$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for authenticating access to heterogeneous computing services 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0356071 (1994-12-13)
발명자 / 주소
  • Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA)
출원인 / 주소
  • Microsoft Corporation (Redmond WA 02)
인용정보 피인용 횟수 : 379  인용 특허 : 0

초록

A method and system for authenticating access to heterogeneous computing services is provided. In a preferred embodiment, logon providers are configured into the computer system, which provide secure access to their services by requiring authentication of user identification information using a logo

대표청구항

A method in a computer system network environment for authenticating access to computing services, the computer system network environment having a local computer system that can be connected to multiple heterogeneous networks, the local computer system having local authentication code to access loc

이 특허를 인용한 특허 (379)

  1. Bue, Brian Lo; Shively, II, Darrell Myers; Nadeau, Larry, Active call context reconstruction for primary/backup resource manager servers.
  2. Rinkevich, Debora; Garrison, John Michael, Aggregated authenticated identity apparatus for and method therefor.
  3. Rinkevich,Debora; Garrison,John Michael, Aggregated authenticated identity apparatus for and method therefor.
  4. Wakai, Masanori; Ibaraki, Shouichi; Takayama, Masayuki; Suda, Aruna Rohra; Fujii, Kenichi; Takahashi, Satomi; Jeyachandran, Suresh, Apparatus and method for displaying job list, and storage medium for such a program.
  5. Chao, Li-Lung; Goodman, Brian D.; Kebinger, James K., Authenticating and communicating verifiable authorization between disparate network domains.
  6. Dean Dawson F. ; Wang Edward Yan-Bing ; Chen Ling Tony ; Klemets Anders Edgar ; Chaddha Navin, Authorization systems, methods, and computer program products.
  7. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  8. Austermann, III, John F.; Cummings, Marshall B., Central piece of network equipment.
  9. Weber,Gregory; Grant,Laurence, Command authorization via RADIUS.
  10. Ishii, Yuuichi, Communications apparatus and service providing technique using communications apparatus.
  11. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  12. Darago, Vincent S; Jenkins, Christopher, Computer architecture for managing courseware in a shared use operating environment.
  13. Groenendaal, Edward J., Configurable channel associated signaling (“CAS”) line signaling using plain text strings.
  14. Blakely ; III George Robert ; Milman Ivan Matthew ; Sigler Wayne Dube, Configurable password integrity servers for use in a shared resource environment.
  15. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  16. Stefik,Mark J., Content rendering device with usage rights.
  17. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  18. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  19. Feil, Stephan, Control of access to a secondary system.
  20. Feil, Stephan, Control of access to a secondary system.
  21. Feil, Stephan, Control of access to a secondary system.
  22. Ruzyski, David M.; Hong, James H.; McNeil, Brian K.; Guzak, Chris J.; Wentz, Brian D.; Schutz, Klaus U.; Richards, Stefan; Perlin, Eric C.; Ilac, Cristian; Reasor, Sterling M.; Flo, Eric R.; Stephens, John; Hutz, Benjamin A., Credential interface.
  23. Sturges, Philip, Credential provider that encapsulates other credential providers.
  24. Sturges, Philip M., Credential provider that encapsulates other credential providers.
  25. Leveridge,Philip C.; Strange,Michael I.; Parkinson,David W.; Roberts,David; Kenning,Michael J.; Tibbitt Eggleton,Robert I., Data communications.
  26. Shujin Zhang ; Jie Chu ; Maria Alice Dos Santos, Default internet traffic and transparent passthrough.
  27. Zhang, Shujin; Chu, Jie; Dos Santos, Maria Alice, Default internet traffic and transparent passthrough.
  28. Zhang,Shujin; Chu,Jie; Dos Santos,Maria Alice, Default internet traffic and transparent passthrough.
  29. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  30. Duane, William; Hamel, Jeffrey, Derivative seeds.
  31. Nishimura,Takuya; Iitsuka,Hiroyuki; Yamada,Masazumi; Gotoh,Shoichi; Takechi,Hideaki; Usuki,Naoshi, Digital AV data transmitting unit, digital AV data receiving unit, digital AV data transmitting/receiving unit, and medium.
  32. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  33. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  34. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  35. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  36. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  37. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  38. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  39. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  40. Bertram Daniel Wayne ; Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan ; Spooner Courtney Joseph, Discovery of authentication server domains in a computer network.
