$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Smart card controlled internet access 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0461958 (1999-12-15)
발명자 / 주소
  • Boyles, Stephen L.
  • Leinecker, Richard C.
  • Fischer, Jochen E.
  • Moody, Jr., Clyde G.
  • McConnell, Troy
  • Wilkinson, Ken
출원인 / 주소
  • 3M Innovative Properties Company
대리인 / 주소
    Buss, Melissa E.
인용정보 피인용 횟수 : 40  인용 특허 : 22

초록

A system for customizing individual internet access includes a server that registers a user with the system, stores information pertaining to internet sites the user is authorized to access, and controls the user's access to internet sites. A carding station is provided to enter personal identificat

대표청구항

A system for customizing individual internet access includes a server that registers a user with the system, stores information pertaining to internet sites the user is authorized to access, and controls the user's access to internet sites. A carding station is provided to enter personal identificat

이 특허에 인용된 특허 (22)

  1. Shannon Steven, Access control of networked data.
  2. DuFresne Fred B., Client-server system using embedded hypertext tags for application and database development.
  3. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  4. Hoffert Eric M. ; Cremin Karl ; Degen Leo, Evaluation of media content in media files.
  5. Hong Jack ; Toye George, Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing.
  6. Meske ; Jr. Carl F. ; Hooper Philip J. ; Opperman Mark R., Hypertext information retrieval using profiles and topics.
  7. Shieh Johnny Meng-Han ; Maddalozzo ; Jr. John ; McBrearty Gerald Francis, Increased control for reduced delay in internet data transfers based on limitations established in a server system.
  8. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  9. Ainsbury Robert D. ; Al Hussein Hussein K. ; Hinnant Michael C. ; Lahham Muwaffaq M. ; Ludin Stephen L. ; Putterman Daniel S. ; Shotton Frederick R. ; Tejada Wilfredo M., Method and apparatus for performing data collection, interpretation and analysis, in an information platform.
  10. White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
  11. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  12. Weiss Kenneth P. (Newton MA), Method and apparatus for utilizing a token for resource access.
  13. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules.
  14. Willens Steven M., Network access control system and process.
  15. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  16. Schloss Robert Jeffrey, System and method for controlling access to data located on a content server.
  17. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.
  18. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  19. Logan James ; Goessling Daniel F. ; Call Charles G., System for electrically distributing personalized information.
  20. Cole Gary Lee ; Engleman Scott Phillip, System for identifying new web pages of interest to a user.
  21. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  22. Shapiro Mark L. ; Subramaniam Anand ; Muthumavadi Muthukumar, User name authentication for gateway clients accessing a proxy cache server.

이 특허를 인용한 특허 (40)

  1. Shmueli, Shimon; Lang, Alex; Billman, Jean, Account portability for computing.
  2. Lang,Alex; Shmueli,Shimon S.; Sharp,David W.; Adkins,Brian J., Automatic configuration for portable devices.
  3. Chen,Liqun; Lo,Hoi Kwong; Chan,David, Computing apparatus and methods using secure authentication arrangements.
  4. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Confirming physical custody of objects.
  5. Farrugia,Augustin J.; Laporte,Frederic C., Deployment of smart card based applications via mobile terminals.
  6. Asami, Akiko; Suzuki, Takashi; Takeda, Takashi, Information processing system.
  7. Asami, Akiko; Suzuki, Takashi; Takeda, Takashi, Information processing system.
  8. Asami, Akiko; Suzuki, Takashi; Takeda, Takashi, Information processing system.
  9. Murakawa, Akira, Information processor, method for managing the same and computer program product.
  10. Carman,Gene, Method and apparatus for storage of usernames, passwords and associated network addresses in portable memory.
  11. Chen, Liqun; Proudler, Graeme John, Method and apparatus for using a secret in a distributed computing system.
  12. Vinati,Felice; Vinati,Samuele; Vinati,Matteo, Method and device for controlling the time which a user spends connected to a data communication network.
  13. Raheman,Fazal, Method and system for using optical disk drive as a biometric card reader for secure online user authentication.
  14. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  15. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  16. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  17. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  18. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  19. Lu, HongQian Karen; Ali, Asad Mahboob; Sachdeva, Kapil, Method of preventing web browser extensions from hijacking user information.
  20. Panasyuk, Anatoliy; Sirjani, Abolfazl; Walters, Ben; Burr, Michael; Earl, Min-Chih Lu, Methods and apparatus for scalable secure remote desktop access.
  21. Dyer, Ian; King, Paul; Burns, Joy; Ongchangco, Kislap; Kelly, Emily; Buse, Carrie; Heimann, Kenneth; Goff, Christopher, Multifunction removable memory device with ornamental housing.
  22. Gupta, Arun K.; Uppal, Rajiv K.; Parikh, Devang I., Object oriented based methodology for modeling business functionality for enabling implementation in a web based environment.
  23. Gupta, Arun K.; Uppal, Rajiv K.; Parikh, Devang I., Object oriented based methodology for modeling business functionality for enabling implementation in a web based environment.
  24. Gupta, Arun K.; Uppal, Rajiv K.; Parikh, Devang I., Object oriented based methodology for modeling business functionality for enabling implementation in a web based environment.
  25. Gupta, Arun K.; Uppal, Rajiv K.; Patrikh, Devang I., Object oriented based methodology for modeling business functionality for enabling implementation in a web based environment.
  26. Gupta,Arun K.; Uppal,Rajiv K.; Parikh,Devang I., Object oriented based, business class methodology for generating quasi-static web pages at periodic intervals.
  27. Kuo,Chih Jen; Luo,Wei, Personal computing environment using mozilla.
  28. Shmueli,Shimon; Lang,Alex; Billman,Jean, Portable memory device includes software program for interacting with host computing device to provide a customized configuration for the program.
  29. Tretter,Daniel R.; Kite,Thomas D.; Lin,Qian; Nguyen,Hugh P.; Wong,Ping Wah, Secure network-based system for the distributed printing of documents.
  30. Choi,Young hun, Security monitor apparatus and method using smart card.
  31. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  32. Du,Sterling D.; Li,Miao; Kuo,Chih Jen, Smart card enabled mobile personal computing environment system.
  33. Kuo, Chih Jen; Li, Miao; Luo, Wei, Smart card enabled secure computing environment system.
  34. Nobakht,Lida; Clymer,James R. W., Smart card for accessing a target internet site.
  35. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  36. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  37. Singhal, Tara Chand, Systems and methods for multi-factor remote user authentication.
  38. Wen, Wu; Le Saint, Eric F.; Becquart, Jerome Antoine Marie, Universal secure messaging for remote security tokens.
  39. Jeal, David; Mudie, George Stronach; Debney, Charles William, User authentication in a mobile telecommunications system.
  40. Tas, Nazif Cihan, Web-based wireless hotspot creation and management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로