$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Identity based service system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
  • G06F-007/02
  • G06F-007/58
  • G06F-015/16
  • G06F-017/30
  • G06K-009/00
  • G06K-019/00
  • H04L-009/32
  • G06F-012/00
  • G06F-012/14
  • G06F-013/00
  • G06Q-099/00
  • H04K-001/00
  • H04L-009/00
출원번호 US-0678910 (2003-10-02)
등록번호 US-7290278 (2007-10-30)
발명자 / 주소
  • Cahill,Conor P.
  • Wexelblat,David Eli
  • Aoki,Norihiro Edwin
  • Carriere,Jeromy
  • Roskind,James
  • Toomey,Christopher Newell
출원인 / 주소
  • AOL LLC, a Delaware limited liability company
대리인 / 주소
    Glenn Patent Group
인용정보 피인용 횟수 : 44  인용 특허 : 339

초록

An identity based service system is provided, in which an identity is created and managed for a user or principal, such that at least a portion of the identity is available to use between one or more system entities. A discovery service enables a system entity to discover a service descriptor, given

대표청구항

What is claimed is: 1. A system, comprising: a device; at least one first entity associated with the device, the first entity comprising any of a user, a user agent and a principal; a first user identifier in a first namespace associated with the first entity, the first user identifier comprising a

이 특허에 인용된 특허 (339)

  1. Abadi Martin (Palo Alto CA) Burrows Michael (Menlo Park CA) Wobber Edward P. (Menlo Park CA), Access control subsystem and method for distributed computer system using compound principals.
  2. Camp Linda Jean ; Tygar Justin D. ; Harkavy Michael R., Anonymous certified delivery.
  3. Davis Derek L., Apparatus and method for a vetted field upgrade.
  4. Durham Peter Emmanuel, Apparatus and method for optimizing client-state data storage.
  5. Alegre Alfred A. ; Sha Rong Q. ; Soley William R., Apparatus and method for providing trusted network security.
  6. Rosenberg Jonathan ; Gandhi Munish ; Werth Andrew, Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state.
  7. Serbinis M. Michael,CAX ; Chrapko Evan V,CAX, Apparatus and methods for use of access tokens in an internet document management system.
  8. Bhatia Rajiv ; Stypko Gregory H. ; Zhang Siuling C., Apparatus and methods for use therein for an ISDN LAN modem that displays fault information to local hosts through interception of host DNS request messages.
  9. Bhatia Rajiv ; Zhang Siuling C., Apparatus and methods for use therein for an ISDN LAN modem that selects among a plurality of DNS servers for responding to a DNS query.
  10. Fieres Helmut ; Merkling Roger ; Klemba Keith, Application certification for an international cryptography framework.
  11. Schanze Martin Lee, Asynchronous message system for menu-assisted resource control program.
  12. Tran Trung M., Auditing login activity in a distributed computing environment.
  13. Buhle Gordon ; Wessman Richard R., Authentication and authorization in a multi-tier relational database management system.
  14. Novicov Aleksey ; Rivlin John Michael ; Conboy Garth ; Sachs James, Authentication for information exchange over a communication network.
  15. Yatsukawa Naonobu,JPX, Authentication system using authentication information valid one-time.
  16. Wang Edward Yan-Bing ; Dean Dawson F. ; Chen Ling Tony ; Klemets Anders Edgar ; Chaddha Navin, Authentication systems, methods, and computer program products.
  17. Dean Dawson F. ; Wang Edward Yan-Bing ; Chen Ling Tony ; Klemets Anders Edgar ; Chaddha Navin, Authorization systems, methods, and computer program products.
  18. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  19. Wanderski, Michael C.; Wesley, Ajamu A., Automated creation of an XML dialect and dynamic generation of a corresponding DTD.
  20. Hoekstra Matthew, Automatic web site registration with multiple search engines.
  21. Goodwin Richard Glenn ; Farrar Michael Andrew ; Messina Marvin ; Steele Jason, Automatically generated objects within extensible object frameworks and links to enterprise resources.
  22. Fielder Guy L ; Alito Paul N, Bilateral authentication and information encryption token system and method.
  23. Michel K. Bowman-Amuah, Building techniques in a development architecture framework.
  24. Fen-Chung Kung ; Jesse Eugene Russell ; Anish Sankalia ; Spencer Wang, Chase me system.
  25. Ahuja Sudhir Raman ; Karaul Mehmet ; Korilis Ioannis A., Client-side techniques for web server allocation.
  26. Arsalan Haeri ; Eric D. Soneson, Communicating network information using universal resource locators.
  27. Brandt Marcia Lynn ; Brown Kenneth Edgar ; Dykes Pernell James ; Lindberg Erik Duane ; Olson Diane Elaine ; Selden Jeffrey Edward ; Snyder Devon Daniel ; Walts James Orrin, Computer apparatus and method for providing a common user interface for software applications accessed via the world-wid.
  28. Paone Luciano F., Computer implemented secret object key block cipher encryption and digital signature device and method.
  29. Shostack Adam ; Allouch David,ILX, Computer security.
  30. Kappel George T., Computer system and method for securely formatting and mapping data for internet web sites.
  31. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  32. Drummond Shattuck Reed ; Peter Earnshaw Heymann ; Steven Mark Mushero ; Kevin Benard Jones ; Jeffrey Todd Oberlander ; Dan Banay, Computer-based communication system and method using metadata defining a control-structure.
  33. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  34. Simon Robert Walmsley AU; Paul Lapstun AU, Consumable authentication protocol and system.
