier; Devgan,Manish; Rohra,Ravi; Gupta,Jitendra; Sengupta,Somenath; Ma,Hung T.; Lin,Chengjiang, Enterprise application platform.
  72. Griffin,Philip B.; Hallock,Troy; Posner,Brad; Osborne,Patrick; Libouban,Olivier; Devgan,Manish; Rohra,Ravi; Gupta,Jitendra; Sengupta,Somenath; Ma,Hung T.; Lin,Chengjiang C., Enterprise application platform.
  73. Owen, James; Smith, Gregory P.; McCauley, Rodney; Toussaint, Alexandre; Conti, Joseph; Patadia, Jalpesh, Federated management of content repositories.
  74. Owen,James; Smith,Gregory; McCauley,Rodney; Toussaint,Alexander; Conti,Joseph; Patadia,Jalpesh, Federated management of content repositories.
  75. Maltz, David A.; Goldstein, Jonathan David; Greenberg, Albert; Loboz, Charles; Patel, Parveen K., Flexible and safe monitoring of computers.
  76. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  77. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  78. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  79. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  80. Sposetti, Jeffrey Thomas; Greysman, Lev, Groupware portlets for integrating a portal with groupware systems.
  81. Angel, Albert J., Hierarchical authentication process and system for financial transactions.
  82. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  83. Sprunk, Eric J.; Moroney, Paul; Medvinsky, Alexander; Anderson, Steven E.; Fellows, Jonathan A., Internet protocol telephony security architecture.
  84. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  85. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  86. Levergood,Thomas Mark; Stewart,Lawrence C.; Morris,Stephen Jeffrey; Payne,Andrew C.; Treese,George Winfield, Internet server access control and monitoring systems.
  87. Ilac, Cristian; Leach, Paul J.; Kamel, Tarek B.; Zhu, Liqiang, Kerberos ticket virtualization for network load balancers.
  88. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  89. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  90. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  91. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  92. Daniel Wayne Bertram ; David Paul Dutcher ; Scott Alan Lenharth ; James Michael Rolette, Jr. ; Stanley Alan Smith ; Courtney Joseph Spooner, Management of authentication discovery policy in a computer network.
  93. Grecsek Matthew T., Managing the risk of executing a software process using a capabilities assessment and a policy.
  94. Herbach, Jonathan D.; Koon, Betty Y., Mechanism for visible users and groups.
  95. Klug, John R., Media content notification via communications network.
  96. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  97. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  98. Schanze Martin Lee, Message control system for managing message response in a kerberos environment.
  99. Haverinen, Henry; Ahmavaara, Kalle, Method and apparatus enabling reauthentication in a cellular communication system.
  100. Graber Terry E. ; Kopelman Joshua ; Watkeys ; III Edwin Howell ; Weinberger Marvin I., Method and apparatus for attaching navigational history information to universal resource locator links on a world wide.
  101. deCarmo,Linden A., Method and apparatus for dynamically balancing call flow workloads in a telecommunications system.
  102. Mattaway Shane D. ; Hutton Glenn W. ; Strickland Craig B. ; Christensen Jan L., Method and apparatus for dynamically defining data communication utilities.
  103. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device.
  104. Mao,Yu Ming; Lian,Roger Jia Jyi; Huang,Guangsong; Cheung,Lee Chik, Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device.
  105. Montulli, Lou, Method and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes.
  106. Yip, Michael; Bagchi, Indranil; Bunker, Brian; Polo, Michael, Method and apparatus for network login authorization.
  107. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for password based authentication in a distributed system.
  108. Mattaway,Shane D.; Hutton,Glenn W.; Strickland,Craig B., Method and apparatus for providing caller identification based responses in a computer telephony environment.
  109. Graber Terry E. ; Kopelman Joshua ; Watkeys ; III Edwin Howell ; Weinberger Marvin I., Method and apparatus for redirecting a user to a new location on the world wide web using relative universal resource lo.
  110. Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
  111. Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
  112. Rich, Bruce Arland; Zhang, Xiaoyan, Method and apparatus for time synchronization in a network data processing system.
  113. Graber Terry E. ; Kopelman Joshua ; Watkeys ; III Edwin Howell ; Weinberger Marvin I., Method and apparatus for tracking the navigation path of a user on the world wide web.
  114. Dare Timothy S. (Damascus MD) Ek Eric B. (New Market MD) Luckenbaugh Gary L. (Gaithersburg MD), Method and system for authenticating users to multiple computer servers via a single sign-on.
