$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Proximity detection of valid computer user 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-012/14
  • H04L-009/00
  • H04L-009/32
출원번호 US-0026983 (1998-02-20)
발명자 / 주소
  • Lopes Robert Joseph
출원인 / 주소
  • Lucent Technologies, Inc.
대리인 / 주소
    Bollman
인용정보 피인용 횟수 : 99  인용 특허 : 19

초록

A method and apparatus for continuously authorizing a computer for use. A proximity detection system provides a coded message from a badge on an authorized user to a proximity reader in communication with the computer. The computer contains a process either in its kernel, operating system, and/or ap

대표청구항

[ What is claimed is:] [1.] A proximity detection system for a computer, comprising:a detection module that continuously determines a presence of an authorizing code from an authorized user;a synchronous detection module that continuously detects a presence of a person synchronously with said presen

이 특허에 인용된 특허 (19)

  1. Olson Gary R L ; Ham Eardley L. ; Pichotta Andrew J., Apparatus and method for detecting an object using digitally encoded optical signals.
  2. Lewiner Jacques (Saint Cloud FRX) Hennion Claude (Paris FRX) Leonard Didier (Paris FRX), Coded objects identifiable by proximity and devices for changing the codes of these objects.
  3. Barnsdale ; Jr. William J. (West Sacramento CA) Ford Frank G. (Sacramento CA), Computer security device.
  4. Hale Robert P. (Irvine CA) Kurashige Jason T. (Irvine CA), Computer security system.
  5. Hamilton James H. (Lawrenceville GA) Cavicchi Peter R. (N. Babylon NY) Depew Timothy W. (Ft. Lauderdale FL) Friedman Shelley K. (Boca Raton FL) Kligfeld Edward G. (Ft. Lauderdale FL) Noblett ; Jr. Pa, Data card terminal for receiving authorizations from remote locations.
  6. Tefft Brian (2121 W. Main #3114 Mesa AZ 85202), Input device lock.
  7. Tornai Richard (3125 Avis Way Pinole CA 94564), Method and apparatus for controlling the provision of power to computer peripherals.
  8. Reardon David C. (50 Nottingham Springfield IL 62704), Method for limiting computer access to peripheral devices.
  9. Codina George (North Hollywood CA) Ramamoorthy Chandrasekar (Normal IL) Murr Donna J. (Dunlap IL), Multi-purpose capacitive sensor.
  10. Coveley Michael,CAX, Non-contact proximity detector to detect the presence of an object.
  11. Andrews Greg P., Portable computer and method of providing security for an electronic device.
  12. Duley Raymond S. (Buda TX) Khan Ashfaq R. (Austin TX), Power interrupt device with remote activity detector.
  13. Sanderson Glenn A. (2211 Alameda Padra Serra Santa Barbara CA 93103), Proximity actuator and reader for an electronic access system.
  14. Musa John S. (2 Westervelt Ave. Clifton NJ 07011), Proximity alert and direction indicator.
  15. Lee Mark A. (Camberley GB2), Proximity detector.
  16. Bensimon Daniel (Boca Raton FL) Osborn Neal A. (Delray Beach FL) Pacheco Joaquin F. (Boca Raton FL), Removable computer security device.
  17. Landwehr Carl E. ; Latham Daniel L., Secure identification system.
  18. Kipust Alan J., Security system with proximity sensing for an electronic device.
  19. Dayan Richard A. ; McGovern Joseph P. ; Newman Palmer E., Wireless proximity detector security feature.

이 특허를 인용한 특허 (99)

