$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure database management system for confidential records using separately encrypted identifier and access request 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0229694 (1999-01-13)
발명자 / 주소
  • Ho Andrew P.
대리인 / 주소
    Blakely, Sokoloff, Taylor & Zafman
인용정보 피인용 횟수 : 209  인용 특허 : 12

초록

A system for managing sensitive data is described. The system prevents a system administrator from accessing sensitive data by storing data and identifier information on different computer systems. Each query is encrypted using two codes, the first code readable only by an identifier database and a

대표청구항

[ What is claimed is:] [1.] A method for managing data comprising:transmitting a packet of data including an identifier encrypted in a first code and a data access request encrypted with a second code to a first system, the data access request requesting data corresponding to the identifier, the fir

이 특허에 인용된 특허 (12)

  1. Low Steven H. (Bridgewater NJ) Maxemchuk Nicholas F. (Mountainside NJ) Paul Sanjoy (Atlantic Highlands NJ), Anonymous credit card transactions.
  2. Johansson Jan (Torslanda SEX), Apparatus and method for storing data.
  3. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  4. Herzberg Amir (Ramat-gan ILX) Kutten Shay (Rockaway NJ) Yung Marcel M. (New York NY), Method and apparatus for authenticating users of a communication system to each other.
  5. Bjorklund Ronald E. (Gattieres FRX) Bauchot Frederic (Saint Jeannet FRX) Wetterwald Michele M. (Cagnes Sur Mer FRX) Kutten Shay (Rockaway NJ) Herzberg Amir (Bronx NY), Method and system for key distribution and authentication in a data communication network.
  6. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  7. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  8. Loeb Shoshana K. (Basking Ridge NJ) Yacobi Yacov (Berkeley Heights NJ), Security method for private information delivery and filtering in public networks.
  9. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for access field verification.
  10. Ichikawa Bryan K., System and method for ensuring user privacy in network communications.
  11. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
  12. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.

이 특허를 인용한 특허 (209)

  1. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  2. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  7. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  8. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  9. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Authentication mechanisms to enable sharing personal information via a networked computer system.
  10. Le, Robert; Bean, Timothy; Mctiernan, Kevin, Automatic provisioning of new users of interest for capture on a communication network.
  11. D'Amato, Gianfranco, Cardboard container for drinks and process therefor.
  12. Le, Robert; Dikmen, Cemal; Erbilgin, Bulent; Bean, Timothy, Collecting asymmetric data and proxy data on a communication network.
  13. Umezuki, Takeshi, Communication control apparatus, communication system, information processing apparatus, and communication control method.
  14. Kwan, Khai Hee, Computer program, system and method for on-line issuing and verifying a representation of economic value interchangeable for money having identification data and password protection over a computer network.
  15. Mi, James Q.; Parikh, Vishesh; Teng, Albert Y., Computer system identification.
  16. Porzio, Matthew A.; Fieweger, James Andrew, Computerized method and system for managing a community facility in a networked secure collaborative exchange environment.
  17. Porzio, Matthew A.; Fieweger, James Andrew, Computerized method and system for managing a community facility in a networked secure collaborative exchange environment.
  18. Fieweger, James Andrew, Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment.
  19. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  20. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  21. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  22. Huang, William; Rozin, Liviu; Fieweger, James Andrew, Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment.
  23. Ford, Christopher; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment.
  24. Ford, Christopher Todd; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys.
  25. Ford, Christopher Todd; Callison, Wade; Siddiqui, Fahim; Hakhinian, Mushegh, Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment with customer managed keys.
  26. Meyer, Jerry Lee; Durairaj, Sudhakar; Hakhinian, Mushegh, Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment.
  27. Zhang, Howard; Wang, Li Ming; Liang, Lily L.; Hu, Tawei; Perry, Edward J.; Le, Khanh M., Content management system and methodology employing a tree-based table hierarchy featuring arbitrary information retrieval from different locations in the hierarchy.
