$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secured data format for access control

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06K-009/00
  • G06F-017/30
  • G06F-007/04
  • G06F-007/02
  • G06F-012/14
  • G06F-011/30
  • H04L-009/32
  • H04N-007/167
출원번호 US-0074804 (2002-02-12)
등록번호 US-7380120 (2008-05-27)
발명자 / 주소
  • Garcia,Denis Jacques Paul
출원인 / 주소
  • Guardian Data Storage, LLC
대리인 / 주소
    Sterne, Kessler, Goldstein & Fox P.L.L.C.
인용정보 피인용 횟수 : 132  인용 특허 : 229

초록

In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one embodiment, a secured file or secured document includes two parts: an attachment, referred to as a header

대표청구항

I claim: 1. A system for providing access control management to electronic data, wherein the electronic data is structured in a format that provides restricted access to the electronic data therein, comprising: a module configured to generate a header comprising a plurality of sets of encrypted sec

이 특허에 인용된 특허 (229)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  3. David M. Mooney ; Paul J. Kimlinger ; James Virgil Bradley, Access control/crypto system.
  4. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  5. Zuili Patrick,FRX ; Ice Edward, Adaptive communication system enabling dissimilar devices to exchange information over a network.
  6. Schneck, Phyllis A.; Schwan, Karsten; Chokhani, Santosh, Adaptive data security system and method.
  7. Proctor, Paul E., Adaptive feedback security system and method.
  8. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  9. Brown, Michael Wayne; Hamzy, Mark Joseph; Jones, Scott Thomas, Apparatus and method for providing access rights information in a portion of a file.
  10. Just, Michael K.; Van Oorschot, Paul, Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system.
  11. Chow, Peter Ka-Fai, Apparatus and method for validating and updating an IP checksum in a network switching system.
  12. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  13. Gramsamer, Ferdinand; Klett, Peter Micheal; Liver, Beat; Truong, Hong Linh, Archiving and retrieval method and apparatus.
  14. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
  15. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  16. Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
  17. Brown,Daniel; Zapata,Fernando, Computer security system.
  18. Hsu Mike S. C. (1518 Ambergrove Dr. San Jose CA 95131), Computer system including a transparent and secure file transform mechanism.
  19. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  20. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  21. Sarah Baxter ; Lisa C. Vogt, Content management system.
  22. Hsiao,Hui I; Laue,Matthew; Mega,Cataldo, Content management system and methodology employing non-transferable access tokens to control data access.
  23. Ishibashi,Yasuhiro, Content processing system and content protecting method.
  24. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  25. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  26. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
  27. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  28. Seheidt Edward M. ; Crowley John J., Cryptographic key management method and apparatus.
  29. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  30. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  31. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  32. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  33. Ote Ichiro,JPX ; Iwabuchi Kazunori,JPX ; Washimi Hiroaki,JPX ; Furukawa Hiroshi,JPX ; Sumitomo Masahito,JPX ; Kobayashi Yuuichi,JPX, Data encryption control apparatus and method.
  34. Yoshino, Kenji; Ishibashi, Yoshihito; Akishita, Toru; Shirai, Taizo; Ito, Takeshi; Hayashi, Shigekazu, Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management.
  35. Nonaka,Akira; Ezaki,Tadashi, Data providing system, device, and method.
  36. Mullen,Nancy K.; Green,Michael J., Data warehouse computing system.
  37. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  38. Randal Chilton Burns ; Edward Gustav Chron ; Darrell Long ; Benjamin Clay Reed, Decentralized remotely encrypted file system.
  39. Gune,Prasad; Deighton,Anthony; Chen,Mingte; Kuo,Richard; Walcott,Wister, Defining an approval process for requests for approval.
  40. Lee, Michele C., Delivering output XML with dynamically selectable processing.
  41. Howard, John H.; Robinson, David; Rettberg, Randall D., Direct access from client to storage device.
  42. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  43. Shanton M. Greg, Distributed cryptographic object method.
  44. Shanton M. Greg, Distributed cryptographic object method.
  45. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  46. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  47. Dondeti Lakshminath R. ; Mukherjee Sarit ; Samal Ashok, Distributed group key management scheme for secure many-to-many communication.