  35. Schell Roger R. ; Kingdon Kevin W. ; Berson Thomas A., Controlled modular cryptography apparatus and method.
  36. Cohen Richard Jay ; Forsberg Richard Allen ; Kallfelz ; Jr. Paul A. ; Meckstroth John Robert ; Pascoe Christopher James ; Snow-Weaver Andrea Lynn, Coordinating user target logons in a single sign-on (SSO) environment.
  37. Davidson Harold R. ; Penn Derek, Creating and configuring component-based applications using a text-based descriptive attribute grammar.
  38. Klemba Keith ; Merkling Roger, Cryptographic unit touch point logic.
  39. Kenneth R. Brown ; John D'Onofrio ; James Ellerbee ; Jay Gould ; Jennifer Holme ; Peter J. Lupario ; Umesh Marthi, Customer access solutions architecture.
  40. Niall G McGee GB, Data access control.
  41. Naphtali Rishe, Data extractor.
  42. Miller Karl Eric ; Lang Gary James, Data packet routing scheduler and method for routing data packets on a common bus.
  43. Dinwiddie ; Jr. John M. (West Palm Beach FL) Freeman Bobby J. (Boynton Beach FL) Grice Lonnie E. (Boca Raton FL) Loffredo John M. (Deerfield Beach FL) Sanderson Kenneth R. (West Palm Beach FL) Suarez, Data processing system with system resource management for itself and for an associated alien processor.
  44. Dieter Gawlick ; Samuel Defazio ; Pankaj Tandon, Database having an integrated transformation engine using pickling and unpickling of data.
  45. Michel K. Bowman-Amuah, Delivering service to a client via a locally addressable interface.
  46. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  47. David S. Schneider ; Michael B. Ribet ; Laurence R. Lipstone ; Daniel Jensen, Distributed administration of access to information.
  48. Shi Shaw-Ben ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shrader Theodore Jack London, Distributed file system web server user authentication with cookies.
  49. Boss Jerome D. ; Marcjan Cezary ; Su Fei, Distributed internet user experience monitoring system.
  50. Fisher Bart Lee ; Angal Rajeev ; Allavarpu Sai V. S., Distributed system and method for providing SQL access to management information in a secure distributed network.
  51. Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Domain communications server.
  52. Fieres Helmut ; Merckling Roger ; Klemba Keith, Dynamic classes of service for an international cryptography framework.
  53. Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Dynamic client registry apparatus and method.
  54. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan, Dynamic creation of a user account in a client following authentication from a non-native server domain.
  55. Michael Olivier, Dynamically matching users for group communications based on a threshold degree of matching of sender and recipient predetermined acceptance criteria.
  56. Unger Jay ; Fuller Glen, Efficient method for compressing, storing, searching and transmitting natural language text.
  57. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  58. Sasmazel Levent M D ; Schneider David H., Electronic ticketing, authentication and/or authorization security system for internet applications.
  59. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  60. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  61. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  62. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  63. Shambroom W. David, Enhanced security for applications employing downloadable executable content.
  64. Hoffert Eric M. ; Cremin Karl ; Degen Leo, Evaluation of media content in media files.
  65. Michel K. Bowman-Amuah, Exception response table in environment services patterns.
  66. Schanze Martin Lee, Expedited message control for synchronous response in a Kerberos domain.
  67. Motoyama Takeshi,JPX, Financial information intermediary system.
  68. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  69. Ishii Toshinao,JPX, Floating robot.
  70. Leighton F. Thomson ; Lewin Daniel M., Global hosting system.
  71. Reiche Albert,CAX, HTTP distributed remote user authentication system.
  72. Kramer Glenn A. ; Vogel Mark B., Hierarchical models of consumer attributes for targeting content in a privacy-preserving manner.
  73. Fieres Helmut,DEX ; Merckling Roger ; Klemba Keith, Host system elements for an international cryptography framework.
  74. Voit Eric A. ; Balkovich Edward E. ; Farris Robert D. ; Goodman William D. ; Gadre Jayant G. ; White Patrick E. ; Young David E., Inbound gateway authorization processing for inter-carrier internet telephony.
  75. Herbert P. Sutter CA, Independent distributed database system.
  76. Hoffert Eric M. ; Cremin Karl ; Ali Adnan,CAX ; Smoot Stephen R., Indexing of media content on a network.
  77. Hoffert Eric M. ; Cremin Karl ; Ali Adnan,CAX ; Smoot Stephen R., Indexing of media content on a network.
  78. Itabashi Tatsuo,JPX ; Yoshida Kimiyoshi,JPX, Information processing apparatus, information processing method, and transmitting medium.
  79. Michel K. Bowman-Amuah, Information services patterns in a netcentric environment.
  80. Donoho David Leigh ; Hindawi David Salim ; Lippincott Lisa Ellen, Inspector for computed relevance messaging.
  81. Ajit Kumar Gupta ; Richard David Day ; Eric Sven-Johan Swildens, Integrated point of presence server network.
  82. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  83. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  84. Wayne J. Munguia ; Robert A. Pfister ; Charles A. Suscheck, Integrated proxy interface for web based telecommunications network management.
  85. Skinner Brian ; Turk Andy Kittridge ; McDonnell Kevin ; Yang Chiaming ; McDonnell Vanessa, Integrated three-tier application framework with automated class and table generation.
  86. Gutman Andrew Mark ; Sitaraman Aravind ; Sthothra Bhasham Sampath Kumar ; Suryanarayanan Kalpathi S., Integration of authentication authorization and accounting service and proxy service.
