$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Role-based navigation of information resources 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0248764 (1999-02-12)
발명자 / 주소
  • Teresa Win
  • Emilio Belmonte
출원인 / 주소
  • Entrust, Inc.
대리인 / 주소
    Marcel K. Bingham
인용정보 피인용 횟수 : 416  인용 특허 : 24

초록

A single secure sign-on gives a user access to authorized Web resources, based on the user's role in the organization that controls the Web resources. The information resources are stored on a protected Web server. A user of a client or browser logs in to the system. A runtime module on the protecte

대표청구항

1. In a World Wide Web computer system, a computer-implemented method of controlling access to one or more resources to which access is controlled through a Web server, the method comprising the steps of:the Web server receiving information describing a user; said Web server causing transmission of

이 특허에 인용된 특허 (24)

  1. Zuili Patrick,FRX ; Ice Edward, Adaptive communication system enabling dissimilar devices to exchange information over a network.
  2. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  3. Himmel Maria Azua, Customization of web pages based on requester type.
  4. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  5. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  6. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  7. Kuhn D. Richard, Implementation of role-based access control in multi-level secure systems.
  8. Barkley John ; Cincotta Anthony V., Implementation of role/group permission association using object access type.
  9. Bunnell Karl Lee, Method and apparatus for acquiring authorized access to resources in a distributed system.
  10. Ueno Hitoshi,JPX ; Fukuda Kenichi,JPX ; Chujo Takafumi,JPX, Method and device for generating access-control lists.
  11. Deinhart Klaus,DEX ; Gligor Virgil ; Lingenfelder Christoph,DEX ; Lorenz Sven,DEX, Method and system for advanced role-based access control in distributed and centralized computer systems.
  12. Goldberg Max Motti ; Gates Melodi Mosley ; Ericksen Susan Barbara ; White William O., Method and system for authenticating and auditing access by a user to non-natively secured applications.
  13. Nessett Danny M. ; Tock Theron D., Method and system for facilitating access control to system resources in a distributed computer system.
  14. Laursen Andrew L. ; Martin ; Jr. Bruce K. ; Rossmann Alain S., Method and system for self-provisioning a rendezvous to ensure secure access to information in a database from multiple devices.
  15. Ooki Masayoshi,JPX ; Nishimoto Kouji,JPX ; Hama Nobuyuki,JPX, Method for accessing information.
  16. Cianfrocca Francis ; Sohn Adam H., Secure middleware and server control system for querying through a network firewall.
  17. Nemoto Kazuo,JPX, Secure network authentication server via dedicated serial communication path.
  18. Hart ; Jr. Edward C. ; Kiernan Casey Lang ; Rajarajan Vij, Secure remote access computing system.
  19. McVitie David G. (Congleton GBX), Security method for a distributed data processing system.
  20. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  21. Fisher Bart Lee ; Bapat Subodh, System and method for providing database access control in a secure distributed network.
  22. He Jingsha, System and method for single sign-on to a plurality of network elements.
  23. Hoffman Richard D. (Austin TX), System for determining direct and indirect user access privileges to data base objects.
  24. Barkley John, Workflow management employing role-based access control.

이 특허를 인용한 특허 (416)

  1. Kalofonos, Dimitris; Antoniou, Zoe; Reynolds, Franklin, Access rights used for resource discovery in peer-to-peer networks.
  2. Kalofonos, Dimitris; Antoniou, Zoe; Reynolds, Franklin, Access rights used for resource discovery in peer-to-peer networks.
  3. Chen, Yuqun; Peinado, Marcus, Access unit switching through physical mediation.
  4. Pfitzner,Ingo, Accessing data based on user identity.
  5. Pfitzner,Ingo, Accessing data in a computer network.
  6. Pfitzner,Ingo, Accessing data stored in multiple locations.
  7. Kapczynski, Mark Joseph; Dean, Michael John; Hunt, III, Herbert Harris, Account vulnerability alerts.
  8. Burger, Michael, Adjustment of knowledge-based authentication.
  9. Kapczynski, Mark Joseph; Dean, Michael John, Aggregating user web browsing data.
  10. Kuroda, Yasutsugu; Yoshioka, Takashi; Ono, Etsuo, Apparatus and method for managing electronic original data.
  11. Lao, Katherine B.; Kosaka, Naohiko, Application-based profiles of printer driver settings.
  12. Ishigaki, Yoshinobu; Numao, Masayuki; Yuriyama, Madoka; Watanabe, Yuji, Attribute information providing method.
  13. Ishigaki, Yoshinobu; Numao, Masayuki; Yuriyama, Madoka; Watanabe, Yuji, Attribute information providing system.
  14. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  15. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  16. Exton, Scott Anthony; Powell, Michael; Turner, Brian James, Authorization model for administration.
  17. Wu, Yuhua, Automated authentication of software applications using a limited-use token.
  18. Giblin, Christopher J.; Vukovic, Maja, Automated role adjustment in a computer system.
  19. Molloy,Christopher L; Quesenberry,Gary M; Robinson,Robert, Automatic data interpretation and implementation using performance capacity management framework over many servers.
