$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computer security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/00
출원번호 US-0738897 (1996-10-28)
발명자 / 주소
  • Veneklase Brian J.
대리인 / 주소
    Chupa & Alberti, P.C.
인용정보 피인용 횟수 : 121  인용 특허 : 13

초록

Several embodiments of computer security systems are described and which are adapted to grant an authorized individual access to a secured domain, such as a computer or data stream. In one embodiment, the security system comprises: an analyzing means for receiving first and second passwords, each of

대표청구항

[ We claim:] [1.] A method to securely transmit data having a plurality of bits, said method comprising the steps of:interspersing a plurality of filler data bits into said data in a certain random pattern:transmitting said data and said interspersed filler data;receiving said data and said interspe

이 특허에 인용된 특허 (13)

  1. Durinovic-Johri Sanja (Aberdeen NJ) Wirth Patricia E. (Old Bridge NJ), Access control system with lockout.
  2. Morisawa Toshikazu (Tokorozawa JPX) Dewa Koichi (Ome JPX) Saito Toshimitsu (Fuchu JPX), Computer with password processing function and password processing method of computer.
  3. Rangan Geetha N. K. (Sunnyvale CA) Worsley Debra J. (Vista CA) Thaik Richard (Sunnyvale CA) Edem Brian C. (San Jose CA), Data communication network with transfer port, cascade port and/or frame synchronizing signal.
  4. Jones Michael F. (Nashua NH) Zachai Arthur (Swampscott MA), Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys.
  5. Parzych James D. (Houston TX) Tomaszewski Richard (Houston TX) Brown Norman P. (Tomball TX) Anderson Roger P. (Tomball TX) Douglas David M. (Houston TX) Stufflebeam Kenneth W. (Spring TX), Hard disk password security system.
  6. Moseley Donald R. (Optimum Elecrtronics ; Inc. ; 425 Washington Ave. North Haven CT 06473) Drew ; Jr. Robert D. (Optimum Elecrtronics ; Inc. ; 425 Washington Ave. North Haven CT 06473), Identity verification method and apparatus.
  7. Kulczyckyj Antin U. (Cinnaminson NJ) Goszyk Kurt A. (Washington Crossing PA), Method and apparatus for controlling access in a data transmission system.
  8. Ohta Junichi (Tokyo JPX), Method and apparatus for forming unique user identification data at remote terminal for secure transmission of data from.
  9. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  10. Johnson William J. (Flower Mound TX) Weber Owen W. (Coppell TX), Method and system for variable password access.
  11. Swift Michael M. ; Van Dyke Clifford P. ; Misra Pradyumna Kumar, Method for changing passwords on a remote computer.
  12. Worsley Debra J. (Vista CA) Edem Brian C. (San Jose CA), Method of maintaining frame synchronization in a communication network.
  13. Kralowetz Joseph D. (Germantown MD) Ortega Douglas F. (Laytonsville MD), Transparent support of protocol and data compression features for data communication.

이 특허를 인용한 특허 (121)

