$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for electronic transactions 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G07F-019/00
  • G06F-017/30
출원번호 US-0025802 (1998-02-19)
발명자 / 주소
  • Goldschlag David M.
  • Stubblebine Stuart Gerald
  • Syverson Paul F.
출원인 / 주소
  • Naval Research Laboratory
대리인 / 주소
    Kenyon & Kenyon
인용정보 피인용 횟수 : 189  인용 특허 : 17

초록

A system and method for performing an electronic transaction, including registration, audit and trusted recovery features. A transaction request message is received from a registered user that includes an unblinded validated certificate, and a blinded unvalidated certificate. If the unblinded valida

대표청구항

[ What is claimed is:] [1.] A method for initializing a series of electronic transactions, comprising the steps of:a. receiving an initialization request message that atomically bindsi. authorization data, andii. a blinded unvalidated certificate to be validated;b. determining if the authorization d

이 특허에 인용된 특허 (17)

  1. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91306), Blind signature systems.
  2. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Blind unanticipated signature systems.
  3. Yacobi Yacov (Berkeley Heights NJ), Efficient electronic money.
  4. Takamoto Yoshifumi (Hachioji JPX) Torii Shunichi (Musashino JPX), Method and apparatus for multi-transaction batch processing.
  5. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), One-show blind signature systems.
  6. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Returned-value blind signature systems.
  7. Brands Stefanus A. (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secret-key certificates.
  8. Hamilton Scott B. (Kirkland WA), Signalling scheme for controlling data encryption device in an electronic fund transaction processing system.
  9. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  10. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of redeeming electronic payments.
  11. Yacobi Yacov, System and method for detecting fraudulent expenditure of electronic assets.
  12. Yacobi Yacov, System and method for detecting fraudulent expenditure of transferable electronic assets.
  13. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information acce.
  14. Weber Jay C., System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing.
  15. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  16. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  17. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Unpredictable blind signature systems.

