$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for improving security in network applications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • G06F-012/14
출원번호 US-0907958 (1997-08-11)
발명자 / 주소
  • Borza Stephen J.,CAX
출원인 / 주소
  • DEW Engineering and Development Limited, CAX
대리인 / 주소
    Neil Teitelbaum & Associates
인용정보 피인용 횟수 : 94  인용 특허 : 4

초록

A method of enhancing network security is provided for a communication session initiated between a first computer and a second other computer. From the first computer to the second computer in communications therewith a process for securing communications therebetween is transmitted. One such proces

대표청구항

[ What is claimed is:] [1.] A method of enhancing network security comprising the steps of:(a) initiating a communication session between a first computer and a second other computer;(b) transmitting from the first computer to the second other computer in communication therewith a process for securi

이 특허에 인용된 특허 (4)

  1. Berry Thomas G. (Schaumburg IL), Method and apparatus for controlling access to a communication system.
  2. Tuai Gregory (Seattle WA), Security system for data communications.
  3. Viavant Steven ; Gleckler Arthur A. ; Wessman Richard R., System and method for negotiating security services and algorithms for communication across a computer network.
  4. Ostermann Bernd (Weissach DEX) Bitzer Wolfgang (Weissach DEX), System for enciphering and deciphering data.

이 특허를 인용한 특허 (94)