  1. Himmelstein, Richard B., Accessing an automobile with a transponder.
  2. Himmelstein, Richard B., Accessing an automobile with a transponder.
  3. Given, Paul; Farleigh, Scott E., Activity sensing interface between a computer and an input peripheral.
  4. Himmelstein, Richard B., Advanced wireless vehicle services.
  5. Ruchti, Timothy L.; Markey, Brian G.; Belkin, Anatoly S.; Kotnik, Paul T.; Khair, Mohammad M., Air detection system and method for detecting air in a pump of an infusion system.
  6. Larson, Thane Michael; Malone, Christopher Gregory, Authenticating maintenance access to an electronics unit via wireless communication.
  7. Lo, Yung-Chih; Chou, Feng-Jian; Hsieh, Chih-Yuan; Chang, Wei, Automatic lock and automatic unlock method for computer system and computer system thereof.
  8. Dirie, Herzi, Bios based method to disable and re-enable computers.
  9. Manahan, Peter R.; Nigul, Leho, Centrally controlled proximity based software installation.
  10. Himmelstein, Richard B., Communications between a mobile device and vehicle based computer.
  11. Hassan, Ahmed E.; Chiu, Denny; Wilson, J. F. Sean, Computing device with environment aware features.
  12. Hassan, Ahmed E.; Chiu, Denny; Wilson, J. F. Sean, Computing device with environment aware features.
  13. Hassan, Ahmed E.; Chiu, Denny; Wilson, John Ferguson, Computing device with environment aware features.
  14. Hassan,Ahmed E.; Chiu,Denny; Wilson,J. F. Sean, Computing device with environment aware features.
  15. DeLuca, Michael Joseph, Computing devices and methods for resetting inactivity timers on computing devices.
  16. Cohen, Yair, Continuous digital content protection.
  17. Howarth, Arthur G.; Saville, Roland; Miriyala, Prasad; Prasad, Chandrodaya, Detecting theft and disabling stolen equipment.
  18. Deborgies, Luc, Dynamic pairing device.
  19. Mortensen, Maland Keith; Buckingham, Thomas Bret; Fernandez, Gabriel Carlos; Casillas, Debra Randall, Efficient logon.
  20. Mortensen, Maland Keith; Buckingham, Thomas Bret; Fernandez, Gabriel Carlos; Casillas, Debra Randall, Efficient logon.
  21. Johnson, Zakery Layne; Shelton, John; Casillas, Debra Randall; Buckingham, Thomas Bret; Fernandez, Gabriel Carlos; Rangarajan, Sudarshan; Mortensen, Maland Keith, Efficient startup and logon.
  22. Johnson, Zakery Layne; Shelton, John; Casillas, Debra Randall; Buckingham, Thomas Bret; Fernandez, Gabriel Carlos; Rangarajan, Sudarshan; Mortensen, Maland Keith, Efficient startup and logon.
  23. Srinivasan, Ramanujan; Markovic, Relja; Glassenberg, Samuel, Fast reconfiguration of graphics pipeline state.
  24. Srinivasan, Ramanujan; Markovic, Relja; Glassenberg, Samuel, Fast reconfiguration of graphics pipeline state.
  25. Markovic, Relja; Srinivasan, Ramanujan; Glassenberg, Samuel, Fast variable validation for state management of a graphics pipeline.
  26. Bell,Stephen McMorris; VoBa,Son, Finding location and ranging explorer.
  27. James, Frances, Information control in federated interaction.
  28. Mebed, Amr Mohamed, Information privacy system and method.
  29. Ruchti, Timothy L.; Dharwad, Harsh; Neuhardt, Lynn D.; Perez, Aaron P., Infusion pump automation system and method.
  30. Oruklu, Meriyan; Ruchti, Timothy L.; Kotnik, Paul T.; Belkin, Anatoly S., Infusion system which utilizes one or more sensors and additional information to make an air determination regarding the infusion system.
  31. Himmelstein, Richard B., Locating a target unit in a wireless network.
  32. Hurwitz, Roger A., Locking mobile devices in a personal area network (PAN).
  33. Dircks, Charles E.; Osmann, Eric E., Logon authentication and security system and method.
  34. Kohlbrecher, Christopher, Matching delayed infusion auto-programs with manually entered infusion programs.
  35. Gray, George W.; McQuaid, William C., Medical device management and theft inhibitor techniques.
  36. Arrizza, John; Shults, James R.; Vaccaro, Thomas J.; Ward, Patrick A., Medical device update system.
