$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for safe communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/30
출원번호 US-0916438 (1997-08-22)
우선권정보 IL-0113259 (1995-04-05)
발명자 / 주소
  • Barkan Mordhay,ILX
출원인 / 주소
  • Diversinet Corp., CAX
대리인 / 주소
    Agarwal
인용정보 피인용 횟수 : 226  인용 특허 : 17

초록

Disclosed is a method for safe distribution of encryption keys including a known public and secret private keys in establishing a secure link between computer users resided at separate location whom have no previous secure communications. The secure communication link occasionally and anonymously in

대표청구항

[ What is claimed is:] [1.] A method for safe distribution of encryption keys, to make possible to establish a secure link between parties which are at separate locations and which parties had no previous secure communications therebetween, wherein a first user desiring to establish a secure communi

이 특허에 인용된 특허 (17)

  1. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  2. Chandos Ronald V. (Tempe AZ) Foster Robert I. (Mesa AZ), Computer system and method for secure remote communication sessions.
  3. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  4. Doiron Timothy J. (Forest VA) Dreon Steven T. (Forest VA) Priest Mark D. (Rustburg VA), Digital radio transceiver with encrypted key storage.
  5. Kung Kenneth C. (Cerritos CA), Distributed user authentication protocol.
  6. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  7. Penzias Arno A. (Chatham NJ), Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transactio.
  8. Kung Kenneth C. (Cerritos CA) Bathrick Erwin W. (Brea CA) Huang Cheng-Chi (Irvine CA) Ma Mae-Hwa (Cerritos CA) Matthews Todd E. (Santa Ana CA) Zmuda James E. (Lake Forest CA), Method for providing mutual authentication of a user and a server on a network.
  9. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  10. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  11. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  12. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  13. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  14. Ganesan Ravi (Arlington VA), System and method for centralized session key distribution, privacy enhanced messaging and information distribution usin.
  15. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  16. Kikuchi Hiroaki (Kawasaki JPX), User authenticating system and method in wide area distributed environment.
  17. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.

이 특허를 인용한 특허 (226)

