$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Pluggable account management interface with unified login and logout and multiple user authentication services 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0499487 (1995-08-07)
발명자 / 주소
  • Wu Tajen R.
  • Shannon William A.
  • Fronberg Paul
  • Stephenson Donald R.
  • Samar Vipin
출원인 / 주소
  • Sun Microsystems, Inc.
대리인 / 주소
    Fenwick & West LLP
인용정보 피인용 횟수 : 361  인용 특허 : 6

초록

A system and method provide transparent access from any system entry service to multiple account management services, and particularly to multiple authentication services on a computer system, supporting unified login and logout. Transparency between system entry services and account management serv

대표청구항

[ We claim:] [1.] A computer system providing multiple account management services to a user connecting to the computer system with a first system entry service, comprising:at least one system entry service, each system entry service providing a method to connect a user to the computer system during

이 특허에 인용된 특허 (6)

  1. McNair Bruce E. (Holmdel NJ), Centralized security control system.
  2. Toda Tadahiro (Nara JPX) Ohnishi Souichi (Yao JPX) Komai Kensaku (Yamatokouriyama JPX) Sugihara Masuo (Nara JPX), Data I/O terminal equipment having mode setting functions for downloading various specified application programs from a.
  3. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  4. Heath David M. (Nashua NH) Kraley Michael F. (Lexington MA) Pant Sangam (Winchester MA), Management facility for server entry and application utilization in a multi-node server configuration.
  5. Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
  6. Kung Kenneth C. (Cerritos CA), One-time logon means and methods for distributed computing systems.

이 특허를 인용한 특허 (361)

  1. Wood, David L.; Norton, Derk, Access management system and method employing secure credentials.
  2. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Pouyoul, Eric, Addressing message gates in a distributed computing environment.
  3. Rinkevich, Debora; Garrison, John Michael, Aggregated authenticated identity apparatus for and method therefor.
  4. Rinkevich,Debora; Garrison,John Michael, Aggregated authenticated identity apparatus for and method therefor.
  5. Kenneth C. R. C. Arnold ; Ann M. Wollrath ; James H. Waldo, Apparatus and method for dynamically verifying information in a distributed system.
  6. O'Sullivan, Bryan; Scheifler, Robert; Jones, Peter C.; Wollrath, Ann M.; Arnold, Kenneth C. R. C.; Waldo, James H., Apparatus and method for providing downloadable code for use in communicating with a device in a distributed system.
  7. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  8. Bowers, John Joseph; Peterson, Matthew T, Apparatus, systems and methods to provide authentication services to a legacy application.
  9. Shrader, Theodore Jack London; Humphrey, Randy Scott; Soper, Davis Kent; Zhang, Xiaoyan, Architecture for the graphical management and analysis of authentication tokens.
  10. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  11. Bender, Christopher Lyle; Russell, Graham; Silvanovich, Natalie Michelle, Associating services to perimeters.
  12. Hardt, Dick C., Auditable privacy policies in a distributed hierarchical identity management system.
  13. Olson,Lance E.; Nielsen,Henrik Frystyk; Paya,Cem, Authentication architecture.
  14. Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
  15. Albisu, Luis F.; Furst, Cheryl L.; Holloway, James W.; Hurr, Tien Y.; Lee, Jonathan C.; Wallace, Michael F.; Drake, II, Alton W., Authentication management platform for managed security service providers.
  16. Hinton, Heather M.; Moran, Anthony S., Authentication of a principal in a federation.
  17. Hayashi, Ryotaro, Authentication processing apparatus, authentication processing method, recording medium storing authentication processing program, recording medium storing information processing program and information processing system.
  18. Ross, David Justin, Authentication query strategizer and results compiler.
  19. Ross,David Justin, Authentication query strategizer and results compiler.
  20. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  21. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  22. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  23. Azulay, Barak; Bar-Lev, Alon; Nori, Ravi, Authenticator plugin interface.
  24. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Auto-establishment of a voice channel of access to a session for a composite service from a visual channel of access to the session for the composite service.
  25. Sivaramakrishna Iyer, Krishnan, Automatic access to network devices using various authentication schemes.
  26. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric; Duigou,Michael J., Automatic lease renewal with message gates in a distributed computing environment.
  27. Bu,Zhaoxi; McCrystal,Daniel T., Automatic user session.
  28. Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Branding and revenue sharing models for facilitating storage, management and distribution of consumer information.
  29. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M.; Duigou,Michael J., Bridging between a data representation language message-based distributed computing environment and other computing environments using proxy service.
  30. Hirsh, Robert Bruce, Brokering a connection to access a secured service.
  31. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Caching mechanism for a virtual heap.
  32. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Caching mechanism for a virtual heap.