  87. Girish Rai ; Philip M. Parsons ; Mooi Chuah, Inter-working function selection system in a network.
  88. Klemba Keith S. (Santa Clara CA) Merckling Roger (Gieres FRX), International cryptography framework.
  89. Klemba Keith S. ; Merckling Roger,FRX, International cryptography framework.
  90. Gressel Carmi David,ILX ; Dror Itai,ILX, Internationally regulated system for one to one cryptographic communications with national sovereignty without key escr.
  91. Charles Glommen ; Blaise Barrelet, Internet website traffic flow analysis.
  92. David Montville ; Adam Montville, Interoperable full-featured web-based and client-side e-mail system.
  93. Craig H. Rowland, Intrusion detection system.
  94. Tania Trinh Ly, Kerberos command structure and method for enabling specialized Kerbero service requests.
  95. Tania Trinh Ly, Kerberos interface enabling menu-assisted resource control program to recognize kerberos commands.
  96. Swift Michael M., Least privilege via restricted tokens.
  97. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Logon certification.
  98. Shyam Sundar Sarkar, METHOD AND APPARATUS FOR PROCESSING MARKUP LANGUAGE SPECIFICATIONS FOR DATA AND METADATA USED INSIDE MULTIPLE RELATED INTERNET DOCUMENTS TO NAVIGATE, QUERY AND MANIPULATE INFORMATION FROM A PLURALITY.
  99. Moreh, Jahanshah; Olkin, Terry Michael; Bruns, Logan O'Sullivan; Perrin, Trevor Scott, METHOD AND SYSTEM OF FEDERATED AUTHENTICATION SERVICE FOR INTERACTING BETWEEN AGENT AND CLIENT AND COMMUNICATING WITH OTHER COMPONENTS OF THE SYSTEM TO CHOOSE AN APPROPRIATE MECHANISM FOR THE SUBJECT.
  100. Dutcher David Paul ; Lenharth Scott Alan ; Smith Stanley Alan ; Hughes Patrick Alan ; Elswick Paul Blair, Managing a dynamically-created user account in a client following authentication from a non-native server domain.
  101. Schanze Martin Lee, Message control system for managing message response in a kerberos environment.
  102. Dan A. Teibel, Method and apparatus for a buddy list.
  103. Rajendra Datar ; Daniel F. Hurley ; Vishwa Prasad ; Earle H. West, Method and apparatus for authenticating participants in electronic commerce.
  104. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  105. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  106. Kingdon Kevin, Method and apparatus for authentication of client server communication.
  107. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  108. Pennell, Mark E.; Martin, Anthony, Method and apparatus for automatic form filling.
  109. Wright Jimmy J. (West Jordan UT), Method and apparatus for calculating message signatures in advance.
  110. Gilbert Jeremy H. (Billerica MA), Method and apparatus for capturing the presentation of an interactive user session, monitoring, replaying and joining se.
  111. Blaze Matthew A. ; Feigenbaum Joan ; Strauss Martin J, Method and apparatus for compliance checking in a trust management system.
  112. Donoho David Leigh ; Hindawi David Salim ; Lippincott Lisa Ellen, Method and apparatus for computed relevance messaging.
  113. Glenn C. Langford CA; Ronald J. Vandergeest CA, Method and apparatus for controlling application access to limited access based data.
  114. Crandall Richard E., Method and apparatus for digital signature authentication.
  115. Crandall Richard E., Method and apparatus for digital signature authentication.
  116. Crandall Richard E., Method and apparatus for digital signature authentication.
  117. Crandall Richard E. (Redwood City CA), Method and apparatus for digital signature authentication.
  118. Rich Bruce Arland ; Shrader Theodore Jack London ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rosiles Mickella Ann ; Shi Shaw-Ben ; Burnett Rodney Carl, Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure acces.
  119. Klemba Keith ; Merkling Roger ; Fieres Helmut, Method and apparatus for enforcing the use of cryptography in an international cryptography framework.
  120. Jay S. Walker ; Bruce Schneier, Method and apparatus for executing cryptographically-enabled letters of credit.
  121. Carino ; Jr. Felipe ; Sterling Warren M. ; Rollins Anthony L., Method and apparatus for extending a database management system to operate with diverse object servers.
  122. Jones William Phillip ; Kaufmann Arthur F. ; Luck Colin ; Saukkonen Jukka I., Method and apparatus for extending a relational database management system using a federated coordinator.
  123. Carino ; Jr. Felipe ; Sterling Warren M., Method and apparatus for extending existing database management system for new data types.
  124. Crandall Richard E. ; Garst Blaine, Method and apparatus for fast elliptic encryption with direct embedding.
  125. Ram Subbaroyan ; Yongdong Wang ; Paul Andre Gauthier ; Douglas Michael Cook ; Douglass Russell Judd, Method and apparatus for identifying spoof documents.
  126. Robert Pang ; Jim Stabile, Method and apparatus for implementing an extensible authentication mechanism in a web application server.
  127. Jacobs Lawrence ; Adunuthula Seshu ; Anand Mala, Method and apparatus for incorporating state information into a URL.
  128. Jones William Phillip (Weldon CA) Kaufmann Arthur F. (Los Angeles CA) Luck Colin (El Segundo CA) Saukkonen Jukka I. (San Diego CA), Method and apparatus for managing shared data using a data surrogate and obtaining cost parameters from a data dictionar.
  129. Sutcliffe Andrew B ; Dunn Kevin A., Method and apparatus for matching registered profiles.
  130. Sutcliffe Andrew B. ; Dunn Kevin A., Method and apparatus for matching registered profiles.
  131. Carloganu Marius M.,FRX ; Sheets John F., Method and apparatus for operating resources under control of a security module or other secure processor.
