$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for dynamic server document encryption 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0829976 (1997-04-01)
발명자 / 주소
  • Smith Jeffrey C.
  • Bandini Jean-Christophe
출원인 / 주소
  • Tumbleweed Communications Corp.
대리인 / 주소
    Ivey
인용정보 피인용 횟수 : 427  인용 특허 : 40

초록

A method and system are provided for secure document delivery over a wide area network, such as the Internet. A sender directs a Delivery Server to retrieve an intended recipient's public key. The Delivery Server dynamically queries a certificate authority and retrieves the public key. The public ke

대표청구항

[ We claim:] [1.] A method for secure document delivery from a sender over a wide area network, comprising the steps of:a sender encrypting a document using a secret key;the sender contacting a Delivery Server to query a public key associated with an intended recipient;the Delivery Server dynamicall

이 특허에 인용된 특허 (40)

  1. Okumura Shigemi (Kiyose JPX) Hirosawa Toshio (Machida JPX), A system for notifying a destination terminal that electronic mail has reached a host computer.
  2. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  3. Vigil Mary Frances ; Sze Tak Fai ; Seller Gary ; Eggerman Steven Lee, Apparatus and method for integrating multiple delegate directory service agents.
  4. Schultz Thomas G. (Chicago IL) Gross Andrew (Bridgewater NJ) Pappas Barbara (Massapequa Park NY) Shifrin George D. (New York NY) Mack Lois (Union City NJ), Apparatus and method of distributing documents to remote terminals with different formats.
  5. Cordell John P. ; Slivka Benjamin W. ; Franklin Christopher M. ; Blume Arthur E. ; Shyam Bharat, Automatic data display formatting with a networking application.
  6. Cohen Roberta S. (Middletown NJ) Huber Kenneth M. (Middletown NJ) Mills Deborah J. (Eatontown NJ), Communication system having unified messaging.
  7. Foster Gregory J. (Austin TX), Electronic document distribution network with uniform data stream.
  8. Doggett John (Brookline MA) Jaffe Frank A. (Sharon MA) Anderson Milton M. (Fair Haven NJ), Electronic funds transfer instruments.
  9. Schultz Thomas G. (Chicago IL) Gross Andrew (Bridgewater NJ) Pappas Barbara (Massapequa Park NY) Shifrin George D. (New York NY) Mack Lois (Union City NJ), Electronic mail.
  10. Putz Steven B. (Cupertino CA) Weiser Mark D. (Palo Alto CA) Demers Alan J. (Woodside CA) Spitz A. Lawrence (Palo Alto CA), Encoding-format-desensitized methods and means for interchanging electronic document as appearances.
  11. Hong Jack ; Toye George, Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing.
  12. Baudoin Claude R. (Palo Alto CA), Interenterprise electronic mail hub.
  13. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  14. Herr-Hoyman Dirk ; Hubert Louis, Internet-based automatic publishing system.
  15. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  16. Bobo ; II Charles R. (569 Elmwood Dr. NE. Atlanta GA 30306), Message storage and delivery system.
  17. Williams Marvin L. (Lewisville TX) Yun Roselyn H.-C. (Honolulu HI), Method and apparatus for enhanced electronic mail distribution.
  18. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  19. Kirsch Steven T., Method and apparatus for redirection of server external hyper-link references.
  20. Beck Robert D. ; Richardson John, Method and apparatus for transmitting electronic mail attachments with attachment references.
  21. Mathur Ashish (Sunnyvale CA), Method and apparatus for updating system software for a plurality of data processing units in a communication network.
  22. Cook David Philip, Method and system for custom manufacture and delivery of a data product.
  23. Higley Thomas, Method and system to create, transmit, receive and process information, including an address to further information.
  24. Choudhury Abhijit K. (Scotch Plains NJ) Maxemchuk Nicholas F. (Mountainside NJ) Paul Sanjoy (Scotch Plains NJ) Schulzrinne Henning G. (Sterling NJ), Method of protecting electronically published materials using cryptographic protocols.
  25. Gifford David K., Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a red.
  26. Harkins Larry E. (Rochester NY) Hayward Ken (Brockport NY) Herceg Thomas J. (Pittsford NY) Levine Jonathan D. (Rochester NY) Parsons David M. (Fairport NY), Network having selectively accessible recipient prioritized communication channel profiles.
  27. Pastor Jose (Westport CT), Reliable document authentication system.
  28. Cordell John Palmer ; Franklin Christopher Matthew, Remote retrieval and display management of electronic document with incorporated images.
  29. Muftic Sead,SEX, Secure world wide electronic commerce over an open network.
  30. Gelb Edward J. (Wayne NJ), Security system for preventing unauthorized communications between networks by translating communications received in ip.
  31. Bloomfield Mark C. (Marietta GA), Sender-based facsimile store and forward facility.
  32. Shing Norman (New Hyde Park NY) Erlikh Leonid (Brooklyn NY) Lim Nicholas R. (London NJ GB2) Lambert Jeffrey L. (East Brunswick NJ) Moskowitz Joel M. (New York NY) Wadhwa Vivek K. (Paramus NJ) Hughes , Software distribution system to build and distribute a software release.
  33. Ogawa Stuart S. (San Francisco CA) Pierce Kevin R. (Fairview NJ), System and method for automatic data file format translation and transmission having advanced features.
  34. Shane Terence Martin,CAX, System and method providing an interactive response to direct mail by creating personalized web page based on URL provi.
  35. Anderson William P. ; Geller Jacob B., System for on-line financial services using distributed objects.
  36. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  37. Kuzma Andrew J., Transmitting electronic mail attachment over a network using a e-mail page.
