$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for secure running of untrusted content

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-001/24
출원번호 US-0097218 (1998-06-12)
발명자 / 주소
  • Chan, Shannon
  • Jensenworth, Gregory
  • Goertzel, Mario C.
  • Shah, Bharat
  • Swift, Michael M.
  • Ward, Richard B.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Law Offices of Albert S. Michalik, PLLC
인용정보 피인용 횟수 : 252  인용 특허 : 29

초록

Restricted execution contexts are provided for untrusted content, such as computer code or other data downloaded from websites, electronic mail messages and any attachments thereto, and scripts or client processes run on a server. A restricted process is set up for the untrusted content, and any act

대표청구항

Restricted execution contexts are provided for untrusted content, such as computer code or other data downloaded from websites, electronic mail messages and any attachments thereto, and scripts or client processes run on a server. A restricted process is set up for the untrusted content, and any act

이 특허에 인용된 특허 (29)

  1. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  2. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  3. Hobson Stephen James,GBX ; Plambeck Kenneth Ernest, Authority reduction and restoration method providing system integrity for subspace groups and single address spaces dur.
  4. Fritch Daniel Gene ; Green Tammy Anita ; Schell Roger R., Computer network graded authentication system and method.
  5. Schlesinger Artie (825 E. 9th St. Brooklyn NY 11230), Computer security system having remote location recognition and remote location lock-out.
  6. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  7. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Connection authorizer for controlling access to system resources.
  8. Montague David S. (Bellevue WA) Misra Pradyumna K. (Issaquah WA) Swift Michael M. (Bellevue WA), Controlling access to objects on multiple operating systems.
  9. Montague David S. ; Misra Pradyumna K. ; Swift Michael M. ; Reichel Robert P., Controlling access to objects on multiple operating systems.
  10. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  11. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  12. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method and apparatus for creating, supporting, and using travelling programs.
  13. Porter Jack Edward ; Brimhall Geoffrey Leroy ; Crane William Montgomery ; O'Gorman Liam Patrick, Method and apparatus for document management utilizing a messaging system.
  14. Story Glenn ; Sodhi Amardeep S. ; Tom Gary ; Yee Mon For, Method and apparatus for interfacing with a stateless network file system server.
  15. Abraham Dalen M. ; Barnes Todd A. ; Bouche Paul F. ; Bougetz Thomas P. ; Gosselin Tracy A. ; Grieve Mark G. ; Langdon Brent A. ; Allison Robert C. ; Nikkel Michael S., Method and apparatus for managing internetwork and intranetwork activity.
  16. Watson Colin (Issaquah WA) Herron Andrew M. (Issaquah WA), Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
  17. Watson Colin ; Herron Andrew M., Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a cl.
  18. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  19. Nguyen Minhtam C. (335 Elan Village La. ; Apt. 217 San Jose CA 95134), Network with secure communications sessions.
  20. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  21. McManis Charles E. (Sunnyvale CA), Secure network protocol system and method.
  22. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  23. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Server entity that provides secure access to its resources through token validation.
  24. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  25. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  26. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  27. Bartz Christopher T., System for I/O management where I/O operations are determined to be direct or indirect based on hardware coupling manner.
  28. Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
  29. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.

이 특허를 인용한 특허 (252)

