$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Message content protection and conditional disclosure 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0184206 (1998-11-02)
발명자 / 주소
  • Ogilvie John W.L.
대리인 / 주소
    Computer Law ++
인용정보 피인용 횟수 : 173  인용 특허 : 13

초록

Methods and systems are provided for controlling the disclosure of sensitive information. Disclosure is controlled in the sense that (a) the information is not disclosed until predefined conditions are met, such as the passage of a certain time without an authorized update request for secrecy, (b) c

대표청구항

[ What is claimed and desired to be secured by patent is:] [1.]1. A method executed by computer(s) for controlling disclosure of sensitive information provided by an information provider, comprising the steps of:obtaining at least one disclosure condition;hiding copies of the sensitive information i

이 특허에 인용된 특허 (13)

  1. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method and apparatus for creating, supporting, and using travelling programs.
  2. Fischer Addison M., Method and apparatus for validating travelling object-oriented programs with digital signatures.
  3. Bailey ; III John E. (207 Leafmore Rd. Rome GA 30165), Method and system for creating and storing a backup copy of file data stored on a computer.
  4. Nielsen Jakob, Method and system for escrowed backup of hotelled world wide web sites.
  5. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets.
  6. Hait John N. (Missoula MT), Secure architecture and apparatus using an independent computer cartridge.
  7. Levy Paul S. ; Cornelius Steve, Secure mass storage system for computers.
  8. Brookes Cyril (Sydney AUX), Selective dissemination of information.
  9. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  10. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  11. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  12. Staheli Vaughn (Payson UT) Miller Mike (Pleasant Grove UT) Francis Sam (Springville UT) Haab Dan (Springville UT) Patten Dan (Orem UT) Johnson Kent (Spanish Fork UT), System and method for remote mirroring of digital data from a primary network server to a remote network server.
  13. Abecassis Max (19020 N.E. 20th Ave. Miami FL 33179), Transaction protection system.

이 특허를 인용한 특허 (173)

