$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Controlling access to information 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
  • H04L-009/00
출원번호 US-0925212 (1997-09-08)
발명자 / 주소
  • McDonough John C.
  • Saravanan Thiagarajan
  • Amatucci Michael P.
  • Iannucci Louis A.
  • Ingham David M.
출원인 / 주소
  • FMR Corp.
대리인 / 주소
    Fish & Richardson P.C.
인용정보 피인용 횟수 : 111  인용 특허 : 6

초록

Methods are provided for controlling access to information in a distributed computing system. A request for the information is received and is accompanied by encrypted session state data. Based on the encrypted session state data, it is determined whether to pass the request on to a source of the in

대표청구항

[ What is claimed is:] [1.] A method of controlling access to information in a distributed computing system, the method comprising:receiving a request for the information, the request accompanied by encrypted session state data, the encrypted session state data being valid for a limited duration; an

이 특허에 인용된 특허 (6)

  1. Maloney William B. (Nichols NY) Mesnard Robert M. (Vestal NY) Swenton Joseph M. (Owego NY), Analysis of untestable faults using discrete node sets.
  2. Shi Shaw-Ben ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shrader Theodore Jack London, Distributed file system web server user authentication with cookies.
  3. Kung Ching Y. (Fort Lauderdale FL), Expert system for communications network.
  4. Calvert Nathaniel (Rochester MN) Eakins John J. (Rochester MN) Emerick Earl W. (Rochester MN) Johnston David L. (Rochester MN) Koehler John L. (Rochester MN) Miller Gerald P. (Rochester MN) Morcomb J, On-line problem management of remote data processing systems, using local problem determination procedures and a central.
  5. Caccavale Frank Samuel (Holliston MA), Phase-space surface representation of server computer performance in a computer network.
  6. Birrell Andrew D. ; Wobber Edward P. ; Abadi Martin ; Stata Raymond P., Secure web tunnel.