  37. Holland, Geoffrey N.; Keely, Patrick B.; Pelletier, Jeff; Moran, Charles P.; Silkaitis, Raymond P.; Huang, John W.; Rubalcaba, Jr., Bernardino; McNeela, Martin A.; Haque, Imtiyaz, Medication management system.
  38. Holland,Geoffrey N.; Keely,Patrick B.; Pelletier,Jeff; Moran,Charles P.; Huang,John W.; Fathallah,Marwan; McNeela,Martin A., Medication management system.
  39. Holland,Geoffrey N.; Keely,Patrick B.; Pelletier,Jeff; Moran,Charles P.; Huang,John W.; Fathallah,Marwan; McNeela,Martin A., Medication management system.
  40. Silkaitis, Raymond P.; Holland, Geoffrey N.; Keely, Patrick B.; Pelletier, Jeff, Medication management system.
  41. Girouard, Janice Marie; Hamzy, Mark Joseph; Ratliff, Emily Jane, Method and apparatus for a proximity warning system.
  42. Girouard, Janice Marie; Hamzy, Mark Joseph; Ratliff, Emily Jane, Method and apparatus for a proximity warning system.
  43. Park, Min-Kyu; Kim, Taesu; Yun, Sungrack; Hwang, Kyu Woong; Cho, Jun-Cheol, Method and apparatus for controlling access to electronic devices.
  44. Light, Elliott D.; Roberts, Jon L., Method and apparatus for obtaining telephone status over a network.
  45. Angelo,Michael F.; Toves,Raymond A., Method and apparatus for optimized battery life and authentication in contactless technology.
  46. Sengupta,Uttam K.; Deshpande,Nikhil M., Method and apparatus for providing proximity based authentication, security, and notification in a wireless system.
  47. Lee, Ju-youn; Lee, Sang-hyup, Method and mobile terminal for controlling screen lock.
  48. Sadler, Daniel J.; Moore, Morris Anthony; Oliver, Manuel, Method and system for providing extended authentication.
  49. Noble,Brian D.; Corner,Mark D., Method and system to maintain application data secure and authentication token for use therein.
  50. Noble,Brian D.; Corner,Mark D., Method and system to maintain portable computer data secure and authentication token for use therein.
  51. Holland,Geoffrey N.; Keely,Patrick B.; Pelletier,Jeff; Moran,Charles P.; Huang,John W.; Fathallah,Marwan; McNeela,Martin A., Method for adjusting pump screen brightness.
  52. Dean Klein, Method for automatically initiating a computer security and/or screen saver mode.
  53. Horikoshi, Hideto; Abe, Naoki; Tanaka, Jun; Maruichi, Tomoki, Method for prohibiting unauthorized access in a non-contacting data carrier system.
  54. Yeap, Tet Hin; O'Brien, William G., Method, system and apparatus for accessing a resource based on data supplied by a local user.
  55. Ruetschi, Johannes; Gilbert, Leroy Edwin, Methods and apparatus for managing TLS connections in a large soft switch.
  56. Doub, Mike; Banh, Tuyen, Methods and devices enabling displays of electronic devices based on separation thereof.
  57. Oruklu, Meriyan; Ruchti, Timothy L.; Kotnik, Paul T.; Belkin, Anatoly S.; Markey, Brian G., Multi-sensor infusion system for detecting air or an occlusion in the infusion system.
  58. Dircks, Charles E.; Osmann, Eric E., Network provider loop security system and method.
  59. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  60. Novack, Brian M.; Andrews, Stephanie; Arora, Aditya; Jeffrey, Emlyn C.; Smith, Gary, Networked device access control.
  61. Seligmann, Doree Duncan; Sammon, Michael J.; Brotman, Lynne Shapiro, Peer-to-peer neighbor detection for proximity-based command execution.
  62. Kitagawa,Kenji; Satoyama,Motoaki, Personal authentication system.
  63. Lowensohn,Brent A.; Bellenger,David A.; Braun,Jimmy E.; Grosser,Richard C.; Thompson,David L.; Woodmancy,William J.; Pomerantz,Steven R., Portable wireless access to computer-based systems.
  64. Bjorn Markus Jakobsson, Probabilistic theft deterrence.
  65. Himmelstein, Richard B., Providing access with a portable device and voice commands.
  66. Mark Lignoul, Proximity sensor for screen saver and password delay.
  67. Seligmann, Doree Duncan; Sammon, Michael J.; Brotman, Lynne Shapiro, Proximity-based authorization.
  68. Seligmann, Doree Duncan; Sammon, Michael J.; Brotman, Lynne Shapiro, Proximity-based authorization.
