$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for securely archiving core data secrets 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • H04K-009/00
출원번호 US-0996634 (1997-12-23)
발명자 / 주소
  • Thomlinson Matthew W.
  • Field Scott
  • Cooper Allan
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee & Hayes, PLLC
인용정보 피인용 횟수 : 194  인용 특허 : 11

초록

The invention provides central storage for core data secrets, referred to as data items. The data items are encrypted by a client computer using a client key that is derived from a logon secret, such as a password, supplied by a user during a network logon procedure. The client key is escrowed with

대표청구항

[ We claim:] [1.] A method of securely storing and recovering data protection keys, comprising the following steps:deriving a client key from a user secret that is supplied by a user during network logon procedures;securing user data on a client computer with the client key;sending the client key to

이 특허에 인용된 특허 (11)

  1. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Warminster GB2) Proudler Graeme J. (Stoke Gifford GB2), Data authentication and protection system.
  2. Sasaki Minoru,JPX ; Yoshikawa Hiroharu,JPX, Enciphering/deciphering device and method, and encryption/decryption communication system.
  3. Eller Marlin J. ; Mills Brent R., Encryption system with transaction coded decryption key.
  4. Harrison Colin George, Enhanced data privacy for portable computers.
  5. Choudhury Abhijit K. (Scotch Plains NJ) Maxemchuk Nicholas F. (Mountainside NJ) Paul Sanjoy (Scotch Plains NJ) Schulzrinne Henning G. (Sterling NJ), Method of protecting electronically published materials using cryptographic protocols.
  6. Marino ; Jr. Joseph T. (Fountain Hills AZ) Borgoyne ; Jr. Ernest W. (Mesa AZ), Operational methods for a secure node in a computer network.
  7. Scheidt Edward M. (McLean VA) McCullough Charles E. (Woodbridge VA) Wack C. Jay (Clarksburg MD), Personal computer access control system.
  8. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  9. Angelo Michael F. ; Olarig Sompong P., Secure two-piece user authentication in a computer network.
  10. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  11. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Storage medium for preventing an illegal use by a third party.

이 특허를 인용한 특허 (194)