  28. Le, Khanh M.; Hu, Tawei; Perry, Edward J.; Zhang, Howard; Liang, Lily L., Content management system and methodology employing a tree-based table hierarchy which accomodates opening a dynamically variable number of cursors therefor.
  29. Hsiao,Hui I; Laue,Matthew; Mega,Cataldo, Content management system and methodology employing non-transferable access tokens to control data access.
  30. Tijare, Parag V.; Hsiao, Hui-I; Richardt, Randy, Content management system and methodology featuring query conversion capability for efficient searching.
  31. Liang,Lily L.; Hu,Tawei; Nelson,Kenneth C.; Choy,David M.; Le,Khanh M.; Perry,Edward J., Content management system and methodology for implementing a complex object using nested/recursive structures.
  32. McCanne, Steven; Demmer, Michael J., Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation.
  33. McCanne, Steven; Demmer, Michael J., Content-based segmentation scheme for data compression in storage and transmission including hierarchical segment representation.
  34. Wirtz,Gijsbrecht Carel; Kalker,Antonius Adrianus Cornelis Maria; Staring,Antonius Adriaan Maria; Haitsma,Jaap Andre; Linnartz,Johan Paul Marie Gerald, Copy control using digital speed bumps.
  35. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Copy protection method and system for digital media.
  36. Kim, Hyung Sun; Stechkine, Alexandre; Kim, Byung Jin; Um, Soung Hyun, Copy protection method and system for digital media.
  37. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Copy protection method for digital media.
  38. Myers, Michael, Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping.
  39. Bharadwaj, Vijay G.; Ferguson, Niels T; Ellison, Carl M.; Nyström, Magnus Bo Gustaf; Zhou, Dayi; Issoupov, Denis; Ureche, Octavian T.; Novotney, Peter J.; Ilac, Cristian M., Cryptographic key management.
  40. Spagnola, Perry M., Data access and anonymity management.
  41. Spagnola, Perry M., Data access and anonymity management.
  42. Margolus, Norman H.; Floyd, Jered J., Data repository and method for promoting network storage of data.
  43. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  44. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  45. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  46. Margolus, Norman H.; Knight, Jr., Thomas F.; Floyd, Jered J.; Homsy, II, George E., Data repository and method for promoting network storage of data.
  47. Margolus,Norman H.; Knight, Jr.,Thomas F., Data repository and method for promoting network storage of data.
  48. Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Hartman,Sam; Homsy, II,George E., Data repository and method for promoting network storage of data.
  49. Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Hartman,Sam; Homsy, II,George E., Data repository and method for promoting network storage of data.
  50. Margolus,Norman H.; Knight, Jr.,Thomas F.; Pratt,Gill A., Data repository and method for promoting network storage of data.
  51. Margolus,Norman H.; Knight, Jr.,Thomas F.; Pratt,Gill A., Data repository and method for promoting network storage of data.
  52. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  53. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  54. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  55. Redlich,Ron M.; Nemzow,Martin A., Data security system and method.
  56. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  57. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  58. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for portable device.
  59. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for separation of user communities.
  60. Redlich,Ron M.; Nemzow,Martin A., Data security system and method responsive to electronic attacks.
  61. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with adaptive filter.
  62. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with editor.
  63. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with multiple independent levels of security.
  64. Redlich,Ron M.; Nemzow,Martin A., Data security system and method with parsing and dispersion techniques.
  65. Redlich, Ron M.; Nemzow, Martin A., Data security system and with territorial, geographic and triggering event protocol.
  66. Nishizawa,Itaru; Ushijima,Kazutomo; Shintani,Takahiko, Database access method and system capable of concealing the contents of query.
  67. Wong, Daniel ManHung, Database processing on externally encrypted data.
  68. Kapoor, Vishal; Cecil, Cole Joseph; Rodgers, David Earl, Deidentified access of data.
  69. Kangho Lee ; James Daniel Wiggins ; David Wayne Bonn ; Randall Craig Boroughs, Device and method for graphically displaying data movement in a secured network.