  33. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  34. Robinson, Kyle Lane; Bowers, John Joseph, Centralized user authentication system apparatus and method.
  35. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Channel presence in a composite services enablement environment.
  36. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Duigou, Michael J., Client-specified display services in a distributed computing environment.
  37. Bradee,Robert L., Computer security system.
  38. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  39. Dickson, Stephen Willard, Computerized file system and method.
  40. Wysocki, Christopher R.; Ward, Alan, Configuration of a computing device in a secure manner.
  41. Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Consumer-controlled limited and constrained access to a centrally stored information account.
  42. Dickinson, Alexander G.; Berger, Brian; Dobson, Robert T., Context sensitive dynamic authentication in a cryptographic system.
  43. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  44. Nadalin, Anthony J.; Wesley, Ajamu A., Context-sensitive confidentiality within federated environments.
  45. Nadalin,Anthony J.; Wesley,Ajamu A., Context-sensitive confidentiality within federated environments.
  46. Feil, Stephan, Control of access to a secondary system.
  47. Feil, Stephan, Control of access to a secondary system.
  48. Ong, Peng T., Controlling access to a process using a separate hardware device.
  49. Deshpande, Alka K.; Edwards, William, Creating multiple sets of data by spawning a secondary virtual machine.
  50. Ruzyski, David M.; Hong, James H.; McNeil, Brian K.; Guzak, Chris J.; Wentz, Brian D.; Schutz, Klaus U.; Richards, Stefan; Perlin, Eric C.; Ilac, Cristian; Reasor, Sterling M.; Flo, Eric R.; Stephens, John; Hutz, Benjamin A., Credential interface.
  51. Sturges, Philip, Credential provider that encapsulates other credential providers.
  52. Sturges, Philip M., Credential provider that encapsulates other credential providers.
  53. Al-Salqan, Yayha; Varma, Sangeeta; Ranganathan, Aravindan, Cryptographic authorization with prioritized and weighted authentication.
  54. Al-Salqan, Yayha; Varma, Sangeeta; Ranganathan, Aravindan, Cryptographic authorization with prioritized authentication.
  55. Kiester, W. Scott; Mashayekhi, Cameron; Ford, Karl E., Cryptographic binding of authentication schemes.
  56. Sasson Gideon, Customer web log-in architecture.
  57. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Database store for a virtual heap.
  58. Jones Peter C. ; Wollrath Ann M. ; Waldo James H. ; Arnold Kenneth C. R. C., Deferred reconstruction of objects and remote loading for event notification in a distributed system.
  59. Wollrath Ann M. ; Waldo James H. ; Arnold Kenneth C. R. C. ; Jones Peter C., Deferred reconstruction of objects and remote loading in a distributed system.
  60. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  61. Gidwani, Arvind, Demand based encryption and key generation and distribution systems and methods.
  62. Michael E. See ; John W. Bailey ; Charles L. Panza ; Yuri Pikover ; Geoffrey C. Stone, Deterministic user authentication service for communication network.
  63. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  64. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C., Deterministic user authentication service for communication network.
  65. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C.; Goodwin, Michele Wright; Sangroniz, Robert Leon, Deterministic user authentication service for communication network.
  66. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  67. Peterson, Matthew T.; Webb, Jeff Marsden, Disconnected credential validation using pre-fetched service tickets.
  68. Brown, Eric W.; Chennamsetty, Ramamohan; Woldemichael, Abraham L., Discovery profile based unified credential processing for disparate security domains.
  69. Shih, Yin, Disk drive with flexible data stream encryption.
  70. Hardt, Dick C., Distributed contact information management.
  71. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  72. Hardt, Dick C., Distributed hierarchical identity management.
  73. Arnold, Kenneth C. R. C.; Waldo, James H.; Scheifler, Robert; Wollrath, Ann M., Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system.
  74. Kenneth C. R. C. Arnold ; James H. Waldo ; Robert Scheifler ; Ann M. Wollrath, Downloadable smart proxies for performing processing associated with a remote procedure call in a distributed system.
  75. Abdelaziz, Mohamed M.; Slaughter, Gregory L.; Traversat, Bernard A.; Saulpaugh, Thomas E., Dynamic displays in a distributed computing environment.
  76. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in a distributed system.
  77. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in a distributed system.
  78. Murphy, Brian T.; Scheifler, Robert W.; Pan, Zane; Waldo, James H.; Wollrath, Ann M.; Arnold, Kenneth C. R. C., Dynamic lookup service in distributed system.
  79. Clarke, James B., Dynamic provisioning for filtering and consolidating events.
  80. Clarke, James B.; Clark, Sean E., Dynamic provisioning of identification services in a distributed system.
  81. Cardamore, Daniel; May, Darrell Reginald; Nagarajan, Sivakumar; Cherry, Carl Lloyd, Dynamically generating perimeters.