  1. Okuyama, Gen; Miyamoto, Yoshinori; Murakami, Takuya, Access control system, communication terminal, server, and access control method.
  2. Baessler, Michael; Hoffmann, Philipp; Lorch, Markus; Maletz, Juergen; Pittner, Daniel; Seider, Dirk, Accessing protected content for archiving.
  3. Brettle, Dean; Zadik, Yair, Approach for managing access to messages using encryption key management policies.
  4. Brettle, Dean; Zadik, Yair, Approach for managing access to messages using encryption key management policies.
  5. Brettle,Dean; Zadik,Yair, Approach for managing access to messages using encryption key management policies.
  6. Wissenbach,Jens, Automated security tool for storage system.
  7. Ritz,Andrew J.; Cross,David B.; Bryce,Duncan; Schwartz, Jr.,James A.; Gu,Jianrong; Field,Scott A., BIOS integrated encryption.
  8. Heithcock, Jeffery Gordon; Barry, II, David William; Jones, Dennis Bishop, Client initiated restore.
  9. Maron, Guillaume, Cloud-based data backup and sync with secure local storage of access keys.
  10. Weber,Gregory; Grant,Laurence, Command authorization via RADIUS.
  11. Fang, Ko-Cheng, Computer data protecting method.
  12. Obara, Kiyohiro; Takamatsu, Hisashi; Nozawa, Masafumi; Oeda, Takashi; Morishita, Noboru, Computing system and data decryption method and computer system with remote copy facility.
  13. Magne, John, Configurable smartcard.
  14. Ruf,Erik S., Constant return optimization transforming indirect calls to data fetches.
  15. Rubidge, Jeffrey; Townsend, Stuart, Data distribution system and method.
  16. Umebayashi,Yuu; Den,Etsu; Yamanaka,Yusuke; Sasaki,Takaoki, Data protection program and data protection method.
  17. Margolus, Norman H.; Floyd, Jered J., Data repository and method for promoting network storage of data.
  18. Rollins, Doug L., Data security for digital data storage.
  19. Rollins, Doug L., Data security for digital data storage.
  20. Cooley, Shaun; Powell, Brian; Chillappa, Srinivas; Lo, Michael W.; Kamsala, Mahesh, Device-based PIN authentication process to protect encrypted data.
  21. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Digital content protection method and apparatus.
  22. Chien, Yawen; Desai, Asit; Zulch, Richard, Disk backup set access.
  23. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  24. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  25. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  26. Martinez,Anthony Edward; Rahn,Michael D., Electronic password wallet.
  27. Näslund, Mats; Melo De Brito Carvalho, Tereza Cristina; Iwaya, Leonardo Horn; Simplicio Junior, Marcos Antonio, Encrypting and storing data.
  28. Whytock,Alexander W., Encrypting keypad module.
  29. Rush, Gary W.; Kiefus, Herman J.; Clapp, Christopher; Follett, Helen; Griffith, David, End-to-end transaction processing and statusing system and method.
  30. Ballinger, Keith W.; Ge, HongMei; Wilson, Hervey O.; Mukherjee, Vick B., Establishment of security context.
  31. Eversole, Adam Clyde; Ross, Benjamin Eric, Extensible file format.
  32. Hoornaert, Frank; Houthooft, Mario, Field programmable smart card terminal and token device.
  33. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  34. Kwan, Nang Kon; Magne, John, Guided enrollment and login for token users.
  35. Hallin, Philip J.; Vogel, Keith R.; Debique, Kirt, Hierarchical storage systems for holding evidentiary objects and methods of creating and operating upon hierarchical storage systems.
  36. Rossmann, Alain, Hybrid systems for securing digital assets.
  37. Ishiguro,Ryuji; Osawa,Yoshitomo; Oishi,Tateo; Asano,Tomoyuki; Mitsuzawa,Atsushi, Information processing system and method for distributing encrypted message data.
  38. Felsher, David Paul, Information record infrastructure, system and method.
  39. Otway Josanne,CAX, Information security subscriber trust authority transfer system with private key history transfer.
  40. Chang, Shannon Hsinhen; Ngo, Khanh Vi, Maintaining keys removed from a keystore in an inactive key repository.
  41. Mosgrove,Isaac J.; Briskey,Teri Lynn챕; Bellamy,Dirk L.; Beebe,Sean; Westfall,Scott D.; Sinn,Dean; Chapin,Ron; Kuenzi,Adam; Luebeck,Jon Marc; Condon,David, Managing access to physical assets.
  42. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  43. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  44. Kristen Marie Robins ; Ronnie B. Kon, Method and apparatus for configuration in multi processing engine computer systems.
  45. Mann, Joseph F.; Deng, Mingqi; Roden, Thomas Anthony, Method and apparatus for identifying a data communications session.
  46. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  47. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for managing access to storage devices in a storage system with access control.
  48. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Method and apparatus for preventing piracy of digital content.
  49. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  50. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  51. Okaue,Takumi, Method and apparatus for recording/playing back information.
  52. Epstein, Michael A.; Pasieka, Michael S., Method and apparatus for secure distribution of public/private key pairs.
  53. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  54. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  55. Monsen,Robert Charles; Mamillapalli,Sudhakar; Liu,Xiaoyi, Method and apparatus for securing information access.
  56. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  57. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  58. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  59. Ernst, Matthias; Specht, Jens, Method and device for transmitting decryption codes of freely transmitted, encrypted program contents to clearly identifiable receivers.
  60. Hyppönen, Ari, Method and system for backing up encryption key generated on computer device and accessing encrypted information stored on computer device.
  61. Charbonneau, Marc, Method and system for detecting a secure state of a computer system.
