$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for secure group communications via multicast or broadcast 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0665195 (1996-06-14)
발명자 / 주소
  • Mittra Suvo
대리인 / 주소
    Limbach & Limbach
인용정보 피인용 횟수 : 240  인용 특허 : 12

초록

A system and method for secure group communication via multicast or broadcast transmission. In preferred embodiments, the system of the invention implements a secure multicast group consisting of senders, receivers, a group security controller (GSC), and at least one trusted intermediary (TI) server

대표청구항

[ What is claimed is:] [1.] A system for implementing a secure multicast group in a scalable manner, said system including:a group security controller which encrypts data with a first group key and causes the encrypted data to be multicast to a first sub-group; anda number of trusted intermediary se

이 특허에 인용된 특허 (12)

  1. Fahn Paul N. (Redwood City CA) Kaliski ; Jr. Burton S. (San Carlos CA) Robshaw Matthew J. B. (San Francisco CA) Fahn Paul N. (Redwood City CA), Abuse-resistant object distribution system and method.
  2. Okamoto Eiji (Tokyo JPX) Nakamura Katsuhiro (Tokyo JPX), Enciphering key distribution system for subscription TV broadcast or catv system.
  3. Mason Arthur G. (Hampshire GBX), Encrypted broadcast television system.
  4. Takaragi Kazuo (Ebina JPX) Susaki Seiichi (Yokohama JPX) Matsumoto Hiroshi (Sagamihara JPX) Nakamura Tsutomu (Takarazuka JPX), Group cipher communication method and group cipher communication system.
  5. Tseung, Lawrence C. N., Guaranteed reliable broadcast network.
  6. Aziz Ashar (Fremont CA), Method and apparatus for a key-management scheme for internet protocols.
  7. Aziz Ashar (Fremont CA), Method and apparatus for stepping pair keys in a key-management scheme.
  8. Wechselberger Anthony J. (San Diego CA) Bluestein Leo I. (Rancho Bernardo CA) Jedynak Leo (San Diego CA) Drake David A. (Escondido CA) Simpson Larry W. (Poway CA), Multi-layer encryption system for the broadcast of encrypted information.
  9. Lo William (Santa Clara CA) Crayford Ian (San Jose CA), Multiple address security architecture.
  10. Lo William (Santa Clara CA) Crayford Ian (San Jose CA), Programmable disrupt of multicast packets for secure networks.
  11. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  12. Aziz Ashar (Fremont CA) Mulligan Geoffrey (Fremont CA) Patterson Martin (Grenoble FRX) Scott Glenn (Sunnyvale CA), System for signatureless transmission and reception of data packets between computer networks.

이 특허를 인용한 특허 (240)

  1. Zuili Patrick,FRX ; Ice Edward, Adaptive communication system enabling dissimilar devices to exchange information over a network.
  2. Rose, Gregory Gordon; Semple, James; Quick, Roy Franklin, Apparatus and method for a secure broadcast system.
  3. Hardjono, Thomas, Apparatus and method for authenticating messages in a multicast.
  4. Hardjono, Thomas; Cain, Bradley, Apparatus and method for authenticating messages transmitted across different multicast domains.
  5. Hardjono, Thomas, Apparatus and method for limiting unauthorized access to a network multicast.
  6. Li,Yunzhou; Ng,Billy C.; Hayes,Jyothi, Apparatus and method of implementing multicast security between multicast domains.
  7. Rao, Ravi; Flannery, Eliot John; Weisberg, Tomer; Parks, III, Upshur Warren; Gupta, Rohit; Tao, Kevin R.; Anirudh, Anirudh; Thaler, David G.; Classen, Andre R.; Manion, Todd R., Application programming interface for inviting participants in a serverless peer to peer network.