  1. Erlingsson, Ulfar, Altered states of software component behavior.
  2. Pizano, Carlos E.; Sylvain, Nicolas; Puentes, Jose Ricardo Vargas; Thorarinsson, Finnur Breki; Larson, Mark Alan, Altered token sandboxing.
  3. Li, Hui; Sheehan, John M., Annotating virtual application processes.
  4. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  5. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  6. Spyker, Andrew W.; Williams, Byron Allen, Apparatus and method for ensuring data integrity of unauthenticated code.
  7. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V.; Hopcroft, Michael J., Architectures for and methods of providing network-based software extensions.
  8. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  9. Ishigaki, Yoshinobu; Numao, Masayuki; Yuriyama, Madoka; Watanabe, Yuji, Attribute information providing method.
  10. Ishigaki, Yoshinobu; Numao, Masayuki; Yuriyama, Madoka; Watanabe, Yuji, Attribute information providing system.
  11. Bickford, John Holden; Lingafelt, Charles Steven; Sisk, Robert B., Authenticating without opening electronic mail.
  12. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  13. Porter, Wayne; Criswell, Chris; Hertsens, Jan; Egan, Robert, Automating software security restrictions on applications.
  14. Porter, Wayne; Criswell, Chris; Hertsens, Jan; Egan, Robert, Automating software security restrictions on system resources.
  15. Tajalli, Homayoon; Graham, Jeffrey J.; Fraser, Timothy J., Behavior-based host-based intrusion prevention system.
  16. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  17. Grimaud,Gilles; Hagimont,Daniel; Vandewalle,Jean Jacques, Capability-based access control for applications in particular co-operating applications in a chip card.
  18. Brennan, Todd, Centralized timed analysis in a network security system.
  19. Schneider, James Paul, Client-side prevention of cross-site request forgeries.
  20. Simonoff,Adam J.; Hebert, Jr.,Julian B., Collaborative environment implemented on a distributed computer network and software therefor.
  21. Sampson,Scott E., Communication management using a token action log.
  22. Wang, Lan; Rios, Jennifer; Ali, Valiuddin; Balacheff, Boris, Computer security system and method.
  23. Martikian, Pablo A., Computer system comprising a communication device.
  24. Chen, J. Bradley; Yee, Bennet S.; Sehr, David C., Computing device with untrusted user execution mode.
  25. Kaspersky, Eugene V.; Doukhvalov, Andrey P.; Dyakin, Pavel V.; Kulagin, Dmitry A.; Kryukov, Andrey V., Constraint-based and attribute-based security system for controlling software component interaction.
  26. Kaspersky,Eugene V.; Doukhvalov,Andrey V.; Dyakin,Pavel V.; Kulagin,Dmitry A.; Kryukov,Andrey V., Constraint-based and attribute-based security system for controlling software component interaction.
  27. Kilday, Roger W., Containerized security for managed content.
  28. Brennan, Todd, Content extractor and analysis system.
  29. Perlin, Eric C.; Schutz, Klaus U.; Leach, Paul J.; Brundrett, Peter T.; Jones, Thomas C., Controlling computer applications' access to data.
  30. Perlin, Eric C.; Schutz, Klaus U.; Leach, Paul J.; Brundrett, Peter T.; Jones, Thomas C., Controlling execution of computer applications.
  31. Sampson, Scott E., Controlling the validity status of communicated messages.
  32. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  33. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  34. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  35. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  36. Yanoo, Kazuo, Data dependence analyzer, information processor, data dependence analysis method and program.
  37. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  38. Feinleib, David; Gulledge, Carl L.; Moran, Brian K.; Moss, Kenneth D.; Neault, Autumn F. G., Delayed uploading of user registration data.
  39. Feinleib,David; Gulledge,Carl L.; Moran,Brian K.; Moss,Kenneth D.; Neault,Autumn F. G., Delayed uploading of user registration data.
  40. Feinleib,David; Gulledge,Carl L.; Moran,Brian K.; Moss,Kenneth D.; Neault,Autumn F. G., Delayed uploading of user registration data.
  41. Medin, Jr., Milo S., Delivering multimedia services.
  42. Medin, Jr., Milo S., Delivering multimedia services.
  43. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  44. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  45. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  46. Iwamoto,Neil Y.; Seikh,Attaullah; Paek,Jeanette Y.; Martinez,Martin; Slick,Royce E.; Chern,Wei Jhy; Khosrova,Eliza; Yang,Joseph, Device access based on centralized authentication.
  47. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  48. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  49. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  50. Gladney,Henry M., Distributed data structures for authorization and access control for computing resources.
  51. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  52. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  53. Callender,Robin Lynn, Driver-specific context for kernel-mode shimming.
  54. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  55. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  56. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  57. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  58. Sen,Yafen, Electronic mail program.
  59. Assmann,Claus, Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent.
  60. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  61. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  62. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  63. Simon,Daniel R.; Balfanz,Dirk, Enhancing computer system security via multiple user desktops.
  64. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  65. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  66. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  67. Sampson, Scott E., File system management with user-definable functional attributes stored in a token action log.
  68. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  69. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  70. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  71. Rossmann, Alain, Hybrid systems for securing digital assets.
  72. Paoli, Jean D.; Mollicone, Laurent; Friend, Ned B.; Kotler, Matthew J.; Lawrence, Thomas R.; Lai, Shuk-Yan; Hendel, Sharma K.; Whitmarsh, Jason, Incrementally designing electronic forms and hierarchical schemas.
  73. Furuya, Tomoyuki, Information processing apparatus and data management system.
  74. Proudler, Graeme John; Balacheff, Boris, Information system.
  75. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  76. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  77. Inoue,Mitsuhiro; Okamoto,Ryuichi, License management server, license management system and usage restriction method.
  78. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  79. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  80. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  81. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  82. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  83. Jun, Gyuchang; Huang, Kurt; Kuroda, Duane, Managed access to media services.