  20. Hu, Hua; Torrez, Luz M., Automatic generation of code for attributes.
  21. Kuehr-McLaren, David G.; Gupta, Pratik; Sampathkumar, Govindaraj; Williams, Vincent C.; Cutcher, Sharon L.; Taank, Sumit; Stube, Brian A.; Shankar, Hari, Automatic policy generation based on role entitlements and identity attributes.
  22. Kapczynski, Mark Joseph; Dean, Michael John, Bill payment and reporting.
  23. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  24. Bate,Lyle; Carter,Stephen R.; Nevarez,Carlos A., Caching and accessing rights in a distributed computing system.
  25. Katz,Ariel; Sagiv,Yifat; Friedel,Guy; Heckerman,David E.; Douceur,John R.; Goodman,Joshua, Caching techniques for streaming media.
  26. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  27. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  28. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  29. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  30. Wasser, Jeremy; Felice-Steele, Michelle; Nies, Melinda; Giltner, Luke, Circular rotational interface for display of consumer credit information.
  31. Malik,Dale W., Communications and information resource manager.
  32. Rouse, John D.; Delaney, Raymond P., Confidence-based authentication.
  33. Girulat, Jr., Rollin M., Consumer data request fulfillment system.
  34. Chi, Timothy Rotau; Cane, Daniel; Oerter, Lara; Finnefrock, Jessica; Everhart, Deborah; Chasen, Michael Lewis, Content system and associated methods.
  35. Dean, Michael John; Kapczynski, Mark Joseph, Credit card account data extraction.
  36. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Credit report timeline user interface.
  37. Wasser, Jeremy; Felice-Steele, Michelle; Nies, Melinda; Giltner, Luke, Credit score goals and alerts systems and methods.
  38. Arnold, Karl; Hunt, III, Herbert Harris, Credit utilization tracking and reporting.
  39. Perkins,Gregory Eugene; Sandfort,Patrick O'Neil; Simpson,Shell Sterling, Data access in a distributed environment.
  40. Scheidl, Stefan; Brand, Stephan; Licht, Nico; Reichenberger, Klaus; Heimann, Archim; Moldaner, Steffen, Data search using context information.
  41. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  42. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  43. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Delegated administration for a distributed security system.
  44. Duvvuru, Sreeram, Differentiated quality of service context assignment and propagation.
  45. Kapczynski, Mark Joseph, Digital identity.
  46. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  47. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  48. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  49. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Distributed enterprise security system.
  50. Yared, Peter; Ellison, Gary; Hapner, Mark; Abrahams, Larry; Finkelstein, Sheldon J.; Stern, Hal; Beatty, John D.; Ranganathan, Aravindan; Allavarpu, Sai, Distributed network identity.
  51. Yared, Peter; Ellison, Gary; Hapner, Mark; Abrahams, Larry; Finkelstein, Sheldon J.; Stern, Hal; Beatty, John D.; Ranganathan, Aravindan; Allavarpu, Sai, Distributed network identity.
  52. Yared, Peter; Ellison, Gary; Hapner, Mark; Abrahams, Larry; Finkelstein, Sheldon J.; Stern, Hal; Beatty, John D.; Ranganathan, Aravindan; Allavarpu, Sai, Distributed network identity.
  53. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  54. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  55. Hayes,Terry N.; Behera,Prasanta, Domain specification system for an LDAP ACI entry.
  56. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  57. Dettinger, Richard D.; O'Brien, Terrence R.; Stevens, Richard J., Dynamic functional module availability.
  58. Feldman, Samuel; Ho, Ming, Dynamic role based authorization system and method.
  59. Newman, Robert D.; Schleicher, Sanford, E-mail synchronization between heterogeneous mail servers.
  60. Haegele, Gerald Eugene, Electronic catalogs that provide hierarchical access for buyers of goods and services.
  61. Masters, Richard R., Enabling application level persistence between a server and another resource over a network.
  62. Newcombe, Christopher Richard; Jones, Paul David; Ellis, Richard Donald; Birum, Derrick Jason, Enabling content security in a distributed system.
  63. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  64. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced privacy protection in identification in a data communications network.
  65. Cotton,Todd; Gardner,Karen M.; Konitzer,Robert; VanSant,Mary Jane, Enterprise framework and applications supporting meta-data and data traceability requirements.
  66. Ambrosini, Martin A.; Nusbickel, Wendi L.; Yoder, Brian E., Extendible access control for lightweight directory access protocol.
  67. Appiah, Madan R.; Pearson, Malcolm Erik; Kershaw, Daniel, External access and partner delegation.
  68. Lee,Se Hyun; Ryu,Young Jun; Moon,Sung Kwang, Extranet access management apparatus and method.
  69. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  70. Malik,Dale W., Group access management system.
  71. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  72. Bone, Jeff G.; Arbilla, Laura; Zoellner, Keith; Might, Bradley; Lee, Peter A.; Funderburg, Brett A.; Jimenez, A. Paul, Harvesting file system metsdata.
  73. Smith, Debra, Hierarchical entitlement system with integrated inheritance and limit checks.
  74. Woodward, Bruce G.; Smith, Debra; Pledereder, Richard, Hierarchical entitlement system with integrated inheritance and limit checks.
