$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for controlling access to a user secret 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/08
출원번호 US-0781626 (1997-01-10)
발명자 / 주소
  • Lipner Steven B.
  • Balenson David M.
  • Ellison Carl M.
  • Walker Stephen T.
출원인 / 주소
  • Trusted Information Systems, Inc.
대리인 / 주소
    Sterne, Kessler Goldstein & Fox P.L.L.C.
인용정보 피인용 횟수 : 170  인용 특허 : 39

초록

A system and method for data escrow cryptography are described. An encrypting user encrypts a message using a secret storage key (KS) and attaches a data recovery field (DRF), including an access rule index (ARI) and KS, to the encrypted message. The DRF and the encrypted message are stored in a sto

대표청구항

[ What is claimed is:] [1.] A data recovery center, comprising:means for receiving an access rule from an access rule defining system in communication with the data recovery center, wherein said access rule includes an authentication test or a compound authorization rule, said access rule defining a

이 특허에 인용된 특허 (39)

  1. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  2. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Card-computer moderated systems.
  3. Ford Warwick S. (Nepean CAX) Wiener Michael J. (Nepean CAX), Computer network cryptographic key distribution system.
  4. Duxbury Paul (Sandbach GB2), Computer system security.
  5. Golding Victor G. (Ower. Romsey GBX) Speirs Gregor H. (Winchester GBX), Computer system security device.
  6. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  7. Takaragi Kazuo (Ebina JPX) Ishii Yasuhiro (Hadano JPX) Nakamura Tsutomu (Musashino JPX), Cryptographic communication method and system.
  8. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  9. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Cryptographic facility environment backup/restore and replication in a public key cryptosystem.
  10. Barney George M. (Scottsdale AZ) Hardy Douglas A. (Mesa AZ) Balogh Craig R. (Mesa AZ), Cryptographic key management apparatus and method.
  11. Smid Miles E. (Silver Spring MD) Branstad Dennis K. (Gaithersburg MD), Crytographic key notarization methods and apparatus.
  12. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  13. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  14. Hirata Kozo (Yokohama JPX), File security system.
  15. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  16. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  17. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  18. Rose David K. (800 E. Ocean Blvd. Apt. #1410 Long Beach CA 90802), Method and apparatus for validating authorization to access information in an information processing system.
  19. Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
  20. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  21. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets.
  22. Jansen Cornelis J. A. (Eindhoven NLX) van de Pas Andries J. M. (Eindhoven NLX) van der Vlist Pieter (Nootdorp NLX) Hafkamp Frederik (The Hague NLX), Method of distributing and utilizing enciphering keys.
  23. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Optionally moderated transaction systems.
  24. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  25. Matyas Stephen M. (Manassas) Johnson Donald B. (Manassas) Le An V. (Manassas) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. (Somervil, Public key cryptosystem key management based on control vectors.
  26. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  27. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  28. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  29. Carter Steven H. (Great Missenden GB3) Lockyer Terence D. (Luton GB3) Gahan Christopher J. (Kings Langley GB3), Repeaters for secure local area networks.
  30. Lipner Steven B. (Wellesley MA) Gasser Morrie (Saugus MA) Lampson Butler W. (Cambridge MA), Secure user authentication from personal computer.
  31. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  32. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  33. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  34. Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
  35. Kaufman Charles W. (185 Indian Meadow Dr. Northborough MA 01532) Pearlman Radia J. (10 Huckleberry La. Acton MA 01720) Gasser Morrie (28 S. Mill St. Hopkinton MA 01748), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  36. Michener John R. (Princeton NJ) Samit Benjamin (Princeton NJ), System method and apparatus for authenticating an encrypted signal.
  37. Beller Michael J. (Red Bank NJ) Yacobi Yacov (Berkeley Heights NJ), Two-way public key authentication and key agreement for low-cost terminals.
  38. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Undeniable signature systems.
  39. Koenig Andrew R. (Elizabeth NJ), User authentication system employing encryption functions.

