$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Intelligent token protected system with network authentication 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0708412 (1996-09-05)
발명자 / 주소
  • Clark Paul C.
대리인 / 주소
    Cahn & Samuels, LLP
인용정보 피인용 횟수 : 176  인용 특허 : 15

초록

An intelligent token protected system includes a local host computer, an intelligent token in communication with the local host computer and a remote host computer in communication with the local host computer. The intelligent token interacts with the local host computer to perform a secure boot on

대표청구항

[ I claim:] [1.] In a system including a local host computer and a remote host computer, a method of accessing the remote host computer comprising:selecting an intelligent token having critical information stored thereon;communicating user authentication information between a user and the intelligen

이 특허에 인용된 특허 (15)

  1. Draeger Juergen (Tbingen DEX) Paret Guenter (Herrenberg DEX), Activating circuit for modifying or adding a new program to an electronic device.
  2. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  3. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Connection authorizer for controlling access to system resources.
  4. Beker Henry J. (Wokingham GB2) Halliden Paul W. (Salisbury GB2) Friend John M. K. (Purlieu GB2), Data communication systems and methods.
  5. Kelly Tadhg (11 Block Ct. Randolph NJ 07869), Dual key reflexive encryption security system.
  6. Jones Michael F. (Nashua NH) Zachai Arthur (Swampscott MA), Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys.
  7. Atkinson Randall (Annandale VA), Intermediate network authentication.
  8. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  9. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  10. Fisher ; Jr. Wendell Burns (Nashua NH) Sayde Richard (Littleton MA), Method and apparatus for remotely booting a computer system.
  11. Weiss Kenneth P. (Newton MA), Method and apparatus for utilizing a token for resource access.
  12. Scheidt Edward M. (McLean VA) McCullough Charles E. (Woodbridge VA) Wack C. Jay (Clarksburg MD), Personal computer access control system.
  13. Mooney David M. (Eden Prairie MN) GLazier James B. (Hopkins MN) Wood David E. (Shorewood MN) Kimlinger Joseph A. (Willernie MN) Goshgarian Paul (Mound MN), Preboot protection of unauthorized use of programs and data with a card reader interface.
  14. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  15. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.

이 특허를 인용한 특허 (176)