  132. Carino ; Jr. Felipe, Method and apparatus for parallel execution of user-defined functions in an object-relational database management system.
  133. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for password based authentication in a distributed system.
  134. Jacobs Lawrence ; Adunuthula Seshu ; Anand Mala, Method and apparatus for performing transactions in a stateless web environment which supports a declarative paradigm.
  135. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  136. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  137. Limsico Carl, Method and apparatus for providing a secure remote password graphic interface.
  138. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  139. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  140. Carino ; Jr. Felipe ; Rollins Anthony L., Method and apparatus for providing database information to non-requesting clients.
  141. Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Shi Shaw-Ben ; Shrader Theodore Jack London, Method and apparatus for providing persistent fault-tolerant proxy login to a web-based distributed file service.
  142. Carino ; Jr. Felipe ; Rollins Anthony L., Method and apparatus for providing shared data to a requesting client.
  143. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  144. Kirsch Steven T. ; Lindblad Christopher J., Method and apparatus for redirection of server external hyper-link references.
  145. Andersen David B., Method and apparatus for remote network access logging and reporting.
  146. Kimmel David E. ; Byrne ; Jr. James T. ; Jones ; Jr. Donald R. ; Dobois Ronald, Method and apparatus for remotely monitoring a site.
  147. Grimmer Francine Gail, Method and apparatus for retrieving X.509 certificates from an X.500 directory.
  148. Franklin Matthew Keith ; Malkhi Dahlia, Method and apparatus for secure and auditable metering over a communications network.
  149. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  150. Welter Peter J. ; Meier John R., Method and apparatus for testing web sites.
  151. Andersen David B. ; Brandewie Dirk J., Method and apparatus for translating a static identifier including a telephone number into a dynamically assigned networ.
  152. Skopp Peter ; Vitale Benjamin F. ; Marur Vinod R. ; Tse Clifford S.C. ; Dulai Dharmender S., Method and apparatus to determine user identity and limit access to a communications network.
  153. Alcorn Allan E. ; Hale Richard L., Method and apparatus using geographical position and universal time determination means to provide authenticated, secure, on-line communication between remote gaming locations.
  154. Dare Timothy S. (Damascus MD) Ek Eric B. (New Market MD) Luckenbaugh Gary L. (Gaithersburg MD), Method and system for authenticating users to multiple computer servers via a single sign-on.
  155. Stephen J. Purpura, Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment.
  156. Walker Jay S. ; Schneier Bruce ; Case T. Scott, Method and system for establishing and maintaining user-controlled anonymous communications.
  157. Walker Jay S. ; Schneier Bruce ; Case T. Scott, Method and system for facilitating an employment search incorporating user-controlled anonymous communications.
  158. Bublitz Hermann R.,DEX ; Hanel Walter,DEX ; Rindtorff Klaus,DEX, Method and system for improving the integrity of data on a smartcard.
  159. Weidong, Kou, Method and system for managing keys for encrypted data.
  160. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Method and system for providing certificates holding authentication and authorization information for users/machines.
  161. Vick,Cornelius V.; Mills,David A., Method and system for providing distributed web server authentication.
  162. John D. W. Brothers, Method and system for redirecting web page requests on a TCP/IP network.
  163. Sixtus Timothy, Method and system for secure online transaction processing.
  164. Guedalia Isaac David,ILX ; Hashkes Jonathan,ILX, Method and system for server access control and tracking.
  165. Kao I-Lung ; Milman Ivan Matthew, Method and system for single sign on using configuration directives with respect to target types.
  166. Angelucci Vincent ; Madaras Stephen, Method and system for the integrated storage and dynamic selective retrieval of text, audio and video data.
  167. Deindl Michael,DEX ; Witzel Martin,DEX, Method and system for the secure transmission and storage of protectable information.
  168. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  169. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  170. Rawat, Jai; Palnitkar, Samir, Method and system of implementing recorded data for automating internet interactions.
  171. Mooi Choo Chuah, Method for admitting new connections based on measured quantities in a multiple access system for communications networks.
  172. Pinkas Denis,FRX, Method for authenticating a user working in a distributed environment in the client/server mode.
  173. Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY), Method for authenticating the identity of a user of an information system.
  174. Dan Eigeles IL, Method for automatic handling of certificate and key-based processes.
  175. Unger Jay ; Leone Paul ; Gegen Pete ; Rauch Thyra, Method for automatically constructing contexts in a hypertext collection.
  176. Garry L. Child ; Theodore Jack London Shrader ; Davis Kent Soper, Method for changing a security policy during processing of a transaction request.
  177. Konno Chisato,JPX ; Kikuchi Katsuro,JPX, Method for controlling a computer system including a plurality of computers and a network processed as a user resource.
  178. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  179. Michael Bradford Ault ; Garry L. Child ; Ernst Robert Plassmann ; Bruce Arland Rich ; Theodore Jack London Shrader ; Davis Kent Soper, Method for enabling a web server running a "closed" native operating system to impersonate a user of a web client to obtain a protected file.
  180. Sasmazel Levent MD ; Schneider David H., Method for issuing a new authenticated electronic ticket based on an expired authenticated ticket and distributed server architecture for using same.
  181. Felciano Ramon M. ; Altman Russ B., Method for monitoring and/or modifying web browsing sessions.
  182. Ingrassia ; Jr. Michael I. ; Shelton James A. ; Rowland Thomas M., Method for monitoring user interactions with web pages from web server using data and command lists for maintaining information visited and issued by participants.
