$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for exclusively pairing wireless devices 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04Q-007/32
  • G06F-001/24
출원번호 US-0316686 (1999-05-21)
발명자 / 주소
  • Hind, John Raithel
  • Peters, Marcia Lambert
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Herndon Jerry W.
인용정보 피인용 횟수 : 257  인용 특허 : 10

초록

A method and system for enabling wireless devices to be paired or permanently associated by a user or a network administrator. The method and system utilize well known public key cryptography and machine unique identifiers to establish a secure channel and associate the devices with eachother. This

대표청구항

1. A method for establishing a security relationship between a first device and a second device, said first and second devices each having an associated device certificate, each of said device certificates having a unique device identifier for said corresponding device, and a user of said second dev

이 특허에 인용된 특허 (10)

  1. Fielder Guy L ; Alito Paul N, Bilateral authentication and information encryption token system and method.
  2. Ramasubramani, Seetharaman; King, Peter F., Centralized certificate management system for two-way interactive communication devices in data networks.
  3. Sumner Terence Edward, Encryption and decryption method and apparatus.
  4. Aucsmith David W. (Portland OR), Method and apparatus for cooperative messaging.
  5. Fraser Alexander Gibson ; Keshav Srinivasan ; Odlyzko A. M., Method and apparatus for crytographically protecting data.
  6. Hanqing Liao ; Stephen S. Boyle ; Peter F. King ; Bruce V. Schwartz, Method and system for secure lightweight transactions in wireless data networks.
  7. Cudak Mark Conrad ; Mueller Bruce Dale ; Kelton James Robert ; Classon Brian Keith, Network protocol method, access point device and peripheral devices for providing for an efficient centrally coordinated peer-to-peer wireless communications network.
  8. Harris Jeffrey Martin ; Woodward Ernest Earl ; Borgstahl Ronald W., Personal data storage and transaction device system and method.
  9. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  10. Reynolds Kevin T., Radio activated personal infrared distress beacon.

이 특허를 인용한 특허 (257)

  1. Straumann,Hugo; Baessler,Felix, Access control system, access control method and devices suitable therefor.
  2. Himmelstein, Richard B., Accessing an automobile with a transponder.
  3. Himmelstein, Richard B., Accessing an automobile with a transponder.
  4. Noguchi,Tetsuya; Shimotono,Susumu, Ad-hoc radio communication verification system.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  6. Bindel, Frank; Brackmann, Ludwig, Administrator for automatically adapting a transmission channel.
  7. Himmelstein, Richard B., Advanced wireless vehicle services.
  8. Du, Zhiqiang; Tie, Manxia; Zhang, Guoqiang, Air interface security method and device.
  9. Messenger, Jayson; Yuen, Shelten, Alarm setting and interfacing with gesture contact interfacing controls.
  10. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  11. Silvester,Kelan C., Apparatus and method for an audio channel switching wireless device.
  12. Silvester,Kelan C., Apparatus and method for wireless device set-up and authentication using audio authenticationinformation.
  13. Silvester,Kelan C., Apparatus and method for wireless/wired communications interface.
  14. Hein, Christopher, Authenticating a limited input device via an authenticated application.
  15. Sato, Masahiko; Ikeda, Hidekazu, Authenticating method for short-distance radio devices and a short-distance radio device.
  16. Sato,Masahiko; Ikeda,Hidekazu, Authenticating method for short-distance radio devices and a short-distance radio device.
  17. Gilbert, Mark; Mevissen, Ron J., Authorization of device access to network services.
  18. Gilbert, Mark; Mevissen, Ron J., Authorization of device access to network services.
  19. Hassan, Amer A.; Desai, Mitesh K.; Roychoudhury, Trideepraj; Sankaranarayan, Mukund; Filgueiras, Henrique; Clear, Mark, Auto connect in peer-to-peer network.
  20. Desai, Mitesh K.; Hassan, Amer A.; Roychoudhury, Trideepraj; Sankaranarayan, Mukund; Anders, Jr., Billy R.; Filgueiras, Henrique, Auto-connect in a peer-to-peer network.