  84. Jun, Gyuchang; Huang, Kurt; Kuroda, Duane, Managed access to media services.
  85. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  86. Sampson,Scott E., Managing a message communication and file system.
  87. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  88. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  89. Kappes, Martin; Krishnan, P., Method and apparatus for content based authentication for network access.
  90. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  91. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  92. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  93. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  94. Batterywala, Yusuf; Kommuri, Naga Kishore; Kumar, Nookala Sunder Phani; Nagaralu, Sree Hari, Method and apparatus for utilizing a file change log.
  95. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  96. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  97. Erlingsson,Ulfar, Method and system for assured denotation of application semantics.
  98. Brown, Ralph W.; Keller, Robert; Medin, Milo S., Method and system for authorizing and authenticating users.
  99. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  100. Baker, Arthur H., Method and system for enforcing a security policy via a security virtual machine.
  101. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  102. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  103. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  104. Vainstein, Klimenty, Method and system for managing security tiers.
  105. Vainstein, Klimenty, Method and system for managing security tiers.
  106. Kwan, Tony, Method and system for protecting against computer viruses.
  107. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  108. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  109. Murray, Gregory L.; McClanahan, Craig R.; Burns, Edward J., Method and system for protecting publicly viewable web client reference to server resources and business logic.
  110. Nath, Satyajit, Method and system for providing document retention using cryptography.
  111. Nath, Satyajit, Method and system for providing document retention using cryptography.
  112. Brown, Ralph W.; Keller, Robert; Medin, Milo S.; Temkin, David, Method and system for restricting access to user resources.
  113. Brown, Ralph William; Medin, Jr., Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  114. Brown, Ralph William; Medin, Jr., Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  115. Brown, Ralph William; Medin, Milo S.; Keller, Robert; Temkin, David, Method and system for restricting access to user resources.
  116. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  117. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  118. Smithline, Neil, Method and system for securing execution of untrusted applications.
  119. Barrett, Michael, Method and system for transmitting authentication context information.
  120. Barrett, Michael, Method and system for transmitting authentication context information.
  121. Barrett, Michael, Method and system for transmitting authentication context information.
  122. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  123. Barrett, Michael Richard, Method and system for transmitting authentication context information.
  124. Barrett,Michael Richard, Method and system for transmitting authentication context information.
  125. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  126. Ruthfield, Scott L.; Banks, Richard, Method and systems of providing information to computer users.
  127. Burugula, Ramanjaneya Sarma; Jann, Joefon; Pattnaik, Pratap Chandra, Method for reducing the time to diagnose the cause of unexpected changes to system files.
  128. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  129. Gartner, Jason Michael; Mezofenyi, Mark Maurice, Method, system and program for testing accessibility in data processing system programs.
  130. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  131. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  132. Erlingsson, Úlfar, Methods and systems for implementing a secure application execution environment using derived user accounts for internet content.
  133. Erlingsson, Úlfar, Methods and systems for implementing a secure application execution environment using derived user accounts for internet content.
  134. Erlingsson,Ulfar, Methods and systems for providing a secure application environment using derived user accounts.
  135. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  136. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  137. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  138. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  139. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  140. Erlingsson, Ulfar, Methods and systems for using derived user accounts.
  141. Erlingsson, Ulfar, Methods and systems for using derived user accounts.
  142. Erlingsson, Ulfar, Methods and systems for using derived user accounts.
  143. Erlingsson, Úlfar, Methods and systems for using derived user accounts.
  144. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  145. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  146. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  147. Sampson, Scott E., Methods for managing the exchange of communication tokens.
  148. Jun, Gyuchang; Huang, Kurt; Kuroda, Duane, Methods of controlling access to network content referenced within structured documents.
  149. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  150. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  151. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Sanchez, Lawrence M.; Licata, John A., Methods, systems, architectures and data structures for delivering software via a network.
  152. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  153. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  154. Schneider, James Paul, Multifactor validation of requests to thwart cross-site attacks.
  155. Schneider, James Paul, Multifactor validation of requests to thwart dynamic cross-site attacks.
  156. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  157. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  158. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  159. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  160. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Raman,Suryanarayanan V., Network-based software extensions.
  161. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  162. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  163. Proudler,Graeme John; Chan,David, Operation of trusted state in computing platform.
  164. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  165. Proudler, Graeme John, Performance of a service on a computing platform.
  166. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  167. Muth, Robert; Schimpf, Karl M.; Sehr, David C.; Biffle, Clifford L., Predicated control flow and store instructions for native code module security.
