$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of and apparatus for providing secure distributed directory services and public key infrastructure 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0352353 (1999-07-13)
발명자 / 주소
  • Richard Patrick,CAX
  • Csinger Andrew,CAX
  • Knipe Bruce,CAX
  • Woodward Bruce,CAX
출원인 / 주소
  • Xcert Software, Inc., CAX
대리인 / 주소
    Testa, Hurwitz & Thibeault, LLP
인용정보 피인용 횟수 : 218  인용 특허 : 9

초록

In an exemplary embodiment, the server receives the client's Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the

대표청구항

[ What is claimed is:] [1.]1. A method for providing secure communications between a client at a first workstation and a computer comprising the steps of:receiving at said computer a request from said client for at least one of information and services, said request including at least one digital ce

이 특허에 인용된 특허 (9)

  1. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  2. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  3. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  4. Blakley ; III George R. (Austin TX) Hickerson L. Brooks (Austin TX) Milman Ivan M. (Austin TX) Gittins Robert S. (Woodland Park CO) Scheer Douglas B. (Boynton Beach FL) Wilson John H. (Austin TX), Method and system for providing a user access to multiple secured subsystems.
  5. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  6. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  7. Shurts Scott A. (Walnut Creek CA), Secure multi-level system for executing stored procedures.
  8. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  9. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.

이 특허를 인용한 특허 (218)