  70. White, Brian M., Device and method for providing information from a backend component to a frontend component by a secure device management abstraction and unification module.
  71. D'Amato, Gianfranco, Device for producing a stacking projection and container with same.
  72. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  73. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  74. D'Amato, Gianfranco, Double-walled cup.
  75. Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
  76. Meyer, Jerry Lee, Email effectivity facility in a networked secure collaborative exchange environment.
  77. Kritt, Barry Alan; Law, Douglas Alan; Vargas, Juan F., Enabling access to removable hard disk drives.
  78. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  79. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  80. Young, Hadley Rasch, Group based complete and incremental computer file backup system, process and apparatus.
  81. Young, Hadley Rasch, Group based complete and incremental computer file backup system, process and apparatus.
  82. Thompson, Peter, Handling information.
  83. Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  84. Laubner, Guido; Mandavilli, Swamy Jagannadha; Raymond, Robert Lovejoy, Identifier management.
  85. Brown, Douglas P.; Ramesh, Bhashyam; Richards, Anita, Identifying database request sources.
  86. Bhaghavan, Rupa; Hu, Tawei; Nelson, Kenneth Carlin; Richardt, Randal James, Implementing access control for queries to a content management system.
  87. Redlich, Ron M.; Nemzow, Martin A., Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor.
  88. Narita,Izuru; Terashita,Yoshihiko, Information providing method, information providing system and program.
  89. Felsher, David Paul, Information record infrastructure, system and method.
  90. D'Amato, Gianfranco, Insulated container, method of fabricating same and apparatus for fabricating.
  91. D'Amato, Gianfranco, Insulated container, method of fabricating same and apparatus for fabricating.
  92. D'Amato, Gianfranco, Insulated container, method of fabricating same and apparatus for fabricating.
  93. D'Amato, Gianfranco, Insulated cup.
  94. Doddapaneni, Ashok Babu, Intelligent feedback loop to iteratively reduce incoming network data for analysis.
  95. Ford, Christopher Todd, Litigation support in cloud-hosted file sharing and collaboration.
  96. Anttila, Ilkka; Kihlanki, Toivo; Paltemaa, Ilpo, Management of subscriber data in mobile system.
  97. Mellmer, Joseph Andrew; Young, Russell T.; Perkins, Arn D.; Robertson, John M.; Sabin, Jeffrey Neil; McDonald, Michael C.; Phillips, Douglas; Sheridan, Robert Michael; Nazeer, Nadeem Ahmad; Higley, DeeAnne Barker; Carter, Stephen R.; Earl, Douglas G.; Sonderegger, Kelly E.; Ferguson, Daniel T.; Brough, Farrell Lynn, Managing digital identity information.
  98. Nakagawa,Yoshihiro, Medical system with a management software, database, and a network interface to protect patient information from unauthorized personnel.
  99. Shobatake,Yasuro, Message relaying scheme based on switching in units of flows.
  100. Bellovin,Steven Michael, Method and apparatus for a distributed firewall.
  101. Singhal, Tara C., Method and apparatus for facilitating an anonymous information system and anonymous service transactions.
  102. Oliver, Ian Justin, Method and apparatus for providing a structured and partially regenerable identifier.
  103. Hatakeyama, Takahisa; Koizumi, Junichi; Anan, Hidetada; Matsunaga, Hiroshi, Method and apparatus for tracing data in audit trail, and computer product.
  104. Hu,Tawei; Lin,James J.; Nelson,Kenneth C.; Yaung,Alan T.; Richardt,Randy; Liang,Lily L.; Gallagher,Ed; Richardson,Dwayne L., Method and apparatus of parameter passing of structured data for stored procedures in a content management system.
  105. Dean, Timothy; King, Houston; Heimbuch, Ryan, Method and computing device for minimizing accesses to data storage in conjunction with maintaining a B-tree.
