$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Certificate revocation system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-009/30
  • H04L-009/00
출원번호 US-0559533 (1995-11-16)
발명자 / 주소
  • Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146)
인용정보 피인용 횟수 : 240  인용 특허 : 0

초록

A method of managing certificates in a communication system having a certifying authority and a directory. Preferably, the method begins by having the certifying authority generate certificates by digitally signing a given piece of data. At a later point time, the certifying authority may produce a

대표청구항

A method of managing a plurality of certificates, comprising the steps of: having a certifying authority provide a second party with authenticated information about certificates; having a third party request information from the second party about an unissued certificate; and having the second party

이 특허를 인용한 특허 (240)

  1. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  3. Libin, Phil; Micali, Silvio, Access control.
  4. Libin, Phil, Actuating a security system using a wireless device.
  5. Libin,Phil, Actuating a security system using a wireless device.
  6. Heller, Toby; Hoffberg, Steven M., Agent training sensitive call routing system.
  7. Hoffberg, Steven, Agent training sensitive call routing system.
  8. Hoffberg, Steven M., Agent training sensitive call routing system.
  9. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  10. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  11. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  12. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  13. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  14. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  15. Timothy P. Barber, Architecture for access over a network to pay-per-view information.
  16. Levenberg, Richard, Authentication of digital certificates used by portable computing devices.
  17. Perlman Radia Joy ; Hanna Stephen R., Authentication system and process.
  18. Goel, Parveen Kumar, Authorization system and a method of authorization.
  19. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  20. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  21. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  22. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  23. Bolle,Rudolf Maarten; Connell,Jonathan H.; Ratha,Nalini K.; Percello,Louis J., Business system and method using a distorted biometrics.
  24. Micali Silvio, Certificate revocation system.
  25. Micali Silvio, Certificate revocation system.
  26. Micali, Silvio, Certificate revocation system.
  27. Micali, Silvio, Certificate revocation system.
  28. Yamauchi, Hisayuki, Change in identification information causing request for new certificate issuance.
  29. Mackenzie, Philip; Ramzan, Zulfikar Amin; Gentry, Craig B., Changing states of communication links in computer networks in an authenticated manner.
  30. Frankel, Yair; Kravitz, David William; Montgomery, Charles Thomas; Yung, Marcel Mordechay, Computer-based method and system for aiding transactions.
  31. Frankel, Yair; Kravitz, David William; Montgomery, Charles Thomas; Yung, Marcel Mordechay, Computer-based method and system for aiding transactions.
  32. Frankel,Yair; Kravitz,David William; Montgomery,Charles Thomas; Yung,Marcel Mordechay, Computer-based method and system for aiding transactions.
  33. Yair Frankel ; David William Kravitz ; Charles Thomas Montgomery ; Marcel Mordechay Yung, Computer-based method and system for aiding transactions.
  34. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  35. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  36. Dickinson, Alexander G; Berger, Brian; Dobson, Robert T, Context sensitive dynamic authentication in a cryptographic system.
  37. Dickinson,Alexander G.; Berger,Brian; Dobson, Jr.,Robert T., Context sensitive dynamic authentication in a cryptographic system.
  38. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  39. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  40. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  41. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  42. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  43. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  44. Chowdhury, Atish Datta; Chaturvedi, Namit; Balasubramanian, Meenakshi; Ganesh, Arul, Decentralized access control framework.
  45. de Silva, Mahinda K.; Moskovitz, Ram A., Digital certificate cross-referencing.
  46. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  47. Engberg, David, Distributed delegated path discovery and validation.
  48. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  49. Micali, Silvio, Efficient certificate revocation.
  50. Micali,Silvio, Efficient certificate revocation.
  51. Silvio Micali, Efficient certificate revocation.
  52. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  53. Gentry, Craig B.; Ramzan, Zulfikar Amin; Woodruff, David P., Exclusive set system constructions including, but not limited to, applications to broadcast encryption and certificate revocation.
  54. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  55. Sekar Chandersekaran ; Sarbari Gupta, Framework-based cryptographic key recovery system.
  56. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  57. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  58. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  59. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  60. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  61. Blancas,Irma; Krimmel,Karl F., Identification of an individual using a multiple purpose card.
