$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Enhanced cryptographic system and method with key escrow feature 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0803176 (1997-02-19)
발명자 / 주소
  • Sudia Frank Wells
출원인 / 주소
  • CertCo LLC
대리인 / 주소
    Steptoe & Johnson LLP
인용정보 피인용 횟수 : 263  인용 특허 : 0

초록

A cryptographic system with key escrow feature that uses a method for verifiably splitting user's private encryption keys into components and for sending those components to trusted agents chosen by the particular users is provided. The system uses public key certificate management, enforced by a ch

대표청구항

[ What is claimed is:] [1.] A method of authorizing a trusted device to conduct an electronic transaction between a first user and a second party, and providing assurance that said trusted device will engage in said electronic transaction in accordance with predetermined rules which cannot be change

이 특허를 인용한 특허 (263)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Libin,Phil, Actuating a security system using a wireless device.
  3. Dice, David, Adaptive spin-then-block mutual exclusion in multi-threaded processing.
  4. Dice, David, Adaptive spin-then-block mutual exclusion in multi-threaded processing.
  5. Howard ; Jr. James L. ; Hess Pennington J. ; MacStravic James A., Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  6. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  7. Mannette, Michael R.; Newlin, Douglas J.; Steinbrenner, Kurt W., Apparatus, method and system for multimedia access network channel management.
  8. Dundas, Alan; Herskedal, Eirik, Authentication of PKI credential by use of a one time password and pin.
  9. Hassan, Amer A.; Desai, Mitesh K.; Roychoudhury, Trideepraj; Sankaranarayan, Mukund; Filgueiras, Henrique; Clear, Mark, Auto connect in peer-to-peer network.
  10. Desai, Mitesh K.; Hassan, Amer A.; Roychoudhury, Trideepraj; Sankaranarayan, Mukund; Anders, Jr., Billy R.; Filgueiras, Henrique, Auto-connect in a peer-to-peer network.
  11. Hassan, Amer A.; Desai, Mitesh K.; Elhaddad, Mahmoud S.; Roychoudhury, Trideepraj, Auto-connect in a peer-to-peer network.
  12. McCallum, Nathaniel; Relyea, Robert J., Binding data to a network in the presence of an entity with revocation capabilities.
  13. Borza Michael Andrew,CAX, Biometric input with encryption.
  14. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Block-based media content authentication.
  15. Micali, Silvio, Certificate revocation system.
  16. Micali, Silvio, Certificate revocation system.
  17. Srinivasan, Pramila; Princen, John, Certificate verification.
  18. Gantman, Alexander; Rose, Gregory G., Certify and split system and method for replacing cryptographic keys.
  19. Wilt,Andrew N.; Kelly,Michael J., Cipher method and system for verifying a decryption of an encrypted user data key.
  20. Ganapathy, Narayanan; Greeff, Esaias E., Cloud-based device information storage.
  21. Ganapathy, Narayanan; Greeff, Esaias E., Cloud-based device information storage.
  22. Vincent, Pradeep; Marr, Michael David, Co-operative secure packet management.
  23. Yach, David P.; Brown, Michael S.; Little, Herbert A., Code signing system and method.
  24. Yach, David P.; Brown, Michael S.; Little, Herbert A., Code signing system and method.
  25. Yach, David Paul; Brown, Michael Stephen; Little, Herbert Anthony, Code signing system and method.
  26. Frankel, Yair; Kravitz, David William; Montgomery, Charles Thomas; Yung, Marcel Mordechay, Computer-based method and system for aiding transactions.
  27. Frankel, Yair; Kravitz, David William; Montgomery, Charles Thomas; Yung, Marcel Mordechay, Computer-based method and system for aiding transactions.
  28. Frankel,Yair; Kravitz,David William; Montgomery,Charles Thomas; Yung,Marcel Mordechay, Computer-based method and system for aiding transactions.
