$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for secure three-party communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0106138 (2002-03-25)
발명자 / 주소
  • Nagel,Robert H.
  • Felsher,David P.
  • Hoffberg,Steven M.
출원인 / 주소
  • Nagel,Robert H.
  • Felsher,David P.
  • Hoffberg,Steven M.
대리인 / 주소
    Milde & Hoffberg LLP
인용정보 피인용 횟수 : 600  인용 특허 : 685

초록

초록이 없습니다.

대표청구항

대표청구항이 없습니다.

이 특허에 인용된 특허 (685)

  1. Sidlauskas David P. (San Jose CA), 3D hand profile identification apparatus.
  2. Dugan Andrew J. ; McDysan David E., ATM virtual private networks.
  3. Arnold Todd W. (Charlotte NC), Access control apparatus and method.
  4. Carroll Gary T. (Boulder CO) Pilmanis George J. (Boulder CO) Stinton Vincent D. (Littleton CO), Adaptable electronic monitoring and identification system.
  5. Brickell Ernest F. ; Sudia Frank W. ; Kravitz David William ; Freund Peter C. ; Angeles Patrick J., Adaptive multi-step digital signature system and method of operation thereof.
  6. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  7. Camp Linda Jean ; Tygar Justin D. ; Harkavy Michael R., Anonymous certified delivery.
  8. Micali Silvio, Anonymous information retrieval system (ARS).
  9. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  10. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  11. Holloway Christopher J.,GBX ; Matyas ; Jr. Stephen Michael, Apparatus and method for authentication of printed documents.
  12. Faulkner Keith W. (Reading GBX), Apparatus and method for biometric identification using silhouette and displacement images of a portion of a person\s ha.
  13. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  14. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  15. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  16. Keagy John Martin ; Pinkhasik Naum ; Muzel Alexander,RUX, Apparatus and method for electronically acquiring fingerprint images.
  17. Yemini Yechiam (Briarcliff Manor NY) Yemini Shaula (Briarcliff Manor NY) Kliger Shmuel (Ossining NY), Apparatus and method for event correlation and problem reporting.
  18. Noda, Takuro; Aoki, Yukihiko, Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets.
  19. Taylor Kenneth E. (Champaign IL) Glickman Jeff B. (Champaign IL), Apparatus and method for matching image characteristics such as fingerprint minutiae.
  20. Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
  21. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  22. Timson Colin J.,GBX ; Yap Chas Hock Eng,GBX ; Kelly Sean,GBX, Apparatus and method for providing access to secured data or area.
  23. Muratani Hirofumi,JPX ; Muto Akihiro,JPX, Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use.
  24. Hassan Amer Aref ; Hershey John Erik ; Chennakeshu Sandeep, Apparatus and method for secure communication based on channel characteristics.
  25. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  26. Davis Derek L. ; Jones Peter, Apparatus and method for securing captured data transmitted between two sources.
  27. Kanevsky Dimitri ; Maes Stephane Herman, Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic mo.
  28. Benton William M. (Fort Lauderdale FL) Mee William (Pompano Beach FL), Apparatus for carrying out financial transactions via a facsimile machine.
  29. Bradley William C. ; Mesher Mark L., Apparatus for coupling multiple data sources onto a printed document.
  30. Bradley William C. ; Mesher Mark L., Apparatus for coupling multiple data sources onto a printed document.
  31. Makoto Saito JP, Apparatus for data copyright management system.
  32. Kenneth Alexander R.,GBX ; Stewart Mark J.,GBX, Apparatus for issuing integrated circuit cards.
  33. Swartz Jerome ; Joseph Eugene ; Katz Joseph, Apparatus for processing symbol-encoded credit card information.
  34. Ciacelli Mark Louis ; Urda John William ; Lam Wai Man ; Kouloheris Jack Lawrence ; Fetkovich John Edward, Apparatus, method and computer program product for protecting copyright data within a computer system.
  35. DiRienzo Andrew L. ; Powell ; Jr. Raymond H. J., Attachment integrated claims system and operating method therefor.
  36. Berson William ; Bernobich Elizabeth ; Heiden Richard W. ; Potoczek Richard A. ; Sisson Robert W. ; Violante Anthony F., Auditable security system for the generation of cryptographically protected digital data.
  37. Tanaka Toshiaki,JPX ; Hada Satoshi,JPX ; Yamada Mitsuru,JPX, Authentication method and system using IC card.
  38. Tabuki Takaaki,JPX, Authentication method for networks.
  39. Kusakabe Susumu,JPX ; Takada Masayuki,JPX, Authentication method, communication method, and information processing apparatus.
  40. Meadows ; II Dexter L. ; Pouratian Allen J., Automated fingerprint identification system.
  41. Langhans Stephen (San Francisco CA) Goodman Laurence M. (Foster City CA) Shapiro Sigman L. (Alamo CA), Automated purchasing control system.
  42. Chan Chih S. ; Moussa Mohamed A., Automated verification and prevention of spoofing for biometric data.
  43. Wildes Richard P. (Princeton NJ) Asmuth Jane C. (Princeton NJ) Hanna Keith J. (Princeton NJ) Hsu Stephen C. (East Windsor NJ) Kolczynski Raymond J. (Trenton NJ) Matey James R. (Hamilton Township ; Me, Automated, non-invasive iris recognition system and method.
  44. Wildes Richard Patrick ; Asmuth Jane Circle ; Hanna Keith James ; Hsu Stephen Charles ; Kolczynski Raymond Joseph ; Matey James Regis ; McBride Sterling Eduard, Automated, non-invasive iris recognition system and method.
  45. Li Jim Y. ; Cobbs Archie L. ; Ozzello Paul D., Automatic configuration for internet access device.
  46. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Biometric controlled key generation.
  47. Payne John H., Biometric face recognition for applicant screening.
  48. Price-Francis Stephen, Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives.
  49. Dunn Christopher S.,CAX ; Borza Stephen J.,CAX ; Freedman Gordon,CAX, Biometric input device with peripheral port.
  50. Borza Michael Andrew,CAX, Biometric input with encryption.
  51. McCoy Mike ; Chu Kim-Ying ; Annulis James M., Biometric personnel identification system.
  52. Brady Mark J., Biometric recognition using a classification neural network.
  53. DiMaria Peter C. ; Madsen James, Biometric time and attendance system with epidermal topographical updating capability.
  54. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  55. Borza Stephen J.,CAX, Biometrically secured control system for preventing the unauthorized use of a vehicle.
  56. Philipp Harald (651 Holiday Dr. ; Bldg 5 ; Ste. 300 Pittsburgh PA 15200), Capacitively coupled identity verification and escort memory apparatus.
  57. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Card-computer moderated systems.
  58. Stinson Michael C. ; Templer ; Jr. John W. ; Clower Dyron, Cardless automated teller transactions.
  59. Colvin ; Sr. Bryan, Centralized secure communications system.
  60. Micali Silvio, Certificate issue lists.
  61. Weiant ; Jr. Monroe A. ; Ryan ; Jr. Frederick W., Certificate meter with selectable indemnification provisions.
  62. Micali Silvio, Certificate revocation system.
  63. Micali Silvio, Certificate revocation system.
  64. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Certificate revocation system.
  65. Deindl Michael,DEX ; Hanel Walter,DEX ; Schaal Albert,DEX, Certification of cryptographic keys for chipcards.
  66. Trew Timothy I. P. (Horley GB2) Gallery Richard D. (Horley GB2), Classifying faces.
  67. Schneiderman Barry (P.O. Box 53 Rye NH 03870), Clinical database of classified out-patients for tracking primary care outcome.
  68. Kunzelman Kevin ; Hutto Sterling, Common session token system and protocol.
  69. Yamamoto Takahisa,JPX, Communication apparatus and a communication system.
  70. Tatebayashi Makoto,JPX ; Matsuzaki Natsume,JPX ; Harada Syunji,JPX ; Omori Motoji,JPX ; Kozuka Masayuki,JPX ; Yamauchi Kazuhiko,JPX, Communication device which performs two-way encryption authentication in challenge response format.
  71. Brown Daniel Peter ; Finkelstein Louis David ; Pennypacker Frank C., Communication method and device.
  72. Davis Michael G. ; Harting David G. ; Burr Scott F. ; Davies Robert V. ; Bernardi Robert J., Communications headset with universally adaptable receiver and voice transmitter.
  73. Coiera Enrico Guglielmo,GBX ; Gupta Ajay,INX, Communications system for establishing a communication channel on the basis of a functional role or task.
  74. Reed Drummond Shattuck ; Heyman Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Communications system for transferring information between memories according to processes transferred with the information.
  75. Sandford ; II Maxwell T. ; Handel Theodore G. ; Bradley Jonathan N., Compression embedding.
  76. Sandford ; II Maxwell T. ; Handel Theodore G. ; Bradley Jonathan N., Compression embedding.
  77. Narasimhalu Arcot Desai,SGX ; Deng Huijie,SGX ; Wang Weiguo,SGX, Computationally efficient method for trusted and dynamic digital objects dissemination.
  78. Ford Warwick S. (Nepean CAX) Wiener Michael J. (Nepean CAX), Computer network cryptographic key distribution system.
  79. Berlin Howard ; Bochsler Jack W., Computer network debit disk used for prepayment to transfer information from a central computer.
  80. Veneklase Brian J., Computer security system.
  81. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  82. Hunt William A. ; Yauch Elizabeth F. ; Denovich Mark, Computer software for processing medical billing record information.
  83. Karpf Ronald S., Computer system and method for accessing medical information over a network.
  84. Chandos Ronald V. (Tempe AZ) Foster Robert I. (Mesa AZ), Computer system and method for secure remote communication sessions.
  85. Eberhardt Silvio P., Computer system and method for storing medical histories using a smartcard to store data.
  86. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  87. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  88. Benson Glenn,DEX, Computer system for protecting software and a method for protecting software.
  89. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  90. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  91. Thorsen Hans Verner,SEX, Computer-implemented control of access to atomic data items.
  92. Wical Kelly, Concept knowledge base search and retrieval system.
  93. Sullivan Robert R. ; Acken John M. ; Aucsmith David W., Conditional access and content security method.
  94. Johns-Vano Kerry Lucille ; Harrison David Michael ; Carswell Phillip Anthony ; Perea William Louis ; Lien Ty Bao, Configurable cryptographic processing engine and method.
  95. Traw Chandler Brendan Stanton ; Aucsmith David Wayne, Content protection for transmission systems.
  96. Gong Li, Controlling access to a resource.
  97. McDonough John C. ; Saravanan Thiagarajan ; Amatucci Michael P. ; Iannucci Louis A. ; Ingham David M., Controlling access to information.
  98. Park Tae Joon,KRX, Copy prevention method and apparatus for digital video system.
  99. Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Counterfeit proof ID card having a scrambled facial image.
  100. Becker Glenn ; Dahbour Salam H., Covert digital identifying indicia for digital image.
  101. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  102. Scheidt Edward M. ; Wack C. Jay, Cryptographic communication process and apparatus.
  103. Namba Hikari,JPX ; Takaragi Kazuo,JPX ; Miyazaki Satoshi,JPX, Cryptographic communication system.
  104. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  105. Moreau Thierry,CAXITX H1M 2A1, Cryptographic data integrity with serial bit processing and pseudo-random generators.
  106. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  107. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  108. Bjorn Vance, Cryptographic key generation using biometric data.
  109. Dai Wei, Cryptographic system and method with fast decryption.
  110. Miyaguchi Shoji (Yokohama JPX), Cryptosystem.
  111. Smid Miles E. (Silver Spring MD) Branstad Dennis K. (Gaithersburg MD), Crytographic key notarization methods and apparatus.
  112. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  113. Beker Henry J. (Wokingham GB2) Halliden Paul W. (Salisbury GB2) Friend John M. K. (Purlieu GB2), Data communication systems and methods.
  114. Saito Makoto,JPX ; Momiki Shunichi,JPX, Data copyright management system.
  115. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  116. Sanford ; II Maxwell T. ; Handel Theodore G., Data embedding employing degenerate clusters of data having differences less than noise value.
  117. Heer Daniel Nelson ; Maher David P., Data encryption security module.
  118. Saito Makoto,JPX, Data management system.
  119. Saito Makoto,JPX, Data management system.
  120. Yin John, Data security system and method.
  121. Sandford ; II Maxwell T. ; Handel Theodore G., Data validation.
  122. Fernadez Alberto J. (Miami FL), Data verification method and magnetic media therefor.
  123. Gower Stefan F., Database system with methods for controlling object interaction by establishing database contracts between objects.
  124. Gower Stefan F. (Fremont CA), Database system with methods for controlling object interaction by establishing database contracts between objects.
  125. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  126. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  127. Alessandro Manneschi,ITX, Dector system for access control, and a detector assembly for implementing such a system.
  128. Sloane Neil J. A. (Highland Park NJ), Delivery of medical services using electronic data communications.
  129. Boule Jean-Pierre (12 rue de la Rsistance 14540 Soliers FRX) Hamel Dominique (37 rue Lanfranc 14000 Caen FRX) Menconi Martial (Rsidence Olympia 14000 Caen FRX), Device and method to render secure the transfer of data between a videotex terminal and a server.
  130. Tatebayashi Makoto,JPX ; Matsuzaki Natsume,JPX ; Fukushima Yoshihisa,JPX ; Hirayama Koichi,JPX ; Ishihara Atsushi,JPX, Device authentication system which allows the authentication function to be changed.
  131. Mills Robert A. (Gambrills MD) Unkenholz Mark R. (Eldersburg MD) Wilson Mark W. (Columbia MD) Burroughs John E. (Annapolis MD), Device for and method of cryptography that allows third party access.
  132. Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
  133. Selker Harry P. ; Griffith John L. ; Beshansky Joni R., Diagnostic tool using a predictive instrument.
  134. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  135. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  136. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  137. Candelore Brant, Digital coupons for pay televisions.
  138. Renaud Benjamin J., Digital signatures for data streams and data archives.
  139. Cox Ingemar J. ; Miller Matthew L.,LTX ; Tanaka Kazuyoshi,JPX ; Wakasu Yutaka,JPX, Digital watermarking.
  140. Wang Shen-ge, Digital watermarking using conjugate halftone screens.
  141. Knox Keith T., Digital watermarking using stochastic screen patterns.
  142. LeBourgeois John H., Digitally certifying a user identity and a computer system in combination.
  143. Micali Silvio, Distributed split-key cryptosystem and applications.
  144. Smithies Christopher Paul Kenneth,GBX ; Newman Jeremy Mark,GBX, Document and signature data capture system and method.
  145. Grantham Paul V. ; Lyles Joseph B. ; Smith William T., Document communications controller.
  146. Dipankar Gupta, Document transfer systems.
  147. Jachimowicz Karen E. ; Novis Scott R. ; Barry Dennis, Dual card smart card reader.
  148. Findley ; Jr. Raymond ; Dixon Robert, Dual smart card access control electronic data storage and retrieval system and methods.
