$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for data recovery 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/08
  • H04L-009/30
출원번호 US-0390959 (1995-02-21)
발명자 / 주소
  • Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD)
출원인 / 주소
  • Trusted Information Systems, Inc. (Glenwood MD 02)
인용정보 피인용 횟수 : 227  인용 특허 : 0

초록

A system and method for dam escrow cryptography are described. An encrypting user encrypts a message using a secret storage key (KS) and attaches a data recovery field (DRF), including an access rule index (ARI) and KS, to the encrypted message. The DRF and the encrypted message are stored in a stor

대표청구항

A controller for enabling a processor to process a request from an emergency decrypting user to gain access to user secret data in a data recovery field, the data recovery field comprising the user secret data and an access rule index encrypted using a data recovery center public key, wherein emerge

이 특허를 인용한 특허 (227)

  1. Proctor, Paul E., Adaptive feedback security system and method.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  8. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  9. Sekar Chandersekaran ; Sohail Malik ; Michael Muresan ; Narayanan Vasudevan, Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery.
  10. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  11. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  12. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  13. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  14. Adam Lucas Young ; Marcel Mordechay Yung, Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys.
  15. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  16. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems with fast key generation.
  17. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  18. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys.
  19. Adam Lucas Young ; Marcel Mordechay Yung, Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys.
  20. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  21. England,Paul, Client-side boot domains and boot rules.
  22. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  23. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  24. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  25. Shostack Adam ; Allouch David,ILX, Computer security.
  26. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  27. Wasilewski Anthony J. ; Pinder Howard G. ; Akins ; III Glendon L. ; Palgon Michael S., Conditional access system.
  28. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  29. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  30. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  31. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  32. Zimmermann Philip, Cryptographic system with methods for user-controlled message recovery.
  33. Zimmermann,Philip, Cryptographic system with methods for user-controlled message recovery.
  34. Miller, Ethan; Colgrove, John; Hayes, John, Data protection in a storage system using external secrets.
  35. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  36. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  37. Hori, Yoshihiro; Hioki, Toshiaki; Kanamori, Miwa; Yoshikawa, Takatoshi; Takemura, Hiroshi; Hasebe, Takayuki; Hatakeyama, Takahisa; Tonegawa, Tadaaki; Anazawa, Takeaki, Device for reproducing data.
  38. Kaufman Charles W. ; Matyas ; Jr. Stephen M., Differential work factor cryptography method and system.
  39. Brickell,Ernie F., Distribution of secured information.
  40. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  41. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  42. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  43. Iwamura, Keiichi, Embedding information in digital image data.
  44. Niwa, Akito; Kawamura, Shinichi; Aoki, Megumi; Saisho, Toshiaki; Ishihara, Tatsuya; Sano, Fumihiko; Hori, Satomi, Encryption apparatus, cryptographic communication system, key recovery system, and storage medium.
  45. Howard G. Pinder ; Michael S. Palgon, Encryption devices for use in a conditional access system.
  46. Sako Kazue,JPX ; Miyauchi Hiroshi,JPX, Encryption key processing system to be incorporated into data recovery system or key setting system for generating encryption key.
  47. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  48. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  49. Iwamura,Keiichi, Extracting embedded information from digital image data.
  50. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  51. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  52. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  53. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  54. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  55. Rossmann, Alain, Hybrid systems for securing digital assets.
  56. Felsher, David Paul, Information record infrastructure, system and method.
  57. Gressel Carmi David,ILX ; Dror Itai,ILX, Internationally regulated system for one to one cryptographic communications with national sovereignty without key escr.
  58. Gressel Carmi David (Kvutzat Urim ILX) Dror Itai (Beersheva ILX), Internationally regulated system for one to one cryptographic communications with national sovereignty without key escro.
  59. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  60. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system.
  61. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  62. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  63. Udupi, Poornaprajna; Chan, Jason; Zarfoss, Jay, Key generation and broadcasting.
  64. Udupi, Poornaprajna; Chan, Jason; Zarfoss, Jay, Key generation and broadcasting.
  65. Udupi, Poornaprajna; Chan, Jason; Zarfoss, Jay, Key generation and broadcasting.
  66. Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Yamazaki Masashi,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Seiko,JPX ; Morita Ichirou,JPX ; Torii Naoya,JPX ; Ando Hiroyuki,JPX ; Kuroda Yasutsu, Key recovery condition encryption and decryption apparatuses.
  67. Denis Pinkas FR, Key recovery process used for strong encryption of messages.
  68. Ando Hiroyuki,JPX ; Morita Ichirou,JPX ; Kuroda Yasutsugu,JPX ; Torii Naoya,JPX ; Yamazaki Masashi,JPX ; Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Sei, Key recovery system.
  69. Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Seiko,JPX ; Ando Hiroyuki,JPX ; Morita Ichirou,JPX ; Kuroda Yasutsugu,JPX ; Torii Naoya,JPX ; Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Yamazaki Masas, Key recovery system and key recovery method.
  70. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  71. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  72. Ito, Atsushi; Beniyama, Nobuo; Mizote, Yuji; Kuroda, Takaki, Management system for outputting information denoting recovery method corresponding to root cause of failure.
  73. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  74. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  75. Nord, Joseph H.; Hoy, David Randal, Method and a system for responding locally to requests for file metadata associated with files stored remotely.
  76. Van Oorschot Paul C.,CAX ; Moses Timothy E.,CAX, Method and apparatus for access to user-specific encryption information.
  77. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  78. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  79. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  80. Al-Salqan, Yahya Y, Method and apparatus for encoding keys.
  81. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  82. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  83. Perlman Radia J., Method and apparatus for implementing partial and complete optional key escrow.
  84. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  85. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  86. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  87. Berenzweig, Adam L., Method and apparatus for performing authentication in communication systems.
  88. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
  89. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  90. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  91. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  92. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  93. Al-Salqan, Yahya Y, Method and apparatus for recovering encryption session keys.
  94. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  95. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  96. Garcia,Denis Jacques Paul, Method and apparatus for securing digital assets.
  97. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  98. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  99. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  100. Gennaro Rosario ; Karger Paul Ashley ; Matyas ; Jr. Stephen Michael ; Peyravian Mohammad ; Safford David Robert ; Zunic Nevenko, Method and apparatus for verifiably providing key recovery information in a cryptographic system.
  101. Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