  168. Muth, Robert; Schmipf, Karl; Sehr, David C.; Biffle, Clifford L., Predicated control flow and store instructions for native code module security.
  169. Walker, John Mitchell; Bleisch, Paul L.; Miller, Jr., Thomas Wayne; Picioccio, Matthew; Hargreaves, Shawn, Programming framework for closed systems.
  170. Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Kaplan, Keith; Kurien, Varugis; Marr, Michael David, Projection of trustworthiness from a trusted environment to an untrusted environment.
  171. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  172. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  173. Goodale, Andrew; Kleppner, Andrew, Providing a visual indication that stored content is associated with a collaboration environment.
  174. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  175. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  176. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  177. Mantere, III, Jussi-Pekka; Maluta, Alexander Tony; Scalo, John William; Tyacke, Eugene Ray; Gaya, Bruce; Smith, Michael John; Kiehtreiber, Peter; Cooper, Simon P., Resource restriction systems and methods.
  178. Mantere, III, Jussi-Pekka; Maluta, Alexander Tony; Scalo, John William; Tyacke, Eugene Ray; Gaya, Bruce; Smith, Michael John; Kiehtreiber, Peter; Cooper, Simon P., Resource restriction systems and methods.
  179. Mantere, III, Jussi-Pekka; Maluta, Alexander Tony; Scalo, John William; Tyacke, Eugene Ray; Gaya, Bruce; Smith, Michael John; Kiehtreiber, Peter; Cooper, Simon P., Resource restriction systems and methods.
  180. Mantere, Jussi-Pekka; Maluta, Alexander Tony; Scalo, John William; Tyacke, Eugene Ray; Gaya, Bruce; Smith, Michael John; Kiehtreiber, Peter; Cooper, Simon P., Resource restriction systems and methods.
  181. Wrighton, David Charles; Unoki, Robert Sadao, Restricting type access to high-trust components.
  182. Wang, Dongyan, Robust and flexible group structure.
  183. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  184. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  185. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Secure access of objects generated from data representation language representations of the objects in a distributed computing environment.
  186. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure file system server architecture and methods.
  187. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Secure file system server architecture and methods.
  188. Malhotra, Vikas; Field, Scott A.; Dunajsky, Jaroslav, Secure isolation of application pools.
  189. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  190. Peinado, Marcus; England, Paul, Secure processor architecture for use with a digital rights management (DRM) system on a computing device.
  191. Peinado,Marcus; England,Paul, Secure processor architecture for use with a digital rights management (DRM) system on a computing device.
  192. Garcia,Denis Jacques Paul, Secured data format for access control.
  193. Ross, David Andrew; Franco, Roberto A.; Bedworth, John Green; Ganesh, Shankar; Kudallur, Venkatraman V.; Ganjam, Anantha P.; Schmucker, Kurt James, Security context lockdown.
  194. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  195. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  196. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  197. Bharadwaj, Manjunath; Howell, Nathan; Jiang, Wei, Selective filtering of network traffic requests.
  198. Carpenter,Wiltse J., Set top box object security system.
  199. Johnson, Jeremy T.; Medin, Milo S., Sharing IP network resources.
  200. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  201. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  202. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  203. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  204. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  205. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  206. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  207. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  208. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  209. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  210. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  211. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  212. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  213. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  214. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  215. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  216. Ross, David Andrew; Franco, Roberto A.; Bedworth, John Green; Ganesh, Shankar; Kudallur, Venkatraman V.; Ganjam, Anantha P.; Schmucker, Kurt James, System and method for local machine zone lockdown with relation to a network browser.
  217. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  218. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  219. Smithline, Neil, System and method for protecting APIs from untrusted or less trusted applications.
  220. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  221. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  222. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  223. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  224. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  225. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  226. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  227. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  228. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  229. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  230. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  231. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  232. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  233. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  234. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  235. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  236. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  237. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  238. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  239. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  240. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  241. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  242. Ginsberg,Michael, Trust level based platform access regulation application.
  243. Hargreaves, Shawn; Walker, John Mitchell; Meyer, Richard A., Untrusted gaming system access to online gaming service.
  244. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  245. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  246. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  247. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  248. Lam, Ioi; Monma, Junichi, User space virtualization system.
  249. Calcaterra, Jeffrey A.; Hind, John R., Using a declaration of security requirements to determine whether to permit application operations.
  250. Calcaterra, Jeffrey A.; Hind, John R., Using a declaration of security requirements to determine whether to permit application operations.
  251. Banerjee, Deb, Utilizing endpoint asset awareness for network intrusion detection.
  252. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트