  1. Minemura, Atsushi, Application authentication system.
  2. Nilsen, B.o slashed.rge, Arrangement in a data communication system.
  3. Blaxland, Thomas Andrew, Asynchronous interaction at specific points in content.
  4. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  5. Bacchiaz, John David; Pajni{hacek over (c)}, Andrej; {hacek over (Z)}epi{hacek over (c)}, Toma{hacek over (z)}; Podlipec, Bo{hacek over (s)}tjan, Biometric key.
  6. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  7. Hiles Paul, Challenge/response security architecture with fuzzy recognition of long passwords.
  8. Moreau, Samuel; Ahrnes, Don; Gibbs, Georgia; Carney, John; de Andrade, David, Channel family surf control.
  9. England, Paul, Client-side boot domains and boot rules.
  10. England, Paul, Client-side boot domains and boot rules.
  11. England,Paul, Client-side boot domains and boot rules.
  12. Hiroaki Tanaka JP; Takuji Yoshida JP, Command executing method of information reproducing apparatus, record medium for recording program that causes information reproducing apparatus to execute command, and disc reproducing apparatus.
  13. Crisan Adrian, Computer system with dynamically configurable boot order.
  14. Zhang, Howard; Wang, Li Ming; Liang, Lily L.; Hu, Tawei; Perry, Edward J.; Le, Khanh M., Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy.
  15. Le, Khanh M.; Hu, Tawei; Perry, Edward J.; Zhang, Howard; Liang, Lily L., Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor.
  16. Hsiao,Hui I; Laue,Matthew; Mega,Cataldo, Content management system and methodology employing non-transferable access tokens to control data access.
  17. Tijare, Parag V.; Hsiao, Hui-I; Richardt, Randy, Content management system and methodology featuring query conversion capability for efficient searching.
  18. Liang,Lily L.; Hu,Tawei; Nelson,Kenneth C.; Choy,David M.; Le,Khanh M.; Perry,Edward J., Content management system and methodology for implementing a complex object using nested/recursive structures.
  19. Chane, Lena; Moreau, Samuel; Haber, Darrell; Marenghi, Matt, Contextual display of information with an interactive user interface for television.
  20. Chane, Lena; Moreau, Samuel; Haber, Darrell; Marenghi, Matt, Contextual display of information with an interactive user interface for television.
  21. Moreau, Samuel; Carney, John, Contextual navigational control for digital television.
  22. Moreau, Samuel; Carney, John, Contextual navigational control for digital television.
  23. Vartanian, Harry; Jurikson-Rhodes, Jaron, Controllable tactile sensations in a consumer device.
  24. England, Paul; DeTreville, John D.; Lampson, Butler W., Controlling access to content based on certificates and access predicates.
  25. Proudler,Graeme John; Balacheff,Boris; Pearson,Siani Lynne; Chan,David, Data event logging in computing platform.
  26. Proudler,Graeme John; Balacheff,Boris, Data integrity monitoring in trusted computing entity.
  27. Crume, Jeffery L., Detecting and defending against man-in-the-middle attacks.
  28. Crume, Jeffrey L., Detecting and defending against man-in-the-middle attacks.
  29. Bravo, Jose F.; Crume, Jeffery L., Detecting man-in-the-middle attacks in electronic transactions using prompts.
  30. Filee, Alain; Martin, René, Device, systems, and method for securely starting up a computer installation.
  31. Vartanian, Harry; Jurikson-Rhodes, Jaron, Electronic device with a pressure sensitive multi-touch display.
  32. Vartanian, Harry; Jurikson-Rhodes, Jaron, Electronic device with an interactive pressure sensitive multi-touch display.
  33. Vartanian, Harry; Jurikson-Rhodes, Jaron, Electronic device with an interactive pressure sensitive multi-touch display.
  34. Vartanian, Harry; Jurikson-Rhodes, Jaron, Electronic device with an interactive pressure sensitive multi-touch display.
  35. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  36. Moreau, Samuel; Haber, Darrell; Jaroneski, Kathryn; Hirsch, Christine; Gibbs, Georgia, Graphically rich, modular, promotional tile interface for interactive television.
  37. Chane, Lena D.; Marenghi, Matt; Ahmad-Taylor, Ty; Chung, Alex; Hegde, Prakash; Moreau, Samuel; Haber, Darrel, Guide menu based on a repeatedly-rotating sequence.
  38. Hansmann, Uve; Merk, Lothar; Stober, Thomas, Hardware-oriented configuration and locking of devices.
  39. Thibadeau, Robert H., Hybrid computer security clock.
  40. Thibadeau, Robert H., Hybrid computer security clock.
  41. Bhaghavan, Rupa; Hu, Tawei; Nelson, Kenneth Carlin; Richardt, Randal James, Implementing access control for queries to a content management system.
  42. Vartanian, Harry; Jurikson-Rhodes, Jaron, Individually controlling a tactile area of an image displayed on a multi-touch display.
  43. Felsher, David Paul, Information record infrastructure, system and method.
  44. Proudler, Graeme John; Balacheff, Boris, Information system.
  45. Guthery, Scott B., Integrated circuit card with identity authentication table and authorization tables defining access rights based on Boolean expressions of authenticated identities.
  46. Chane, Lena D.; Marenghi, Matt; Ahmad-Taylor, Ty; Chung, Alex; Hegde, Prakash; Moreau, Samuel; Haber, Darrel, Interactive user interface for television applications.
  47. Chane, Lena D.; Marenghi, Matt; Ahmad-Taylor, Ty; Chung, Alex; Hegde, Prakash; Moreau, Samuel; Haber, Darrel, Interactive user interface for television applications.
  48. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  49. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  50. Ramezani, Mehran, Managing security in solid-state devices.
  51. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  52. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  53. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  54. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  55. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  56. Raza, Ahmad, Method and an apparatus for developing software.
  57. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  58. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  59. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  60. Andersen David B., Method and apparatus for remote network access logging and reporting.
  61. Nadooshan Mehrdad Jamei, Method and apparatus for restricting outbound access to remote equipment.