  41. Sitaraman Aravind ; Hosseini Houshang Nayeb ; Chu Jie ; Thomas Leslie Alan ; Zhang Shujin, Distributed architecture allowing local user authentication and authorization.
  42. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  43. Sitaraman,Aravind; Mann,Joseph F.; Dos Santos,Maria Alice; Lou,Shuxian; Sthothra Bhasham,Sampath Kumar, Dynamic IP addressing and quality of service assurance.
  44. Sitaraman,Aravind; Sheth,Purnam Anil, Dynamic multi-hop ingress to egress L2TP tunnel mapping.
  45. Sitaraman, Aravind; Iwata, Craig T., Dynamic, scaleable attribute filtering in a multi-protocol compatible network access environment.
  46. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  47. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Dynamically modifying a toolbar.
  48. Rush, Gary W.; Kiefus, Herman J.; Clapp, Christopher; Follett, Helen; Griffith, David, End-to-end transaction processing and statusing system and method.
  49. Austermann, III, John F.; Cummings, Marshall B., Ethernet device.
  50. Mehendale, Nitin; Kohl, Shannon, Fabric manager multiple device login.
  51. Chu, Jie; Sthothra Bhasham, Sampath Kumar; Sitaraman, Aravind; Thomas, Leslie Alan, Facility to transmit network management data to an umbrella management system.
  52. Chu,Jie; Sthothra Bhasham,Sampath Kumar; Sitaraman,Aravind; Thomas,Leslie Alan, Facility to transmit network management data to an umbrella management system.
  53. Delpuch, Alain, Flexible interface for secure input of pin code.
  54. Sitaraman Aravind ; Lou Shuxian ; Zhang Shujin, Forced sequential access to specified domains in a computer network.
  55. Botz Patrick Samuel ; Moskalik Thomas Michael ; Snyder Devon Daniel ; Woodbury Carol Jean, Generic user authentication for network computers.
  56. Sitaraman, Aravind; Zhang, Shujin, IP address allocation in a network environment.
  57. Sitaraman, Aravind; Zhang, Shujin, IP address allocation in a network environment.
  58. Sheth, Purnam Anil, IP pool management utilizing an IP pool MIB.
  59. Sheth,Purnam Anil, IP pool management utilizing an IP pool MIB.
  60. Sitaraman, Aravind; Alesso, Craig Michael; Yager, Charles Troper, ISDN B-channel count limitation.
  61. Schindler,Frederick R., Increased power for power over Ethernet applications.
  62. Jeyachandran, Suresh; Takayama, Masayuki; Wakai, Masanori, Information processing apparatus and method for appropriately terminating processing.
  63. Marshall,Robert A., Inline power device detection.
  64. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  65. Aravind Sitaraman ; Maria Alice Dos Santos ; Shuxian Lou ; Shujin Zhang ; Sampath Kumar Sthothra Bhasham, Integrated IP address management.
  66. Marshall,Robert A.; Randall,Anthony L.; Schindler,Frederick R., Integrated connector unit.
  67. Das, Sanjoy; Iyer, Balakrishna R.; Flynn, John T.; Hacigumus, Vahit H.; Aubert, Dante A.; Nguyen, Lu, Integrated storage appliance.
  68. Das,Sanjoy; Iyer,Balakrishna R.; Flynn,John T.; Hacigumus,Vahit H.; Aubert,Dante A.; Nguyen,Lu, Integrated storage appliance.
  69. Gutman Andrew Mark ; Sitaraman Aravind ; Sthothra Bhasham Sampath Kumar ; Suryanarayanan Kalpathi S., Integration of authentication authorization and accounting service and proxy service.
  70. Gutman, Andrew Mark; Sitaraman, Aravind; Sthothra Bhasham, Sampath Kumar; Suryanarayanan, Kalpathi S., Integration of authentication authorization and accounting service and proxy service.
  71. Kenworthy Stacy, Internal network node with dedicated firewall.
  72. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  73. Storey, Thomas W., Internet-based frequency and award redemption system and method.
  74. Schutz, Klaus U.; Richards, Stefan; Perlin, Eric C.; Ilac, Cristian; Reasor, Sterling M.; Flo, Eric; Stephens, John; Hutz, Benjamin A., Interoperable credential gathering and access modularity.