  183. Todd ; Sr. Robert E. ; Glahe Aaron C. ; Pendleton Adam H., Method for network self security assessment.
  184. Smith, Michael D.; Hennings, Eric; McKee, Christine Walpole, Method for preserving referential integrity within web sites.
  185. Lohstroh Shawn R. ; Grawrock David, Method for providing a secure non-reusable one-time password.
  186. Bowman-Amuah Michel K., Method for providing communication services over a computer network system.
  187. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method for providing location certificates.
  188. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  189. Barkan Mordhay,ILX, Method for safe communications.
  190. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  191. Denker John Stewart ; Watkins Christopher J. C. H.,GBX, Method for separately permissioned communication.
  192. Krishnaswamy Sridhar ; Elliott Isaac K. ; Reynolds Tim E. ; Forgy Glen A. ; Solbrig Erin M., Method for video telephony over a hybrid network.
  193. Shaw Andrew,GBX ; Burgess Karl Richard,GBX ; Pullan John Marcus,GBX ; Cartwright Peter Charles,GBX, Method of displaying an application on a variety of client devices in a client/server network.
  194. Bryant Raymond Morris, Method of recording and measuring e-business sessions on the world wide web.
  195. Fung, Daniel Y.; Hood, Brandon C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  196. Herriot Robert G., Method, system, apparatus and article of manufacture for providing identity-based caching services to a plurality of computer systems (#16).
  197. Call Charles Gainor, Methods and apparatus for disseminating product information via the internet using universal product codes.
  198. Charles G. Call, Methods and apparatus for disseminating product information via the internet using universal product codes.
  199. Aviani, Jr., James A.; Cieslak, Martin K.; Kagan, Martin A., Methods and apparatus for redirecting network cache traffic.
  200. Hrastar Scott E. ; Smith George Horkan, Methods for dynamically assigning link addresses and logical network addresses.
  201. Stacy Haitsuka ; Ronald Burr ; Harold MacKenzie ; Marwan Zebian ; Terry Warren ; Shane Blaser, Monitoring of individual internet usage.
  202. Williams Timothy C., Multi-level security network system.
  203. Randall I. Rackson ; Jonathan Adam Krane ; Peter J. Trevisani, Multiple auction coordination method and system.
  204. Cudak Mark Conrad ; Mueller Bruce Dale ; Kelton James Robert ; Classon Brian Keith, Network protocol method, access point device and peripheral devices for providing for an efficient centrally coordinated peer-to-peer wireless communications network.
  205. Robert Conrad Knauerhase ; Michael Man-Hak Tso, Network proxy capable of dynamically selecting a destination device for servicing a client request.
  206. Nickles Alfred E., Network security and integration method and system.
  207. Reardon David C., Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place.
  208. Voit Eric A. ; Balkovich Edward E. ; Farris Robert D. ; Goodman William D. ; Gadre Jayant G. ; White Patrick E. ; Young David E., Network session management with gateway-directory services and authorization control.
  209. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  210. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  211. Gallant John Kenneth, One-number communications system and service integrating wireline/wireless telephone communications systems.
  212. Farber David A. ; Greer Richard E. ; Swart Andrew D. ; Balter James A., Optimized network resource location.
  213. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server.
  214. Yakov Rekhter ; Eric C. Rosen, Peer-model support for virtual private networks with potentially overlapping addresses.
  215. Kung Fen-Chung ; Russell Jesse Eugene ; Walker Hopeton ; Wang Spencer, Personal user network (closed user network) PUN/CUN.
  216. Carino ; Jr. Felipe, Pragma facility and SQL3 extension for optimal parallel UDF execution.
  217. O'Flaherty Kenneth W. ; Stellwagen ; Jr. Richard G. ; Walter Todd A. ; Watts Reid M. ; Ramsey David A. ; Veldhuisen Adriaan W. ; Ozden Renda K., Privacy-enhanced database.
  218. Brands Stefanus A. (Ina Boudier-Bakkerlaan 143 III 3582 XW Utrecht NLX), Privacy-protected transfer of electronic information.
  219. Brands Stefanus A. (Ina Boudier-Bakkerlaan 143 III 3582 XW Utrecht NLX), Privacy-protected transfer of electronic information.
  220. Hartnett William J., Privatization marketplace.
  221. Vallee Luc,FRX ; Petit Stephane,FRX, Process for making a payment using an account manager.
  222. Young,Albert; O'Hara,Bob; Nessett,Danny M.; Tsai,Joe; Chen,BoFu, Protected mutual authentication over an unsecured wireless communication channel.
  223. Dubey, Pradeep; Jutla, Charanjit Singh; Kumar, Vijay; Anand, Ravindran Sai; Ganesan, Prasanna, Protocols for anonymous electronic communication and double-blind transactions.
  224. Steven McCanne ; William C. Destein, Proximity-based redirection system for robust and scalable service-node location in an internetwork.
  225. Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
  226. Slavin Keith R., Public key cryptographic system having differential security levels.
  227. Slavin Keith R., Public key cryptographic system having nested security levels.
  228. Haumont Serge,FIX ; Tikka Mauri,FIX, Re-routing procedure.
  229. Reuven Bakalash IL; Guy Shaked IL; Joseph Caspi IL, Relational database management system having integrated non-relational multi-dimensional data store of aggregated data elements.
  230. David Leigh Donoho ; David Salim Hindawi ; Lisa Ellen Lippincott, Relevance clause for computed relevance messaging.
  231. Johnson Donavon W. (Georgetown TX) Smith Todd A. (Austin TX), Remote authentication and authorization in a distributed data processing system.