  8. Markham,Thomas R.; Bogle,Jessica J.; Payne, Jr.,Charles N., Associative policy model.
  9. Pinkas, Binyamin, Authentication system and method.
  10. Giniger, Michael L.; Hilton, Warren S., Automated operation and security system for virtual private networks.
  11. Giniger, Michael L.; Hilton, Warren S., Automated operation and security system for virtual private networks.
  12. Giniger,Michael L.; Hilton,Warren S., Automated operation and security system for virtual private networks.
  13. Case, Sr., Paul, Case secure computer architecture.
  14. Case, Sr., Paul, Case secure computer architecture.
  15. William H. Fitler, Jr. ; Timothy A. Howes ; Bruce L. Steinback, Centralized directory services supporting dynamic group membership.
  16. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Channel-specific file system views in a private network using a public-network infrastructure.
  17. Niemi, Valtteri; Vainio, Antti-Pentti; Sarkkinen, Sinikka; Karhuluoma, Niina; Kall, Jan, Ciphering as a part of the multicast concept.
  18. Sarkkinen, Sinikka; Kettunen, Kimmo; Karhuluoma, Niina; Vainio, Antti-Pentti; Niemi, Valtteri; Kall, Jan, Ciphering as a part of the multicast concept.
  19. Sarkkinen, Sinikka; Kettunen, Kimmo; Karhuluoma, Niina; Vainio, Antti-Pentti; Niemi, Valtteri; Kall, Jan, Ciphering data for transmission in a network.
  20. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Communicating between an application process and a server process to manage peer-to-peer identities.
  21. Inoue, Daisuke; Kuroda, Masahiro, Communication method and communication system using decentralized key management scheme.
  22. Kodama,Mitsuru; Tsuji,Kenjirou; Nishimura,Issei, Communication system and transfer device.
  23. Leser, Norbert; Kyne, Fajen; Morgan, Robert; Barclay, Christopher B.; Gaudet, Edward J.; Schoonmaker, James; Epstein, Arnold S.; Smith, Michael D., Computer method and apparatus for managing data objects in a distributed context.
  24. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Conflict resolution for keychain syncing.
  25. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Conflict resolution for keychain syncing.
  26. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Conflict resolution for keychain syncing.
  27. Classen, Andre R.; Anirudh, Anirudh; Thaler, David G.; Tao, Kevin R.; Rao, Ravi T.; Gupta, Rohit; Weisberg, Tomer; Parks, III, Upshur Warren, Contact management in a serverless peer-to-peer system.
  28. Zhu, Bin; Feng, Min, Content encryption schema for integrating digital rights management with encrypted multicast.
  29. Goodman, Brian D.; Jania, Frank L.; Kebinger, James K.; Shaw, Darren M., Cooperative non-repudiated message exchange in a network environment.
  30. Goodman, Brian D; Jania, Frank L.; Kebinger, James K.; Shaw, Darren M., Cooperative non-repudiated message exchange in a network environment.
  31. Kadansky, Miriam C.; Chiu, Dah Ming; Hanna, Stephen R.; Hurst, Stephen A.; Wesley, Joseph S.; Rosenzweig, Philip M.; Perlman, Radia J., DYNAMIC OPTIMIZATION FOR RECEIVERS USING DISTANCE BETWEEN A REPAIR HEAD AND A MEMBER STATION IN A REPAIR GROUP FOR RECEIVERS HAVING A CLOSELY KNIT TOPOLOGICAL ARRANGEMENT TO LOCATE REPAIR HEADS NEAR .
  32. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Data protection for keychain syncing.
  33. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Data protection for keychain syncing.
  34. McGrew, David, Data storage using encoded hash message authentication code.
  35. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  36. Caronni,Germano; Gupta,Amit; Markson,Tom R.; Kumar,Sandeep; Schuba,Christoph L.; Scott,Glenn C., Decoupling access control from key management in a network.
  37. Fukushima,Hidehiro; Morimoto,Shigeki, Device and system for multicast communication.
  38. Enokida,Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
  39. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  40. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  41. Markham, Thomas R., Distributed firewall system and method.
  42. Hardjono, Thomas P., Distributed group key management for multicast security.
  43. Dondeti Lakshminath R. ; Mukherjee Sarit ; Samal Ashok, Distributed group key management scheme for secure many-to-many communication.