  75. Sitaraman,Aravind; Sheth,Purnam Anil, Load sharing between L2TP tunnels.
  76. Sheth, Purnam Anil, Local network address management.
  77. Daniel Wayne Bertram ; David Paul Dutcher ; Scott Alan Lenharth ; James Michael Rolette, Jr. ; Stanley Alan Smith ; Courtney Joseph Spooner, Management of authentication discovery policy in a computer network.
  78. Reed, Scott K.; Weber, Gregory; Eklund, Mark; Sargent, Robert; Rich, Steven J., Matching of RADIUS request and response packets during high traffic volume.
  79. Reed,Scott K.; Weber,Gregory; Eklund,Mark; Sargent,Robert; Rich,Steven J., Matching of radius request and response packets during high traffic volume.
  80. Herzog,Theodore Thomas; Chu,Jie; Xu,Xi, Method and apparatus for DNS resolution.
  81. Theodore Thomas Herzog ; Jie Chu ; Xi Xu, Method and apparatus for DNS resolution.
  82. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  83. Perry, Jr.,William A.; Kehn,Robert D.; Neilson,Eric C., Method and apparatus for automated assistance in configuring customer premises equipment.
  84. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  85. Kristen Marie Robins ; Ronnie B. Kon, Method and apparatus for configuration in multi processing engine computer systems.
  86. Kappes, Martin; Krishnan, P., Method and apparatus for content based authentication for network access.
  87. Karam,Roger A., Method and apparatus for detecting a compatible phantom powered device using common mode signaling.
  88. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  89. Zhang Shujin ; Sitaraman Aravind ; Lou Shuxian, Method and apparatus for domain name service request resolution.
  90. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  91. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  92. Wesinger, Jr., Ralph E.; Coley, Christopher D., Method and apparatus for electronically publishing information on a computer network.
  93. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  94. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  95. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  96. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  97. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  98. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  99. Mann, Joseph F.; Deng, Mingqi; Roden, Thomas Anthony, Method and apparatus for identifying a data communications session.
  100. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  101. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  102. Rosenhauer Alan ; Pruett Paul S. ; Jensen Joel R., Method and apparatus for obtaining network information by using a dynamic link library.
  103. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  104. Dent David E. ; Iverson Vaughn S. ; Richardson John W. ; Adams Robert T. ; Kidder Jeffrey N. ; Lin Chihuan M. ; Gardos Thomas R., Method and apparatus for protecting user privacy by providing an inaccurate measure of network systems accesssed.
  105. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a dynamically-updating pay-for-service web site.
  106. Bormann Richard J. ; Fulop Ann C. ; Shute Steven J. ; Vengatatry Radakichenane ; Weeks Phillip A., Method and apparatus for providing a graphical user interface for a distributed switch having multiple operators.
  107. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a pay-for-service web site.
  108. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  109. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method and apparatus for providing fungible intercourse over a network.
  110. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  111. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by filtering information.
  112. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by redirecting query requests.
  113. Monsen,Robert Charles; Mamillapalli,Sudhakar; Liu,Xiaoyi, Method and apparatus for securing information access.
  114. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  115. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  116. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  117. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  118. Segal Michael L. ; Chesavage David T. ; Doyle Thomas F., Method and apparatus for validating vehicle operators.
  119. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  120. Ooi, Chin Shyan Raymond; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks.
  121. Ooi,Chin Shyan Raymond; Lim,Lay Chuan; Poo,Teng Pin; Tan,Henry, Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks.
  122. White, Clive John, Method and apparatus to permit automated server determination for foreign system login.
  123. Bleumer, Gerrit; Heinrich, Clemens, Method and arrangement for provision of security relevant services via a security module of a franking machine.
  124. Poo, Teng Pin, Method and devices for data transfer.
  125. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  126. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  127. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  128. Feil, Stephan, Method and system for controlling access to a secondary system.
  129. Sheth,Purnam Anil; Sitaraman,Aravind; Yager,Charles T.; Burns,Gregory D., Method and system for controlling subscriber access in a network capable of establishing connections with a plurality of domain sites.