이 특허를 인용한 특허 (111)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. de Jong,Eduard K., Accessing in a rights locker system for digital content access control.
  3. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  4. Durham Peter Emmanuel, Apparatus and method for optimizing client-state data storage.
  5. Asano, Tomoyuki; Ishibashi, Yoshihito; Shirai, Taizo; Akishita, Toru; Yoshimori, Masaharu; Tanaka, Makoto, Authentication and encryption utilizing command identifiers.
  6. Asano, Tomoyuki; Ishibashi, Yoshihito; Shirai, Taizo; Akishita, Toru; Yoshimori, Masaharu; Tanaka, Makoto, Authentication and encryption utilizing command identifiers.
  7. Manthiram, Arumugam; Choi, Wonchang, Cation-substituted spinel oxide and oxyfluoride cathodes for lithium ion batteries.
  8. Manthiram, Arumugam; Choi, Wonchang, Cation-substituted spinel oxide and oxyfluoride cathodes for lithium ion batteries.
  9. Dodrill, Lewis Dean; Danner, Ryan Alan; Willaford, IV, William Bateford, Customer care control over voice application state.
  10. Sasson Gideon, Customer web log-in architecture.
  11. Davis, Tristan A.; Sawicki, Marcin; Jones, Brian M.; Little, Robert A.; Sunderland, Mark, Data binding in a word-processing application.
  12. Hill, Charles E., Data file management system and method for browsers.
  13. Hill,Charles E., Data file management system and method for browsers.
  14. Davis, Tristan A.; Taleghani, Ali; Sawicki, Marcin; Little, Robert A.; Jones, Brian M., Data store for software application documents.
  15. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Declarative permission requests in a computer system.
  16. Serena, Frank David, Device, method, and network system for replacing content.
  17. Pieper,Tobid; Martinelli,Paul; Thompson,Brad; Brentano,James; Loyd,Steven, Digital object delivery and management system with dynamically created temporary FTP access codes.
  18. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  19. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Directional set operations for permission based security in a computer system.
  20. Tock,Theron; Srinivas,Sampath; Sang,Yvonne Pui Fung, Dual authentication of a requestor using a mail server and an authentication server.
  21. Srinivas, Sampath; Tock, Theron, Dynamic toolbar for markup language document.
  22. Srinivas, Sampath; Tock, Theron, Dynamic toolbar for markup language document.
  23. Srinivas,Sampath; Tock,Theron, Dynamic toolbar for markup language document.
  24. Kapadia, Arshish; Zeller, Mark, Efficient paging of search query results.
  25. Kapadia, Arshish; Zeller, Mark, Efficient paging of search query results.
  26. Kapadia,Arshish Cyrus; Zellner,Mark, Efficient paging of search query results.
  27. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  28. de Jong, Eduard K., Embedded content requests in a rights locker system for digital content access control.
  29. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  30. Kortum, Philip; Sullivan, Marc A., Firewall switching system for communication system applications.
  31. Mortsolf Timothy G. ; Peirce ; Jr. Kenneth L. ; Harper Matthew ; Stoner Thomas M., Gatekeeper election methods for internet telephony.
  32. Felsher, David Paul, Information record infrastructure, system and method.
  33. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  34. Jindal Anita ; Lim Swee Boon ; Radia Sanjay ; Chang Whei-Ling, Load balancing in a network environment.
  35. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  36. Hatakeda, Darrin Nobuharu, Management and security of personal information.
  37. Bowman, Mark T.; Hauck, Leslie P.; Monahan, Christopher J.; Monahan, Mary L.; Moore, Victor S.; Morea, Keith; Ratliff, Emily J., Method and apparatus for E-commerce by using optional fields for virtual bar codes.
  38. Thomas,C. Douglass, Method and apparatus for customization of information content provided to a requestor over a network using anonymous demographic data stored on a demographic server.
  39. Dutta,Rabindranath, Method and apparatus for identifying universal resource locator rewriting in a distributed data processing system.
  40. Lerner, Jack Lawrence, Method and apparatus for integrating distributed shared services system.
  41. Davis,Mikey Andrew; Kerlick,Shannon James; Land, Jr.,Jack E.; Mandelstein,Dan Jeffrey, Method and apparatus for partitioned environment for web application servers.
  42. Corbin,George E.; Kardash,Joseph A., Method and apparatus for providing local data persistence for web applications.
  43. Jones, Brian M.; Sunderland, E. Mark; Sawicki, Marcin; Little, Robert A.; Davis, Tristan A., Method and apparatus for utilizing an extensible markup language schema for managing specific types of content in an electronic document.
  44. Jones, Brian M.; Sunderland, E. Mark; Sawicki, Marcin; Little, Robert A.; Davis, Tristan A., Method and apparatus for utilizing an object model for managing content regions in an electronic document.
  45. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for determining receipt of a delayed cookie in a client-server architecture.
  46. Tock, Theron; Srinivas, Sampath, Method and system for modifying requests for remote resources.
  47. Tock,Theron; Srinivas,Sampath, Method and system for modifying requests for remote resources.
  48. Tock, Theron; Srinivas, Sampath, Method and system for modifying script portions of requests for remote resources.
  49. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  50. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  51. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  52. Tock, Theron; Srinivas, Sampath, Method and system for providing secure access to private networks.