  62. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  63. Rowland,Craig; Burgess,Christopher L.; Achtelstetter,Dieter; Sandford,Adam; Balakrishnan,Shobana, Method and system for extensible data gathering.
  64. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  65. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  66. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  67. Parkinson, Steven William; Kwan, Nang Kon, Method and system for issuing a kill sequence for a token.
  68. Vainstein, Klimenty, Method and system for managing security tiers.
  69. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  70. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  71. Nath, Satyajit, Method and system for providing document retention using cryptography.
  72. Nath, Satyajit, Method and system for providing document retention using cryptography.
  73. Zhang,Shujin; Yager,Charles T., Method and system for providing network access to PPP clients.
  74. Chan,Kok Wai; Toncheva,Dafina Ivanova; Dharmarajan,Baskaran; Newaskar,Rahul Shrikant; Back,Adam, Method and system for recovering password protected private data via a communication network without exposing the private data.
  75. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  76. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  77. Barrett, Michael, Method and system for transmitting authentication context information.
  78. Barrett, Michael, Method and system for transmitting authentication context information.
  79. Barrett, Michael, Method and system for transmitting authentication context information.
  80. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  81. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  82. Barrett,Michael Richard, Method and system for transmitting authentication context information.
  83. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  84. Alban,Philip A.; Horner,Eric A.; Horton,John C.; Lambert,Neil A., Method for protecting the program environment of a microsoft component object model (COM) client.
  85. Rubin, Aviel D., Method for secure remote backup.
  86. Rubin, Aviel D., Method for secure remote backup.
  87. Rubin, Aviel D., Method for secure remote backup.
  88. Rubin, Aviel D., Method for secure remote backup.
  89. Rubin,Aviel D., Method for secure remote backup.
  90. Cuppett, Steven C., Method of authenticating a user on a network.
  91. Han, Hee-chul; Kim, Yun-sang; Choi, Yang-lim; Han, Sung-hyu; You, Yong-kuk, Method of copying and decrypting encrypted digital data and apparatus therefor.
  92. Challener,David Carroll; Goodman,Steven Dale, Method of creating password list for remote authentication to services.
  93. Kamath, Deepak; Shridhar, Sanjay, Method, system and program product for secure storage of content.
  94. Carson, Jr., Keith Alan; Patsenker, Svetlana; Tiruveedi, Venkata R., Methods and apparatus for password management.
  95. Douglas C. Barlow, Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment.
  96. Ho, Shuk Yee; Fu, Christina; Kannan, Chandrasekar; Kwan, Nang Kon, Methods and system for a key recovery plan.
  97. Lord, Robert; Parkinson, Steven W.; Relyea, Robert, Methods and systems for assigning roles on a token.
  98. Parkinson, Steven William; Lord, Robert B., Methods and systems for entropy collection for server-side key generation.
  99. Kwan, Nang Kon; Kannan, Chandrasekar; Ho, Shuk Yee; Parkinson, Steven William, Methods and systems for managing identity management security domains.
  100. Relyea, Robert, Methods and systems for nonce generation in a token.
  101. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  102. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  103. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  104. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  105. Relyea, Robert, Methods and systems for providing data objects on a token.
  106. Relyea, Robert, Methods and systems for providing data objects on a token.
  107. Parkinson, Steven William, Methods and systems for remote password reset using an authentication credential managed by a third party.
  108. Fu, Christina; Parkinson, Steven William; Kwan, Nang Kon, Methods and systems for secure key delivery.
  109. Relyea, Robert, Methods and systems for secure shared smartcard access.
  110. Fu, Christina; Parkinson, Steven William; Kwan, Nang Kon, Methods and systems for server-side key generation.
  111. Georgiev, Nikolay; Ayzenshtat, Leonid, Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data.
  112. Georgiev, Nikolay; Ayzenshtat, Leonid, Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data.
  113. Ayzenshtat, Leonid; Georgiev, Nikolay; Rajamani, Kalyanaraman, Methods, apparatus, and articles of manufacture to encode auxiliary data into relational database keys and methods, apparatus, and articles of manufacture to obtain encoded data from relational database keys.
  114. Georgiev, Nikolay; Ayzenshtat, Leonid, Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data.
  115. Georgiev, Nikolay; Ayzenshtat, Leonid, Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data.
  116. Kondo Satoshi,JPX, Moving picture variable bit rate coding apparatus, moving picture variable bit rate coding method, and recording medium for moving picture variable bit rate coding program.
  117. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  118. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  119. Reilly, Paul A.; Birger, Chet; Knjazihhin, Denis, Multi-level key management.
  120. Reilly, Paul A.; Birger, Chet; Knjazihhin, Denis, Multi-level key management.
  121. Hoffberg, Steven M., Multifactorial optimization system and method.
  122. Brookfield, Bevan; Townsend, Stuart, Order management system and method for electronic securities trading.
  123. Relyea, Robert, Organizing an extensible table for storing cryptographic objects.
  124. Trostle, Jonathan T., Password based protocol for secure communications.
  125. Utin, Daniil, Password encryption key.
  126. Utin, Daniil, Password encryption key.
  127. Robins, Kristen Marie; Kon, Ronnie B., Password protection for high reliability computer systems.
