$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for secure remote authentication in a public network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0253802 (1994-06-03)
발명자 / 주소
  • Aziz Ashar (Fremont CA)
출원인 / 주소
  • Sun Microsystems, Inc. (Mountain View CA 02)
인용정보 피인용 횟수 : 147  인용 특허 : 0

초록

A client workstation provides a login address as an anonymous ftp (file transfer protocol) request, and a password as a user\s e-mail address. A destination server compares the user\s e-mail address provided as a password to a list of authorized users\addresses. If the user\s e-mail address is locat

대표청구항

A method for user authentication between a first computer and a second computer, comprising the steps of: providing an element for performing the step of said first computer providing a first request to said second computer, said first request including a user identification code identifying a user

이 특허를 인용한 특허 (147)

  1. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  2. Benjamin K. Gibbs, Apparatus and method for an authenticated electronic userid.
  3. Lurie, Steven; Faber, Scott; Van der Linden, Sean, Apparatus and method for ensuring a real-time connection between users and selected service provider using voice mail.
  4. Lurie, Steven; Faber, Scott; Van der Linden, Sean, Apparatus and method for ensuring a real-time connection between users and selected service provider using voice mail.
  5. Lurie,Steven; Faber,Scott; Van der Linden,Sean, Apparatus and method for ensuring a real-time connection between users and selected service provider using voice mail.
  6. Lurie, Steven, Apparatus and method for online advice customer relationship management.
  7. Lurie, Steven, Apparatus and method for online advice customer relationship management.
  8. Faber, Scott; Van Der Linden, Sean; McKenna, Patrick; Chen, Peter, Apparatus and method for recruiting, communicating with, and paying participants of interactive advertising.
  9. Jacob,Karl; Faber,Scott; Van der Linden,Sean, Apparatus and method for specifying and obtaining services through an audio transmission medium.
  10. Sealey, Robert Raymond; Gress, David S., Arrangement in a local computer for sending voice messages to a unified communications system.
  11. Brinkmeyer Horst,DEX ; Daiss Michael,DEX ; Schwegler Guenter,DEX, Authentication device with electronic authentication communication.
  12. Grawrock, David; Jones, Kevin, Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption.
  13. Boede, Jon; Tuttle, Robert, Built-in automatic customer identifier when connecting to a vendor website.
  14. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timoth T.; Goldman, Phillip Y., Centralized behavioral information system.
  15. Landsman, Richard A., Community messaging lists for authorization to deliver electronic messages.
  16. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  17. Shimizu Akihiro,JPX ; Horioka Tsutomu,JPX ; Hamada Hiroshi,JPX, Contents transmission control method with user authentication functions and recording medium with the method recorded thereon.
  18. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  19. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  20. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  21. Baindur Ashwin ; Harvey Andrew G. ; Leung Pokman Perry ; Valencia Andrew J. ; Yiu Shoou Jiah, Dynamic bidding protocol for conducting multilink sessions through different physical termination points.
  22. Sitaraman,Aravind; Sheth,Purnam Anil, Dynamic multi-hop ingress to egress L2TP tunnel mapping.
  23. Assmann, Claus, Electronic mail system with authentication methodology for supporting relaying in a message transfer agent.
  24. Assmann,Claus, Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent.
  25. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Electronic message system with federation of trusted senders.
  26. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Susan Rayl, Electronic message system with federation of trusted senders.
  27. Shambroom W. David, Enhanced security for applications employing downloadable executable content.
  28. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  29. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  30. Rose, Anthony, Filter for a distributed network.
  31. Rose, Anthony, Filter for a distributed network.
  32. Rose, Anthony, Filter for a distributed network.
  33. Heiner, Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  34. Goldman, Phillip Y.; Landsman, Richard A.; Migliore, Michael R.; Heiner, Jeffrey N.; Logue, Jay, Filtering electronic messages while permitting delivery of solicited electronics messages.
