$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Identifying unauthorized communication systems using a system-specific identifier 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0058338 (2002-01-30)
등록번호 US-7325065 (2008-01-29)
발명자 / 주소
  • Watkins,Robert G.
출원인 / 주소
  • AOL LLC, a Delaware Limited Liability Company
대리인 / 주소
    Fish & Richardson P.C.
인용정보 피인용 횟수 : 9  인용 특허 : 70

초록

An authorized client communication system seeking access to a host communication system may be identified by performing a mathematical computation on a client communication system-specific identifier and an access password. Communications from the client communication system are terminated if the re

대표청구항

What is claimed is: 1. A method for determining whether a client communication system seeking access to a host communication system is authorized to do so, the method comprising: receiving, at the host, from the client communication system, a user-independent client-communication-system-specific id

이 특허에 인용된 특허 (70)

  1. Markowski Dale W. (West Milwaukee WI) Khamharn Oddy N. (Gurnee IL) Bianco Mark E. (Pomona CA), Authentication method for keyless entry system.
  2. Alexander Marc A. ; Feldkamp Gerald B. ; Strathern Bernard R, Automated method for electronic software distribution.
  3. Sprong Katherine A. ; Sprong Donald J., Controlled usage software.
  4. Simon, Daniel R., Controlled-content recoverable blinded certificates.
  5. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  6. Urano Akihiro,JPX ; Hirata Toshiaki,JPX ; Fujino Shuji,JPX ; Morita Shinji ; Yamada Mitsugu,JPX ; Niimura Miki,JPX ; Morikawa Kazuyoshi,JPX ; Miyazaki Satoshi,JPX, Detection method of illegal access to computer system.
  7. Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
  8. Ari Juels, Digital coin tracing using trustee tokens.
  9. Spies Terence R. ; Misra Pradyumna K., Distributed authentication system and method.
  10. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  11. Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
  12. Kikuchi Hiroaki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Torii Naoya (Kawasaki JPX) Hasebe Takayuki (Kawasaki JPX), Enciphered file sharing method.
  13. Otsuka Takao (Atsugi JPX), Facsimile apparatus serving as LAN server on local area network.
  14. Okada Toshiro,JPX ; Igarashi Norihiko,JPX ; Oki Hiroshi,JPX ; Kamata Shinji,JPX ; Hara Takashi,JPX ; Yamazaki Toshiya,JPX, Identifier managing device and method in software distribution system.
  15. Watkins, Robert G.; Wick, Andrew L., Identifying unauthorized communication systems based on their memory contents.
  16. Chacon Guillermo Rudolfo, Integrated wafer fab time standard (machine tact) database.
  17. Grainger, Steven Phillip, Method and apparatus for an intruder detection reporting and response system.
  18. Berry Thomas G. (Schaumburg IL), Method and apparatus for controlling access to a communication system.
  19. Janhila Pertti,FIX, Method and apparatus for controlling the right of use/activating of a mobile station which uses at least two predefined.
  20. Kaufman Charles William (Northboro MA), Method and apparatus for cryptographic authentication.
  21. Staley Clinton A., Method and apparatus for detecting unauthorized copies of software.
  22. Kramer, Gerald Arthur; Whitlow, Eric Scott, Method and apparatus for encouraging timely payments associated with a computer system.
  23. Steinberg Eran, Method and apparatus for in-camera image marking and authentication.
  24. Cole, Gary Philip; Pozdro, John Winans, Method and apparatus for managing distribution of change-controlled data items in a distributed data processing system.
  25. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  26. White Christopher M. ; Matheny John ; Bonnaure Patrick P. ; Perlman Stephen G., Method and apparatus for providing physical security for a user account and providing access to the user's environment a.
  27. Hoffman Mark E. ; Hershey John E., Method and apparatus for providing upgrades in electricity meters.
  28. Peyravian, Mohammad; Zunic, Nevenko, Method and apparatus for secure password transmission and password changes.
  29. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  30. Allahwerdi, Nouri; Hippel?inen, Lassi, Method and arrangement for reliably identifying a user in a computer system.
  31. Obata Masanori,JPX ; Sugiyama Hiroyuki,JPX ; Okukawa Moribumi,JPX ; Okamoto Tatsuaki,JPX, Method and system for depositing private key used in RSA cryptosystem.
  32. Sigaud, Alain, Method enabling secure access by a station to at least one server, and device using same.
  33. Pinkas Denis,FRX, Method for authenticating a user working in a distributed environment in the client/server mode.
  34. Garry L. Child ; Theodore Jack London Shrader ; Davis Kent Soper, Method for changing a security policy during processing of a transaction request.
  35. Swift Michael M. ; Van Dyke Clifford P. ; Misra Pradyumna Kumar, Method for changing passwords on a remote computer.