  1. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Pitroda, Satyan G.; Desai, Mehul, Administering a plurality of accounts for a client.
  4. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  5. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  6. Pitroda, Satyan G.; Desai, Mehul, Aggregating a user's transactions across a plurality of service institutions.
  7. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  8. Marshall, Roger S.; Zhu, Yinjun, Ancillary data support in session initiation protocol (SIP) messaging.
  9. Bromley, Dennis N.; Grigorovitch, Alexandre V., Anonymous verifiable public key certificates.
  10. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  11. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  12. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  13. Rosen Sholom S., Apparatus and method for secure transacting.
  14. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  15. Zhu, Yinjun; Thompson, Paul, Area event handling when current network does not cover target area.
  16. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  17. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  18. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  19. Pinkas, Binyamin, Authentication system and method.
  20. McFarland, Keith A., Authentication via motion of wireless device movement.
  21. McFarland, Keith A., Authentication via motion of wireless device movement.
  22. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  23. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  24. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  25. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  26. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  27. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  28. Neff,C. Andrew, Coercion-free voting scheme.
  29. Alisuag,Cora, Computer oriented record administration system.
  30. Peterson, Kevin, Computer-implemented forum for enabling secure exchange of information.
  31. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Configuring a plurality of security isolated wallet containers on a single mobile device.
  32. Hines, Gordon John; Cousins, Will, Consequential location derived information.
  33. Nemiroff, Daniel, Cryptographic key generation using a stored input value and a stored count value.
  34. Nemiroff, Daniel, Cryptographic key generation using a stored input value and a stored count value.
  35. Ober Timothy ; Reed Peter, Cryptographic key management scheme.
  36. Ober, Timothy; Reed, Peter, Cryptographic key management scheme.
  37. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  38. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  39. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  40. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  41. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  42. Pitroda, Satyan G.; Desai, Mehul, Data consolidation expert system for facilitating user control over information use.
  43. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Deploying an issuer-specific widget to a secure wallet container on a client device.
  44. Neff,C. Andrew, Detecting compromised ballots.
  45. Ginter, Jr., Thomas; Ali, Salman; Pann, Tim, Device independent caller data access for emergency calls.
  46. Pitroda, Satyan G.; Desai, Mehul, Direct personal mobile device user to service provider secure transaction channel.
  47. Pitroda, Satyan G.; Desai, Mehul, Direct user to ticketing service provider secure transaction channel.
  48. Stewart, Brett B.; Thompson, James; McClelland, Kathleen E., Distributed network communication system which enables multiple network providers to use a common distributed network infrastructure.
  49. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  50. Nappi, Bruce, Effecting financial transactions.
  51. Thompson, Paul C., Efficient prisoner tracking.
  52. Vasil,Paul E.; Sandstorm,Ronald W., Electronic transaction security method.
  53. Zon, Ludwik F.; Sandstrom, Ronald W., Electronic transaction security system.
  54. Sandstrom, Ronald W.; Vasil, Paul E.; Zon, Ludwik F., Electronic transaction security system and method.
  55. Sandstrom, Ronald W.; Vasil, Paul E.; Zon, Ludwik F., Electronic transaction security system and method.
  56. Sandstrom, Ronald W.; Vasil, Paul E.; Zon, Ludwik F., Electronic transaction security system and method.
  57. Sandstrom, Ronald W.; Vasil, Paul E.; Zon, Ludwik F., Electronic transaction security system and method.
  58. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  59. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  60. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  61. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  62. Deffet, Thomas L.; Petty, W. Clinton; Tafreshi, Ali M., Encryption gateway service.
  63. Dickinson, Richard; Hines, Gordon John; Croy, Jonothan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  64. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  65. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  66. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  67. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  68. Nessett,Danny M.; Young,Albert, Enhancement to authentication protocol that uses a key lease.
  69. Pitroda, Satyan G.; Desai, Mehul, Establishing direct, secure transaction channels between a device and a plurality of service providers.
  70. Pitroda, Satyan G.; Desai, Mehul, Establishing direct, secure transaction channels between a device and a plurality of service providers via personalized tokens.
  71. Pitroda, Satyan G.; Desai, Mehul, Establishing trust for conducting direct secure electronic transactions between a user and service providers.
  72. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Expert engine tier for adapting transaction-specific user requirements and transaction record handling.
  73. Zhu, Yinjun, Extended area event for network based proximity discovery.
  74. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  75. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  76. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  77. Pitroda, Satyan G.; Desai, Mehul, Facilitating a secure transaction over a direct secure transaction channel.
  78. Pitroda, Satyan G.; Desai, Mehul, Facilitating a secure transaction over a direct secure transaction portal.
  79. Pitroda, Satyan G.; Desai, Mehul, Facilitating establishing trust for a conducting direct secure electronic transactions between a user and a financial service providers.
  80. Pitroda, Satyan G.; Desai, Mehul, Facilitating establishing trust for conducting direct secure electronic transactions between a user and airtime service providers.
  81. Pitroda, Satyan G.; Desai, Mehul, Facilitating establishing trust for conducting direct secure electronic transactions between users and service providers via a mobile wallet.