  232. Hong Kevin ; Damodar Bhat V,INX ; Narasimhan Sundararajan,INX ; Martenson Dale W. ; Sharma Raghu ; Davis Jeffrey P. ; Johnson Gregory R., Remote communications server system.
  233. Baehr Geoffrey A., Remote device connection to a network.
  234. Jacobs Dwayne C. (Austin TX) Wangler James A. (Cedar Park TX), Remote password administration for a computer network among a plurality of nodes sending a password update message to al.
  235. Hrastar Scott E. ; Smith George Horkan, Router for which a logical network address which is not unique to the gateway address in default routing table entries.
  236. Schutte Mark E. ; Hrastar Scott E., Router which dynamically requests a set of logical network addresses and assigns addresses in the set to hosts connected to the router.
  237. Curry James E. ; Farris Robert D., Secure LAN/internet telephony.
  238. Hauser Ralf Ch.,CHX ; Tsudik Gene, Secure anonymous information exchange in a network.
  239. Kilian Joseph John (Princeton Junction NJ) Sako Kazue (Kawasaki JPX), Secure anonymous message transfer and voting scheme.
  240. Meyers William J. ; Fraioli Marc J. ; Spencer Jon F., Secure computer system.
  241. Haynes ; III Patrick J. ; Friedman Thomas Jay ; Shoupp Douglas Scott ; Mitty Todd Jay ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary.
  242. Mitty Todd Jay ; Shoupp Douglas Scott ; Rolfe Andrew Robert ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary with archive and verification request services.
  243. Grantges ; Jr. David R., Secure gateway having user identification and password authentication.
  244. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  245. Cook, David P., Secure message forwarding system detecting user's preferences including security preferences.
  246. Peters, Matthew Francis, Secure password provision.
  247. Lipner Steven B. (Wellesley MA) Gasser Morrie (Saugus MA) Lampson Butler W. (Cambridge MA), Secure user authentication from personal computer.
  248. Loeb Shoshana K. (Basking Ridge NJ) Yacobi Yacov (Berkeley Heights NJ), Security method for private information delivery and filtering in public networks.
  249. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  250. Golan Gilad,ILX, Security monitor.
  251. He Jingsha ; Hall Randle D., Security system and method for network element access.
  252. Raciborski, Nathan F.; Thompson, Mark R., Selective routing.
  253. Buffam William J., Self-authentication apparatus and method.
  254. Michel K. Bowman-Amuah, Self-described stream in a communication services patterns environment.
  255. Kramer Glenn A. ; Weber Jay C., Settlement of aggregated electronic transactions over a network.
  256. Yakov Rekhter ; Eric C. Rosen, Shared communications network employing virtual-private-network identifiers.
  257. Gary Herman ; Theodore Charles Goldstein ; Ronald G. Martinez, Smart electronic receipt system.
  258. Fieres Helmut ; Merckling Roger ; Klemba Keith, Software level touchpoints for an international cryptography frameworks.
  259. Stubblebine Stuart Gerald, Specifying security protocols and policy constraints in distributed systems.
  260. Stubblebine Stuart Gerald, Specifying security protocols and policy constraints in distributed systems.
  261. Garodnick Joseph, Spread-spectrum communications utilizing variable throughput reduction.
  262. Feinberg Lawrence E., Storing personal medical information.
  263. Lawrence E. Feinberg, Storing personal medical information.
  264. Shigemi Nobuhisa,JPX ; Yamamoto Hiroyuki,JPX ; Tazaki Gengo,JPX ; Yoshioka Makoto,JPX ; Kokubun Mitsuhiro,JPX, Structured data management system and computer-readable recording medium storing structured data management program.
  265. Tam Simon, Subscriber information maintenance system and methods.
  266. Schanze Martin Lee, Synchronous message control system in a Kerberos domain.
  267. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  268. Sheth Amit ; Avant David ; Bertram Clemens, System and method for creating a semantic web and its applications in browsing, searching, profiling, personalization and advertising.
  269. Navarre Gloria Jean ; de Haan Jakob, System and method for executing a request from a client application.
  270. Abadi Martin ; Bharat Krishna ; Marais Johannes, System and method for generating unique passwords.
  271. O'Flaherty Kenneth W. ; Stellwagen ; Jr. Richard G. ; Walter Todd A. ; Watts Reid M. ; Ramsey David A. ; Veldhuisen Adriaan W. ; Ozden Renda K. ; Dempster Patric B., System and method for managing data privacy in a database management system.
  272. Laslo Olah ; Ferenc Friedler ; Zoltan Kovacs HU, System and method for monitoring computer usage.
  273. Cheng Pau-Chen (Yorktown Heights NY) Luan Shyh-Wei (San Jose CA), System and method for policy-based inter-realm authentication within a distributed processing system.
  274. Henry,Paul S.; Luo,Hui, System and method for providing access to multiple user accounts via a common password.
  275. Gabber Eran ; Gibbons Phillip P. ; Matias Yossi ; Mayer Alain J., System and method for providing anonymous personalized browsing by a proxy system in a network.
  276. Birgit Baum-Waidner CH, System and method for providing commitment security among users in a computer network.
  277. Frederick S. M. Herz, System and method for providing customized electronic newspapers and target advertisements.
  278. Isaac K. Elliott ; Tim E. Reynolds ; Sridhar Krishnaswamy, System and method for providing requested quality of service in a hybrid network.
  279. Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
  280. Dustan Robert Frederick,CAX ; Vieira Dirk A.,CAX, System and method for securely accessing information from disparate data sources through a network.