  149. Scanlan Thomas K., Dynamic assignment of security parameters to web pages.
  150. Lerner Kenneth ; Burgan John, Dynamic private key security system for personal messaging devices.
  151. Bowker J. Kent ; Miller Stephen G. ; Lubard Stephen C. ; Wartman John M. ; Bolton Clive, Economical skin-pattern-acquisition and analysis apparatus for access control; systems controlled thereby.
  152. Yacobi Yacov (Berkeley Heights NJ), Efficient electronic money.
  153. Jarecki Stanislaw ; Odlyzko Andrew M., Efficient micropayment system.
  154. Hardy Ann Ewing ; Hardy Norman ; Tribble E. Dean, Electronic authority server.
  155. Smorodinsky Lev, Electronic bill presentment and payment system which deters cheating by employing hashes and digital signatures.
  156. Takahashi Naoki,JPX ; Shiina Hiromitsu,JPX ; Matsunawa Masahito,JPX ; Yamada Shinichi,JPX ; Kamada Yoshiharu,JPX ; Miyake Tsuyoshi,JPX ; Okamura Akira,JPX ; Tominaga Masasuke,JPX, Electronic business transaction system with notarization database and means for conducting a notarization procedure.
  157. Fujisaki Eiichiro,JPX ; Okamoto Tatsuaki,JPX ; Ohta Kazuo,JPX, Electronic cash implementing method using a trustee.
  158. Okamoto Tatsuaki,JPX, Electronic cash implementing method with a surveillance institution, and user apparatus and surveillance institution apparatus for implementing the same.
  159. Loosmore N. Bert (New York NY) Ehrman Kenneth (New York NY) Jagid Bruce (New York NY), Electronic control system/network.
  160. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  161. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  162. Anderson Robert ; Schultz George R. ; Heptig John P., Electronic encryption device and method.
  163. Doggett John (Brookline MA) Jaffe Frank A. (Sharon MA) Anderson Milton M. (Fair Haven NJ), Electronic funds transfer instruments.
  164. Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
  165. Landfield Kent B. (Papillion NE) Zechmann Albert J. (Omaha NE), Electronic mail management system for operation on a host computer system.
  166. Landfield Kent B. ; Zechmann Albert J., Electronic mail management system for operation on a host computer system.
  167. Myers Dennis Lee ; Culp Kim Steven, Electronic medical record using text database.
  168. Evans Jae A., Electronic medical records system.
  169. Earl Mark J. ; Valenzuela Antonio P. ; Toll Michael C. ; Larson Wayne F., Electronic security system.
  170. Rosen Sholom S., Electronic-monetary system.
  171. Rosen Sholom S., Electronic-monetary system.
  172. Rosen Sholom S., Electronic-monetary system.
  173. Rosen Sholom S., Electronic-monetary system.
  174. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  175. Cass Todd A. ; Tong Xin, Encoding data in color images using patterned color modulated image regions.
  176. Okamoto Eiji,JPX ; Mambo Masahiro,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kawai Tooru,JPX ; Takaragi Kazuo,JPX ; Torii Naoya,JPX ; Tanida Takeshi,JPX, Encrypted data recovery method using split storage key and system thereof.
  177. Heer Daniel N. ; Rance Robert J., Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network.
  178. Saito Tamio,JPX ; Tokuyo Masanaga,JPX ; Iida Ichiro,JPX ; Takada Yuji,JPX, Encryption communication system using an agent and a storage medium for storing that agent.
  179. Wright Andrew S.,CAX, Encryption of data packets using a sequence of private keys generated from a public key exchange.
  180. Everhart Joseph R. (Holmdel NJ) Osborn Jeffrey G. (Old Bridge NJ), Encryption system key distribution method and apparatus.
  181. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  182. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  183. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  184. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  185. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  186. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  187. Weiss Kenneth P. (Newton MA), Enhanced security for a secure token code.
  188. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  189. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  190. Hoffberg Steven Mark ; Hoffberg-Borghesani Linda Irene, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  191. Schneier Bruce ; Kelsey John M., Event auditing system.
  192. Brothers Harlan Jay ; Genly Chris Hind, Event verification system.
  193. Coffin Jeffrey S. ; Ingram Darryl, Facial recognition system for security access and identification.
  194. Lermuzeaux Jean-Marc (St Michel sur Orge FRX) Emery Thierry (St Germain les Arpajon FRX) Gonthier Patrice (Antony FRX), Facility for detecting intruders and suspect callers in a computer installation and a security system including such a f.
  195. Henry Paul S. (Holmdel NJ), Fast real-time public key cryptography.
  196. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  197. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  198. Fielder Guy L. ; Alito Paul N., File encryption method and system.
  199. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  200. Bonder Ronne ; Fisher ; Jr. Albert J., Fingerprint identification security system.
  201. Salatino Matthew M. ; Setlak Dale R. ; Newton Mike ; Adkins Cal ; Van Vanno Nicolaas W., Fingerprint sensor and token reader and associated methods.
  202. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  203. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  204. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  205. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  206. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  207. Anand Rangachari ; Giraud Frederique-Anne ; Islam Nayeem ; Jaeger Trent Ray ; Liedtke Jochen, Flexible and dynamic derivation of permissions.
  208. Bhaskaran Vasudev ; Ratnakar Viresh, Fragile watermarks for detecting tampering in images.
  209. Copley Jeffrey D. ; Whited John ; Brown ; Jr. Marcus V. ; Kohli Pardeep, Fully flexible routing service for an advanced intelligent network.
  210. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  211. Johnson Donald B., Generating unique and unpredictable values.
  212. Rhoads Geoffrey B., Graphics processing system employing embedded code signals.
  213. Harkins Dan, Group key distribution.
  214. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Guaranteed partial key-escrow.
  215. Smyers Scott D., Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network.
  216. Raymond Stephen A. ; Gordon Geoffrey E. ; Singer Daniel B., Health monitoring system.
  217. Bouricius Willard G. (Katonah NY) Feistel Horst (Lexington MA), High security system for electronic signature verification.
  218. Weber David C. ; Trolinger James D., Holographic labeling and reading machine for authentication and security applications.
  219. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Human factored interface incorporating adaptive pattern recognition based controller apparatus.
  220. Pearson Peter Kelley ; Rowley Thomas Edward ; Upton Jimmy Ray, Identification and security using biometric measurements.
  221. Keskin Yucel K. (Cupertino CA) Gokcebay Asil T. (San Francisco CA), Identification card and access control device.
  222. Marckini Eugene F., Identification card with delimited usage.
  223. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  224. Swanson Mitchell D. ; Tewfik Ahmed H. ; Hosur Srinath, Image and document management system for content-based retrieval.
  225. Komatsu Kenichi (Nishinasuno-machi JPX) Nishihara Eitaro (Otawara JPX) Tawara Kiyoshi (Otawara JPX) Fujimoto Seiji (Otawara JPX), Image data management system particularly for use in a hospital.
  226. Colvill Robert H. (Surrey GB2) Lowther Derek R (Hampshire GB2) Shenton Colin N. (Surrey GB2) Shillito Robert T. (Somerset GB2) Trinder Rosemary (Suffolk GB2) Wallis Andrew F. (Bath GB2), Image handling facilitating computer aided design and manufacture of documents.
  227. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  228. Ginzboorg Philip,FIX ; Ekberg Jan-Erik,FIX ; Yla-Jaaski Antti,FIX, Implementation of charging in a telecommunications system.
  229. Kuhn D. Richard, Implementation of role-based access control in multi-level secure systems.
  230. Gehrmann, Christian; Barriga, Luis, Indirect public-key encryption.
  231. Toyoda Haruyoshi,JPX ; Kobayashi Yuuji,JPX ; Mukohzaka Naohisa,JPX, Individual identification apparatus for selectively recording a reference pattern based on a correlation with comparative patterns.
  232. Bull David Stanley ; Carr ; Jr. Robert Neal ; Offutt ; Jr. Joseph Robert, Information aggregation and synthesization system.
  233. Shimakawa Masato,JPX ; Akabane Makoto,JPX ; Hongchang Bao,JPX ; Rekimoto Junichi,JPX ; Kitano Hiroaki,JPX ; Sasano Kazunori,JPX ; Ishii Kazuo,JPX ; Yamada Keiichi,JPX ; Ogawa Hiroaki,JPX ; Kakuda Hir, Information processing apparatus and information processing method.
  234. Hara Hiroshi,JPX ; Hosoya Hideki,JPX, Information recording method for preventing alteration, information recording apparatus, and information recording medium.
  235. Choi Seung-ryeol,KRX, Information security system for tracing the information outflow and a method for tracing the same.
  236. Mark Andrew R., Information storage device for storing personal identification information.
  237. Moreau Thierry,CAX, Initial secret key establishment including facilities for verification of identity.
  238. Frailong Jean-Marc ; Price Charles A. ; Tardo Joseph John, Initializing and reconfiguring a secure network interface.
  239. Lessin Arlen R. (New York NY) Gruppuso Frank M. (Commack NY) Harrison Shelley A. (Dix Hills NY), Intelligent portable interactive personal data system.
  240. McAllister Alex (Wheaton MD) Curry James (Herndon VA) Meador Frank (Baltimore MD), Intelligent recognition.
  241. Clark Paul C., Intelligent token protected system with network authentication.
  242. Chang Te-An ; Rostock Joseph R., Internet-web link for access to intelligent network service control.
  243. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system with verification by comparison.
  244. Nishioka Mototsugu,JPX ; Umeki Hisashi,JPX ; Matsui Susumu,JPX, Key distribution method and system in secure broadcast communication.
  245. Aucsmith David Wayne, Key management system for DVD copyright management.
  246. Colbert Charles, Knuckle profile identity verification system.
  247. Colbert Charles (Yellow Springs OH), Knuckle profile indentity verification system.
  248. Hogl Christian,DEX, Locking device for systems access to which is time-restricted.
  249. Kuhns Roger J. (Tower Rd. Lincoln MA 01773) Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Low cost method employing time slots for thwarting fraud in the periodic issuance of food stamps, unemployment benefits.
  250. Nelson Theodor Holm,JPX, Many-to-many payments system for network content materials.
  251. Adams Phillip M., Media-independent document security method and apparatus.
  252. Honda Hiroto,JPX ; Shiina Shinichi,JPX, Medical information management system.
  253. Ema Takehiro,JPX ; Nishihara Eitaro,JPX, Medical information processing system for supporting diagnosis.
  254. Newman Iris ; McSweeney ; Jr. Thomas, Medical practitioner credentialing system.
  255. Clark Melanie Ann ; Gold John Finley ; Huska Michael Edward ; Kabel Geoffrey Harold ; Graham Marc Merrill, Medical record management system and process with improved workflow features.
  256. Seto Hiromitsu,JPX ; Nishihara Eitaro,JPX ; Fukushima Yuki,JPX ; Nematbakhsh Mohammad Ali, Medical support system.
  257. Burks James L. (Pendleton KY) Schick Robert R. (Louisville KY) Schweitzer Sheila H. (Louisville KY), Medical transaction system.
  258. Stock Michael J. ; Davis Keith ; Myers James W., Memory card having a biometric template stored thereon and system for using same.
  259. Manneschi Alessandro (15 ; Via XXV Aprile (I) 52100 Arezzo ITX), Metal detector for control of access combined in an integrated form with a transponder detector.
  260. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support exper.
  261. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  262. Laubach Mark ; Baran Paul ; Raissinia Ali ; Gorman Kenneth ; Helton Sanford, Method and apparatus for an application interface module in a subscriber terminal unit.
  263. Denno Rodney Grant ; Johnson Lance James, Method and apparatus for asymetric key management in a cryptographic system.
  264. Arent Michael A., Method and apparatus for authenticating on-line transaction data.
  265. Hillis W. Daniel, Method and apparatus for authenticating recorded media.
  266. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  267. Bartoli Paul D. ; Griesmer Stephen J. ; Lidor Gideon ; Ronen Yzhak ; Tessier Jean, Method and apparatus for billing for transactions conducted over the internet.
  268. Seliger Robert (Winchester MA) Ehrhardt Fred W. (Lynnfield MA) Braunstein Andrew S. (Chestnut Hill MA), Method and apparatus for coordinating concurrent updates to a medical information database.
  269. Crandall Richard E., Method and apparatus for digital signature authentication.
  270. Ballantyne Douglas J.,CAX ; Mulhall Michael,CAX, Method and apparatus for electronically accessing and distributing personal health care information and services in hos.
  271. Barton James M., Method and apparatus for embedding authentication information within digital data.
  272. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  273. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for embedding data, including watermarks, in human perceptible images.
  274. Jakobsson Markus, Method and apparatus for encrypting, decrypting, and providing privacy for data values.
  275. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO) Engel George Lawrence (St. Louis MO) Hege Alan L. (St. Louis MO), Method and apparatus for fingerprinting and authenticating various magnetic media.
  276. Indeck Ronald S. ; Muller Marcel W. ; Morley ; Jr. Robert E., Method and apparatus for fingerprinting and authenticating various magnetic media.
  277. Prokoski Francine J. (Fairfax VA), Method and apparatus for flash correlation.
  278. Graunke Gary L. ; Aucsmith David W., Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation.
  279. Sadovnik Lev S. (Los Angeles CA) Lu Taiwei (Torrance CA), Method and apparatus for image recognition using invariant feature signals.
  280. Ohta Kazuo (Zushi JPX) Okamoto Tatsuaki (Yokosuka JPX), Method and apparatus for implementing electronic cash.
  281. Okamoto Tatsuaki,JPX, Method and apparatus for implementing hierarchical electronic cash.
  282. Ohta Kazuo,JPX ; Fujisaki Eiichiro,JPX ; Fujioka Atsushi,JPX ; Abe Masayuki,JPX, Method and apparatus for implementing traceable electronic cash.
  283. Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
  284. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  285. Knutson James Irwin, Method and apparatus for licensing computer programs using a DSA signature.
  286. Massey James L. (Zurich CA CHX) Omura Jimmy K. (Culver City CA), Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission.
  287. Liu Quentin C., Method and apparatus for managing a virtual private network.
  288. Zubeldia Pedro ; Romney Gordon W., Method and apparatus for managing key revocation.
  289. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  290. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  291. Curiger Andreas ; Little Wendell, Method and apparatus for masking modulo exponentiation calculations in an integrated circuit.
  292. Lawrence Stephen Robert,AUX ; Giles C. Lee, Method and apparatus for object recognition.
  293. Polk John, Method and apparatus for payment processing using debit-based electronic funds transfer and disbursement processing usin.
  294. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  295. Vaid Aseem ; Sawhney Sanjay ; Antur Anand K. ; Bisht Naveen S., Method and apparatus for quality of service management.
  296. Kurtzberg Jerome M. ; Levanoni Menachem, Method and apparatus for realizing computer security.
  297. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  298. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  299. Long Craig Allen ; Worger William Robert ; Schaefer Bradley Robert, Method and apparatus for seamless crypto rekey system.
  300. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  301. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure measurement certification.
  302. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  303. Tomko George J.,CAX, Method and apparatus for securely handling data in a database of biometrics and associated data.
  304. Aziz Ashar,PKX, Method and apparatus for sending secure datagram multicasts.
  305. Franklin Matthew Keith ; Reiter Michael Kendrick, Method and apparatus for simultaneous electronic exchange using a semi-trusted third party.