  21. Hassan, Amer A.; Desai, Mitesh K.; Elhaddad, Mahmoud S.; Roychoudhury, Trideepraj, Auto-connect in a peer-to-peer network.
  22. McKillop, Chris; Wiebe, Chris, Automated pairing of wireless accessories with host devices.
  23. DeLuca, Michael Joseph, Automatic application management in a short-range wireless system.
  24. Donaghey, Robert J, Automatic attachment and detachment for hub and peripheral devices.
  25. Donaghey, Robert J., Automatic attachment and detachment for hub and peripheral devices.
  26. Eisenbach, Andre, Automatic data encryption and access control based on Bluetooth device proximity.
  27. Eisenbach, Andre, Automatic data encryption and access control based on bluetooth device proximity.
  28. Eisenbach, Andre, Automatic data encryption and access control based on bluetooth device proximity.
  29. Eisenbach,Andre, Automatic data encryption and access control based on bluetooth device proximity.
  30. Eisenbach, Andre, Automatic network and device configuration for handheld devices based on bluetooth device proximity.
  31. Eisenbach,Andre, Automatic resource availability using Bluetooth.
  32. Eisenbach, Andre, Automatic resource availability using bluetooth.
  33. Eisenbach, Andre, Automatic resource availability using bluetooth.
  34. Bajikar,Sundeep M., Bluetooth짰 based security system.
  35. Zhang, Junbiao, Broker-based interworking using hierarchical certificates.
  36. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Calendar integration methods and systems for presentation of events having combined activity and location information.
  37. Ananny, John Meron; Kalayjian, Nicholas Robert, Calibration techniques for activity sensing devices.
  38. Ananny, John Meron; Kalayjian, Nicholas Robert, Calibration techniques for activity sensing devices.
  39. Zhang, Junbiao; Wang, Charles Chuanming; Li, Jun, Certificate based authentication authorization accounting scheme for loose coupling interworking.
  40. Lydon, Gregory T.; Laefer, Jay S.; Ananny, John; Tikalsky, Terry, Communication between a host device and an accessory via an intermediate device.
  41. Lydon, Gregory T.; Laefer, Jay S.; Ananny, John; Tikalsky, Terry, Communication between a host device and an accessory via an intermediate device.
  42. Lydon, Gregory T.; Laefer, Jay S.; Ananny, John; Tikalsky, Terry, Communication between a host device and an accessory via an intermediate device.
  43. Lydon, Gregory T.; Laefer, Jay S.; Ananny, John; Tikalsky, Terry, Communication between a host device and an accessory via an intermediate device.
  44. Fukuda,Kunio, Communication device and communication method.
  45. Fukuda, Kunio; Kawashima, Isao; Ukita, Yoshitaka, Communication device communication method, and communication terminal device.
  46. Arai,Shunji, Communication system, server device, client device and method for controlling the same.
  47. Himmelstein, Richard B., Communications between a mobile device and vehicle based computer.
  48. Lang, Thomas; Orehek, Martin, Computing arrangement.
  49. Prakash, Rajat; Horn, Gavin Bernard; Jain, Nikhil; Rezaiifar, Ramin, Connection setup using flexible protocol configuration.
  50. Aerrabotu,Naveen; Tran,Phieu; Vogedes,Jerome, Contact validation and trusted contact updating in mobile wireless communications devices.
  51. Cho, Sunghyun; Choi, Jingu; Jo, Youngjun; Kim, Soyoung; Kang, Youngwook, Content reproduction method and device.
  52. Bardsley, Jeffrey Scott; Kim, Nathaniel Wook; Lingafelt, Charles Steven; Roginsky, Allen Leonid; Strole, Norman Clark, Control of port based authentication protocols and process to support transfer of connection information.
  53. Li, Xizhe; Tian, Hongping; Xie, Wei; Gu, Yun; Mao, Xingzhong; Yu, Chentao, Cooperation method and system of hardware secure units, and application device.