  75. Zurmuehl, Martin, Home and area pages.
  76. Rossmann, Alain, Hybrid systems for securing digital assets.
  77. Sanin, Aleksey; Toomey, Christopher; Keister, Alan; Wick, Andrew L.; Watkins, Robert; Zhang, Xiaopeng; Richards, Russell; Eaves, Donald, Implementing single sign-on across a heterogeneous collection of client/server and web-based applications.
  78. Sanin, Aleksey; Toomey, Christopher; Keister, Alan; Wick, Andrew L.; Watkins, Robert; Zhang, Xiaopeng; Richards, Russell; Eaves, Donald, Implementing single sign-on across a heterogeneous collection of client/server and web-based applications.
  79. Sanin,Aleksey; Toomey,Christopher; Keister,Alan; Wick,Andrew L.; Watkins,Robert; Eaves,Donald; Zhang,Xiaopeng; Richards,Russell, Implementing single sign-on across a heterogeneous collection of client/server and web-based applications.
  80. Franz,Gregory J., Information distribution system and method.
  81. Tomida,Naoyuki; Kawato,Kenjiro, Information processing system.
  82. Feller, Todd Stacy Leo, Initiating operating system commands based on browser cookies.
  83. Chang, David Yu; Chao, Ching-Yun, Integrated security roles.
  84. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  85. Paunikar, Amit; Singh, Bikramjit, Intelligent network address translator and methods for network address translation.
  86. Paunikar, Amit; Singh, Bikramjit, Intelligent network address translator and methods for network address translation.
  87. Paunikar, Amit; Singh, Bikramjit, Intelligent network address translator and methods for network address translation.
  88. Paunikar, Amit; Singh, Bikramjit, Intelligent network address translator and methods for network address translation.
  89. Alcorn, Robert L.; Cane, Daniel E.; Chasen, Michael L.; Chi, Timothy R.; Gilfus, Stephen R.; Perian, Scott; Pittinsky, Matthew L., Internet-based education support system and methods.
  90. Alcorn,Robert L.; Cane,Daniel E.; Chasen,Michael L.; Chi,Timothy R.; Gilfus,Stephen R.; Perian,Scott; Pittinsky,Matthew L., Internet-based education support system and methods.
  91. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin; Webb,Brian, Legacy host system hot link modeling and navigation.
  92. Dean, Michael John; Kapczynski, Mark Joseph, Lifescore.
  93. Spicer, Steven; Martin, Christopher; Pidduck, Patrick; Lehan, Tim; Pereira, Kathy, Limited-bandwidth electronic data communication system field of the invention.
  94. Meijer, Henricus Johannes Maria; Ozzie, Raymond E; Bergstraesser, Thomas F.; Connolly, Michael; Glasser, Daniel S.; MacLaurin, Matthew B.; Raghavan, Kartik N., Location management of off-premise resources.
  95. Satomaa,Jari; Pudas,Hannu; Jalava,Mika, Managing a network security application.
  96. Richter, John D., Managing electronic information.
  97. Bone, Jeff G.; Funderberg, Brett A.; Jimenez, A. Paul; Arbilla, Laura, Managing file systems and file-based data storage.
  98. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  99. Zhang,Liping, Method and apparatus for a professional practice application.
  100. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  101. Lewis, Michael; King, Frank; Arnold, Thomas; Wright, William; Pettit, John, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  102. Lewis, Michael; King, Frank; Arnold, Thomas; Wright, William; Pettit, John, Method and apparatus for generating a bi-gram score in fraud risk analysis.
  103. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  104. Bone, Jeff G.; Funderburg, Brett A.; Jimenez, A. Paul; Arbilla, Laura, Method and apparatus for managing file systems and file-based data.
  105. Chatterjee,Surajit; Mizelle,Brian Keith; Raghavasimhan,Ravi Puduchery; Fishman,Michael, Method and apparatus for managing workflow in a single sign-on framework.
  106. Porter, Swain W., Method and apparatus for protectively operating a data/information processing device.
  107. Keene, Catherine M.; Lin, Raymond; Sadhureddy, Rao, Method and apparatus for providing controlled access to software objects and associated documents.
  108. Basibes, Mounir Emil; Haugh, Julianne Frances, Method and apparatus for providing process-based access controls on computer resources.
  109. Basibes,Mounir Emil; Haugh,Julianne Frances, Method and apparatus for providing process-based access controls on computer resources.
  110. Anderson, Scott William, Method and apparatus for providing selective access to information.
  111. Lo, Lewis, Method and apparatus for role mapping methodology for user registry migration.
  112. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  113. Kuffel, Irene H.; Kok, Wilson; Fine, Michael; Maino, Fabio R.; Lau, Jed Lin, Method and apparatus for securely disseminating security server contact information in a network.
  114. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  115. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  116. Kleinsteiber,James; Hammons,Richard L.; Balasubramanian,Shankar, Method and apparatus for starting up a network or fabric.
  117. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  118. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  119. Prasad, Ranjan; Dashora, Vinod, Method and apparatus for using a role based access control system on a network.