  38. Edelstein Matthew ; Bergman Samuel ; Rubin Donald B., Universal electronic resource denotation, request and delivery system.
  39. Kirsch Steven T., Web scan process.
  40. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.

이 특허를 인용한 특허 (427)

  1. Libin, Phil; Micali, Silvio, Access control.
  2. Libin,Phil, Actuating a security system using a wireless device.
  3. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  4. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  5. Wilson, Michael, Administrative notes in network-based commerce facility.
  6. Wilson, Michael, Administrative notes in network-based commerce facility.
  7. Heller, Toby; Hoffberg, Steven M., Agent training sensitive call routing system.
  8. Hoffberg, Steven, Agent training sensitive call routing system.
  9. Hoffberg, Steven M., Agent training sensitive call routing system.
  10. Hess, Martin L.; Wilson, Michael K., Aggregation of reduced-sized images.
  11. Hess,Martin L.; Wilson,Michael K., Aggregation of reduced-sized images.
  12. Sato,Makoto, Apparatus and method for creating a map of a real name word to an anonymous word for an electronic document.
  13. Pearson, Jennifer; Wang, Bill, Apparatus and method for generating sub-codes to a turbo-encoder.
  14. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  15. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  16. Tolson,Michael; Arnulfo,Jean Christophe; Rive,Brice, Architecture for a system of portable information agents.
  17. Watt, II, William R.; Ackley, Matthew F.; Cornell, William J., Auction with interest rate bidding.
  18. Femenia, Nora; Pomerance, Brenda, Automated cross-cultural conflict management.
  19. Femenia, Nora; Pomerance, Brenda, Automated cross-cultural conflict management.
  20. Evan, Michael J.; Levine, Jonathan D.; Pangrazio, III, Donald M., Automated encryption and password protection for downloaded documents.
  21. Pearson, Jennifer; Wang, Hsiaozhang Bill, Automated selection of images for web pages.
  22. Pearson, Jennifer; Wang, Hsiaozhang Bill, Automated selection of images for web pages.
  23. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  24. Cook, David P.; Liu, Gary G.; Kalan, John, Automatic delivery selection for electronic content.
  25. Cook, David P.; Liu, Gary G.; Kalan, John, Automatic delivery selection for electronic content.
  26. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange and execution management.
  27. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange with archiving capability.
  28. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange with document searching capability.
  29. Vogel,Inna; Ye,Mei, Automatic notification of irregular activity.
  30. Lin, Huey; Levchin, Max; Han, Gina; Levan, Theodore Douglas; Levy, Dan; McGraw, Chris; Klein, Erik; Cervelli, Greg; Wo, Steven; Freeland, Carl; Chen, May; Wilson, Kristen; Nielson, Jason; Haffey, Kyle; Gonzales, Julie; Aptekar, Denise, Automatic restitution of transaction fees, punishment of non-paying bidders, and management of appeals.
  31. Wen, Wen; Ng, Patricia, Automatic update of searches.
  32. Wen, Wen; Ng, Patricia, Automatic update of searches.
  33. Wen, Wen; Ng, Patricia, Automatic update of searches.
  34. Chasin, C. Scott, Bounce management in a trusted communication network.
  35. Relyea, Robert, Certificate generation using virtual attributes.
  36. Little, Herbert A.; Adams, Neil P.; Tapuska, David F.; Brown, Michael S.; Kirkup, Michael G.; Godfrey, James A., Certificate management and transfer system and method.
  37. Little, Herbert A.; Adams, Neil P.; Tapuska, David F.; Brown, Michael S.; Kirkup, Michael G.; Godfrey, James A., Certificate management and transfer system and method.
  38. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Godfrey, James Andrew; Kirkup, Michael Grant, Certificate management and transfer system and method.
  39. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Kirkup, Michael Grant; Godfrey, James Andrew, Certificate management and transfer system and method.
  40. Micali, Silvio, Certificate revocation system.
  41. Patterson,Andrew John; Day,Hilton; Cameron,Nicola, Certification validation system.
  42. Peterson, Kevin, Computer-implemented forum for enabling secure exchange of information.
  43. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  44. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  45. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  46. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  47. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  48. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  49. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  50. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  51. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  52. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  53. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  54. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  55. Veres, Robert Dean; Liang, Ching-Jye, Customizing an application.
  56. Veres, Robert Dean; Liang, Ching-Jye, Customizing an application.
  57. Venditti, Stephen; Olsen, William; Hegarty, Sean; Twombly, Christopher, Data access and retrieval mechanism.
  58. Zhang, Gong, Data protection method and data protection system.
  59. Mandal, Kallol; Jalali, Caveh F.; Ramarao, Prashant, Database for executing policies for controlling devices on a network.
  60. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  61. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  62. Ratterman, Robert J.; Maltzman, Reed; Knepfle, Joshua D., Determining a community rating for a user using feedback ratings of related users in an electronic environment.
  63. Ratterman, Robert J; Maltzman, Reed; Knepfle, Joshua D, Determining a community rating for a user using feedback ratings of related users in an electronic environment.
  64. Gupta, Raghav; Xu, Sichun, Determining relevancy and desirability of terms.
  65. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., Display of secure messages on a mobile communication device.
  66. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., Display of secure messages on a mobile communication device.
  67. Adams, Neil Patrick; Little, Herbert Anthony; Brown, Michael Stephen; Brown, Michael Kenneth, Display of secure messages on a mobile communication device.
  68. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  69. Engberg, David, Distributed delegated path discovery and validation.