  44. Edward Robert Segal, Distributed security system for a communication network.
  45. Gudjonsson, Gudjon M.; Emilsson, Kjartan Pierre, Distributed system to intelligently establish sessions between anonymous users over various networks.
  46. Hales Jon Benedict ; Mills Michael David ; Miracle Nancy Elizabeth Hendrick, Distributed video communications system.
  47. Fuchs, Meir; Morag, Guy; Goren, Ido; Amram, Noam, Distribution of multicast data to users.
  48. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  49. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  50. Dondeti Lakshminath R. ; Mukherjee Sarit ; Samal Ashok, Dual encryption protocol for scalable secure group communication.
  51. Dondeti, Lakshminath R.; Mukherjee, Sarit; Samal, Ashok, Dual encryption protocol for scalable secure group communication.
  52. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  53. Caronni Germano ; Waldvogel Marcel,CHX, Efficient, secure multicasting with global knowledge.
  54. Caronni Germano ; Waldvogel Marcel,CHX, Efficient, secure multicasting with minimal knowledge.
  55. Kuroda, Yasutsugu; Kamada, Jun; Iwase, Shoko; Noda, Bintatsu; Ono, Etsuo, Electronic data storage apparatus with key management function and electronic data storage method.
  56. Gundavelli, Srinath; McNamee, David, Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key.
  57. Hardjono Thomas P., Exchanging a secret over an unreliable network.
  58. Sun, Yanbin; Wu, Guangsheng; Zhang, Li; Sun, Fanglin; Chen, Jim, Extending data over cable service interface specification (DOCSIS) provisioning of ethernet passive optical network (EPON) (DPoE) to EPON over coax (EPoC) multicast key management.
  59. Sun, Yanbin; Wu, Guangsheng; Zhang, Li; Sun, Fanglin; Chen, Jim, Extending data over cable service interface specification (DOCSIS) provisioning of ethernet passive optical network (EPON) (DPoE) to EPON over coax (EPoC) multicast key management.
  60. Sun, Yanbin; Wu, Guangsheng; Zhang, Li; Sun, Fanglin; Chen, Jim, Extending data over cable service interface specification (DOCSIS) provisioning of ethernet passive optical network (EPON) (DPoE) to EPON over coax (EPoC) multicast key management.
  61. Pellacuru,Chinna Narasimha Reddy, Facilitating secure communications among multicast nodes in a telecommunications network.
  62. Aoki, Ryuichi, Group oriented public key encryption and key management system.
  63. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  64. Rossmann, Alain, Hybrid systems for securing digital assets.
  65. Ishiguro,Ryuji, Information processing apparatus.
  66. Asano, Tomoyuki; Osawa, Yoshitomo; Oishi, Tateo; Ishiguro, Ryuji; Taki, Ryuta, Information processing system and method.
  67. Asano,Tomoyuki; Osawa,Yoshitomo; Oishi,Tateo; Ishiguro,Ryuji; Taki,Ryuta, Information processing system and method.
  68. Asano,Tomoyuki; Osawa,Yoshitomo; Oishi,Tateo; Ishiguro,Ryuji; Taki,Ryuta, Information processing system and method.
  69. Asano,Tomoyuki; Osawa,Yoshitomo; Oishi,Tateo; Ishiguro,Ryuji; Taki,Ryuta, Information processing system and method.
  70. Ishiguro, Ryuji; Osawa, Yoshitomo; Oishi, Tateo; Asano, Tomoyuki; Mitsuzawa, Atsushi, Information processing system and method.
  71. Ishiguro,Ryuji; Osawa,Yoshitomo; Oishi,Tateo; Asano,Tomoyuki; Mitsuzawa,Atsushi, Information processing system and method for distributing encrypted message data.
  72. Ishiguro,Ryuji; Osawa,Yoshitomo; Oishi,Tateo; Asano,Tomoyuki; Mitsuzawa,Atsushi, Information processing system and method for managing encrypted data with tag information.
