$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for data recovery 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0062748 (1998-04-20)
발명자 / 주소
  • Lipner Steven B.
  • Balenson David M.
  • Ellison Carl M.
  • Walker Stephen T.
출원인 / 주소
  • Network Associates, Inc.
인용정보 피인용 횟수 : 123  인용 특허 : 44

초록

A system and method for data escrow cryptography are described. An encrypting user encrypts a message using a secret storage key (KS) and attaches a data recovery field (DRF), including an access rule index (ARI) and KS, to the encrypted message. The DRF and the encrypted message are stored in a sto

대표청구항

[ What is claimed is:] [1.] A system for controlling access by an emergency decrypting system to a user secret, the system comprising:first means for retrieving at least part of a user secret;second means for retrieving at least one access rule index, said at least one access rule index identifying

이 특허에 인용된 특허 (44)

  1. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  2. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Card-computer moderated systems.
  3. Ford Warwick S. (Nepean CAX) Wiener Michael J. (Nepean CAX), Computer network cryptographic key distribution system.
  4. Duxbury Paul (Sandbach GB2), Computer system security.
  5. Golding Victor G. (Ower. Romsey GBX) Speirs Gregor H. (Winchester GBX), Computer system security device.
  6. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  7. Takaragi Kazuo (Ebina JPX) Ishii Yasuhiro (Hadano JPX) Nakamura Tsutomu (Musashino JPX), Cryptographic communication method and system.
  8. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  9. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Cryptographic facility environment backup/restore and replication in a public key cryptosystem.
  10. Barney George M. (Scottsdale AZ) Hardy Douglas A. (Mesa AZ) Balogh Craig R. (Mesa AZ), Cryptographic key management apparatus and method.
  11. Smid Miles E. (Silver Spring MD) Branstad Dennis K. (Gaithersburg MD), Crytographic key notarization methods and apparatus.
  12. Micali Silvio (224 Upland Rd. Cambridge MA 02140), Fair cryptosystems and methods of use.
  13. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  14. Hirata Kozo (Yokohama JPX), File security system.
  15. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  16. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  17. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  18. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  19. Rose David K. (800 E. Ocean Blvd. Apt. #1410 Long Beach CA 90802), Method and apparatus for validating authorization to access information in an information processing system.
  20. Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
  21. Barakat Simon (Andresy FRX), Method and system for suthenticating electronic memory cards.
  22. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  23. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets.
  24. Puhl Larry C. (Sleepy Hollow IL) Finkelstein Louis D. (Wheeling IL) Dabbish Ezzat A. (Cary IL), Method for providing blind access to an encryption key.
  25. Jansen Cornelis J. A. (Eindhoven NLX) van de Pas Andries J. M. (Eindhoven NLX) van der Vlist Pieter (Nootdorp NLX) Hafkamp Frederik (The Hague NLX), Method of distributing and utilizing enciphering keys.
  26. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Optionally moderated transaction systems.
  27. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  28. Matyas Stephen M. (Manassas) Johnson Donald B. (Manassas) Le An V. (Manassas) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. (Somervil, Public key cryptosystem key management based on control vectors.
  29. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  30. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  31. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  32. Carter Steven H. (Great Missenden GB3) Lockyer Terence D. (Luton GB3) Gahan Christopher J. (Kings Langley GB3), Repeaters for secure local area networks.
  33. Lipner Steven B. (Wellesley MA) Gasser Morrie (Saugus MA) Lampson Butler W. (Cambridge MA), Secure user authentication from personal computer.
  34. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  35. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
  36. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  37. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  38. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  39. Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
  40. Kaufman Charles W. (185 Indian Meadow Dr. Northborough MA 01532) Pearlman Radia J. (10 Huckleberry La. Acton MA 01720) Gasser Morrie (28 S. Mill St. Hopkinton MA 01748), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  41. Michener John R. (Princeton NJ) Samit Benjamin (Princeton NJ), System method and apparatus for authenticating an encrypted signal.
  42. Beller Michael J. (Red Bank NJ) Yacobi Yacov (Berkeley Heights NJ), Two-way public key authentication and key agreement for low-cost terminals.
  43. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Undeniable signature systems.
  44. Koenig Andrew R. (Elizabeth NJ), User authentication system employing encryption functions.