  70. Maltzman, Reed, Dual purchase process within an online auction environment.
  71. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  72. Vargas, Garrett R.; Kroman, Paul K.; Nalliah, Selvaraj; Counts, Eian D.; Hall, Gary W.; Gupta, Anoop, Dynamically resolving recipients to retrieve public keys during send/receive.
  73. Vargas, Garrett R.; Kroman, Paul K.; Nalliah, Selvaraj; Counts, Eian D.; Hall, Gary W.; Gupta, Anoop, Dynamically resolving recipients to retrieve public keys during send/receive.
  74. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  75. Micali,Silvio, Efficient certificate revocation.
  76. Boemker, Tim; Keller, Mark; Schock, Chip; Kleingers, Mark E.; Huff, Phillip E.; Gieske, Terrance P.; Gersten, James D.; Danner, John E., Electronic document management system.
  77. Johnson, Brian Scott; Bolivar, Alvaro, Electronic publication system.
  78. Ross, Jr.,Robert C., Encrypted e-mail reader and responder system, method, and computer program product.
  79. Koyfman, Andrew, Encrypted table indexes and searching encrypted tables.
  80. D'Angelo, Leo A.; Izadpanah, Kamran; Bell, John J., Enhancing messaging services using translation gateways.
  81. D'Angelo, Leo A.; Izadpanah, Kamran; Bell, John J., Enhancing messaging services using translation gateways.
  82. D'Angelo, Leo A.; Izadpanah, Kamran; Bell, John J., Enhancing messaging services using translation gateways.
  83. Balk, Michael A.; Bruno, Daniel A. Cejudo; Nicol, Jennifer E., Financial institution portal system and method.
  84. Bolivar, Alvaro; Mohan, Sunil, Flexible asset and search recommendation engines.
  85. Lin, Wei, Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers.
  86. Poon, Alex Dai-Shun; Maltzman, Reed; Taylor, Jeffrey, Generating a recommendation.
  87. Poon, Alex Dai-Shun; Maltzman, Reed; Taylor, Jeffrey, Generating a recommendation.
  88. Wang, Hsiaozhang Bill, Generic attribute database system.
  89. Wang,Hsiaozhang Bill, Generic attribute database system.
  90. Wang, Hsiaozhang Bill, Generic attribute database system for storing items of different categories having shared attributes.
  91. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  92. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  93. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  94. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  95. Nair, Sushil; Zolotusky, Anatol; Charpentier, Claude; Metzger, Brian, High performance data encryption server and method for transparently encrypting/decrypting data.
  96. Appenzeller, Guido; Pauker, Matthew J.; Kacker, Rishi R., Identity-based encryption system.
  97. Appenzeller, Guido; Pauker, Matthew J.; Kacker, Rishi R., Identity-based encryption system.
  98. Appenzeller,Guido; Pauker,Matthew J.; Kacker,Rishi R., Identity-based encryption system.
  99. Kacker, Rishi R.; Appenzeller, Guido; Pauker, Matthew J.; Spies, Terence, Identity-based encryption system for secure data distribution.
  100. Kacker,Rishi R.; Appenzeller,Guido; Pauker,Matthew J.; Spies,Terence, Identity-based encryption system for secure data distribution.
  101. Spies, Terence; Appenzeller, Guido, Identity-based-encryption message management system.
  102. Spies, Terence; Appenzeller, Guido, Identity-based-encryption message management system.
  103. Spies, Terence; Appenzeller, Guido, Identity-based-encryption message management system.
  104. Appenzeller, Guido; Pauker, Matthew J; Spies, Terence; Kacker, Rishi R, Identity-based-encryption messaging system.
  105. Spies, Terence; Kacker, Rishi R.; Appenzeller, Guido; Pauker, Matthew J.; Rescorla, Eric, Identity-based-encryption messaging system with public parameter host servers.
  106. Spies,Terence; Kacker,Rishi R.; Appenzeller,Guido; Pauker,Matthew J.; Rescorla,Eric, Identity-based-encryption messaging system with public parameter host servers.
  107. Spies,Terence; Pauker,Matthew J.; Ryan,Lucas C.; Appenzeller,Guido, Identity-based-encryption system with district policy information.
  108. Spies, Terence; Kacker, Rishi R.; Appenzeller, Guido; Pauker, Matthew J., Identity-based-encryption system with hidden public key attributes.
  109. Hess, Martin L.; Wilson, Michael K., Information presentation and management in an online trading environment.
  110. Hess,Martin L.; Wilson,Michael K., Information presentation and management in an online trading environment.
  111. Felsher, David Paul, Information record infrastructure, system and method.
  112. Handler,Brad, Integrated auction.
  113. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Intelligent communication routing.
  114. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Intelligent communication routing.
  115. Wu, Wai; Hoffberg, Steven M., Intelligent communication routing system and method.
  116. Wu, Wai; Hoffberg, Steven M., Intelligent communication routing system and method.
  117. Grove, Brian Alan; Edson, Zachary James; Grove, Steve; Sandler, Andrew Leigh, Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism.
  118. Grove, Brian Alan; Edson, Zak James; Grove, Steve; Sandler, Andrew Leigh, Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism.
  119. Grove, Brian; Edson, Zak; Grove, Steve; Sandler, Andrew Leigh, Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism.
  120. Gong, Li, Layer-independent security for communication channels.
  121. Ambrosini, Martin A.; Huth, Edward E.; Moore, Victor S.; Nusbickel, Wendi L.; Yoder, Brian E., Lightweight directory access protocol interface directory assistance systems.
  122. Foster, Benjamin David; Speiser, Leonard Robert; Stewart, Lori Kathleen; Sandler, Andrew Leigh; Kalko, Charles Zoran; Quick, Sterling Ryan; Raimondi, Anne Chang, Listing recommendation in a network-based commerce system.