  62. Felsher, David Paul, Information record infrastructure, system and method.
  63. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Intelligent communication routing.
  64. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Intelligent communication routing.
  65. Wu, Wai; Hoffberg, Steven M., Intelligent communication routing system and method.
  66. Wu, Wai; Hoffberg, Steven M., Intelligent communication routing system and method.
  67. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  68. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  69. Johnson, Donald B., Key validation scheme.
  70. Johnson, Donald B., Key validation scheme.
  71. Johnson,Donald B., Key validation scheme.
  72. Forstall, Scott; Chaudhri, Imran A.; Louch, John O.; Peyton, Eric Steven, Linked widgets.
  73. de Silva, Mahinda K.; Tulshibagwale, Atul; Yuan, Xinhong, Local hosting of digital certificate services.
  74. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  75. Louch, John O.; Chaudhri, Imran A.; Shebanek, Michael, Management and generation of dashboards.
  76. Forstall, Scott; Chaudhri, Imran A.; Louch, John O.; Peyton, Eric Steven, Management of user interface elements in a display environment.
  77. Oliver,David M.; Densmore, Jr.,William P.; Callahan,Michael J., Managing transactions on a network: four or more parties.
  78. Blaze Matthew A. ; Feigenbaum Joan ; Strauss Martin J, Method and apparatus for compliance checking in a trust management system.
  79. Van Oorschot Paul C.,CAX, Method and apparatus for creating communities of trust in a secure communication system.
  80. Jakobsson, Bjorn Markus, Method and apparatus for efficient computation of one-way chains in cryptographic applications.
  81. Pasieka,Michael S., Method and apparatus for revocation list management.
  82. Parkhill, Robert Everett, Method and apparatus for updating web certificates.
  83. Van Oorschot Paul C.,CAX ; Wiener Michael J.,CAX ; Curry Ian,CAX, Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths.
  84. Montgomery,David, Method and apparatus improving efficiency of end-user certificate validation.
  85. Barber Timothy P., Method and architecture for multi-level commissioned advertising on a computer network.
  86. Rodov, Michael, Method and service for providing access to premium content and dispersing payment therefore.
  87. Rodov, Michael, Method and service for providing access to premium content and dispersing payment therefore.
  88. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  89. Cook, Jeff; Heyman, Michael; Dinsmore, Peter, Method and system for management and notification of electronic certificate changes.
  90. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  91. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Method and system for matching entities in an auction.
  92. Wu, Wai; Hoffberg, Steven M., Method and system for matching entities in an auction.
  93. Wu, Wai; Hoffberg, Steven M., Method and system for matching entities in an auction.
  94. Van Oorschot Paul C.,CAX, Method for creating communities of trust in a secure communication system.
  95. William Aiello ; Sachin Lodha ; Rafail Ostrovsky, Method for efficiently revoking digital identities.
  96. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  97. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  98. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  99. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  100. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  101. Olarig Sompong P. ; Angelo Michael F., Method for the secure remote flashing of a BIOS memory.
  102. Jakobsson, Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  103. Jakobsson, Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  104. Jakobsson, Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  105. Jakobsson, Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  106. Jakobsson,Bjorn Markus, Methods and apparatus for efficient computation of one-way chains in cryptographic applications.
  107. Tenenboym, Isak; Kaufman, Marc T.; Levy, Philip, Methods and apparatus for validating a digital signature.
  108. Ramzan,Zulfikar Amin; Gentry,Craig B.; Bruhn,Bernhard, Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity.
  109. Hoffberg, Steven M., Multifactorial optimization system and method.
  110. Bulman, Richard L.; Dahl, Brad; Gravitz, Steve, Object customization and presentation system.
  111. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  112. Gindin,Thomas L.; Benantar,Messaoud; Sweeny,James W.; Dayka,John C., Password exposure elimination for digital signature coupling with a host identity.
  113. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  114. Chaudhrl, Imran A.; Louch, John O.; Christle, Gregory N.; Peyton, Eric Steven; Tiene, Kevin; Forstall, Scott, Preview and installation of user interface elements in a display environment.
  115. Forstall, Scott; Chaudhri, Imran A.; Louch, John O.; Peyton, Eric Steven, Preview including theme based installation of user interface elements in a display environment.