  35. Dellacona, Richard, High speed fault tolerant mass storage network information server.
  36. Dellacona,Richard, High speed information processing and mass storage system and method, particularly for information and application servers.
  37. Laurin, André Paul Cyrille; Jean Ste Marie, Karell Serge, Idea management.
  38. Kassai, Kunihiko; Furuta, Toru, Information processing apparatus, server apparatus, medium recording information processing program and information processing method.
  39. Michael M. Chlan ; Richard E. Davis, Internet web server cache storage and session management system.
  40. Gong, Li, Layer-independent security for communication channels.
  41. Sitaraman,Aravind; Sheth,Purnam Anil, Load sharing between L2TP tunnels.
  42. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  43. Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing electronic messages.
  44. Landsman,Richard A.; Sullivan,Timothy Thomas; Logue,Jay Dare, Managing electronic messages using contact information.
  45. Logue, Jay; Heiner, Jeffrey N.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing self-addressed electronic messages.
  46. Zamanzadeh, Behzad; Shallenberger, Robert D.; Farry, Mohsen; Malhotra, Harish, Market data domain and enterprise system implemented by a master entitlement processor.
  47. Landsman, Richard A., Messaging systems and methods.
  48. Landsman, Richard A., Messaging systems and methods.
  49. Boyce, Kevin G.; McEwen, Ron A., Method and apparatus for a service provider to provide secure services to a user.
  50. Gibbs, Benjamin K., Method and apparatus for an adapted digital signature.
  51. Oran, David R.; Wing, Daniel G., Method and apparatus for analyzing a media path in a packet switched network.
  52. DeCenzo,Christopher J; Xiao,Sihai, Method and apparatus for anonymously tracking TV and internet usage.
  53. Faber, Scott; Hirson, Ron; Altberg, Henrik Axel Ebbe; Van der Linden, Sean David, Method and apparatus for prioritizing a listing of information providers.
  54. Todd A. Schwartz ; Vaughn S. Iverson, Method and apparatus for private and restricted-use electronic addresses.
  55. Aziz Ashar, Method and apparatus for secure remote authentication in a public network.
  56. Labaton, Isaac J, Method and apparatus for the secure authentication of a web site.
  57. Labaton, Isaac J., Method and apparatus for the secure authentication of a web-site.
  58. Labaton, Isaac J, Method and apparatus for the secure identification of the owner of a portable device.
  59. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  60. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  61. Makansi, Tarek; Gampper, James Michael, Method and apparatus for transmitting messages.
  62. Casagrande,Steven, Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to users.
  63. Sheth,Purnam Anil; Sitaraman,Aravind; Yager,Charles T.; Burns,Gregory D., Method and system for controlling subscriber access in a network capable of establishing connections with a plurality of domain sites.
  64. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  65. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  66. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  67. Krishnan Ganapathy ; Oyler Scott, Method and system for injecting new code into existing application code.
  68. Meyer Daniel P., Method and system for maintaining the format of messages in a messaging system database.
  69. Kaufeld James C. ; Stone Matthew B., Method and system for relaying communications from authorized users.
  70. Lauffer, Randall B., Method and system to connect consumers to information.
  71. Lauffer, Randall B., Method and system to connect consumers to information.
  72. Glenn Steve ; Gross William Tod ; McRae John Richard ; Neches Philip Malcolm ; Day James Francis ; Zydney Herbert Mortimer, Method for establishing anonymous communication links.
  73. Sims, John B; Samoylov, Mykola P, Method for generating digital fingerprint using pseudo random number code.
  74. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  75. Shambroom,W. David, Method for providing simultaneous parallel secure command execution on multiple remote hosts.
  76. Lillibridge Mark D. ; Abadi Martin ; Bharat Krishna ; Broder Andrei Z., Method for selectively restricting access to computer systems.
  77. Felt Edward Porter, Method of authentication based on intersection of password sets.
  78. Epstein Michael A., Method of secure anonymous query by electronic messages transported via a public network and method of response.