  53. Tock, Theron; Srinivas, Sampath, Method and system for providing secure access to private networks.
  54. Tock, Theron; Srinivas, Sampath, Method and system for providing secure access to private networks.
  55. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  56. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  57. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  58. Thomas, Christopher; Tock, Theron; Ramachandran, Sriram, Method and system for providing secure access to private networks with client redirection.
  59. Richard R. Masters, Method and system for storing load balancing information with an HTTP cookie.
  60. Linsk Steven J., Method for providing customized Web information based on attributes of the requester.
  61. Serena, Frank David, Method of replacing content.
  62. Hoffberg, Steven M., Multifactorial optimization system and method.
  63. Michael J. Wallent ; Rajeev Dujari ; Anand Ramakrishna ; Loren M. Kohnfelder ; Lewis Geer, Network security zones.
  64. Serena, Frank David, Observation device, method, and computer program product for replacing content.
  65. Davis, Tristan A.; Taleghani, Ali; Jones, Brian M.; Sawicki, Marcin; Little, Robert A.; Ali, Alnur, Programmability for XML data store for documents.
  66. Drakeley, Erin E.; Amatucci, Mike; Iannucci, Lou; McLure, David; McDonough, John, Providing one party access to an account of another party.
  67. Ferreira, Jorge M.; Virmani, Mandira, Removing personal information when a save option is and is not available.
  68. de Jong, Eduard; Cooley, Aaron; Bostrom, Jon, Repositing for digital content access control.
  69. Sweet, Richard Eric; Rowe, Edward Royce Warren, Retrieving documents transitively linked to an initial document.
  70. de Jong,Eduard K., Rights locker for digital content access control.
  71. Jones, Brian M.; Sawicki, Marcin; Little, Robert A.; Davis, Tristan A., Specific type content manager in an electronic document.
  72. Otway,David; Bull,John, Strong mutual authentication of devices.
  73. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, Synchronizing for digital content access control.
  74. Hoffberg, Steven M., System and method for determining contingent relevance.
  75. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  76. Schran, Adam R.; Darlington, Robert E., System and method for network administration and local administration of privacy protection criteria.
  77. Schran, Adam R.; Darlington, Robert E., System and method for network administration and local administration of privacy protection criteria.
  78. Schran, Adam R.; Darlington, Robert E., System and method for network administration and local administration of privacy protection criteria.
  79. Masters, Richard R., System and method for performing application level persistence.
  80. Masters, Richard R., System and method for performing application level persistence.
  81. Masters, Richard Roderick, System and method for performing application level persistence.
  82. Masters, Richard Roderick, System and method for performing application level persistence.
  83. Masters,Richard R., System and method for performing application level persistence.
  84. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  85. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  86. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  87. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  88. Mohr, Alexander; Petersen, Scott E.; Rowe, Edward R., System and method for restricting data access.
  89. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  90. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  91. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  92. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  93. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  94. Kramer,Andre; Harwood,Will, System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel.
  95. Steven J. Linsk, System and server for providing customized web information based on attributes of the requestor.
  96. de Jong,Eduard; Cooley,Aaron; Bostrom,Jon, System for digital content access control.
  97. Schran, Adam R.; Darlington, Robert E., System for network administration and local administration of privacy protection criteria.
  98. Narayana, Raghav Somanahalli; Suganthi, Josephine; Raja, Murali; Kondamuru, Ravi, Systems and methods for GSLB site persistence.
  99. Havemose, Allan, Universal registration system.
  100. Benson, Eric A., Use of browser cookies to store structured data.
  101. Benson, Eric A., Use of browser cookies to store structured data.
  102. Levy, Philip; Hada, Naoki, Using document templates to assemble a collection of documents.
  103. Levy, Philip; Hada, Naoki, Using document templates to assemble a collection of documents.
  104. Ahmad, Subutai; Cohen, Jonathan, Web based video enhancement apparatus method and article of manufacture.
  105. Ahmad, Subutai; Cohen, Jonathan, Web based video enhancement apparatus, method, and article of manufacture.
  106. Ahmad, Subutai; Cohen, Jonathan, Web based video enhancement apparatus, method, and article of manufacture.
  107. Ahmad, Subutai; Cohen, Jonathan, Web based video enhancement apparatus, method, and article of manufacture.
  108. Tock, Theron; Srinivas, Sampath; Sang, Yvonne Pui Fung, Web resource request processing.
  109. Davis, Tristan A.; Jones, Brian M.; Taleghani, Ali; Little, Robert A.; Sawicki, Marcin; Sunderland, Mark, XML schema for binding data.
  110. Hoggan, Stuart A.; Durbha, Seetharama R., Zero sign-on authentication.
  111. Hoggan, Stuart A.; Durbha, Seetharama R., Zero sign-on authentication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로