$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] System for securing a computer 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • H04L-027/10
출원번호 US-0691025 (1996-08-07)
발명자 / 주소
  • Halstead William D.
대리인 / 주소
    Waddey & PattersonLanquist, Jr.
인용정보 피인용 횟수 : 39  인용 특허 : 20

초록

The present invention discloses a system and method for securing a computer. This system detects an event such as said number of key strokes or a mouse click. This systems reads for the presence or absence of an unprompted password prior to detecting the event. If the proper password is provided, th

대표청구항

[ What I claim is:] [1.] A method of securing a computer comprising:a. detecting an event;b. reading a presence or an absence of a password prior to detecting said event; andc. notifying a monitoring computer after reading the absence of said password.

이 특허에 인용된 특허 (20) 인용/피인용 타임라인 분석

  1. Vaughan James C. (Palo Alto CA), Computer key and computer lock system.
  2. Glenn James T. (3707 Meadow Spring Sugarland TX 77479), Computer security apparatus and method.
  3. Levine Paul J. (Woodbridge VA), Computer security system for a time shared computer accessed over telephone lines.
  4. Schlesinger Artie (825 E. 9th St. Brooklyn NY 11230), Computer security system having remote location recognition and remote location lock-out.
  5. Shigematsu Mari (Hitachi JPX) Nakahashi Teruyasu (Hitachi JPX) Sato Hideki (Katsuta JPX) Sannomiya Keiichi (Hitachi JPX) Kobayashi Kouji (Hitachiota JPX) Nakao Kazuma (Ibaraki JPX) Fujimoto Hajime (H, Computer system and monitoring method.
  6. Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
  7. Junya Tempaku (Tokyo JPX), Data storage device with enhanced data security.
  8. Record Stephen E. (Ridgefield CT) Shepherd Ann M. (Endwell NY) Shultz Steven S. (Endicott NY), Dynamically established event monitors in event management services of a computer system.
  9. Lewis Gainer R. (7018 Pacific View Dr. Hollywood CA 90068), Electronic security system for externally powered devices.
  10. Parzych James D. (Houston TX) Tomaszewski Richard (Houston TX) Brown Norman P. (Tomball TX) Anderson Roger P. (Tomball TX) Douglas David M. (Houston TX) Stufflebeam Kenneth W. (Spring TX), Hard disk password security system.
  11. Moseley Donald R. (Optimum Elecrtronics ; Inc. ; 425 Washington Ave. North Haven CT 06473) Drew ; Jr. Robert D. (Optimum Elecrtronics ; Inc. ; 425 Washington Ave. North Haven CT 06473), Identity verification method and apparatus.
  12. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  13. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Method and apparatus of determining location of an unauthorized communication unit.
  14. Glaschick Rainer (Paderborn DEX), Method for authenticating the user of a data station connected to a computer system.
  15. Yamaki Masayo (Tokyo JPX), Password processing system for computer.
  16. Watters Jeffrey S. (Houston TX) Brown Norman P. (Houston TX) Nuckols James H. (Houston TX), Power-on password functions for computer system.
  17. Green Ian M. (Buckie GB6), Program storage hardware with security scheme.
  18. Bensimon Daniel (Boca Raton FL) Osborn Neal A. (Delray Beach FL) Pacheco Joaquin F. (Boca Raton FL), Removable computer security device.
  19. Bain Walter F. (Lovettsville VA), Signaling system.
  20. Loeb Warner (Port Jefferson NY), Tone code identification system.

이 특허를 인용한 특허 (39) 인용/피인용 타임라인 분석

  1. Stading, Tyron Jerrod, Alert passwords for detecting password attacks on systems.
  2. Campbell, Kurt; Boone, Mike; Medley, Mark; Slovacek, Karel, Apparatus, logic and method for emulating the lighting effect of a candle.
  3. Hertz,Allen David; Frankel,Fred; Frankel,Henrietta, Business model for recovery of missing goods, persons, of fugitives or disbursements of unclaimed goods using the internet.
  4. Sasaki, Ken; Shimizu, Yasuhito; Mori, Hidetoshi, Computer controlling method, information apparatus, computer, and storage medium.
  5. Hafeman, Carolyn W., Computer recovery or return.
  6. Hafeman, Carolyn W., Computer recovery or return.
  7. Hafeman, Carolyn W., Computer recovery or return.
  8. Hafeman, Carolyn W., Computer recovery or return.
  9. Casazza Jeffrey P., Connecting devices to in-car personal computers.
  10. Hayward, Ken; Krolczyk, Marc J.; Marchionda, Dawn M., Context sensitive web-based user support.
  11. Droz, Patrick; Haas, Robert, Discovering stolen or lost network-attachable computer systems.
  12. Duffus, James S.; Steeb, Curt Andrew; Phillips, Thomas G.; Herold, Jeffrey Alan; Poole, William; Westerinen, William J.; Hall, Martin H., Hardware-based computer theft deterrence.
  13. Elledge, Dennis D., Method and system for identifying lost or stolen devices.
  14. Elledge,Dennis D., Method and system for identifying lost or stolen devices.
  15. Elledge, Dennis D., Method and system for identifying missing items.
  16. Elledge, Dennis D., Method and system for identifying missing items.
  17. Gardner, Philip B.; Volodarets, Victor, Method for determining identification of an electronic device.
  18. Fleming ; III Hoyt A., Method for locating a stolen electronic device using electronic mail.
  19. Hayward,Ken; Krolczyk,Marc J.; Marchionda,Dawn M., Method for supply ordering.
  20. Challener,David C.; Kump,Garry M.; Noel, Jr.,Francis E.; Safford,David R.; Schales,Douglas L.; Van Doorn,Leendert P., Methods apparatus and program products for wireless access points.
  21. Cooper, Gerald M., Modems that block data transfers during safe mode of operation and related methods.
  22. Kelley,Edward Emile; McAuliffe,Wayne Anthony, Password protection.
  23. Kohno, Tadayoshi; Krishnamurthy, Arvind; Maganis, Gabriel; Ristenpart, Thomas, Privacy-preserving location tracking for devices.
  24. Wang Cheng-Chih,TWX, Security control for computer power supply subsystem.
  25. Wang Cheng-Chih,TWX, Security control for computer power supply system.
  26. Kanzawa, Hiroshi; Hata, Kazuhiro, Security system for transmission device.
  27. Hayward, Ken; Krolczyk, Marc J.; Marchlonda, Dawn M., Supply ordering apparatus.
  28. Hayward,Ken; Krolczyk,Marc J.; Marchionda,Dawn M., Supply ordering apparatus.
  29. Thomas, Oran M.; Gorman, Robert F.; Beal, Steven K.; Wilson, Steve, System and method for monitoring user interaction with web pages.
  30. Mendez, Daniel J.; NG, Mason, System and method for preventing access to data on a compromised remote device.
  31. Mendez, Daniel J.; Ng, Mason, System and method for preventing access to data on a compromised remote device.
  32. Mendez, Daniel J.; Ng, Mason, System and method for preventing access to data on a compromised remote device.
  33. Mendez, Daniel J.; Ng, Mason, System and method for preventing access to data on a compromised remote device.
  34. Muratov, Alexander, System and method of data security in synchronizing data with a wireless device.
  35. Elledge, Dennis D., Systems and methods for identifying lost or stolen devices.
  36. Elledge, Dennis D, Systems and methods for identifying missing items.
  37. Odom,Gary, User selection of computer login.
  38. Odom, Gary, User-selectable signatures.
  39. Odom, Gary, User-selectable signatures.

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 특허

해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로