  120. Megiddo, Nimrod; Modha, Dharmendra Shantilal, Method and program product for maintaining security of publicly distributed information.
  121. Broden, Theresa W.; Codoy, Glenn C.; Murphy, Jane M.; Musa, Mark A.; Wilson, Sherry L., Method and program storage device for managing a supplier for participation in a plurality of trading networks.
  122. Song, Yu; Cheng, Doreen; Messer, Alan, Method and system for authentication between electronic devices with minimal user intervention.
  123. Newcombe,Christopher Richard, Method and system for binding kerberos-style authenticators to single clients.
  124. Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason, Method and system for controlling bandwidth on client and server.
  125. Mikhail,Grinshetyn; Chang,Matthias E.; Wong,Hok Yee; Chao,Anthony; Graham,Mark, Method and system for data capture with hidden applets.
  126. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for delayed cookie transmission in a client-server architecture.
  127. Pettitt, John Philip, Method and system for detecting fraud in a credit card transaction over the internet.
  128. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for determining receipt of a delayed cookie in a client-server architecture.
  129. Jones,Paul David; Newcombe,Christopher Richard; Ellis,Richard Donald; Birum,Derrick Jason; Thompson,Mikel Howard, Method and system for effectively communicating file properties and directory structures in a distributed file system.
  130. Newcombe,Christopher Richard; Jones,Paul David; Ellis,Richard Donald; Birum,Derrick Jason, Method and system for enabling content security in a distributed system.
  131. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  132. Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
  133. Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
  134. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  135. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  136. Newcombe,Christopher Richard; Jones,Paul David, Method and system for load balancing an authentication system.
  137. Vainstein, Klimenty, Method and system for managing security tiers.
  138. Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason; Thompson, Mikel Howard, Method and system for preloading resources.
  139. O'Leary, Denis; D'Agostino, Vincent; Re, S. Richard; Burney, Jessica; Hoffman, Adam, Method and system for processing internet payments.
  140. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  141. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  142. Nath, Satyajit, Method and system for providing document retention using cryptography.
  143. Nath, Satyajit, Method and system for providing document retention using cryptography.
  144. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  145. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  146. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  147. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  148. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  149. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  150. Kanaparti, Shrikant; Song, Yu; Cheng, Doreen; Messer, Alan, Method and system for remotely accessing devices in a network.
  151. Ghaffar,Junaid, Method and system for secure network service.
  152. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  153. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  154. Boysko, Glenn J.; Hurwood, William; Li, Benjamin Z.; Warikoo, Abhimanyu, Method and system for security and user account integration by reporting systems with remote repositories.
  155. Birum,Derrick Jason; Newcombe,Christopher Richard; Jones,Paul David; Ellis,Richard Donald; Thompson,Mikel Howard, Method and system for upgrading and rolling back versions.
  156. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  157. Sarkar, Debasish; Shetty, Manoj; Vargantwar, Sachin R.; Oroskar, Siddharth S.; Rai, Deveshkumar, Method and system for zone based paging based on congestion.
  158. Narayanan,Lakshmi, Method for controlled and audited access to privileged accounts on computer systems.
  159. Yan, Shunguo, Method for device dependent access control for device independent web content.
  160. Chan, Victor S.; Khusial, Darshanand; Mirlas, Lev; Philip, Wesley M., Method for granting user privileges in electronic commerce security domains.
  161. Chang,David Yu; Chao,Ching Yun, Method for integrated security roles.
  162. Chin,Hung Liang; Liao,Yi Ming; Hsieh,Ming Hsiao; Lu,Po Wen; Lee,Mhing Fen, Method for integrating multiple web servers based on individual client authorization.
  163. Kogan, Sandra L.; Wilcox, Eric M., Method for tracking the status of a workflow using weblogs.
  164. Betros,Kim; Chidiac,Ghassan; Gupta,Sanjay; Nordyke,Jeff; Palleschi,Giancarlo; Rosenthal,Matthew; Roubiecek,Evan E.; Vimba,Arnie O.; Zarnick,Michael, Method, system and program product for enabling authorized access and request-initiated translation of data files.
  165. Dayon, Alexandre, Method, system, and computer program product for locating network files.
  166. Dayon, Alexandre, Method, system, and computer program product for locating network files.
  167. Broden, Theresa W.; Godoy, Glenn C.; Murphy, Jane M.; Musa, Mark A.; Wilson, Sherry L., Method, system, and storage device for managing trading network packages for a plurality of trading networks.
  168. Boss, Gregory J.; Hamilton, II, Rick A.; Jones, Andrew R.; McConnell, Kevin C.; Mitchell, Alan P.; Wentworth, Robert R., Method, system, and storage medium for implementing intelligent team management services.
  169. Belissent,Jacques E.; Batty,Frederic C.; Misner,Timothy C.; Huff,Daryl A.; Srivastava,Anil K., Methods and apparatus for providing a virtual host in electronic messaging servers.
  170. Chase, Joshua Miles; Aviani, James A.; Lueckenhoff, Bruce Arthur; Mueller, II, Kenneth Earl, Methods and apparatus for providing content over a computer network.