  54. Proudler,Graeme John; Balacheff,Boris, Data integrity monitoring in trusted computing entity.
  55. Kammer, David, Data prioritization and distribution limitation system and method.
  56. Kasaura, Tsuyoshi; Inoue, Sadayuki; Matsumoto, Soichiro; Shida, Tetsuro; Sato, Toshimitsu; Tsujishita, Masahiro, Data sending/receiving device and digital certificate issuing method.
  57. Bojinov, Hristo; Plotkin, Serge; Wood, Robert, Data storage and/or retrieval.
  58. Brown, Michael K.; Totzke, Scott; Little, Herb; Adams, Neil; Brown, Michael S., Determining a target transmit power of a wireless transmission.
  59. Willey, William D., Device authentication in a PKI.
  60. Willey, William Daniel, Device authentication in a PKI.
  61. Willey, William Daniel, Device authentication in a PKI.
  62. Kim, Jihwan; Yim, Jungbin; Park, Sihwa, Device for transmitting and receiving data using earphone and method for controlling the same.
  63. Haller, Amit; Fornell, Peter; Itzchak, Avraham; Haparnas, Ziv; Glick, Amir, Device, system, method and computer readable medium for pairing of devices in a short distance wireless network.
  64. Ranade, Prashant; Sheu, Ming-Jye, Dynamic PSK for hotspots.
  65. Ranade, Prashant; Sheu, Ming-Jye, Dynamic PSK for hotspots.
  66. Jou, Tyan-Shu; Sheu, Ming-Jye; Yang, Bo-Chieh; Lin, Tian-Yuan; Kuo, Ted Tsei, Dynamic authentication in secured wireless networks.
  67. Jou, Tyan-Shu; Sheu, Ming; Yang, Bo-Chieh; Lin, Tian-Yuan; Kuo, Ted Tsei, Dynamic authentication in secured wireless networks.
  68. Bradfield,Terry R.; Jackson,Jeff R.; Cormack,Christopher J., Dynamic local drive and printer sharing.
  69. Postma, Andre; Deckers, Robertus Theodorus Christianus, Electronic system and a method of providing additional functionality features to an electronic system.
  70. Whytock,Alexander W., Encrypting keypad module.
  71. Panjwani,Prakash; Blake Wilson,Simon, Enhanced subscriber authentication protocol.
  72. He, Yi; Shafi, Naji; Michaud, Alain; Huang, Heng; Ouyang, Joan, Enhancing user experience relative to peripheral devices.
  73. Jensen, Michael; Jasinski, Peter; Thuvara, Vineet, Enhancing user experience relative to peripheral devices.
  74. Pyle, Harry S.; Lieberman, Bruce Louis; Simon, Daniel R.; Simonnet, Guillaume; Dollar, William, Establishing secure mutual trust using an insecure password.
  75. Aboba,Bernard D.; Nixon,Toby L., Establishing secure peer networking in trust webs on open networks using shared secret device key.
  76. Aboba,Bernard D.; Nixon,Toby L., Establishing secure peer networking in trust webs on open networks using shared secret device key.
  77. Dawoud Shenouda Dawoud, Peter; Saboori, Anoosh; Soni, Himanshu; Ingalls, Dustin Michael; Porter, Nelly L., Establishing trust between two devices.
  78. Henry,Paul Shala; Jiang,Zhimei; Luo,Hui, Fast authentication and access control method for mobile networking.
  79. Henry, Paul Shala; Jiang, Zhimei; Luo, Hui, Fast authentication and access control system for mobile networking.
  80. Wahl, James; Viduya, Andres; Kessing, Ben; Byford, Roger Graham; Logan, James Randall; Tooze, Dominic; Shade, Philip; Lacy, Graham, Headset terminal with speech functionality.
  81. Annola, Johanna; Karvinen, Sonja; Karlsberg, Jari; Mäkinen, Rauno, Hiding a device.
  82. Annola, Johanna; Karvinen, Sonja; Karlsberg, Jari; Mäkinen, Rauno, Hiding a device.
  83. Mitsuhashi, Hiroyuki, Information processor, image forming apparatus, terminal apparatus, information processing system and non-transitory computer readable medium for establishing connection between apparatuses.