  123. Foster, Benjamin David; Speiser, Leonard Robert; Stewart, Lori Kathleen; Sandler, Andrew Leigh; Kalko, Charles Zoran; Quick, Sterling Ryan; Raimondi, Anne Chang, Listing recommendation using generation of a user-specific query in a network-based commerce system.
  124. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  125. Rowley, Peter Andrew, Mail certificate responder.
  126. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  127. Chasin, C. Scott, Marking electronic messages to indicate human origination.
  128. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  129. Sansone,Ronald P., Messaging services for the visually impaired.
  130. Sansone,Ronald P., Messaging services for uniquely identified mail.
  131. Skatter, Sondre; Tolson, Michael, Method and apparatus for a distributable globe graphical object.
  132. Kobata,Hiroshi; Gagne,Robert, Method and apparatus for delivering electronic data through a proxy server.
  133. Howe, Brian Keith; Huynh, Khoa Dang; Paul, Chakkalamattam Jos; Smith, Stanley Alan, Method and apparatus for dynamic distribution of system file and system registry changes in a distributed data processing system.
  134. May, Jason; Flint, Ian, Method and apparatus for facilitating online payment transactions in a network-based transaction facility.
  135. May, Jason; Flint, Ian, Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments.
  136. May,Jason; Flint,Ian, Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments.
  137. Kopelman, Joshua M; Balijepalli, Srinivas, Method and apparatus for facilitating sales of goods by independent parties.
  138. Kopelman,Joshua M.; Balijepalli,Srinivas, Method and apparatus for facilitating sales of goods by independent parties.
  139. Kopelman,Joshua M; Balijepalli,Srinivas, Method and apparatus for facilitating sales of goods by independent parties.
  140. Poon,Alex D., Method and apparatus for facilitating user registration in an on-line auction environment.
  141. Poon, Alex Dai-Shun, Method and apparatus for facilitating user selection of a category item in a transaction.
  142. Poon, Alex Dai-Shun, Method and apparatus for facilitating user selection of a category item in a transaction.
  143. Poon, Alex Dai-Shun, Method and apparatus for facilitating user selection of an item category in an online auction.
  144. Levy, Daniele; Handler, Brad, Method and apparatus for holding a two-stage live auction for on-site and on-line bidders.
  145. Levy, Daniele; Handler, Brad, Method and apparatus for holding an online live auction to combine features of both the Internet and traditional, real world auctions.
  146. Levy, Daniele; Handler, Brad, Method and apparatus for holding an online live auction to combine features of both the internet and traditional, real world auctions.
  147. Kopelman, Joshua M.; Fralic, Christopher D.; Balijepalli, Srinivas, Method and apparatus for listing goods for sale.
  148. Kopelman, Joshua R; Balijepalli, Srinivas; Fralic, Christopher D, Method and apparatus for listing goods for sale.
  149. Kopelman,Joshua M.; Fralic,Christopher D.; Balijepalli,Srinivas, Method and apparatus for listing goods for sale.
  150. Kopelman, Joshua M.; Balijepalli, Srinivas, Method and apparatus for optimizing seller selection in a multi-seller environment.
  151. Kopelman, Joshua; Balijepalli, Srinivas; Fralie, Christopher D., Method and apparatus for presenting information relating to a good.
  152. Boone, Barry, Method and apparatus for providing predefined feedback.
  153. Boone, Barry, Method and apparatus for providing predefined feedback.
  154. Boone, Barry, Method and apparatus for providing predefined feedback.
  155. Vandergeest, Ron J.; Simzer, Kevin T.; Skinner, Eric R., Method and apparatus for providing user authentication using a back channel.
  156. Jain,Namit; Mishra,Shailendra K.; Nainani,Bhagat V.; Wang,Wei; Chatterjee,Debashish, Method and apparatus for secure message queuing.
  157. Boneh, Dan; Chawla, Rajeev; Frindell, Alan; Goh, Eu-Jin; Modadugu, Nagendra; Tsirigotis, Panagiotis, Method and apparatus for transparent encryption.
  158. Cheng, Christine; Won, Brenda; Mohnia, Dheeraj; Nguyen, Ha; Maltzman, Reed; Strack, Isaac; Morin, Noel, Method and apparatus to detect fraudulent activities within a network-based auction facility.
  159. Poon, Alex D.; Leahy, Scott; Wilson, Mike, Method and apparatus to facilitate a transaction within a network-based facility.
  160. Stangl,Norbert, Method and device for the transfer of electronic data volumes.
  161. Sze,Vicky, Method and system automatically to remind parties to a network-based transaction to comply with obligations established under a transaction agreement.
  162. Grove, Steve; Yan, Steve; Aidun, Rashid; Singh, Premendra; Rajesh, S. N.; Somani, Preeti; Cooney, Kevin, Method and system automatically to support multiple transaction types, and to display seller-specific transactions of various transaction types in an integrated, commingled listing.
  163. Grove, Steve; Yan, Steve; Aidun, Rashid; Singh, Premendra; Rajesh, S. N.; Somani, Preeti; Cooney, Kevin, Method and system automatically to support multiple transaction types, and to display seller-specific transactions of various transaction types in an integrated, commingled listing.
  164. Veres, Robert Dean; Liang, Ching-Jye, Method and system for automatically updating a seller application utilized in a network-based transaction facility.