  73. Wang, Shengqiang; Sharma, Ranjan, Internet protocol television via public Wi-Fi network.
  74. Amram, Noam; Entin, Leonid, Iterative forward error correction.
  75. Johansson, Mattias; Lindholm, Fredrik, Key management messages for secure broadcast.
  76. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Keychain syncing.
  77. Brouwer, Michael; De Atley, Dallas B.; Adler, Mitchell D., Keychain syncing.
  78. Diehl, Eric; Andreaux, Jean-Pierre; Durand, Alain, Local digital network, methods for installing new devices and data broadcast and reception methods in such a network.
  79. Oka,Kenichiro, Local public information system.
  80. Son, Yeon-Joo; Kwon, Myung-Eun; Park, Yong-Joo; Ahn, Ki-Hwan; Cho, Young-Bin, M2M data management.
  81. Manion,Todd R.; Donner,Robert D.; Simionescu,Radu, Managed peer name resolution protocol (PNRP) interfaces for peer to peer networking.
  82. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  83. Heredia, Edwin A; Sadovsky, Vladimir, Media exchange protocol supporting format conversion of media items.
  84. Agashe, Parag A.; Quick, Jr., Roy Franklin; Wang, Jun; Hsu, Raymond T., Method and apparatus for broadcast services in a communication system.
  85. Srivastava, Sunil K.; Trostle, Jonathan; Bell, Raymond; Golla, Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  86. Srivastava,Sunil K.; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  87. Srivastava, Sunil K., Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure.
  88. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  89. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  90. Weis, Brian E.; Vilhuber, Jan; Sullenberger, Michael Lee; Detienne, Frederic R. P., Method and apparatus for distributing group data in a tunneled encrypted virtual private network.
  91. Weis, Brian E.; Vilhuber, Jan; Sullenberger, Michael Lee; Detienne, Frederic R.P., Method and apparatus for distributing group data in a tunneled encrypted virtual private network.
  92. Hardjono, Thomas; Cain, Brad, Method and apparatus for distributing public key certificates.
  93. Eschenauer,Laurent; Gligor,Virgil D., Method and apparatus for key management in distributed sensor networks.
  94. Crane, Michael A.; Malik, Sohail H.; Wray, John Clay Richard, Method and apparatus for managing keys for cryptographic operations.
  95. Kadansky Miriam C. ; Hanna Stephen R., Method and apparatus for multicast indication of group key change.
  96. Chen,Shigang; Wei,Liman, Method and apparatus for negotiating Diffie-Hellman keys among multiple parties using a distributed recursion approach.
  97. Semple, James; Rose, Gregory Gordon, Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system.
  98. Leung, Nikolai K. N., Method and apparatus for providing protocol options in a wireless communication system.
  99. Okaue,Takumi, Method and apparatus for recording/playing back information.
  100. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  101. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  102. Hawkes, Philip; Rose, Gregory G.; Hsu, Raymond T.; Rezaiifar, Ramin, Method and apparatus for security in a data processing system.
  103. Leung, Nikolai Konrad; Hawkes, Philip Michael; Rose, Gregory Gordon, Method and apparatus for security in a data processing system.
  104. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  105. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  106. Hsu, Raymond T., Method and apparatus for transmission framing in a wireless communication system.
  107. Oh, Seung-jae; Lee, Sung-min; Han, Se-hee; Yook, Hyun-gyoo, Method and apparatus for transmitting message to wireless devices that are classified into groups.
  108. Srivastava,Sunil K., Method and apparatus providing secure multicast group communication.
  109. Fries,Steffen; Klasen,Wolfgang; Volkmann,Gerald, Method and arrangement for data communication in a cryptographic system containing a plurality of entities.
  110. Caronni, Germano; Gupta, Amit; Markson, Tom R.; Kumar, Sandeep; Schuba, Christoph L.; Scott, Glenn C., Method and system for facilitating relocation of devices on a network.
  111. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  112. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  113. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  114. Vainstein, Klimenty, Method and system for managing security tiers.
  115. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  116. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  117. Nath, Satyajit, Method and system for providing document retention using cryptography.
