$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Tamper resistant method and apparatus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/12
  • H04L-009/32
출원번호 US-0965595 (1997-11-06)
발명자 / 주소
  • Ellison Carl
출원인 / 주소
  • CyberCash, Inc.
대리인 / 주소
    Roberts Abokhair & Mardula, LLC
인용정보 피인용 횟수 : 162  인용 특허 : 15

초록

A method for securing data in a tamper resistant fashion on a computer connected to a network. The presence of a user on a network is established using one protocol with routine operations conducted by the user on the network using a second protocol. Public and private key encryption is used to esta

대표청구항

[ What is claimed is:] [1.] A tamper resistant method for securing a user's data comprising:initializing the presence of at least one user on a tamper resistant networked device using a first protocol; andestablishing routine operations by the user on the network using a second protocol, wherein the

이 특허에 인용된 특허 (15)

  1. Rosenow Peter D. (Edmonds WA) Trafton Roger M. (Kirkland WA), Apparatus and method for controlling access to and interconnection of computer system resources.
  2. Kung Kenneth C. (Cerritos CA), Distributed user authentication protocol.
  3. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  4. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  5. Atalla Martin M. (Menlo Park CA), Method and means for securing the distribution of encoding keys.
  6. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  7. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  8. Kung Kenneth C. (Cerritos CA) Bathrick Erwin W. (Brea CA) Huang Cheng-Chi (Irvine CA) Ma Mae-Hwa (Cerritos CA) Matthews Todd E. (Santa Ana CA) Zmuda James E. (Lake Forest CA), Method for providing mutual authentication of a user and a server on a network.
  9. Merritt Michael J. (Naperville IL), Method of authenticating a terminal in a transaction execution system.
  10. Atalla Martin M. (18 Monte Vista Ave. Atherton CA 94025) Hopkins Webster D. (2425 Rick Dr. Morgan Hill CA 95020), Multilevel security apparatus and method with personal key.
  11. Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Russell James F. (Hockessin DE) Sears John W. (Peoria AZ) Trice Philip H. (Phoenix AZ), Network settlement performed on consolidated information.
  12. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  13. Canetti Ran (Tel Aviv NY ILX) Herzberg Amir (New York NY), Secure communication and computation in an insecure environment.
  14. Leith Victor S. (Stanley NC) Stevens James V. (Huntersville NC), Secure communications system for remotely located computers.
  15. Ganesan Ravi (Arlington VA), System and method for centralized session key distribution, privacy enhanced messaging and information distribution usin.

이 특허를 인용한 특허 (162)