  306. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  307. Wiklof Christopher A. ; Millet Edward M., Method and apparatus for storing and reading data.
  308. Abadi Martin ; Needham Roger Michael,GBX ; Lomas Thomas Mark Angus,GBX, Method and apparatus for strengthening passwords for protection of computer systems.
  309. Dyke David W. (342 Club View Dr. Great Falls VA 22066), Method and apparatus for the identification of personnel.
  310. Mark Andrew R. (205 W. End Ave. New York NY 10023), Method and apparatus for the secure communication of data.
  311. Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
  312. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  313. Ferguson Daniel T., Method and apparatus for transmitting secured data.
  314. LaDue Christoph K., Method and apparatus for transmitting subject status information over a wireless communications network.
  315. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305) Bach Carl E. (Albany CA), Method and apparatus for use in public-key data encryption system.
  316. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for witnessed authentication of electronic documents.
  317. Konheim Alan G. (Yorktown Heights NY) Matyas Stephen M. (Kingston NY) Meyer Carl H. (Kingston NY), Method and apparatus incorporating a one-way sequence for transaction and identity verification.
  318. Mueller-Schloer Christian (Vorhees NJ), Method and apparatus providing registered mail features in an electronic communication system.
  319. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  320. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  321. Cabrera Luis Felipe ; Narang Inderpal Singh ; Rees Robert Michael, Method and means for linking a database system with a system for filing data.
  322. Deinhart Klaus,DEX ; Gligor Virgil ; Lingenfelder Christoph,DEX ; Lorenz Sven,DEX, Method and system for advanced role-based access control in distributed and centralized computer systems.
  323. Goldberg Max Motti ; Gates Melodi Mosley ; Ericksen Susan Barbara ; White William O., Method and system for authenticating and auditing access by a user to non-natively secured applications.
  324. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  325. Nightingale Peter D., Method and system for communicating service information in an advanced intelligent network.
  326. Lesk Michael E., Method and system for copy protection of on-screen display of text.
  327. Obata Masanori,JPX ; Sugiyama Hiroyuki,JPX ; Okukawa Moribumi,JPX ; Okamoto Tatsuaki,JPX, Method and system for depositing private key used in RSA cryptosystem.
  328. Motoyama Tetsuro, Method and system for diagnosis and control of machines using connectionless modes of communication.
  329. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  330. Smith Jeffrey C. ; Bandini Jean-Christophe, Method and system for dynamic server document encryption.
  331. Nielsen Jakob, Method and system for escrowed backup of hotelled world wide web sites.
  332. Lo Ron ; Mahajan Om Prakash ; Vaios Christos I. ; Visser Eldred James, Method and system for implementing intelligent telecommunication services utilizing self-sustaining, fault-tolerant object oriented architecture.
  333. Borza Stephen J.,CAX, Method and system for improving security in network applications.
  334. Colon Michael ; Marks Ronald G. ; Pepine Carl J. ; Handberg-Thurmond Eileen M. ; Cooper-DeHoff Rhonda M. ; Padgett Phillip, Method and system for interactive prescription and distribution of prescriptions in conducting clinical studies.
  335. McGauley James L. ; Krumme Christopher, Method and system for maintaining and updating computerized medical records.
  336. Benantar Messaoud ; High ; Jr. Robert Howard ; Rathi Mahesh Kumar, Method and system for maintaining client server security associations in a distributed computing system.
  337. Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
  338. Strait Robert S. ; Pearson Peter K. ; Sengupta Sailes K., Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy.
  339. Nikander Pekka,FIX, Method and system for performing electronic money transactions.
  340. McGough Paul, Method and system for performing secure electronic monetary transactions.
  341. Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
  342. Moore James G. ; Jones Wayne E., Method and system for processing health care electronic data transactions.
  343. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  344. Basso ; Jr. Micheal R. ; Lee Joonho ; Li Chunhua, Method and system for providing controlled access to information stored on a portable recording medium.
  345. Joseph Rayappu F. ; Payne William A., Method and system for provisioning databases in an advanced intelligent network.
  346. Challener David C. ; Kelley Richard A. ; Newman Palmer E., Method and system for secure computer moderated voting.
  347. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Method and system for securely archiving core data secrets.
  348. Smithies Christopher P. K. (Wimborne GB2) Newman Jeremy M. (Somerset GB2), Method and system for the capture, storage, transport and authentication of handwritten signatures.
  349. Deindl Michael,DEX ; Witzel Martin,DEX, Method and system for the secure transmission and storage of protectable information.
  350. Smithies Christopher Paul Kenneth (Corfe Mullen ; Wimborne GB2) Newman Jeremy Mark (Frome ; Somerset GB2), Method and system for the verification of handwritten signatures.
  351. Reiter Michael Kendrick ; Stubblebine Stuart Gerald, Method for authenticating a channel in large-scale distributed systems.
  352. Palage Michael D. ; Cona ; Jr. Frank A., Method for authenticating electronic documents on a computer network.
  353. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  354. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  355. Holmquist Kurt E. (Largo FL) Smith Richard K. (Seminole FL), Method for dial-in access security using a multimedia modem.
  356. Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
  357. Fridrich Jiri, Method for encrypting and decrypting data using chaotic maps.
  358. Johnson Gary Duane (Lewisville TX) Campbell Kelly Scott (Richardson TX), Method for extracting pre-defined data items from medical service records generated by health care providers.
  359. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  360. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  361. Nematbakhsh Mohammad Ali ; Tsubura Shinichi,JPX, Method for managing clustered medical data and medical data filing system in clustered form.
  362. Ippolito Giovanni,ITX ; Fortina Marco Giovanni Emilio,ITX ; Colombo Gianluca,ITX, Method for obtaining authenticity identification devices for using services in general, and device obtained thereby.
  363. Leighton F. Thomson, Method for protecting content using watermarking.
  364. Michael Kendrick Reiter ; Stuart Gerald Stubblebine, Method for providing authentication assurance in a key-binding system.
  365. Naor Moni,ILX ; Pinkas Binyamin,ILX, Method for secure accounting and auditing on a communications network.
  366. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method for secure data transmission between remote stations.
  367. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method for secure data transmission between remote stations.
  368. Field Robert G. ; Layne Michael W., Method for secure key distribution over a nonsecure communications network.
  369. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  370. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  371. Hsieh Vincent, Method for security shield implementation in computer system's software.
  372. Denker John Stewart ; Watkins Christopher J. C. H.,GBX, Method for separately permissioned communication.
  373. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  374. Horn Gunther,DEX ; Muller Klaus,DEX ; Kessler Volker,DEX, Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N.
  375. Dean H. Vogler, Method for transferring an encryption key.
  376. Toga James E., Method for transferring data between a network of computers dynamically based on tag information.
  377. Nilsen Curt A. (Castro Valley CA), Method for transferring data from an unsecured computer to a secured computer.
  378. Berson William ; Kumar Shailendra, Method for verifying an identification card and recording verification of same.
  379. Ernest F. Brickell, Method of changing key fragments in a multi-step digital signature system.
  380. Barber Timothy P., Method of charging for pay-per-access information over a network.
  381. Krsul Ivan V. ; Mudge J. Craig ; Demers Alan J., Method of electronic payments that prevents double-spending.
  382. Batten Lynn Margaret,CAXITX R3T 5V4, Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem.
  383. Rozen Michael J. ; Doherty Connie B. ; Chesko Karen L., Method of managing and controlling access to personal information.
  384. Fukushima Yuki (Tochigiken JPX), Method of managing medical diagnostic data with reference relationship.
  385. Shamir Adi,ILX, Method of protecting broadcast data by fingerprinting a common decryption function.
  386. Merkle Ralph C. (Mountain View CA), Method of providing digital signatures.
  387. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  388. Drupsteen Michel Marco Paul,NLX, Method of securely loading commands in a smart card.
  389. Hillhouse Robert D.,CAX, Method of securing a cryptographic key.
  390. Zhang Guang Hua, Method of selecting the best enroll image for personal identification.
  391. Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.
  392. Sloane Neil James Alexander, Method using central epidemiological database.
  393. Beecham James E., Method, apparatus and system for verification of human medical data.
  394. Clark Robert L. ; Morgan Glen A., Methods and apparatus for authenticating informed consent.
  395. Clark Dereck D., Methods and apparatus for securely encrypting data in conjunction with a personal computer.
  396. Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
  397. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  398. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  399. Ezawa Kazuo J. ; Napiorkowski Gregory, Micro-dynamic simulation of electronic cash transactions.
  400. Uesaka Yasushi,JPX ; Yamauchi Kazuhiko,JPX ; Kozuka Masayuki,JPX ; Higaki Nobuo,JPX ; Horiuchi Koichi,JPX ; Haruna Syusuke,JPX, Microprocessor suitable for reproducing AV data while protecting the AV data from illegal copy and image information processing system using the microprocessor.
  401. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  402. Borza Stephen J.,CAX ; Borza Michael A.,CAX ; Teitelbaum Neil,CAX, Mouse adapted to scan biometric data.
  403. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  404. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  405. Sudia Frank W. ; Freund Peter C. ; Huang Stuart T.F., Multi-step digital signature method and system.
  406. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,GBX, Multi-view personalized communications agent.
  407. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  408. Lee Lin-Nan (Germantown MD) Lu Shyue-Ching (Taiwan TWX), Multiple-destinational cryptosystem for broadcast networks.
  409. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  410. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  411. Rhoads Geoffrey B., Network linking method using steganographically embedded data objects.
  412. Harvey John Paul, Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level.
  413. Cohn Robert S. ; Vaudreuil Gregory M. ; Schoeneberger Carl F. ; Reece David M. ; O'Neal Carlton C. ; Kalbfleisch Carl W. ; Whipple Mark B. ; Swoopes James R. ; Huch Alan T. ; Dimitroff Michael P., Network-based multimedia communications and directory system and method of operation.
  414. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,IEX, Networked personal customized information and facility services.
  415. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  416. Luckenbaugh Gary L., Object-oriented trusted application framework.
  417. Kravitz David W. ; Gemmell Peter S. ; Brickell Ernest F., Off-line compatible electronic cash method and system.
  418. Polnerow Dean ; Canon ; Jr. James M. ; Warner Lawrence Z. ; Blum Nancy ; Procopio Michael ; Wright David A., On-line directory service with a plurality of databases and processors.
  419. Wright Gregory John ; Hochberg Philip Scott ; Bellusci Darcy B. ; Brinster Eric Gregory ; Brinton Mark Willard ; Folkerts Sue R. ; Foster Brian Timothy ; King Anthony Edward ; Maloney Kevin Patrick ;, Open architecture cardiology information system.
  420. Gifford David K., Open network payment system for providing for authentication of payment orders based on a confirmation electronic mail message.
  421. Borza Stephen J.,CAX, Optical imaging device.
  422. Horner Joseph L. (Belmont MA) Javidi Bahram (Storrs CT) Walkup John F. (Lubbock TX), Optical pattern recognition system and method for verifying the authenticity of a person, product or thing.
  423. Frankel Yair ; Yung Marcel M., Optimal-resilience, proactive, public-key cryptographic system and method.
  424. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  425. Frasca ; Jr. Ralph V., Outpatient care data system.
  426. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  427. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  428. Chaum David ; Ferguson Niels T.,NLX ; Schoenmakers Berry,NLX ; Voskuil Erik W.,NLX, Partitioned information storage systems with controlled retrieval.
  429. Kravitz David William, Payment and transactions in electronic commerce system.
  430. Miller Mark S. ; Hardy Norman ; Tribble E. Dean ; Hibbert Christopher T. ; Hill Eric C., Persistent distributed capabilities.
  431. Rapaport Jeffrey Alan ; Rapaport Seymour Alvin, Personal feedback browser for obtaining media files.
  432. Basile Mark R. ; Weinreb Alan H., Personal identification and promotional system using personal and medical information.
  433. Davies John H. E. (4A Cowper Road Berkhamsted ; Hertfordshire ; HP4 3DA GB2), Personal identification devices and access control systems.
  434. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Personal identification fob.
  435. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  436. Weiser Mark D. ; Want Roy ; Kozinski Stephanie L. ; Boehm Hans-Juergen ; Sethi Komal S., Personal storage device for application and data transfer.
  437. Moshfeghi Mehran ; Wang Jun ; Wong Stephen L. ; Yu Yuan-Pin ; Glicksman Robert A., Personalizing hospital intranet web sites.
  438. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  439. Wu Tajen R. ; Shannon William A. ; Fronberg Paul ; Stephenson Donald R. ; Samar Vipin, Pluggable account management interface with unified login and logout and multiple user authentication services.
  440. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  441. Novis Scott R. ; Carns William E. ; Jachimowicz Karen E., Portable electronic device with transceiver and visual image display.
  442. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  443. Graf Ulrich,CHX ; Locher Johann,CHX, Portable identification carrier.
  444. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  445. Behram Sepehr (Hampton VA) Grauzlis Nancy T. (Hampton VA) Joseph Sammy W. (Derwood MD), Privacy protected information medium using a data compression method.
  446. Derksen Eduard (Hinterfultigen CHX), Process as safety concept against unauthorized use of a payment instrument in cashless payment at payment sites.
  447. Khosla Vinod, Process for issuing coupons for goods or services to purchasers at non-secure terminals.
  448. Teicher Mordechai,ILX, Processing system and method for a heterogeneous electronic cash environment.
  449. Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
  450. Weinstein Stephen B. (Summit NJ), Protection system for intelligent cards.
  451. Harvell Joseph ; Stovall Gregory T., Proxy VAT-PSTN origination.
  452. DeBellis Robert S. ; Smith ; Sr. Ronald M. ; Yeh Phil Chi-Chung, Pseudorandom number generator.
  453. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  454. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Public key cryptosystem method and apparatus.
  455. Miller William J. (North Miami FL) Trbovich Nick G. (Hollywood FL), RSA Public-key data encryption system having large random prime number generating microprocessor or the like.
  456. Briss Jacques D. (Longchre ; Bullion 78830 Bonnelles FRX) Chevalier Jean-Pierre J. (Saint Laurent la Gtine 78210 Nogent le Roi FRX), Radionavigation system having means for concealing distance and/or bearing information conveyed thereby.
  457. Randle William ; Ercole Richard ; Geer Terry L. ; James David L. ; Fredelake Jodie M. ; Roman Dennis ; Fontana Fabio ; Bartlett Rick ; Rosenberg Ruth ; Murphy Robert W. ; Tran Tuong T. ; Lampru Paul, Real time bank-centric universal payment system.
  458. Fiedler Steven P. (Leominster MA), Real-time event charting in an electronic flowsheet.
  459. Turner Stephen J. (Saffron Walden GB2) Lilley John B. (Brentwood GB2), Recognition procedure and an apparatus for carrying out the recognition procedure.
  460. Leonard Eugene (Sands Point NY) Perlman Bill (New York NY), Reliable secure, updatable “cash”card system.
  461. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  462. Ballard Claudio R., Remote image capture with centralized processing and storage.
  463. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  464. Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
  465. Eldridge Alan D. ; Kaufman Charles W., Removable media for password based authentication in a distributed system.
  466. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  467. Aoki Kazumaro,JPX ; Ohta Kazuo,JPX, Scheme for arithmetic operations in finite field and group operations over elliptic curves realizing improved computational speed.