  62. Hu,Tawei; Lin,James J.; Nelson,Kenneth C.; Yaung,Alan T.; Richardt,Randy; Liang,Lily L.; Gallagher,Ed; Richardson,Dwayne L., Method and apparatus of parameter passing of structured data for stored procedures in a content management system.
  63. Charles, Olivier; Tinnes, Julien; Leclercq, Eric, Method and device for securely configuring a terminal.
  64. Charles, Olivier; Leclercq, Eric; Maupetit, Matthieu, Method and device for securely configuring a terminal by means of a startup external data storage device.
  65. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  66. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  67. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  68. Gonzalo, Steven M., Method and system for configuring a publicly accessible computer system.
  69. Carbone,Giancarlo; Cierech,Thomas Frank, Method and system for controlling use of software programs.
  70. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  71. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  72. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  73. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  74. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  75. Bhaghavan,Rupa; Hu,Tawei; Nelson,Kenneth Carlin; Richardt,Randal James, Method for implementing access control for queries to a content management system.
  76. Grieu,Francois; Didier,St��phane, Method for indivisibly modifying a plurality of sites in a microcircuit card non volatile memory, in particular a contactless card.
  77. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  78. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  79. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  80. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  81. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  82. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  83. Tu, Van Quy; Little, Herbert Anthony; Rosati, Anthony; Campagna, Matthew John, Method of obtaining authorization for accessing a service.
  84. Bravo, Jose F.; Covalla, Thomas A., Methods and apparatus for restricting access of a user using a cellular telephone.
  85. Bravo,Jose F.; Covalla,Thomas A., Methods and apparatus for restricting access of a user using a cellular telephone.
  86. Perlman Radia J. ; Hanna Stephen R., Methods and systems for establishing a shared secret using an authentication token.
  87. Thibadeau,Robert, Methods and systems for promoting security in a computer system employing attached storage devices.
  88. Thibadeau,Robert H., Methods and systems for promoting security in a computer system employing attached storage devices.
  89. Thibadeau,Robert H., Methods and systems for promoting security in a computer system employing attached storage devices.
  90. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  91. Vartanian, Harry; Jurikson-Rhodes, Jaron, Mobile device with a pressure and indentation sensitive multi-touch display.
  92. Vartanian, Harry; Jurikson-Rhodes, Jaron, Mobile device with a pressure and indentation sensitive multi-touch display.
  93. Vartanian, Harry; Jurikson-Rhodes, Jaron, Mobile device with individually controllable tactile sensations.
  94. Bravo, Jose F.; Crume, Jeffery L., Mobile phone and IP address correlation service.
  95. Hoffberg, Steven M., Multifactorial optimization system and method.
  96. Kawamoto, Yoji; Hidaka, Isao; Tsunoda, Tomohiro, Network system including a terminal device capable of registering with a server.
  97. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  98. Proudler,Graeme John; Chan,David, Operation of trusted state in computing platform.
  99. Gallagher,Edward Joseph; Ho,Mang Rong, Parameter passing of data structures where API and corresponding stored procedure are different versions/releases.
  100. Gallagher, Edward Joseph; Ho, Mang-Rong, Parameters passing of data structures where API and corresponding stored procedure are different versions/releases.
  101. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password in a particular remote server.
  102. Smadja, Philippe; Aussel, Jean-Daniel, Personal token and a method for controlled authentication.
  103. Madjlessi, Afchine, Portable device and method for externally generalized starting up of a computer system.
  104. Rios, Jennifer E.; Ali, Valiuddin Y.; Wang, Lan, Portable device comprising a BIOS setting.
  105. Andrade, David De; Carney, John; Moreau, Samuel; Singer, Tyson; Ganapavarapu, Srikanth, Prioritized placement of content elements for iTV applications.
  106. De Andrade, David; Carney, John; Moreau, Samuel; Singer, Tyson; Ganapavarapu, Srikanth, Prioritized placement of content elements for iTV applications.
  107. Chane, Lena; Moreau, Samuel; Haber, Darrell; Marenghi, Matt, Programming contextual interactive user interface for television.
  108. Silverstone, Ariel, Protecting computing devices from unauthorized access.
  109. Kwong, Wah Yiu; Proefrock, Wayne L., Providing a user input interface prior to initiation of an operating system.
  110. Vartanian, Harry; Jurikson-Rhodes, Jaron, Providing an elevated and texturized display in a mobile electronic device.
  111. Vartanian, Harry; Jurikson-Rhodes, Jaron, Providing an elevated and texturized display in an electronic device.
  112. Vartanian, Harry; Jurikson-Rhodes, Jaron, Providing an elevated and texturized display in an electronic device.
  113. Kato, Takatoshi; Mizushima, Nagamasa; Tsunehiro, Takashi; Kayashima, Makoto; Nakagawa, Kazushi, Remote access system, gateway, client device, program, and storage medium.
  114. Kato, Takatoshi; Mizushima, Nagamasa; Tsunehiro, Takashi; Kayashima, Makoto; Nakagawa, Kazushi, Remote access system, gateway, client device, program, and storage medium.
  115. Abbondanzio,Antonio; Chu,Simon C.; Dake,Gregory William; Day, II,Michael David; Piazza,William Joseph; Pruett,Gregory Brian; Rhoades,David B., Remotely booting devices in a dense server environment without manually installing authentication parameters on the devices to be booted.
  116. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  117. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  118. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  119. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  120. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  121. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  122. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  123. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  124. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  125. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  126. Kwon, Moon-sang, Secure booting apparatus and method.
