$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for the secure distribution of electronic files in a distributed environment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-009/30
출원번호 US-0520351 (1995-08-28)
발명자 / 주소
  • Rubin Aviel D. (East Hanover NJ)
출원인 / 주소
  • Bell Communications Research, Inc. (Morristown NJ 02)
인용정보 피인용 횟수 : 295  인용 특허 : 4

초록

A process for using a trusted third party to create an electronic certificate for an electronic file that can be used to establish the file and verify the identity of the creator of the file. The process is composed of two phases, a registration phase and an electronic file distribution phase. In th

대표청구항

A method for securely distributing electronic information over a network having an author, a trusted agent, and a user, said method comprising the steps of: registering said author with said trusted agent to provide said trusted agent with said author\s public key; said agent verifying said author\s

이 특허에 인용된 특허 (4)

  1. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  2. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method for secure time-stamping of digital documents.
  3. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  4. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.

이 특허를 인용한 특허 (295)

  1. Waldin Ray ; Nachenberg Carey, Antivirus accelerator for computer networks.
  2. Benjamin K. Gibbs, Apparatus and method for an authenticated electronic userid.
  3. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  4. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  5. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  6. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  7. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  8. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  9. Michaelis, Oliver; Mauro, Anthony P., Associating software with hardware using cryptography.
  10. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  11. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  12. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  13. Masuda, Takahiro, Authentication device.
  14. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  15. Cook, David P.; Liu, Gary G.; Kalan, John, Automatic delivery selection for electronic content.
  16. Cook, David P.; Liu, Gary G.; Kalan, John, Automatic delivery selection for electronic content.
  17. Rustagi, Viresh; Wilson, Christopher S., Automatic expansion of hard disk drive capacity in a storage device.
  18. Parthasarathy, Srivatsan; Partovi, Hadi; Slivka, Benjamin W.; Kindel, Charles E., Automatic software downloading from a computer network.
  19. Parthasarathy, Srivatsan; Partovi, Hadi; Slivka, Benjamin W.; Kindel, Jr., Charles E., Automatic software downloading from a computer network.
  20. Srivatsan Parthasarathy ; Hadi Partovi ; Benjamin W. Slivka ; Charles E. Kindel, Jr., Automatic software downloading from a computer network.
  21. Epstein, William C.; Miller, Lawrence R., Binding a digital certificate to multiple trust domains.
  22. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  23. Rubin, Aviel D., Broadband certified mail.
  24. Rubin, Aviel D., Broadband certified mail.
  25. Rubin, Aviel D., Broadband certified mail.
  26. Rubin, Aviel D., Broadband certified mail.
  27. Rubin,Aviel D., Broadband certified mail.
  28. Liu, Gary G., Certified transmission system.
  29. England,Paul, Client-side boot domains and boot rules.
  30. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit.
  31. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit.
  32. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit.
  33. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit having security features.
  34. Mikolajczyk, Ryszard K.; Baskerville, Taurris D., Cluster box mail delivery unit having security features.
  35. De Los Santos, Sergio; Barroso Berrueta, David; Guzman Sacristan, Antonio; De La Rosa, Tero; Alonso Cebrian, Jose Maria, Computer implemented method and a computer system to prevent security problems in the use of digital certificates in code signing and a computer program product thereof.
  36. Shipman, Robert A, Computer security system.
  37. Benson Glenn,DEX, Computer system for protecting a file and a method for protecting a file.
  38. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  39. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  40. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  41. Carter, Stephen R.; Burch, Lloyd Leon; Olds, Dale Robert, Crafted identities.
  42. Landrock, Peter; Tuliani, Jonathan Roshan, Data certification method and apparatus.
  43. Landrock, Peter; Tuliani, Jonathani Roshan, Data certification method and apparatus.
  44. Landrock, Peter; Tuliani, Jonathan Roshan, Data certification method and system.
  45. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  46. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  47. Harris, Adam P.; Schneider, Steve C., Defining new rules for validation of network devices.