  29. Yair Frankel ; David William Kravitz ; Charles Thomas Montgomery ; Marcel Mordechay Yung, Computer-based method and system for aiding transactions.
  30. Hirai, Tatsuya; Inagaki, Yukihide, Content data management system and method.
  31. Yach, David P.; Brown, Michael Steven; Little, Herbert Anthony, Controlling access by code.
  32. Yach, David Paul; Little, Herbert Anthony; Brown, Michael Stephen, Controlling access by code.
  33. Yach, David Paul; Little, Herbert Anthony; Brown, Michael Stephen, Controlling access by code.
  34. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  35. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  36. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  37. Berringer, Ryan R.; Hougaard, Todd R.; Andrus, Richard S., Creating and verifying electronic documents.
  38. Berringer,Ryan R.; Hougaard,Todd R.; Andrus,Richard S., Creating and verifying electronic documents.
  39. Zheng, Yuliang; Kauer, Neil Kevin; Badia, David Victor, Cryptographic key backup and escrow system.
  40. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  41. Nixon, Mark J.; Beoughter, Ken; Hieb, Brandon; Blevins, Terrence L.; Stevenson, Dennis L., Custom function blocks for use with process control systems.
  42. Nishimura, Takuya; Iitsuka, Hiroyuki; Yamada, Masazumi; Gotoh, Shoichi; Takechi, Hideaki, DATA TRANSMITTING/RECEIVING METHOD, DATA TRANSMITTER, DATA RECEIVER, DATA TRANSMITTING/RECEIVING SYSTEM, AV CONTENT TRANSMITTING METHOD, AV CONTENT RECEIVING METHOD, AV CONTENT TRANSMITTER, AV CONTEN.
  43. Yen, Wei; Princen, John; Lo, Raymond; Srinivasan, Pramila, Delivery of license information using a short messaging system protocol in a closed content distribution system.
  44. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  45. Engberg, David, Distributed delegated path discovery and validation.
  46. Micali Silvio, Distributed split-key cryptosystem and applications.
  47. Dipankar Gupta, Document transfer systems.
  48. Gupta,Dipankar, Document transfer systems.
  49. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  50. Micali,Silvio, Efficient certificate revocation.
  51. Shao, Jun; Zhu, Bin; Feng, Min, Efficient certified email protocol.
  52. Zank Anthony E. ; Stevens David R., Electronic signature management system.
  53. Zank, Anthony E., Electronic signature security system.
  54. Rosen,Sholom S., Electronic ticket vending system.
  55. Shrivastava, Apurva; Shrivastava, Aditya, Encryption / decryption of data with non-persistent, non-shared passkey.
  56. Feng,An; Minjarez,Frank, Enforcing data protection legislation in Web data services.
  57. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  58. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  59. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  60. Brunswig, Frank; Tiple, Abhay, Enterprise verification and certification framework.
  61. Marr, Michael David; Corddry, Matthew R.; Hamilton, James R., Firmware updates during limited time period.
  62. Marr, Michael David; Corddry, Matthew T.; Hamilton, James R., Firmware updates during limited time period.
  63. Marr, Michael David; Corddry, Matthew T.; Hamilton, James R., Firmware updates from an external channel.
  64. Marr, Michael David; Vincent, Pradeep; Hamilton, James R., Firmware updates inaccessible to guests.
  65. Marr, Michael David; Vincent, Pradeep; Corddry, Matthew T.; Hamilton, James R., Firmware validation from an external channel.
  66. Fox,Barbara L.; LaMacchia,Brian A.; Beckman,Brian C., GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions.
  67. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, Global server for authenticating access to remote services.
  68. Vasic, Ognjen; Ansari, Suhail; Gan, Ping; Hu, Jinhui; Khulusi, Bassam; Madoukh, Adam A.; Tyshlek, Alexander, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  69. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  70. Nanavati, Samir H.; Nanavati, Rajkumar H., Identity verification method using a central biometric authority.