  127. Saunders Keith A.,GBX, Secure data processing method and system.
  128. England,Paul; Lampson,Butler W., Secure execution of program code.
  129. Wallace, Jr., Clyde Riley, Secure internet user state creation method and system with user supplied key and seeding.
  130. Ramezani, Mehran, Secure memory devices and methods of managing secure memory devices.
  131. Scholnick Michael ; Schlesinger John F., Security process for public networks.
  132. Sharma, Sudhanshu; Mora, James D., Synchronizing multiple transmissions of content.
  133. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  134. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  135. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  136. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  137. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  138. Moreau, Samuel; Ahrens, Donald; Gibbs, Georgia; Carney, John; de Andrade, David, System and method for blending linear content, non-linear content or managed content.
  139. Moreau, Samuel; Ahrens, Donald; Gibbs, Georgia; Carney, John; Andrade, David De, System and method for construction, delivery and display of iTV applications that blend programming information of on-demand and broadcast service offerings.
  140. Moreau, Samuel; Ahrens, Donald; Gibbs, Georgia; Carney, John; De Andrade, David, System and method for construction, delivery and display of iTV applications that blend programming information of on-demand and broadcast service offerings.
  141. Moreau, Samuel; Ahrens, Donald; Gibbs, Georgia; Carney, John; de Andrade, David, System and method for construction, delivery and display of iTV applications that blend programming information of on-demand and broadcast service offerings.
  142. Moreau, Samuel; Ahrens, Donald; Gibbs, Georgia; Carney, John; de Andrade, David, System and method for construction, delivery and display of iTV applications that blend programming information of on-demand and broadcast service offerings.
  143. Carney, John; de Andrade, David; Niranjan, Sithampara Babu; Brandyberry, David; Franzen, Leon; Chane, Lena; Marenghi, Matt; Hegde, Prakash; Chung, Alex; Chu, Viva; Thomson, Greg; Dawson, Ruth, System and method for construction, delivery and display of iTV content.
  144. Carney, John; de Andrade, David; Niranjan, Sithampara Babu; Brandyberry, David; Franzen, Leon; Chane, Lena; Marenghi, Matt; Hegde, Prakash; Chung, Alex; Chu, Viva; Thomson, Greg; Dawson, Ruth, System and method for construction, delivery and display of iTV content.
  145. Carney, John; de Andrade, David; Niranjan, Sithampara Babu; Brandyberry, David; Franzen, Leon; Chane, Lena; Marenghi, Matt; Hegde, Prakash; Chung, Alex; Chu, Viva; Thomson, Greg; Dawson, Ruth, System and method for construction, delivery and display of iTV content.
  146. Carney, John; deAndrade, David, System and method for controlling iTV application behaviors through the use of application profile filters.
  147. Hoffberg, Steven M., System and method for determining contingent relevance.
  148. Baumert, David W.; Goldthwaite, Flora P.; Hendrickson, Gregory L.; Cluts, Jonathan C.; Heath, Pamela J., System and method for distributing digital content over a network.
  149. Hahn,Timothy James, System and method for granting access to resources.
  150. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  151. de Andrade, David; Carney, John; Moreau, Samuel; Singer, Tyson; Ganapavarapu, Srikanth, System and method for preferred placement programming of iTV content.
  152. de Andrade, David; Carney, John; Moreau, Samuel; Singer, Tyson; Ganapavarapu, Srikanth, System and method for preferred placement programming of iTV content.
  153. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  154. Dirie Herzi ; Jim Dailey, System and method for providing bios-level user configuration of a computer system.
  155. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  156. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  157. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  158. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  159. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  160. Warner, Shannon L.; Black, Marc R.; Mellas, Lisa; Mazour, James L.; Viswanathan, Rajkumar; Salters, Michael D.; Berg, Glenda L.; Bailey, Ann Elizabeth; Greeder, Michael T., Systems and methods for providing a user incentive program using circuit chip technology.
  161. Warner, Shannon L; Black, Marc R; Mellas, Lisa; Mazour, James L; Viswanathan, Rajkumar; Salters, Michael D; Berg, Glenda L; Bailey, Ann Elizabeth; Greeder, Michael T, Systems and methods for providing a user incentive program using smart card technology.
  162. Maj, Artur; Sztenke, Maciej, Systems and methods of user authentication.
  163. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  164. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  165. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  166. Brown,Richard; Pearson,Siani Lynne; Dalton,Christopher I., Trusted computing environment.
  167. Bainbridge Andrew John,GBX ; Cocks Stephen James,GBX ; Ferguson Donald Francis ; Freund Thomas,GBX ; Leff Avraham ; Normington Glyn,GBX ; Rayfield James Thomas ; Storey Robert Anthony,GBX, Updating server-related data at a client.
  168. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
  169. Carney, John; DeAndrade, David, Validating data of an interactive content application.
  170. Adams, Glenn, Validation of content.
  171. Adams, Glenn, Verification of semantic constraints in multimedia data and in its announcement, signaling and interchange.
  172. Bravo, Jose F.; Crume, Jeffery L., Verification of transactional integrity.
  173. Thibadeau, Robert H., Versatile access control system.
  174. Thibadeau, Robert H., Versatile secure and non-secure messaging.
  175. Wang, Andy I-Shin; Choy, David M.; Liang, Lily L.; Lin, James J., Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology.
  176. Bravo, Jose; Crume, Jeffrey L., Website authentication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로