  48. Friedel,Guy; Katz,Ariel; Shamir,Yaron; Nathan,Abraham, Distributed policy model for access control.
  49. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  50. Pendharkar,Sameer, Drain-extended MOS transistors with diode clamp and methods for making the same.
  51. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage and export contact information.
  52. Girish Rai ; Philip M. Parsons ; Mooi Chuah, Efficient mobility management scheme for a wireless internet access system.
  53. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  54. Kuroda, Yasutsugu; Kamada, Jun; Iwase, Shoko; Noda, Bintatsu; Ono, Etsuo, Electronic data storage apparatus with key management function and electronic data storage method.
  55. Pravetz James D., Encapsulation of public key cryptography standard number 7 into a secured document.
  56. Sasaki Minoru,JPX ; Yoshikawa Hiroharu,JPX, Enciphering/deciphering device and method, and encryption/decryption communication system.
  57. Raike,William Michael; Donovan Smith,Brian James; Higgins,Sean Joseph; Martin,Patrick John, Encrypted media key management.
  58. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  59. Harrison Colin George, Enhanced data privacy for portable computers.
  60. Radia J. Perlman, Ephemeral decryptability.
  61. David Paul Dutcher ; William H. Sinclair, Jr. ; Stanley Alan Smith, Establishment of user home directories in a heterogeneous network environment.
  62. David L. Drake ; David J. Webster, Event detection.
  63. Bhide,Manish Anand; Mohania,Mukesh Kumar, Event-based database access execution.
  64. Shimbo Atsushi,JPX ; Takahashi Toshinari,JPX ; Tomoda Ichiro,JPX ; Murota Masao,JPX, File editing system and shared file editing system with file content secrecy, file version management, and asynchronous.
  65. Parker Robert D. ; Holloway Matthew S., File privilege administration apparatus and methods.
  66. Riddle Guy, File sharing in a teleconference application.
  67. Kumar,Sanjay; Thomas,Stanton L.; Deshpande,Gaurav M.; Murty,Venkataesh V., Fulfillment management system for managing ATP data in a distributed supply chain environment.
  68. Bonn, David Wayne; Marvais, Nick Takaski, Generalized network security policy templates for implementing similar network security policies across multiple networks.
  69. Harkins Dan, Group key distribution.
  70. Aoki, Ryuichi, Group oriented public key encryption and key management system.
  71. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  72. Tormasov,Alexander; Lunev,Dennis; Beloussov,Serguei; Protassov,Stanislav; Pudgorodsky,Yuri, Hosting service providing platform system and method.
  73. Watanabe Hiroshi (Kokubunji JPX), IC card which can set security level for every memory area.
  74. Kacker,Rishi R.; Appenzeller,Guido; Pauker,Matthew J.; Spies,Terence, Identity-based encryption system for secure data distribution.
  75. Prakash, Nalini J., Indications of secured digital assets.
  76. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  77. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  78. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  79. Wiederhold Gio, Information sharing system and method with requester dependent sharing and security rules.
  80. Law,Gary K.; Deitz,David L.; Schleiss,Trevor Duncan; Naidoo,Julian, Integrated electronic signatures for approval of process control and safety system software objects.
  81. Choy David M., Integrated method and system for controlling information access and distribution.
  82. Kino, Shigenori; Koike, Kazuhiro; Mochizuki, Yasuyuki; Mizuguchi, Takehisa, Inter-application data transmitting system and method.
  83. Jancula,Jeffrey John, Internet third-party authentication using electronic tickets.
  84. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics and distributed access control.
  85. Jun, Dong-suk; Lee, Sang-seok; Choy, Tae-goo, Isolator/circulator having propeller resonator loaded with a plurality of symmetric magnetic walls.
  86. Christiano Matt (Saratoga CA), License management system for software applications.
  87. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  88. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Logon certification.
  89. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  90. Mamiya Akira (Yokohama JPX) Suga Akira (Tokyo JPX) Kawamura Hideaki (Kawasaki JPX) Aizawa Takashi (Yokohama JPX) Takahashi Fumiaki (Machida JPX) Hatori Kenji (Hatogaya JPX), Management system of multimedia.