  128. King,James E.; Evans,Stephen C.; Mayhead,Martin P., Portable network encryption keys.
  129. Sitaraman,Aravind; Sheth,Purnam Anil; Zhang,Shujin; Lou,Shuxian, Preventing HTTP server attacks.
  130. Kwan, Nang Kon; Kannan, Chandrasekar; Ho, Shuk Yee; Parkinson, Steven William; Fu, Christina, Profile framework for token processing system.
  131. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  132. Dillaway, Blair B., Protection of application secrets.
  133. Banks, Barbara Jane; Chitkara, Rajnish Kumar; Chen, Shiping, Protection of encryption keys in a database.
  134. Chan,Kok Wai; Jiang,Wei; Guo,Wei Quiang Michael, Public key infrastructure scalability certificate revocation status validation.
  135. Parkinson, Steven William, Reducing a size of a security-related data object stored on a token.
  136. Heithcock, Jeffery Gordon; Barry, II, David William; Jones, Dennis Bishop, Remote access architecture enabling a client to perform an operation.
  137. Heithcock, Jeffery Gordon; Barry, II, David William; Jones, Dennis Bishop, Remote access architecture enabling a client to perform an operation.
  138. Larson, Wayne F.; Kuenzi, Adam; Antrican, Jeff; Briskey, Teri Lynné, Restricted range lockbox, access device and methods.
  139. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason, Revocable shredding of security credentials.
  140. Roth, Gregory Branchek; Wren, Matthew James; Brandwine, Eric Jason, Revocable shredding of security credentials.
  141. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  142. Grinberg, Alexander; Kontorovich, Mike; Chazan, Mark; Reyburn, Colin, Secure network access.
  143. Garcia,Denis Jacques Paul, Secured data format for access control.
  144. Dan Linh Nguyen, Security between client and server in a computer network.
  145. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  146. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  147. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  148. Fu, Christina; Parkinson, Steven W.; Kwan, Nang Kon, Server-side key generation.
  149. Zhang Shujin ; Lou Shuxian, Single step network logon based on point to point protocol.
  150. Zhang,Shujin; Lou,Shuxian, Single step network logon based on point to point protocol.
  151. Lord, Robert B.; Parkinson, Steven William, Smartcard formation with authentication.
  152. Parkinson, Steven William; Lord, Robert B., Smartcard formation with authentication keys.
  153. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  154. Kocher, Paul C.; Jun, Benjamin C.; Jaffe, Joshua M., Specialized circuitry for cryptographic authentication and other purposes.
  155. Relyea, Robert, Strong encryption.
  156. Boss, Gregory Jenson; Chen, Yen-Fu; Hamilton, II, Rick Allen; Waters, Timothy Moffett, Substituting a favorite password value entered into a field of an online form with a specific password value.
  157. Hoffberg, Steven M., System and method for determining contingent relevance.
  158. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  159. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  160. Burns, Randal Chilton; Long, Darrell, System and method for managing authentication and coherency in a storage area network.
  161. Sade, Yair; Dulkin, Andrey, System and method for out-of-band application authentication.
  162. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  163. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  164. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  165. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  166. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  167. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  168. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  169. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  170. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  171. Harmer, Craig K., System and method for securing access to hash-based storage systems.
  172. McBrearty,Gerald Francis; Mullen,Shawn Patrick; Shieh,Johnny Meng Han; Unnikrishnan,Ramachandran, System and method for securing data on private networks.
  173. Desai, Nimesh; Udani, Sanjay; Kimble, Jr., James David; Werges, Thomas P.; Richardson, David Dean; Gustafson, Jeffrey A., System and method for selective information exchange.
  174. Bauman, Mark Linus; Bird, John Joseph; Remfert, Jeffrey Earl, System console device authentication in a network environment.
  175. Vennelakanti, Ravigopal; Fernandes, Savio, System, method and apparatus for cryptography key management for mobile devices.
  176. Iasso, Anthony S., Systems and methods for secure watchlisting.
  177. Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  178. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
  179. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  180. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  181. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  182. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  183. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  184. Jablon,David P., Systems, methods and software for remote password authentication using multiple servers.
  185. M'Raihi, David, Time and event based one time password.
  186. Relyea, Robert; Lord, Robert B.; Parkinson, Steven William, Time-based function back-off.
  187. Trostle, Jonathan T., Timing attacks against user logon and network I/O.
  188. Lord, Robert B.; Relyea, Robert; Kwan, Nang Kon, Token Registration.
  189. Lord, Robert, Token recycling.
  190. Kocher,Paul C.; Jaffe,Joshua M.; Jun,Benjamin C., Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content.
  191. Roth, Gregory Branchek; Baer, Graeme David; Brandwine, Eric Jason, Virtual communication endpoint services.
  192. Roth, Gregory Branchek; Baer, Graeme David; Brandwine, Eric Jason, Virtual communication endpoint services.
  193. Roth, Gregory Branchek; Baer, Graeme David; Brandwine, Eric Jason, Virtual endpoints for request authentication.
  194. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based, biometric authetication system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로