  171. Fuselier, Christopher Scott; Dougherty, John James; Fisher, Joseph John; Digate, Thomas A.; Carpenter, Richard Alan; Anger, Bernardo, Methods and system for providing context sensitive information.
  172. Malik,Dale; Koch,Robert A.; Hill,Peter; Anderson,Richard A., Methods and systems for a communications and information resource manager.
  173. Malik,Dale; Koch,Robert A.; Hill,Peter; Anderson,Richard A., Methods and systems for a communications and information resource manager.
  174. Bowie Britton,Simon, Methods and systems for managing successful completion of a network of processes.
  175. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  176. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  177. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  178. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  179. Malik, Dale W.; Anderson, Richard A., Methods and systems for providing contextual information on communication devices and services.
  180. Dournov, Pavel A.; Shrivastava, Sumeet Updesh; Arunachalam, Vaidyanathan; Whitlock, Donna L.; Yeates, Anthony J., Methods and systems for providing secure access to a hosted service via a client application.
  181. Yeates, Anthony J.; Dournov, Pavel A.; Shrivastava, Sumeet Updesh; Arunachalam, Vaidyanathan; Whitlock, Donna L., Methods and systems for providing secure access to a hosted service via a client application.
  182. Yeates, Anthony J.; Dournov, Pavel A.; Shrivastava, Sumeet Updesh; Bharadwaj, Shankar Arunachalam; Whitlock, Donna L., Methods and systems for providing secure access to a hosted service via a client application.
  183. Peddada, Prasad, Methods and systems for provisioning access to customer organization data in a multi-tenant system.
  184. Malik, Dale W., Methods, systems and products for presenting information correlated to communications.
  185. Malik,Dale W., Methods, systems, and products for creating message logs.
  186. Malik, Dale; Koch, Robert A.; Hill, Peter; Anderson, Richard A., Methods, systems, and products for managing communications.
  187. Hickman, Andrew John; Tsang, Alan; Tao, Yaqi; Pan, Shengjun, Micro-geographic aggregation system.
  188. Sharma, Rahul, Modular and portable deployment of a resource adapter in an application server.
  189. Mohammed, Mannan; Kayal, Saivendra; Tielke, Ron; Brown, Mark; Dolly, Nathan, Modular enterprise authorization solution.
  190. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  191. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  192. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  193. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  194. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  195. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  196. Kuindersma, Michael; St. Laurent, Michael; Onischke, Mark, Multi-stage polling mechanism and system for the transmission and processing control of network resource data.
  197. Battle, Ryan W.; Mitchell, Christopher E., Multiple site automated logout.
  198. Lester, Erren Dusan; Chan, Kok Wai; Ayres, Lynn C.; Jain, Naresh; Chen, Rui; Chow, Trevin M., Multiuse web service sign-in client side components.
  199. Lester, Erren Dusan; Ayres, Lynn C; Chow, Trevin M; Chan, Kok Wai; Chen, Rui; Jain, Naresh, Multiuser web service sign-in client side components.
  200. Spicer,Steven; Martin,Christopher; Kuhl,Larry; Hollander,Brian; Pidduck,Patrick; Coutts,Steven; Von Hatten,Philip; Onischke,Mark; Grassick,Clayton; Lehan,Tim, Network resource access system.
  201. Spicer,Steven; Martin,Christopher; Kuhl,Larry; Hollander,Brian; Pidduck,Patrick; Coutts,Steven; Von Hatten,Philip; Onischke,Mark; Grassick,Clayton; Lehan,Tim, Network resource control system.
  202. Spicer,Steven; Martin,Christopher; Kuhl,Larry; Hollander,Brian; Pidduck,Patrick; Coutts,Steven; Von Hatten,Philip; Onischke,Mark; Grassick,Clayton; Lehan,Tim, Network resource control system.
  203. Malik, Dale W.; Friedman, Lee G., Network update manager.
  204. Pal, Dmitri V.; Gallagher, Stephen J., Password authentication.
  205. Pal, Dmitri V.; Gallagher, Stephen J., Password authentication.
  206. Pal, Dmitri V.; Gallagher, Stephen J., Password authentication.
  207. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  208. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Policy inheritance through nested groups.
  209. Benson, Glenn Stuart; Calaceto, Joseph R.; Logar, Russell M., Portable security transaction protocol.
  210. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  211. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  212. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  213. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  214. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  215. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  216. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  217. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  218. Leahy,Scott; Cohen,Alon, Prioritization of third party access to an online commerce site.
  219. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Privacy and identification in a data communications network.
  220. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  221. Betros,Kim; Chidiac,Ghassan; Gupta,Sanjay; Nordyke,Jeff; Palleschi,Giancarlo; Rosenthal,Matthew; Roubiecek,Evan E.; Vimba,Arnold O.; Zarnick,Michael P., Providing authorized access and request-initiated translation of data files.
  222. Kapczynski, Mark Joseph, Providing credit data in search results.
  223. Dean, Michael John; Kapczynski, Mark Joseph, Providing credit inquiry alerts.
  224. Ebner, Rachel; Bleier, Orly; Tamari, Avihai; Shemesh, Ida; Kritchker, Lea, Providing multiple roles in computer-implemented workspaces.