  468. Green Graeme Allan,AUX, Secure access control system.
  469. Tolopka Stephen J. ; Light John J., Secure and convenient information storage and retrieval method and apparatus.
  470. Hauser Ralf Ch.,CHX ; Tsudik Gene, Secure anonymous information exchange in a network.
  471. Vardanyan Arthur,CAX ; Reed Wayne,CAX ; Freedman Gordon,CAX, Secure card for E-commerce and identification.
  472. Kelley, Edward E.; Motika, Franco; Motika, Paul V.; Motika, Eric M., Secure credit card.
  473. Brands Stefanus Alfonsus (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secure cryptographic methods for electronic transfer of information.
  474. Brands Stefanus Alfonsus (Ioa Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secure cryptographic methods for electronic transfer of information.
  475. Ho Andrew P., Secure database management system for confidential records using separately encrypted identifier and access request.
  476. McEvoy Steven P. ; Ochotta Emilian S. ; Richardson Kent R. ; Hatcher David C. ; Mah Raymond T., Secure digital x-ray image authentication method.
  477. Haynes ; III Patrick J. ; Friedman Thomas Jay ; Shoupp Douglas Scott ; Mitty Todd Jay ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary.
  478. Mitty Todd Jay ; Shoupp Douglas Scott ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary to perform electronic services.
  479. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  480. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  481. Chadha Tejpal, Secure logon to notebook or desktop computers.
  482. Benhammou Jean-Pierre ; Baran Dennis F. ; Tonge Phillip D. ; Terry ; Jr. Edward L., Secure memory having multiple security levels.
  483. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  484. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  485. Chen Tsuhan, Secure telecommunications data transmission.
  486. Osmond Roger F., Secure transmission using an ordinarily insecure network communication protocol such as SNMP.
  487. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  488. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  489. Hoffstein Jeffrey ; Kaliski ; Jr. Burton S. ; Lieman Daniel Bennett ; Robshaw Matthew John Barton ; Yin Yiqun Lisa, Secure user identification based on constrained polynomials.
  490. Birrell Andrew D. ; Wobber Edward P. ; Abadi Martin ; Stata Raymond P., Secure web tunnel.
  491. Muftic Sead,SEX, Secure world wide electronic commerce over an open network.
  492. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  493. Bouthillier ; deceased Stephen W. ; Seybold Ross E. ; Wesche Kenneth D. ; Sulkowski Robert V. ; Dodge Brian L. ; Kellogg Dana C. ; Morse Randall, Secured network system.
  494. Bouthillier Stephen W. ; Seybold Ross E. ; Blowers Sydney R. ; Sulkowski ; Jr. Robert V. ; Morse Randall P., Secured network system.
  495. Miller ; II Robert Raymond, Security access system.
  496. Suzuki Kaoru,JPX ; Fukui Kazuhiro,JPX ; Kazama Hisashi,JPX ; Yamaguchi Osamu,JPX ; Tanaka Eiji,JPX ; Taniguchi Yasuhiro,JPX, Security apparatus and method.
  497. Barnett Donald A., Security card and system for use thereof.
  498. Korshun Yvan,UAX, Security device for controlling the access to a personal computer or to a computer terminal.
  499. Mowry ; Jr. William H., Security document containing encoded data block.
  500. Worth Erik K., Security monitor for controlling functional access to a computer system.
  501. Scholnick Michael ; Schlesinger John F., Security process for public networks.
  502. Kirchhoff Gerhard,DEX, Security structure with electronic smart card access thereto with transmission of power and data between the smart card.
  503. Shaffer Stephen L. ; Townsend Kevin Arnold, Security system for controlling access to images and image related services.
  504. Rhoads Geoffrey B., Security system for photographic identification.
  505. McAllister Alex (Wheaton MD) Cheston Frank (Potomac MD) Young David E. (Silver Spring MD) Hanle John P. (Silver Spring MD), Selection of a voice recognition data base responsive to video data.
  506. Biffar Peter, Self-contained payment system with circulating digital vouchers.
  507. Biffar Peter C., Self-contained payment system with circulating digital vouchers.
  508. Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
  509. Pinard Deborah L.,CAX ; Gray Thomas A.,CAX, Service context sensitive features and applications.
  510. Beatson Rodney ; Kelty Mark A. ; Riley Marc J., Signature capture/verification systems and methods.
  511. Okamoto Tatsuaki (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Shiraishi Akira (Yokosuka JPX) Kawaoka Tsukasa (Yokosuka JPX), Signed document transmission system.
  512. Shin Kil-Ho,JPX ; Kobayashi Kenichi,JPX ; Aratani Toru,JPX, Signing method and apparatus using the same.
  513. Lu Shyue-Ching (Chung-Li MD TWX) Lee Lin-nan (Germantown MD), Simple and effective public-key cryptosystem.
  514. Micali Silvio, Simultaneous electronic transactions.
  515. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions.
  516. Micali Silvio, Simultaneous electronic transactions with subscriber verification.
  517. Micali Silvia (459 Chestnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  518. Micali Silvio, Simultaneous electronic transactions with visible trusted parties.
  519. Micali Silvio (459 Chesnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  520. Novis Scott R. ; Carns William E. ; Jachimowicz Karen E., Smart card device with pager and visual image display.
  521. Jachimowicz Karen E. ; Novis Scott R., Smart card with Iintegrated reader and visual image display.
  522. Jachimowicz Karen E. ; Novis Scott R. ; Barry Dennis ; Jiang Wenbin ; Lebby Michael S., Smart card with contactless optical interface.
  523. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  524. Cargile William P. (Half Moon Bay CA) Freeman Richard D. (Sunnyvale CA) Lyon James M. (San Jose CA), Solid state key for controlling access to computer systems and to computer software and/or for secure communications.
  525. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of electronic payments.
  526. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of redeeming electronic payments.
  527. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of verifying electronic payments.
  528. Javidi Bahram ; Mok Fai ; Psaltis Demetri, Spatial integrating optical correlator for verifying the authenticity of a person, product or thing.
  529. Feustel Timothy C. (Hanover NJ) Glemboski Mark A. (Newton NJ) Ordun Michael R. (Randolph NJ) Velius George A. (Morristown NJ) Weinstein Stephen B. (Summit NJ), Speaker verification system using integrated circuit cards.
  530. Cox Ingemar J., Spread spectrum watermark for embedded signalling.
  531. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench Edwin H., Stand alone security device for computer networks.
  532. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  533. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  534. Rhoads Geoffrey B., Steganographic system.
  535. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  536. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  537. Feinberg Lawrence E., Storing personal medical information.
  538. Henry Paul S. (Holmdel NJ), Stream cipher operation using public key cryptosystem.
  539. Schanze Martin Lee, Synchronous message control system in a Kerberos domain.
  540. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  541. Thomas Michael W. ; Allard James E. ; Howard Michael ; Chung Sophia ; Ferroni Cameron ; Henbenthal Douglas C. ; Ludeman John ; Stebbens Kim ; Sanders ; II Henry L. ; Treadwell ; III David R., System and method for administering a meta database as an integral component of an information server.
  542. Bolt Thomas B. ; McClain Fred W., System and method for backing up computer files over a wide area computer network.
  543. McClain Fred W. ; Bolt Thomas B., System and method for backing up computer files over a wide area computer network.
  544. Ronen Yzhak, System and method for billing for transactions conducted over the internet from within an intranet.
  545. Dulman Scott, System and method for changing advanced intelligent network services from customer premises equipment.
  546. Rosen Sholom S., System and method for connecting money modules.
  547. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  548. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  549. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  550. Freishtat, Gregg; Rajan, Palaniswamy, System and method for determining revenue from an intermediary derived from servicing data requests.
  551. Houvener Robert C. ; Hoenisch Ian P., System and method for efficiently processing payments via check and electronic funds transfer.
  552. Goldschlag David M. ; Stubblebine Stuart Gerald ; Syverson Paul F., System and method for electronic transactions.
  553. Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
  554. Talmor Rita,ILX ; Talmor Eli,ILX, System and method for establishing identity of a speaker.
  555. McManis Charles E., System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources.
  556. Simon Daniel R., System and method for fair exchange of time-independent information goods over a network.
  557. Hardy Norman ; Vetter Linda L. ; Tribble E. Dean, System and method for generating unique secure values for digitally signing documents.
  558. Numao Masayuki,JPX ; Shimizu Shuichi,JPX ; Morimoto Norishige,JPX ; Kobayashi Mei,JPX, System and method for hiding and extracting message data in multimedia data.
  559. Birnbaum William C., System and method for implementing a hierarchical policy for computer system administration.
  560. Ellard Scott, System and method for indexing information about entities from different information sources.
  561. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  562. Johnson William A., System and method for management of connection oriented networks.
  563. Erickson John S., System and method for managing copyrighted electronic media.
  564. Lee David K. ; Riley David W. ; Ryan ; Jr. Frederick W., System and method for managing multiple users with different privileges in an open metering system.
  565. Lavin Marianne ; Nathan Michael, System and method for managing patient medical records.
  566. Friedman Carol, System and method for medical language extraction and encoding.
  567. Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
  568. Viavant Steven ; Gleckler Arthur A. ; Wessman Richard R., System and method for negotiating security services and algorithms for communication across a computer network.
  569. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  570. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  571. Wong Jacob Y. ; Anderson Roy L., System and method for pseudo cash transactions with credit back.
  572. Rensimer Edward R. ; Tomsovic Jacqueline P. ; Wright Pamela A., System and method for recording patient-history data about on-going physician care procedures.
  573. Harkins Dan, System and method for regenerating secret keys in diffie-hellman communication sessions.
  574. Houvener Robert C. ; Hoenisch Ian P. ; Schappler Joseph, System and method for remote, wireless positive identity verification.
  575. Bapat Subodh ; Fisher Bart Lee, System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects.
  576. Simon Daniel R. ; Benaloh Josh ; Chinn Donald D. ; Hitchcock Gregory ; Meltzer David, System and method for secure font subset distribution.
  577. Conner Guy (Santa Rosa CA) Schmier Larry (Santa Rosa CA), System and method for secure medical and dental record interchange.
  578. Rosen Sholom S., System and method for secure presentment and payment over open networks.
  579. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  580. .ANG.strom Bo Arne Valdemar,SEX ; Svennesson Bjorn Arne,SEX ; Sumar Gulamabbas,SEX ; Schmersel Robert Johannes Bernardus,NLX, System and method for subscriber activity supervision.
  581. Freeman ; Jr. Berkley Irving ; Smith Edgar William, System and method for supporting delivery of health care.
  582. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  583. de la Huerga Carlos ; Craig William E., System and method for translating, collecting and archiving patient records.
  584. Rosen Sholom S., System and method for updating security information in a time-based electronic monetary system.
  585. Audebert Yves, System and method for user authentication employing dynamic encryption variables.
  586. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for verifying signatures on documents.
  587. Houvener Robert C. ; Hoenisch Ian P., System and method of assessing the quality of an identification transaction using an identificaion quality score.
  588. Houvener Robert C. ; Hoenisch Ian P., System and method of providing system integrity and positive audit capabilities to a positive identification system.
  589. Cordery Robert A. ; Lee David K. ; Pauly Steven J. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., System and method of verifying cryptographic postage evidencing using a fixed key set.
  590. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  591. Teitelbaum Neil,CAX ITX K1S 4Y3 ; Freedman Gordon Sean,CAX ITX K2G 3Y1 ; Borza Stephen J.,CAX ITX K1S 3N3 ; Borza Michael A.,CAX ITX K1H 6H8, System configuration contingent upon secure input.
  592. Hoehn-Saric Rudolph Christopher ; Nguyen Christopher L. ; Stevens Patrick D., System for administration of remotely-proctored, secure examinations and methods therefor.
  593. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  594. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  595. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  596. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  597. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  598. Herz Frederick S. M., System for customized electronic identification of desirable objects.
  599. Brands Stefanus A.,NLX, System for ensuring that the blinding of secret-key certificates is restricted, even if the issuing protocol is performed in parallel mode.
  600. Spurgeon Loren J., System for exchanging health care insurance information.
  601. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
  602. Lachelt David Jonathan ; Houck Peter Thomas, System for logging and enabling ordered retrieval of management events.
  603. Kawan Joseph C., System for performing financial transactions using a smartcard.
  604. Tanno Kazuhira,JPX, System for performing remote operation between firewall-equipped networks or devices.
  605. Coppersmith Don ; Greengard Claude A. ; Tresser Charles P. ; Wu Chai Wah, System for protection of goods against counterfeiting.
  606. Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.
  607. Grawrock David ; Lohstroh Shawn R., System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record.
  608. McGrady R. Michael ; Slaymaker ; Jr. R. Barrie ; Kroah-Hartman Greg ; Sukan Eser, System for tracking and dispensing medical items.
  609. McCalley Karl W. ; Schmitt John C., System including separable protected components and associated methods.
  610. Sugauchi Kiminori,JPX ; Hirata Toshiaki,JPX ; Nishiki Kenya,JPX ; Miyazaki Satoshi,JPX ; Mizuguchi Keizo,JPX ; Fujino Shuji,JPX, System management/network correspondence display method and system therefor.
  611. Nguyen Trong ; Haller Daniel R. ; Kramer Glenn A., System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture.
  612. Kramer Glenn A., System, method and article of manufacture for a modular gateway server architecture.
  613. Nguyen Trong ; Haller Daniel R. ; Subramanian Mahadevan P., System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment tr.
  614. Rowney Kevin T. B., System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible.
  615. Bahreman Ali Reza, System, method and article of manufacture for dynamic negotiation of a network payment framework.
  616. Haller Daniel R. ; Nguyen Trong, System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing.
  617. Haller Daniel R. ; Nguyen Trong ; Rowney Kevin T. B. ; Berger David A. ; Kramer Glenn A., System, method and article of manufacture for managing transactions in a high availability system.
  618. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.
  619. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment.
  620. Berger David A. ; Weber Jay C. ; Kramer Glenn A., System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a.
  621. Weber Jay C., System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensi.
  622. Rowney Kevin T. B. ; Chen Yuhua, System, method and article of manufacture for secure digital certification of electronic commerce.
  623. Rowney Kevin Thomas Bartholomew ; Nadig Deepak S., System, method and article of manufacture for secure network electronic payment and credit collection.
  624. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for the use of payment instrument holders and payment instruments in network.
  625. Weber Jay C., System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing.
  626. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  627. malik Sohail ; Muresan Michael, System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver.
  628. March Anthony W., System/method for secure storage of personal information and for broadcast of the personal information at a time of emergency.
  629. Bouchard Ann Marie ; Osbourn Gordon Cecil, Systems and methods for biometric identification using the acoustic properties of the ear canal.
  630. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  631. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  632. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  633. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  634. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  635. Schanz Stephen J., Systems, methods and computer program products for identifying unique and common legal requirements for a regulated activity among multiple legal jurisdictions.