  116. Bellare Mihir ; Rogaway Phillip, Probabilistic signature scheme.
  117. Bellare,Mihir; Rogaway,Phillip, Probabilistic signature scheme.
  118. Goel, Parveen Kumar, RFID reader for facility access control and authorization.
  119. Asay, Alan; Turner, Paul A.; Sudia, Frank W.; Ankney, Richard, Reliance server for electronic transaction system.
  120. Chaudhri, Imran A.; Louch, John; Grignon, Andrew M.; Christie, Gregory N., Remote access to layer and user interface elements.
  121. Hallin, Philip J.; Mehta, Yogesh A.; Barhudarian, Violet Anna; Nyström, Magnus Bo Gustaf, Revocation information for revocable items.
  122. Dillaway, Blair Brewster; Lafornara, Philip; LaMacchia, Brian A.; Malaviarachchi, Rushmi U.; Manferdelli, John L.; Rose, III, Charles F., Revocation of a certificate and exclusion of other principals in a digital rights management (DRM) system based on a revocation list from a delegated revocation authority.
  123. Gentry, Craig B.; Ramzan, Zulfikar Amin; Bruhn, Bernhard, Revocation of cryptographic digital certificates.
  124. Gentry, Craig B.; Ramzan, Zulfikar Amin; Bruhn, Bernhard, Revocation of cryptographic digital certificates.
  125. Gentry, Craig B.; Ramzan, Zulfikar Amin; Bruhn, Bernhard, Revocation of cryptographic digital certificates.
  126. Gentry, Craig B.; Ramzan, Zulfikar Amin; Bruhn, Bernhard, Revocation of cryptographic digital certificates.
  127. Gentry, Craig B.; Ramzan, Zulfikar Amin; Bruhn, Bernhard, Revocation of cryptographic digital certificates.
  128. Louch, John O.; Sige, Aaron; Stachowiak, Maciej, Safe distribution and use of content.
  129. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  130. Cook, Jeffrey V.; Heyman, Michael; Dinsmore, Peter, Scalable system and method for management and notification of electronic certificate changes.
  131. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  132. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  133. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  134. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  135. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  136. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  137. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  138. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  139. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  140. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  141. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  142. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  143. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  144. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  145. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  146. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  147. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  148. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  149. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  150. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  151. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  152. Whitfield, Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  153. Whitfield,Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  154. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  155. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  156. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  157. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  158. Louch, John O.; Peyton, Eric Steven; Hynes, Christoper; Forstall, Scott; Christie, Gregory N., Synchronization of widgets and dashboards.
  159. Duane,William M.; R��stin,Peter, System and method for certificate exchange.
  160. Hoffberg, Steven M., System and method for determining contingent relevance.
  161. Bolle, Rudolf Maarten; Connell, Jonathan H.; Ratha, Nalini K., System and method for distorting a biometric for transactions with enhanced security and privacy.
  162. Hope,Brian A.; Filipi Martin,Adrian; Smith,Michael, System and method for electronic certificate revocation.
  163. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  164. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  165. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  166. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  167. Yamagishi,Yasuaki; Gonno,Yoshihisa; Nishio,Fumihiko; Tsunoda,Tomohiro, System and method for managing changes in a public key certificate directory.
  168. Nagel,Robert H., System and method for production and authentication of original documents.
  169. Nagel,Robert H., System and method for production and authentication of original documents.
  170. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  171. Ghosh, Subhas Kumar, System and method for secure and distributed physical access control using smart cards.
  172. Nagel, Robert H.; Felsher, David P.; Hoffberg, Steven M., System and method for secure communications involving an intermediary.
  173. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  174. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  175. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  176. Oliver, David M.; Densmore, William P.; Callahan, Michael J., System for management of alternatively priced transactions on network.
  177. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  178. Grawrock David ; Lohstroh Shawn R., System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record.
  179. Lee, Elizabeth L.; Schlesinger, Phillip R., System, apparatus, and method for performing cryptographic validity services.
  180. Williams Humphrey, System, method and article of manufacture for initiation of software distribution from a point of certificate creation utilizing an extensible, flexible architecture.
  181. Atkins, Barry; Challener, David Carroll; Novak, Frank; Rusnak, Joseph Gary; Timmons, Kenneth D.; Vetter, William W., System, method, and program for managing a user key used to sign a message for a data processing system.