  225. Forster, Craig Robert William; Hockings, Christopher John, Providing secure dynamic role selection and managing privileged user access from a client device.
  226. Forster, Craig Robert William; Hockings, Christopher John, Providing secure dynamic role selection and managing privileged user access from a client device.
  227. Martini, Paul Michael, Providing single sign-on for wireless devices.
  228. Martini, Paul Michael, Providing single sign-on for wireless devices.
  229. Peddada, Prasad, Provisioning access to customer organization data in a multi-tenant system.
  230. Swaminathan, Kishore; Nebolsky, Charles, Rapid knowledge transfer among workers.
  231. Swaminathan, Kishore; Nebolsky, Charles, Rapid knowledge transfer among workers.
  232. Sallam, Ahmed, Regulating remote registry access over a computer network.
  233. Pravetz, James D.; Steele, Joseph D.; Agrawal, Sunil, Relying party specifiable format for assertion provider token.
  234. Herman, Shane; Walavalkar, Mahesh, Remote computer system management through an FTP internet connection.
  235. Defossé, Erin M., Remote data acquisition, transmission and analysis system including handheld wireless equipment.
  236. Bhat, Shivaram; Cui, Hua; Luo, Ping; Arumugam, Dilli Dorai Minnal; Ranganathan, Aravindan, Remote interface for policy decisions governing access control.
  237. Malik, Dale W., Resource list management system.
  238. Malik, Dale W., Resource list management system.
  239. Malik,Dale W., Resource list management system.
  240. Modrall, Mark, Restricting access to a shared resource.
  241. Appiah, Madan; Pearson, Malcolm Erik; Kershaw, Daniel, Role based delegated administration model.
  242. Park, Joon S., Role-based access control to computing resources in an inter-organizational community.
  243. Mardikar, Upendra S.; Meyer, Jeffrey, Role-based attribute based access control (RABAC).
  244. Mardikar, Upendra S.; Meyer, Jeffrey, Role-based attribute based access control (RABAC).
  245. Mardikar, Upendra S.; Meyer, Jeffrey, Role-based attribute based access control (RABAC).
  246. Kogan, Sandra L.; Wilcox, Eric M.; Muller, Michael J., Role-based views access to a workflow weblog.
  247. Deen, Brian; Hopmann, Alex; Soderberg, Joel, Routing client requests to back-end servers.
  248. Sherman, Yahali; Vainer, Vitaly, Search and context based creation in dynamic workspaces.
  249. Selgas, Thomas Drennan; Heintz, John D., Secure cloud data sharing.
  250. Tewari, Anoop Kailasnath; Garg, Vikas; Swildens, Eric Sven-Johan, Secure content delivery system.
  251. Tewari, Anoop Kailasnath; Garg, Vikas; Swildens, Eric Sven-Johan, Secure content delivery system.
  252. Tewari,Anoop Kailasnath; Garg,Vikas; Swildens,Eric Sven Johan, Secure content delivery system.
  253. Selgas, Thomas D.; Cutrer, Jonathan, Secure credentials control method.
  254. Selgas, Thomas D.; Cutrer, Jonathan, Secure email communication system.
  255. Selgas, Thomas Drennan; Cutrer, Jonathan, Secure email communication system.
  256. Spicer, Steven; Martin, Christopher; Kuhl, Larry; Hollander, Brian; Pidduck, Patrick; Coutts, Steven; Hatten, Philip Von; Onischke, Mark; Grassick, Clayton; Lehan, Tim, Secure network resource access system.
  257. Pravetz, James D.; Steele, Joseph D.; Agrawal, Sunil, Secure portable store for security skins and authentication information.
  258. Pravetz, James D.; Steele, Joseph Donovan; Agrawal, Sunil, Secure portable store for security skins and authentication information.
  259. Garcia,Denis Jacques Paul, Secured data format for access control.
  260. Wood, Douglas Andrew, Security and authorization in management agents.
  261. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security control module.
  262. Patrick, Paul; Byrne, David; Yagen, Kenneth D.; Xu, Mingde; Howes, Jason; Falco, Mark A.; Riendeau, Richard J., Security provider development model.
  263. Winje, Paul; Isley, Michael J.; Swenson, Grant Eric; Gullickson, Brian Keith, Security synchronization services.
  264. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  265. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  266. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  267. Smith, Donna Meryl, Server architecture for electronic data quality processing.
  268. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  269. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  270. Miyakawa, Shinya, Session control system, session control method and session control program.
  271. Kapczynski, Mark Joseph; Dean, Michael John, Storage and maintenance of personal data.
  272. Burns, Mark; St. Laurent, Michael; Krishnammagaru, Dharmesh, Streamlined system for the transmission of network resource data.
  273. Choy,David Mun Hien, System and method for RDBMS to protect records in accordance with non-RDBMS access control rules.
  274. Griffin,Philip B., System and method for XML data representation of portlets.
  275. Zoellner, Keith; Lee, Peter A.; Blok, Dmitriy, System and method for a desktop agent for use in managing file systems.
  276. Chow,Chee Seng; Sung,James; Chen,Jerome Tsung Yao; Sundarji,Fiyaz, System and method for accessing a remote server from an intranet with a single sign-on.