  118. Nath, Satyajit, Method and system for providing document retention using cryptography.
  119. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  120. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  121. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  122. Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
  123. Chen, Tao; Bender, Paul E.; Agashe, Parag A.; Rezaiifar, Ramin; Pankaj, Rajesh K.; Wei, Yongbin, Method and system for reduction of decoding complexity in a communication system.
  124. Aziz Ashar,PKX, Method and system for secure distribution of cryptographic keys on multicast networks.
  125. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  126. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  127. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  128. Lotspiech, Jeffrey Bruce; Naor, Dalit; Naor, Simeon, Method for broadcast encryption and key revocation of stateless receivers.
  129. Lotspiech,Jeffrey Bruce; Naor,Dalit; Naor,Simeon, Method for broadcast encryption and key revocation of stateless receivers.
  130. Manion, Todd R.; Rao, Ravi T.; Shappell, Michael, Method for efficient content distribution using a peer-to-peer networking infrastructure.
  131. Inada,Ryu, Method for group unit encryption/decryption, and method and apparatus for writing signature.
  132. Li, Yunzhou, Method for key distribution in a hierarchical multicast traffic security system for an internetwork.
  133. Srivastava,Sunil K., Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach.
  134. Stewart, Ian A., Method for secure multicast repeating on the public Internet.
  135. Ksontini,Rached; Kudelski,Henri; Groux,C��dric, Method for securing a ciphered content transmitted by a broadcaster.
  136. Lotspiech,Jeffrey Bruce; Naor,Dalit; Naor,Simeon, Method for tracing traitor receivers in a broadcast encryption system.
  137. Fery, Peter; Helmus, Juergen; Meier, Gunther; Stumm, Dieter; Vullriede, Carsten, Method for verifying digital franking notes.
  138. Galwas, Paul Anthony, Method of establishing secure groups of trusted contacts with access rights in a secure communication system.
  139. Buskens Richard Wayne ; Paul Sanjoy ; Siddiqui Muhammad Ali, Method of multicasting.
  140. Zucker, Daniel F.; Atalla, Martin M.; Adams, Donald S., Method of securing a document in a system and controlling access to the document and a seal for use in the method.
  141. Zucker,Daniel F., Method of securing a document in a system and controlling access to the document and a seal for use in the method.
  142. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  143. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  144. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  145. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  146. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  147. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  148. Kawamoto,Akiko, Multicast system, authentication server terminal, multicast receiver terminal controlling method, and storage medium.
  149. Kojima, Akitoshi, Network authentication system using individual services providers and an authentication server.
  150. Sanjay Agraharam ; Chia-Chang Li ; Ram S. Ramamurthy ; Peter H. Stuntebeck, Network broadcasting system for broadcasting audiovisual information to an identified audience.
  151. Agraharam, Sanjay; Li, Chia-Chang; Ramamurthy, Ram S.; Stuntebeck, Peter H., Network communications system and method for worldwide web broadcasting.
  152. Cornils,Curtis Lee; Comer,Erwin Perry, Network compromise recovery methods and apparatus.
  153. Zucker, Daniel F., Network security architecture system utilizing seals.
  154. Yanagihara, Yasushi, Network system, information processor, and information processing program recording medium.
  155. Schulzrinne, Henning; Yin, Jianqi, Network telephony appliance and system for inter/intranet telephony.
  156. Schulzrinne, Henning; Yin, Jianqi, Network telephony appliance and system for inter/intranet telephony.
  157. Goland,Yaron, Networked device branding for secure interaction in trust webs on open networks.
  158. Srivastava,Sunil K., Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups.
  159. Huitema,Christian; Gavrilescu,Alexandru; Anderson,Noel W.; Zhang,Xiaohai, Peer-to-peer group management and method for maintaining peer-to-peer graphs.
  160. Manion, Todd R.; Dewey, Jeremy L.; Donner, Robert D.; Senkeresty, Scott A.; Parks, III, Upshur, Peer-to-peer grouping interfaces and methods.