  182. Worrill, Joshua; Laycock, Graeme, Systems and methods configured to enable content sharing between client terminals of a digital video management system.
  183. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for a cryptographic file system layer.
  184. Anthe, II, Charles John; Gok, Huseyin Gokmen, Systems and methods for automated configuration of secure web site publishing.
  185. Bhandari, Neelendra; Joshi, Priteshkumar D; Reddy, Chandrakanth C; Goel, Parveen Kumar, Systems and methods for commissioning access control devices.
  186. Bhandari, Neelendra; Joshi, Priteshkumar D; Reddy, Chandrakanth C; Goel, Parveen Kumar, Systems and methods for configuring access control devices.
  187. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  188. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  189. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  190. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  191. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  192. Bhandari, Neelendra; Reddy, Chandrakantha C; Morrison, John David; Hussain, Mushabbar; McDonnell, Neil, Systems and methods for interacting with access control devices.
  193. Roy, Sanjay; Gali, Muneswar Rao; Bhandari, Neelendra; Chappidi, Gopi; Reddy, Chandrakantha, Systems and methods for location aware access control management.
  194. Bhandari, Neelendra; Roy, Sanjay; Reddy, Chandrakantha, Systems and methods for managing access control devices.
  195. Jones, Bryan; Palme, Matt; Quaill, Stephen; Cheung, Edward, Systems and methods for managing configuration data at disconnected remote devices.
  196. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  197. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  198. Lee, Martin, Systems and methods for managing video data.
  199. Masters, Amy; Bhandari, Ajit; Kwon, Dae-Soon; Palmer, Sally-Anne, Systems and methods for managing video data.
  200. Worrill, Joshua; Laycock, Graeme; Masters, Amelia; Flannery, Mark, Systems and methods for managing video data.
  201. Flannery, Mark, Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface.
  202. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  203. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  204. Orsini, Rick L.; O'Hare, Mark S.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  205. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  206. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  207. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  208. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  209. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  210. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  211. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  212. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  213. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  214. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  215. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  216. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  217. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  218. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  219. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  220. Wu,Wai; Heller,Toby; Hoffberg,Steven M., Telephony control system with intelligent call routing.
  221. Wu,Wai; Heller,Toby; Hoffberg,Steven M., Telephony control system with intelligent call routing.
  222. Peyravian, Mohammad; Roginsky, Allen; Zunic, Nevenko; Matyas, Jr., Stephen M., Time stamping method using time delta in key certificate.
  223. Al-Herz, Ahned Ibrahim; Ibrahim, Mohammad K., Token based new digital cash protocols with combined blind digital signature and pseudonym authentication.
  224. Micali Silvio, Tree-based certificate revocation system.
  225. McGeachie, John J., Universal validation module for access control systems.
  226. Ramzan, Zulfikar Amin; Gentry, Craig B.; Bruhn, Bernhard, Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates.
  227. Ramzan, Zulfikar Amin; Gentry, Craig B.; Bruhn, Bernhard, Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates.
  228. Ramzan,Zulfikar Amin; Gentry,Craig B.; Bruhn,Bernhard, Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates.
  229. Louch, John O.; Chaudhri, Imran A., User-centric widgets and dashboards.
  230. Louch, John O.; Chaudhri, Imran A., User-centric widgets and dashboards.
  231. Louch, John O.; Chaudhri, Imran A., User-centric widgets and dashboards.
  232. Chaudhri, Imran A.; Louch, John O.; Grignon, Andrew M.; Christie, Gregory N., Visual characteristics of user interface elements in a unified interest layer.
  233. Friedman, David; Wu, Wai, Voice over internet call center integration.
  234. Friedman, David; Wu, Wai, Voice over internet call center integration.
  235. Friedman,David; Wu,Wai, Voice over internet call center integration.
  236. Friedman, David; Wu, Wai, Voice over internet integration.
  237. Friedman, David; Wu, Wai, Voice over internet integration.
  238. Rudolph, Chris; Murrett, Mac; Revis, Kurt, Web widgets.
  239. Louch, John O.; Forstall, Scott; Peyton, Eric Steven, Widget security.
  240. Forstall, Scott; Chaudhri, Imran A.; Louch, John O.; Peyton, Eric Steven, Workflow widgets.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로