  1. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  3. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  4. Graves, Michael E.; Frank, Peter E.; Plambeck, Thane; Whitehead, Gregory R., Authenticated payment.
  5. Graves, Michael E; Frank, Peter E; Plambeck, Thane; Whitehead, Gregory R, Authenticated payment.
  6. Steven M. Blumenau ; Yoav Raz, Authentication of a host processor requesting service in a data processing network.
  7. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, Authorizing administrative operations using a split knowledge protocol.
  8. Chang, Steven, Background encryption of disks in a large cluster.
  9. Little, Herbert A.; Adams, Neil P.; Tapuska, David F.; Brown, Michael S.; Kirkup, Michael G.; Godfrey, James A., Certificate management and transfer system and method.
  10. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Godfrey, James Andrew; Kirkup, Michael Grant, Certificate management and transfer system and method.
  11. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Kirkup, Michael Grant; Godfrey, James Andrew, Certificate management and transfer system and method.
  12. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Cluster key synchronization.
  13. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  14. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  15. Dickinson, Alexander G; Berger, Brian; Dobson, Robert T, Context sensitive dynamic authentication in a cryptographic system.
  16. Dickinson,Alexander G.; Berger,Brian; Dobson, Jr.,Robert T., Context sensitive dynamic authentication in a cryptographic system.
  17. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  18. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., Display of secure messages on a mobile communication device.
  19. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., Display of secure messages on a mobile communication device.
  20. Adams, Neil Patrick; Little, Herbert Anthony; Brown, Michael Stephen; Brown, Michael Kenneth, Display of secure messages on a mobile communication device.
  21. Sussland, Robert J.; Silberman, Joshua Oran; Subramanian, Ananthan; Chang, Lawrence Wen-Hao, Distributed management of crypto module white lists.
  22. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  23. Wu, Yi-Fang; Wu, Dan-Feng, Electronic device for entering password.
  24. Plotkin, Serge; Avida, Dan, Encryption based security system for network storage.
  25. Plotkin, Serge; Avida, Dan, Encryption based security system for network storage.
  26. Panjwani,Prakash; Blake Wilson,Simon, Enhanced subscriber authentication protocol.
  27. Tarkkala, Lauri; Asokan, Nadarajah, Establishment of a trusted relationship between unknown communication parties.
  28. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  29. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  30. Gandhasri, Rajamohan, Host based rekeying.
  31. Nakano, Takehiko; Shima, Hisato, Information processing apparatus and method, recording medium and program.
  32. Felsher, David Paul, Information record infrastructure, system and method.
  33. Arunachalam, Lakshmi, Managing services on a network.
  34. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  35. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  36. Arunachalam, Lakshmi, Method and apparatus for enabling real-time bi-directional transactions on a network.
  37. Lee,David A.; Graunke,Gary L., Method and apparatus for increasing the entropy of a pseudorandom number.
  38. Peterson, Zachary Nathaniel Joseph; Stubblefield, Adam Bradley; Bono, Stephen C.; Green, Matthew Daniel, Method and apparatus for limiting access to sensitive data.
  39. Sussland, Robert; Chang, Lawrence; Subramanian, Ananthan; Silberman, Joshua, Method and apparatus for offline cryptographic key establishment.
  40. Sandhu,Ravi; deSa,Colin; Ganesan,Karuna, Method and system for authorizing generation of asymmetric crypto-keys.
  41. Rodgers, Stephane; Dellow, Andrew, Method and system for preventing revocation denial of service attacks.
  42. Rodgers, Stephane; Dellow, Andrew, Method and system for preventing revocation denial of service attacks.
  43. O'Leary, Denis; D'Agostino, Vincent; Re, S. Richard; Burney, Jessica; Hoffman, Adam, Method and system for processing internet payments.
  44. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  45. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  46. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  47. Kinsley, Michael; LeMay, Steven; Orner, Lance, Methods and devices for authentication and licensing in a gaming network.
  48. Hoffberg, Steven M., Multifactorial optimization system and method.
  49. Arunachalam, Lakshmi, Multimedia transactional services.
  50. Jiang,Xiaoye; Venkatesh,Dinesh; Ku,Mark K.; Chen,Xiangping, Network block services for client access of network-attached data storage in an IP network.
  51. Utin, Daniil, Password encryption key.
  52. Utin, Daniil, Password encryption key.
  53. Shaik, Cheman, Password self encryption method and system and encryption by keys generated from personal secret information.
  54. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Peer to peer key synchronization.
  55. Kung, Hsiang-Tsung, Personal authentication device and system and method thereof.
  56. Plotkin, Serge; Bojinov, Hristo; Frandzel, Yuval; Narver, Andrew; Yang, Zi-Bin, Protocol translation.
  57. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., Providing certificate matching in a system and method for searching and retrieving certificates.
  58. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, Providing certificate matching in a system and method for searching and retrieving certificates.
  59. Agarwal, Vaibhave; Gandhasri, Rajamohan, Re-keying based on pre-generated keys.
  60. Agarwal, Vaibhave; Ganhasri, Rajamohan, Re-keying based on pre-generated keys.
  61. Arunachalam, Lakshmi, Real-time web transaction systems to access on-line services over the web from web applications.
  62. Arunachalam, Lakshmi, Real-time web transactions from web applications.
  63. Carter, Stephen R.; Burch, Lloyd Leon, Remote authorization for operations.
  64. Carter, Stephen R; Burch, Lloyd Leon, Remote authorization for operations.
  65. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  66. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  67. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  68. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  69. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  70. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  71. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  72. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  73. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  74. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  75. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  76. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  77. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  78. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  79. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  80. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  81. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  82. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  83. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  84. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  85. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  86. Chen, Sherman (Xuemin); Rodgers, Steve, Secure key authentication and ladder system.