  91. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  92. Brown Scott K. (San Jose CA) Hoem Robert H. (Fremont CA), Method and apparatus for changing the master key in a cryptographic system.
  93. Carter Stephen R., Method and apparatus for collaborative document control.
  94. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for controlling access to encrypted data files in a computer system.
  95. Batten-Carew, Mark Christopher; Wiener, Michael James, Method and apparatus for controlling release of time sensitive information.
  96. Mast Michael B., Method and apparatus for copy protection of images in a computer system.
  97. Lee Dilkie CA; Paul C. Van Oorschot CA, Method and apparatus for correcting improper encryption and/or for reducing memory storage.
  98. Van Oorschot Paul C.,CAX, Method and apparatus for creating communities of trust in a secure communication system.
  99. McLaughlin Michael D. (San Jose CA) Signa John C. (Sunnyvale CA) Greicar Richard K. (Moss Beach CA) Taylor John M. (London GB2), Method and apparatus for display calibration and control.
  100. Kathrow Bodie ; Skelton ; III John R, Method and apparatus for identifying the existence of differences between two files.
  101. Kadansky Miriam C. ; Hanna Stephen R., Method and apparatus for multicast indication of group key change.
  102. Timothy E. Moses CA; Sharon M. Boeyen CA, Method and apparatus for obtaining status of public key certificate updates.
  103. Batten-Carew Mark,CAX ; Buchler Marek,CAX ; Hiller Stephen William,CAX ; Otway Josanne Mary,CAX, Method and apparatus for processing administration of a secured community.
  104. Chemtob,Helen J., Method and apparatus for providing group interaction via communications networks.
  105. Paul C. Van Oorschot CA, Method and apparatus for public key management.
  106. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
  107. Sames, David L.; Whitmore, Brent S.; Niebuhr, Brian S.; Tally, Gregg W., Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system.
  108. Garcia,Denis Jacques Paul, Method and apparatus for securing digital assets.
  109. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  110. Suarez Larry, Method and architecture for the creation, control and deployment of services within a distributed computer environment.
  111. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall, Method and system for automatically merging files into a single instance store.
  112. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  113. Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
  114. Sieffert, Kent J.; Schaffran, Curtis A., Method and system for gathering information resident on global computer networks.
  115. Vainstein, Klimenty, Method and system for managing security tiers.
  116. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  117. Krueger, Scott; Goodman, Daniel, Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program.
  118. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  119. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Method and system for securely archiving core data secrets.
  120. Chan, Victor; Ho, Francis, Method and system providing in-line pre-production data preparation and personalization solutions for smart cards.
  121. Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
  122. Morgan Joseph M. ; Harold Michael D., Method for creating specific purpose rule-based n-bit virtual machines.
  123. Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA), Method for ensuring secure communications.
  124. Still Kelly W., Method for gradual deployment of user-access security within a data processing system.
  125. Kramer Paul H. (Rochester MN) Tate Kay A. (Rochester MN), Method for protecting data in a computer system.
  126. Novorita Robert J. (Orland Park IL), Method for updating encryption key information in communication units.
  127. Skarbo Rune A. ; Clitheroe Cameron J. ; Lawless Christopher C. ; Kukkal Puneet ; Hochman Stephen D., Method for web based storage and retrieval of documents.
  128. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  129. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  130. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  131. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  132. Wilson, Rodger P., Method, system, and program for encrypting files in a computer system.
  133. Hartman, Bret A.; Flinn, Donald J.; Burghart, Jr., Theodore R., Methods and apparatus for facilitating security in a network.
  134. Arlein,Robert M.; Jai,Ben; Jakobsson,Bjorn Markus; Monrose,Fabian; Reiter,Michael Kendrick, Methods and apparatus for providing privacy-preserving global customization.
  135. Kluttz, Karen Ruth; Singhal, Sandeep Kishan, Methods, systems and computer program products for multi-level encryption.