  106. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for online document collaboration.
  107. Peled, Ariel; Troyansky, Lidror; Carny, Ofir, Method and system for protecting confidential information.
  108. Peled, Ariel; Troyansky, Lidror; Carny, Ofir, Method and system for protecting confidential information.
  109. Karimzadeh, Mansour Aaron; Schaeffer, Mark Douglas; Dilmanian, F. Avraham; Namdar, Farshad, Method and system for providing a secure multi-user portable database.
  110. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for recording and using a traveler's travel preferences.
  111. Boate,Alan; Reed,Brian, Method and system for securing a computer network and personal identification device used therein for controlling access to network components.
  112. Apte, Naresh Anant, Method and system for temporary network identity.
  113. Redlich, Ron M.; Nemzow, Martin A., Method and system of quantifying risk.
  114. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  115. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  116. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  117. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  118. Bhaghavan,Rupa; Hu,Tawei; Nelson,Kenneth Carlin; Richardt,Randal James, Method for implementing access control for queries to a content management system.
  119. Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Homsy, II,George E., Method for providing access control for data items in a data repository in which storage space used by identical content is shared.
  120. Numao, Masayuki; Watanabe, Yuji, Method for searching a database or data sharing system for the presence of data.
  121. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  122. Mayboroda, Alexander Leonidovich; Smolentsev, Sergey V.; Sall, Mikhail A.; Redkov, Viktor V.; Tikhotsky, Anatoli I., Method of embedding watermark into digital image.
  123. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  124. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  125. Schneider, Eric, Method, product, and apparatus for processing a data request.
  126. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  127. Adams, Mark S.; Muldoon, John M.; Conklin, William Joseph; Jenkins, Richard Edward; Moss, Randie Lee, Methods and systems for interchanging documents between a sender computer, a server and a receiver computer.
  128. Adams, Mark S.; Muldoon, John M.; Conklin, William Joseph; Jenkins, Richard Edward; Moss, Randie Lee, Methods and systems for interchanging documents between a sender computer, a server and a receiver computer.
  129. Adams,Mark S.; Muldoon,John M.; Conklin,William Joseph; Jenkins,Richard Edward; Moss,Randie Lee, Methods and systems for interchanging documents between a sender computer, a server and a receiver computer.
  130. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  131. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  132. Nguyen, Filip; Elias, Filip, Native federation view suggestion.
  133. Schneider, Eric, Network resource access method, product, and apparatus.
  134. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online electronic health record.
  135. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  136. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  137. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online personal library.
  138. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  139. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  140. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information and access of information stored therein.
  141. D'Amato, Gianfranco, Package.
  142. D'Amato, Gianfranco, Package.
  143. D'Amato, Gianfranco, Package.
  144. D'Amato, Gianfranco, Package.
  145. D'Amato, Gianfranco, Package.
  146. Gallagher,Edward Joseph; Ho,Mang Rong, Parameter passing of data structures where API and corresponding stored procedure are different versions/releases.
  147. Gallagher, Edward Joseph; Ho, Mang-Rong, Parameters passing of data structures where API and corresponding stored procedure are different versions/releases.
  148. Kawanaka, Tatsuo, Patient information management method and system employing the same.
  149. Meijer, Henricus Johannes Maria; Viegas, Evelyne; Parastatidis, Savas; Toub, Stephen Harris, Permission based query processing.
  150. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  151. Jeffries, Charles G.; Bharadwaj, Vijay G.; Grass, Michael J.; Setzer, Matthew C.; Sinha, Gaurav; Ellison, Carl M., Portable secure data files.
  152. Jeffries, Charles G.; Bharadwaj, Vijay G.; Grass, Michael J.; Setzer, Matthew C.; Sinha, Gaurav; Ellison, Carl M., Portable secure data files.