  1. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  4. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  5. Peled, Ariel; Carny, Ofir, Apparatus and method for controlling unauthorized dissemination of electronic mail.
  6. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  7. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for compact internetworked wireless integrated network sensors (WINS).
  8. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked hybrid wireless integrated network sensors (WINS).
  9. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked wireless integrated network sensors (WINS).
  10. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep; Merrill, William M., Apparatus for internetworked wireless integrated network sensors (WINS).
  11. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep; Merrill, William M., Apparatus for internetworked wireless integrated network sensors (WINS).
  12. Brettle, Dean; Zadik, Yair, Approach for managing access to messages using encryption key management policies.
  13. Brettle, Dean; Zadik, Yair, Approach for managing access to messages using encryption key management policies.
  14. Brettle, Dean; Zadik, Yair, Approach for managing access to messages using encryption key management policies.
  15. Brettle,Dean; Zadik,Yair, Approach for managing access to messages using encryption key management policies.
  16. Rehling, John Andrew; Dignan, Thomas Gerardo, Assigning sentiment to themes.
  17. Macdonald, Murray, Automated battery and data delivery system.
  18. Miller, Brian Scott; Vaughan, Jack; Ladriere, Oscar Allen, Biometric control of equipment.
  19. Yach, David P.; Brown, Michael S.; Little, Herbert A., Code signing system and method.
  20. Yach, David P.; Brown, Michael S.; Little, Herbert A., Code signing system and method.
  21. Sato,Eiichi, Communication apparatus and method for discriminating confidentiality of received data.
  22. Yoshioka, Shin ichi, Communications control method and system with automatic data congestion preventing function.
  23. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  24. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  25. Dickinson, Alexander G; Berger, Brian; Dobson, Robert T, Context sensitive dynamic authentication in a cryptographic system.
  26. Dickinson,Alexander G.; Berger,Brian; Dobson, Jr.,Robert T., Context sensitive dynamic authentication in a cryptographic system.
  27. Miller, Brian Scott; Vaughan, Jack; LaDriere, Oscar Allen; DiSimone, Gino, Control of equipment using remote display.
  28. Miller, Brian Scott; Vaughan, Jack; LaDriere, Oscar Allen; DiSimone, Gino, Control of equipment using remote display.
  29. Yach, David P.; Brown, Michael Steven; Little, Herbert Anthony, Controlling access by code.
  30. Yach, David Paul; Little, Herbert Anthony; Brown, Michael Stephen, Controlling access by code.
  31. Yach, David Paul; Little, Herbert Anthony; Brown, Michael Stephen, Controlling access by code.
  32. Marvit, Maclen; Rosema, Keith David; Ubois, Jeffrey; Marvit, David, Controlling and tracking access to disseminated information.
  33. Marvit,Maclen; Rosema,Keith David; Ubois,Jeffrey; Marvit,David, Controlling and tracking access to disseminated information.
  34. Sung-Ming Yen TW; Pao-Yu Kuo TW, Cryptographic checksum apparatus.
  35. Chandnani, Anjali; Yann, Trevor, Detection of polymorphic script language viruses by data driven lexical analysis.
  36. Marvit,Maclen; Rosema,Keith David; Ubois,Jeffrey; Marvit,David; Brettle,Dean; Zadik,Yair; Goodnick,Stuart, Dynamic encoding algorithms and inline message decryption.
  37. Yoshizawa,Hiroyuki, Electronic apparatus transmitting electronic mail including image information, a control apparatus, and a storage medium.
  38. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  39. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., Escrowing digital property in a secure information vault.
  40. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., Escrowing digital property in a secure information vault.
  41. Nakisa, Ramin C.; Mackay, Robin, Expert system.
  42. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  43. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  44. Shah, Gaurav; Drewry, William A.; Spangler, Randall; Tabone, Ryan; Gwalani, Sumit; Semenzato, Luigi, Firmware verified boot.
  45. Shah, Gaurav; Drewry, William; Spangler, Randall; Tabone, Ryan; Gwalani, Sumit; Semenzato, Luigi, Firmware verified boot.
  46. Cabrera, Luis Felipe; Theimer, Marvin M.; Kaler, Christopher G., Hidden proactive replication of data.
  47. Thomason, Michael Scott; Arun, Jai S.; Myers, Benjamin L.; Rotermund, Chad C.; Jariwala, Ajit J., Identifying confidential data in a data item by comparing the data item to similar data items from alternative sources.
  48. Piper, Jeffrey James; Franson, Brent Michael; Dignan, Thomas Gerardo, Industry review benchmarking.
  49. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., Information vault, data format conversion services system and method.
  50. Grim, III, Clifton E.; Schmidt, Christopher I; Wilson, John D, Information vault, data format conversion services system and method.
  51. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  52. Dellaripa, David F.; Heilman, Aubrey T; Robbins, Gary, Medical risk underwriting system.
  53. Korn, Rodney A., Method and apparatus for creating and executing secure scripts.
  54. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method and apparatus for distributed signal processing among internetworked wireless integrated network sensors (WINS).
  55. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method and apparatus for internetworked wireless integrated network sensor (WINS) nodes.
  56. Lee, Sung-min; Oh, Seung-jae; Han, Se-hee, Method and apparatus for managing communication security in wireless network.
  57. Agrawal, Mukund S., Method and apparatus for using expiration information to improve confidential data leakage prevention.
  58. Prafullchandra, Hemma; Graves, Michael; Lundberg, Ryan Emory; Granqvist, Hans; Krall, Gary, Method and apparatus to provide an authoring tool to create content for a secure content service.
  59. Horne, Jefferson Delk, Method and system for detecting obfuscatory pestware in a computer memory.
  60. Racabi, Amram, Method and system for real-time accessing of digital data stored on a remote terminal.
  61. Kirsch, Steven T., Method and system for selectively blocking delivery of bulk electronic mail.
  62. Makhoul, Elie; Khan, Zia; Igelman, Marvin, Method and system for wireless message-based advertising.
  63. Challener, David Carroll; Dayan, Richard Alan; Ward, James Peter; Vanover, Michael, Method for associating a pass phase with a secured public/private key pair.
  64. Challener, David Carroll; Dayan, Richard Alan; Ward, James Peter; Vanover, Michael, Method for associating a password with a secured public/private key pair.
  65. Madison, Justin; Rodiger, Anthony; Chintala, Ajay; Florschuetz, Alan S., Method for controlling access to digital content and streaming media.
  66. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Frederic; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  67. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Method for internetworked hybrid wireless integrated network sensors (WINS).
  68. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  69. Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Newberg, Fredric; Pottie, Gregory J., Method for vehicle internetworks.
  70. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  71. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  72. Schneider, Eric, Method, product, and apparatus for processing a data request.
  73. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  74. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  75. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  76. Sivula, Timo, Multimedia message content adaptation.
  77. Spector, Donald, Network for targeting individual operating a microcomputer regardless of his location.