  84. Proudler, Graeme John; Balacheff, Boris, Information system.
  85. Wysocki, Christopher R.; Heller, David; Jawa, Amandeep; Gupta, Sandeep; Marriott, Greg; Sprauer, Max; Shayer, David A.; Archibald, John Wesley; Wells, Shannon E., Integrated media jukebox and physiologic data handling application.
  86. Rosinko, Michael, Integration of infusion pump with remote electronic device.
  87. Szoke, Thomas; Fozzati, Daniel; Vago, Andras, Intelligent peripheral device and system for the authentication and verification of individuals and/or documents through a secure multifunctional authentication service with data storage capability.
  88. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  89. Schwarz, Henry Samuel, Internet secure terminal for personal computers.
  90. Sheu, Ming-Jye; Ranade, Prashant, Key assignment for a brand.
  91. Sheu, Ming-Jye; Ranade, Prashant, Key assignment for a brand.
  92. Himmelstein, Richard B., Locating a target unit in a wireless network.
  93. Dhanani, Adil; Srivastava, Neeta; Kumar, Nitin; Paulson, Janell; Fong, Thomas, Location tracking for mobile computing device.
  94. Dhanani, Adil; Srivastava, Neeta; Kumar, Nitin; Paulson, Janell; Fong, Thomas, Location tracking for mobile computing device.
  95. Adams, Neil P., Management of multiple connections to a security token access device.
  96. Rimmer, Andrew Simon; Wishart, Andrew Jonathan Miles; Scholl, Gikger Rikf; Everett, Timothy J.; Bates, Robert N., Matched communicating devices.
  97. Michaelis, Oliver, Method and apparatus to create trust domains based on proximity.
  98. Steiger,John Thomas; Schafrik, Jr.,Robert Edward; Hirsh,Amir; Dejoras Mendoza,Kristine, Method and system for communicating data to and from network security devices.
  99. Griffiths,Jonathan C., Method and system for electronic device authentication.
  100. Crosbie,David B., Method and system for enabling seamless roaming in a wireless network.
  101. Gehrmann,Christian, Method and system for establishing a wireless communication link.
  102. Vanstone, Scott A., Method and system for generating implicit certificates and applications to identity-based encryption (IBE).
  103. Vanstone, Scott A., Method and system for generating implicit certificates and applications to identity-based encryption (IBE).
  104. Juitt,David; Bates,Philip; Christoffel,Thomas; Crawshaw,Geoffrey; Crosbie,David, Method and system for managing data traffic in wireless networks.
  105. Kashyap, Srinath Hariharan, Method and system for mobile high-energy radiation treatment environment.
  106. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Method and system for music distribution.
  107. Elley,Yassir K.; Anderson,Anne H.; Hanna,Stephen R.; Mullan,Sean J.; Perlman,Radia J., Method and system for proving membership in a nested group using chains of credentials.
  108. O'Toole, James, Method and system for secure connection of peripheral device to processing device.
  109. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Method and systems for processing social interactive data and sharing of tracked activity associated with locations.
  110. Slick, Royce E.; Ferreira, Manuel; Mazzagatte, Craig, Method for associating an image-forming device, a mobile device, and a user.
  111. Sibert, Herve; Girault, Marc, Method for fast pre-authentication by distance recognition.
  112. Karjala,Jari; Paloj��rvi,Jari, Method for implementing secure corporate communication.
  113. Frikart, Marcel; Oberli, Markus; Frikart, Philippe; Strickland, Raymond; Jungen, Markus; Ehrsam, Matthias; Frey, Christian; Lindner, Felix, Method for pairing and authenticating one or more medical devices and one or more remote electronic devices.
  114. Sung, Yeul-Tak; Han, Young-Seop; Kim, Jae-Ho, Method for sharing a link key in a ZigBee network and a communication system therefor.
  115. Tie, Manxia; Tang, Houjian; Zhang, Bianling; Zhang, Ning; Ye, Xumao, Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely.