  82. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Efficient construction of message endpoints.
  83. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Enhancing contact centers with dialog contracts.
  84. Hu, Limin; Wu, Ting-Hu; Han, Ching-Chih Jason, Enterprise security management system using hierarchical organization and multiple ownership structure.
  85. Hu, Limin; Wu, Ting-Hu; Han, Ching-Chih Jason, Enterprise security management system using hierarchical organization and multiple ownership structure.
  86. Hu, Limin; Wu, Ting-Hu; Han, Ching-Chih Jason, Enterprise security management system using hierarchical organization and multiple ownership structure.
  87. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Pouyoul, Eric, Event message endpoints in a distributed computing environment.
  88. Atkins,Barry D.; Melgar,David O.; Nadalin,Anthony J.; Wesley,Ajamu A., Federated identity management within a distributed portal server.
  89. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Garbage collection using nursery regions for new objects in a virtual heap.
  90. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Garbage collector for a virtual heap.
  91. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Generating results gates in a distributed computing environment.
  92. Iyer, Kannan C.; Gavrilov, Dmitri, Globally trusted credentials leveraged for server access control.
  93. Hardt, Dick C., Graduated authentication in an identity management system.
  94. Hardt, Dick C., Graduated authentication in an identity management system.
  95. Hardt, Dick C., Graduated authentication in an identity management system.
  96. Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Identifying contact center agents based upon biometric characteristics of an agent's speech.
  97. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  98. Vanyukhin, Nikolay; Shevnin, Oleg; Korotich, Alexey, Identity migration apparatus and method.
  99. Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Implementing a contact center using open standards and non-proprietary components.
  100. Kichikawa, Kazutoshi; Yano, Yoshihiro; Chikada, Takayuki; Handa, Fukio; Niwata, Syouzou, Information processing apparatus, and method for retaining security.
  101. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  102. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  103. Felsher, David Paul, Information record infrastructure, system and method.
  104. Deng, Yihui, Information switch.
  105. Steele, Nick; Hawkins, Stan; Maranville, Joe; Bradnan, Andrew, Initiation of an information transaction over a network via a wireless device.
  106. Schutz, Klaus U.; Richards, Stefan; Perlin, Eric C.; Ilac, Cristian; Reasor, Sterling M.; Flo, Eric; Stephens, John; Hutz, Benjamin A., Interoperable credential gathering and access modularity.
  107. Hall, Kylene J.; Shieh, Johnny M., Killing login-based sessions with a single action.
  108. James H. Waldo ; John W. F. McClain, Lease renewal service.
  109. Waldo James H. ; McClain John W. F., Lease renewal service.
  110. Hirsh, Robert B., Leveraging a persistent connection to access a secured service.
  111. Hirsh, Robert B., Leveraging a persistent connection to access a secured service.
  112. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  113. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  114. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  115. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  116. Hirsh,Robert Bruce, Leveraging a persistent connection to access a secured service.
  117. Corr, Jonathan H.; Hu, Limin; Chen, Tsu-Wang, Loan origination software system for processing mortgage loans over a distributed network.
  118. Corr, Jonathan Howard; Hu, Limin; Chen, Tsu-Wang, Loan origination software system for processing mortgage loans over a distributed network.
  119. Hu, Limin; Khanpour, Babak, Loan origination system interface for online loan application processing.
  120. Hu,Limin; Khanpour,Babak, Loan origination system interface for online loan application processing.
  121. Corr, Jonathan; Hu, Limin; Roof, Richard E.; Wu, Ting-Hu, Loan screening.
  122. John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
  123. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  124. Bender, Christopher Lyle; Cho, Jung Hyun; Foy, Jason Paul; Nagarajan, Sivakumar, Managing application execution and data access on a device.
  125. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Managing concurrent data updates in a composite services delivery system.
  126. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Managing cross perimeter access.
  127. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Managing cross perimeter access.
  128. Schieman, Adam Richard; Major, Daniel Jonas; Goodman, Kevin; Nagarajan, Sivakumar, Managing permission settings applied to applications.
  129. Ryerson, Christopher Maybee; Bender, Christopher Lyle; Winkler, Michael Thomas; Bukurak, David; Altman, Benjamin, Managing use of network resources.
  130. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Duigou,Michael J., Mechanism and apparatus for URI-addressable repositories of service advertisements and other content in a distributed computing environment.
  131. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for accessing and addressing services in a distributed computing environment.
  132. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for returning results of services in a distributed computing environment.
  133. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for security of newly spawned repository spaces in a distributed computing environment.
  134. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J., Mechanism and apparatus for using messages to look up documents stored in spaces in a distributed computing environment.
  135. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Mechanism and apparatus for web-based searching of URI-addressable repositories in a distributed computing environment.