  161. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  162. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  163. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  164. Huitema,Christian; Gavrilescu,Alexandru; Zhang,Xiaohai, Peer-to-peer name resolution protocol (PNRP) group security infrastructure and method.
  165. Belenky, Yaacov, Period keys.
  166. Fell, Gail Hegarty; Yang, Jie; Tabor, Walter Randall; Bullock, David Lynn; McClure, John Joseph, Pickup and delivery of data files.
  167. Edward Robert Segal, Precomputed and distributed security system for a communication network.
  168. Britt ; Jr. Joe F., Presenting information relating to a program by recognizing text in closed captioning data.
  169. Euchner Martin,DEX ; Klasen Wolfgang,DEX ; Kessler Volker,DEX, Process for group-based cryptographic code management between a first computer unit and group computer units.
  170. Srivastava,Sunil K., Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange.
  171. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  172. Bel,Hendrik Jan; Lokhoff,Gerardus Cornelis Petrus; Breugom,Michel Ronald; Engelen,Dirk Valentinus Rene; Van De Poel,Peter, Receiving device for securely storing a content item, and playback device.
  173. Jang, Kyung Hun; Hwang, Hyo sun; Park, Jong ae, Reliable multicast data retransmission method by grouping wireless terminals in wireless communication medium and apparatus for the same.
  174. Jin, Hongxia; Lotspiech, Jeffrey Bruce; Nin, Sigfredo Ismael, Renewable traitor tracing.
  175. Sudhakar, Gosukonda Naga Venkata Satya; Shenvi, Ashwin Anand, Secure broadcasting and multicasting.
  176. Sudhakar, Gosukonda Naga Venkata Satya; Shenvi, Ashwin Anand, Secure broadcasting and multicasting.
  177. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  178. Revital, Dan; Epstein, Steve; Tsuria, Yossi; Zucker, Arnold; Simkin, Steven, Secure digital content delivery system and method over a broadcast network.
  179. Dondeti, Lakshminath, Secure group communications.
  180. Dondeti, Lakshminath, Secure group communications.
  181. Dondeti, Lakshminath, Secure group communications.
  182. Kevenaar, Thomas Andreas Maria, Secure indirect addressing.
  183. Grilli, Francesco; Casaccia, Lorenzo; Semple, James; Agashe, Parag A., Secure registration for a multicast-broadcast-multimedia system (MBMS).
  184. Garcia,Denis Jacques Paul, Secured data format for access control.
  185. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  186. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  187. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  188. Hardjono, Thomas P., Server group key for distributed group key management.
  189. Hardjono,Thomas, Spatial key trees for key management in wireless environments.
  190. Bakre, Ajay V.; Nishida, Takeshi, Switch based network architecture for IP multicast and integrated services.
  191. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  192. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  193. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  194. Simms,Timothy J., System and method for establishing secure communication.
  195. Rosenbloom, Oren; Ternasky, Joseph D.; Sadovsky, Vladimir; Manders, Blake D., System and method for facilitating communication between a computing device and multiple categories of media devices.
  196. Miller, C. Kenneth; White, Marc; McKenna, Kevin, System and method for host list pruning.
  197. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  198. Dinsmore,Peter T; Heyman,Michael; Kruus,Peter; Sherman,Alan T, System and method for key distribution in a hierarchical tree.
  199. Pearce, Christopher E.; Whetten, Delon R.; Higgins, Ronald D.; Henning, Scott, System and method for maintaining a communication link.
  200. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  201. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  202. Wendt,Thomas C.; Robbins,Patrick T.; Easty,Allen D.; Tobias,Michael J., System and method for providing integrated voice, video and data to customer premises over a single network.
  203. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  204. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  205. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  206. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  207. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  208. Dutta,Ashutosh; Schulzrinne,Henning; Yemini,Yechiam, System and method for receiving over a network a broadcast from a broadcast source.
  209. Dinsmore, Peter T; Heyman, Michael; Kruus, Peter; Sherman, Alan T, System and method for reusable efficient key distribution.