  71. Nanavati,Samir H.; Nanavati,Rajkumar, Identity verification method using a central biometric authority.
  72. Wendt, Barry; Brown, Jeffry R.; LaCous, Mira Kristina; Zarn, Gary Lawrence, Image identification system.
  73. Felsher, David Paul, Information record infrastructure, system and method.
  74. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  75. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  76. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  77. Jennings,William T., Key escrow systems.
  78. Vincent, Pradeep; Marr, Michael David, Leveraging physical network interface functionality for packet processing.
  79. Vincent, Pradeep; Marr, Michael David, Leveraging physical network interface functionality for packet processing.
  80. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  81. Marr, Michael David; Vincent, Pradeep; Corddry, Matthew T.; Hamilton, James R., Managing firmware update attempts.
  82. Marr, Michael David; Vincent, Pradeep; Corddry, Matthew T.; Hamilton, James R., Managing firmware update attempts.
  83. Corddry, Matthew T.; Marr, Michael David; Hamilton, James R.; De Santis, Peter N., Managing hardware reboot and reset in shared environments.
  84. Corddry, Matthew T.; Marr, Michael David; Hamilton, James R.; DeSantis, Peter N., Managing hardware reboot and reset in shared environments.
  85. Corddry, Matthew T.; Marr, Michael Eavid; Hamilton, James R.; De Santis, Peter N., Managing hardware reboot and reset in shared environments.
  86. Marr, Michael David; Vincent, Pradeep; Corddry, Matthew T.; Hamilton, James R., Managing update attempts by a guest operating system to a host system or device.
  87. LaCous,Mira Kristina, Match template protection within biometric security systems.
  88. Vogel, Mark O.; Robinson, Philip T., Method and apparatus for channel determination through power measurements.
  89. Allen, Robert; Jerdonek, Robert A.; Wang, John; Wu, Tom, Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys.
  90. Allen, Robert; Jerdonek, Robert A.; Wang, John; Wu, Tom, Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys.
  91. Allen, Robert; Jerdonek, Robert A.; Wang, John; Wu, Tom, Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys.
  92. Walker, Jay S.; Schneier, Bruce, Method and apparatus for executing cryptographically-enabled letters of credit.
  93. Walker, Jay S.; Schneier, Bruce, Method and apparatus for executing cryptographically-enabled letters of credit.
  94. Walker, Jay S.; Van Luchene, Andrew S., Method and apparatus for facilitating the play of fractional lottery tickets utilizing point-of-sale terminals.
  95. Perlman Radia J., Method and apparatus for implementing partial and complete optional key escrow.
  96. Holopainen,Yrj철, Method and apparatus for protecting software against unauthorized use.
  97. Burns, Lawrence M.; Ramachandran, Ravi, Method and apparatus for reflective mixer testing of a cable modem.
  98. Brown,Michael Wayne; Kaply,Michael Aaron; Reed,Aaron Keith; Ullmann,Cristi Nesbitt, Method and apparatus for removing information from a server.
  99. Walker, Jay S.; Schneier, Bruce; Jorasch, James A., Method and apparatus for secure measurement certification.
  100. Walker, Jay S.; Schneier, Bruce; Jorasch, James A., Method and apparatus for secure measurement certification.
  101. Walker, Jay S.; Tedesco, Daniel E.; Jorasch, James A.; Lech, Robert R.; Alderucci, Dean P., Method and apparatus for vending a combination of products.
  102. Dupr챕,Michael, Method and device for customer personalization of GSM chips.
  103. Hougaard, Todd R.; Andrus, Richard S., Method and process for creating an electronically signed document.
  104. Fijolek John G. ; Beser Nurettin B. ; Robinson Philip T., Method and system for addressing network host interfaces from a cable modem using DHCP.