  48. Harris, Adam P.; Schneider, Steve C., Defining new rules for validation of network devices.
  49. Xiao, Cun, Delayed secure data retrieval.
  50. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  51. Tandon, Vinod; Devore, Jake, Detecting lag switch cheating in game.
  52. Tandon, Vinod; Devore, Jake, Detecting lag switch cheating in game.
  53. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  54. Zilberman, Arkady G., Device with built-in user authentication and method for user authentication and identity theft protection.
  55. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  56. Vanstone Scott A.,CAX, Digital signature protocol.
  57. Brickell,Ernie F., Digital signature validation.
  58. Rhoads, Geoffrey B., Digital watermark decoding method.
  59. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  60. Slivka,Benjamin W.; Webber,Jeffrey S., Distributing software via distribution files.
  61. Hawthorne, William McMullan, Document or message security arrangements using a numerical hash function.
  62. Waldo, Andrew B.; Zou, Yong; Raven, Clive; Kenny, Kevin, Document validation system and method.
  63. Waldo, Andrew B.; Zou, Yong; Raven, Clive; Kenny, Kevin, Document validation system and method.
  64. Shao, Jun; Zhu, Bin; Feng, Min, Efficient certified email protocol.
  65. Shaw David E. ; Ardai Charles E. ; Marsh Brian D. ; Moraes Mark A. ; Rudolph Dana B. ; Mc Auliffe Jon D., Electronic mail system with advertising.
  66. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  67. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  68. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  69. Suominen, Edwin A, Encryption and authentication systems and methods.
  70. Suominen, Edwin A., Encryption and authentication systems and methods.
  71. Suominen, Edwin A., Encryption and authentication systems and methods.
  72. Suominen,Edwin A., Encryption and authentication systems and methods.
  73. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  74. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  75. Mraz, Ronald; Hope, James, File manifest filter for unidirectional transfer of files.
  76. Harris, Adam P.; Schneider, Steve C., Generating rules for maintaining community integrity.
  77. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  78. Haq Ejaz Ul, High speed bus system and method for using voltage and timing oscillating references for signal detection.
  79. Ejaz Ul Haq, High speed signaling for interfacing VLSI CMOS circuits.
  80. Haq Ejaz Ul, High speed source synchronous signaling for interfacing VLSI CMOS circuits to transmission lines.
  81. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  82. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  83. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  84. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  85. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  86. David Montville ; Adam Montville, Interoperable full-featured web-based and client-side e-mail system.
  87. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  88. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  89. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  90. Sadler, John J.; Goodman, Larry; Galaher, Robert; Nacke, Dana; Gallagher, William; Bakshi, Paul; Lamoreux, Scott; Pierce, Hughes; Dvonch, Robert; Foster, Dana; Lizzol, EvaMarie; Hunsicker, Lynn; Hess, Jim; Sexton, John; Patel, Himesh; Kooken, Robert; Blalock, John; Smith, Diane; Johnson, Albert J., Item attribute preverification.
  91. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system and method.
  92. Aldstadt, Harry, Item tracking and anticipated delivery confirmation system method.
  93. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  94. Zilberman, Arkady G., Keyboard configurations.
  95. Harris, Adam P.; Schneider, Steve C., Maintaining community integrity.
  96. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  97. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  98. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  99. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  100. Edery, Yigal Mordechai; Vered, Nirmrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  101. Edery,Yigal Mordechai; Vered,Nimrod Itzhak; Kroll,David R., Malicious mobile code runtime monitoring system and methods.
  102. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  103. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  104. Harris, Adam P.; Schneider, Steve C., Managing game metrics and authorizations.
  105. Harris, Adam P.; Schneider, Steve C., Managing game metrics and authorizations.
  106. Weidong Kou CA, Mechanism for secure tendering in an open electronic network.
  107. Gibbs, Benjamin K., Method and apparatus for an adapted digital signature.
  108. Donoho, David Leigh; Gavish, Matan, Method and apparatus for certification of facts.
  109. Donoho, David Leigh; Gavish, Matan, Method and apparatus for certification of facts.
  110. Glenn C. Langford CA; Ronald J. Vandergeest CA, Method and apparatus for controlling application access to limited access based data.