  130. Marshall,Robert A.; Sisk,James R., Method and system for converting alternating current to ethernet in-line power.
  131. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  132. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  133. Meehan, Patrick Carson; Price, Zachary Wisenbaker; Zambroski, Jr., Raymond Joseph; Frenchu, William Henry; Hickey, Shawn Patrick; White, Jesse Lee; Mohr, Anthony Allen; Gomsrud, Jeremy Wayne, Method and system for digital rights management of documents.
  134. Pigin, Vlad, Method and system for digital rights management of documents.
  135. Pigin, Vlad, Method and system for digital rights management of documents.
  136. Pigin, Vlad, Method and system for digital rights management of documents.
  137. Tran, Trung Minh, Method and system for implementing universal login via web browser.
  138. Nevarez Carlos A. ; White Kenneth Paul, Method and system for integrating additional functionality into a login system.
  139. Randall,Anthony L.; Marshall,Robert A.; Neal,Rachel C., Method and system for managing power delivery for power over Ethernet systems.
  140. Hacigumus, Vahit H.; Iyer, Balakrishna R., Method and system for providing access to a database.
  141. Hacigumus,Vahit H.; Iyer,Balakrishna R., Method and system for providing access to a database.
  142. Zhang,Shujin; Yager,Charles T., Method and system for providing network access to PPP clients.
  143. Lao, Guillermo, Method and system for subscription digital rights management.
  144. Lao, Guillermo, Method and system for subscription digital rights management.
  145. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  146. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method for accessing a digital network by way of one or more Internet service providers.
  147. Yamamoto Takashi,JPX, Method for connecting terminals to a host computer and a host computer therefor.
  148. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  149. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  150. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  151. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  152. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  153. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  154. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  155. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  156. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  157. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  158. Gmuender, John Everett; Selgas, Thomas Drennan; Massing, Michael Brian, Method for providing a network address.
  159. Jin Jane Jiaying ; Chu Jie ; Dos Santos Maria Alice ; Lou Shuxian ; Xu Xi ; Zhang Shujin, Method for providing single step log-on access to a differentiated computer network.
  160. Jin, Jane Jiaying; Chu, Jie; Dos Santos, Maria Alice; Lou, Shuxian; Xu, Xi; Zhang, Shujin, Method for providing single step log-on access to a differentiated computer network.
  161. Jin, Jane Jiaying; Chu, Jie; Dos Santos, Maria Alice; Lou, Shuxian; Xu, Xi; Zhang, Shujin, Method for providing single step log-on access to a differentiated computer network.
  162. Hallensleben, Sebastian, Method for requesting user access to an application.
  163. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  164. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method for updating personal financial information on a web site.
  165. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of accessing a selected network.
  166. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of connecting a user to a network.
  167. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  168. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of modifying a toolbar.
  169. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, Method of obtaining a network address.
  170. Fung, Daniel Y.; Evans, Stephen C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  171. Fung, Daniel Y.; Evans, Stephen C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  172. Fung, Daniel Y.; Hood, Brandon C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  173. Fung, Daniel Y.; Hood, Brandon C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  174. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  175. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  176. McCarty,Scott F.; Hammock,Jeanette L., Methods and systems for coordinating sessions on one or more systems.
  177. McCarty,Scott F.; Hammock,Jeanette L., Methods and systems for coordinating sessions on one or more systems.
  178. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  179. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  180. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  181. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  182. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  183. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  184. Zhang,Shujin; Jin,Jane Jiaying; Chu,Jie; Dos Santos,Maria Alice; Lou,Shuxian, Multiple network connections from a single PPP link with network address translation.
  185. Shujin Zhang ; Jane Jiaying Jin ; Jie Chu ; Maria Alice Dos Santos ; Shuxian Lou, Multiple network connections from a single PPP link with partial network address translation.
  186. Zhang, Shujin; Lou, Shuxian; Kochan, Roman Peter; Sitaraman, Aravind, Multiple-level internet protocol accounting.
  187. Zhang,Shujin; Lou,Shuxian; Kochan,Roman Peter; Sitaraman,Aravind, Multiple-level internet protocol accounting.
  188. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  189. Kenworthy, Stacy, Network attached device with dedicated firewall security.
  190. Reese,Curtis; Green,Brett A., Network connectivity establishment at user log-in.
  191. Austermann, III, John F.; Cummings, Marshall B., Network equipment and optional tether.
  192. Nair, Suresh; Gilson, Michael J., Network interface for industrial controller providing application programmer interface.