이 특허를 인용한 특허 (123)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  3. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  4. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  5. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  6. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  7. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  8. Churchill,Thomas; Connelly,John Patrick; Boyd,Eric; Panchapakesan,Venkat; Godin,Seth; Sohn,Henry Hyunsuk; Conway,David, Auction redemption system and method.
  9. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  10. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  11. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  12. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Cluster key synchronization.
  13. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  14. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  15. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  16. Groenjes, Jason H., Controlling a crowd of multiple mobile station devices.
  17. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  18. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  19. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  20. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  21. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  22. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  23. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  24. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  25. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  26. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  27. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  28. Hori, Yoshihiro; Hioki, Toshiaki; Kanamori, Miwa; Yoshikawa, Takatoshi; Takemura, Hiroshi; Hasebe, Takayuki; Hatakeyama, Takahisa; Tonegawa, Tadaaki; Anazawa, Takeaki, Device for reproducing data.
  29. Sussland, Robert J.; Silberman, Joshua Oran; Subramanian, Ananthan; Chang, Lawrence Wen-Hao, Distributed management of crypto module white lists.
  30. Kunitz, Hardy; Mettken, Werner, Encryption of data to be stored in an information processing system.
  31. Scheidt,Edward M., Encryption process including a biometric unit.
  32. Brunswig, Frank; Tiple, Abhay, Enterprise verification and certification framework.
  33. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  34. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  35. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  36. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  37. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  38. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  39. Gandhasri, Rajamohan, Host based rekeying.
  40. Felsher, David Paul, Information record infrastructure, system and method.
  41. Otway Josanne,CAX, Information security subscriber trust authority transfer system with private key history transfer.
  42. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  43. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  44. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  45. Nord, Joseph H.; Hoy, David Randal, Method and a system for responding locally to requests for file metadata associated with files stored remotely.
  46. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  47. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  48. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  49. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  50. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
  51. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  52. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  53. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  54. Challener David Carroll ; Desai Dhruv Manmohandas ; Rohatgi Pankaj ; Safford David Robert, Method and apparatus for securing communication utilizing a security processor.
  55. Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
  56. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  57. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  58. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  59. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  60. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  61. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  62. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  63. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  64. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  65. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method and system for locating and accessing resources.
  66. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  67. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  68. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  69. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  70. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  71. Challener, David Carroll; Ovies, Hernando, Method for migrating a base chip key from one computer system to another.
  72. Schell, Stephan V., Methods and apparatus for access data recovery from a malfunctioning device.
  73. Schell, Stephan V., Methods and apparatus for access data recovery from a malfunctioning device.
  74. Muir, Jeff; Stergiades, Andrew, Methods and apparatus for making a hypermedium interactive.
  75. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  76. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  77. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  78. Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
  79. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  80. Chinta, Madhav; Raj, Sam Arun, Methods and systems for launching applications into existing isolation environments.
  81. Chinta, Madhav; Raj, SamArun, Methods and systems for launching applications into existing isolation environments.
  82. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  83. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  84. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  85. Rivera, Juan; Corbett, Tim; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  86. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  87. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  88. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  89. Gutierrez-Sheris, Luis Eduardo, Money-transfer techniques.
  90. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  91. Hoffberg, Steven M., Multifactorial optimization system and method.
  92. Boyd,Eric; Bejar,Arturo; Pal,Anil; Roman,David, Offline-online incentive points system and method.
  93. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  94. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  95. Man,Kwai Hing; Kozina,Gerald Edward; Wang,Shirley S., Password security utility.
  96. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Peer to peer key synchronization.
  97. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  98. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  99. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  100. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  101. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  102. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  103. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  104. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  105. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  106. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  107. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  108. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  109. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  110. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  111. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  112. Libenzi, Davide; Kouznetsov, Victor, Secure signature server system and associated method.
  113. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  114. Hoffberg, Steven M., System and method for determining contingent relevance.
  115. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  116. Subramanian, Ananthan; Chang, Lawrence Wen-Hao, System and method for initial key establishment using a split knowledge protocol.
  117. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  118. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  119. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  120. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  121. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  122. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  123. Doyle,Ronald P., Using biometrics on pervasive devices for mobile identification.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로