  79. Baransky,Yurij Andrij; Franke,Hubertus; Pattnaik,Pratap Chandra; Safford,David R.; Wisniewski,Robert William, Method of securely sharing information over public networks using untrusted service providers and tightly controlling client accessibility.
  80. Jacob, Karl; Halstead, Mark; Lurie, Steven, Method, apparatus and system for marketing, delivering, and collecting payment for information.
  81. Dove Lee G.,GBX, Methods and apparatus for sending electronic data signals.
  82. Agarwal, Anuj; Ahuja, Nitin; Altberg, Ebbe; Faber, Scott; Halstead, Mark Arthur Buchler; Van Der Linden, Sean, Methods and apparatuses for delivery of advice to mobile/wireless devices.
  83. Telle, Todd N.; Moskowitz, Sue Ellen, Methods and systems for authenticating an identity of a payer in a financial transaction.
  84. Curtis Allen J., Multi-media remote data access terminals and system.
  85. Curtis, Allen J., Multi-media remote data access terminals and system.
  86. Curtis, Allen J., Multi-media remote data access terminals and system.
  87. Dellacona Richard, Network information server.
  88. Schuba, Christoph L.; Krsul, Ivan V.; Zamboni, Diego; Spafford, Eugene H.; Sundaram, Aurobindo M.; Kuhn, Markus G., Network protection for denial of service attacks.
  89. Sheth, Purnam Anil; Sitaraman, Aravind; Yager, Charles T.; Burns, Gregory D., PPP domain name and L2TP tunnel selection configuration override.
  90. Sheth, Purnam Anil; Sitaraman, Aravind; Yager, Charles T.; Burns, Gregory D., PPP domain name and L2TP tunnel selection configuration override.
  91. Piccionelli, Gregory Alexander, Password protection system and method.
  92. Piccionelli, Gregory Alexander, Password protection system and method.
  93. Shambroom,W. David, Platform-neutral system and method for providing secure remote operations over an insecure computer network.
  94. Goldman, Phillip Y., Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses.
  95. Baentsch, Michael; Buhler, Peter; Eirich, Thomas; Hoering, Frank; Kramp, Thorsten; Oestreicher, Marcus; Osborne, Michael; Weigold, Thomas D., Providing a user device with a set of access codes.
  96. Hori,Takayuki, Proxy reply method and apparatus.
  97. Novoa, Manuel; Crisan, Adrian, Secure and dynamic biometrics-based token generation for access control and authentication.
  98. Keathley Kimberly Ann ; Chen Ann-Pin ; McCusker Nancy, Secure electronic commerce employing integrated circuit cards.
  99. Andrew W. Trieger, Secure session tracking method and system for client-server environment.
  100. Trieger Andrew W., Secure session tracking method and system for client-server environment.
  101. Glazer, Elliott; Bishop, Fred; Fehlhaber, Jeff S., Single use user IDS.
  102. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  103. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  104. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  105. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  106. Goldman, Phillip Y; Landsman, Richard A, Sorting electronic messages using attributes of the sender address.
  107. Goldman,Phillip Y.; Landsman,Richard A., Sorting electronic messages using attributes of the sender address.
  108. Lurie, Steven, System and method for an online speaker patch-through.
  109. Lurie,Steven, System and method for an online speaker patch-through.
  110. Chen Qilun ; Murphy ; Jr. Thomas Edwin ; Rieth Paul Francis ; Stevens Jeffrey Scott, System and method for building and exchanging encrypted passwords between a client and server.
  111. Lanzy Garrett Roman ; Pflug Francis Alan ; Stange Gary Herbert, System and method for enabling and controlling anonymous file transfer protocol communications.
  112. Lanzy Garrett Roman ; Pflug Francis Alan ; Stange Gary Herbert, System and method for enabling and controlling anonymous file transfer protocol communications.
  113. Simms,Timothy J., System and method for establishing secure communication.
  114. Springer David S., System and method for identification and streamlined access to online services.
  115. Bulusu, Shekher; Sane, Sanjay; Rai, Smita; Ramachandran, Gayatri; Desai, Ronak, System and method for managing network traffic disruption.