이 특허를 인용한 특허 (189)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  6. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  7. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  8. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  11. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  12. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  13. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  14. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  15. Wiechers, Xavier; Wang, Yilei, Anonymous online payment systems and methods.
  16. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  17. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  18. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  19. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  20. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  21. Grawrock,David W., Attestation using both fixed token and portable token.
  22. Johnson, Bruce E.; Webster-Lam, Chung, Authentication for a commercial transaction using a mobile module.
  23. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  24. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  25. Cook, David P., Centralized authorization and fraud-prevention system including virtual wallet for network-based transactions.
  26. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  27. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  28. Grawrock,David W., Connecting a virtual token to a physical token.
  29. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  30. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  31. Simon, Daniel R., Controlled-content recoverable blinded certificates.
  32. Simon,Daniel R., Controlled-content recoverable blinded certificates.
  33. Simon,Daniel R., Controlled-content recoverable blinded certificates.
  34. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  35. Grawrock,David W., Creation and distribution of a secret value between two devices.
  36. Ludtke,Harold A., Data entry user interface.
  37. Schneider, James Paul, Distributing keypairs between network appliances, servers, and other network assets.
  38. Schneider, James Paul, Distributing keypairs between network appliances, servers, and other network assets.
  39. Storch, Gerald L.; Kromrey, Gregg A., E-mail based gift delivery.
  40. Storch, Gerald L.; Kromrey, Gregg A., E-mail based gift delivery.
  41. Kawaguchi,Kyoko; Takayama,Hisashi; Matsuse,Tetsuo; Shibata,Akio, Electronic asset utilization system, electronic asset utilization method, server for use with electronic asset utilization system, and recording medium having recorded thereon electronic asset utiliz.
  42. Cockrill, Michael P.; Bryant, William K.; Franklin, D. Chase; McNeely, Mark H.; Ryan, Timothy J.; Sweet, Andrew P.; Siadek, Steven J.; Faith, Jr., Ronald R.; Goris, J. Mark; Malek, Thor A., Electronic commerce using a transaction network.
  43. Michael P. Cockrill ; William K. Bryant ; D. Chase Franklin ; Mark H. McNeely ; Timothy J. Ryan ; Andrew P. Sweet ; Steven J. Siadek ; Ronald R. Faith, Jr. ; J. Mark Goris ; Thor A. Malek, Electronic commerce using a transaction network.
  44. Hisada,Yusuke; Ono,Satoshi; Ichikawa,Haruhisa, Email access control scheme for communication network using identification concealment mechanism.
  45. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  46. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  47. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  48. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  49. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  50. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  51. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  52. Dhir, Nitin; Kappagantu, Ravi, In-bound telemarketing system for processing customer offers.
  53. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  54. Felsher, David Paul, Information record infrastructure, system and method.
  55. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  56. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  57. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  58. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  59. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  60. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  61. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  62. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  63. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  64. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  65. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  66. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  67. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  68. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  69. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  70. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  71. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  72. Cox, Andrew; Sieber, Robert; Balding, Alison; Karunaratne, Anil; Chandumont, Jean-Christopher, Method and apparatus for evaluating a financial transaction.
  73. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  74. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  75. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  76. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  77. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  78. Cox, Andrew; Dellosso, Donna; Cisz, Mark; Bekker, Ela; Chandumont, Jean-Christopher; Dafni, Joseph, Method and apparatus for managing credit limits.
  79. Cox, Andrew; Chandumont, Jean-Christopher; Bainbridge, Dianne; Haas, Lauren, Method and apparatus for managing risk.
  80. Johnson, Bruce E., Method and apparatus for network transactions.
  81. Rabin, Michael O.; Shasha, Dennis E., Method and apparatus for protecting information and privacy.
  82. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  83. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  84. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  85. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  86. Kawan, Joseph C.; Chu, Ronald King-Hang; Golvin, Charles; Tompkins, Peter, Method and system for controlling certificate based open payment transactions.
  87. Kawan, Joseph C.; Chu, Ronald King-Hang; Golvin, Charles; Tompkins, Peter, Method and system for controlling certificate based open payment transactions.
  88. Kawan, Joseph C.; King-Hang Chu, Ronald; Golvin, Charles; Tompkins, Peter, Method and system for controlling certificate based open payment transactions.
  89. Micali, Silvio; Rivest, Ronald L., Method and system for micropayment transactions.
  90. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing assurance and financing services.
  91. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing buyer bank payable discounting aggregation services.
  92. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing buyer bank payable discounting services.
  93. Siegel, Brian; Abram, Philip Michael; Beckwitt, Marc; Gudorf, Gregory D.; Iso, Kazuaki; Raymond, Brian; Tobin, Christopher M., Method and system for restricted biometric access to content of packaged media.
  94. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  95. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  96. Freeman,Charles J.; Xue,Xingxiong, Method for mortgage and closed end loan portfolio management.
  97. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  98. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  99. Brickell,Ernie F., Method of confirming a secure key exchange.
  100. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  101. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  102. Ludtke,Harold Aaron; Maritzen,L. Michael, Method or system for executing deferred transactions.