  111. McGee, William G.; Langford, Glenn C.; Van Oorschot, Paul C., Method and apparatus for controlling program execution and program distribution.
  112. Fraser Alexander Gibson ; Keshav Srinivasan ; Odlyzko A. M., Method and apparatus for crytographically protecting data.
  113. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  114. Song, Zhexuan; Kotani, Seigo; Lee, Sung; Tanaka, Keishiro; Lee, Houcheng; Molina, Jesus; Masuoka, Ryusuke; Yamazaki, Tomihiro, Method and apparatus for identity verification.
  115. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners.
  116. Rubin, Moshe; Matitya, Moshe; Melnick, Artem; Touboul, Shlomo; Yermakov, Alexander; Shaked, Amit, Method and system for adaptive rule-based content scanners for desktop computers.
  117. Krislov, Clinton A., Method and system for automated document registration.
  118. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  119. Touboul,Shlomo, Method and system for caching at secure gateways.
  120. Earnest,Jerry Brett, Method and system for comparing information contents.
  121. Reisman, Richard R., Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user station.
  122. Le Pennec,Jean Fran챌ois; Hericourt,Olivier; Fieschi,Jacques, Method and system for generating and using a virus free file certificate integrated within a file.
  123. Fawcett Philip E., Method and system for identifying and obtaining computer software from a remote computer.
  124. Fawcett Philip E., Method and system for identifying and obtaining computer software from a remote computer.
  125. Fawcett, Phillip E., Method and system for identifying and obtaining computer software from a remote computer.
  126. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  127. Forbes,Jonathan A.; Stone,Jeremy D.; Parthasarathy,Srivatsan; Toutonghi,Michael J.; Sliger,Michael V., Method and system for processing software dependencies in management of software packages.
  128. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Method and system for protecting a computer and a network from hostile downloadables.
  129. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  130. Reisman, Richard R., Method and system for selecting a personalized set of information channels.
  131. Mont,Marco Casassa, Method and system for validating software code.
  132. Henocque, Laurent, Method for checking the integrity of a digital data block.
  133. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  134. Capek Peter George, Method for distributing advertising in a distributed web modification system.
  135. Reisman, Richard R., Method for distributing content to a user station.
  136. Reisman, Richard R., Method for distributing content to a user station.
  137. Reisman, Richard R., Method for distributing content to a user station.
  138. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
  139. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  140. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  141. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  142. Berson, William; Zeller, Claude, Method for preventing counterfeiting of articles of manufacture.
  143. Estes,Jacquelyn; Orbke,Wayne H.; Penn,Maria C.; Pensabene,Phillip A.; Ray,Christine R. L.; Rios,Julie F.; Robinson,Jacquelyn M.; Troxel,Kerry J., Method for shipping a package privately to a customer.
  144. Stachura, Thomas L.; Vasudevan, Anil, Method for theft detection and notification via a network.
  145. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  146. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  147. Sch채fer,Manfred, Method, array and set of several arrays for protecting several programs and/or files from unauthorized access by a process.
  148. Estes,Jacquelyn; Orbke,Wayne H.; Penn,Maria C.; Pensabene,Phillip A.; Ray,Christine R. L.; Rios,Julie F.; Robinson,Jacquelyn M.; Troxel,Kerry J., Method, system, and computer readable medium for shipping a package to a customer while preserving customer privacy.
  149. Orbke, Wayne H.; Tremaine, Samuel R., Methods and systems for establishing an electronic account for a customer.
  150. Orbke, Wayne H.; Tremaine, Samuel R., Methods and systems for establishing an electronic account for a customer.
  151. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer.
  152. Cook, Jon L.; Orbke, Wayne H., Methods and systems for linking an electronic address to a physical address of a customer using a delivery point identification key.
  153. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  154. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  155. Campbell, Leo J.; Cook, Jon L., Methods and systems for proofing identities using a certificate authority.
  156. Campbell,Leo J.; Cook,Jon L., Methods and systems for proofing identities using a certificate authority.
  157. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  158. Cook, Jon L.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing a secure electronic mailbox.