  165. Wen, Wen; Ng, Patricia, Method and system for automatically updating search results on an online auction site.
  166. Wen, Wen; Ng, Patricia, Method and system for automatically updating search results on an online auction site.
  167. Chawla,Rajeev; Tsirigotis,Panagiotis; Boneh,Dan, Method and system for caching secure web content.
  168. Seamon, Joseph, Method and system for categorizing items in both actual and virtual categories.
  169. Monahan, Jay; Handler, Bradley A., Method and system for communicating selected search results between first and second entities over a network.
  170. Monahan,Jay; Handler,Bradley A., Method and system for communicating selected search results between first and second users over a network.
  171. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  172. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  173. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  174. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  175. Veres, Robert Dean; Liang, Ching-Jye, Method and system for customizing a network-based transaction facility seller application.
  176. Leonardo, Lou; Ching, Randy; Wahl, Amanda, Method and system for dealing with non-paying bidders related to network-based transactions.
  177. May, Jason W.; Flint, Ian, Method and system for detecting fraud.
  178. May, Jason W.; Flint, Ian, Method and system for detecting fraud.
  179. Sun, Ken; Ghatare, Sanjay Pundlkrao; Dumon, Oliver G.; Netzloff, Julie Lavee; Rehman, Muhammad Faisal; McDonald, Ryan, Method and system for determining an order of presentation of search results.
  180. Sun, Ken; Ghatare, Sanjay Pundlkrao; Dumon, Olivier G.; Netzloff, Julie; Rehman, Muhammad Faisal; McDonald, Ryan, Method and system for determining an order of presentation of search results.
  181. Leonardo, Lou; Grewal, Gurinder Singh; Ratterman, Robert J.; Knepfle, Joshua D.; Ching, Randy; Dalton, Tola, Method and system for filing a complaint related to network-based transactions.
  182. Levy, Daniele V.; Grove, Steve; Mohnia, Dheeraj; Poon, Alex, Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility.
  183. Levy,Daniele V.; Grove,Steve; Mohnia,Dheeraj; Poon,Alex, Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility.
  184. Boone, Barry; Sacco, Nathan; Chard, Rhys, Method and system for listing items globally and regionally, and customized listing according to currency or shipping area.
  185. Boone, Barry; Sacco, Nathan; Chard, Rhys, Method and system for listing items globally and regionally, and customized listing according to currency or shipping area.
  186. Pearson, Jennifer; Poon, Alex D.; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  187. Pearson, Jennifer; Poon, Alex Dai-Shun; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  188. Pearson, Jennifer; Poon, Alex Dai-Shun; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  189. Pearson, Jennifer; Poon, Alex Dai-Shun; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  190. Pearson,Jennifer; Poon,Alex D.; Poon,Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  191. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Method and system for matching entities in an auction.
  192. Wu, Wai; Hoffberg, Steven M., Method and system for matching entities in an auction.
  193. Boone, Barry; Sacco, Nathan; Chard, Rhys, Method and system for providing a record.
  194. Picoult, Cheryl L.; Winkelman, John H.; Strobel, Kevin L.; Norris, Jr., James R.; Rojas, John W., Method and system for remote retrieval of documents.
  195. Leonardo, Lou; Grewal, Gurinder Singh; Ratterman, Rob; Knepfle, Josh; Ching, Randy; Dalton, Tola, Method and system for reporting fraud and claiming compensation related to network-based transactions.
  196. Leonardo, Lou; Grewal, Gurinder Singh; Ratterman, Rob; Knepfle, Josh; Ching, Randy; Dalton, Tola, Method and system for reporting fraud and claiming insurance related to network-based transactions.
  197. Strobel,Kevin L.; Norris, Jr.,James R.; Rojas,John W., Method and system for secure delivery and printing of documents.
  198. Strobel, Kevin L.; Norris, Jr., James R.; John, Rojas W., Method and system for secure delivery and printing of documents via a network device.
  199. Foth,Thomas J., Method and system for secure delivery and retrieval of documents utilizing a facsimile machine.
  200. Foth,Thomas J., Method and system for secure printing of documents via a printer coupled to the internet.
  201. Chen, Xuemin; Rodgers, Stephane, Method and system for securing communication on a home gateway in an IP content streaming system.
  202. Wilson,Michael, Method and system for the creation and communication of notes concerning an auction participant or item within a network-based auction facility.
  203. Schwankl, Michael; Balijepalli, Srinivas; Geshel, Vadim; Borowsky, Pete; Kopelman, Joshua, Method and system of facilitating a transaction.
  204. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Cooney, Kevin W.; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  205. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  206. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  207. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  208. Embree, Kevin H., Method and system to detect outlying behavior in a network-based marketplace.
  209. Munro, Jr., W. Barton; Pritchett, Dan; Monier, Louis, Method and system to display and search in a language independent manner.
  210. Stuart, Erik Anderson, Method and system to enable a fixed price purchase within a multi-unit online auction environment.
  211. Stuart, Erik Anderson, Method and system to enable a fixed price purchase within a multi-unit online auction environment.
  212. Maltzman,Reed, Method and system to enable a fixed price purchase within a online auction environment.
  213. Lee, Stacy A.; Early, Justin Christopher; McSpadden, Kevin; Pedone, Greg, Method and system to facilitate an online promotion relating to a network-based marketplace.
  214. Schwankl, Michael; Balijepalli, Srinivas; Geshel, Vadim; Borowsky, Pete; Kopelman, Joshua, Method and system to facilitate pre-ordering via an electronic commerce facility, and to automatically facilitate satisfying of a pre-order upon listing of an appropriate offer via the electronic commerce facility.
  215. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Cooney, Kevin W.; Hsin, James; Fung, Elaine; Shaviv, Vered, Method and system to implement seller authorized buying privileges within a network-based shopping facility.