  36. Kevin Elliott ; Adam Haverson, Method for developing and administering tests over a network.
  37. Wang, Alex C.; Chan, Wai Alan; Lin, Jy-Han; Geiger, Robert L.; Smith, Ronald R.; Wanchoo, Sanjay, Method for enforcing a time limited software license in a mobile communication device.
  38. Tagawa Hiroshi,JPX ; Okamitsu Atsushi,JPX ; Fujimoto Hiroshi,JPX, Method of and system for entering identification codes into vehicle antitheft system.
  39. Nelson,Mark A.; Petreshock,John J., Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords.
  40. Picazo ; Jr. Jose J. ; Lee Paul Kakul ; Zager Robert P., Network packet switch using shared memory for repeating and bridging packets at media rate.
  41. Nguyen Minhtam C. (335 Elan Village La. ; Apt. 217 San Jose CA 95134), Network with secure communications sessions.
  42. Madoukh, Ashraf T., Object-based security system.
  43. Child, Garry Lee; Lin, Dah-Haur; Fichtner, Larry, Open architecture global sign-on apparatus and method therefor.
  44. Guthrie R. Scott ; Waid ; Jr. Charles E., Personal authentication system and method for multiple computer platform.
  45. Segal, Edna; Segal, Alon, Portable cellular phone system having remote voice recognition.
  46. Anderson Milton M., Re-initialization of an iterated hash function secure password system over an insecure network connection.
  47. Brickell, Ernie F., Secure distribution of private keys to multiple clients.
  48. Shida, Katsuhiko; Shibata, Hiroto, Secure order-receiving, designing, manufacturing and delivery system for a packaging medium.
  49. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  50. Dan Linh Nguyen, Security between client and server in a computer network.
  51. Goodman Michael K. (Tustin CA) Noorbehesht Farzad (Aliso Viejo CA) Raasch Charles F. (Lake Forrest CA), Security system for a stand-alone computer.
  52. Kataoka Satoshi,JPX ; Yoshioka Makoto,JPX ; Utsumi Kenichi,JPX ; Murakami Keiichi,JPX, Security system for protecting information stored in portable storage media.
  53. Lewine Donald A., Server for either anonymous or pre-authorized users to order goods or services on the world-wide web computer network.
  54. Cane David A. (Sudbury MA) Hirschman David S. (Sharon MA), Software catalog encoding method and system.
  55. Higgs, Raymond J.; Garmon, Richard W., Software security mechanism.
  56. Braddy Ricky Gene, System and architecture for distributing, monitoring, and managing information requests on a computer network.
  57. Sandhu, Ravi; deSa, Colin; Ganesan, Karuna, System and method for password throttling.
  58. Boe Barbara J. ; Hamrick Julia M. ; Aarant Marjorie L., System and method for profiling customers for targeted marketing.
  59. Jaber, Muhammed, System and method for securing a computer system.
  60. Audebert Yves, System and method for user authentication having clock synchronization.
  61. Hongwei, Yang, System and method of authenticating individuals.
  62. Morisaki Tetsuya (Kawasaki JPX), System and method of detecting unauthorized use of identifiers.
  63. Audebert Yves,FRX, System for controlling access to a function having clock synchronization.
  64. Audebert Yves,FRX, System for controlling access to a function, using a plurality of dynamic encryption variables.
  65. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  66. Gehani Narain H. ; Roome William D., Technique for sharing information on world wide web.
  67. Yacenda Michael W. (Stamford CT) Chaco John (Seymour CT) Yaron Ram (Stamford CT), Telephone communication system having a locator.
  68. Audebert, Yves, Terminal and system for performing secure electronic transactions.
  69. Hashiguchi, Masahiro, User authentication method and user authentication system.
  70. Perlman Radia, User presence verification with single password across applications.

이 특허를 인용한 특허 (9)

  1. Badt, Jr., Sig Harold; Rouyer, Jessy Victor; Ozugur, Timucin, Detecting legacy bridges in an audio video bridging network.
  2. Jacobsen, Jeffrey J.; Fan, John C. C.; Choi, Hong-Kyun; Parkinson, Christopher, Head worn wireless computer having high-resolution display suitable for use as a mobile internet device.
  3. Brown, Wendell D., Method and apparatus for automated password entry.
  4. Hillis, W. Daniel; Ferren, Bran, Method and apparatus for selectively enabling a microprocessor-based system.
  5. Hillis, W. Daniel; Ferren, Bran, Method and apparatus for selectively enabling a microprocessor-based system.
  6. Kramer, Mark; Sample, John M.; Tucker, Wilfred I.; Jacobsen, Jeffrey J., Method and apparatus for transporting video signal over Bluetooth wireless interface.
  7. Itoi, Masayuki; Takagawa, Tomokazu, Method and system for verifying identity.
  8. Parkinson, Christopher; Jacobsen, Jeffrey J., Mobile wireless display software platform for controlling other systems and devices.
  9. Williamson, Matthew Murray; Norman, Andrew Patrick, Network connection control.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로