  159. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  160. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  161. Campbell, Leo J.; Cook, Jon L.; Orbke, Wayne H.; Ray, Christine; Rogerson, Cathy M., Methods and systems for providing an electronic account to a customer.
  162. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  163. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  164. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  165. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  166. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  167. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  168. Rhoads, Geoffrey B., Methods for encoding security documents.
  169. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  170. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  171. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  172. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  173. Reisman, Richard R., Methods for transacting electronic commerce.
  174. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  175. Radatti, Peter V., Methods, apparatus and articles of manufacture for computer file integrity and baseline maintenance.
  176. Reed, Edwards E.; Acar, T Iga, Methods, systems, and data structures for loading and authenticating a module.
  177. Mauro, II, Anthony Patrick, Mobile security system and method.
  178. Runte Richard M. ; Hubbard Henry ; Dennert R. Bruce, Motorcycle rocker assembly.
  179. Stedron, Robert Allen, Multiple level security system and method for encrypting data within documents.
  180. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  181. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  182. Touboul, Shlomo, Policy-based caching.
  183. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  184. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  185. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  186. Tallent, Jr., Guy S.; Donfried, Paul A.; Hicks, George M. (Mack); Lee, Elizabeth, Provision of authorization and other services.
  187. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  188. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  189. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  190. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  191. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  192. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  193. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  194. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  195. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  196. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  197. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  198. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  199. Immonen, Olli, Secure handshake protocol.
  200. Cook, David P., Secure message forwarding system detecting user's preferences including security preferences.
  201. Suominen, Edwin A., Secure messaging with disposable keys.
  202. Nachenberg, Carey S; McCorkendale, Bruce, Securing executable content using a trusted computing platform.
  203. Arkady G. Zilberman, Security method and apparatus employing authentication by keystroke dynamics.
  204. Danieli, Damon V., Security services and policy enforcement for electronic data.
  205. Bradley, Brett A., Self-orienting watermarks.
  206. Bradley,Brett A., Self-orienting watermarks.
  207. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  208. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  209. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  210. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  211. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  212. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  213. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  214. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  215. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  216. Reisman, Richard R., Software distribution over a network.
  217. Jonathan A. Forbes ; Jeremy D. Stone ; Srivatsan Parthasarathy ; Michael J. Toutonghi ; Michael V. Sliger, Software package management.
  218. Rhoads Geoffrey B., Steganographic methods and media for photography.
  219. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  220. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  221. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  222. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  223. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  224. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  225. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  226. French Jennifer ; Wilder Jone, System and method for authentication of network users.
  227. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  228. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  229. Jennifer French ; Jone Wilder, System and method for authentication of network users.
  230. French Jennifer ; Wilder Jone, System and method for authentication of network users and issuing a digital certificate.
  231. French Jennifer ; Wilder Jone, System and method for authentication of network users with preprocessing.
  232. Nakae, Masayuki, System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product.
  233. Nakae, Masayuki, System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product.
  234. Mraz, Ronald; Silberman, Gabriel, System and method for enabling the capture and securing of dynamically selected digital information.
  235. Mraz, Ronald; Silberman, Gabriel, System and method for modular and continuous data assurance.
  236. Shlomo Touboul IL, System and method for protecting a client during runtime from hostile downloadables.
  237. Touboul Shlomo,ILX, System and method for protecting a client during runtime from hostile downloadables.
  238. Touboul Shlomo,ILX, System and method for protecting a computer and a network from hostile downloadables.
  239. Touboul, Shlomo, System and method for protecting a computer and a network from hostile downloadables.
  240. Hicks, Mack; Seiler, Regina; Tallent, Guy; Kupres, Kristin; Freudenstein, Allen, System and method for providing certification-related and other services.
  241. McKenney, Mary Keenan; Walch, Markus; Baker, III, Walter; Storch, Oliver; Landsmann, Peter Josef Eduard; Jetter, William John; Wong, Margaret Miu-Ling; Cameron, William Isaac, System and method for providing payment services in electronic commerce.
  242. Ahmed,Khaja, System and method for providing trusted browser verification.
  243. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  244. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  245. Mraz, Ronald; Silberman, Gabriel, System and method for secure unidirectional transfer of commands to control equipment.