  1. Jonas, Jeffrey J., Authorized anonymous authentication.
  2. Jonas, Jeffrey J., Authorized anonymous authentication.
  3. Welch, Jeffrey Peter; Foley, Michael Thomas, Automated computer biometric identity assurance.
  4. Ting, David M. T., Biometric authentication for remote initiation of actions and services.
  5. Gennaro Rosario ; Halevi Shai ; Maes Stephane ; Rabin Tal ; Sorensen Jeffrey, Biometric authentication system with encrypted models.
  6. Ting,David M. T., Biometric authentication with security against eavesdropping.
  7. Nakamura, Yoshiyuki; Anno, Tetsuya, Client terminal device, storage medium product, bank server apparatus, information transmitting method, information transmitting program, and information transmitting/receiving program.
  8. Brumme, Christopher W.; Morrison, Vance; Lange, Sebastian; Fee, Gregory D.; Russi, Dario; Hall, Simon Jeremy; Prakriya, Mahesh; Sullivan, Brian F., Cross assembly call interception.
  9. Ougi,Hirokazu; Takashima,Hideo; Taniguchi,Hidenobu; Kouchi,Munetoshi; Hayami,Hiroshi; Asada,Hajime; Harazaki,Hideki, Cryptographic communication method, encryption algorithm shared control method, encryption algorithm conversion method and network communication system.
  10. Zizi, Martin; Sharkey, Hugh, Data encryption/decryption using neurological fingerprints.
  11. Black, Gerald R, Data security system.
  12. Black, Gerald R., Data security system.
  13. Black, Gerald R., Data security system.
  14. Black, Gerald R., Data security system.
  15. Black,Gerald R., Data security system.
  16. Jonas,Jeffrey James, Data set comparison and net change processing.
  17. Fukui, Yoshiki; Taniguchi, Shinya; Kitada, Naruhide, Display-service providing system and image display apparatus.
  18. Fukui, Yoshiki; Taniguchi, Shinya; Kitada, Naruhide, Display-service providing system and image display apparatus.
  19. Ortiz, Luis M.; Lopez, Kermit D., Electronic wireless hand held multimedia device.
  20. Bjorn, Vance C.; Belongie, Serge J., Fingerprint recognition system.
  21. Bjorn, Vance C.; Belongie, Serge J., Fingerprint recognition system.
  22. Bjorn,Vance C.; Belongie,Serge J., Fingerprint recognition system.
  23. Black, Gerald R., Identify authentication device.
  24. Kondo,Tetsujiro; Ohta,Koji; Tanaka,Kenji; Nakamura,Yukihiro, Individual authentication apparatus, individual authentication method, and computer program.
  25. Felsher, David Paul, Information record infrastructure, system and method.
  26. Zizi, Martin; Sharkey, Hugh, Keyless access control with neuro and neuro-mechanical fingerprints.
  27. Gould, Christopher Britton; Locker, Howard Jeffery; Trotter, Andy Lloyd; Vanover, Michael T.; Ward, James Peter, Method and system for enabling free seating using biometrics through a centralized authentication.
  28. Jardin, Cary A., Method and system for establishing secure communication over computer networks.
  29. Holvey, R. David; Jopling, Arthur Douglas, Method and system for protecting information on a computer system.
  30. Holvey,R David; Jopling,Arthur Douglas, Method and system for protecting information on a computer system.
  31. Siegel, Brian; Abram, Philip Michael; Beckwitt, Marc; Gudorf, Gregory D.; Iso, Kazuaki; Raymond, Brian; Tobin, Christopher M., Method and system for restricted biometric access to content of packaged media.
  32. Black, Gerald R., Method for identity verification.
  33. Black, Gerald R., Method for identity verification.
  34. Black,Gerald R., Method for identity verification.
  35. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  36. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  37. Royer, Coby, Methods and apparatus for credential validation.
  38. Royer, Coby, Methods and apparatus for credential validation.
  39. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  40. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  41. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  42. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  43. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  44. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  45. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  46. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  47. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  48. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  49. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  50. Hoffberg, Steven M., Multifactorial optimization system and method.
  51. Whitmyer, Jr., Wesley W., Onsite backup for internet-based data processing.
  52. Whitmyer, Jr., Wesley W., Onsite backup for third party internet-based systems.
  53. Whitmyer, Jr., Wesley W., Onsite backup for third party internet-based systems.
  54. Whitmyer, Jr., Wesley W., Onsite backup of internet-based data in a requested format.
  55. Black,Gerald R., Pen-based transponder identity verification system.
  56. Yamada, Miki; Morijiri, Tomoaki; Saisho, Toshiaki, Personal authentication system and portable unit and storage medium used therefor.
  57. Jonas, Jeffrey J., Post-anonymous fuzzy comparisons without the use of pre-anonymization variants.
  58. Holvey, R. David; Jopling, Arthur Douglas, Protecting information on a computer system using multiple authentication methods.
  59. Matyas, Jr., Stephen Michael; Peyravian, Mohammad, Protection of biometric data via key-dependent sampling.
  60. Jonas, Jeffrey J., Real time data warehousing.
  61. Jonas, Jeffrey James, Real time data warehousing.
  62. Jonas, Jeffrey James, Real time data warehousing.
  63. Hamid, Laurence, Removable swipe-imaging device and method for identifying same.
  64. Jonas, Jeffrey J.; Dunham, Steven Bruce, Secure coordinate identification method, system and program.
  65. Black,Gerald R., Security authentication method and system.
  66. Gifford, Maurice M; Seal, Christopher H; McCartney, David John, Security check provision.
  67. Gifford,Maurice M; Seal,Christopher H; McCartney,David John, Security check provision.
  68. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  69. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  70. Ting, David M. T.; Ho, Chen; Shah, Parind; Byragani, Bushan Yadav, System and method for automated login.
  71. Hoffberg, Steven M., System and method for determining contingent relevance.
  72. Pratt, James; Pearson, Larry; Sullivan, Marc, System and method for device security with a plurality of authentication modes.
  73. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  74. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  75. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  76. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  77. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  78. Bonneton, Damien, System for advanced protection of consumable or detachable elements.
  79. Yamazaki, Shunpei; Koyama, Jun, System for identifying an individual, a method for identifying an individual or a business method.
  80. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  81. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  82. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  83. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  84. Muttik, Igor G.; Gulletten, Vincent P.; Schmugar, Craig D., System, method and computer program product for conditionally updating a security program.
  85. Holdsworth,John, Systems and methods for enrolling a token in an online authentication program.
  86. Hammond, II, Frank J.; Ricotta, Jr., Frank J.; Dykstra, Hans Michael; Williams, Blake Andrew; Carlander, Steven James; Williams Gerber, Sarah, Systems and methods for enterprise security with collaborative peer to peer architecture.
  87. Ortiz, Luis M., Systems, methods and apparatuses for brokering data between wireless devices and data rendering devices.
  88. Ortiz, Luis M., Systems, methods and apparatuses for brokering data between wireless devices, servers and data rendering devices.
  89. Ortiz, Luis M., Systems, methods and apparatuses for brokering data between wireless devices, servers and data rendering devices.
  90. Ortiz, Luis M., Systems, methods and apparatuses for brokering data between wireless devices, servers and data rendering devices.
  91. Holdsworth,John, Token for use in online electronic transactions.
  92. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based biometric authentication.
  93. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based biometric authentication.
  94. Novack, Brian M.; Madsen, Daniel Larry; Thompson, Timothy R., Voice over IP based voice biometric authentication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로