Roberts, Raymond E.IPLO Intellectual Property Law Offices
인용정보
피인용 횟수 :
222인용 특허 :
6
초록▼
A secure e-mail system (10) permitting a sender (12) to send a secure e-mail (14) to one or more receivers (16). The sender (12) employs a sending unit (18) having a software module (26) to compose the secure e-mail (14), to send data about it to a security server (24), to receive back from that sec
A secure e-mail system (10) permitting a sender (12) to send a secure e-mail (14) to one or more receivers (16). The sender (12) employs a sending unit (18) having a software module (26) to compose the secure e-mail (14), to send data about it to a security server (24), to receive back from that security server (24) a messageKey (102e) for encrypting the secure e-mail (14), and for sending it conventionally to an e-mail server (22). The receivers (16) employ receiving units (20) also having software modules (26) to receive the secure e-mail (14), to send data about it to the security server (24), and to receive back from the security server (24) the messageKey (102e) for decrypting the secure e-mail (14). The security server (24) stores a user id (102a) and password (102b) for the sender (12) and the receivers (16); a messageId (104a), a sealSalt (104j), and the messageKey (104g) for the secure e-mail (14); and a receiver address (106b) in a database (100). Using the database (100) the security server (24) authenticates the sender (12) and the receiver (16) and validates the secure e-mail (14).
대표청구항▼
A secure e-mail system (10) permitting a sender (12) to send a secure e-mail (14) to one or more receivers (16). The sender (12) employs a sending unit (18) having a software module (26) to compose the secure e-mail (14), to send data about it to a security server (24), to receive back from that sec
A secure e-mail system (10) permitting a sender (12) to send a secure e-mail (14) to one or more receivers (16). The sender (12) employs a sending unit (18) having a software module (26) to compose the secure e-mail (14), to send data about it to a security server (24), to receive back from that security server (24) a messageKey (102e) for encrypting the secure e-mail (14), and for sending it conventionally to an e-mail server (22). The receivers (16) employ receiving units (20) also having software modules (26) to receive the secure e-mail (14), to send data about it to the security server (24), and to receive back from the security server (24) the messageKey (102e) for decrypting the secure e-mail (14). The security server (24) stores a user id (102a) and password (102b) for the sender (12) and the receivers (16); a messageId (104a), a sealSalt (104j), and the messageKey (104g) for the secure e-mail (14); and a receiver address (106b) in a database (100). Using the database (100) the security server (24) authenticates the sender (12) and the receiver (16) and validates the secure e-mail (14). validated successfully in step (e) or when the counter has not reached the selected value, performing step (e). 11. The method of claim 10, wherein, when the first firmware has not been previously validated successfully in step (e) and when the counter has reached the selected value, setting a validation flag to a state indicative of invalidity of the first firmware. 12. The method of claim 9, wherein in determining step (h) the determination of whether first firmware is present is based upon reading a code. 13. A method for booting a computational component, comprising: (a) providing second firmware in a computational component; (b) reading boot code in the computational component; (c) thereafter determining whether first firmware is present in the computational component; (d) when first firmware is present, validating at least some of the first firmware; and (e) when the first firmware is not present, executing the second firmware. 14. The method of claim 13, further comprising when the first firmware is present the steps of: (f) executing the first firmware when the first firmware is successfully validated; and (g) executing the second firmware when the first firmware is not successfully validated. 15. The method of claim 14, further comprising: (h) copying first firmware to a selected location in memory of the computational component; (i) validating at least some of the copied first firmware. 16. A computer readable medium comprising instructions to perform the steps of claim 13. 17. The method of claim 13, wherein the validation step (d) is performed using at least one of a redundancy check and a check sum. 18. The method of claim 13, wherein the first firmware is stored in read-only-memory. 19. The method of claim 15, wherein step (i) comprises: when the at least a portion of the copied first firmware is validated successfully, setting a validation flag to a first state and a counter to a starting value and performing step (d); and when the at least a portion of the first firmware is not validated successfully, not performing step (d). 20. The method of claim 19, further comprising, before the copying step, (j) setting the validation flag to a second state, the second state being different from the first state. 21. The method of claim 20, wherein step (f) comprises setting the validation flag to a third state different from the first and second states. 22. The method of claim 21, wherein step (g) comprises setting the validation state to a fourth state different from the first, second, and third states. 23. The method of claim 13, further comprising after step (c) and before step (d): (f) determining whether the first firmware has been previously validated successfully in step (d); (g) when the first firmware has not been previously validated successfully in step (d), incrementing a counter and determining whether the counter has reached a selected value; and (h) when the first firmware has been previously validated successfully in step (d) or when the counter has not reached the selected value, performing step (d). 24. The method of claim 23, wherein, when the first firmware has not been previously validated successfully in step (d) and when the counter has reached the selected value, setting a validation flag to a state indicative of invalidity of the first firmware. 25. The method of claim 13, wherein in determining step (c) the determination of whether first firmware is present is based upon reading a code. 26. A system for updating firmware, comprising: (a) second firmware in a computational component; (b) a processor operable to: (i) copy first firmware to a selected location in memory of the computational component; (ii) validate at least some of the copied first firmware; (iii) thereafter execute boot code in the computational component; (iv) validate the least some of the first firmware; (v) execute the first firmware when the at least some of the first firmware
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (6)
Owens Stephen J. H. ; Finney Michael S. ; Snider Michael L. ; Wright Randall S. ; Paynter James W. ; Bard Robin R., Electronic mail distribution system for integrated electronic communication.
Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
Knight, William C.; Nussbaum, Nicholas I., Computer-implemented system and method for inclusion-based electronically stored information item cluster visual representation.
Knight, William C.; Nussbaum, Nicholas I., Computer-implemented system and method for visually suggesting classification for inclusion-based cluster spines.
Fontanella, D. Alan; Klinefelter, Gary M.; Upin, Jeffrey D.; Ekers, John E.; Platner, Thomas C.; Nehowig, Kelly R.; Goldenstein, Angela Marie, Credential production using a secured consumable supply.
Awada,Faisal M.; Brown,Joe Nathan; Burkes,Philip Bernard, Electronic mail distribution network implementation for safeguarding sender's address book covering addressee aliases with minimum interference with normal electronic mail transmission.
LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with aggregation and integrated display of related messages.
LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with functionality to include both private and public messages in a communication.
LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with functionally for senders to control actions performed by message recipients.
LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with pre-message-retrieval display of message metadata.
Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
Klinefelter, Gary M.; Platner, Thomas C.; Schuler, Joseph F.; Gershenovich, Leon; Kaiser, David W.; Holland, Gary R., Identification card manufacturing security.
Clark, Peter E.; Ives, Paul M.; Gentry, Michael V., Managed virtual point to point communication service having verified directory, secure transmission and controlled delivery.
Giersch, Daniel; Dohmke, Thomas; Joswig, Julian; Haubold, Stefan, Method for asynchronous communication by means of an internet platform, and internet platform.
Cahill,Jason; Graham,Chris; Antonoff,Lauren; Brown,Kevin; Kouznetsov,Pavel, Organization-based content rights management and systems, structures, and methods therefor.
Lucovsky, Mark H.; Pierce, Shaun Douglas; Movva, Ramu; Kalki, Jagadeesh; Auerbach, David Benjamin; Ford, Peter Sewall; Yuan, Yun-Qi; Guu, Yi-Wen; George, Samuel John; Hoffman, William Raymond; Jacobs, Jay Christopher; Steckler, Paul Andrew; Hsueh, Walter C.; Keil, Kendall D.; Gopal, Burra; White, Steven D.; Leach, Paul J.; Ward, Richard B.; Smoot, Philip Michael; Fang, Lijiang; Taylor, Michael B.; Kannan, Suresh; Wu, Winnie C., Schema-based services for identity-based data access.
Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
Nehowig, Kelly R.; Gale, David T.; Fischer, Lisa A.; Platfoot, Keith A.; Ekers, John E.; Zappe, Thomas A., Securely processing and tracking consumable supplies and consumable material.
Knight, William C.; Nussbaum, Nicholas I.; Conwell, John W., System and method for displaying relationships between concepts to provide classification suggestions via inclusion.
Knight, William C.; Nussbaum, Nicholas I.; Conwell, John W., System and method for displaying relationships between concepts to provide classification suggestions via injection.
Knight, William C.; Nussbaum, Nicholas I.; Conwell, John W., System and method for displaying relationships between concepts to provide classification suggestions via nearest neighbor.
Knight, William C.; Nussbaum, Nicholas I., System and method for displaying relationships between electronically stored information to provide classification suggestions via inclusion.
Knight, William C.; Nussbaum, Nicholas I., System and method for displaying relationships between electronically stored information to provide classification suggestions via injection.
Knight, William C.; Nussbaum, Nicholas I., System and method for displaying relationships between electronically stored information to provide classification suggestions via nearest neighbor.
Smith, Thomas Franklin; Martinka, William; Polubinski, Jr., Jim, System and method for optimizing utilization of inventory space for dispensable articles.
Smith, Thomas Franklin; Martinka, William; Polubinski, Jr., Jim, System and method for optimizing utilization of inventory space for dispensable articles.
Borchardt, Jonathan M.; Walter, Edward L., System and method for providing a dynamic user interface for a dense three-dimensional scene with a plurality of compasses.
Bowers, Brad; Maskatia, Imran; Rubinstein, Jason, System and method for providing the identification of geographically closest article dispensing machines.
Little, Herbert A.; Brown, Michael K.; Hammell, Jonathan F.; Brown, Michael S.; Kirkup, Michael G.; Adams, Neil P., System and method for securing data.
Little, Herbert A.; Brown, Michael K.; Hammell, Jonathan F.; Brown, Michael S.; Kirkup, Michael G.; Adams, Neil P., System and method for securing data for redirecting and transporting over a wireless network.
Raghunandan, Hulikunta Prahlad, System for directing e-mail to selected recipients by applying transmission control directives on aliases identifying lists of recipients to exclude or include recipients.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.