  636. Ellison Carl, Tamper resistant method and apparatus.
  637. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  638. Ashworth Mark,GBX ; Donaldson Iain Alexander,GBX, Telecommunications system and method for processing call-independent signalling transactions.
  639. Muehlberger Karl (Lakeland FL) Sinek Richard (Lakeland FL) Hughes Michael (St. Petersburg Beach FL), Telephone debit card dispenser and method.
  640. Teitelbaum Neil,CAX, Telephone with biometric sensing device.
  641. Katz Penina (Flushing NY), Telephone-based personnel tracking system.
  642. Goldwasser Shafi ; Bellare Mihir, Time delayed key escrow.
  643. Davis Derek L., Time-bracketing infrastructure implementation.
  644. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  645. Cordery Robert A. ; Pintsov Leon A., Token key distribution system controlled acceptance mail payment and evidencing system.
  646. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  647. Hoffman Ned ; Pare ; Jr. David Ferrin ; Lee Jonathan Alexander, Tokenless biometric electronic rewards system.
  648. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  649. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  650. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  651. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  652. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  653. Metz Michael ; Phillips Nicholas J.,GBX ; Coleman Zane ; Flatow Carl, Topographical object detection system.
  654. Micali Silvio, Traceable anonymous transactions.
  655. Boston Vincent (San Mateo CA) Boggan Elvis W. (Concord CA) Asbo Einar L. (Mill Valley CA), Transaction system with off-line risk assessment.
  656. Boston Vincent (San Mateo CA) Boggan Elvis W. (Concord CA) Asbo Einar L. (Mill Valley CA), Transaction system with off-line risk assessment.
  657. Templeton Randy Joe (Bellaire TX) Gulden Gerald (Houston TX), Transaction system with on/off line risk assessment.
  658. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  659. Griffin Claire ; Barnes Douglas, Trusted delegation system.
  660. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Two stage read-write method for transaction cards.
  661. Elliott, John C.; O'Connell, James A.; Ladouceur, Lawrence; Altman, William; Jarett, Keith, Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device.
  662. Schneider John K. (Snyder NY) Marshall Gerald F (Morgan Hill CA) Vassallo Andrew D. (Williamsville NY), Ultrasonic biometric imaging and identity verification system.
  663. Schneider John K. ; Marshall Gerald F. ; Vassallo Andrew D., Ultrasonic biometric imaging and identity verification system.
  664. Hutchison Stephen (Kirkwood MO) Ritter J. Alan (Des Peres MO) Virkus Mark (Ellisville MO), Ultrasonic system for obtaining ocular measurements.
  665. Priddy Dennis G., Unalterable self-verifying articles.
  666. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  667. Simon Daniel R., Untraceable electronic cash.
  668. Cotugno Lauren Ann ; Frankel Edward Henry, Unwrapping system and method for multiple files of a container.
  669. Glitho Roch,CAX ; Leduc Francois,CAX ; Crowe Thomas,IEX ; Hogberg Lena,SEX, Use of web technology for subscriber management activities.
  670. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
  671. Koenig Andrew R. (Elizabeth NJ), User authentication system employing encryption functions.
  672. Pu Allen ; Psaltis Demetri, User identification through sequential input of fingerprints.
  673. Jones Timothy L. (East Sussex GB2) Higgins Graham R. L. (Avon GB2), Value transfer system.
  674. Rhoads Geoffrey B., Video steganography.
  675. Vaeth J. Stuart ; Walton Charles S., Virtual certificate authority.
  676. Sprague David L., Virtual people networking.
  677. Pfundstein Matthias,DEX, Virtual private network for mobile subscribers.
  678. Tello Antonio G. ; Hui Margaret ; Holmes Kim, Virtual private network service provider for asynchronous transfer mode network.
  679. Paulsen Gaige B. ; Walker Amanda, Virtual private network system and method.
  680. Tomoike Hiroyuki,JPX, Virtual private network system over public mobile data network and virtual LAN.
  681. Martinez Ronald ; Schneier Bruce ; Guerin Greg, Virtual property system.
  682. Cox Ingemar J., Watermarking of image data using MPEG/JPEG coefficients.
  683. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.
  684. Haverstock Paul ; Estrada Miguel ; Estrada Julio, Web server with integrated scheduling and calendaring.
  685. Sato Shinichi,JPX ; Sano Koichi,JPX, Wide area medical information system and method using thereof.

이 특허를 인용한 특허 (600)

  1. Costea, Mihai; Ryvkin, Konstantin; Pearson, Malcolm E.; Williams, Roy, Access limited EMM distribution lists.
  2. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  3. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  4. Raleigh, Gregory G.; Lavine, James, Adapting network policies based on device service processor configuration.
  5. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  6. Raleigh, Gregory G; Rightmyer, Rob; Kudelin, Vladislav, Adaptive ambient services.
  7. McFarland, Max E.; Alexander, Robert; Griffin, Michael G. E.; Hull, Jonathan J., Adaptive document management system using a physical representation of a document.
  8. Hoffberg, Linda Irene; Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  9. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  10. Siram, Kishan; Siram, Nanditha, Adaptor based communications systems, apparatus, and methods.
  11. Ohmura, Akira; Akiya, Hiroyuki, Advice system for providing advice on photographing method or on image editing.
  12. Abu-Hakima, Suhayya; Grigg, Kenneth E., Alert broadcasting to a plurality of diverse communications devices.
  13. Abu-Hakima, Suhayya; Grigg, Kenneth E.; Guevremont, Vince; Piskorz, Oskar; McFarland, Connie; Christie, Colin, Alert broadcasting to unconfigured communications devices.
  14. Raj, Thanigaivel Ashwin; Fuentes, Jacob Saul; Tullis, John; Shastry, Vishwanath, Alias management and value transfer claim processing.
  15. Yokota, Kaoru; Ohmori, Motoji; Ito, Akinobu, Anonymous information system, information registering device and information storing device.
  16. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  17. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  18. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  19. Anderson, Roy L.; Ziegler, Joan M.; Wong, Jacob Y., Anonymous merchandise delivery system.
  20. Camenisch,Jan, Anonymous payment with a verification possibility by a defined party.
  21. Hu, Xuesong, Apparatus and method for secure file transfer.
  22. Hauck, Jerrold Von; Haggerty, David T., Apparatus and methods for controlling distribution of electronic access clients.
  23. Hauck, Jerrold Von; Haggerty, David T., Apparatus and methods for controlling distribution of electronic access clients.
  24. Barbour, Marc R.; Sedky, Khaled Salah; Mandadi, Srikanth; Praus, Slavka, Asymmetric session credentials.
  25. Bennett, Christopher Ryan, Attaching multiple phone lines to a single mobile or landline phone.
  26. Bennett, Christopher Ryan, Attaching multiple phone lines to a single mobile or landline phone.
  27. Bennett, Christopher Ryan, Attaching multiple phone lines to a single mobile or landline phone.
  28. Bennett, Christopher Ryan, Attaching multiple phone lines to a single mobile or landline phone.
  29. Bennett, Christopher Ryan, Attaching multiple phone lines to a single mobile or landline phone.
  30. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Attribution of mobile device data traffic to end-user application based on socket flows.
  31. Petruzzi, Christopher R., Auditing custodial accounts.
  32. Labrou, Yannis; Agre, Jonathan Russell, Authentication services using mobile device.
  33. Rother, Carsten; Bordeaux, Lucas; Hamadi, Youssef; Blake, Andrew, Auto collage.
  34. Abu-Hakima, Suhayya; Grigg, Kenneth E; Piskorz, Oskar; Christie, Colin; McFarland, Connie; Guevremont, Vince, Auto-discovery of diverse communications devices for alert broadcasting.
  35. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  36. Raleigh, Gregory G.; Lavine, James, Automated credential porting for mobile devices.
  37. Raleigh, Gregory G., Automated device provisioning and activation.
  38. Raleigh, Gregory G., Automated device provisioning and activation.
  39. Raleigh, Gregory G., Automated device provisioning and activation.
  40. Raleigh, Gregory G., Automated device provisioning and activation.
  41. Raleigh, Gregory G., Automated device provisioning and activation.
  42. Raleigh, Gregory G., Automated device provisioning and activation.
  43. Raleigh, Gregory G., Automated device provisioning and activation.
  44. Raleigh, Gregory G., Automated device provisioning and activation.
  45. Raleigh, Gregory G., Automated device provisioning and activation.
  46. Raleigh, Gregory G., Automated device provisioning and activation.
  47. Raleigh, Gregory G., Automated device provisioning and activation.
  48. Raleigh, Gregory G., Automated device provisioning and activation.
  49. Raleigh, Gregory G., Automated device provisioning and activation.
  50. Raleigh, Gregory G., Automated device provisioning and activation.
  51. Raleigh, Gregory G., Automated device provisioning and activation.
  52. Pieper, Tobid; Martinelli, Paul; Northing, Richard, Automated entitlement management method and apparatus for capturing maintenance renewals revenues.
  53. Kodeboyina, Chaitanya; Kompella, Kireeti; Rekhter, Yakov, Automatic selection of site-IDs for virtual private networks.
  54. Gardiner, Michael; Canzi, Adriano, Biometric device utilizing finger sequence for authentication.
  55. Chen, Weijing; Allen, Keith Joseph, Broadband access for virtual private networks.
  56. Chen, Weijing; Allen, Keith Joseph, Broadband access for virtual private networks.
  57. Rosselli,Viente Suarez; Garza,Jose Emir; Hobson,Stephen James, Business message tracking system using message queues and tracking queue for tracking transaction messages communicated between computers.
  58. Crandall, Richard E.; Mitchell, Douglas P.; Krueger, Scott; Tribble, Guy, Chaos generator for accumulation of stream entropy.
  59. Dougherty, Jesse M.; Pearson, Malcolm E.; Thomas, Shawn M., Combining communication policies into common rules store.
  60. Tanizawa, Yoshimichi; Sato, Hideaki; Takahashi, Ririka; Kawamura, Shinichi; Murai, Shinya, Communication device, communication method, computer program product, and communication system.
  61. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Sabin, Michael J., Communications device with secure data path processing agents.
  62. Raleigh, Gregory G.; Raissinia, Alireza; Sabin, Michael; Lavine, James, Communications device with secure data path processing agents.
  63. Raleigh, Gregory G.; Raissinia, Alireza; Sabin, Michael; Lavine, James, Communications device with secure data path processing agents.
  64. Sievert, James; Bailey, Eric P.; Mass, William, Communications hub for use in life critical network.
  65. Sievert, Jim; Bailey, Eric P.; Mass, William R., Communications hub for use in life critical network.
  66. Lee, Michael M., Communications system that provides user-selectable data when user is on-hold.
  67. Lee, Michael M., Communications system that provides user-selectable data when user is on-hold.
  68. Browning, James, Compression of encrypted data in database management systems.
  69. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database.
  70. Spalka, Adrian; Lenhardt, Jan, Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device.
  71. Spalka, Adrian; Lehnhardt, Jan; Gotthardt, Frank, Computer implemented method for performing cloud computing on data being stored pseudonymously in a database.
  72. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system.
  73. Zhou, Bin, Computer readable medium storing program, information processing apparatus, and information processing method for document security.
  74. Heidel, Robert Eric, Computer software program for mental health professionals.
  75. Thomason, Graham Gordon; Townsend, Stephen, Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services.
  76. Thomason, Graham Gordon; Townsend, Stephen, Computer systems and a related method for enabling a prospective buyer to browse a vendor's website to purchase goods or services.
  77. Peterson, Kevin, Computer-implemented forum for enabling secure exchange of information.
  78. Freudiger, Julien; Brito, Alejandro E.; Rane, Shantanu; Uzun, Ersin, Computer-implemented system and method for anonymizing encrypted data.
  79. Voigt, Douglas L.; Milojicic, Dejan S., Configuration based on a blueprint.
  80. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
  81. Bennett, Christopher Ryan, Controlled recorded 3-way calling.
  82. Bennett, Christopher Ryan, Controlled recorded 3-way calling.
  83. Bennett, Christopher Ryan, Controlled recorded 3-way calling.
  84. Hamm, Mark D.; Greer, James B.; Johnson, Robert C., Controlling meta-data of information resources.
  85. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Controlling mobile device communications on a roaming network based on device state.
  86. Mandadi, Srikanth; Sedky, Khaled Salah; Praus, Slavka; Barbour, Marc R., Cross-region roles.
  87. Antinoro, Robert; Bhavsar, Siddharth, Customizing diagnostic codes and descriptions for an ECG management system.
  88. Tumminaro, John, Data communications over voice channel with mobile consumer communications devices.
  89. Riordan, James F., Data processing systems.
  90. Yoshimura, Sachiko; Kawai, Takanao, Data providing system, data receiving system, computer-readable recording medium storing data providing program, and computer-readable recording medium storing data receiving program.
  91. Gotthardt, Frank, Data structure, method, and system for predicting medical conditions.
  92. Kato, Makoto, Data transmission system, data transmission method, and device.
  93. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Data usage monitoring for media data services used by applications.
  94. Spalka, Adrian; Lehnhardt, Jan, Database system, computer system, and computer-readable storage medium for decrypting a data record.
  95. Raleigh, Gregory G., Device agent for remote user configuration of wireless network access.
  96. Raleigh, Gregory, Device assisted CDR creation aggregation, mediation and billing.
  97. Raleigh, Gregory G., Device assisted CDR creation, aggregation, mediation and billing.
  98. Raleigh, Gregory G, Device assisted ambient services.
  99. Raleigh, Gregory G, Device assisted ambient services.
  100. Raleigh, Gregory G., Device assisted services install.
  101. Raleigh, Gregory G., Device assisted services install.
  102. Vandewater, Eric; Dicks, Kent, Device configured for dynamic software change.
  103. Raleigh, Gregory, Device group partitions and settlement platform.
  104. Raleigh, Gregory G., Device group partitions and settlement platform.
  105. Raleigh, Gregory G., Device group partitions and settlement platform.
  106. Raleigh, Gregory G., Device group partitions and settlement platform.
  107. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  108. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Device-assisted services for protecting network capacity.
  109. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Device-assisted services for protecting network capacity.
  110. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Device-assisted services for protecting network capacity.
  111. Hodge, Stephen, Digital telecommunications call management and monitoring system.
  112. Harvey, Richard H.; McDonald, Justin J.; Ramsay, Ronald W., Directory partitioned system and method.
  113. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey, Distributing content and service launch objects to mobile devices.
  114. Chiueh, Tzi-Cker; Simha, Dilip, Document processing method and system.
  115. Chiueh, Tzi-Cker; Simha, Dilip, Document processing method and system.
  116. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  117. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  118. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  119. Turley, Patrick; White, Eric, Dynamically adaptive network firewalls and method, system and computer program product implementing same.
  120. Tanzer, Brett A.; Sankaranarayanan, Vidyaraman; Ayres, Lynn C.; Kashi, Asaf, Educating users and enforcing data dissemination policies.
  121. Tanzer, Brett A.; Sankaranarayanan, Vidyaraman; Ayres, Lynn C.; Kashi, Asaf, Educating users and enforcing data dissemination policies.