  277. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for analyzing security policies in a distributed computer network.
  278. Benson, Glenn S., System and method for anti-phishing authentication.
  279. Benson, Glenn S., System and method for anti-phishing authentication.
  280. Benson, Glenn S., System and method for anti-phishing authentication.
  281. Benson, Glenn S., System and method for anti-phishing authentication.
  282. DaCosta, Behram Mario, System and method for authenticating components in wireless home entertainment system.
  283. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  284. Gendler, Joseph, System and method for automatic financial project management.
  285. Baumann, Carl Steven; May, Michael Randy; Munson, John Irving; Sjostrom, William Montgomery; Wilson, Sherry Lee, System and method for automating invoice processing with positive confirmation.
  286. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  287. Lee,Chung I; Lee,Da Peng, System and method for controlling user authorities to access one or more databases.
  288. Reilly, Thomas, System and method for customizing a portal environment.
  289. Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Lu, Jeannie J., System and method for developing and administering web applications and services from a workflow, enterprise, and mail-enabled web application server and platform.
  290. Cain, Adam; Watkins, Craig R.; Barrett, Jeremey, System and method for enabling authorization of a network device using attribute certificates.
  291. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  292. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  293. Warren, Mary Carter; Barrett, Donna M.; Schmitt, Donald H.; Ehemann, Karen R., System and method for establishing or modifying an account with user selectable terms.
  294. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  295. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  296. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  297. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  298. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  299. Moriconi,Mark S.; Godik,Simon; Xu,Mingde; Yagen,Ken, System and method for incrementally distributing a security policy in a computer network.
  300. Jagota, Arun Kumar, System and method for inferring reporting relationships from a contact database.
  301. Cirulli, Susan Bumgardner; Evans, Robert Martin; Robinson, Gerald R.; Wilson, Sherry Lee, System and method for leveraging procurement across companies and company groups.
  302. Moriconi,Mark; Qian,Shelly, System and method for maintaining security in a distributed computer network.
  303. Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Nowacki, Mark A.; Lu, Jeannie J., System and method for managing concurrent scheduled or on-demand replication of subscriptions.
  304. Von Hatten, Philip; Pidduck, Patrick; Evers, Rob; Kavanaugh, Frank; Sobiski, Mike; Hollander, Brian; Zhou, Mei; Turner, Justin; Onischke, Mark; Kuindersma, Michael; Krishnammagaru, Dharmesh; St. Laurent, Michael, System and method for managing printer resources on an internal network.
  305. LaMastres,Daniel G.; Everson,John Michael; Norris,James W., System and method for managing security access for users to network systems.
  306. Chang, Bay-Wei; Fredricksen, Eric, System and method for navigating documents.
  307. Chang, Bay-Wei; Fredricksen, Eric, System and method for navigating documents.
  308. Chang, Bay-Wei; Fredricksen, Eric, System and method for navigating documents.
  309. Chang, Bay-Wei; Fredricksen, Eric, System and method for navigating documents.
  310. Chang, Bay-Wei; Fredricksen, Eric, System and method for navigating documents.
  311. Chang, Bay-Wei; Fredricksen, Eric, System and method for navigating documents.
  312. Scott, Kelly W., System and method for network-based project management.
  313. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  314. Vlasov, Iulian; Misri, Punipriya; Doongoor, Dev; John Chuan, Mee Tchin Jane, System and method for performing access control.
  315. Masters, Richard R., System and method for performing application level persistence.
  316. Masters, Richard R., System and method for performing application level persistence.
  317. Masters, Richard Roderick, System and method for performing application level persistence.
  318. Masters, Richard Roderick, System and method for performing application level persistence.
  319. Masters,Richard R., System and method for performing application level persistence.
  320. Skingle, Bruce James, System and method for portal infrastructure tracking.
  321. Skingle,Bruce James, System and method for portal infrastructure tracking.
  322. Haut,John; Griffin,Philip B.; Patadia,Jalpesh; Willcox,Steven; Breeden,Timothy, System and method for portal page layout.
  323. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  324. Cirulli, Susan Bumgardner; Evans, Robert Martin, System and method for processing tax codes by company group.
  325. Snavely, Amy J.; Sjostrom, William M.; Musa, Mark A., System and method for providing a role table GUI via company group.
  326. Cronin, David; Petroff, Gregory, System and method for providing content-based user interface cards.
  327. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  328. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  329. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  330. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  331. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  332. Bowers,Theodore J.; Ilijasic,Dean; Sanders,Shelley F., System and method for providing discriminated content to network users.
  333. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  334. Gendler,Joseph, System and method for providing funding approval associated with a project based on a document collection.
  335. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  336. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  337. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  338. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  339. Hailpern,Brent; Yu,Philip S., System and method for providing service for searching web site addresses.
  340. Cronin, David; Petroff, Gregory, System and method for providing user interface cards.
  341. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  342. St. Laurent, Michael; Onischke, Mark; Kuindersma, Michael; Krishnammagaru, Dharmesh; Stairs, Jonathon; Noreikis, Ken, System and method for releasing print jobs based on location information.