  115. Orr, Douglas B.; Ptacek, Thomas Henry; Song, Douglas Joon, Method and system for authentication event security policy generation.
  116. Rathi, Manish; Sharma, Rajesh, Method and system for auto discovery of authenticator for network login.
  117. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Method and system for counting web access requests.
  118. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, Method and system for interacting with a virtual content repository.
  119. Bezos, Jeffrey P.; Mohit, Maryam; Prudente, James; McQueen, Colleen; Pope, Gene; Kaphan, Sheldon J., Method and system for placing a purchase order via a communications network.
  120. Hoon Chiat Lim SG; Kian Giap Lim SG; Yong Huat Sim SG, Method and system for providing cross-platform remote control, monitoring, and up-dating of a facility access controller.
  121. Barrett, Michael, Method and system for transmitting authentication context information.
  122. Barrett, Michael, Method and system for transmitting authentication context information.
  123. Barrett, Michael, Method and system for transmitting authentication context information.
  124. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  125. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  126. Barrett,Michael Richard, Method and system for transmitting authentication context information.
  127. Challener, David Carroll; Gettelfinger, Chad Lee; Goodman, Steven Dale; Ovies, Hernando; Springfield, Randall Scott; Ward, James Peter, Method and system for updating a root of trust measurement function in a personal computer.
  128. Rawat, Jai; Doundakova, Silvia; D'Sa, Oswald; Gordon, Julian; Kulkami, Renuka; Dhanapal, Vijayasankar; Gubbala, Srinivas; Raman, Santhosh; Anand, Rajiv, Method and system of automating data capture from electronic correspondence.
  129. Rawat, Jai; Doundakova, Silvia; D'sa, Oswald Dominic; Gordon, Julian; Kulkarni, Renuka; Dhanapal, Vijayasankar; Gubbala, Srinivas; Raman, Santhosh; Anand, Rajiv, Method and system of automating data capture from electronic correspondence.
  130. Rawat, Jai; Doundakova, Silvia; D'sa, Oswald Dominic; Gordon, Julian; Kulkarni, Renuka; Dhanapal, Vijayasankar; Gubbala, Srinivas; Raman, Santhosh; Anand, Rajiv, Method and system of automating data capture from electronic correspondence.
  131. Rawat, Jai; Gordon, Julian; Raman, Santhosh; Kulkami, Renuka; Anand, Rajiv; Doundakova, Silvia; Dhanapal, Vijayasankar; D'Sa, Oswald; Gubbala, Srinivas, Method and system of automating data capture from electronic correspondence.
  132. Rawat, Jai; Palnitkar, Samir, Method and system of implementing recorded data for automating internet interactions.
  133. Devgan, Manish; McCauley, Rodney, Method for delegated administration.
  134. Sasmazel Levent MD ; Schneider David H., Method for issuing a new authenticated electronic ticket based on an expired authenticated ticket and distributed server architecture for using same.
  135. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  136. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  137. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  138. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  139. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  140. Gray, Robert H M, Method for processing a request for access to a data network.
  141. Giraud, Jean-Luc; Girard, Pierre, Method for protecting personal data read in a terminal station by a server.
  142. Klug, John R.; Klug, Noah H., Method for providing node targeted content in an addressable network.
  143. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  144. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  145. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, Method for role and resource policy management optimization.
  146. Felger, David, Method of billing a purchase made over a computer network.
  147. Felger, David, Method of billing a purchase made over a computer network.
  148. Felger, David, Method of billing a purchase made over a computer network.
  149. Huitema, Christian; Mayfield, Paul G.; Swander, Brian D.; Bitan, Sara; Simon, Daniel R., Method of negotiating security parameters and authenticating users interconnected to a network.
  150. Swander, Brian D.; Bitan, Sara; Huitema, Christian; Mayfield, Paul G.; Simon, Daniel R., Method of negotiating security parameters and authenticating users interconnected to a network.
  151. Sasmazel, Levent M D; Schneider, David H., Method of using an electronic ticket and distributed server computer architecture for the same.
  152. Shanahan, Michael E., Methods and apparatus for programming user-defined information into electronic devices.
  153. Shanahan,Michael E., Methods and apparatus for programming user-defined information into electronic devices.
  154. Michael E. Shanahan, Methods and apparatuses for programming user-defined information into electronic devices.
  155. Shanahan, Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  156. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  157. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  158. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  159. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  160. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  161. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  162. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  163. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  164. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  165. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  166. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  167. Shanahan, Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  168. Shanahan,Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  169. Shanahan,Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  170. Shanahan,Michael E, Methods and apparatuses for programming user-defined information into electronic devices.