  210. Hanzlik, Robert Otto; Lowe, Geoffrey A.; Markham, Thomas R.; Meredith, Lynn Marquette, System and method for secure group communications.
  211. Miller, C. Kenneth; Andresen, Thomas; Gardner, Thomas; Michelson, Craig; Cates, Kenneth; White, Marc; Robertson, Kary, System and method for sending packets over a computer network.
  212. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  213. Caronni, Germano; Gupta, Amit; Kulmar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for separating addresses from the delivery scheme in a virtual private network.
  214. Wang,Xin, System and method for transferring the right to decode messages.
  215. Markham,Thomas R.; Meredith,Lynn Marquette; Hanzlik,Robert Otto; Lowe,Geoffrey A., System and method for transmitting and receiving secure data in a virtual private group.
  216. Singh, Kundan; Schulzrinne, Henning, System and method for unified messaging in inter/intranet telephony.
  217. Chitrapu, Prabhakar R., System for facilitating personal communications with multiple wireless transmit/receive units.
  218. McCanne, Steven; Swan, Andrew, System for multipoint infrastructure transport in a computer network.
  219. Hardjono, Thomas P.; Cain, Bradley, System, device, and method for controlling access in a multicast communication network.
  220. Hardjono,Thomas P., System, device, and method for controlling access in a multicast communication network.
  221. Cain, Bradley; Hardjono, Thomas P., System, device, and method for distributing access control information in a communication system.
  222. Cain,Bradley; Hardjono,Thomas P., System, device, and method for receiver access control in a multicast communication network.
  223. Cain, Bradley; Hardjono, Thomas P., System, device, and method for receiver access control in a multicast communication system.
  224. Cain, Bradley; Hardjono, Thomas P., System, device, and method for receiver access control in an internet television.
  225. Cain, Bradley; Hardjono, Thomas P., System, device, and method for receiver access control in an internet television system.
  226. Clay, Philip Bryan, Systems and methods for providing secure multicast intra-cluster communication.
  227. Eastham, W. Bryant, Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key.
  228. Gupta, Amit; Jardetzky, Paul W., Techniques for securing data flow in internet multicasting.
  229. Cain, Bradley; Hardjono, Thomas P., Television delivery system.
  230. Luczycki, Edward A.; Divinia, Darin D., Transmission of multicast media between networks.
  231. Wesley Joseph S. ; Chiu Dah Ming ; Kadansky Miriam C. ; Hurst Stephen A. ; Perlman Radia J. ; Provino Joseph E. ; Rosenzweig Philip M., Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority.
  232. Khalid, Mohamed; Wainner, Warren S.; Akhter, Aamer; Quinn, Paul, VPN processing via service insertion architecture.
  233. Forkner, Terry Ray; Melton, Richard L; Lamar, George, Videcoconferencing method and system for connecting a host with a plurality of participants.
  234. Forkner, Terry Ray; Melton, Richard Lee; LaMar, George Thomas, Videcoconferencing method and system for connecting a host with a plurality of participants.
  235. Forkner, Terry Ray; Melton, Richard Lee; LaMar, George Thomas, Videoconferencing method and system for connecting a host with a plurality of participants.
  236. Forkner, Terry Ray; Melton, Richard Lee; LaMar, George Thomas, Videoconferencing method and system for connecting a host with a plurality of participants.
  237. Forkner,Terry Ray; Melton,Richard Lee; LaMar,George Thomas, Videoconferencing method and system for connecting a host with a plurality of participants.
  238. Terry Ray Forkner ; Richard Lee Melton ; George Thomas LaMar, Videoconferencing method and system for connecting a host with a plurality of participants.
  239. Zhang, Hang; Zhu, Peiying; Fong, Mo-Han; Tong, Wen; Senarath, Gamini; Yu, Derek; Steer, David, Wireless access point security for multi-hop networks.
  240. Zhang, Hang; Zhu, Peiying; Fong, Mo-Han; Tong, Wen; Senarath, Gamini; Yu, Derek; Steer, David, Wireless access point security for multi-hop networks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로