  136. Klug, John R., Media content notification via communications network.
  137. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  138. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  139. Traversat, Bernard A.; Saulpaugh, Thomas E.; Duigou, Michael J.; Slaughter, Gregory L., Message authentication using message gates in a distributed computing environment.
  140. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Pouyoul, Eric, Message conductors in a distributed computing environment.
  141. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Message gates in a distributed computing environment.
  142. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Message gates using a shared transport in a distributed computing environment.
  143. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Duigou, Michael J., Message-based leasing of resources in a distributed computing environment.
  144. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Pouyoul,Eric, Messaging system using pairs of message gates in a distributed computing environment.
  145. Wollrath, Ann M.; Jones, Peter C., Method and apparatus for determining status of remote objects in a distributed system.
  146. Arnold,Kenneth C. R. C.; Waldo,James H.; Wollrath,Ann M.; Jones,Peter C., Method and apparatus for dynamic distributed computing over a network.
  147. Kenneth C. R. C. Arnold ; James H. Waldo ; Ann M. Wollrath ; Peter C. Jones, Method and apparatus for dynamic distributed computing over a network.
  148. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Duigou,Michael J., Method and apparatus for obtaining space advertisements.
  149. Chiviendacz, Michael; Neville, Steve; Voice, Chris; Morgan, Michael, Method and apparatus for providing authentication using policy-controlled authentication articles and techniques.
  150. Duigou,Michael J.; Abdelaziz,Mohamed M.; Traversat,Bernard A.; Saulpaugh,Thomas E.; Slaughter,Gregory L., Method and apparatus for proximity discovery of services.
  151. Stoltz, Benjamin H.; Hanko, James G., Method and apparatus for remotely administered authentication and access control.
  152. Gerard A. Wall ; Alan T. Ruberg ; James G. Hanko ; J. Duane Northcutt ; Lawrence L. Butcher, Method and apparatus for session management and user authentication.
  153. Wollrath Ann M. ; Arnold Kenneth C. R. C., Method and apparatus for the suspension and continuation of remote processes.
  154. Pope,David E.; Treder,Terry N.; Pedersen,Bradley J., Method and apparatus for transmitting authentication credentials of a user across communication sessions.
  155. Ann M. Wollrath ; James H. Waldo ; Peter C. Jones ; Kenneth C.R.C. Arnold, Method and apparatus for transporting behavior in an event-based distributed system.
  156. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Abdelaziz, Mohamed M.; Traversat, Bernard A., Method and apparatus to discover services and negotiate capabilities.
  157. Saulpaugh, Thomas E.; Slaughter, Gregory L., Method and apparatus to discover services using flexible search criteria.
  158. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Abdelaziz,Mohamed M.; Traversat,Bernard A., Method and apparatus to obtain negotiated service advertisement.
  159. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Abdelaziz, Mohamed M.; Traversat, Bernard A., Method and apparatus to obtain service capability credentials.
  160. White, Clive John, Method and apparatus to permit automated server determination for foreign system login.
  161. Bush, Steve; Jung, Edward; Knight, Holly, Method and system for account management.
  162. Hyppönen, Ari, Method and system for backing up encryption key generated on computer device and accessing encrypted information stored on computer device.
  163. Jones, Peter C.; Wollrath, Ann M.; Scheifler, Robert W., Method and system for deterministic hashes to identify remote methods.
  164. Jones, Peter C.; Wollrath, Ann M.; Scheifler, Robert W., Method and system for dynamic proxy classes.
  165. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  166. Scheifler, Robert W.; Waldo, James H.; Jones, Peter C., Method and system for establishing trust in downloaded proxy code.
  167. Scheifler, Robert W.; Wollrath, Ann M.; Waldo, James H., Method and system for facilitating access to a lookup service.
  168. Scheifler, Robert W.; Arnold, Kenneth C. R. C.; Waldo, James H., Method and system for in-place modifications in a database.
  169. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  170. Wollrath, Ann M.; Waldo, James H.; Arnold, Kenneth C. R. C., Method and system for leasing storage.
  171. Merriam, Charles, Method and system for managing information retention.
  172. Robert W. Scheifler ; Kenneth C. R. C. Arnold ; James H. Waldo, Method and system for multi-entry and multi-template matching in a database.
  173. Blakley, III, George Robert; Hinton, Heather Maria; Nadalin, Anthony Joseph, Method and system for native authentication protocols in a heterogeneous federated environment.
  174. Colley,Adrian E.; Jones,Peter C.; Schiefler,Robert W.; Warres,Michael P.; Wollrath,Ann M., Method and system for passing objects in a distributed system using serialization contexts.