  103. Dillon, Pattie Suozzi; Giordano, James M.; Galle, Kenneth A., Method, system, and apparatus for identification number authentication.
  104. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  105. Basavapatna, Prasanna Ganapathi; Gaddala, Satish Kumar; Schrecker, Sven; Goldschlag, David Moshe, Mobile risk assessment.
  106. Basavapatna, Prasanna Ganapathi; Gaddala, Satish Kumar; Schrecker, Sven; Goldschlag, David Moshe, Mobile risk assessment.
  107. Basavapatna, Prasanna Ganapathi; Gaddala, Satish Kumar; Schrecker, Sven; Goldschlag, David Moshe, Mobile risk assessment.
  108. Grawrock,David W., Multi-token seal and unseal.
  109. Ireland, Leigh-Anne T.; Strand, Marilyn; Goldberg, Michele; Winzer, Etienne, On-line higher education financing system.
  110. Novak, Christopher S.; D'Angelo, Michael; Giancola, Tom, Online interactive and partner-enhanced credit card.
  111. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, III, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  112. Bennett, Steven M.; Anderson, Andrew V.; Jeyasingh, Stalinselvaraj; Kägi, Alain; Neiger, Gilbert; Uhlig, Richard; Zou, Xiang; Smith, Lawrence; Rodgers, Scott, Optimizing processor-managed resources based on the behavior of a virtual machine monitor.
  113. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  114. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  115. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  116. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  117. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  118. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  119. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  120. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  121. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  122. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  123. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  124. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  125. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  126. Parkinson, Steven W., Reduced computation for generation of certificate revocation information.
  127. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  128. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  129. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  130. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  131. Keresman, III, Michael A.; Balasubramanian, Chandra S.; Sherwin, Francis M., Secure and efficient payment processing system.
  132. Keresman, III, Michael A.; Bhagavatula, Ravishankar; Balasubramanian, Chandra; Sherwin, Francis M., Secure and efficient payment processing system.
  133. Keresman, III, Michael A.; Bhagavatula, Ravishankar; Balasubramanian, Chandra; Sherwin, Francis M., Secure and efficient payment processing system.
  134. Keresman, III, Michael A.; Bhagavatula, Ravishankar; Balasubramanian, Chandra; Sherwin, Francis M., Secure and efficient payment processing system with account holder defined transaction limitations.
  135. Aissi, Selim, Secured and selective runtime auditing services using a trusted computing device.
  136. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  137. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  138. Grawrock,David W.; Poisner,David I., Sleep protection.
  139. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  140. Louie, Edmund H.; Campbell, Michael X., Syndication loan administration and processing system.
  141. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  142. Ludtke, Harold Aaron; Maritzen, L. Michael, System and method for conducting secure transactions over a network.
  143. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  144. Buisman,William J.; Cohen,Gary; Fox,Steven R.; Kruse,Charles; Sulpizio,Christine, System and method for converting information on paper forms to electronic data.
  145. Keller, Kathleen M.; York, Sheryl M., System and method for detecting changes in business stability.
  146. Quigley, Benjamin; Sandler, Robert; Jones, Fletcher; Mahajan, Rajesh; Muppirala, Prakash; Lowe, David; Price, Laura; Goldstein, Seth; Subramanya, Venkatesh; Rawat, Jai, System and method for electronic wallet conversion.
  147. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  148. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  149. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  150. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  151. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  152. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  153. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  154. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  155. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  156. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  157. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  158. Oko, Jr., Frederick J.; Sun, Qiyue, System and method for influencing dynamic community shared elements of audio, video, and text programming via a polling system.
  159. Taylor,James W.; Coro,Luz Maria, System and method for offering a financial product.
  160. Cataline, Glen R.; Rielly, William Smith; Sheehan, Mark Robert; Wallace, William Scott, System and method for optimized funding of electronic transactions.
  161. White, Brigette A.; Levinson, Ronald; Sabharwal, Mohit, System and method for providing instant-decision, financial network-based payment cards.
  162. White, Brigette A.; Levinson, Ronald; Sabharwal, Mohit, System and method for providing instant-decision, financial network-based payment cards.
  163. White, Brigette A.; Levinson, Ronald; Sabharwal, Mohit, System and method for providing instant-decision, financial network-based payment cards.
  164. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  165. Binder, Yehuda, System and method for routing-based internet security.
  166. Binder, Yehuda, System and method for routing-based internet security.
  167. Binder, Yehuda, System and method for routing-based internet security.
  168. Lan, Sikun; Huang, Yong K.; Frazier, Kent; Sykes, Roy; Zusman, Joseph, System and method for secure message reply.
  169. Lan, Sikun; Huang, Yong K.; Frazier, Kent; Sykes, Roy; Zusman, Joseph, System and method for secure message reply.
  170. Lan, Sikun; Huang, Yong K.; Frazier, Kent; Sykes, Roy; Zusman, Joseph, System and method for secure message reply.
  171. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  172. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  173. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  174. Cataline, Glen R.; Rielly, William Smith; Wallace, William Scott; Sheehan, Mark Robert, System and method for selectable funding of electronic transactions.
  175. Roberts, David A.; Carter, Ronald D.; Rans, Jean-Paul Edmond; Rice, Enda, Systems and methods for operating transaction terminals.
  176. Hong, Xiao; Song, Xiaolan; Dong, Xin; Fei, Huchen; Wang, Lihua, Systems and methods for performing scoring optimization.
  177. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  178. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  179. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  180. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  181. Grawrock, David, Trusted platform module for generating sealed data.
  182. Poisner,David I., Trusted system clock.
  183. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  184. Halcrow, Michael Austin; Kirkland, Dustin C; Ratliff, Emily Jane, User controlled anonymity when evaluating into a role.
  185. Halcrow,Michael Austin; Kirkland,Dustin C.; Ratliff,Emily Jane, User controlled anonymity when evaluating into a role.
  186. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  187. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  188. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  189. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로