  105. Heiden, Richard W., Method and system for authenticating a network user.
  106. Sandhu,Ravi; deSa,Colin; Ganesan,Karuna, Method and system for authorizing generation of asymmetric crypto-keys.
  107. Arutyunov, Yuri, Method and system for automatic link hang up.
  108. Beser Nurettin B., Method and system for bundling data in a data-over-cable system.
  109. Beser Nurettin B., Method and system for cable modem initialization using dynamic servers.
  110. Fijolek John G. ; Beser Nurettin B., Method and system for cable modem management of a data-over-cable system.
  111. Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
  112. Fijolek,John G.; Akgun,Ali; Shammas,Rita; Harper,Matthew, Method and system for dynamic service registration in a data-over-cable system.
  113. Fijolek,John G.; Gilbert,Irene; Kulkarni,Jaideep, Method and system for integrating IP address reservations with policy provisioning.
  114. Abela,Noel, Method and system for internationally providing trusted universal identification over a global communications network.
  115. Fijolek John G. ; Beser Nurettin B., Method and system for managing addresses for network host interfaces in a data-over-cable system.
  116. Fijolek, John G.; Beser, Nurettin B., Method and system for providing quality-of-service in a data-over-cable system.
  117. Fijolek John G. ; Beser Nurettin B., Method and system for providing quality-of-service in a data-over-cable system using configuration protocol messaging.
  118. Akgun, Ali; Fijolek, John G.; Sangston, Steven W.; Beser, Nurettin B., Method and system for provisioning network addresses in a data-over-cable system.
  119. Nurettin B. Beser, Method and system for quality-of-service based data forwarding in a data-over-cable system.
  120. Beser Nurettin B. ; Fijolek John G. ; Robinson Philip T., Method and system for resolving addresses for network host interfaces from a cable modem.
  121. Heiden, Richard W.; Weiant, Jr., Monroe A., Method and system for revocation of certificates used to certify public key users.
  122. Beser, Nurettin B., Method and system for seamless address allocation in a data-over-cable system.
  123. Beser Nurettin B., Method and system for secure cable modem initialization.
  124. Beser Nurettin B., Method and system for secure cable modem registration.
  125. Beser Nurettin B., Method and system for setting and managing externally provided internet protocol addresses using the dynamic host configuration protocol.
  126. Dundas, Alan; Herskedal, Eirik, Method and system for smartcard emulation.
  127. Fijolek, John G.; Beser, Nurettin B.; Robinson, Philip T.; Gun, Levent, Method and system for virtual network administration with a data-over cable system.
  128. Schutzer,Daniel, Method and system of transaction security.
  129. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  130. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  131. Nurettin B. Beser, Method for addressing of passive network hosts in a data-over-cable system.
  132. Beser Nurettin B., Method for authentication of network devices in a data-over cable system.
  133. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  134. Beser, Nurettin B.; Fijolek, John G., Method for changing type-of-service in a data-over-cable system.
  135. Vogel, Mark O., Method for detecting radio frequency impairments in a data-over-cable system.
  136. R��ver,Stefan; Groffman,Hans Dieter, Method for digital signing of a message.
  137. Vogel,Mark O., Method for dynamic performance optimization in a data-over-cable system.
  138. Vogel,Mark O.; Robinson,Philip T., Method for improved cable modem ranging in a data-over-cable system.
  139. Miettinen,Jarmo; Lahtiranta,Atte; Salo,Saku; Otranen,Jari; Liukkonen,Jukka; M채tt철,Mikko; Saarinen,Jennifer, Method for issuing an electronic identity.
  140. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  141. Beser, Nurettin B.; Fijolek, John G., Method for network address table maintenance in a data-over-cable system using a network device registration procedure.
  142. Beser, Nurettin B.; Fijolek, John G., Method for network address table maintenance in a data-over-cable system using destination reachibility.
  143. Kiiveri, Antti, Method for protecting electronic device, and electronic device.
  144. Ruszczyk, Chester A.; Willming, David, Method for reducing interference from initializing network devices in a data-over-cable system.