  281. Shuping David T. ; Johnson William R., System and method for web browsing.
  282. John E. Brezak, Jr. ; Richard B. Ward ; Michael M. Swift ; Paul J. Leach, System and method of user logon in combination with user authentication for network access.
  283. Eran Leshem IL; Amir Weinberg IL, System and methods for facilitating the viewing and analysis of web site usage data.
  284. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  285. Herz Frederick S. M., System for customized electronic identification of desirable objects.
  286. Michael Man-Hak Tso ; Thomas G. Willis ; John W. Richardson ; Robert Conrad Knauerhase ; Damien Macielinski, System for dynamically transcoding data transmitted between computers.
  287. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
  288. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
  289. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  290. Shambroom W. David, System for providing secure remote command execution network.
  291. David Grawrock ; Shawn R. Lohstroh, System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record.
  292. Grawrock David ; Lohstroh Shawn R., System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record.
  293. Silverbrook Kia,AUX ; Walmsley Simon Robert,AUX, System for the manipulation of secure data.
  294. Linnartz Johan P. M. G.,NLX, System for transferring content information and supplemental information relating thereto.
  295. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  296. Eager Timothy ; Anand Madhav ; Aslanian Edouard, System to transition an enterprise to a distributed infrastructure.
  297. Gonen Fink IL; Amir Harush IL, System, device and method for rapid packet filtering and processing.
  298. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser.
  299. Bowman-Amuah Michel K., System, method and article of manufacture for a globally addressable interface in a communication services patterns environment.
  300. Bowman-Amuah Michel K., System, method and article of manufacture for configuration management in a development architecture framework.
  301. Bahreman Ali Reza, System, method and article of manufacture for dynamic negotiation of a network payment framework.
  302. Haller Daniel R. ; Nguyen Trong, System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing.
  303. Michel K. Bowman-Amuah, System, method and article of manufacture for managing an environment of a development architecture framework.
  304. Haller Daniel R. ; Nguyen Trong ; Rowney Kevin T. B. ; Berger David A. ; Kramer Glenn A., System, method and article of manufacture for managing transactions in a high availability system.
  305. Weber Jay C., System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensi.
  306. Rowney Kevin T. B. ; Chen Yuhua, System, method and article of manufacture for secure digital certification of electronic commerce.
  307. Rowney Kevin Thomas Bartholomew ; Nadig Deepak S., System, method and article of manufacture for secure network electronic payment and credit collection.
  308. Bowman-Amuah Michel K., System, method and article of manufacture for security management in a development architecture framework.
  309. Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
  310. Michel K. Bowman-Amuah, System, method, and article of manufacture for environment services patterns in a netcentic environment.
  311. David D. Kloba ; Michael R. Gray ; David M. Moore ; Thomas E. Whittaker ; David J. Williams ; Rafael Z. Weinstein ; Joshua E. Freeman ; Linus M. Upson, System, method, and computer program product for synchronizing content between a server and a client based on state information.
  312. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  313. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  314. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  315. Deborah Sterling CA, Systems and methods for virtual population mutual relationship management using electronic computer driven networks.
  316. White John Gregg, Systems, methods and computer program products for authorizing common gateway interface application requests.
  317. O'Connor William Y. ; Stanford Donald L. ; Khan Tariq M. ; Hutton Michael A. ; Beason Steve W. ; Angell Robert C., Technique for secure network transactions.
  318. Pearson Mark P., Three tier financial transaction system with cache memory.
  319. Koneru Sudheer ; Tuchen Michael H., Tracking a user across both secure and non-secure areas on the Internet, wherein the users is initially tracked using a.
  320. Goldfine Milton (201 Ootsima Way Loudon TN 37774) Perlman Marvin (11000 Dempsey Ave. Granada Hills CA 91344) Montgomery Robert A. (306 Chuniloti Cir. Loudon TN 37774-2607), Transaction authentication using a centrally generated transaction identifier.
  321. Joao Raymond Anthony ; Bock Robert Richard, Transaction security apparatus and method.
  322. Wenbo Mao GB, Transmitting messages over a network.
  323. Theodore C. Goldstein ; Ronald G. Martinez ; Paul Rubin, Trusted agent for electronic commerce.
  324. Griffin Claire ; Barnes Douglas, Trusted delegation system.
  325. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  326. Gibbs Benjamin K. ; Roeder G. R. Konrad, Unique digital signature.
  327. Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Universal domain routing and publication control system.
  328. Primeaux David ; Sundar Doraiswamy ; Robinson ; Jr. Willard L., Usage pattern based user authenticator.
  329. Glitho Roch,CAX ; Leduc Francois,CAX ; Crowe Thomas,IEX ; Hogberg Lena,SEX, Use of web technology for subscriber management activities.
  330. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan, User authentication from non-native server domains in a computer network.
  331. Haverty Rand,CAX, User authentification using a virtual private key.
  332. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  333. Perlman Radia, User presence verification with single password across applications.
  334. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan ; Spooner Courtney Joseph, User profile storage on and retrieval from a non-native server domain for use in a client running a native operating system.
  335. Chadha Atul ; Iyer Balakrishna Raghavendra ; Rajamani Karthick, Using object relational extensions for mining association rules.
  336. Robert Carl Barrett ; Paul Philip Maglio, Web places.
  337. Bhatia Rajiv, Web server for use in a LAN modem.
  338. Shrader Theodore Jack London ; Cohen Richard Jay, Web-based DCE management.
  339. Bob Rosenschein IL; Jeff Schneiderman IL; Daniel Brief IL; Naama Bamberger IL; Gil Reich IL; Uri Bernstein IL; Tamar Rosen IL; Asher Szmulewicz IL, Web-based information retrieval responsive to displayed word identified by a text-grabbing algorithm.