  153. Primo Mark Pettovello, Privacy data escrow system and method.
  154. Hughes, Richard Paul; Chiang, Hong-Yu; McFall, Gregory Dean; Spagnola, Perry Michael, Privacy server for protecting personally identifiable information.
  155. Hughes, Richard Paul; Chiang, Hong-Yu; McFall, Gregory Dean; Spagnola, Perry Michael, Privacy server for protecting personally identifiable information.
  156. Hughes, Richard Paul; Chiang, Hong-Yu; McFall, Gregory Dean; Spagnola, Perry Michael, Privacy server for protecting personally identifiable information.
  157. Kuzmich, Vsevolod M.; Ivanov, Igor O., Proprietary watermark system for secure digital media and content distribution.
  158. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  159. Schoenberger, David; Reynolds, Timothy, Real time control of a remote device.
  160. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Restricting use of a digital item stored in a client computer by sending an instruction from a server computer via a network.
  161. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  162. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  163. Schneider,Eric; Schneider,Steven; Heintz,Daniel V., Search engine request method, product, and apparatus.
  164. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  165. Partovi, Shahram; Bird, C. Roger, Secure digital couriering system and method.
  166. Redlich, Ron M.; Nemzow, Martin A., Security system with extraction, reconstruction and secure recovery and storage of data.
  167. Merenda, Ann C.; Potter, Hilon, Sending advertisements to customers.
  168. Isozaki,Yoshimasa, Server apparatus, communication terminal apparatus, delivery system and delivery program.
  169. Veiseh, Nima; Baarman, David W.; Leppien, Thomas Jay, System and markup language for information extraction from stand-alone devices in webspace.
  170. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  171. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  172. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  173. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  174. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  175. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  176. French,Jennifer; Wilder,Jone, System and method for authentication of network users.
  177. Jennifer French ; Jone Wilder, System and method for authentication of network users.
  178. Kerr, II, Robert A., System and method for collecting and transmitting medical data.
  179. Kerr, II, Robert A., System and method for collecting and transmitting medical data.
  180. Kerr, II,Robert A., System and method for collecting and transmitting medical data.
  181. Khulusi, Bassam; Vasic, Ognjen, System and method for dis-identifying sensitive information and associated records.
  182. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  183. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  184. Agrawal, Rakesh; Kiernan, Gerald George, System and method for fast querying of encrypted databases.
  185. Agrawal,Rakesh; Kiernan,Gerald George, System and method for fast querying of encrypted databases.
  186. Fieweger, Andrew; Wadley, Matthew; Azzolino, Angela; Sassin, Michael, System and method for information delivery based on at least one self-declared user attribute.
  187. Meyer, Jerry Lee; Velamoor, Sudhakar; Hakhinian, Mushegh, System and method for managing collaboration in a networked secure exchange environment.
  188. Shell,Scott R.; Butler,Lee M.; Peev,Igor B.; Zhu,Yuhang, System and method for over the air configuration security.
  189. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  190. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  191. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  192. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  193. Le, Robert; Bean, Timothy; Huang, Henry, System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data.
  194. Rubin,Daniel E.; Higer,Bruce; Glaser,Matthew; Rotsart,James; Leighton,Nicholas, System for enabling data processing while maintaining confidentiality.
  195. Pence, Joseph A.; Benge, Brad A.; Zimmerman, Spencer M., System for identifying an individual and managing an account.