  216. Taylor,Jeffrey; Morin,Noel; Goodwine,Annette; Sze,Vicky; Cooney,Kevin W.; Hsin,James; Fung,Elaine; Shaviv,Vered, Method and system to implement seller authorized buying privileges within a network-based shopping facility.
  217. Poon, Alex; Maltzman, Reed; Taylor, Jeffrey, Method and system to recommend further items to a user of a network-based transaction facility upon unsuccessful transacting with respect to an item.
  218. Sansone,Ronald P., Method for a carrier to determine the location of a missing person.
  219. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  220. Kirshner, Jake, Method for encrypting and storing data.
  221. Zhan, Kaijun; Harper, James, Method for managing data in a shared computing environment.
  222. Herbert, Howard C.; Davis, Derek L., Method for secure distribution and configuration of asymmetric keying material into semiconductor devices.
  223. Koyun, Ismet; Ruppert, Markus, Method for secured transmission of a data object.
  224. Partelow, Michael; Farimani, Mehran; Fulton, Truxton, Methods and apparatus for secure document printing.
  225. Partelow, Michael; Farimani, Mehran; Fulton, Truxton, Methods and apparatus for secure document printing.
  226. Partelow,Mike; Fulton,Truxton; Faramani,Mehran, Methods and apparatus for secure document printing.
  227. Maltzman, Reed, Methods and machine readable mediums to enable a fixed price purchase within an online auction environment.
  228. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  229. Levy, Daniele V.; Grove, Steve; Mohnia, Dheeraj; Poon, Alex, Methods and systems for harvesting comments regarding events on a network-based commerce facility.
  230. Levy, Daniele; Grove, Steve; Mohnia, Dheeraj Singh; Poon, Alex Dai-Shun, Methods and systems for harvesting comments regarding users on a network-based facility.
  231. Vogel, Inna; Ye, Mei, Monitoring and automatic notification of irregular activity in a network-based transaction facility.
  232. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants.
  233. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants.
  234. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants of a network-based transaction facility.
  235. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants of a networked-based transaction facility.
  236. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  237. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  238. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  239. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  240. Hoffberg, Steven M., Multifactorial optimization system and method.
  241. Frindell, Alan H.; Hill, Dan; Gopalakrishnan, Venkitachalam; Laqtib, Abdesalam; Murray, Eric, Multikey support for multiple office system.
  242. Brown, Michael Wayne; Dutta, Rabindranath; Paolini, Michael A., Notifying users when messaging sessions are recorded.
  243. Brown,Michael Wayne; Dutta,Rabindranath; Paolini,Michael A., Notifying users when messaging sessions are recorded.
  244. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  245. Hess, Martin L.; Wilson, Michael K., Periodically reloading image in order to obtain any changes to the images.
  246. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  247. Johnson, Peter K.; Minnick, J. Doug; Robertson, Ian; Peterson, Samuel J., Point-and-shoot product lister.
  248. Johnson, Peter K.; Minnick, J. Doug; Robertson, Ian; Peterson, Samuel J., Point-and-shoot product lister.
  249. Byrne, Patrick Michael; Atkinson, Geoffrey Russell, Positioning E-commerce product related to graphical imputed consumer demand.
  250. Watson, Angela; Richardson, Rebecca; Jalora, Anshu; Liu, Wendy; Hofmann, Ryan, Pricing and forecasting.
  251. Minagawa, Tomonori, Print data communication with data encryption and decryption.
  252. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  253. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  254. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  255. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  256. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  257. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  258. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  259. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  260. Leahy,Scott; Cohen,Alon, Prioritization of third party access to an online commerce site.
  261. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  262. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  263. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  264. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., Providing certificate matching in a system and method for searching and retrieving certificates.
  265. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, Providing certificate matching in a system and method for searching and retrieving certificates.
  266. Pauker,Matthew J; Kacker,Rishi R; Appenzeller,Guido, Public-key encryption system.
  267. Veres, Robert Dean; Liang, Ching-Jye, Publishing user submissions.
  268. Veres, Robert Dean; Liang, Ching-Jye, Publishing user submissions at a network-based facility.
  269. Ho, Min-Hank; Samuel, Javed; Knaggs, Peter; Lim, Dah-Yoh; Youn, Paul, Real-time data redaction in a database management system.
  270. Ho, Min-Hank; Samuel, Javed; Knaggs, Peter; Lim, Dah-Yoh; Youn, Paul, Real-time data redaction in a database management system.
  271. Sansone,Ronald P.; Cordery,Robert A.; Mackay,Donald G., Recipient elected messaging services.
  272. Sansone,Ronald P., Recipient elected messaging services for mail that is transported in trays or tubs.
  273. Yu, Kevin John; Chong, Joseph; Tien, Alan, Release of funds based on criteria.
  274. Yu, Kevin John; Chong, Joseph; Tien, Alan, Release of funds based on criteria.
  275. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  276. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  277. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  278. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  279. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  280. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  281. Watts, Christian M., Scalable and flexible internet fax architecture.
  282. Narasimhan, Anand; Shemesh, Yaacov; Kumar, Amit, Scalable architecture for transmission of messages over a network.
  283. Narasimhan, Anand; Shemesh, Yaacov; Kumar, Amit, Scalable architecture for transmission of messages over a network.
  284. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  285. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  286. Toh,Eng Whatt; Teo,Kok Hoon, Secure and reliable document delivery using routing lists.