  87. Hiltgen,Alain P., Secure user and data authentication over a communication network.
  88. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  89. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  90. Brown, Michael K.; Brown, Michael S.; Little, Herbert A.; Adams, Neil P., Synchronizing certificates between a device and server.
  91. Brown, Michael Kenneth; Little, Herbert Anthony; Brown, Michael Stephen; Adams, Neil Patrick, Synchronizing certificates between a device and server.
  92. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  93. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  94. Brown, Michael S.; Brown, Michael K.; Kirkup, Michael G., System and method for controlling message attachment handling functions on a mobile device.
  95. Brown, Michael Stephen; Brown, Michael Kenneth; Kirkup, Michael Grant, System and method for controlling message attachment handling functions on a mobile device.
  96. Hoffberg, Steven M., System and method for determining contingent relevance.
  97. Nadathur, Gokul; Mohammed, Samiullah; Vaid, Aseem, System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys.
  98. Wang,Xin, System and method for document distribution.
  99. Sussland, Robert Jan; Chang, Lawrence Wen-Hao; Subramanian, Ananthan, System and method for efficiently deleting a file from secure storage served by a storage system.
  100. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, System and method for generating a single use password based on a challenge/response protocol.
  101. Brown, Michael K.; Brown, Michael S.; Segato, Timothy, System and method for handling electronic mail mismatches.
  102. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  103. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  104. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  105. Adams, Neil P.; MacFarlane, David V.; Robertson, Ian, System and method for handling electronic messages.
  106. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  107. Subramanian, Ananthan; Chang, Lawrence Wen-Hao, System and method for initial key establishment using a split knowledge protocol.
  108. Tolfmans, Joakim Bengt Lennart, System and method for parallel compression of a single data stream.
  109. Brown, Michael Kenneth; Kirkup, Michael Grant; Brown, Michael Stephen, System and method for processing attachments to messages sent to a mobile device.
  110. Brown, Michael Kenneth; Kirkup, Michael Grant; Brown, Michael Stephen, System and method for processing attachments to messages sent to a mobile device.
  111. Little, Herbert A.; Brown, Michael S., System and method for processing encoded messages.
  112. Little, Herbert Anthony; Brown, Michael Stephen, System and method for processing encoded messages.
  113. Brown, Michael S.; Adams, Neil P.; Brown, Michael K.; Kirkup, Michael G.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  114. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  115. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  116. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  117. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  118. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  119. Little, Herbert A., System and method for protecting master encryption keys.
  120. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  121. Brown, Michael Stephen; Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant; Brown, Michael Kenneth, System and method for retrieving related certificates.
  122. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., System and method for searching and retrieving certificates.
  123. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, System and method for searching and retrieving certificates.
  124. Little, Herbert A.; Kirkup, Michael G., System and method for secure message key caching in a mobile communication device.
  125. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  126. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  127. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  128. Lehman, Dean K.; McCullough, Joseph R.; Orth, Nancy A., System and method for sending money via E-mail over the internet.
  129. Silberman, Joshua; Subramanian, Ananthan; Okushi, Fumiaki, System and method for signing a message to provide one-time approval to a plurality of parties.
  130. Wang,Xin, System and method for transferring the right to decode messages.
  131. Mann, III,William Frederick; Hirka,Jeffrey L., System for providing cardless payment.
  132. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for a cryptographic file system layer.
  133. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  134. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  135. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  136. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  137. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  138. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  139. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  140. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  141. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  142. Orsini, Rick L.; O'Hare, Mark S.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  143. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  144. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  145. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  146. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  147. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  148. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  149. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  150. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  151. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  152. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  153. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  154. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  155. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  156. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  157. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  158. Chaudhary, Anant; Narver, Andrew, Tape failover across a cluster.
  159. Chaudhary, Anant; Narver, Andrew, Tape failover across a cluster.
  160. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  161. Arunachalam, Lakshmi, Web application network portal.
  162. Chang, Ian, iSCSI name forwarding technique.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로