  116. Vanstone, Scott A., Method for the application of implicit signature schemes.
  117. Vanstone, Scott A., Method for the application of implicit signature schemes.
  118. Vanstone,Scott A., Method for the application of implicit signature schemes.
  119. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  120. Karjala,Jari; Paloj��rvi,Jari, Method of implementing secure access.
  121. Fischer, Jean-Bernard; Marcacci, Patrik; Schwarz, Christian; Wyseur, Brecht, Method to detect cloned software.
  122. Fischer, Jean-Bernard; Marcacci, Patrik; Schwarz, Christian; Wyseur, Brecht, Method to detect cloned software.
  123. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Methods and systems for classification of geographic locations for tracked activity.
  124. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Methods and systems for generation and rendering interactive events having combined activity and location information.
  125. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Methods and systems for geo-location optimized tracking and updating for events having combined activity and location information.
  126. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Methods and systems for identification of event data having combined activity and location information of portable monitoring devices.
  127. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Methods and systems for interactive goal setting and recommender using events having combined activity and location information.
  128. Yuen, Shelten Gee Jao; Park, James; Lee, Hans Christiansen, Methods and systems for metrics analysis and interactive rendering, including events having combined activity and location information.
  129. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  130. Park, James; Burton, Barry; Panther, Heiko; Friedman, Eric, Methods, systems and devices for activity tracking device data synchronization with computing devices.
  131. Messenger, Jayson; Burton, Barry; Park, James, Methods, systems and devices for automatic linking of activity tracking devices to user devices.
  132. Messenger, Jayson; Burton, Barry; Park, James, Methods, systems and devices for linking user devices to activity tracking devices.
  133. Hind,John R.; Peters,Marcia L., Methods, systems, and computer program products for securely transforming an audio stream to encoded text.
  134. Tanaka,Hiroshi; Miyake,Izumi, Mobile unit authenticating method.
  135. Yuen, Shelten; Roberts, Timothy, Motion-activated display of messages on an activity monitoring device.
  136. Yuen, Shelten; Roberts, Timothy, Motion-activated display of messages on an activity monitoring device.
  137. Hunter, Charles E.; Hebrank, John H.; Sparks, Kelly C., Music distribution system and associated antipiracy protections.
  138. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  139. Hunter, Charles Eric; Hebrank, John H., Music distribution systems.
  140. Hunter, Charles Eric; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  141. Binder, Yehuda, Network combining wired and non-wired segments.
  142. Binder, Yehuda, Network combining wired and non-wired segments.
  143. Binder, Yehuda, Network combining wired and non-wired segments.
  144. Binder, Yehuda, Network combining wired and non-wired segments.
  145. Binder, Yehuda, Network combining wired and non-wired segments.
  146. Binder, Yehuda, Network combining wired and non-wired segments.
  147. Binder, Yehuda, Network combining wired and non-wired segments.
  148. Goland,Yaron, Networked device branding for secure interaction in trust webs on open networks.
  149. Pereira, Mindy; Chen, Larry; Hornyak, Matthew; Haghighat, Amir, Notification on mobile device based on location of other mobile device.
  150. Morimoto, Kazunari, On-car-data recording apparatus and in-train-image data managing system.
  151. Kuo, Ted Tsei; Sheu, Ming-Jye; Lin, Tian-Yuan; Jou, Tyan-Shu, On-demand services by wireless base station virtualization.
  152. Kuo, Ted Tsei; Sheu, Ming-Jye; Lin, Tian-Yuan; Jou, Tyan-Shu, On-demand services by wireless base station virtualization.
  153. Kuo, Ted Tsei; Sheu, Ming-Jye; Lin, Tian-Yuan; Jou, Tyan-Shu, On-demand services by wireless base station virtualization.
  154. Wyld, Jeremy, Pairing of wireless devices using a wired medium.
  155. Jales, Richard; Tostevin, Stephen; Hull, Edward; Mallion, Andrew, Pairing techniques for network communications.
  156. Cheng, Yeqing; Baiani, Yasaman; Arnold, Jacob Antony; Russell, Allison Maya; McLean, Alan; Lopez, Delisa; Myers, Nicholas, Periodic inactivity alerts and achievement messages.