  193. Austermann, III, John F.; Cummings, Marshall B., Network system and optional tethers.
  194. Baumgartner, Yoanna; Elman, Anna; Harris, Glen Douglas, Non-uniform memory access (NUMA) data processing system that holds and reissues requests at a target processing node in response to a retry.
  195. Stokes Randall Kay, Object system capable of using different object authorization systems.
  196. Centemeri, Marco Cesare, On demand session provisioning of IP flows.
  197. Salama,Hussein F.; Sheth,Purnam Anil, On-demand address pools.
  198. Polnerow Dean ; Canon ; Jr. James M. ; Warner Lawrence Z. ; Halsey Bridget A. ; Adler Michael, On-line directory service.
  199. Polnerow Dean ; Canon ; Jr. James M. ; Warner Lawrence Z. ; Halsey Bridget A. ; Adler Michael, On-line directory service with registration system.
  200. Relyea, Robert, Organizing an extensible table for storing cryptographic objects.
  201. Sheth, Purnam Anil; Sitaraman, Aravind; Yager, Charles T.; Burns, Gregory D., PPP domain name and L2TP tunnel selection configuration override.
  202. Trostle, Jonathan T., Password based protocol for secure communications.
  203. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password in a particular remote server.
  204. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server.
  205. Yantzi, Donald J., Password management.
  206. Robins, Kristen Marie; Kon, Ronnie B., Password protection for high reliability computer systems.
  207. Jamieson,Steve; Balakrishnan,Anil; Houser,Christopher Robert; Torres,Rex George; Larsen,Guy Paul; Sharp,Joseph W., Password synchronization in a sign-on management system.
  208. Shujin Zhang ; Xi Xu ; Maria Alice Dos Santos ; Jane Jiaying Jin ; Jie Chu ; Shuxian Lou, Per user and network routing tables.
  209. Zhang, Shujin; Xu, Xi; Dos Santos, Maria Alice; Jin, Jane Jiaying; Chu, Jie; Lou, Shuxian, Per user and network routing tables.
  210. Zhang,Shujin; Xu,Xi; Dos Santos,Maria Alice; Jin,Jane Jiaying; Chu,Jie; Lou,Shuxian, Per user and network routing tables.
  211. Austerman, III, John F.; Cummings, Marshall B., Piece of ethernet terminal equipment.
  212. Tjong,Soemin; Morris,Larry; Davis,Glenn, Point-to-point data communication implemented with multipoint network data communication components.
  213. Tjong,Soemin; Morris,Larry; Davis,Glenn, Point-to-point data communication implemented with multipoint network data communication components.
  214. Cheng, Chong Seng; Poo, Teng Pin, Portable data storage device.
  215. Poo, Teng Pin; Lim, Lay Chuan, Portable device having biometrics-based authentication capabilities.
  216. Schindler, Frederick R.; Diab, Wael William, Power delivery over ethernet cables.
  217. De Nicolo Maurilio Tazio, Power feed for network devices.
  218. Sitaraman,Aravind; Sheth,Purnam Anil; Zhang,Shujin; Lou,Shuxian, Preventing HTTP server attacks.
  219. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  220. Doyle, Ronald P.; King, Julie H.; Pogue, Steven W., Providing end-to-end user authentication for host access using digital certificates.
  221. Aravind Sitaraman ; Craig Michael Alesso ; Charles Troper Yager, Proxy on demand.
  222. Sitaraman, Aravind; Alesso, Craig Michael; Yager, Charles Troper, Proxy on demand.
  223. Sitaraman, Aravind; Alesso, Craig Michael; Yager, Charles Troper, Proxy session count limitation.
  224. Sitaraman, Aravind; Alesso, Craig Michael; Yager, Charles Troper, Proxy session count limitation.
  225. D'Souza, Henry; Bayramoglu, Gokalp, Rapid network access computer system.
  226. Sakai, Yutaka, Relay apparatus, system, relay method, and computer readable medium.
  227. Mann, Joseph F.; Sitaraman, Aravind; Deng, Mingqi; Thomas, Leslie Alan, Remote system administration and seamless service integration of a data communication network management system.
  228. Mann, Joseph F.; Sitaraman, Aravind; Deng, Mingqi; Thomas, Leslie Alan, Remote system administration and seamless service integration of a data communication network management system.