  171. Shanahan,Michael E., Methods and apparatuses for programming user-defined information into electronic devices.
  172. Brenneman, Robert J.; Browne, Michael E.; Huie, William J.; Sheppard, Sarah J.; Smith, Kyle M., Methods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith.
  173. Reed, Edwards E.; Acar, T Iga, Methods, systems, and data structures for loading and authenticating a module.
  174. Dominguez, Benedicto H.; Manessis, Thomas J.; Roth, Janet T.; Caillon, Pascal Achille; Spielman, Jason; Spielman, Terence; Reno, James Donald, Mobile account authentication service.
  175. Dominguez, Benedicto H.; Manessis, Thomas J.; Roth, Janet T.; Caillon, Pascal Achille; Spielman, Jason; Spielman, Terence; Reno, James Donald, Mobile account authentication service.
  176. Petite, Thomas David; Huff, Richard M, Mobile inventory unit monitoring systems and methods.
  177. Gerber, Gary E.; Lee, Timothy Mu-Chu, Multiple party benefit from an online authentication service.
  178. Dominguez, Benedicto H.; Manessis, Thomas J.; Reno, James Donald, Online account authentication service.
  179. Weller, Kevin D.; Ryan, Stephen W.; Hill, Peter R.; Manessis, Thomas J.; Lewis, Tony D.; Dominguez, Benedicto H.; Bray, Peter; Reno, James Donald, Online payer authentication service.
  180. Weller, Kevin D.; Ryan, Stephen W.; Hill, Peter R.; Manessis, Thomas J.; Lewis, Tony D.; Dominguez, Benedicto H.; Bray, Peter; Reno, James Donald, Online payer authentication service.
  181. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  182. Xue, Yonggang; Kan, Runtian; Xiao, Yuelei; Cao, Jun; Huang, Zhenhai; Wang, Ke; Zhang, Guoqiang; Yuan, Kelong; Zhu, Lin; Liu, Xiaoyong, Platform authentication strategy management method and device for trusted connection architecture.
  183. Bhat,Shivaram; Cui,Hua; Luo,Ping; Arumugam,Dilli Dorai Minnal; Ranganathan,Aravindan, Plugin architecture for extending polices.
  184. Carter, Stephen R; Burch, Lloyd Leon, Policy and attribute based access to a resource.
  185. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  186. Crawford, James, Preference based transferring of files.
  187. Dunn,Melissa W., Privacy policy change notification.
  188. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  189. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  190. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  191. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  192. Dominguez, Benedicto H.; Manessis, Thomas J.; Rutherford, Melody L.; Salvatori, Sandra; Roth, Janet T., Profile and identity authentication service.
  193. Crawford, James, Providing an indication that a user of a communications system is composing a message.
  194. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  195. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  196. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  197. Eldridge Alan D. ; Kaufman Charles W., Removable media for password based authentication in a distributed system.
  198. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  199. Mao, Yu Ming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  200. Mao, Yuming; Lian, Roger Jia-Jyi; Huang, Guangsong; Cheung, Lee Chik, Routing a packet by a device.
  201. Roger K. DeBry, SYSTEM, METHOD, AND PROGRAM FOR PROVIDING WILL-CALL CERTIFICATES FOR GUARANTEEING AUTHORIZATION FOR A PRINTER TO RETRIEVE A FILE DIRECTLY FROM A FILE SERVER UPON REQUEST FROM A CLIENT IN A NETWORK CO.
  202. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  203. Henry R. Tumblin ; Michael S. Rothman ; Fred J. Pinkett ; James M. Geary ; Steve R. Artick, Seamless integration of application programs with security key infrastructure.
  204. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  205. Whitaker, David James; Anspach, Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  206. Whitaker,David J; Anspach,Jonathan Paul, Secure segregation of data of two or more domains or trust realms transmitted through a common data channel.
  207. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  208. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  209. Calinov,Iulian D.; Dunn,Melissa W., Shared services management.
  210. Jonathan Woods ; Ed Wynne, Site access via intervening control layer.
  211. Schanze Martin Lee, Synchronous message control system in a Kerberos domain.
  212. Griffin,Philip B., System and method for XML data representation of portlets.
  213. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  214. Jolley,Chris; Giridhar,Sathyanarayana; Griffin,Philip B.; Howes,Jason; O'Neil,Edward K.; Patadia,Jalpesh, System and method for application flow integration in a portal framework.