  82. Haney, Richard D., Formation of wireless device location sharing group.
  83. Kobayashi, Tetsutaro; Suzuki, Koutarou, Functional encryption applied system, information output apparatus, information processing apparatus, encryption protocol execution method, information output method, information processing method, program and recording medium.
  84. Pitt, Lance Douglas, GeoNexus proximity detector network.
  85. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  86. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  87. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  88. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  89. Olkin,Terry M.; Moreh,Jahanshah, Implementing nonrepudiation and audit using authentication assertions and key servers.
  90. Ehrlich, Robert; Mitchell, Donald L.; Marshall, Roger S.; Hines, Gordon John, Index of suspicion determination for communications request.
  91. Kuroda,Kazuo; Moriyama,Yoshiaki; Hashimoto,Takashi; Naito,Akihiko, Information sending method and information sending apparatus, information receiving apparatus and information receiving method, information transmission system and information transmission method, an.
  92. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  93. Ghozati, Kambiz; Thompson, Paul, Intelligent load balancer enhanced routing.
  94. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  95. Sprunk, Eric J.; Moroney, Paul; Medvinsky, Alexander; Anderson, Steven E.; Fellows, Jonathan A., Internet protocol telephony security architecture.
  96. Sprunk, Eric J.; Moroney, Paul; Medvinsky, Alexander; Anderson, Steven E.; Fellows, Jonathan A., Internet protocol telephony security architecture.
  97. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Isolating distinct service provider widgets within a wallet container.
  98. Pitroda, Satyan G.; Desai, Mehul, Issuing an account to an electronic transaction device.
  99. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  100. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  101. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  102. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  103. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  104. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  105. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  106. Hines,Gordon John; Tapia,Mario G.; Cousins,Will; Carey,Patrick, Location derived presence information.
  107. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  108. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  109. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  110. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  111. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  112. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  113. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  114. Haney, Richard D., Location sharing group for services provision.
  115. Haney, Richard D., Location sharing group map management.
  116. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  117. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  118. Dancs Frank B. ; Zmuda James E., Mechanism for dynamically binding a network computer client device to an approved internet service provider.
  119. Hillier Stephen William,CAX ; Dilkie Ramon Jonathan Lee,CAX ; Rosenquist Gerrard Eric,CAX, Method and apparatus for centralizing processing of key and certificate life cycle management.
  120. Matt,Brian J., Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique.
  121. Kim,Ju Han; Lee,Joo Young; Moon,Ki Young; Jang,Jong Soo; Sohn,Sung Won, Method and apparatus for managing online and offline documents with RFID technology.
  122. Patrick A. Lyson CA; Ron J. Vandergeest CA, Method and apparatus for securing and accessing data elements within a database.
  123. Prafullchandra, Hemma; Graves, Michael; Lundberg, Ryan Emory; Granqvist, Hans; Krall, Gary, Method and apparatus to provide an authoring tool to create content for a secure content service.
  124. Michael D. Doyle, Method and system for transient key digital time stamps.
  125. Entschew, Enrico; Wirth, Klaus-Dieter, Method for generating a certificate.
  126. Schwenk, Joerg, Method for the secure, distributed generation of an encryption key.
  127. Maldy Jacques,FRX, Method of setting up secure communications and associated encryption/decryption system.
  128. Benayoun,Alain; LePennec,Jean Francois; Michel,Patrick, Method of updating encryption keys in a data communication system.
  129. Mao Wenbo,GBX, Methods and apparatus for authenticating an originator of a message.
  130. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  131. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  132. Haney, Richard D., Methods and systems for annotating target locations.
  133. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  134. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  135. Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  136. Beattie,Douglas; Creighton, Jr.,Neal; Bailey,Christopher; Remy,David; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  137. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  138. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  139. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  140. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  141. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  142. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  143. Revel, Daniel; Bunn, Jeremy, Mobile Printing.
  144. Dickinson, Richard, Mobile automatic location identification (ALI) for first responders.
  145. Zhu, Yinjun, Mobile internet protocol (IP) location.
  146. Zhu, Yinjun, Mobile internet protocol (IP) location.
  147. Revel, Daniel; Bunn, Jeremy, Mobile printing.
  148. Ballard, Barbara Elaine; Bharathur, Raghu; Maniar, Nehal, Multi-panel user interface.
  149. Zhu, Yinjun, Multiple location retrieval function (LRF) network having location continuity.
  150. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  151. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  152. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., No responders online.
  153. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination.
  154. Inoue Atsushi,JPX ; Ishiyama Masahiro,JPX ; Fukumoto Atsushi,JPX ; Tsuda Yoshiyuki,JPX ; Shimbo Atsushi,JPX ; Okamoto Toshio,JPX, Packet inspection device, mobile computer and packet transfer method in mobile computing with improved mobile computer authenticity check scheme.
  155. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  156. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  157. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., Rapid assignment dynamic ownership queue.
  158. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  159. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  160. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  161. Chen, Liqun, Revocation for direct anonymous attestation.