  157. Cantwell, James Gordon; Rivard, John Joseph; Draine, Sean Conway; Keremidarski, Svetlozar Emilov, Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store.
  158. Donaghey, Robert J, Personal area network apparatus.
  159. Donaghey, Robert J., Personal area network apparatus.
  160. Donaghey, Robert J, Personal area network with automatic attachment and detachment.
  161. Shen, Yangmin, Portable computing device and headset interface.
  162. Gupta, Sandeep; Marriott, Greg; Sprauer, Max; Shayer, David A.; Archibald, John Wesley; Wells, Shannon E., Portable media device with workout support.
  163. Gupta, Sandeep; Marriott, Greg; Sprauer, Max; Shayer, David A.; Archibald, John Wesley; Wells, Shannon E., Portable media device with workout support.
  164. Yuen, Shelten Gee Jao; Park, James; Friedman, Eric Nathan; Martinez, Mark Manuel; Axely, Andrew Cole, Portable monitoring devices for processing applications and processing analysis of physiological conditions of a user associated with the portable monitoring device.
  165. Yuen, Shelten Gee Jao; Park, James; Friedman, Eric Nathan; Martinez, Mark Manuel; Axely, Andrew Cole, Portable monitoring devices for processing applications and processing analysis of physiological conditions of a user associated with the portable monitoring device.
  166. Yamaguchi,Shingo, Printing mechanism for wireless devices.
  167. Blomquist, Michael L., Programmable insulin pump.
  168. Himmelstein, Richard B., Providing access with a portable device and voice commands.
  169. Yang, Bo-Chieh; Sheu, Ming; Kuo, Ted Tsei; Lin, Tian-Yuan; Jou, Tyan-Shu, Provisioned configuration for automatic wireless connection.
  170. Robertson, William Benjamin; Lopez, Jenna, Radio frequency patch antenna and system for permitting secure access to a restricted area.
  171. Shen, Ming-Jye; Miu, Allen, Remote cable access point reset.
  172. Blight, David C.; Lusher, Elaine, Resource location through location history.
  173. Blight, David C.; Lusher, Elaine, Resource location through location history.
  174. Blight,David; Lusher,Elaine, Resource location through location history.
  175. Rosinko, Michael, Safety processor for a drug delivery device.
  176. Rosinko, Michael, Safety processor for wireless control of a drug delivery device.
  177. Henry, Paul Shala; Luo, Hui; McNair, Bruce Edwin; Shankaranarayanan, Nemmara K., Secure IP access protocol framework and supporting network architecture.
  178. Morel, Shawn; Monica, Diogo; Monti, Eric; Wen, Sam; McCauley, Nathan, Secure communications between devices.
  179. Cummings, Darren Lynn; Jones, James Chester, Secure communications system for mobile devices.
  180. Vauclair, Marc; Serret Avila, Javier; Etienne, Lionel Georges; Teuwen, Philippe, Secure pairing for wired or wireless communications devices.
  181. Panther, Heiko Gernot Albert, Secure pairing of devices via pairing facilitator-intermediary device.
  182. Panther, Heiko Gernot Albert, Secure pairing of devices via pairing facilitator-intermediary device.
  183. MacKenzie, Patricia Denise; Bjorkesten, Lennart; Liu, Shaopeng; Holovashchenko, Viktor; Smith, David; Franzen, Erik Nils Patrik, Secure pairing of end user devices with instruments.
  184. McRae, Matthew B.; Huotari, Allen J., Secure pairing of networked devices.
  185. McRae, Matthew B.; Huotari, Allen J., Secure pairing of networked devices.
  186. Zhang, Kan; Kindberg, Timothy P. J. G.; Tourrilhes, Jean; Im, Seunghyun, Secure spontaneous associations between networkable devices.
  187. Himmelstein, Richard B., Security and safety processing by a vehicle based computer.
  188. Leedom, Jr., Charles M., Security system for handheld wireless devices using time-variable encryption keys.
  189. Leedom, Jr., Charles M., Security system for handheld wireless devices using time-variable encryption keys.
  190. Leedom, Jr., Charles M., Security system for handheld wireless devices using-time variable encryption keys.
  191. Arnold, Jacob Antony; Russell, Allison Maya; Wasson, II, Zachariah Lord; Yuen, Shelten Gee Jao, Sedentary period detection utilizing a wearable electronic device.