  215. Dawson,Thomas Patrick; Desch,David, System and method for authenticating wireless component.
  216. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for content lifecycles in a virtual content repository that integrates a plurality of content repositories.
  217. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for controlling access to anode in a virtual content repository that integrates a plurality of content repositories.
  218. Smithline,Neil; Giridhar,Sathyanarayana, System and method for determining the functionality of a software application based on nodes within the software application and transitions between the nodes.
  219. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  220. Riggins,Mark D., System and method for encrypting and decrypting files.
  221. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  222. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  223. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  224. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  225. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  226. Griffin, Philip B.; Devgan, Manish; Toussaint, Alex; McCauley, Rod, System and method for hierarchical role-based entitlements.
  227. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  228. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for information lifecycle workflow integration.
  229. Riggins Mark D., System and method for installing and using a temporary certificate at a remote site.
  230. McVeigh,Ryan Sean; Roth,Steven Leslie; Patadia,Jalpesh; Saarva,Tanya; Zhou,Xiaojiang; Posner,Brad, System and method for lightweight loading for managing content.
  231. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  232. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  233. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  234. Petite, Thomas D.; Huff, Richard; Aldoretta, David P.; Stevens, Candida, System and method for monitoring remote devices with a dual-mode wireless communication protocol.
  235. Petite, Thomas David; Huff, Richard M; Aldoretta, David P; Stevens, Candida, System and method for monitoring remote devices with a dual-mode wireless communication protocol.
  236. Haut,John; Griffin,Philip B.; Patadia,Jalpesh; Willcox,Steven; Breeden,Timothy, System and method for portal page layout.
  237. McVeigh, Ryan Sean; Roth, Steven Leslie; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing SPI extensions for content management system.
  238. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for providing a lifecycle for information in a virtual content repository.
  239. Premkumar V. Uppaluru, System and method for providing and using universally accessible voice and speech data files.
  240. Uppaluru Premkumar V., System and method for providing and using universally accessible voice and speech data files.
  241. Uppaluru, Premkumar V., System and method for providing and using universally accessible voice and speech data files.
  242. McCauley,Rodney; Owen,James; Patadia,Jalpesh; Posner,Brad; Toussaint,Alexander, System and method for providing lifecycles for custom content in a virtual content repository.
  243. McVeigh, Ryan Sean; Roth, Steven L.; Patadia, Jalpesh; Saarva, Tanya; Zhou, Xiaojiang; Posner, Brad, System and method for providing nested types for content management.
  244. Gilhuly, Barry J.; Van, Ngoc Anh; Rahn, Steven M.; Mousseau, Gary P.; Lazaridis, Mihal, System and method for pushing information between a host system and a mobile data communication device.
  245. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  246. Mousseau,Gary P.; Ferguson,Tabitha K.; Linkert,Barry; Vander Veen,Raymond P.; Castell,William D.; Lazaridis,Mihal, System and method for pushing information from a host system to a mobile data communication device.
  247. Mousseau,Gary P.; Lazaridis,Mihal, System and method for redirecting message attachments between a host system and a mobile data communication device.
  248. Griffin,Philip B.; Devgan,Manish; Howes,Jason; Dunbar,Scott, System and method for rule-based entitlements.
  249. McCauley, Rodney; Owen, James; Bales, Christopher E., System and method for schema lifecycles in a virtual content repository that integrates a plurality of content repositories.
  250. Patrick,Paul, System and method for server security and entitlement processing.
  251. Petite, Thomas David, System and method for transmitting an emergency message over an integrated wireless network.
  252. Petite, Thomas David, System and method for transmitting an emergency message over an integrated wireless network.
  253. Petite, Thomas David, System and method for transmitting an emergency message over an integrated wireless network.
  254. Petite, Thomas D., System and method for transmitting pollution information over an integrated wireless network.
  255. Petite, Thomas D., System and method for transmitting pollution information over an integrated wireless network.
  256. Petite, Thomas David, System and method for transmitting pollution information over an integrated wireless network.
  257. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  258. Riggins, Mark D., System and method for using an authentication applet to identify and authenticate a user in a computer network.
  259. McCauley,Rodney; Owen,James; Bales,Christopher E., System and method for viewing a virtual content repository.
  260. Smith,Greg; Olander,Daryl B.; Stamm,Tom; Bergman,Robert; Cook,Thomas A., System and method for web-based personalization and ecommerce management.
  261. Peterka, Petr; Medvinsky, Alexander, System for digital rights management using distributed provisioning and authentication.
  262. Petite, Thomas D., Systems and methods for controlling communication between a host computer and communication devices.