  287. Selgas, Thomas Drennan; Heintz, John D., Secure cloud data sharing.
  288. Curry, Ian, Secure communication apparatus and method.
  289. Selgas, Thomas D.; Cutrer, Jonathan, Secure credentials control method.
  290. Selgas, Thomas D.; Cutrer, Jonathan, Secure email communication system.
  291. Selgas, Thomas Drennan; Cutrer, Jonathan, Secure email communication system.
  292. Cook, David P., Secure message forwarding system detecting user's preferences including security preferences.
  293. Cook, David P., Secure message forwarding system detecting user's preferences including security preferences.
  294. Cook,David P., Secure message forwarding system detecting user's preferences including security preferences.
  295. Pauker, Matthew J.; Kacker, Rishi R.; Spies, Terence; Ryan, Lucas C.; Appenzeller, Guido, Secure message system with remote decryption service.
  296. Pauker, Matthew J.; Kacker, Rishi R.; Spies, Terence; Ryan, Lucas C.; Appenzeller, Guido, Secure message system with remote decryption service.
  297. Pauker,Matthew J.; Kacker,Rishi R.; Spies,Terence; Ryan,Lucas C.; Appenzeller,Guido, Secure message system with remote decryption service.
  298. Draughon, Alex J.; Kelwalkar, Anil B.; Cinanni, Richard; Delgado, Lucia R.; Payne, Anna M.; Kirner, Patrice L.; Vankoski, Brett M.; Chai-Chang, Janice M.; Corupe, Allan J.; Allen, John; Murphy, Paul; Pruett, Miriam, Secure messaging center.
  299. Liu, Gary Gang, Secure messaging system with automatic recipient enrollment.
  300. Pauker, Matthew J.; Spies, Terence; Kacker, Rishi R.; Appenzeller, Guido, Secure messaging systems.
  301. Pauker, Matthew J.; Spies, Terence; Kacker, Rishi; Appenzeller, Guido, Secure messaging systems.
  302. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  303. Wiser, Philip R.; Cherenson, Andrew R.; Ansell, Steven T.; Cannon, Susan A., Secure online music distribution system.
  304. Slick,Royce E.; Zhang,William; Purpura,Don Francis; Iwamoto,Neil Y.; Mazzagatte,Craig, Secure printing with authenticated printer key.
  305. Eldridge, Margery A.; Flynn, Michael J.; Jones, Christopher M.; Merkle, Ralph C.; Lamming, Michael G.; Pendlebury, David L.; Stringer, Mark; Kleyn, Michiel F. E., Secure token-based document server.
  306. Margery A. Eldridge GB; Michael J. Flynn GB; Christopher M. Jones GB; Ralph C. Merkle ; Michael G. Lamming GB; David L. Pendlebury GB; Mark Stringer GB; Michiel F. E. Kleyn GB, Secure token-based document server.
  307. Sansone,Ronald P.; Cordery,Robert A.; Mackay,Donald G., Sender elected messaging services.
  308. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  309. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  310. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  311. Byrne, Patrick Michael; Park, Susan, Social choice engine.
  312. Byrne, Patrick Michael; Park, Susan, Social choice engine.
  313. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  314. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  315. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Stopping and remediating outbound messaging abuse.
  316. Chasin, C. Scott; Lin, Wei; Kincaid-Smith, Paul, Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse.
  317. Brown, Michael K.; Brown, Michael S.; Little, Herbert A.; Adams, Neil P., Synchronizing certificates between a device and server.
  318. Brown, Michael Kenneth; Little, Herbert Anthony; Brown, Michael Stephen; Adams, Neil Patrick, Synchronizing certificates between a device and server.
  319. Robertson, Ian B., System and method for assigning computer users to test groups.
  320. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  321. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  322. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure e-mail for exchange with a mobile data communication device.
  323. Godfrey,James A.; Little,Herbert A.; Brown,Michael K.; Adams,Neil P.; Cherry,Carl L.; Tyhurst,Timothy R.; Brown,Michael S., System and method for compressing secure e-mail for exchange with a mobile data communication device.
  324. Brown, Michael S.; Brown, Michael K.; Kirkup, Michael G., System and method for controlling message attachment handling functions on a mobile device.
  325. Brown, Michael Stephen; Brown, Michael Kenneth; Kirkup, Michael Grant, System and method for controlling message attachment handling functions on a mobile device.
  326. Hoffberg, Steven M., System and method for determining contingent relevance.
  327. Leonard, Jon N.; Bernstein, Michael, System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control and track processing or handling by all recipients.
  328. Martin, James, System and method for graphically building weighted search queries.
  329. Martin, James, System and method for graphically building weighted search queries.
  330. Brown, Michael K.; Brown, Michael S.; Segato, Timothy, System and method for handling electronic mail mismatches.
  331. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  332. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  333. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  334. Adams, Neil P.; MacFarlane, David V.; Robertson, Ian, System and method for handling electronic messages.
  335. Wang, Hsiaozhang Bill, System and method for handling item listings with generic attributes.
  336. Wang, Hsiaozhang Bill, System and method for handling item listings with generic attributes.
  337. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  338. Cordery, Robert A.; Haas, Bertrand; Ryan, Jr., Frederick W.; Armstrong, Scott F., System and method for printing documents having a copy detection pattern.
  339. Brown, Michael Kenneth; Kirkup, Michael Grant; Brown, Michael Stephen, System and method for processing attachments to messages sent to a mobile device.
  340. Brown, Michael Kenneth; Kirkup, Michael Grant; Brown, Michael Stephen, System and method for processing attachments to messages sent to a mobile device.
  341. Little, Herbert A.; Brown, Michael S., System and method for processing encoded messages.
  342. Little, Herbert Anthony; Brown, Michael Stephen, System and method for processing encoded messages.
  343. Brown, Michael S.; Adams, Neil P.; Brown, Michael K.; Kirkup, Michael G.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  344. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  345. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  346. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  347. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  348. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  349. Nagel,Robert H., System and method for production and authentication of original documents.