  116. Bulusu, Shekher; Sane, Sanjay; Desai, Ronak, System and method for managing topology changes in a network environment.
  117. Balasubramanian, Hariharan; Rai, Smita; Sane, Sanjay, System and method for probing multiple paths in a network environment.
  118. Bulusu, Shekher, System and method for providing a loop free topology in a network environment.
  119. Bulusu, Shekher, System and method for providing a loop free topology in a network environment.
  120. Gabber, Eran; Gibbons, Phillip B.; Kristol, David Morris; Matias, Yossi; Mayer, Alain J., System and method for providing anonymous remailing and filtering of electronic mail.
  121. Mishra, Chandan; Watve, Rohit S., System and method for providing proactive fault monitoring in a network environment.
  122. Huang, Wei-Jen; Huang, Chih-Tsung, System and method for tracking packets in a network environment.
  123. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  124. Picard Donald F. ; Root Thomas Lyman ; Schlueter Jeffrey John ; Weare Gerald William, System for accessing multimedia mailboxes and messages over the internet and via telephone.
  125. Rothblatt Martine A., System for providing global portable internet access using low earth orbit satellite and satellite direct radio broadcast system.
  126. Shambroom W. David, System for providing secure remote command execution network.
  127. Faber,Scott; Van der Linden,Sean; Lurie,Steven Ivan, System for recording and distributing recorded information over the internet.
  128. Brown Gary S., System for remote pass-phase authentication.
  129. Brown Gary S., System for remote pass-phrase authentication.
  130. Gary S. Brown, System for remote pass-phrase authentication.
  131. Faber,Scott; Hirson,Ron; Migdal,James D.; Altberg,Henrik Axel Ebbe; Van der Linden,Sean David, Systems and methods for arranging a call.
  132. Fang, Wen, Systems and methods for automated exchange of electronic mail encryption certificates.
  133. Altberg, Ebbe; Faber, Scott; Hirson, Ron; Van Der Linden, Sean, Systems and methods to manage a queue of people requesting real time communication connections.
  134. Altberg, Ebbe; Faber, Scott; Hirson, Ron; Van Der Linden, Sean; Manca, Paul G., Systems and methods to manage privilege to speak.
  135. O'Connor William Y. ; Stanford Donald L. ; Khan Tariq M. ; Hutton Michael A. ; Beason Steve W. ; Angell Robert C., Technique for secure network transactions.
  136. Wing, Daniel G.; Biskner, Robert J.; Kumar, Rajesh; Mostafa, Mohamed S., Triggering flow analysis at intermediary devices.
  137. Nicholas M. Luzeski ; Daniel P. Meyer ; Curt Raddatz, UNIVERSAL MESSAGING SYSTEM PROVIDING INTEGRATED VOICE, DATA AND FAX MESSAGING SERVICES TO PC/WEB-BASED CLIENTS, INCLUDING A CONTENT MANAGER FOR RECEIVING INFORMATION FROM CONTENT PROVIDERS AND FORMAT.
  138. Gibbs Benjamin K. ; Roeder G. R. Konrad, Unique digital signature.
  139. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  140. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan, User authentication from non-native server domains in a computer network.
  141. Yu Ju-Yeol,KRX ; Chung Ho-Suk,KRX ; Moon Soon-Il,KRX, User authentication system for authenticating an authorized user of an IC card.
  142. Nicolas Georg Arnold ; Peter A. Daley ; Narendra K. Ghosh ; William Hsu ; Michael C. Lai, Verification system for information transfers over a computer network.
  143. Andrew J. Valencia, Virtual dial-up protocol for network communication.
  144. Valencia Andrew J., Virtual dial-up protocol for network communication.
  145. Valencia Andrew J., Virtual dial-up protocol for network communication.
  146. Valencia, Andrew J., Virtual dial-up protocol for network communication.
  147. Valencia, Andrew J., Virtual dial-up protocol for network communication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로