이 특허를 인용한 특허 (170)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  8. Churchill,Thomas; Connelly,John Patrick; Boyd,Eric; Panchapakesan,Venkat; Godin,Seth; Sohn,Henry Hyunsuk; Conway,David, Auction redemption system and method.
  9. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  10. Wilt,Andrew N.; Kelly,Michael J., Cipher method and system for verifying a decryption of an encrypted user data key.
  11. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  12. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  13. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  14. Benson, Glenn; Dichtl, Markus, Computer system for protecting software and a method for protecting software.
  15. Marvit,Maclen; Rosema,Keith David; Ubois,Jeffrey; Marvit,David, Controlling and tracking access to disseminated information.
  16. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  17. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  18. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  19. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  20. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  21. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  22. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  23. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  24. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  25. Cheston, Richard W.; Cromer, Daryl Carvis; Dayan, Richard Alan; Desai, Dhruv Manmohandas; Janick, Jan M.; Locker, Howard Jeffery; Trotter, Andy Lloyd; Ward, James Peter, Data processing system and method for remote recovery of a primary password.
  26. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  27. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  28. Hori, Yoshihiro; Hioki, Toshiaki; Kanamori, Miwa; Yoshikawa, Takatoshi; Takemura, Hiroshi; Hasebe, Takayuki; Hatakeyama, Takahisa; Tonegawa, Tadaaki; Anazawa, Takeaki, Device for reproducing data.
  29. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  30. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  31. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  32. Feng,An; Minjarez,Frank, Enforcing data protection legislation in Web data services.
  33. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  34. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  35. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  36. Chang,Hoi; Atallah,Mikhail J.; Rice,John R., Guards for application in software tamperproofing.
  37. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  38. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  39. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  40. Rossmann, Alain, Hybrid systems for securing digital assets.
  41. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  42. Felsher, David Paul, Information record infrastructure, system and method.
  43. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  44. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  45. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  46. Denis Pinkas FR, Key recovery process used for strong encryption of messages.
  47. Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kanno Seiko,JPX ; Ando Hiroyuki,JPX ; Morita Ichirou,JPX ; Kuroda Yasutsugu,JPX ; Torii Naoya,JPX ; Miyauchi Hiroshi,JPX ; Sako Kazue,JPX ; Yamazaki Masas, Key recovery system and key recovery method.
  48. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  49. Ogilvie John W.L., Message content protection and conditional disclosure.
  50. Nord, Joseph H.; Hoy, David Randal, Method and a system for responding locally to requests for file metadata associated with files stored remotely.
  51. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  52. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  53. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  54. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  55. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
  56. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  57. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  58. Lee, Sung-min; Oh, Seung-jae, Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key.
  59. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  60. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  61. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  62. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  63. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  64. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  65. Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
  66. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  67. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  68. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  69. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  70. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  71. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  72. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  73. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  74. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  75. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  76. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  77. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  78. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  79. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method and system for locating and accessing resources.
  80. Vainstein, Klimenty, Method and system for managing security tiers.
  81. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  82. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  83. Nath, Satyajit, Method and system for providing document retention using cryptography.
  84. Nath, Satyajit, Method and system for providing document retention using cryptography.
  85. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  86. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  87. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  88. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  89. Atallah, Mikhail J.; Chang, Hoi, Method and system for tamperproofing software.
  90. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  91. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  92. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  93. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  94. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  95. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  96. Lautenschlager, Wolfgang; Stahl, Uwe, Method of listening in to calls.
  97. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  98. Muir, Jeff; Stergiades, Andrew, Methods and apparatus for making a hypermedium interactive.
  99. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  100. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  101. McCarty,Scott F.; Hammock,Jeanette L., Methods and systems for coordinating sessions on one or more systems.
  102. McCarty,Scott F.; Hammock,Jeanette L., Methods and systems for coordinating sessions on one or more systems.
  103. McCarty,Scott F.; Hammock,Jeanette L., Methods and systems for coordinating the termination of sessions on one or more systems.
  104. Dalby,Richard Sean; Boyd,William A.; Matosich,Korb S.; Smith,Matthew O., Methods and systems for delivering announcements to users of an information system.
  105. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  106. Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
  107. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  108. Chinta, Madhav; Raj, Sam Arun, Methods and systems for launching applications into existing isolation environments.
  109. Chinta, Madhav; Raj, SamArun, Methods and systems for launching applications into existing isolation environments.
  110. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  111. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  112. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  113. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  114. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  115. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  116. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  117. Thapliyal, Ashish V.; Mittal, Vishal; Spataro, Tony; Kennedy, John, Methods and systems for providing scalable authentication.
  118. Rivera, Juan; Corbett, Tim; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  119. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  120. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  121. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  122. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  123. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  124. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  125. Hoffberg, Steven M., Multifactorial optimization system and method.
  126. Boyd,Eric; Bejar,Arturo; Pal,Anil; Roman,David, Offline-online incentive points system and method.
  127. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  128. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  129. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  130. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  131. Mire,Philip Jason, Public key infrastructure utilizing master key encryption.
  132. McGrew David A. ; Carman David W., Publicly verifiable key recovery.
  133. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  134. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  135. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  136. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  137. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  138. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  139. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  140. Atallah, Mikhail J.; Rice, John R.; Spafford, Eugene H.; Pantazopoulos, Kostas N., Secure computational outsourcing techniques.
  141. Andivahis,Dimitrios Emmanouil; Carnell,Shawn Michael Edwards; Fischer,Addison McElroy; Wettlaufer,Albert John, Secure electronic messaging system requiring key retrieval for deriving decryption keys.
  142. Thomas A. Maufer, Secure wiretap support for internet protocol security.
  143. Garcia,Denis Jacques Paul, Secured data format for access control.
  144. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  145. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  146. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  147. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  148. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  149. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  150. Hoffberg, Steven M., System and method for determining contingent relevance.
  151. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  152. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  153. Chang, Hoi; Kerschbaum, Florian; Faulkner, Kyle; M'Raïhi, David; Mehlberg, Michael Joseph, System and method for inserting security mechanisms into a software program.
  154. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  155. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  156. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  157. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  158. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  159. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  160. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  161. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  162. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  163. Van Gunter,David; Waters,Lester L., System and method of user authentication for network communication through a policy agent.
  164. malik Sohail ; Muresan Michael, System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver.
  165. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  166. Atkins, Barry; Challener, David Carroll; Novak, Frank; Rusnak, Joseph Gary; Timmons, Kenneth D.; Vetter, William W., System, method, and program for managing a user key used to sign a message for a data processing system.
  167. Birch, Jonathan; Date, Amit; Jump, Daniel; Malhotra, Vikas; Albrecht, Bradley; Demircioglu, Ali Deniz, Techniques to store secret information for global data centers.
  168. Douglas Allan Hardy ; Douglas Matthew East, Traffic key access method and terminal for secure communication without key escrow facility.
  169. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  170. Gennaro Rosario ; Johnson Donald Byron ; Karger Paul Ashley ; Matyas ; Jr. Stephen Michael ; Peyravian Mohammad ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Two-phase cryptographic key recovery system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로