  122. Raggousis, Konstantinos, Electronic medical record distribution, systems and methods.
  123. Raggousis, Konstantinos, Electronic medical record distribution, systems and methods.
  124. Fujita, Naotake, Electronic money system and electronic money transaction method.
  125. Grill, Bernhard; Eberlein, Ernst; Kraegeloh, Stefan; Pickel, Joerg; Borsum, Juliane, Embedder for embedding a watermark into an information representation, detector for detecting a watermark in an information representation, method and computer program.
  126. Grill, Bernhard; Eberlein, Ernst; Kraegeloh, Stefan; Pickel, Joerg; Borsum, Juliane, Embedder for embedding a watermark into an information representation, detector for detecting a watermark in an information representation, method and computer program and information signal.
  127. Farrugia, Augustin J.; Sullivan, Nicholas; Fasoli, Gianpaolo; Ciet, Mathieu, Encryption method and apparatus using composition of ciphers.
  128. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, End user device that secures an association of application to service policy with an application certificate check.
  129. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, End user device that secures an association of application to service policy with an application certificate check.
  130. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  131. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand, Enhanced curfew and protection associated with a device group.
  132. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  133. Raleigh, Gregory G., Enhanced roaming services and converged carrier networks with device assisted services and a proxy.
  134. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  135. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Enterprise access control and accounting allocation for access networks.
  136. Bao, Yongjian; Stoval, III, William; Xu, Xiaofeng, Enterprise imaging worklist server and method of use.
  137. Lock, Hendrik; Matic, Dragon, Error handling for intermittently connected mobile applications.
  138. Zhang, Hao; Kay, Jeffrey B.; Pearson, Malcolm E.; Tribble, Eric D., Establishing secure, mutually authenticated communication credentials.
  139. Zhang, Hao; Kay, Jeffrey B.; Pearson, Malcolm E.; Tribble, Eric D., Establishing secure, mutually authenticated communication credentials.
  140. Schechter, Stuart; Rouskov, Yordan I.; Herley, Cormac E.; Kaufman, Charles William, Evidence-based dynamic scoring to limit guesses in knowledge-based authentication.
  141. Hahn-Carlson, Dean W., Financial institution-based transaction processing system and approach.
  142. Hahn-Carlson, Dean W., Financial institution-based transaction processing system and approach.
  143. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Phuong, Flow tagging for service policy implementation.
  144. Feigenbaum, Lee; Martin, Sean J.; Martin, Simon L.; Torres, Elias, Generation of unique significant key from URL get/post content.
  145. Yoshida, Takuya; Okada, Koji, Group signature system, device, and program.
  146. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  147. Dicks, Kent; Vandewater, Eric; Strength, Randolph, Health monitoring and communications device.
  148. Raleigh, Gregory G., Hierarchical service policies for creating service usage data records for a wireless end-user device.
  149. Rossmann, Alain, Hybrid systems for securing digital assets.
  150. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Identity blocking service from a wireless service provider.
  151. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Identity blocking service from a wireless service provider.
  152. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Identity blocking service from a wireless service provider.
  153. Yachida, Masuyoshi; Kanai, Yoichi, Image forming apparatus and electronizing method for information mentioned in paper.
  154. Taylor, Stuart; Rother, Carsten; de Boer, William H, Image processing system for digital collage.
  155. Blake, Andrew; Rother, Carsten Curt Eckard; Kumar, Sanjiv; Kolmogorov, Vladimir, Image tapestry.
  156. Ferlitsch, Andrew Rodney, Imaging job authorization.
  157. Pearson, Malcolm Erik; McMillan, Bruce A.; Warman, Leon R.; Curtis, Loren T., Independent message stores and message transport agents.
  158. Watanabe, Takashi; Sako, Hiroshi; Nagayoshi, Hiroto; Uemura, Toshiro, Information display device and information display method.
  159. Matsuyama, Norikazu; Inari, Kyoji; Takemori, Shoichi; Takayama, Yurika, Information distribution system, information display apparatus, information management method, and computer readable medium.
  160. Yamamoto,Noriyuki, Information processing apparatus, information processing method, program for implementing information processing method, information processing system, and method for information processing system.
  161. Kassai, Kunihiko; Furuta, Toru, Information processing apparatus, server apparatus, medium recording information processing program and information processing method.
  162. Eida, Masataka; Kaneko, Hajime, Information provision exchange service system and method, program for implementing the method, and storage medium storing the program.
  163. Fiferlick, Jeffrey, Information record management system.
  164. Grin, Russell; Haffner, Crosby, Intermediary content provider.
  165. Grin, Russell; Haffner, Crosby, Intermediary content provider.
  166. Raleigh, Gregory G.; Nguyen, Vien-Phuong; Stark, Lisa; Tellado, Jose, Intermediate networking devices.
  167. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  168. Hahn-Carlson, Dean W., Inventory-based payment processing system and approach.
  169. Zaverucha, Gregory Marc; Vanstone, Scott Alexander, Keyed PV signatures.
  170. Gandhi, Mauktik; Lamanna, Charles; Sankaranarayanan, Vidyaraman; Pontes Filho, Raimundo, Language independent probabilistic content matching.
  171. Gandhi, Mauktik; Lamanna, Charles; Sankaranarayanan, Vidyaraman; Pontes Filho, Raimundo, Language independent probabilistic content matching.
  172. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  173. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  174. Hirsh, Robert Bruce, Leveraging a persistent connection to access a secured service.
  175. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  176. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  177. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  178. Zellner, Samuel N.; Enzmann, Mark J.; Morton, Jr., Robert T., Location blocking service from a wireless service provider.
  179. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a wireless service provider.
  180. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Location blocking service from a wireless service provider.
  181. Zellner, Samuel, Location-based security rules.
  182. Lin, Chih-Yin, Logging system and method based on one-way hash function.
  183. Hatakeda, Darrin Nobuharu, Management and security of personal information.
  184. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  185. Raleigh, Gregory G.; Green, Jeffrey; Tellado, Jose, Managing service user discovery and service launch object placement on a device.
  186. LaLonde, John R.; Mass, William; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joe; Gryzwa, Mark, Medical data transport over wireless life critical network.
  187. LaLonde, John; Mass, William R.; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joseph E.; Gryzwa, Mark, Medical data transport over wireless life critical network.
  188. LaLonde, John; Mass, William R.; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joseph E.; Gryzwa, Mark, Medical data transport over wireless life critical network.
  189. LaLonde, John; Mass, William R.; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joseph E.; Gryzwa, Mark T., Medical data transport over wireless life critical network.
  190. LaLonde, John; Mass, William; Hoyme, Kenneth; Johnson, David C.; Bange, Joe; Gryzwa, Mark, Medical data transport over wireless life critical network.
  191. Johnson, David C.; Sievert, Jim; Hoyme, Kenneth; Lalonde, John; Mass, William; Duccini, David V., Medical data transport over wireless life critical network employing dynamic communication link mapping.
  192. Tumminaro, John, Member-supported mobile payment system.
  193. Pearson, Malcolm Erik; Warman, Leon R., Message data management.
  194. Pearson, Malcolm Erik; Warman, Leon R., Message data management.
  195. Raleigh, Gregory G., Message link server with plural message delivery triggers.
  196. Blair, Timothy P; Smith, David, Message receipt through firewall.
  197. Koster, Robert Paul; Petkovic, Milan; Kunzi, Julien, Method and a system of healthcare data handling.
  198. Youn, Paul, Method and apparatus for facilitating role-based cryptographic key management for a database.
  199. Sriram, Srinivasan; Manian, Zaki N., Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items.
  200. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  201. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  202. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  203. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  204. Kathan, Berthold, Method and arrangement for authenticating a control unit and transmitting authentication information messages to the control unit.
  205. Bianco, Alberto; Colazzo, Laura; Ricciato, Fabio; Turolla, Maura; Varriale, Antonio, Method and system for access control and data protection in digital memories, related digital memory and computer program product therefor.
  206. Bohli, Jens-Matthias; Li, Wenting; Seedorf, Jan, Method and system for accessing a device by a user.
  207. Casse, Benjamin Wilson, Method and system for accessing centralised patient data.
  208. Szrek, Walter; Oram, Thomas K., Method and system for authentication.
  209. Turley, Patrick; Johnston, Keith; Tonnesen, Steven D., Method and system for controlling network access.
  210. Patton, Charles; Roschelle, Jeremy; Pea, Roy D.; Vahey, Phil, Method and system for enabling and controlling communication topology, access to resources, and document flow in a distributed networking environment.
  211. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  212. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  213. Gnech,Thomas Hermann; Illner,Regina, Method and system for identifying and processing an unauthorized access request.
  214. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  215. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  216. Langley, Richard Jay, Method and system for integrating duplicate checks with existing computer systems.
  217. Camenisch, Jan Leonhard; Kenyon, Christopher Mark, Method and system for linking an anonymous electronic trade order to an identity of a trader.
  218. Brentano, James; Pieber, Toby; Martinelli, Paul; Thompson, Brad; Northing, Richard, Method and system for managing digital goods.
  219. Brentano, James; Pieber, Toby; Martinelli, Paul; Thompson, Brad; Northing, Richard, Method and system for managing digital goods.
  220. Vainstein, Klimenty, Method and system for managing security tiers.
  221. Wu, Wai; Hoffberg, Steven M., Method and system for matching entities in an auction.
  222. Micali, Silvio; Rivest, Ronald L., Method and system for micropayment transactions.
  223. Gorecki, Christian; Zeiger, Florian, Method and system for preserving privacy and accountability.
  224. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  225. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  226. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Method and system for providing cryptographic document retention with off-line access.
  227. Nath, Satyajit, Method and system for providing document retention using cryptography.
  228. Nath, Satyajit, Method and system for providing document retention using cryptography.
  229. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  230. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  231. Martinelli, Paul; Pieper, Tobid; Northing, Richard; Habets, Ariane, Method and system for subscription-based, entitlement-driven license key generation and distribution for digital goods.
  232. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  233. Lee, Michael M., Method for automatic presentation of information before connection.
  234. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; Carter, III, Russell Bertrand; James, Justin; Nguyen, Laurent An Minh, Method for child wireless device activation to subscriber account of a master wireless device.
  235. Novack, Brian M.; Madsen, Daniel L.; Cheaney, Michael D.; Thompson, Timothy R., Method for communicating certificates to computers.
  236. Pool, Kenneth D., Method for controlling access to informational objects.
  237. Kudelski, Henri, Method for controlling the access to a specific type of services and authentication device for controlling the access to such type of services.
  238. Zehler, Peter, Method for enforcing document privacy through third party systems.
  239. Karp, Alan H., Method for exchanging information between at least two participants via at least one intermediary to limit disclosure between the participants.
  240. Zhang, Xinwen; Xiong, Huijun; Wang, Guoqiang, Method for flexible data protection with dynamically authorized data receivers in a content network or in cloud storage and content delivery services.
  241. Wong, Jacob Y.; Anderson, Roy L., Method for implementing anonymous credit card transactions using a fictitious account name.
  242. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Method for medical data collection and transmission.
  243. McGough, R. Paul, Method for obtaining key for use in secure communications over a network and apparatus for providing same.
  244. Raleigh, Gregory G., Method for operating a wireless end-user device mobile payment agent.
  245. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Method for providing an adaptive wireless ambient service to a mobile device.
  246. Hatter, Jesse Andrew; Hatter, Brenda Faye; Hatter, Rosie Jean, Method for remote electronic verification and authentication and screening of potential signatories for remote electronic notary transactions via remote PC encrypted platform to a broadband digitally wireless cellular/PDA device or portable PC device.
  247. Dicks, Kent E.; Crosley, Thomas; Waterbury, Chuck, Method for remote provisioning of electronic devices by overlaying an initial image with an updated image.
  248. Naniyat, Arun; Arunan, Thenmozhi, Method for removable element authentication in an embedded system.
  249. Lucidarme, Thierry, Method for securing a transmission, associated system and mediation platform.
  250. Lucidarme, Thierry, Method for securing a transmission, associated system and mediation platform.
  251. Kim, Myung-sun; Han, Sung-hyu; You, Yong-kuk; Yoon, Young-sun; Kim, Bong-seon; Lee, Jae-heung, Method for transmitting content in home network using user-binding.
  252. Camus,Sylvie; Frisch,Laurent; Mouton,Dimitri, Method of controlling access to cryptographic resources.
  253. Shin, Kwang-Yoon, Method of preventing collisions between RFID readers in RFID system.
  254. Novack, Brian M.; Madsen, Daniel L.; Cheaney, Michael D.; Thompson, Timothy R., Method of promulgating a transaction tool to a recipient.
  255. Schell, Stephan V.; Mathias, Arun G.; Hauck, Jerrold Von; Haggerty, David T.; McLaughlin, Kevin; Juang, Ben-Heng; Li, Li, Methods and apparatus for delivering electronic identification components over a wireless network.
  256. Schell, Stephan V.; Mathias, Arun G.; Von Hauck, Jerrold; Haggerty, David T.; McLaughlin, Kevin; Juang, Ben-Heng; Li, Li, Methods and apparatus for delivering electronic identification components over a wireless network.
  257. Schell, Stephan V.; Mathias, Arun G.; Von Hauck, Jerrold; Haggerty, David T.; McLaughlin, Kevin; Juang, Ben-Heng; Li, Li, Methods and apparatus for delivering electronic identification components over a wireless network.
  258. O'Toole, Jr., James W., Methods and apparatus for providing data distribution that supports auditing.
  259. Corley, Carole Rhoads; Lobo, Jorge; Vassberg, Lorraine Phyllis; Wang, Xiping, Methods and apparatus for scoped role-based access control.
  260. Cohen, Gabriel A.; Karstens, Christopher K., Methods and computer program products for securing display of message content.
  261. Reddy, Amarender Reddy Kethi; Yamamura, Shinichi, Methods and systems for accessing remote, descriptor-related data at an imaging device.
  262. Lum, Joey P.; Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Sojian, Lena, Methods and systems for administering imaging device notification access control.
  263. Zhang, Hanzhong; Lovat, David J., Methods and systems for authorizing imaging device concurrent account use.
  264. Lovat, David J.; Zhang, Hanzhong, Methods and systems for configuration-based imaging device accounting.
  265. Borchers, Gregory Eugene; Mathieson, Rono James, Methods and systems for disassembly and reassembly of examination documents.
  266. Lovat, David J.; Zhang, Hanzhong, Methods and systems for displaying content on an imaging device.
  267. Yamamura, Shinichi; Lum, Joey P.; Stevens, Mark Liu, Methods and systems for distributing localized display elements to an imaging device.
  268. Benoit, Bernard; Fournier, Jean-Claude; Gauteron, Laurent; Zhao, Yishan; Fer, Francois, Methods and systems for enabling legal-intercept mode for a targeted secure element.
  269. Zhang, Hanzhong; Lovat, David J., Methods and systems for imaging device accounting data maintenance.
  270. Lovat, David J.; Zhang, Hanzhong, Methods and systems for imaging device accounting data management.
  271. Zhang, Hanzhong; Lovat, David J., Methods and systems for imaging device accounting server recovery.
  272. Lovat, David J.; Zhang, Hanzhong, Methods and systems for imaging device accounting server redundancy.
  273. Lum, Joey P.; Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Sojian, Lena; Stevens, Mark Liu, Methods and systems for imaging device control.