  192. Sheu, Ming-Jye, Sharing security keys with headless devices.
  193. Alten, Brett G.; Borchers, Robert Edward, Smart garment.
  194. Alten, Brett G.; Borchers, Robert Edward, Smart garment.
  195. Robertson, William Benjamin; Barden, Robert P., System and method for accessing a structure using a mobile device.
  196. Robertson, William Benjamin; Barden, Robert P., System and method for accessing a structure using a mobile device.
  197. Robertson, William Benjamin; Barden, Robert P., System and method for accessing a structure using a mobile device.
  198. Kassiedass, Sanathan; Taylor, Sean, System and method for associating an electronic device with a remote device having a voice interface.
  199. Willming,David; Chan,Paul; Necka,William; Lee,Ronald, System and method for automatic digital certificate installation on a network device in a data-over-cable system.
  200. Kirkup, Michael G.; Brown, Michael K.; Brown, Michael S., System and method for exchanging encryption keys between a mobile device and a peripheral device.
  201. Kirkup, Michael Grant; Brown, Michael Kenneth; Brown, Michael Stephen, System and method for exchanging encryption keys between a mobile device and a peripheral device.
  202. Kirkup, Michael Grant; Brown, Michael Kenneth; Brown, Michael Stephen, System and method for exchanging encryption keys between a mobile device and a peripheral device.
  203. Kirkup, Michael G.; Brown, Michael K.; Brown, Michael S., System and method for exchanging encryption keys between a mobile device and a peripheral output device.
  204. Swander, Brian D.; Aboba, Bernard D., System and method for improved network security.
  205. Pinkus, Michael Collins; James, Mark A.; Wisniewski, James Alan, System and method for independent control of for-hire vehicles.
  206. Blight, David; Slabon, legal representative, Marzena; Lusher, Elaine, System and method for locating and accessing wireless resources.
  207. Gasparini, Louis A; Harris, William H, System and method for making accessible a set of services to users.
  208. Himmelstein, Richard B., System and method for matching users in a wireless communication system.
  209. Himmelstein, Richard B., System and method for matching wireless devices.
  210. Stewart, William K., System and method for monitoring locations of mobile devices.
  211. Robertson, William Benjamin; Robertson, Andrew Joseph, System and method for permitting secure access to a structure.
  212. Blight, David C.; Wong, Yoon Kean, System and method for providing secured access to mobile devices.
  213. Hawkins, Jeffrey C.; Cousineau, Bernard Paul; Blight, David C.; Wong, Yoon Kean, System and method for providing secured access to mobile devices.
  214. Paryani, Harish, System and method for remotely controlling bluetooth enabled electronic equipment.
  215. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  216. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  217. Feikis, John; Ashenbrenner, Robert, System and method for securely pairing a wireless peripheral to a host.
  218. Wang,Xin, System and method for transferring the right to decode messages.
  219. Himmelstein, Richard B., System and method for wireless communication between a vehicle and a mobile unit.
  220. Molettiere, Peter Andrew; Park, James; Bilodeaux-Dewey, Aislinn Abigail; Brumback, Christine Boomer; Friedman, Eric Nathan; Cole, Robert Curtis; Panther, Heiko Gernot Albert; Axley, Andrew Cole, System and method for wireless device pairing.
  221. Molettiere, Peter Andrew; Park, James; Bilodeaux-Dewey, Aislinn Abigail; Brumback, Christine Boomer; Friedman, Eric Nathan; Cole, Robert Curtis; Panther, Heiko Gernot Albert; Axley, Andrew Cole, System and method for wireless device pairing.
  222. Molettiere, Peter Andrew; Park, James; Bilodeaux-Dewey, Aislinn Abigail; Brumback, Christine Boomer; Friedman, Eric Nathan; Cole, Robert Curtis; Panther, Heiko Gernot Albert; Axley, Andrew Cole, System and method for wireless device pairing.