  1. Tang,Puqi; Diep,Timothy; Hlasnik,Wayne, Access control management system utilizing network and application layer access control lists.
  2. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  3. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  4. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  5. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  6. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  7. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  8. Marshall, Roger S.; Zhu, Yinjun, Ancillary data support in session initiation protocol (SIP) messaging.
  9. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  10. Knobl,Karl Heinz; Menzenbach,Christof; Eibach,Wolfgang G; Nuttall,Mark Patrick; Phippen,Robert William, Apparatus and method for establishing communication in a computer network.
  11. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  12. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  13. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  14. Zhu, Yinjun; Thompson, Paul, Area event handling when current network does not cover target area.
  15. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  16. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  17. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  18. McFarland, Keith A., Authentication via motion of wireless device movement.
  19. McFarland, Keith A., Authentication via motion of wireless device movement.
  20. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  21. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  22. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  23. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  24. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  25. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  26. Aull, Kenneth W., Chain of trust processing.
  27. Aull,Kenneth W., Chain of trust processing.
  28. Ishizaki, Takeshi; Takihiro, Masatoshi; Takada, Osamu; Setoyama, Tohru; Yoshida, Kenichi, Communication network system and method for controlling services in a communication network system.
  29. Jayaram,Sankar; Jayaram,Uma; McDonald,Michael M.; Sorenson,Robert; Evans,Daniel; Cramer,David, Computational geometry system, interrupt interface, and method.
  30. Kravitz, David W.; Goldschlag, David M., Conditional access via secure logging with simplified key management.
  31. Hines, Gordon John; Cousins, Will, Consequential location derived information.
  32. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  33. Hoffberg, Steven M., Detection and alert of automobile braking event.
  34. Ginter, Jr., Thomas; Ali, Salman; Pann, Tim, Device independent caller data access for emergency calls.
  35. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  36. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  37. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  38. Ferguson, Niels Thomas, Efficient distribution of computation in key agreement.
  39. Thompson, Paul C., Efficient prisoner tracking.
  40. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  41. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  42. Dickinson, Richard; Hines, Gordon John; Croy, Jonothan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  43. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  44. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  45. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  46. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  47. Zhu, Yinjun, Extended area event for network based proximity discovery.
  48. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  49. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  50. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  51. Haney, Richard D., Formation of wireless device location sharing group.
  52. Hoffberg, Steven M., Game theoretic prioritization system and method.
  53. Pitt, Lance Douglas, GeoNexus proximity detector network.
  54. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  55. Rossmann, Alain, Hybrid systems for securing digital assets.
  56. Ehrlich, Robert; Mitchell, Donald L.; Marshall, Roger S.; Hines, Gordon John, Index of suspicion determination for communications request.
  57. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  58. Ghozati, Kambiz; Thompson, Paul, Intelligent load balancer enhanced routing.
  59. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  60. Fenlon, Peter; Davies, Andrew; Tindall, Kenneth, Internet-connected devices.
  61. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  62. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  63. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  64. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  65. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  66. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  67. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  68. Hines,Gordon John; Tapia,Mario G.; Cousins,Will; Carey,Patrick, Location derived presence information.
  69. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  70. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  71. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  72. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  73. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  74. Haney, Richard D., Location sharing group for services provision.
  75. Haney, Richard D., Location sharing group map management.
  76. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  77. Frieden,Kurt; Rudominer,Mitchell B.; Markoff,Matthew S., Managing secure resources in web resources that are accessed by multiple portals.
  78. Frieden,Kurt; Rudominer,Mitchell B.; Markoff,Matthew S., Managing secure resources in web resources that are accessed by multiple portals.
  79. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  80. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  81. Sannino, Roberto Valerio; Sozzani, Fabio; Bertoni, Guido Marco; Pelosi, Gerardo; Fragneto, Pasqualina, Message deciphering method, system and article.
  82. Pasieka,Michael S., Method and apparatus for revocation list management.
  83. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  84. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  85. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  86. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  87. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  88. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  89. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  90. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  91. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  92. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  93. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  94. Vainstein, Klimenty, Method and system for managing security tiers.
  95. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  96. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  97. Nath, Satyajit, Method and system for providing document retention using cryptography.
  98. Nath, Satyajit, Method and system for providing document retention using cryptography.
  99. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yongqiang, Method and system for secure authentication of a user by a host system.
  100. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yongqiang, Method and system for secure authentication of a user by a host system.
  101. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  102. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  103. Grandcolas,Michael L.; Law,France; Doshi,Ashwin; Williams,Michael; Jang,Yeona; Merschen,Toni; Pan,Jack, Method and system for single sign-on user access to multiple web servers.
  104. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  105. Powers,Calvin S.; Presler Marshall,Martin, Method for automatically managing information privacy.
  106. Sozzani, Fabio; Sannino, Roberto Valerio; Bertoni, Guido Marco; Pelosi, Gerardo; Fragneto, Pasqualina, Method for establishing a communication between two devices.
  107. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  108. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  109. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  110. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  111. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  112. Novack, Brian M.; Dunmire, David L.; Madsen, Daniel L.; Cheaney, Michael D.; Thompson, Timothy R., Methods and apparatus to certify digital signatures.
  113. Novack, Brian M.; Dunmire, David L.; Madsen, Daniel L.; Cheaney, Michael D.; Thompson, Timothy R., Methods and apparatus to certify digital signatures.
  114. Novack, Brian M.; Dunmire, David L.; Madsen, Daniel L.; Cheaney, Michael D.; Thompson, Timothy R., Methods and apparatus to certify digital signatures.