  175. Hemsath,David Kurt; Skibbie,Donna E., Method and system for server support for pluggable authorization systems.
  176. Hemsath, David Kurt; Skibbie, Donna E., Method and system for server support of pluggable authorization systems.
  177. Adams, Neil P.; Tapuska, David; Brown, Michael S.; Little, Herbert A., Method and system for supporting portable authenticators on electronic devices.
  178. Scheifler, Robert W.; Arnold, Kenneth C.R.C.; Waldo, James H., Method and system for typesafe attribute matching.
  179. Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Little, Herbert Anthony, Method and system of user authentication using a portable authenticator.
  180. Yamamoto Takashi,JPX, Method for connecting terminals to a host computer and a host computer therefor.
  181. Stoffel Laurent,FRX ; Arditti David,FRX ; Campana Mireille,FRX, Method for controlling independent secure transactions by means of a single apparatus.
  182. Klug, John R.; Klug, Noah H., Method for providing node targeted content in an addressable network.
  183. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  184. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  185. Shambroom,W. David, Method for providing simultaneous parallel secure command execution on multiple remote hosts.
  186. Chakraborty, Krishnendu; Prabhakar, Arvind, Method for trapping HTTP logout events and for calling an application specific logout handler.
  187. Deininger, Andreas; Haas, Egon; Mueller, Klaus-Dieter, Method for verifying the authentication of a manager application in a telecommunications management network operating system by means of a network element and network element suitable therefor.
  188. Hillhouse Robert D.,CAX, Method of securing a cryptographic key.
  189. Waldo James H. ; Wollrath Ann M. ; Scheifler Robert, Method, apparatus, and product for leasing of delegation certificates in a distributed system.
  190. James H. Waldo ; Ann M. Wollrath ; Robert Scheifler ; Kenneth C. R. C. Arnold, Method, apparatus, and product for leasing of group membership in a distributed system.
  191. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Method, apparatus, and product for leasing of group membership in a distributed system.
  192. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Method, apparatus, and product for leasing of group membership in a distributed system.
  193. Ann M. Wollrath ; Peter C. Jones, Methods and apparatus for remote method invocation.
  194. Waldo James H. ; Wollrath Ann M. ; Scheifler Robert ; Arnold Kenneth C. R. C., Methods and systems for distributed failure detection and recovery using leasing.
  195. Waldo, James H.; Wollrath, Ann M.; Scheifler, Robert; Arnold, Kenneth C. R. C., Methods and systems for distributed failure detection and recovery using leasing techniques.
  196. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  197. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  198. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  199. Wollrath Ann M. ; Waldo James H. ; Riggs Roger, Methods, apparatus, and product for distributed garbage collection.
  200. Wollrath Ann M. ; Waldo James H. ; Riggs Roger, Methods, apparatus, and product for distributed garbage collection.
  201. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, Methods, apparatus, and product for distributed garbage collection.
  202. Wollrath, Ann W.; Waldo, James H.; Riggs, Roger, Methods, apparatus, and product for distributed garbage collection.
  203. Wollrath,Ann M.; Waldo,James H.; Riggs,Roger, Methods, apparatus, and product for distributed garbage collection.
  204. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Migrating processes using data representation language representations of the processes in a distributed computing environment.
  205. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  206. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Model autocompletion for composite services synchronization.
  207. Wesinger, Jr., Ralph E.; Coley, Christopher D., Modular multi-homed web server with animation player.
  208. Wesinger, Jr., Ralph E.; Coley, Christopher D., Modular multi-homed web server with compiled animation server.
  209. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server.
  210. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with animation player.
  211. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with animation player and programmable functionality.
  212. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with compiled animation server.
  213. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with compiled animation server and programmable functionality.
  214. Srinivasan,Subbu; Thompson,Virginia M.; Alejandro,Victor, Multi-vendor integration process for internet commerce.
  215. Hoffberg, Steven M., Multifactorial optimization system and method.
  216. Battle, Ryan W.; Mitchell, Christopher E., Multiple site automated logout.
  217. Kwan, Philip; Ho, Chi-Jui, Multiple tiered network security system, method and apparatus using dynamic user policy assignment.
  218. Kwan, Philip; Ho, Chi-Jui, Multiple tiered network security system, method and apparatus using dynamic user policy assignment.
  219. Waldo, James H.; McClain, John W. F., Network proxy.
  220. Freeman, Trevor William; Benaloh, Josh; Biccum, K John; Shah, Atul Kumar, One time password key ring for mobile computing device.
  221. Hu, Limin; Khanpour, Babak; Wu, Ting-Hu, Online system for fulfilling loan applications from loan originators.
  222. Hu,Limin; Khanpour,Babak; Wu,Ting Hu, Online system for fulfilling loan applications from loan originators.
  223. Relyea, Robert, Organizing an extensible table for storing cryptographic objects.
  224. Huynh,Dung Le; Brouwer,Roger J., Packet Processor.
  225. Yantzi, Donald J., Password management.
  226. Shambroom,W. David, Platform-neutral system and method for providing secure remote operations over an insecure computer network.