  136. Schell, Roger R.; Jueneman, Robert R.; Gayman, Mark G., Module authentication and binding library extensions.
  137. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  138. Multerer Boyd ; Schwartz Kerry S. ; Stebbens Kim, Multi-server location-independent authentication certificate management system.
  139. Preston Harold W. (Carrollton TX) Rush Jeffrey R. (Richardson TX), Multiple user stored data cryptographic labeling system and method.
  140. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  141. Jacobson, Andrea M., Network policy management and effectiveness system.
  142. Alon Cohen IL, Network vaults.
  143. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin, Object caching and update queuing technique to improve performance and resource utilization.
  144. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin, Object caching and update queuing technique to improve performance and resource utilization.
  145. Schmuck Frank B. ; Zlotek Anthony J. ; Shmueli Boaz,ILX ; Mandler Benjamin,ILX ; Yehudai Zvi Yosef,ILX ; Kish William A., Parallel file system with method using tokens for locking modes.
  146. Venkatesan, Ramarathnam; Yacobi, Yacov, Passive and active software objects containing bore resistant watermarking.
  147. Kadooka Etsuko (Tokyo JPX), Password updating system to vary the password updating intervals according to access frequency.
  148. Aboulhosn, Amir L.; Chen, Rui; Koo, David M.; Vineberg, David J.; Wald, James F.; Murphy, Stephen, Peer-to-peer file sharing.
  149. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  150. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  151. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Protected storage of core data secrets.
  152. Roddy, Brian J.; Hanson, Michael; Lilly, III, John O., Providing security for external access to a protected computer network.
  153. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  154. Lortz, Victor B., Resource policy management using a centralized policy data structure.
  155. Teresa Win ; Emilio Belmonte, Role-based navigation of information resources.
  156. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  157. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Secure data storage and retrieval with key management and user authentication.
  158. Folmsbee Alan, Secure execution of program instructions provided by network interactions with processor.
  159. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  160. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  161. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  162. Carroll Robert B., Secure server and method of operation for a distributed information system.
  163. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  164. Pravetz James D. ; Malloy Thomas J., Secured document access control using recipient lists.
  165. Rose Anthony M. (66 Drumalbyn Road Bellevue Hill ; Sydney AUX 2023), Securing a computer against undesired write operations to or read operations from a mass storage device.
  166. Feuerstein,Yehuda; Pfost,Jared E.; Purpura,Stephen J., Security component for a computing device.
  167. Deo Umesh, Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems.
  168. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  169. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
  170. Roseman, Robert D., Server based virtual conferencing.
  171. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall ; Richard F. Rashid ; Nathan P. Myhrvold ; David A. Goebel, Single instance store for file systems.
  172. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  173. Tsuge,Munetoshi, Storage management integrated system and storage control method for storage management integrated system.
  174. Kobayashi,Hiroyuki; Uchida,Yoshiaki, Storage medium and method and apparatus for separately protecting data in different areas of the storage medium.
  175. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  176. Barlow, Doug; Dillaway, Blair; Fox, Barbara; Lipscomb, Terry; Spies, Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  177. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  178. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  179. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  180. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  181. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  182. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  183. Najork Marc Alexander ; Heydon Clark Allan, System and method for efficient representation of data set addresses in a web crawler.
  184. Olsen, Theis; Bundesen, Rune Windfeld; Hougaard, Claes Christian; Nordly, Trygve Thor, System and method for ensuring secure transfer of a document from a client of a network to a printer.
  185. Dennis, Michael W.; Freed, Michele L.; Plastina, Daniel; Flo, Eric R.; Kays, Jr., David E.; Corrington, Robert E., System and method for implementing group policy.
  186. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  187. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  188. Moriconi, Mark; Qian, Shelly, System and method for maintaining security in a distributed computer network.
  189. Erickson John S., System and method for managing copyrighted electronic media.
  190. Rose John R., System and method for managing try-and-buy usage of application programs.
  191. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  192. Morishita,Takuya, System and method for preventing an illegal copy of contents.
  193. Sakurai Hiroshi (Tokyo JPX) Ikeda Nobuyuki (Tokyo JPX) Watabe Akehiro (Tokyo JPX), System and method for processing document information using password protected icons that represent document content.