  1. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  2. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  3. Barkan, Elad Pinhas, Authorizing mobile application access to a service through a telecommunication network.
  4. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  5. Rozenberg Roman ; Rozenberg Tatyana, Biometric scanning aperture for a computer input device.
  6. Jurij Jakovlevich Kharon RU; Roman Rozenberg, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  7. Novikov Sergey Olegovich,RUX ; Chernomordik Oleg Mikhailovich,RUX, Biometric system for biometric input, comparison, authentication and access control and method therefor.
  8. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Centralized identification and authentication system and method.
  9. Errico, Stephen; Pfrenzinger, Steven, Certified email messages and attachments.
  10. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  11. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  12. Berkovitz, Darren; Disraeli, Ryan Parker; Stubblefield, Stacy Lyn, Comprehensive authentication and identity system and method.
  13. Veneklase, Brian J., Computer security system.
  14. Bloomberg, Michael R.; Waanders, John D.; Ozolins, Helmars Ericks, Computer terminals biometrically enabled for network functions and voice communication.
  15. Grajek, Garret Florian; Moore, Stephen; Lambiase, Mark V.; Lund, Craig J., Configuring a valid duration period for a digital certificate.
  16. Grajek, Garret Florian; Moore, Stephen; Lambiase, Mark V.; Lund, Craig J., Configuring a valid duration period for a digital certificate.
  17. Moore, Stephen; Graiek, Garret; Lambiase, Mark; Lund, Craig, Configuring a valid duration period for a digital certificate.
  18. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  19. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  20. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Direct authentication system and method via trusted authenticators.
  21. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Direct authentication system and method via trusted authenticators.
  22. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Direct authentication system and method via trusted authenticators.
  23. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Distributed monitoring for a video security system.
  24. Jillings, Steven H., Dual code authentication system.
  25. Jillings, Steven H., Dual code authentication system.
  26. Reynolds, Keith R.; Hughes, John R., Dynamic mirroring of a network connection.
  27. Reynolds, Keith R.; Hughes, John R., Dynamic mirroring of a network connection.
  28. Reynolds, Keith R.; Hughes, John R., Dynamic mirroring of a network connection.
  29. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  30. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  31. Lund, Craig; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  32. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  33. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  34. Dupray, Dennis J.; Goldberg, Sheldon F., Geographically constrained network services.
  35. Dupray, Dennis J.; Goldberg, Sheldon F., Geographically constrained network services.
  36. Grajek, Garret Florian; Lo, Jeffrey Chiwai; Lambiase, Mark V., Identity-based certificate management.
  37. Grajek, Garret Florian; Lo, Jeffrey Chiwai; Lambiase, Mark V., Identity-based certificate management.
  38. Grajek, Garrett F.; Lo, Jeff C.; Lambiase, Mark V., Identity-based certificate management.
  39. Rozenberg Roman, Index finger biometric aperture for a mouse.
  40. Felsher, David Paul, Information record infrastructure, system and method.
  41. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  42. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  43. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  44. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  45. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  46. Takagawa Yuichiro,JPX ; Shimokura Ken-ichiro,JPX ; Shiraishi Yoshihiko,JPX ; Iwata Satoshi, Internet accessing system using card readers and dual cards with information pertaining to log on.
  47. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  48. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  49. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  50. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  51. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  52. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  53. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  54. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  55. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  56. David Carroll Challener ; Barry Douglas Atkins ; Todd W. Arnold, Method and apparatus for establishing computer configuration protection passwords for protecting computer configurations.
  57. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  58. Challener, David Carroll; Peyravian, Mohammad; Resnick, Russell Alan, Method and system for password protection of a data processing system that permit a user-selected password to be recovered.
  59. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  60. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  61. Guccione, Louis J.; Cha, Inhyok; Reznik, Alexander; Ye, Chunxuan; Racha, Renuka, Method and system for securing wireless communications.
  62. Hald, David; Rosendal, Claus; {acute over (Ø)}stergaard, Jakob, Method and system protecting against identity theft or replication abuse.
  63. Müller, Christian; Trolin, Alexis; Ergezinger, Siegfried; Döhler, Anita, Method for establishing the authenticity of the identity of a service user and device for carrying out the method.
  64. Felt Edward Porter, Method of authentication based on intersection of password sets.
  65. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  66. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  67. Hoffberg, Steven M., Multifactorial optimization system and method.
  68. Dupray, Dennis J.; Goldberg, Sheldon F., Network services dependent upon geographical constraints.
  69. Marinier, Paul; Pelletier, Ghyslain; Liu, Kai; Olesen, Robert L.; Wang, Peter S., Performing measurements in wireless communications using multiple carriers.
  70. Marinier, Paul; Pelletier, Ghyslain; Liu, Kai; Olesen, Robert L.; Wang, Peter S., Performing measurements in wireless communications using multiple carriers.
  71. Marinier, Paul; Pelletier, Ghyslain; Liu, Kai; Olesen, Robert L.; Wang, Peter S., Performing measurements in wireless communications using multiple carriers.
  72. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  73. Mattsson, Ulf, Preventing impersonation of a computer system user.
  74. Gonen, Shlomo; Gonen, Jonathan A.; Gonen, Alon; Rosen, Danny, Registration, verification and notification system.
  75. Gonen, Shlomo; Gonen, Jonathan A.; Gonen, Alon; Rosen, Danny, Registration, verification and notification system.
  76. Gonen, Shlomo; Gonen, Jonathan A.; Gonen, Alon; Rosen, Danny, Registration, verification and notification system.
  77. Gonen, Shlomo; Gonen, Jonathan A.; Gonen, Alon; Rosen, Danny, Registration, verification and notification system.
  78. Gonen, Shlomo; Gonen, Jonathan A.; Gonen, Alon; Rosen, Danny, Registration, verification and notification system.
  79. Oelsner, Tom, Remote diagnosis system and method and printing machine having the system.
  80. Veneklase, Brian J., Secure access computer system.
  81. Thornewell, Peter; Hughes, John R., Secure sockets layer protocol handshake mirroring.
  82. Quach, Allen Yu; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark, Security device provisioning.
  83. Quach, Allen Yu; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark V., Security device provisioning.
  84. Naidoo, Surendra N.; Glasgow, William P., Security system.
  85. Naidoo, Surendra N.; Glasgow, William P., Security system.
  86. Dawes, Paul J., Security system with networked touchscreen and gateway.
  87. Lambiase, Mark V.; Grajek, Garret Florian; Lo, Jeffrey Chiwai; Hsiang Wu, Tommy Ching, Single sign on with multiple authentication factors.
  88. Lambiase, Mark V.; Grajek, Garret Florian; Lo, Jeffrey Chiwai; Hsiang Wu, Tommy Ching, Single sign on with multiple authentication factors.
  89. Otway,David John; Bull,John Albert, Strong mutual authentication of devices.
  90. Otway,David; Bull,John, Strong mutual authentication of devices.
  91. Hankey Mhoon, System and method for conducting secure internet transactions.
  92. Grajek, Garret; Lund, Craig; Moore, Steven; Lambiase, Mark, System and method for configuring a valid duration period for a digital certificate.
  93. Hoffberg, Steven M., System and method for determining contingent relevance.
  94. Lund, Craig; Grajek, Garret; Moore, Stephen, System and method for facilitating secure online transactions.
  95. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  96. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  97. Yu Quach, Allen; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark V., System and method for provisioning a security token.
  98. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  99. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  100. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  101. Stubblefield, Stacy Lyn, System and method for utilizing behavioral characteristics in authentication and fraud prevention.
  102. Stubblefield, Stacy Lyn, System and method for utilizing behavioral characteristics in authentication and fraud prevention.
  103. Stubblefield, Stacy Lyn, System and method for utilizing behavioral characteristics in authentication and fraud prevention.
  104. Ellingson, John F., System and method for verification of identity.
  105. Kramer,Andre; Harwood,Will, System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel.
  106. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  107. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  108. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  109. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  110. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  111. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  112. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  113. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  114. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  115. Barkan, Elad Pinhas, Verifying an application identifier on a mobile device through a telecommunication network.
  116. Barkan, Elad Pinhas, Verifying an application identifier on a mobile device through a telecommunication network.
  117. Barkan, Elad Pinhas, Verifying an association between an application and a mobile device through a telecommunication network.
  118. Barkan, Elad Pinhas, Verifying an association between an application and a mobile device through a telecommunication network.
  119. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security system.
  120. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security systems and methods.
  121. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로