  102. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  103. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  104. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  105. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  106. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  107. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  108. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  109. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  110. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  111. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  112. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  113. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  114. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method and system for locating and accessing resources.
  115. Vainstein, Klimenty, Method and system for managing security tiers.
  116. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  117. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  118. Nath, Satyajit, Method and system for providing document retention using cryptography.
  119. Nath, Satyajit, Method and system for providing document retention using cryptography.
  120. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  121. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  122. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  123. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  124. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  125. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  126. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  127. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  128. Smith, Roger A.; Breternitz, Jr., Mauricio, Method for key escrow in a communication system and apparatus therefor.
  129. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  130. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  131. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  132. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  133. Muir, Jeff; Stergiades, Andrew, Methods and apparatus for making a hypermedium interactive.
  134. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  135. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  136. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  137. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  138. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  139. Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
  140. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  141. Chinta, Madhav; Raj, Sam Arun, Methods and systems for launching applications into existing isolation environments.
  142. Chinta, Madhav; Raj, SamArun, Methods and systems for launching applications into existing isolation environments.
  143. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  144. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  145. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  146. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  147. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  148. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  149. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  150. Rivera, Juan; Corbett, Tim; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  151. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  152. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  153. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  154. Miller, Ethan; Colgrove, John; Hayes, John, Multi-drive cooperation to generate an encryption key.
  155. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  156. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  157. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  158. Hoffberg, Steven M., Multifactorial optimization system and method.
  159. Friedman Aharon ; Bozoki Eva, Network security device.
  160. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  161. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  162. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  163. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  164. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  165. Slavin Keith R., Public key cryptographic system having differential security levels.
  166. Slavin Keith R., Public key cryptographic system having nested security levels.
  167. McGrew David A. ; Carman David W., Publicly verifiable key recovery.
  168. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  169. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  170. Akins ; III Glendon L. ; Banker Robert O. ; Palgon Michael S. ; Pinder Howard G. ; Wasilewski Anthony J., Representing entitlements to service in a conditional access system.
  171. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  172. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  173. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  174. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  175. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  176. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  177. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  178. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  179. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  180. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  181. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  182. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  183. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  184. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  185. Prihoda, Heinz; Schmidt, Volker; Striebel, Werner; Becker, Michael; Lijzer, Gregor De, Secure data processing method.
  186. Andivahis,Dimitrios Emmanouil; Carnell,Shawn Michael Edwards; Fischer,Addison McElroy; Wettlaufer,Albert John, Secure electronic messaging system requiring key retrieval for deriving decryption keys.
  187. Garcia,Denis Jacques Paul, Secured data format for access control.
  188. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  189. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  190. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  191. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  192. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  193. Colgrove, John; Miller, Ethan; Hayes, John, Storage array password management.
  194. Robert Frederic Kern ; Mark Anthony Sovik, Storage controller conditioning host access to stored data according to security key stored in host-inaccessible metadata.
  195. Robert Frederic Kern ; Mark Anthony Sovik, Storage system with data-dependent security.
  196. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
  197. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  198. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  199. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  200. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  201. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  202. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  203. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  204. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  205. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  206. Hoffberg, Steven M., System and method for determining contingent relevance.
  207. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  208. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  209. Friedman Aharon ; Levy Ben Zion, System and method for preventing a first node from being emulated by another node.
  210. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  211. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  212. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  213. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  214. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  215. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  216. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  217. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  218. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  219. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  220. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  221. Beimel Amos,ILX ; Chor Ben-Zion,ILX, System for reconstruction of a secret shared by a plurality of participants.
  222. David Alfred Romrell, System for recovering from disruption of a data transfer.
  223. malik Sohail ; Muresan Michael, System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver.
  224. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  225. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  226. Gennaro Rosario ; Johnson Donald Byron ; Karger Paul Ashley ; Matyas ; Jr. Stephen Michael ; Peyravian Mohammad ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Two-phase cryptographic key recovery system.
  227. Pinder Howard G. ; Palgon Michael S. ; Akins ; III Glendon L. ; Banker Robert O., Verification of the source of program information in a conditional access system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로