  274. Zhang, Hanzhong; Lovat, David J., Methods and systems for imaging device credential acceptance.
  275. Lovat, David J.; Zhang, Hanzhong, Methods and systems for imaging device credential authentication and communication.
  276. Lovat, David J.; Zhang, Hanzhong, Methods and systems for imaging device credential management.
  277. Zhang, Hanzhong; Lovat, David J., Methods and systems for imaging device credential management and authentication.
  278. Lovat, David J.; Zhang, Hanzhong, Methods and systems for imaging device credential receipt and authentication.
  279. Zhang, Hanzhong; Lovat, David J., Methods and systems for imaging device credential submission.
  280. Zhang, Hanzhong; Lovat, David J., Methods and systems for imaging device credential submission and consolidation.
  281. Zhang,Hanzhong; Lovat,David J., Methods and systems for imaging device credential submission and receipt.
  282. Lum, Joey P.; Stevens, Mark Liu; Yamamura, Shinichi, Methods and systems for imaging device data display.
  283. Lum, Joey P.; Stevens, Mark Liu; Yamamura, Shinichi, Methods and systems for imaging device display element localization.
  284. Mathieson, Rono; Schacht, Bryan K.; Chrisop, Roy; Richardson, Tanna; Plewnia, Bogdan; Sojian, Lena; Lum, Joey; Stevens, Mark; Nguyen, Uoc; Yamamura, Shinichi, Methods and systems for imaging device document management.
  285. Mathieson, Rono; Schacht, Bryan K.; Chrisop, Roy; Richardson, Tanna; Plewnia, Bogdan; Sojian, Lena; Lum, Joey; Stevens, Mark; Nguyen, Uoc; Yamamura, Shinichi, Methods and systems for imaging device document translation.
  286. Chrisop, Roy K.; Richardson, Tanna Marie, Methods and systems for imaging device dynamic document creation and organization.
  287. Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Sojian, Lena; Lum, Joey P., Methods and systems for imaging device event notification administration.
  288. Lum, Joey P.; Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Sojian, Lena, Methods and systems for imaging device event notification administration and subscription.
  289. Plewnia, Boguslaw Ludwik; Sojian, Lena; Lum, Joey P.; Nguyen, Uoc H., Methods and systems for imaging device event notification subscription.
  290. Reddy, Amarender Reddy Kethi; Yamamura, Shinichi, Methods and systems for imaging device form generation and form field data management.
  291. Plewnia, Boguslaw Ludwik, Methods and systems for imaging device job configuration management.
  292. Lum, Joey P.; Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Stevens, Mark Liu; Sojian, Lena, Methods and systems for imaging device job management.
  293. Reddy, Amarender Reddy Kethi; Yamamura, Shinichi, Methods and systems for imaging device metadata management.
  294. Sojian, Lena; Lum, Joey P.; Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik, Methods and systems for imaging device notification access control.
  295. Plewnia, Boguslaw Ludwik; Sojian, Lena; Lum, Joey P.; Nguyen, Uoc H., Methods and systems for imaging device related event notification.
  296. Mathieson, Rono; Schacht, Bryan K.; Chrisop, Roy; Richardson, Tanna; Plewnia, Bogdan; Sojian, Lena; Lum, Joey; Stevens, Mark; Nguyen, Uoc; Yamamura, Shinichi, Methods and systems for imaging device remote application interaction.
  297. Mathieson, Rono; Schacht, Bryan K.; Chrisop, Roy; Richardson, Tanna; Plewnia, Bogdan; Sojian, Lena; Lum, Joey; Stevens, Mark; Nguyen, Uoc; Yamamura, Shinichi, Methods and systems for imaging device remote form management.
  298. Reddy, Amarender Reddy Kethi; Yamamura, Shinichi, Methods and systems for imaging-device-based form field management.
  299. Lum, Joey P.; Stevens, Mark Liu; Yamamura, Shinichi, Methods and systems for integrating imaging device display content.
  300. Zhang, Hanzhong; Lovat, David J., Methods and systems for local configuration-based imaging device accounting.
  301. Lum, Joey P.; Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Sojian, Lena, Methods and systems for obtaining imaging device event notification subscription.
  302. Nguyen, Uoc H.; Plewnia, Boguslaw Ludwik; Sojian, Lena; Lum, Joey P., Methods and systems for obtaining imaging device notification access control.
  303. Plewnia, Boguslaw Ludwik; Yamamura, Shinichi; Zhang, Hanzhong; Lovat, David J.; Reddy, Amarender Reddy Kethl; Chrisop, Roy K.; Richardson, Tanna; Nguyen, Uoc; Lum, Joey; Stevens, Mark Liu, Methods and systems for peripheral accounting.
  304. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  305. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  306. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  307. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  308. Reddy, Amarender Reddy Kethi; Yamamura, Shinichi, Methods and systems for providing access to remote, descriptor-related data at an imaging device.
  309. Reddy, Amarender Reddy Kethi; Yamamura, Shinichi, Methods and systems for providing remote file structure access on an imaging device.
  310. Yamamura, Shinichi; Reddy, Amarender Reddy Kethi, Methods and systems for providing remote, descriptor-related data to an imaging device.
  311. Stevens, Mark Liu; Yamamura, Shinichi; Lum, Joey P., Methods and systems for receiving localized display elements at an imaging device.
  312. Lovat, David J.; Zhang, Hanzhong, Methods and systems for remote configuration-based imaging device accounting.
  313. Ferlitsch, Andrew Rodney, Methods and systems for third-party control of remote imaging jobs.
  314. Lovat, David J.; Zhang, Hanzhong, Methods and systems for transmitting content to an imaging device.
  315. Richardson, Tanna Marie; Finnegan, Ginger Marie, Methods and systems for user interface customization.
  316. Plewnia, Boguslaw Ludwik, Methods and sytems for imaging device job definition.
  317. Biskeborn, Robert Glenn; Liang, Jason; Lo, Calvin Shyhjong, Methods for enabling functionality in multi-modal data storage systems.
  318. Biskeborn, Robert Glenn; Liang, Jason; Lo, Calvin Shyhjong, Methods for enabling functionality in multi-modal data storage systems.
  319. Baker, Paul L., Methods for negotiating agreement over concealed terms through a blind agent.
  320. Dicks, Kent; Kent, Ralph; Crosley, Thomas; Bartlett, Terry; Tripp, Robert, Methods for personal emergency intervention.
  321. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Methods for sampling and relaying patient medical data.
  322. Dicks, Kent E.; Kent, Ralph; Bartlett, Terry; Crosley, Thomas; Tripp, Robert, Methods for voice communication through personal emergency response system.
  323. Friedlander, Robert R.; Kraemer, James R., Methods, systems and computer program products for providing a level of anonymity to patient records/information.
  324. Dominguez, Benedicto H.; Manessis, Thomas J.; Roth, Janet T.; Caillon, Pascal Achille; Spielman, Jason; Spielman, Terence; Reno, James Donald, Mobile account authentication service.
  325. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Mobile device and method attributing media services network usage to requesting application.
  326. Raleigh, Gregory G., Mobile device and method with secure network messaging for authorized components.
  327. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  328. Raleigh, Gregory G.; Lavine, James; Carter, III, Russell Bertrand, Mobile device and service management.
  329. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device having power save feature for establishing communications.
  330. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
  331. Raleigh, Gregory G., Mobile device with common secure wireless message service serving multiple applications.
  332. Raleigh, Gregory G., Mobile device with data service monitoring, categorization, and display for different applications and networks.
  333. Raleigh, Gregory G., Mobile device with device agents to detect a disallowed access to a requested mobile data service and guide a multi-carrier selection and activation sequence.
  334. Raleigh, Gregory G., Mobile device with user controls and policy agent to control application access to device location data.
  335. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy.
  336. Bennett, Christopher Ryan, Mobile phone as a one-way recorded transmitter over a cellular network.
  337. Bennett, Christopher Ryan, Mobile phone as a one-way recorded transmitter over a cellular network.
  338. Bennett, Christopher Ryan, Mobile phone as a one-way recorded transmitter over a cellular network.
  339. Bennett, Christopher Ryan, Mobile phone as a one-way recorded transmitter over a cellular network.
  340. Bennett, Christopher Ryan, Mobile phone as a one-way recorded transmitter over a cellular network.
  341. Sievert, Jim; Mass, William R., Modular communicator for use in life critical network.
  342. Sievert, Jim; Mass, William, Modular patient communicator for use in life critical network.
  343. Sievert, James; Mass, William, Modular patient portable communicator for use in life critical network.
  344. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  345. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  346. Hahn-Carlson, Dean W., Multi-supplier transaction and payment programmed processing approach with at least one supplier.
  347. Raleigh, Gregory G., Multicarrier over-the-air cellular network activation server.
  348. Raleigh, Gregory G, Network based ambient services.
  349. Raleigh, Gregory G., Network based ambient services.
  350. Raleigh, Gregory G., Network based service policy implementation with network neutrality and user privacy.
  351. Raleigh, Gregory G., Network based service profile management with user preference, adaptive policy, network neutrality, and user privacy.
  352. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; James, Justin, Network service plan design.
  353. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; James, Justin, Network service plan design.
  354. Raleigh, Gregory G., Network system with common secure wireless message service serving multiple applications on multiple wireless devices.
  355. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  356. Raleigh, Gregory G., Network tools for analysis, design, testing, and production of services.
  357. Raleigh, Gregory G, Open development system for access service providers.
  358. Raleigh, Gregory G, Open development system for access service providers.
  359. Raleigh, Gregory G., Open transaction central billing system.
  360. Hahn-Carlson, Dean W.; Suits, David A.; Kanathur, Raghunandan N., Order-resource fulfillment and management system and approach.
  361. Trent, Barry A.; Mandy, Edward R., Peer integrity checking system.
  362. Jain, Chandresh K.; Pearson, Malcolm E.; Waddoups, Nathan F.; Costea, Mihai; Tribble, Eric D., Perimeter message filtering with extracted user-specific preferences.
  363. Praus, Slavka; Sedky, Khaled Salah; Mandadi, Srikanth; Barbour, Marc R., Personalizing global session identifiers.
  364. Setty, Srinath Tumkur Venkatacha; Venkatesan, Ramarathnam; Zwiefel, Brant Lee; Chandran, Nishanth; Lokam, Satyanarayana V.; Lee, Jonathan David; Selvis, Sharmila Deva, Policy-based key recovery.
  365. Maguire, Yael; Shen, Shizhe, Post-manufacture camera calibration.
  366. Olson,Erik B.; Zinda,Eric K., Prevention of software tampering.
  367. Abu-Hakima, Suhayya; Grigg, Kenneth E., Processing of network content and services for mobile or fixed devices.
  368. Fortune, Erik; Wu, Wei; Bennett, Julie D; El-Gammal, Mohammed, Profile protection.
  369. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  370. Sundaram, Sharada; Koeten, Robert, Protecting user identity at a cloud using a distributed user identity system.
  371. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy server for providing an adaptive wireless ambient service to a mobile device.
  372. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Proxy system and method for adaptive ambient services.
  373. Raleigh, Gregory G., Quality of service for device assisted services.
  374. Raleigh, Gregory G., Quality of service for device assisted services.
  375. Kaseda, Yuki; Yoshida, Takuya; Fujii, Yoshihiro; Abe, Shingo; Yamada, Masataka, Re-encryption system, re-encryption apparatus, and program.
  376. Hahn-Carlson, Dean W.; Armstrong, Kevin M., Recurring transaction processing system and approach.
  377. Beck, Michael, Relationship-based authorization.
  378. Beck, Michael, Relationship-based authorization.
  379. Beck, Michael E., Relationship-based authorization.
  380. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, Remotely configurable device agent for packet routing.
  381. Ferreira, Jorge M.; Virmani, Mandira, Removing personal information when a save option is and is not available.
  382. Raleigh, Gregory G., Restricting end-user device communications over a wireless access network associated with a cost.
  383. Dougherty, Jesse M.; Pearson, Malcolm E.; Thomas, Shawn M., Reviewing effectiveness of communication rules system.
  384. Raleigh, Gregory G., Roaming services network and overlay networks.
  385. Brinkmoeller, Bernhard; Herbst, Axel, Rule-based anonymizer for business data.
  386. Ando, Megumi, Secret key generation.
  387. Libin, Phil; Engberg, David, Secure ID checking.
  388. Kia, Omid Ebrahimi, Secure and mobile biometric authentication for electronic health record management.
  389. Raykova, Mariana; Kamara, Seny F., Secure computation using a server module.
  390. Raykova, Mariana; Kamara, Seny F., Secure computation using a server module.
  391. Raykova, Mariana; Kamara, Seny F., Secure computation using a server module.
  392. Chida, Koji, Secure computing system, secure computing method, secure computing apparatus, and program therefor.
  393. Rudolf, Gerald K.; Abdullah, Muhammad Sajjad; Alder, David Brian; Shah, Pulin Rajesh; Thomas, Steven William; Brown, Stanley Edson, Secure data transfer in a communication system including portable meters.
  394. Monk, David, Secure data transfer system and method.
  395. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  396. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  397. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  398. Marceau, Carla; Stillerman, Matthew A., Secure peer-to-peer object storage system.
  399. Leleu, Jean-luc, Secured authentication method for providing services on a data transmisson Network.
  400. Chazalet, Boris; Ahmed, Tansir, Secured cloud data storage, distribution and restoration among multiple devices of a user.
  401. Chemla, Yves; Richard, Christophe, Security device, method and system for financial transactions, based on the identification of an individual using a biometric profile and a smart card.
  402. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  403. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  404. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  405. Raleigh, Gregory G., Security techniques for device assisted services.
  406. Raleigh, Gregory G., Security techniques for device assisted services.
  407. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  408. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  409. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey, Security, fraud detection, and fraud mitigation in device-assisted services systems.
  410. King, Kevin; Bergersen, Brad, Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary.
  411. Kamara, Seny F.; Mohassel, Payman, Server-aided multi-party protocols.
  412. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Green, Jeffrey; James, Justin, Service design center for device assisted services.
  413. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; Green, Jeffrey; James, Justin, Service design center for device assisted services.
  414. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  415. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza; James, Justin; Green, Jeffrey, Service design center for device assisted services.
  416. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service offer set publishing to device agent with on-device service selection.
  417. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service offer set publishing to device agent with on-device service selection.
  418. Raleigh, Gregory G.; Tellado, Jose; Green, Jeffrey; Lavine, James; James, Justin; Nguyen, Laurent An Minh; Carter, III, Russell Bertrand, Service plan design, user interfaces, application programming interfaces, and device management.
  419. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow.
  420. Raleigh, Gregory G., Service profile management with user preference, adaptive policy, network neutrality and user privacy for intermediate networking devices.
  421. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set published to device agent with on-device service selection.
  422. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Service selection set publishing to device agent with on-device service selection.