  246. Mraz, Ronald; Silberman, Gabriel, System and method for the secure unidirectional transfer of software and software updates.
  247. Miller, Lawrence R.; Tallent, Jr., Guy S.; Ahmed, Khaja E., System and method for transparently providing certificate validation and other services within an electronic transaction.
  248. Krause, Robert G.; Orbke, Wayne H., System and methods for electronic message content identification.
  249. Stedron, Robert Allen; Chmielewski, John L., System for transmitting encrypted data.
  250. Estes, Jacquelyn; Orbke, Wayne H.; Penn, Maria C.; Pensabene, Phillip A.; Ray, Christine R. L.; Rios, Julie F.; Robinson, Jacquelyn M.; Troxel, Kerry J., System, method and article of manufacture for shipping a package privately to a customer.
  251. Yamada,Asahiko; Harashima,Shuji, System, method, and program for ensuring originality.
  252. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  253. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  254. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  255. Campbell, Leo J.; Cook, Jon L.; Chamberlain, Charles R.; McGrath, Michael J.; Schoen, Isadore, Systems and methods for authenticating an electronic message.
  256. Pinkas, Binyamin; Sander, Tomas; Home, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  257. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  258. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  259. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  260. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  261. Pinkas,Binyamin; Sander,Tomas; Horne,William G., Systems and methods for conducting transactions and communications using a trusted third party.
  262. Krause, Robert G.; Orbke, Wayne H., Systems and methods for electronic message content identification.
  263. Chamberlain, Charles R., Systems and methods for electronic postmarking of data including location data.
  264. Hlasny, Daryl J., Systems and methods for object distribution in a communication system.
  265. Buie, James W.; Tartal, William; Webster, Janet L., Systems and methods for providing mail item retrieval.
  266. Bender, Christopher L.; Brown, Michael K.; Brown, Michael S., Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function.
  267. Bender, Christopher L.; Brown, Michael K.; Brown, Michael S., Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function.
  268. Nardone Joseph M. ; Mangold Richard P. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
  269. Nardone Joseph M. ; Mangold Richard T. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
  270. Nardone Joseph M. ; Mangold Richard P. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant player for scrambled contents.
  271. Morris, Cameron Craig; Burch, Lloyd Leon; Carter, Stephen R.; Kinser, Stephen Hugh, Techniques for attesting to content.
  272. Hsu, Wen-Pin Scott; Soulami, Tarik; Zagorski, Mark; Zhang, Ning; Perlman, Brian, Techniques for ensuring authentication and integrity of communications.
  273. Dulin, Charles; Solo, David; Hicks, Mack; Nepomuceno, Larry; Stirland, Mark, Transaction coordinator for digital certificate validation and other services.
  274. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  275. Gibbs Benjamin K. ; Roeder G. R. Konrad, Unique digital signature.
  276. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  277. Devar,Rodney C., Universal delivery and collection box unit (UDCBU).
  278. Honarvar,Laurence Toraj; Witte,Brandon Raymond; Fatigante,Steve Chance; Harless,Gary Lynn, User authentication system and methods thereof.
  279. Zilberman, Arkady G., User input authentication and identity protection.
  280. Reisman, Richard R., User station software that controls transport and presentation of content from a remote source.
  281. Reisman, Richard R., User station software that controls transport, storage, and presentation of content from a remote source.
  282. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.
  283. Harris, Adam P.; Schneider, Steve C., Validation of network devices.
  284. Colson, Christen J., Verification and authentication systems and methods.
  285. Colson, Christen J., Verification and authentication systems and methods.
  286. Suominen, Edwin A., Verification of signed digital documents.
  287. Suominen, Edwin A., Verification of signed video streams.
  288. Freeman Martin, Verification of software agents and agent activities.
  289. Rhoads,Geoffrey B., Video steganography.
  290. Van Datta,Glen; Mai,Anthony, Violations in a peer-to-peer relay network.
  291. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  292. Rhoads, Geoffrey B., Watermark embedder and reader.
  293. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  294. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  295. Rhoads, Geoffrey B., Watermarking methods and media.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로