  229. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  230. Dos Santos, Maria Alice; Zhang, Shujin, Reply to sender DHCP option.
  231. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  232. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  233. Dharmarajan,Baskaran, Request persistence during session authentication.
  234. Sukiman, Indrajanti; Salama, Hussein F.; Cramer, Jr., Thomas E.; Sheth, Purnam Anil, Resource allocation and reclamation for on-demand address pools.
  235. Aravind Sitaraman ; Shuxian Lou ; Shujin Zhang ; Sampath Kumar Sthothra Bhasham, Responding to network access requests using a transparent media access and uniform delivery of service.
  236. Ruzyski, David M; Hong, James H.; McNeil, Brian; Doerr, Anastasia C; Guzak, Chris J.; Reasor, Sterling M.; Stabb, Charles W.; Wentz, Brian D., Rights elevator.
  237. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  238. Henry R. Tumblin ; Michael S. Rothman ; Fred J. Pinkett ; James M. Geary ; Steve R. Artick, Seamless integration of application programs with security key infrastructure.
  239. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  240. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  241. Desai, Sachin; Liu, Qingqing; Fischer, Ronald, Secured inter-application communication in mobile devices.
  242. Dan Linh Nguyen, Security between client and server in a computer network.
  243. Chandrupatla, Anil Kumar; Chandrupatla, Sunil Kumar; Mishra, Kali Prasanna; Podar, Sunil Kumar; Sthothra Bhasham, Sampath Kumar, Sharing of NAS information between PoPs.
  244. Chandrupatla, Anil Kumar; Chandrupatla, Sunil Kumar; Mishra, Kali Prasanna; Podar, Sunil Kumar; Sthothra Bhasham, Sampath Kumar, Sharing of NAS information between PoPs.
  245. Fang Yi ; Kao I-Lung ; Milman Ivan Matthew ; Wilson George Conerly, Single sign-on (SSO) mechanism personal key manager.
  246. Zhang Shujin ; Lou Shuxian, Single step network logon based on point to point protocol.
  247. Zhang,Shujin; Lou,Shuxian, Single step network logon based on point to point protocol.
  248. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  249. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  250. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  251. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  252. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  253. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  254. Sitaraman, Aravind; Yager, Charles Troper, Support IP pool-based configuration.
  255. Sitaraman, Aravind; Yager, Charles Troper, Support IP pool-based configuration.
  256. Poo, Teng Pin, System and apparatus for compressing and decompressing data stored to a portable data storage device.
  257. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Hilton, Walter J.; Szebenyi, Joshua, System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components.
  258. Nath, Ujjual; Sharma, Gaurav; Fletcher, William, System and method for account access.
  259. Austermann, III, John F.; Cummings, Marshall B., System and method for adapting a piece of terminal equipment.
  260. Ooi, Chin Shyan; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, System and method for authentication.
  261. Ooi, Chin Shyan; Lim, Lay Chuan; Poo, Teng Pin; Tan, Henry, System and method for authentication.
  262. Ooi,Chin Shyan; Lim,Lay Chuan; Poo,Teng Pin; Tan,Henry, System and method for authentication.
  263. French Jennifer ; Wilder Jone, System and method for authentication of network users.
  264. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  265. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  266. Jennifer French ; Jone Wilder, System and method for authentication of network users.
  267. French Jennifer ; Wilder Jone, System and method for authentication of network users and issuing a digital certificate.
  268. French Jennifer ; Wilder Jone, System and method for authentication of network users with preprocessing.
  269. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr철m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  270. Brainard,John G.; Kaliski, Jr.,Burton S.; Nystr��m,Magnus; Rivest,Ronald L., System and method for authentication seed distribution.
  271. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  272. Wang,Xin, System and method for document distribution.
  273. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  274. Pollet, Cody; Burgess, Charles; Roach, Courtney; Hart, Brandon, System and method for enhanced data protection.
  275. Hahn,Timothy James, System and method for granting access to resources.
  276. Berger,Nancy; Brown,Leslie; Elliot,Victoria; Geiger,David; Hedges,John; Martin,Amanda; Matthews,Valerie; Morton,John; Peacock,Steve; Romano,Keith; Seymour,Jeffrey; Smith,Gina, System and method for integrated processing of information from a plurality of data systems.