  115. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  116. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  117. Haney, Richard D., Methods and systems for annotating target locations.
  118. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  119. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  120. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  121. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  122. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yonggiang, Methods and systems for secure authentication of a user by a host system.
  123. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  124. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  125. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  126. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  127. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  128. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  129. Little, Herbert A.; Hobbs, Dale J., Mobile access to lightweight directory access protocol (LDAP) server.
  130. Dickinson, Richard, Mobile automatic location identification (ALI) for first responders.
  131. Hoffberg, Steven M., Mobile communication device.
  132. Zhu, Yinjun, Mobile internet protocol (IP) location.
  133. Zhu, Yinjun, Mobile internet protocol (IP) location.
  134. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  135. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  136. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  137. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  138. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  139. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., No responders online.
  140. Blinn, Arnold; Hagan, Cynthia; Gillett, Don, Outsourcing of email hosting services.
  141. Blinn, Arnold; Hagan, Cynthia; Gillett, Don, Outsourcing of instant messaging hosting services.
  142. Poustchi, Behrouz; Gagnon, Natalie Ann; Stelzig, James Andrew, Peer discovery.
  143. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  144. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  145. Rhodes, Jeffrey C.; Luo, Tong; Burton, Victor; Conner, Christine, Public safety access point (PSAP) selection for E911 wireless callers in a GSM type system.
  146. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  147. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., Rapid assignment dynamic ownership queue.
  148. Karchov, David, Relying party trust anchor based public key technology framework.
  149. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  150. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  151. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  152. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  153. Thompson, Paul; Hines, Gordon John, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices.
  154. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  155. Garcia,Denis Jacques Paul, Secured data format for access control.
  156. Fishman, Neil S; Blinn, Arnold N, Securing a server in a dynamic addressing environment.
  157. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  158. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  159. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  160. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  161. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  162. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  163. Poremba, Todd, Special emergency call treatment based on the caller.
  164. Moffat, Darren J.; Belgaied, Kais; Sangster, Paul, System and computer readable medium for verifying access to signed ELF objects.
  165. Choy, David Mun-Hien, System and method for RDBMS to protect records in accordance with non-RDBMS access control rules.
  166. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  167. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  168. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  169. Tam, Chung Ming; Gill, Paramjit S.; Gill, Barjinderpal S., System and method for creating a secure trusted social network.
  170. Hoffberg, Steven M., System and method for determining contingent relevance.
  171. Choy,David Mun Hien; Raghavan,Sriram, System and method for ensuring referential integrity for heterogeneously scoped references in an information management system.
  172. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  173. Choy, David Mun-Hien, System and method for inheriting access control rules.
  174. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  175. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  176. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  177. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  178. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  179. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  180. Coleridge, Robert, System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths.
  181. Little, Herbert Anthony; Hobbs, Dale J., System and method of mobile lightweight cryptographic directory access.
  182. Ronda, Troy Jacob; Roberge, Pierre Antoine; Engel, Patrick Hans; McIver, Rene; Wolfond, Greg; Boysen, Andre, System and methods for online authentication.
  183. Ronda, Troy Jacob; Roberge, Pierre Antoine; Engel, Patrick Hans; McIver, Rene; Wolfond, Gregory Howard; Boysen, Andre Michael, System and methods for online authentication.
  184. Ronda, Troy Jacob; Roberge, Pierre Antoine; Engel, Patrick Hans; McIver, Rene; Wolfond, Gregory Howard; Boysen, Andre Michel, System and methods for online authentication.
  185. Ronda, Troy Jacob; Roberge, Pierre Antoine; Engel, Patrick Hans; McIver, Rene; Wolfond, Gregory Howard; Boysen, Andre Michel, System and methods for online authentication.
  186. Ronda, Troy Jacob; Roberge, Pierre Antoine; Engel, Patrick Hans; McIver, Rene; Wolfond, Gregory Howard; Boysen, Andre Michel, System and methods for online authentication.
  187. Ronda, Troy Jacob; Roberge, Pierre Antoine; Engel, Patrick Hans; McIver, Rene; Wolfond, Gregory Howard; Boysen, Andre Michel, System and methods for online authentication.
  188. Boysen, Andre Michel; Wolfond, Gregory; Roberge, Pierre Antoine; Engel, Patrick Hans; Ronda, Troy Jacob, System and methods for providing identity attribute validation in accordance with an attribute disclosure profile.
  189. Powers, Calvin S.; Presler-Marshall, Martin, System and program product for automatically managing information privacy.
  190. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  191. Kanai, Yoichi; Yachida, Masuyoshi; Mizuno, Tomio; Furukawa, Tatsuya; Ishikawa, Yoichi, System, method and computer readable medium for certifying release of electronic information on an internet.
  192. Kanai,Yoichi; Yachida,Masuyoshi; Mizuno,Tomio; Furukawa,Tatsuya; Ishikawa,Yoichi, System, method and computer readable medium for certifying release of electronic information on an internet.
  193. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  194. Haney, Richard D., Techniques for sharing position data between first and second devices.
  195. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  196. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  197. Haney, Richard D., Tracking proximity of services provider to services consumer.
  198. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  199. Fahn, Paul Neil; Semple, James, URL-based certificate in a PKI.
  200. Fahn, Paul Neil; Semple, James, URL-based certificate in a PKI.
  201. Fahn, Paul Neil; Semple, James, URL-based certificate in a PKI.
  202. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank 911 calls.
  203. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  204. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  205. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  206. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  207. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  208. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  209. Hind, John R.; Peters, Marcia L., Using device certificates for automated authentication of communicating devices.
  210. Hind, John R.; Peters, Marcia L., Using device certificates to authenticate servers before automatic address assignment.
  211. Blinn, Arnold; Hagan, Cynthia; Gillett, Don, Validation of domain name control.
  212. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  213. Croy, Jon; Hines, John Gordon; Johnson, Darrin; Lendvay, Kathleen, Voice over internet protocol (VoIP) multi-user conferencing.
  214. Mitchell, Jr., Donald L.; Marshall, Roger S.; Singer, Andrew; Aryana, Firdaus, Wireless emergency caller profile data delivery over a legacy interface.
  215. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  216. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  217. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  218. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로