  162. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  163. Thompson, Paul; Hines, Gordon John, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices.
  164. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  165. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  166. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  167. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Secure ecosystem infrastructure enabling multiple types of electronic wallets in an ecosystem of issuers, service providers, and acquires of instruments.
  168. Arkko,Jari; Turtiainen,Esa; Blom,Rolf, Secured map messages for telecommunications networks.
  169. Pitroda, Satyan G.; Desai, Mehul, Securing a driver license service electronic transaction via a three-dimensional electronic transaction authentication protocol.
  170. Eibach, Wolfgang G.; Nuttall, Mark P.; Gruetzner, Matthias, Security for network-connected vehicles and other network-connected processing environments.
  171. Olkin,Terry M.; Moreh,Jahanshah, Security server system.
  172. Leedom, Jr., Charles M., Security system for handheld wireless devices using time-variable encryption keys.
  173. Leedom, Jr., Charles M., Security system for handheld wireless devices using time-variable encryption keys.
  174. Leedom, Jr., Charles M., Security system for handheld wireless devices using-time variable encryption keys.
  175. Rowan, Michael J.; Bailey, Christopher T. M.; Chen, Kefeng; Creighton, Neal, Security systems and services to provide identity and uniform resource identifier verification.
  176. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Selecting ecosystem features for inclusion in operational tiers of a multi-domain ecosystem platform for secure personalized transactions.
  177. Schmidt,Colin Martin, Session key distribution methods using a hierarchy of key servers.
  178. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Shareable widget interface to mobile wallet functions.
  179. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  180. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  181. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  182. Vigue, Charles L.; Fallenstedt, Martin; Melchione, Daniel; Kouznetsov, Victor, System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment.
  183. Olsen, Gregory R.; Frost, Hildreth R.; Thirunavukkarasu, Chelliah; Nibbelink, Mitchell W., System and method for creating, executing and maintaining cross-enterprise processes.
  184. Doyle,Michael D.; Hamilton,Robert G.; Perrone,Marc C.; Doyle,Paul F.; Bernsohn,Glenn W., System and method for graphical indicia for the certification of records.
  185. Doyle,Michael D.; Hamilton,Robert G.; Perrone,Marc V.; Doyle,Paul F.; Bernsohn,Glenn W., System and method for graphical indicia for the certification of records.
  186. Nussbaum, Lawrence Edward; Thompson, Stephen, System and method for securing data.
  187. Doyle,Michael D.; Doyle,Paul F.; Bernsohn,Glenn W.; Roberts,Jeffrey D.; Wolf,Kirk James; Goetze,Stephen P., System and method for widely witnessed proof of time.
  188. Vigue,Charles L.; Fallenstedt,Martin; Melchione,Daniel; Kouznetsov,Victor, System and method to securely confirm performance of task by a peer in a peer-to-peer network environment.
  189. Olkin,Terry M.; Moreh,Jahanshah, System for implementing business processes using key server events.
  190. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  191. Haney, Richard D., Techniques for sharing position data between first and second devices.
  192. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  193. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  194. Haney, Richard D., Tracking proximity of services provider to services consumer.
  195. Pitroda, Satyan G.; Desai, Mehul, Transferring account information or cash value between an electronic transaction device and a service provider based on establishing trust with a transaction service provider.
  196. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  197. Lehew, Christian R.; Pyle, Harry S.; Fang, Nicholas Jie, Trusted network transfer of content using off network input code.
  198. Lehew, Christian R.; Pyle, Harry S.; Fang, Nicholas Jie, Trusted network transfer of content using off network input code.
  199. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank 911 calls.
  200. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  201. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  202. Desai, Mehul; Pitroda, Satyan G.; Maniar, Nehal, Updating a widget that was deployed to a secure wallet container on a mobile device.
  203. Bainbridge Andrew John,GBX ; Cocks Stephen James,GBX ; Ferguson Donald Francis ; Freund Thomas,GBX ; Leff Avraham ; Normington Glyn,GBX ; Rayfield James Thomas ; Storey Robert Anthony,GBX, Updating server-related data at a client.
  204. Herz, Frederick S. M.; Radin, Matthew; Madan, Bhupinder, Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases.
  205. Herz, Frederick S. M.; Radin, Matthew; Madan, Bhupinder, Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases.
  206. Sanin,Aleksey; Cahill,Conor P., Use of pseudonyms vs. real names.
  207. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  208. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  209. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  210. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  211. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  212. Zhu,Yinjun, User plane location based service using message tunneling to support roaming.
  213. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  214. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  215. Nessett, Danny M.; Young, Albert; O'Hara, Bob; Tsai, Joe; Chen, BoFu, Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed.
  216. Pitroda, Satyan G.; Desai, Mehul, Using confidential information to prepare a request and to suggest offers without revealing confidential information.
  217. Neff,C. Andrew, Verifiable secret shuffles and their application to electronic voting.
  218. Neff, C. Andrew, Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections.
  219. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  220. Croy, Jon; Hines, John Gordon; Johnson, Darrin; Lendvay, Kathleen, Voice over internet protocol (VoIP) multi-user conferencing.
  221. Rosenberg, Jonathan B.; Harrison, John; Remy, David L.; Creighton, Neal L., Web site identity assurance.
  222. Rosenberg,Jonathan B.; Harrison,John C.; Remy,David L.; Creighton, Jr.,Neal L., Web site identity assurance.
  223. Mitchell, Jr., Donald L.; Marshall, Roger S.; Singer, Andrew; Aryana, Firdaus, Wireless emergency caller profile data delivery over a legacy interface.
  224. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  225. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  226. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로