  145. Fougeroux,Nicolas; Hameau,Patrice; Bole,Beno챤t, Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method.
  146. Vogel, Mark O., Method for using an initial maintenance opportunity for non-contention ranging.
  147. Binding,Carl; Hild,Stefan; Moser,Michael; O'Connor,Luke, Method of establishing the trustworthiness level of a participant in a communication connection.
  148. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  149. Garthwaite,Alexander T.; Dice,David, Methods and apparatus for providing a remote serialization guarantee.
  150. Fijolek, John G.; Robinson, Phillip T.; Gilbert, Irene M.; Budinger, Daniel M.; Jain, Narij, Methods and systems for service level agreement enforcement on a data-over cable system.
  151. John G. Fijolek ; Levent Gun ; Ronald B. Lee ; Philip T. Robinson, Methods for restricting access of network devices to subscription services in a data-over-cable system.
  152. Hoffberg, Steven M., Multifactorial optimization system and method.
  153. Day Michael David, Network discovery system and method.
  154. Reardon David C., Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place.
  155. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  156. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  157. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  158. Cantwell, James Gordon; Rivard, John Joseph; Draine, Sean Conway; Keremidarski, Svetlozar Emilov, Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store.
  159. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  160. Grawrock, David W., Platform and method for securely transmitting an authorization secret.
  161. Ganapathy, Narayanan, Portable device association.
  162. DeRobertis, Christopher V.; Gensler, Jr., Robert R.; Maerean, Serban C., Pre-generation of generic session keys for use in communicating within communications environments.
  163. Röver, Stefan; Groffman, Hans-Dieter, Process for digital signing of a message.
  164. Slater, Calvin N.; Rasmussen, Andy L., Processing electronic documents with embedded digital signatures.
  165. Kablotsky,Joshua, Programmable processor supporting secure mode.
  166. Srinivasan, Pramila; Princen, John, Programming non-volatile memory in a secure processor.
  167. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  168. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  169. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  170. Bockes, Markus; Drexler, Hermann; Kahl, Helmut, Protected cryptographic calculation.
  171. Ganapathy, Narayanan, Protocol for device to station association.
  172. Horton, Michael, Proximity based device security.
  173. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  174. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  175. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  176. Prihoda, Heinz; Schmidt, Volker; Striebel, Werner; Becker, Michael; Lijzer, Gregor De, Secure data processing method.
  177. Dischamp, Paul; Giraud, Christophe, Secure electronic entity for time certification.
  178. Andivahis,Dimitrios Emmanouil; Carnell,Shawn Michael Edwards; Fischer,Addison McElroy; Wettlaufer,Albert John, Secure electronic messaging system requiring key retrieval for deriving decryption keys.
  179. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  180. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  181. Vincent, Pradeep; Marr, Michael David, Secure packet management for bare metal access.
  182. Vincent, Pradeep; Marr, Michael David, Secure packet management for bare metal access.
  183. Whitfield, Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  184. Whitfield,Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  185. Rasmussen, Brian; Harmsen, Matthew, Secure user authentication to computing resource via smart card.
  186. Marr, Michael David; Corddry, Matthew T.; Hamilton, James R., Secured firmware updates.
  187. Marr, Michael David; Corddry, Matthew T.; Hamilton, James R., Secured firmware updates.
  188. Marr, Michael David; Corddry, Matthew T.; Hamilton, James R., Secured firmware updates.
  189. Gilham, Dennis Thomas, Security and authentication of postage indicia.
  190. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  191. Vincent, Pradeep; Marr, Michael David, Stateless packet segmentation and processing.
  192. Vincent, Pradeep; Marr, Michael David, Stateless packet segmentation and processing.
  193. Yen, Wei; Blythe, David; Princen, John; Srinivasan, Pramila, Static-or-dynamic and limited-or-unlimited content rights.