  194. Alben,Jonah M.; Pember,Bruce W., System and method for providing a hardware icon with magnification and security.
  195. Henry,Paul S.; Luo,Hui, System and method for providing access to multiple user accounts via a common password.
  196. Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
  197. Greg B. Garrison, System and method for restricting access to a data table within a database.
  198. Mittra Suvo, System and method for secure group communications via multicast or broadcast.
  199. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  200. Dixon Peggy PakFan ; Shi Danling ; Verburg Richard Lee ; Wood Donald Edwin, System and method for transferring a session from one application server to another without losing existing resources.
  201. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  202. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  203. McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
  204. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  205. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  206. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  207. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for enabling lazy-revocation through recursive key generation.
  208. Riedel,Erik; Karamanolis,Christos; Kallahalla,Mahesh; Swaminathan,Ram, System for ensuring data privacy and user differentiation in a distributed file system.
  209. Stelliga, Tony, System for multi-layer broadband provisioning in computer networks.
  210. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for optimized key management with file groups.
  211. Hahn Samuel S. ; LeGault Kenn ; Wheeler Maxon ; Degenhardt Jon R., System for organizing document icons with suggestions, folders, drawers, and cabinets.
  212. Donaghey, Robert J.; Carielli, Sandra E.; Helinek, Pamela, System for selecting and disseminating active policies to peer device and discarding policy that is not being requested.
  213. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  214. Krishnaswamy, Sridhar; Elliott, Isaac K.; Reynolds, Tim E.; Forgy, Glen A.; Solbrig, Erin M., System, method and article of manufacture for a communication system architecture including video conferencing.
  215. Elliott,Isaac K., System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture.
  216. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  217. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K.; Twaddell,Gordon W., Systems and methods for state-less authentication.
  218. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  219. Davis Mark Charles ; Gray Steve D. ; Kuehr-McLaren David Gerard ; Morrison Ian A. ; Shoriak Timothy G., Systems, methods and computer program products for authenticating client requests with client certificate information.
  220. Amini,Lisa; Belknap,William R., Systems, methods, and computer program products for accelerated dynamic protection of data.
  221. Squier,Anthony C.; Austin,Calvin J., Universal session sharing.
  222. Hinchliffe,Alexander James; Howard,Fraser Peter; Rai,Bobby; Kemp,Andrew, Updating data from a source computer to groups of destination computers.
  223. Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
  224. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  225. Takada,Yuji; Nishida,Taishin, Variable-length key cryptosystem.
  226. Bobbitt,Jared E.; Doll,Stephan A.; Friedman,Marc T.; Lau,Patrick Wing Sang; Mullally,Joseph P., Virtual file system.
  227. Keller Neal Martin ; Pickover Clifford Alan, Visual access to restricted functions represented on a graphical user interface.
  228. McBride Randall C., Volatile key apparatus for safeguarding confidential data stored in a computer system memory.
  229. Cannata,Michael J.; Lee,Richard; Powell,Matthew; Ramasra,Ryan; Smith,Gerald William; Tatham,Charles Edward; Remme,Randall Nelson, Web-based groupware system.

이 특허를 인용한 특허 (132)

  1. Terek, Soner; Sadovsky, Vladimir; Verma, Surendra; Geiger, Avi R., Abstracting programmatic representation of data storage systems.
  2. Linga, Prakash; Arora, Ajay; Buzuev, Vladimir; Evans, Maurice C.; Sisley, Justin, Access files.
  3. Linga, Prakash; Arora, Ajay; Buzuev, Vladimir; Evans, Maurice C.; Sisley, Justin, Access files.
  4. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  5. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  6. Dick, Adrian David; Taylor, James Stuart, Automated password authentication.
  7. Dick, Adrian David; Taylor, James Stuart, Automated password authentication.
  8. Dick, Adrian David; Taylor, James Stuart, Automated password authentication.
  9. Baltar, Alexandre de Queiroz; Bianchi, Silvia Cristina Sardela; Gomes, Marcio da Ros; Paraiso, Marcos Vinicius Landivar; Varga, Sergio, Autonomous trust evaluation engine to grant access to user private data.