  227. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  228. Carter, Stephen R; Burch, Lloyd Leon, Policy and attribute based access to a resource.
  229. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  230. Kenneth Arnold ; James H. Waldo, Polymorphic token based control.
  231. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  232. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  233. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Duigou, Michael J., Pre-generated message endpoints.
  234. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto Daniel; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  235. Ferguson, Geordon Thomas; Bender, Christopher Lyle; Zubiri, Alberto; Schneider, Kenneth Cyril; Whitehouse, Oliver; Hobbs, Christopher William Lewis, Presenting metadata from multiple perimeters.
  236. Adams, Neil Patrick; Little, Herbert Anthony, Privilege management and revocation.
  237. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Process persistence in a virtual machine.
  238. Buchet, Jean-Francois; Poittevin de la Fregonniere, Herve; Fourmestraux, Pierre; Morel, Loic, Processing device for processing an order request of an ophthalmic lens.
  239. Lv, Kaili; Deng, Jian; Hua, Bingyang; Liu, Zengguang; Meng, Chaofeng; Su, Jie; Tang, Jun; Zhang, Zheng, Promulgating information on websites using servers.
  240. Lv, Kaili; Deng, Jian; Hua, Bingyang; Liu, Zengguang; Meng, Chaofeng; Su, Jie; Tang, Jun; Zhang, Zheng, Promulgating information on websites using servers.
  241. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Remote function invocation with messaging in a distributed computing environment.
  242. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Duigou,Michael J., Remote method invocation with secure messaging in a distributed computing environment.
  243. Wollrath, Ann M.; Jones, Peter C.; Waldo, James H.; Scheifler, Robert W., Remote object activation in a distributed system.
  244. Ruzyski, David M; Hong, James H.; McNeil, Brian; Doerr, Anastasia C; Guzak, Chris J.; Reasor, Sterling M.; Stabb, Charles W.; Wentz, Brian D., Rights elevator.
  245. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, SYSTEM AND METHOD FOR FACILITATING DYNAMIC LOADING OF “STUB” INFORMATION TO ENABLE A PROGRAM OPERATING IN ONE ADDRESS SPACE TO INVOKE PROCESSING OF A REMOTE METHOD OR PROCEDURE IN ANOTHER ADDRESS S.
  246. Henry R. Tumblin ; Michael S. Rothman ; Fred J. Pinkett ; James M. Geary ; Steve R. Artick, Seamless integration of application programs with security key infrastructure.
  247. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Seamless reflection of model updates in a visual page for a visual channel in a composite services delivery system.
  248. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Secure access of objects generated from data representation language representations of the objects in a distributed computing environment.
  249. Hsing, Chi-Pei Michael; Yaung, Alan Tsu-I, Secure access to a unified logon-enabled data store.
  250. Wu, Huahui; Catania, Nicolas; Condra, Curtis Gerald, Secure authorization for accessing content on a shareable device.
  251. Wu, Huahui; Catania, Nicolas; Condra, Curtis Gerald, Secure authorization for accessing content on a shareable device.
  252. Wysocki, Christopher R.; Ward, Alan, Secure configuration of a computing device.
  253. Wysocki, Christopher R.; Ward, Alan, Secure configuration of computing device.
  254. Peters, Matthew Francis, Secure password provision.
  255. Champine, Mark A.; Kaufman, Charles W., Secure remote password validation.
  256. Wysocki, Christopher R.; Ward, Alan, Secure software updates.
  257. Wysocki, Christopher R.; Ward, Alan, Secure software updates.
  258. Ross, David Justin; Cornell, Bill G., Secure, confidential authentication with private data.
  259. Wood, David L.; Pratt, Thomas; Dilger, Michael B.; Norton, Derk; Nadiadi, Yunas, Security architecture with environment sensitive credential sufficiency evaluation.
  260. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  261. Li, Hong; Ross, Alan D.; Wouhaybi, Rita H.; Kohlenberg, Tobias M., Security data aggregation and business intelligence for web applications.
  262. Daniels, Scott Leonard; Neal, Danny Marvin; Ng, Yat Hung, Security keys for enhanced downstream access security for electronic file systems and drives.
  263. Morgan, Stephen P.; Russell, Lance W.; Reed, Benjamin Clay, Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same.
  264. Scholnick Michael ; Schlesinger John F., Security process for public networks.
  265. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  266. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Selective view synchronization for composite services delivery.
  267. Parsons ; Jr. John E. ; Graziadio Bradley J. ; Momoh Oshoma, Server operating system for supporting multiple client-server sessions and dynamic reconnection of users to previous sessions using different computers.