  263. Petite, Thomas David, Systems and methods for controlling communication between a host computer and communication devices.
  264. Petite, Thomas David, Systems and methods for controlling communication between a host computer and communication devices.
  265. Brownrigg, Edwin B., Systems and methods for facilitating wireless network communication, satellite-based wireless network systems, and aircraft-based wireless network systems, and related methods.
  266. Brownrigg, Edwin B., Systems and methods for facilitating wireless network communication, satellite-based wireless network systems, and aircraft-based wireless network systems, and related methods.
  267. Petite, Thomas D., Systems and methods for monitoring and controlling remote devices.
  268. Petite, Thomas D., Systems and methods for monitoring and controlling remote devices.
  269. Petite, Thomas David; Huff, Richard M, Systems and methods for monitoring and controlling remote devices.
  270. Petite, Thomas David; Huff, Richard M., Systems and methods for monitoring and controlling remote devices.
  271. Petite, Thomas D., Systems and methods for monitoring conditions.
  272. Petite, Thomas D., Systems and methods for monitoring conditions.
  273. Petite, Thomas David, Systems and methods for monitoring conditions.
  274. Petite, Thomas David; Huff, Richard M, Systems and methods for monitoring vehicle parking.
  275. Bales, Christopher E.; Mueller, Jeffrey; Owen, James; Patadia, Jalpesh; Olson, Nathan; Devgan, Manish; Noonan, Timothy, Systems and methods for personalizing a portal.
  276. Petite, Thomas David, Systems and methods for providing emergency messages to a mobile device.
  277. Petite, Thomas David, Systems and methods for providing emergency messages to a mobile device.
  278. Woods,Jonathan; Wynne,Ed, Systems and methods for site access.
  279. Jablon,David P., Systems, methods and software for remote password authentication using multiple servers.
  280. Burch, Lloyd Leon; Earl, Douglas G.; Carter, Stephen R; Ward, Robert Mark, Techniques for dynamically establishing and managing authentication and trust relationships.
  281. Burch,Lloyd Leon; Earl,Douglas G.; Carter,Stephen R.; Ward,Robert Mark, Techniques for dynamically establishing and managing authentication and trust relationships.
  282. Burch,Lloyd Leon; Earl,Douglas G.; Carter,Stephen R, Techniques for dynamically establishing and managing trust relationships.
  283. Kinser, Stephen Hugh; Burch, Lloyd Leon; Carter, Stephen R., Techniques for providing role-based security with instance-level granularity.
  284. M'Raihi, David; Bajaj, Siddharth; Popp, Nicolas, Token sharing system and method.
  285. Crawford, James, Transferring files.
  286. Crawford, James, Transferring files.
  287. Crawford, James, Transferring files.
  288. Crawford, James, Transferring files.
  289. Micali Silvio, Tree-based certificate revocation system.
  290. Micali Silvio, Tree-based certificate revocation system.
  291. Reed Mark Joseph ; Arnovitz David A. ; Watt Charles ; Jacobs William Reese, Trusted gateway agent for web server programs.
  292. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  293. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  294. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  295. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  296. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  297. Bhat,Shivaram; Nelson,James F., Uniform resource locator access management and control system and method.
  298. Crawford, James, Updating transferred files.
  299. Dunn,Melissa W., User editable consent.
  300. Owen, James; Conti, Joseph; Choe, Chang; Patadia, Jalpesh; Smith, Gregory, Virtual content repository application program interface.
  301. Patadia, Jalpesh; McCauley, Rodney; Toussaint, Alexander, Virtual content repository browser.
  302. Owen,James; Choe,Chang, Virtual repository complex content model.
  303. Owen,James; Choe,Chang, Virtual repository content model.
  304. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen J.; Payne, Andrew C.; Treese, George W., Web advertising method.
  305. Bales, Christopher E.; Musson, Scott; Patadia, Jalpesh; Beecroft, Troy, Web service-enabled portlet wizard.
  306. John F. W. Hunt ; Benedict T. S. Gladstone ; Kief S. Morris GB; Patrick B. Kalaher ; Mark A. Byrn IE; Esa Moilanen CH; Peter R. Lidwell GB, Web site registration proxy system.
  307. Petite, David, Wireless network protocol system and methods.
  308. Petite, David, Wireless network protocol systems and methods.
  309. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  310. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  311. Brownrigg, Edwin B.; Wilson, Thomas W., Wireless network system and method for providing same.
  312. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  313. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  314. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  315. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  316. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  317. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로