  196. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  197. Ford, Christopher Todd; Acharya, Visal Chandrakant; Anstey, Richard David; Awan, Wasif Qayyum; Azmi, Amir M.; Azuma, Selom Harry; Callison, Wade Michael; Cazalot, Clement; Choudhary, Mayank; Cleary, Peter W.; Dsilva, Benedict Robert; Ertunc, Fuat; Genzer, Simon; Giudice, John William; Gordon, Douglas McLean; Gorin, Jonathan; Hakhinian, Mushegh; Held, John; Hovsepian, Ronald W.; Kannan, Ganesh; Landy, John; Lindsay, David Scott; Lirio, Dario R.; Mahajan, Himali; Mangez, Olivier; McCarthy, Kevin L.; McNulty, Kevin; Meyer, Jerry Lee; Miharia, Anupam; Miroslav, Constantin; Mitchell, Andrew James; Mittermaier, Uli P.; Morparia, Harshal; Negrea, Alex; Nikolayeva, Yana; Parimi, Madhavi; Porzio, Matthew A.; Purohit, Vedang Shailesh; Rozin, Liviu; Sappor, Godsway; Schwartz, Glenn; Siddiqui, Fahim; Swamy, Nanu; Tearnen, Paul; Toyloy-Mattera, Karla; Velamoor, Sudhakar; Vora, Margin; Waluk, Michael Joseph; Weiblen, Charlie; Wenzel, Peter; Wong, Jeffery Chi; Yip, Tony; Ghafoor, Khurram, Systems and methods of secure data exchange.
  198. Ford, Christopher Todd; Acharya, Visal Chandrakant; Anstey, Richard David; Awan, Wasif Qayyum; Azmi, Amir M.; Azuma, Selom Harry; Callison, Wade Michael; Cazalot, Clement; Choudhary, Mayank; Cleary, Peter W.; Dsilva, Benedict Robert; Ertunc, Fuat; Genzer, Simon; Giudice, John William; Gordon, Douglas McLean; Gorin, Jonathan; Hakhinian, Mushegh; Held, John; Hovsepian, Ronald W.; Kannan, Ganesh; Landy, John; Lindsay, David Scott; Lirio, Dario R.; Mahajan, Himali; Mangez, Olivier; McCarthy, Kevin L.; McNulty, Kevin; Meyer, Jerry Lee; Miharia, Anupam; Miroslav, Constantin; Mitchell, Andrew James; Mittermaier, Uli P.; Morparia, Harshal; Negrea, Alex; Nikolayeva, Yana; Parimi, Madhavi; Porzio, Matthew A.; Purohit, Vedang Shailesh; Rozin, Liviu; Sappor, Godsway; Schwartz, Glenn; Siddiqui, Fahim; Swamy, Nanu; Tearnen, Paul; Toyloy-Mattera, Karla; Velamoor, Sudhakar; Vora, Margin; Waluk, Michael Joseph; Weiblen, Charlie; Wenzel, Peter; Wong, Jeffery Chi; Yip, Tony; Ghafoor, Khurram, Systems and methods of secure data exchange.
  199. Ford, Christopher Todd; Choudhary, Mayank; McCarthy, Kevin L.; Miharia, Anupam; Giudice, John William; Tadakamalla, Kiran Kumar; Mercer, Cole Parker; Wenzel, Peter; Teamen, Paul; Cazalot, Clement; Darji, Salil J.; Gorin, Jonathan, Systems and methods of secure data exchange.
  200. Carpenter, Todd L.; Steeves, David; Abzarian, David, Trusted internet identity.
  201. Carpenter, Todd L.; Steeves, David; Abzarian, David, Trusted internet identity.
  202. Carpenter, Todd L.; Steeves, David; Abzarian, David, Trusted internet identity.
  203. Herz, Frederick S. M.; Radin, Matthew; Madan, Bhupinder, Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases.
  204. Herz, Frederick S. M.; Radin, Matthew; Madan, Bhupinder, Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases.
  205. Birkhoelzer, Thomas; Krickhahn, Frank; Vaupel, Juergen, User objects for authenticating the use of electronic data.
  206. Colson, Christen J., Verification and authentication systems and methods.
  207. Colson, Christen J., Verification and authentication systems and methods.
  208. Wang, Andy I-Shin; Choy, David M.; Liang, Lily L.; Lin, James J., Version-enabled, multi-typed, multi-targeting referential integrity relational database system and methodology.
  209. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Watermark-based copy management system and method for digital media copy protection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로