  423. Takashima, Katsuyuki; Okamoto, Tatsuaki, Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program.
  424. Raleigh, Gregory G., Simplified service network architecture.
  425. Crandall, Richard E.; Mitchell, Douglas P., Small memory footprint fast elliptic encryption.
  426. Gardiner, Michael; Canzi, Adriano, Smart card system comprising a card and a carrier.
  427. Gardiner, Michael; Canzi, Adriano, Smart card systems and methods utilizing multiple ATR messages.
  428. Gardiner, Michael; Canzi, Adriano, Smart card systems comprising a card and a carrier.
  429. Ahluwalia, Aruj; Marshall, Vernon; Narayanan, Satish Thenthiruperai; Roth, Andrew; Rui, Xiongwen; Serge, Thomas K., Smart phone system and method.
  430. Ahluwalia, Aruj; Marshall, Vernon; Narayanan, Satish Thenthiruperai; Roth, Andrew; Rui, Xiongwen; Serge, Thomas K., Smart phone system and method.
  431. Ahluwalia, Aruj; Marshall, Vernon; Narayanan, Satish Thenthiruperai; Roth, Andrew; Rui, Xiongwen; Serge, Thomas K., Smart phone system and method.
  432. Schechter, Stuart; Reeder, Robert Wilson, Social authentication for account recovery.
  433. Schechter, Stuart; Reeder, Robert Wilson, Social authentication for account recovery.
  434. Winick, Steven J., Supervision of high value assets.
  435. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  436. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  437. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  438. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  439. Williams, Jason S., System and method for an anonymous exchange of private data.
  440. Turley, Patrick; White, Eric, System and method for behavior-based firewall modeling.
  441. Johnston,Keith; Garcia,Mario, System and method for comprehensive code generation for system management.
  442. Balasubramanian, Chandra; Sherwin, Francis; Keresman, III, Michael A., System and method for conversion between internet and non-internet based transactions.
  443. Smith, Kyle B.; Shaw, Richard E., System and method for data collection and management.
  444. Tonnesen, Steven D., System and method for detection of aberrant network behavior by clients of a network access gateway.
  445. Tonnesen, Steven D., System and method for detection of aberrant network behavior by clients of a network access gateway.
  446. Tonnesen, Steven D., System and method for detection of aberrant network behavior by clients of a network access gateway.
  447. Johnston, Keith; White, Eric; Martin, John, System and method for double-capture/double-redirect to a different location.
  448. Bonalle, David S.; Larkin, Carl; Saunders, Peter D., System and method for dynamic FOB synchronization and personalization.
  449. Ta, Tuan; Turley, Patrick; Clendinning, Kerry; Looney, Kelly, System and method for dynamic bandwidth provisioning.
  450. Gonzales, Jr., Merced; Loya, III, Francisco; Gonzales, Michael, System and method for gauging performance based on analysis of hospitalist and patient information.
  451. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  452. Gonzales, Jr., Merced; Loya, III, Francisco; Gonzales, Michael, System and method for maintaining hospitalist and patient information.
  453. Enzmann, Mark J.; Moton, Jr., Robert T.; Zellner, Samuel N., System and method for permission to access mobile location information.
  454. Vonog, Stanislav; Lemmey, Tara; Surin, Nikolay; Shtayura, Vadim, System and method for pervasive computing.
  455. Vonog, Stanislav; Lemmey, Tara; Surin, Nikolay; Shtayura, Vadim, System and method for pervasive computing.
  456. White, Eric; Turley, Patrick, System and method for providing a secure connection between networked computers.
  457. White, Eric; Turley, Patrick, System and method for providing a secure connection between networked computers.
  458. White, Eric; Turley, Patrick, System and method for providing a secure connection between networked computers.
  459. MacKinnon, Richard; Looney, Kelly; White, Eric, System and method for providing access control.
  460. MacKinnon, Richard; Looney, Kelly; White, Eric, System and method for providing access control.
  461. Persen, Kenneth H.; Vallapureddy, Vineel, System and method for providing communications between a physically secure programmer and an external device using a cellular network.
  462. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  463. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  464. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  465. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  466. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, System and method for providing user notifications.
  467. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, System and method for providing user notifications.
  468. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James; Green, Jeffrey, System and method for providing user notifications.
  469. Malik, Dale W., System and method for regulating electronic messages.
  470. Malik, Dale W., System and method for regulating electronic messages.
  471. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N, System and method for remote control of appliances utilizing mobile location-based applications.
  472. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
  473. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
  474. Hittel, John Paul; Wooton, Clinton J., System and method for secure communications between a computer test tool and a cloud-based server.
  475. Nagel, Robert H.; Felsher, David P.; Hoffberg, Steven M., System and method for secure communications involving an intermediary.
  476. Shoemaker, Daniel D.; O'Donnell, Lee Thomas; Broder, James P.; Shoemaker, Scott D., System and method for secure reciprocal exchange of data.
  477. Shoemaker, Daniel D.; O'Donnell, Lee Thomas; Broder, James P.; Shoemaker, Scott D., System and method for secure reciprocal exchange of data.
  478. Shoemaker, Daniel D.; O'Donnell, Lee Thomas; Broder, James P.; Shoemaker, Scott D., System and method for secure reciprocal exchange of data.
  479. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  480. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  481. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  482. Nagel, Robert H.; Felsher, David P.; Hoffberg, Steven M., System and method for secure three-party communications.
  483. Leneel, Olivier, System and method for security using a sibling smart card.
  484. Gardiner, Michael; Canzi, Adriano, System and method for selectively initiating biometric authentication for enhanced security of access control transactions.
  485. Zellner, Samuel N., System and method for using location information to execute an action.
  486. Zellner, Samuel N., System and method for using location information to execute an action.
  487. Thackston, James D., System and method for verifying user identity in a virtual environment.
  488. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  489. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  490. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, System and method for wireless network offloading.
  491. Monk, David; Canessa, John C.; Canessa, Giancarlo; Canessa, Gino G., System and method of encryption for DICOM volumes.
  492. Lim, Jin Seong, System and method of transmitting/receiving security data.
  493. Haila, David Andrew; Cummins, Graham; Lamb, Robert Ray; Cranendonk, Jeroen Sebastian, System and methods for providing query-based permissions to data.
  494. Haila, David Andrew; Cummins, Graham; Lamb, Robert Ray; Cranendonk, Jeroen Sebastian, System and methods for providing query-based permissions to data.
  495. Entwistle,Martin Patrick, System for delivering scenario specific, problem solving, decision support from non-intelligent computer systems.
  496. Hatter, Jesse Andrew; Hatter, Brenda Fate; Jackson, Audrella Marie, System for executing remote electronic notarization and signatory verification and authentication.
  497. Dicks, Kent E.; Kent, Ralph; Bartlett, Terry; Crosley, Thomas; Tripp, Robert, System for facility management of medical data and patient interface.
  498. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, System for medical data collection and transmission.
  499. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, System for personal emergency intervention.
  500. Raleigh, Gregory G.; Rightmyer, Rob; Kudelin, Vladislav, System for providing an adaptive wireless ambient service to a mobile device.
  501. Dicks, Kent E.; Crosley, Thomas; Waterbury, Chuck, System for remote provisioning of electronic devices by overlaying an initial image with an updated image.
  502. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, System for sampling and relaying patient medical data.
  503. Park, Young Chual; Yang, Tae Joon; Lee, Ki Jeong, System for supporting over-the-air service and method thereof.
  504. Abbott, Robert L.; Shahda, Frederick A.; Hamilton, Alfred; Blackhurst, Jason P., System of anonymous user creation based on oblivious transfer.
  505. Marino, Anna; Seliger, Frank; Van Acker, Bernard, System, method and program product for anonymous transfer of messages.
  506. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for adapter-based communication with a medical device.
  507. Landi, William A.; Rao, R. Bharat, Systems and methods for encryption-based de-identification of protected health information.
  508. Barnes, Robert John; Gupta, Rajan, Systems and methods for managing alarms from recorders.
  509. Bishop, Fred; Saunders, Peter D., Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia.
  510. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for medical data interchange activation.
  511. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for medical data interchange using mobile computing devices.
  512. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for medical data interchange via remote command execution.
  513. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for processing and transmittal of data from a plurality of medical devices.
  514. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for processing and transmittal of medical data through an intermediary device.
  515. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for processing and transmittal of medical data through multiple interfaces.
  516. Cox, Gerald L.; Geurts, Brian, Systems and methods for providing digital content.
  517. Clay, Philip Bryan, Systems and methods for providing secure multicast intra-cluster communication.
  518. Clay, Philip Bryan, Systems and methods for providing secure multicast intra-cluster communication.
  519. Dicks, Kent; Kent, Ralph; Crosley, Thomas; Bartlett, Terry, Systems and methods for remote patient monitoring and storage and forwarding of patient information.
  520. Dicks, Kent; Kent, Ralph; Crosley, Thomas; Bartlett, Terry, Systems and methods for remote patient monitoring and user interface.
  521. Dicks, Kent; Kent, Ralph; Tripp, Robert; Bartlett, Terry; Crosley, Thomas, Systems and methods for storage and forwarding of medical data.
  522. Potash, Marc; Gowda, Preetham, Systems and methods of generating an authenticated document biosignature.
  523. Beck, Michael E., Systems and methods of managing specification, enforcement, or auditing of electronic health information access or use.
  524. Potash, Marc; Gowda, Preetham, Systems and methods of verifying an authenticated document biosignature.
  525. Meehan, Michael C., Systems and/or methods for distributed data archiving amongst a plurality of networked computing devices.
  526. Lee, Michael M., Systems, methods and apparatus for providing unread message alerts.
  527. Hashim, Safaa H., Techniques for arranging views and navigating in a web-centric insurance management system.
  528. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of device data traffic to initiating end-user application.
  529. Raleigh, Gregory G.; Green, Jeffrey; Lavine, James; Nguyen, Vien-Phuong, Techniques for attribution of mobile device data traffic to initiating end-user application.
  530. Hashim, Safaa H., Techniques for ensuring data security among participants in a web-centric insurance management system.
  531. Hodge, Stephen Lee, Telecommunication call management and monitoring system.
  532. Hodge, Stephen Lee, Telecommunication call management and monitoring system using wearable device with radio frequency identification (RFID).
  533. Hodge, Stephen L., Telecommunication call management and monitoring system with voiceprint verification.
  534. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  535. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  536. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  537. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  538. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  539. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  540. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  541. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  542. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  543. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  544. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  545. Hodge, Stephen Lee, Telecommunication call management and monitoring system with voiceprint verification.
  546. Kaundinya, Murali P.; Santelli, John C.; Clemens, Christopher D.; Slaymaker, Sorell B.; Singh, Rahul; Kunani, Srinivas, Telehealth scheduling and communications network.
  547. Hammad, Ayman; Faith, Patrick, Terminal data encryption.
  548. Hammad, Ayman; Faith, Patrick, Terminal data encryption.
  549. Chen, Hu-Mu, Tolerant key verification method.
  550. Sriram, Srinivasan; Manian, Zaki N, Tracking unitization occurring in a supply chain.
  551. Sriram, Srinivasan; Manian, Zaki N, Tracking unitization occurring in a supply chain.
  552. Shen, Shizhe; Maguire, Yael; Kowalewski, Damian; Passichenko, Viktor Vladimirovich, Training image adjustment preferences.
  553. Hahn-Carlson, Dean W.; Beck, Elizabeth A.; Suits, David A., Transaction accounting auditing approach and system therefor.
  554. Hahn-Carlson, Dean W., Transaction finance processing system and approach.
  555. Hahn-Carlson, Dean W., Transaction processing with core and distributor processor implementations.
  556. Hahn-Carlson, Dean W., Transaction processing with core and distributor processor implementations.
  557. Clark, Michael R; Hopkinson, Kenneth M, Transferable multiparty computation.
  558. Griffin, Jr., Donald H., Transferring a document.
  559. Warman, Leon; Tribble, Eric D.; Pearson, Malcolm, Transport high availability.
  560. Riise, Soren; Patel, Devesh; Burgess, David Anthony, Trusted third party clearing house for lead tracking.
  561. Oho, Masahiro; Higashi, Akio; Inoue, Mitsuhiro, Unit-to-unit data exchange system, and unit, exchange completion data keeping device and program for use in the same.
  562. Warman, Leon; Pearson, Malcolm E.; Kuznetsov, Andrei; Waddoups, Nathan F.; Tribble, Eric D., Updating configuration information to a perimeter network.
  563. Li, Jun; Swaminathan, Ram; Singhal, Sharad, Validating a metadata tree using a metadata integrity validator.
  564. Hahn-Carlson, Dean W., Validation approach for auditing a vendor-based transaction.
  565. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  566. Raleigh, Gregory G., Verifiable and accurate service usage monitoring for intermediate networking devices.
  567. Raleigh, Gregory G, Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  568. Raleigh, Gregory G, Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  569. Raleigh, Gregory G., Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account.
  570. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  571. Raleigh, Gregory G., Verifiable service policy implementation for intermediate networking devices.
  572. Raleigh, Gregory G.; Lavine, James, Virtualized policy and charging system.
  573. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless device applying different background data traffic policies to different device applications.
  574. Raleigh, Gregory G., Wireless device with application data flow tagging and network stack-implemented network access policy.
  575. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with application program interface to allow applications to access application-specific aspects of a wireless network access policy.
  576. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to roaming wireless data service.
  577. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list and applying foreground classification to wireless data service.
  578. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  579. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list applicable to one of several wireless modems.
  580. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differential traffic control policy list having limited user control.
  581. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access and access status for background and foreground device applications.
  582. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access for background and foreground device applications.
  583. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access selectively applied to different applications.
  584. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with differentiated network access status for different device applications.
  585. Raleigh, Gregory G.; Lavine, James; Green, Jeffrey; Raissinia, Alireza, Wireless end-user device with divided user space/kernel space traffic policy system.
  586. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with network traffic API to indicate unavailability of roaming wireless connection to background applications.
  587. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with per-application data limit and traffic control policy list limiting background application traffic.
  588. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based aggregation of network activity requested by applications.
  589. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with policy-based controls for WWAN network usage and modem state changes requested by specific applications.
  590. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with power-control-state-based wireless network access policy for background applications.
  591. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with secure network-provided differential traffic control policy list.
  592. Raleigh, Gregory G.; Raissinia, Alireza; Green, Jeffrey, Wireless end-user device with wireless data attribution to multiple personas.
  593. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless end-user device with wireless modem power state control policy for background applications.
  594. Raleigh, Gregory G.; Lavine, James; Raissinia, Alireza, Wireless network service interfaces.
  595. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Wireless network service interfaces.
  596. Raleigh, Gregory G.; Raissinia, Alireza; Lavine, James, Wireless network service interfaces.
  597. Gaskill, Robert; Gryzwa, Mark; LaLonde, John; Hoyme, Kenneth; Mass, William; Johnson, David C.; Barton, Mike, Wireless patient communicator employing security information management.
  598. Mass, William R.; LaLonde, John; Barton, Michael W., Wireless patient communicator for use in a life critical network.
  599. Mass, William; LaLonde, John; Barton, Mike, Wireless patient communicator for use in a life critical network.
  600. Labrou, Yannis; Ji, Lusheng; Agre, Jonathan Russell; Molina Terriza, Jesus; Chen, Wei-lun, Wireless wallet.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로