  194. Vincent, Pradeep, Streamlined guest networking in a virtualized environment.
  195. Vincent, Pradeep, Streamlined guest networking in a virtualized environment.
  196. Hutchings, Justin A.; Peterson, Erik O.; Nagarajan, Arun Babu; Wojtaszek, Kyle P.; Lannin, J. Adrian; Hain, Robert F.; Greeff, Esaias E.; Sanghvi, Niket A.; Adams, Samuel David; Duhon, David W., Synchronizing device association data among computing devices.
  197. Hutchings, Justin A.; Peterson, Erik O.; Nagarajan, Arun Babu; Wojtaszek, Kyle P.; Lannin, J. Adrian; Hain, Robert F.; Greeff, Esaias E.; Sanghvi, Niket A.; Adams, Samuel David; Duhon, David W., Synchronizing device association data among computing devices.
  198. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  199. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  200. Voldman,Mikhail; Budinger,Dan; Akgun,Ali; Fijolek,John G.; Vogel,Mark O.; Kelkar,Kris, System and method for a multi-frequency upstream channel in a computer network.
  201. Necka, William; Fey, Igor; Akgun, Ali; Arutyunov, Yuri, System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network.
  202. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Thomas; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for analyzing de-identified health care data.
  203. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Thomas; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for analyzing de-identified health care data.
  204. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Tom; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for analyzing de-identified health care data.
  205. Karadogan, Baris; Lee, Ronald, System and method for assigning dynamic host configuration protocol parameters in devices using resident network interfaces.
  206. Willming,David; Chan,Paul; Necka,William; Lee,Ronald, System and method for automatic digital certificate installation on a network device in a data-over-cable system.
  207. Fijolek,John G.; Gilbert,Irene; Akgun,Ali; Khan,Shahidur; Swamy,Vikram, System and method for automatic load balancing in a data-over-cable network.
  208. Del Sol, Timothy; Krishnamurthy, Gopalan, System and method for calibrating power level during initial ranging of a network client device.
  209. Karadogan Baris ; Nunns Andrew ; Robinson Philip Thomas, System and method for communicating with a telco-return cable modem as a single communications device.
  210. Davis Derek L., System and method for configuring and registering a cryptographic device.
  211. Hoffberg, Steven M., System and method for determining contingent relevance.
  212. Dice David, System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection.
  213. Riggins,Mark D., System and method for enabling secure access to services in a computer network.
  214. Riggins,Mark D., System and method for encrypting and decrypting files.
  215. Kress, Andrew E.; Stevens, Steve E.; Martin, Ann R., System and method for encrypting provider identifiers on medical service claim transactions.
  216. Derek L. Davis, System and method for ensuring integrity throughout post-processing.
  217. Beser Nurettin B. ; Fijolek John G., System and method for extending communications features using generic management information base objects.
  218. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  219. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  220. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  221. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Tom; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for generating de-identified health care data.
  222. Ober, N. Stephen; Grubmuller, John; Farrell, Maureen; Wentworth, Charles; Gilbert, Tom; Barrett, Kevin; Davis, Steven; Nordman, Erik; Grenier, Randell, System and method for generating de-identified health care data.
  223. Ober,N. Stephen; Grubmuller,John; Farrell,Maureen; Wentworth,Charles; Gilbert,Tom; Barrett,Kevin; Davis,Steven; Nordman,Erik; Grenier,Randell, System and method for generating de-identified health care data.
  224. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  225. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  226. Mendez, Daniel J.; Riggins, Mark D.; Wagle, Prasad; Bui, Hong Q.; Ng, Mason; Quinlan, Sean Michael; Ying, Christine C.; Zuleeg, Christopher R.; Cowan, David J.; Aptekar-Strober, Joanna A.; Bailes, R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  227. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Bui,Hong Q.; Ng,Mason; Quinlan,Sean Michael; Ying,Christine C.; Zuleeg,Christopher R.; Cowan,David J.; Aptekar Strober,Joanna A.; Bailes,R. Stanley, System and method for globally and securely accessing unified information in a computer network.
  228. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  229. Riggins Mark D., System and method for installing and using a temporary certificate at a remote site.