  268. Saunders,Stillman T.; Coloma,Ignacio Ariel; Gupta,Vishal, Sharing a sign-in among software applications having secured features.
  269. Goyal, Sanyam; Chathoth, Vikas Pooven, Signing off from multiple domains accessible using single sign-on.
  270. Saunders, Stillman T.; Coloma, Ignacio Ariel; Gupta, Vishal, Signing-in to software applications having secured features.
  271. Steele, Nick; Hawkins, Stan; Maranville, Joe; Bradnan, Andrew, Single sign-on for access to a central data repository.
  272. Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Single sign-on for access to a central data repository.
  273. Wood, David L.; Norton, Derk; Weschler, Paul; Ferris, Chris; Wilson, Yvonne, Single sign-on framework with trust-level mapping to authentication requirements.
  274. Akella, Sujan; Kolyakov, Yevgeny; Nara, Vijay; Russin, Michael, Single sign-on method in multi-application framework.
  275. Akella, Sujan; Kolyakov, Yevgeny; Nara, Vijay; Russin, Michael, Single sign-on method in multi-application framework.
  276. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  277. Ghostine, Peter E.; McDonald, Michael, Single sign-on system for shared resource environments.
  278. Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Skills based routing in a standards based contact center using a presence server and expertise specific watchers.
  279. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Traversat, Bernard A.; Abdelaziz, Mohamed M., Spawning new repository spaces using information provided in advertisement schema messages.
  280. Winiger,Gary W.; Moffat,Darren J.; Vesseur,Joep J., Specifying a repository for an authentication token in a distributed computing system.
  281. Robert W. Scheifler ; Li Gong, Stack based access control using code and executor identifiers.
  282. Scheifler, Robert W.; Gong, Li, Stack-based access control using code and executor identifiers.
  283. Scheifler Robert W., Stack-based system and method to combine security requirements of methods.
  284. Adams Donald E. ; Cohn Robert S., Storage device capacity management.
  285. Steele, Nick; Hawkins, Stan; Maranville, Joe; Bradnan, Andrew, Storage, management and distribution of consumer information.
  286. Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Storage, management and distribution of consumer information.
  287. Kwan, Philip, System and method for ARP anti-spoofing security.
  288. Kwan, Philip, System and method for ARP anti-spoofing security.
  289. Kwan, Philip, System and method for ARP anti-spoofing security.
  290. Kwan, Philip, System and method for ARP anti-spoofing security.
  291. Hawkins, Stan, System and method for communicating data between wireless mobile hand-held computer and a back-end computer system.
  292. Hoffberg, Steven M., System and method for determining contingent relevance.
  293. Wollrath, Ann M.; Waldo, James H.; Riggs, Roger, System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another address space.
  294. Wollrath,Ann M.; Waldo,James H.; Riggs,Roger, System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another space.
  295. Hawkins, Stan, System and method for facilitating sales utilizing customer relationship management technology.
  296. Hawkins, Stan, System and method for facilitating the transfer of information relating to quality of an organization.
  297. Hawkins, Stan, System and method for facilitating the transfer of information relating to quality of an organization.
  298. Hawkins, Stan, System and method for facilitating the transfer of information relating to quality of an organization.
  299. Kwan, Philip, System and method for flexible authentication in a data communications network.
  300. Adams, Neil Patrick; Little, Herbert Anthony; Kirkup, Michael Grant, System and method for handling data transfers.
  301. Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant, System and method for handling data transfers.
  302. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  303. Moriconi, Mark S., System and method for maintaining security in a distributed computer network.
  304. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  305. Hawkins, Stan; Swiedler, Thomas; Turner, Charles, System and method for managing asset installation and evaluation.
  306. Kern, David Scott; Annicchiarico, Richard Francis; Kho, Nancy Ellen; Paganetti, Robert John, System and method for normalizing and merging credential stores.
  307. Adams, Neil Patrick; Little, Herbert Anthony, System and method for privilege management and revocation.
  308. Szeto, Ronald W.; Kwan, Philip; Kwong, Raymond Wai-Kit, System and method for protecting CPU against remote access attacks.
  309. Szeto, Ronald W.; Kwan, Philip; Kwong, Raymond Wai-Kit, System and method for protecting CPU against remote access attacks.
  310. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  311. Bowers,Theodore J.; Ilijasic,Dean; Sanders,Shelley F., System and method for providing discriminated content to network users.
  312. Hawkins, Stan; Maranville, Joe; Steele, Nick, System and method for providing handheld field force data gathering automation in a big box retail environment.
  313. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., System and method for secure message-based leasing of resources in a distributed computing environment.
  314. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  315. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  316. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  317. Kwan, Philip, System and method for source IP anti-spoofing security.