  343. Kodimer,Marianne L.; Yeung,Mike; Shahindoust,Amir; Krishna,Girish R., System and method for role based access control of a document processing device.
  344. Lehman, Dean K.; McCullough, Joseph R.; Orth, Nancy A., System and method for sending money via E-mail over the internet.
  345. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  346. Skingle,Bruce James, System and method for single session sign-on with cryptography.
  347. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  348. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  349. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  350. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  351. Ellmore,Kimberly, System and method for single sign on process for websites with multiples applications and services.
  352. Colcord, Brian, System and method for testing applications.
  353. Pravetz, James D.; Steele, Joseph D.; Agrawal, Sunil, System and method for trusted embedded user interface for authentication.
  354. Feinleib,David A.; Gulledge,Carl L.; Moss,Kenneth D.; Neault,Autumn F. G., System and method for unified registration information collection.
  355. Feinleib,David; Gulledge,Carl L.; Moss,Kenneth D.; Neault,Autumn F.G., System and method for unified registration information collection.
  356. Song, Yu; Messer, Alan, System and method for user access control to content in a network.
  357. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  358. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  359. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  360. Cichowlas,Bruce, System for and methods of administration of access control to numerous resources and objects.
  361. St. Laurent, Michael D.; Krishnammagaru, Dharmesh; Tomlin, Craig A.; Kuindersma, Michael Edward; Stairs, Jonathan; Onischke, Mark; Clement, Conrad R., System for internet enabled printing.
  362. Broden, Theresa W.; Godoy, Glenn C.; Murphy, Jane M.; Musa, Mark A.; Wilson, Sherry L., System for managing a supplier for participation in a plurality of trading networks.
  363. Baumann, Carl Steven; May, Michael Randy; Munson, John Irving; Sjostrom, William Montgomery; Wilson, Sherry Lee, System for processing a purchase request for goods or services.
  364. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  365. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  366. Shang,Heping; Li,Zhenpeng, System providing methodology for replication subscription resolution.
  367. Bone, Jeff G.; Arbilla, Laura; Zoellner, Keith T.; Might, Bradley; Kaplan, Jeremy; Belkin, Morry; Lee, Peter A.; Funderburg, Brett A.; Jimenez, A. Paul, System, method and apparatus for enterprise policy management.
  368. Bone, Jeff G.; Arbilla, Laura; Zoellner, Keith; Might, Bradley; Kaplan, Jeremy; Belkin, Morry; Lee, Peter A.; Funderburg, Brett A.; Jimenez, A. Paul, System, method and apparatus for enterprise policy management.
  369. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  370. Cherry, Darrel D.; Clough, James, Systems and methods for automatically configuring a client for remote use of a network-based service.
  371. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  372. Chang, Albert Chia-Shu; Jones, Gregory Dean; Matthies, Carolyn Paige Soltes, Systems and methods for data verification.
  373. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  374. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  375. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  376. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  377. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  378. Olshansky, Vadim, Systems and methods for group bandwidth management in a communication systems network.
  379. Pitchaikani, Balaji; Brusseau, Eric Christopher; Olshansky, Vadim; Feldman, Peter Matthew; Zumbahlen, Charles S.; Salem, Elyas Manzur, Systems and methods for injecting content.
  380. Pitchaikani, Balaji; Brusseau, Eric Christopher; Olshansky, Vadim; Feldman, Peter Matthew; Zumbahlen, Charles Scott; Salem, Elyas Manzur, Systems and methods for injecting content.
  381. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  382. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  383. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  384. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  385. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  386. Paunikar, Amit; Singh, Bikramjit, Systems and methods for network address translation.
  387. Paunikar, Amit; Singh, Bikramjit, Systems and methods for network address translation.
  388. Paunikar, Amit; Singh, Bikramjit, Systems and methods for network address translation.
  389. McMillan, Helen; Skurtovich, John Lawrence; Kress, Anita; Sumida, Timothy; McVey, Michael Charles, Systems and methods for providing an integrated identifier.
  390. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  391. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  392. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  393. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  394. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  395. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  396. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  397. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  398. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  399. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  400. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  401. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  402. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  403. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  404. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  405. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  406. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  407. Edwards, Jr., Robert Clair; Kaczmarski, Michael Allen; Vargas, Omar Bond, Systems for authenticating a user's credentials against multiple sets of credentials.
  408. Majkut,Keith; Sharma,Vivek, Techniques for dynamic rule-based response to a request for a resource on a network.
  409. Majkut,Keith; Sharma,Vivek, Techniques for generating rules for a dynamic rule-based system that responds to requests for a resource on a network.
  410. Bhat,Shivaram; Nelson,James F., Uniform resource locator access management and control system and method.
  411. Wilcox, Eric; Kogan, Sandra Louise; Wattenberg, Martin Miles, Visualization of attributes of workflow weblogs.
  412. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  413. Haghpassand, Joshua, Web-based security and filtering system with proxy chaining.
  414. Olshansky, Vadim; Noro, Raffaele, Zone migration in network access.
  415. Olshansky, Vadim; Noro, Raffaele, Zone migration in network access.
  416. Olshansky, Vadim; Noro, Raffaele, Zone migration in network access.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로