  350. Nagel,Robert H., System and method for production and authentication of original documents.
  351. Little, Herbert A., System and method for protecting master encryption keys.
  352. Gaucas, Dale Ellen; Liang, Tao, System and method for providing S/MIME-based document distribution via electronic mail mechanisms.
  353. Gaucas,Dale Ellen; Koomen,Johannes A.; Austin,Paul R., System and method for providing S/MIME-based document distribution via electronic mail mechanisms.
  354. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  355. Brown, Michael Stephen; Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant; Brown, Michael Kenneth, System and method for retrieving related certificates.
  356. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., System and method for searching and retrieving certificates.
  357. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, System and method for searching and retrieving certificates.
  358. Colin Savage, System and method for secure and anonymous communications.
  359. Nagel, Robert H.; Felsher, David P.; Hoffberg, Steven M., System and method for secure communications involving an intermediary.
  360. Yeap, Tet Hin; Goeller, Thomas Anton, System and method for secure electronic communication services.
  361. Little, Herbert A.; Kirkup, Michael G., System and method for secure message key caching in a mobile communication device.
  362. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  363. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  364. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  365. Grove, Steve, System and method to facilitate translation of communications between entities over a network.
  366. Grove, Steve, System and method to facilitate translation of communications between entities over a network.
  367. Grove, Steve, System and method to facilitate translation of communications between entities over a network.
  368. MacDonald-Korth, Holly C.; Peterson, Samuel Jacob, System and methods for electronic commerce using personal and business networks.
  369. MacDonald-Korth, Holly C.; Peterson, Samuel Jacob, System and methods for electronic commerce using personal and business networks.
  370. Savage, Colin; Petro, Christopher; Goldsmith, Sascha, System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data.
  371. Savage, Colin; Petro, Christopher; Goldsmith, Sascha, System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data.
  372. Savage, Colin; Petro, Christopher; Goldsmith, Sascha, System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data.
  373. Savage,Colin; Petro,Christopher; Goldsmith,Sascha, System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data.
  374. Wen, Wen; Ng, Patricia, System to conduct search updates at determined frequency.
  375. Gupta, Raghav, System to generate related search queries.
  376. Vogel, Inna; Ye, Mei, System to monitor irregular activity.
  377. Vogel, Irina; Ye, Mei, System to monitor irregular activity.
  378. MacDonald Korth, Holly C.; Peterson, Samuel Jacob, System, program product, and methods for online image handling.
  379. MacDonald Korth, Holly C.; Peterson, Samuel Jacob, System, program product, and methods for online image handling.
  380. MacDonald Korth, Holly C; Peterson, Samuel Jacob, System, program product, and methods for online image handling.
  381. Byrne, Patrick, System, program product, and methods for social network advertising and incentives for same.
  382. Bobo, II, Charles R., Systems and method for storing, delivering, and managing messages.
  383. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  384. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  385. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  386. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  387. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  388. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  389. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  390. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  391. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  392. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  393. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  394. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  395. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  396. Boneh,Dan; Franklin,Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  397. Judge, Paul, Systems and methods for message threat management.
  398. Judge, Paul, Systems and methods for message threat management.
  399. Judge, Paul, Systems and methods for message threat management.
  400. Judge, Paul, Systems and methods for message threat management.
  401. Judge,Paul, Systems and methods for message threat management.
  402. Judge,Paul, Systems and methods for message threat management.
  403. Greco, Paul V.; Daniels, Ryder; Beldock, Donald T.; Aieta, Mario A., Systems and methods for providing electronic document services.
  404. Greco, Paul V.; Daniels, Ryder; Beldock, Donald T.; Aieta, Mario A., Systems and methods for providing electronic document services.
  405. Greco, Paul V.; Daniels, Ryder; Beldock, Donald T.; Aieta, Mario A., Systems and methods for providing electronic document services.
  406. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  407. Bobo, II, Charles R., Systems and methods for storing, delivering, and managing messages.
  408. Bobo, II, Charles R., Systems and methods for storing, delivering, and managing messages.
  409. Judge,Paul, Systems and methods for upstream threat pushback.
  410. Poon, Alex Dai-Shun; Leahy, Scott; Wilson, Michael K., Systems and methods to facilitate transactions.
  411. Poon, Alex Dai-Shun; Leahy, Scott; Wilson, Michael K., Systems and methods to facilitate transactions.
  412. Poon, Alex Dai-Shun; Leahy, Scott; Wilson, Michael K., Systems and methods to facilitate transactions.
  413. Wilson, Michael K., Taxonomy based database partitioning.
  414. Wilson, Michael K., Taxonomy based database partitioning.
  415. Wilson, Michael K., Taxonomy based database partitioning.
  416. Wilson, Michael K., Taxonomy-based database partitioning.
  417. Wu,Wai; Heller,Toby; Hoffberg,Steven M., Telephony control system with intelligent call routing.
  418. Wu,Wai; Heller,Toby; Hoffberg,Steven M., Telephony control system with intelligent call routing.
  419. Hess,Martin L.; Wilson,Michael K., Thumbnail image virtual address space.
  420. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  421. Chasin, C. Scott; Lin, Wei, Trusted communication network.
  422. Friedman, David; Wu, Wai, Voice over internet call center integration.
  423. Friedman, David; Wu, Wai, Voice over internet call center integration.
  424. Friedman,David; Wu,Wai, Voice over internet call center integration.
  425. Friedman, David; Wu, Wai, Voice over internet integration.
  426. Friedman, David; Wu, Wai, Voice over internet integration.
  427. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로