  78. Spector, Donald, Network for targeting individual operating a microcomputer regardless of his location.
  79. Spector, Donald, Network for targeting individual operating a microcomputer regardless of his location.
  80. Spector, Donald, Network for targeting individual operating a microcomputer regardless of his location.
  81. Spector, Donald, Network for targeting individual operating a microcomputer regardless of his location.
  82. Schneider, Eric, Network resource access method, product, and apparatus.
  83. Luber, Del E., Posthumous message delivery system.
  84. Rose, Amy L.; Peterson, Nathan J.; Crowe, John S.; Waltermann, Rod D., Preventing location tracking via smartphone MAC address.
  85. Saxe, James Andrew; Dignan, Thomas Gerardo, Privacy scoring.
  86. Thibadeau, Robert, Protocol scripting language for safe execution in embedded system.
  87. Saxe, James Andrew; Lang, Noah Benjamin; Dignan, Thomas Gerardo; Null, Bradley William, Reputation report with recommendation.
  88. Lang, Noah Benjamin; Saxe, James Andrew; Dignan, Thomas Gerardo; Null, Bradley William, Reputation report with score.
  89. Nakisa, Ramin C.; Mackay, Robin, Rule based expert system for consumer preference.
  90. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  91. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  92. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  93. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  94. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  95. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  96. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  97. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  98. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  99. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  100. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  101. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  102. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  103. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  104. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  105. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  106. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  107. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  108. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  109. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  110. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  111. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  112. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  113. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  114. Grim, III, Clifton; Schmidt, Christopher I.; Wilson, John D., Secure information vault, exchange and processing system and method.
  115. Sutherland,Ivan E., Secure, distributed e-mail system.
  116. Dickinson,Alexander G.; Davenport,Roger S.; Ohare,Mark S.; Clough,Philip W.; Rohrbach,Mark D.; Clayton,Richard F.; Zoccoli,James G.; Stark,Gregory H.; Orsini,Rick L.; Ferrante,Michelle; Brooks,Aaron , Server-side implementation of a cryptographic system.
  117. Yach, David P.; Brown, Michael S.; Little, Herbert A., Software code signing system and method.
  118. Franson, Brent Michael; Piper, Jeffrey James; Dignan, Thomas Gerardo, Stimulating reviews at a point of sale.
  119. Owens, David S., System and computer implemented method of personal monitoring.
  120. Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant; Tapuska, David Francis, System and method for code signing.
  121. Madison,Justin; Rodiger,Anthony; Chintala,Ajay, System and method for controlling access to digital content, including streaming media.
  122. Madison,Justin; Rodiger,Anthony; Chintala,Ajay; Florschuetz,Alan S., System and method for controlling access to digital content, including streaming media.
  123. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  124. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  125. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  126. Peled, Ariel; Carny, Ofir; Troyansky, Lidror; Tirosh, Oren; Roglit, Guy; Gutman, Galit, System and method for monitoring unauthorized transport of digital content.
  127. Peled, Ariel; Carny, Ofir; Troyansky, Lidror; Tirosh, Oren; Roglit, Guy; Gutman, Galit, System and method for monitoring unauthorized transport of digital content.
  128. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  129. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  130. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  131. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Rybak, Michael; Tapuska, David F., System and method for providing an indication of randomness quality of random number data generated by a random data service.
  132. Adams, Neil Patrick; Little, Herbert Anthony; Rybak, Michal Andrzej; Kirkup, Michael Grant; Tapuska, David Francis, System and method for providing an indication of randomness quality of random number data generated by a random data service.
  133. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Tapuska, David F., System and method for registering entities for code signing services.
  134. Pizano, Erix; Peterson, Donald R., System and method for secure and/or interactive dissemination of information.
  135. Pizano, Erix; Peterson, Donald R., System and method for secure and/or interactive dissemination of information.
  136. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  137. Olligschlaeger, Andreas M., System and method for three-way call detection.
  138. Olligschlaeger, Andreas M., System and method for three-way call detection.
  139. Olligschlaeger, Andreas M., System and method for three-way call detection.
  140. Olligschlaeger, Andreas M., System and method for three-way call detection.
  141. Pizano, Erix, System and method of secure encryption for electronic data transfer.
  142. Grim, III, Clifton; Schmidt, Christopher I.; Wilson, John D., System and method to strengthen advertiser and consumer affinity.
  143. Lan, Gang (Tiger); Fertik, Michael; Mir, Saad; Sparrow, Abbey; Harnois, II, Jeffrey A., System and methods for facilitating secure communications on a website.
  144. Lan, Gang (Tiger); Fertik, Michael; Mir, Saad; Sparrow, Abbey; Harnois, II, Jeffrey A., System and methods for facilitating secure communications on a website.
  145. Lan, Gang (“Tiger”); Fertik, Michael; Mir, Saad; Sparrow, Abbey; Harnois, II, Jeffrey A., System and methods for facilitating secure communications on a website.
  146. Morishita,Takuya, System and program for preventing unauthorized copying of software.
  147. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  148. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  149. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  150. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  151. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  152. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  153. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  154. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  155. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  156. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  157. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  158. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  159. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  160. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  161. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  162. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  163. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  164. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  165. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  166. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  167. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  168. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  169. Wang, Sherman; Dignan, Thomas Gerardo, Thematic clustering.
  170. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  171. Martin, Thomas J., Three-way call detection using steganography.
  172. Martin,Thomas J., Three-way call detection using steganography.
  173. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로