  318. Kwan, Philip, System and method for source IP anti-spoofing security.
  319. Szeto, Ronald W.; Jain, Nitin; Suresh, Ravindran; Kwan, Philip, System and method for source IP anti-spoofing security.
  320. Szeto, Ronald W.; Jain, Nitin; Suresh, Ravindran; Kwan, Philip, System and method for source IP anti-spoofing security.
  321. Perry, Paul; Byrnes, Sean; Elbert, Valeriy; Nambiar, Chivas; Hunt, Conor; Kosmidis, Thanos; Gupta, Vineet, System and method for wide area wireless connectivity to the internet.
  322. Seshadri,Krishna, System and method providing configuration services for communications devices.
  323. Royer,Barry Lynn; Heil,John Andrew, System and user interface supporting concurrent application initiation and interoperability.
  324. Royer,Barry Lynn; Heil,John Andrew, System and user interface supporting concurrent application operation and interoperability.
  325. Royer, Barry Lynn; Heil, John Andrew, System and user interface supporting context sharing between concurrently operating applications.
  326. Oliver, David M.; Densmore, William P.; Callahan, Michael J., System for management of alternatively priced transactions on network.
  327. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  328. Kwan, Philip, System, method and apparatus for providing multiple access modes in a data communications network.
  329. Kwan, Philip, System, method and apparatus for providing multiple access modes in a data communications network.
  330. Kwan, Philip, System, method and apparatus for providing multiple access modes in a data communications network.
  331. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  332. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  333. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  334. Peterson, Matthew T.; Peterson, Daniel F., Systems and methods for managing policies on a computer.
  335. Reedy, Dennis G.; Mitchell, Larry J., Systems and methods for providing dynamic quality of service for a distributed system.
  336. Alexander I. Hopmann ; Van C. Van ; Brian J. Deen, Systems and methods for using locks with computer resources.
  337. Goodman, Brian Gerard; Hill, Mark Edward; Jaquette, Glen Alan; Shiratori, Toshiyuki, Target self-security for upgrades for an embedded device.
  338. Hong, James H.; Schwartz, Jonathan D; Sheldon, Michael G.; Odins-Lucas, Zeke B., Task initiated account presentation for rights elevation.
  339. Wang, Sheng-Yih; Talmor, Ron, Techniques for preventing attacks on computer systems and networks.
  340. Lau Terence Chun-Yat,CAX ; Lo Jimmy,CAX ; Mirlas Lev,CAX, Token-based deadline enforcement system for electronic document submission.
  341. Saulpaugh,Thomas E.; Slaughter,Gregory L.; Traversat,Bernard A.; Duigou,Michael J.; Abdelaziz,Mohamed M., Transformation of objects between a computer programming language and a data representation language.
  342. Mourad,Magda M.; Munson,Jonathan P.; Nadeem,Tamer; Pacifici,Giovanni; Pistoia,Marco; Youssef,Alaa S., Transparent digital rights management for extendible content viewers.
  343. Saulpaugh, Thomas E.; Slaughter, Gregory L.; Traversat, Bernard A.; Pouyoul, Eric, Trusted construction of message endpoints in a distributed computing environment.
  344. Iwamoto,Neil Y.; Seikh,Attaullah; Paek,Jeanette Yang; Martinez,Martin; Slick,Royce E.; Chern,Wei Jhy; Khosrova,Eliza; Yang,Joseph, Two-pass device access management.
  345. Dutcher David Paul ; Sinclair ; Jr. William H. ; Smith Stanley Alan, User account establishment and synchronization in heterogeneous networks.
  346. Balasubramanyan, Balaji; Bose, Miko Arnab Sakhya Singha, User authentication across multiple network stacks.
  347. Bauman, Mark Linus; Botz, Patrick S.; Rapp, William Craig, User authentication system and method for multiple process applications.
  348. Hornung, Zelidrag; Drewry, William A.; Gwalani, Sumit; Masone, Christopher, User authentication using swappable user authentication services.
  349. Odom, Gary, User selectable signature.
  350. Ross, David Justin, Verification engine for user authentication.
  351. Ross, David Justin, Verification engine for user authentication.
  352. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., View coordination for callers in a composite services enablement environment.
  353. Traversat, Bernard A.; Duigou, Michael J.; Saulpaugh, Thomas E.; Slaughter, Gregory L., Virtual heap for a virtual machine.
  354. Da Palma, William V.; Mandalia, Baiju D.; Moore, Victor S.; Nusbickel, Wendi L., Visual channel refresh rate control for composite services delivery.
  355. Wesinger, Jr., Ralph E.; Coley, Christopher D., Web server with animation player.
  356. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  357. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  358. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  359. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  360. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  361. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로