  230. Lee,Ronald B., System and method for insuring dynamic host configuration protocol operation by a host connected to a data network.
  231. Rensin, David K.; Hanay, John W.; Lavelle, Timothy C.; Montellato, David A.; Obot, James J.; Rubin, Jeff M.; Williams, Cuong G.; Yuryev, Yuri, System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall.
  232. Fijolek, John G.; Beser, Nurettin B., System and method for managing channel usage in a data over cable system.
  233. Pauly,Steven J., System and method for manufacturing and securing transport of postage printing devices.
  234. Beser, Nurettin B.; Fijolek, John G., System and method for network address maintenance using dynamic host configuration protocol messages in a data-over-cable system.
  235. Claessens,Aaron; Phillips,Chad; Brummett,Anthony, System and method for network performance testing.
  236. Walker,Jay S.; Jorasch,James A.; Jindal,Sanjay K., System and method for performing lottery ticket transactions utilizing point-of-sale terminals.
  237. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  238. Adams, Neil Patrick; Little, Herbert Anthony; Rybak, Michal Andrzej; Kirkup, Michael Grant; Tapuska, David Francis, System and method for providing an indication of randomness quality of random number data generated by a random data service.
  239. Freed,Michael; Amara,Satish; Joseph,Boby, System and method for providing distributed and dynamic network services for remote access server users.
  240. Kazenas, Joseph Alfred; Voutour, Teddy Joseph Edmond, System and method for providing warning and protection for bill payments.
  241. Arutyunov,Yuri; Fijolek,John G.; Lee,Ronald; Necka,William, System and method for resolving network addresses for network devices on distributed network subnets.
  242. Callas, Jonathan D.; Price, III, William F.; Allen, David E., System and method for secure electronic communication in a partially keyless environment.
  243. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  244. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  245. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  246. Stevens, Steven E.; Kress, Andrew E.; Dublin, Adam, System and method for the protection and de-identification of health care data.
  247. Freed,Michael; Amara,Satish; Borella,Michael, System and method for traffic shaping based on generalized congestion and flow control.
  248. Mendez,Daniel J.; Riggins,Mark D.; Wagle,Prasad; Ying,Christine C., System and method for transmitting workspace elements across a network.
  249. Riggins, Mark D., System and method for using an authentication applet to identify and authenticate a user in a computer network.
  250. Lincoln, Patrick D.; Shankar, Natarajan, System and method using information based indicia for securing and authenticating transactions.
  251. Lincoln, Patrick D.; Shankar, Natarajan, System and method using information based indicia for securing and authenticating transactions.
  252. Lincoln, Patrick D.; Shankar, Natarajan, System and method using information-based indicia for securing and authenticating transactions.
  253. Lincoln,Patrick D.; Shankar,Natarajan, System and method using information-based indicia for securing and authenticating transactions.
  254. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  255. Ross, Jr.,Robert C., System, method, and computer program product for providing a multi-user e-mail system.
  256. Rosen Sholom S., Tamper-proof electronic processing device.
  257. Dice, David; Huang, Hui; Yang, Mingyao, Techniques for accessing a shared resource using an improved synchronization mechanism.
  258. LaCous,Mira, Trusted biometric device.
  259. Murata, Kuniharu, Upgrade service system.
  260. Takada,Yuji; Nishida,Taishin, Variable-length key cryptosystem.
  261. Walker, Jay S.; Tedesco, Daniel E.; Van Luchene, Andrew S.; Bemer, Keith, Vending machine system and method for encouraging the purchase of profitable items.
  262. Walker,Jay S.; Tedesco,Daniel E.; Van Luchene,Andrew S.; Bemer,Keith, Vending machine system and method for encouraging the purchase of profitable items.
  263. Berke, Stuart Allen; Khatri, Mukund Purshottam, Verifying OEM components within an information handling system using original equipment manufacturer (OEM) identifier.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로