  10. Huang, Fei; Huang, Shu; Ren, Liwei, Cascading security architecture.
  11. Dorman, Griffin; Asok, Satish; Self, Matthew, Cloud service enabled to handle a set of files depicted to a user as a single file in a native operating system.
  12. Nakamura, Takatoshi, Data processing apparatus.
  13. Goldberg, Arnold; Asok, Satish; Lee, David T., Desktop application for access and interaction with workspaces in a cloud-based content management system and synchronization mechanisms thereof.
  14. Atzmon, Nir; Glickman, Eran; Siton, Tal, Device having memory access protection.
  15. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  16. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  17. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  18. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  19. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Distributed document version control.
  20. Herbach, Jonathan D.; Gilchrist, Gary, Distributed document version control.
  21. Wason, James R., Document handling in a web application.
  22. Wason, James R., Document handling in a web application.
  23. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  24. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  25. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  26. Calcaterra, Jeffrey A.; Hind, John R.; Salahshour, Abdolreza, Dynamic, selective obfuscation of information for multi-party transmission.
  27. Brown, Michael Kenneth; Brown, Michael Stephen; Kirkup, Michael Grant, E-mail with secure message parts.
  28. Brown, Michael Kenneth; Brown, Michael Stephen; Kirkup, Michael Grant, E-mail with secure message parts.
  29. Snodgrass, Ryan J.; Slezak, James C.; Goldberg, Matthew E.; Leproust, Jeremie; Jeulin, Guillaume; Antony, Felix F., Ebook encryption using variable keys.
  30. Skipper, Chad; Lewis, Elliot D.; Konetski, David; Burchett, Christopher; Schuckle, Richard William; Burke, James Michael; Robbins, Warren Wade; Gates, Carrie Elaine, Enforcement mitigations for a protected file.
  31. Shapiro, William M., Family of encryption keys.
  32. Huang, Jiejing; Wu, Huangwei; Wang, Chan, File sharing method and apparatus.
  33. Mackenzie, David; Smith, Benjamin Campbell; Bishopric, Anthony, File system monitoring in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform.
  34. Dorman, Griffin; Sheffield, Philip; Bauer, Mark; Lee, Sang, Functionalities, features, and user interface of a synchronization client to a cloud-based environment.
  35. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  36. Rossmann, Alain, Hybrid systems for securing digital assets.
  37. Hashimoto,Minoru, Image processing system and method for processing image data using the system.
  38. Furuya, Tomoyuki, Information processing apparatus and data management system.
  39. Ueda, Kenjiro; Kuno, Hiroshi; Kobayashi, Yoshiyuki, Information processing apparatus, information processing system, information processing method, and program.
  40. Matsuo, Takenori, Information processing server, information processing system, information processing method and storage medium storing information processing program.
  41. Relyea, Don; Roberts, Brian; Felt, Michelle, Key-based content management and access systems and methods.
  42. Relyea, Donald H.; Roberts, Brian F.; Felt, Michelle, Key-based content management and access systems and methods.
  43. Smith, Benjamin Campbell; Mackenzie, David; Lu, Yiming; Potrebic, Peter; Jourda, Florian; Parmar, Kunal, Maintaining and updating file system shadows on a local device by a synchronization client of a cloud-based platform.
  44. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  45. Skatter, Sondre; Tolson, Michael, Method and apparatus for a distributable globe graphical object.
  46. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and apparatus for multi-tenancy secrets management.
  47. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and apparatus for multi-tenancy secrets management in multiple data security jurisdiction zones.
  48. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  49. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  50. Dorman, Griffin, Method and apparatus for synchronization of items with read-only permissions in a cloud-based environment.
  51. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  52. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  53. Donahue, James, Method and apparatus providing end to end protection for a document.
  54. Kim, Yongsin; Hong, Jihoon; Kim, Jin; Lee, Kunwoo, Method and digital device for access control with fingerprint authentication.