  69. Hessel, Clifford; Smith, David Mark, Removable cryptographic ignition key system and method.
  70. DeLuca, Michael Joseph, Resetting inactivity timer on computing device.
  71. Smith, Ned; Goel, Purushottam; Moore, Victoria, Secure access management of devices.
  72. Smith, Ned; Goel, Purushottam; Moore, Victoria, Secure access management of devices.
  73. Yeap, Tet Hin; Dafu, Lou; O'Brien, William G., Security access device and method.
  74. Himmelstein, Richard B., Security and safety processing by a vehicle based computer.
  75. Waterson, David Lynch, Security methods and systems.
  76. Yeap, Tet Hin; O'Brien, William G.; Lou, Dafu; Xiaoli, Ren, Security system and method.
  77. Elms,Kim; Ruggaber,Rainer; Dorner,Elmar, Sensitive display system.
  78. Golembiowski, Albert, Sub-pixel modification of digital images by locally shifting to an arbitrarily dense supergrid.
  79. Butler, Steven I.; Dunsirn, Todd M.; Frede, Douglas E.; Hedlund, Nancy G.; Polonus, Thomas F.; Pregulman, Steven J.; Ramaker, Torrance J.; Tillery, James E.; Van Huis, Mary Kaye, System and method for comparing and utilizing activity information and configuration information from multiple medical device management systems.
  80. Wehba, Steven R.; Ruchti, Timothy L., System and method for configuring a rule set for medical event management and responses.
  81. Sadler, Daniel J.; Oliver, Manuel; Moore, Morris Anthony, System and method for controlling access to a function performed by a wireless device.
  82. Srinivasa, Srinath Malur; Viswanathan, Venkatesh; Venkatesh, Vinay, System and method for dynamic association of security levels and enforcement of physical security procedures.
  83. Himmelstein, Richard B., System and method for matching users in a wireless communication system.
  84. Light, Elliott D.; Roberts, Jon L., System and method for obtaining a status of an authorization device over a network.
  85. Himmelstein, Richard B., System and method for wireless communication between a vehicle and a mobile unit.
  86. Jablokov, Victor Roman; Pinchuk, Tommy, System and method of monitoring and controlling appliances and powered devices using radio-enabled proximity sensing.
  87. Klein,Dean A., System for automatically initiating a computer security and/or screen saver mode.
  88. Howard, Gary A.; Assadi, Fred; Xin, Yu; Okasinski, Nick; Canup, Thomas; Engebretsen, Steve; Silkaitis, Raymond P.; Holland, Geoffrey N.; Keely, Patrick B.; Awan, Mozammil H., System for maintaining drug information and communicating with medication delivery devices.
  89. Howard, Gary A.; Assadi, Fred; Xin, Yu; Okasinski, Nick; Canup, Thomas; Engebretsen, Steve; Silkaitis, Raymond P.; Holland, Geoffrey N.; Keely, Patrick B.; Awan, Mozammil H., System for maintaining drug information and communicating with medication delivery devices.
  90. Howard, Gary A.; Assadi, Fred; Xin, Yu; Okasinski, Nick; Canup, Thomas; Engebretsen, Steve; Silkaitis, Raymond P.; Holland, Geoffrey N.; Keely, Patrick B.; Awan, Mozammil H., System for maintaining drug information and communicating with medication delivery devices.
  91. Ruchti, Timothy L.; Khair, Mohammad M., System for monitoring and delivering medication to a patient and method of using the same to minimize the risks associated with automated therapy.
  92. Dupouy,David J.; Detiege,Patrick J., System, method, and apparatus for automatic login.
  93. Yee, Dawson; Kuntz, Roy, Techniques for physical presence detection for a communications device.
  94. Epstein, Michael, Temporal proximity to verify physical proximity.
  95. Epstein, Michael, Temporal proximity to verify physical proximity.
  96. Epstein, Michael, Temporal proximity to verify physical proximity.
  97. Carneheim, Caisa; Moynihan, Marie, Terminal authentication procedure timing for data calls.
  98. Richard B. Himmelstein, Voice-controlled vehicle control system.
  99. Brown,Matthew; Mehrpouyan,Hani; Mitchell,Christopher, Wireless computer monitoring device with automatic arming and disarming.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로