  223. Molettiere, Peter Andrew; Park, James; Bilodeaux-Dewey, Aislinn Abigail; Brumback, Christine Boomer; Friedman, Eric Nathan; Cole, Robert Curtis; Panther, Heiko Gernot Albert; Axley, Andrew Cole, System and method for wireless device pairing.
  224. Yan, Yu; Yang, Dazhi; Zhang, Wen; Ma, Bin, System and processing method for electronic authentication client, and system and method for electronic authentication.
  225. Robertson, William Benjamin; Keck, Bob P, System for permitting secure access to a restricted area.
  226. Robertson, William Benjamin; Keck, Robert A, System for permitting secure access to a restricted area.
  227. Hunter, Charles E.; Ballou, Jr., Bernard L.; Hebrank, John H., Systems and methods for distribution of entertainment and advertising content.
  228. Singhal, Tara Chand, Systems and methods for multi-factor remote user authentication.
  229. Hind,John R.; Peters,Marcia L., Technique for digitally notarizing a collection of data streams.
  230. Tsirtsis, George, Third party validation of internet protocol addresses.
  231. Vanderveen, Michaela; Tsirtsis, George; Park, Vincent D.; Corson, M. Scott, Ticket-based configuration parameters validation.
  232. Vanderveen, Michaela; Tsirtsis, Georgios; Park, Vincent D.; Corson, Mathew Scott, Ticket-based configuration parameters validation.
  233. Vanderveen, Michaela; Xiao, Lu, Ticket-based spectrum authorization and access control.
  234. Molettiere, Peter Andrew; Yuen, Shelten Gee Jao; Hong, Jung Ook; Axley, Andrew Cole; Park, James, Tracking user physical activity with multiple devices.
  235. Lazaridis, Mihal; Staikos, George Ross; Pecen, Mark E., Transferring a voice call.
  236. Brown,Richard; Pearson,Siani Lynne; Dalton,Christopher I., Trusted computing environment.
  237. Pearson,Siani Lynne; Chen,Liqun, Trusted system.
  238. Sista, Sreenivasa Prasad, Unique identification for an information handling system.
  239. Wood, Robert Henderson; Bowman, Roger Paul; Bender, Christopher Lyle; Robertson, Ian Michael; Vandeputte, Casey Jonathan, Use of certificate authority to control a device's access to services.
  240. Wood, Robert Henderson; Bowman, Roger Paul; Bender, Christopher Lyle; Robertson, Ian Michael; Vandeputte, Casey Jonathan, Use of certificate authority to control a device's access to services.
  241. Finkelstein, Jeffrey; Tse, Edmund; Williams, David; Maes, Stephane, Use of position data to select wireless access point.
  242. Kumar, Nitin, Use of wireless access point ID for position determination.
  243. Kumar, Nitin, Use of wireless access point ID for position determination.
  244. Pereira, Mindy; Chen, Larry; Hornyak, Matthew, User defined names for displaying monitored location.
  245. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  246. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  247. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  248. Himmelstein, Richard B., Wireless communication method.
  249. Himmelstein, Richard B., Wireless communication method.
  250. Himmelstein, Richard B., Wireless communication method.
  251. Braho, Keith; Byford, Roger Graham; Kerr, Thomas S.; El-Jaroudi, Amro, Wireless headset and method for robust voice data communication.
  252. Modzelewski, Brent E.; Leone, Steven V., Wireless pairing of personal health device with a computing device.
  253. Modzelewski, Brent E.; Leone, Steven V., Wireless pairing of personal health device with a computing device.
  254. Park, James; Panther, Heiko Gernot Albert; Burton, Barry Christopher; Friedman, Eric Nathan, Wireless portable activity-monitoring device syncing.
  255. Abdo,Samer; Ambuehl,Rolf; Bodenmann,Olivier, Wireless secure device.
  256. Koenig, Michael F.; Fishman, Neil S.; Snyder, Ira L., Wireless shared resource computing.
  257. Koenig, Michael F.; Fishman, Neil S.; Snyder, Ira L., Wireless shared resource computing.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로