이 특허를 인용한 특허 (44)

  1. Moussavian, Negeen; Moussavian, Amir; Badiee, Ben; Lewis, Mark, Agreement compliance controlled electronic device throttle.
  2. Moussavian, Negeen; Moussavian, Amir; Badiee, Ben; Lewis, Mark, Agreement compliance controlled information throttle.
  3. Walters, Patricia Lynn; Cole, Steven Scott, Closed-loop testing of integrated circuit card payment terminals.
  4. Appelbaum, Michael S.; Garvett, Jeffrey H., Data event processing and application integration in a network.
  5. Moussavian, Negeen; Moussavian, Amir; Badiee, Ben; Lewis, III, Mark, Data mining system for agreement compliance controlled information throttle.
  6. Rouskov, Yordan; Guo, Michael; Chen, Rui; Young, Kyle, Delegated authentication for web services.
  7. Crume, Jeffery L., Detecting and defending against man-in-the-middle attacks.
  8. Crume, Jeffrey L., Detecting and defending against man-in-the-middle attacks.
  9. Bravo, Jose F.; Crume, Jeffery L., Detecting man-in-the-middle attacks in electronic transactions using prompts.
  10. Levenberg, Richard, Dynamic user authentication for access to online services.
  11. Islam, Junaid; McFarlane, John S.; Williams, Carl, IPv6-over-IPv4 architecture.
  12. Hunter, Edward; Moussavian, Negeen; Moussavian, Amir; Lewis, Mark, Information throttle based on compliance with electronic communication rules.
  13. Nicholls, Jonathan; Hunter, Edward; Moussavian, Negeen; Moussavian, Amir; Lewis, Mark, Information throttle that enforces policies for workplace use of electronic devices.
  14. Hinton, Heather Maria; Milman, Ivan Matthew; Raghavan, Venkat; Weeden, Shane Bradley, Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment.
  15. Monjas Llorente, Miguel Angel; Valenzuela, Carolina Canales, Method to enhance principal referencing in identity-based scenarios.
  16. Grosse, Eric Henry; Zandy, Victor C, Methods and apparatus for authenticating a remote service to another service on behalf of a user.
  17. Bravo, Jose F.; Crume, Jeffery L., Mobile phone and IP address correlation service.
  18. Moussavian, Negeen; Moussavian, Amir; Lewis, Mark; Duke, III, Godfrey Lawrence, Partial information throttle based on compliance with an agreement.
  19. Abelow, Daniel H., Reality alternate.
  20. Badiee, Ben; Moussavian, Amir; Lewis, Mark, Schedule and location responsive agreement compliance controlled device throttle.
  21. Badiee, Ben; Moussavian, Amir; Lewis, Mark, Schedule and location responsive agreement compliance controlled information throttle.
  22. Badiee, Ben; Moussavian, Amir; Lewis, Mark, Schedule and location responsive agreement compliance controlled information throttle.
  23. Casey, Brandon J.; Cressall, Erik, Secure communication between trusted parties.
  24. Shin, Dong-kyoo; Shin, Dong-il; Jeong, Jong-il, Single-sign-on method based on markup language and system using the method.
  25. Julia, Luc E.; Behrens, James; Le Nerriec, Yohan, System and method for delivering content to users on a network.
  26. Julia, Luc; Behrens, James; Le Nerriec, Johan, System and method for delivering content to users on a network.
  27. Julia, Luc; Behrens, James; Le Nerriec, Johan, System and method for delivering content to users on a network.
  28. Julia, Luc; Behrens, James; Le Nerriec, Johan, System and method for delivering content to users on a network.
  29. Julia, Luc; Le Nerriec, Yohan; Dubreuil, Jerome; Costello, Joe, System and method for delivering content to users on a network.
  30. Fay, Sean; Chess, Brian, System and method for importing heterogeneous hashed passwords.
  31. Munyon, Paul J.; Munyon, Gay L., System and method for inhibiting access to a computer.
  32. Ibrahim, Mamdouh; Ramanathan, Sri; Som, Tapas K.; Trevathan, Matthew B., System and method to support identity theft protection as part of a distributed service oriented ecosystem.
  33. Ibrahim, Mamdouh; Ramanathan, Sri; Som, Tapas K.; Trevathan, Matthew B., System and method to support identity theft protection as part of a distributed service oriented ecosystem.
  34. Caldera, Jose, Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud.
  35. Caldera, Jose, Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud.
  36. Caldera, Jose, Systems and methods for sanction screening.
  37. Caldera, Jose; Sherlock, Kieran; Reiter, Neal Jared, Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph.
  38. Caldera, Jose; Sherlock, Kieran; Anderson, Safyre Nirvana; Tang, Bin, Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score.
  39. Caldera, Jose; Sherlock, Kieran; Gafke, Garrett, Systems and methods to authenticate users and/or control access made by users on a computer network using identity services.
  40. Brown, William A.; Meuninck, Troy, Systems and methods to make a resource available via a local network.
  41. Kolkowitz, Dan; Elgamal, Taher; Sherlock, Kieran Gerard, Transaction assessment and/or authentication.
  42. Bravo, Jose F.; Crume, Jeffery L., Verification of transactional integrity.
  43. Bravo, Jose; Crume, Jeffrey L., Website authentication.
  44. Appelbaum, Michael S.; Garvett, Jeffrey H.; Bradley, Christopher; Ginter, Karl; Bartman, Michael, Workspace system and method for monitoring information events.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로