  277. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  278. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  279. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  280. Scott,Robert Paxton, System and method for protecting network appliances against security breaches.
  281. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  282. Wang, Xin, System and method for protection of digital works.
  283. Bowers,Theodore J.; Ilijasic,Dean; Sanders,Shelley F., System and method for providing discriminated content to network users.
  284. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  285. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  286. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  287. Wang,Xin, System and method for transferring the right to decode messages.
  288. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  289. Jamieson,Steve; Balakrishnan,Anil; Al Hilali,Hilal; Houser,Christopher Robert; Torres,Rex George; Sharp,Joseph W.; Elien,Jean Emile, System and method for unified sign-on.
  290. Jamieson,Steve; Balakrishnan,Anil; Houser,Christopher Robert; Torres,Rex George; Sharp,Joseph W.; Larsen,Guy Paul; Carrell,Douglas R., System and method for unified sign-on.
  291. Keeler, James D.; Fink, Ian M.; Krenzer, Matthew M., System and method for user access to a distributed network communication system using persistent identification of subscribers.
  292. Broadhurst Christopher John Creighton,GBX ; Byrne Barry Anthony,GBX ; White Clive John,GBX ; Press James,GBX ; McMahon Piers,GBX, System and method for web server user authentication.
  293. Selgas, Thomas Drennan; Massing, Michael Brian; Gmuender, John Everett, System and method of accessing a network by way of different service providers.
  294. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  295. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  296. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  297. Bauman, Mark Linus; Bird, John Joseph; Remfert, Jeffrey Earl, System console device authentication in a network environment.
  298. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  299. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  300. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  301. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  302. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  303. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  304. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  305. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  306. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  307. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  308. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  309. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  310. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  311. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  312. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
  313. Ueda, Yukiya; Saito, Tsugune; Tamai, Shigetomo, System, method and program for off-line user authentication.
  314. Byrne,Barry A., Systems and methods for authenticating a user to a web server.
  315. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  316. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  317. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  318. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  319. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  320. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  321. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  322. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  323. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  324. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  325. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  326. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  327. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  328. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  329. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  330. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  331. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  332. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  333. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  334. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  335. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  336. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  337. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  338. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  339. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  340. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  341. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Peterson, Ellis K.; Twaddell, Gordon W., Systems and methods for state-less authentication.
  342. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Peterson, Ellis K.; Twaddell, Gordon W., Systems and methods for state-less authentication.
  343. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Peterson, Ellis K.; Twaddell, Gordon W., Systems and methods for state-less authentication.
  344. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K.; Twaddell,Gordon W., Systems and methods for state-less authentication.
  345. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  346. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  347. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  348. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  349. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  350. Hong, James H.; Schwartz, Jonathan D; Sheldon, Michael G.; Odins-Lucas, Zeke B., Task initiated account presentation for rights elevation.
  351. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  352. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  353. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  354. Trostle, Jonathan T., Timing attacks against user logon and network I/O.
  355. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  356. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  357. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  358. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  359. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  360. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  361. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  362. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  363. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  364. Beer John C. ; Kraft Timothy T. ; Beal Steven K. ; Wilson Steven C., URL login.
  365. Squier,Anthony C.; Austin,Calvin J., Universal session sharing.
  366. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  367. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  368. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  369. Yasuda,Hideto; Osawa,Tomohito, User authentication apparatus, method of user authentication, and storage medium therefor.
  370. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan, User authentication from non-native server domains in a computer network.
  371. Hashiguchi, Masahiro, User authentication method and user authentication system.
  372. Honarvar,Laurence Toraj; Witte,Brandon Raymond; Fatigante,Steve Chance; Harless,Gary Lynn, User authentication system and methods thereof.
  373. Odom, Gary, User selectable signature.
  374. Blair, Dana L., Using an authentication server to obtain dial-out information on a network.
  375. Colson, Christen J., Verification and authentication systems and methods.
  376. Colson, Christen J., Verification and authentication systems and methods.
  377. Aravind Sitaraman ; Craig Michael Alesso ; Charles Troper Yager, Virtual private data network session count limitation.
  378. Sitaraman, Aravind; Alesso, Craig Michael; Yager, Charles Troper, Virtual private data network session count limitation.
  379. Sitaraman,Aravind; Alesso,Craig Michael; Yager,Charles Troper, Virtual private data network session count limitation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로