  55. O'Brien, James W.; Laye, Charles L., Method and network for secure transactions.
  56. Weaver, Brett; Philip, Sabu Kuruvila; Otillio, Troy; Whitehouse, III, Jinglei; Gryb, Oleg; Wolfe, Jeffrey M.; Jain, Ankur; Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for automatically managing secret application and maintenance.
  57. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and system for automatically managing secrets in multiple data security jurisdiction zones.
  58. Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for automatically managing secure communications and distribution of secrets in multiple communications jurisdiction zones.
  59. Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for automatically managing secure communications in multiple communications jurisdiction zones.
  60. Cabrera, Luis Felipe; Lietz, M. Shannon; Armitage, James; Gryb, Oleg; Shanmugam, Elangovan; Philip, Sabu Kuruvila; Weaver, Brett; Bishop, Thomas; Otillio, Troy; Whitehouse, Jinglei; Wolfe, Jeffrey M.; Jain, Ankur, Method and system for distributing secrets.
  61. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  62. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  63. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  64. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  65. Vainstein, Klimenty, Method and system for managing security tiers.
  66. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  67. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  68. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and system for providing a secure secrets proxy.
  69. Cabrera, Luis Felipe; Lietz, M. Shannon; Armitage, James; Gryb, Oleg; Shanmugam, Elangovan; Philip, Sabu Kuruvila; Weaver, Brett; Bishop, Thomas; Otillio, Troy; Whitehouse, Jinglei; Wolfe, Jeffrey M.; Jain, Ankur, Method and system for providing a secure secrets proxy and distributing secrets.
  70. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and system for providing an encryption proxy.
  71. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Method and system for providing cryptographic document retention with off-line access.
  72. Nath, Satyajit, Method and system for providing document retention using cryptography.
  73. Nath, Satyajit, Method and system for providing document retention using cryptography.
  74. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  75. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  76. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  77. Sperry, Robert Hammond, Method for secure access to document repositories.
  78. Birkhoelzer, Thomas; Krickhahn, Frank; Vaupel, Juergen, Method for the encryption and decryption of data by various users.
  79. Bar-El, Hagai; Klimov, Alexander; Shen, Asaf, Method, device, and system of provisioning cryptographic data to electronic devices.
  80. Bar-El, Hagai; Klimov, Alexander; Shen, Asaf, Method, system, and device of provisioning cryptographic data to electronic devices.
  81. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  82. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  83. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  84. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  85. Bar-El, Hagai, Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices.
  86. Maim, Enrico, Methods for granting access to resources modifiable by users in a computer environment, and resources structured therefore.
  87. Smith, Michael, Mobile platform file and folder selection functionalities for offline access and synchronization.
  88. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  89. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  90. Ahsan, Abou Ul Aala; Bramwell, Stephen R.; Fudge, Brian T., Multimedia distribution system.
  91. Braness, Jason; Rota, Jerome; Grab, Eric William; Donaldson, Jerald; Hitchcock, Heather; Chavarria, Damien; Floyd, Michael John; Fudge, Brian T.; Li, Adam H., Multimedia distribution system for multimedia files with interleaved media chunks of varying types.
  92. Jones, Jeffrey Dick; Nolan, Sean Patrick; Apacible, Johnson T.; Varadan, Vijay; Guarraci, Brian J.; White, Christopher C., Multiple entity authorization model.
  93. Shapiro, William M.; Donahue, James; Herbach, Jonathan D., Offline access in a document control system.
  94. Skipper, Chad; Lewis, Elliot D.; Konetski, David; Burchett, Christopher; Schuckle, Richard William; Burke, James Michael; Robbins, Warren Wade; Gates, Carrie Elaine, Platform for adopting settings to secure a protected file.
  95. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  96. Rees, Robert Thomas Owen; Balinsky, Helen, Providing an access mechanism associated with a document part to determine an action to take if content of the document part is inaccessible.
  97. Booth, Alan Edward; Bowers, Richard Gerald; Fox, James Edward; House, Daniel Edward, Provisioning transient-controlled secure environments for viewing sensitive data.
  98. Mackenzie, David; Spielberg, Miles, Race condition handling in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform.
  99. Barreto, Tomas; Mackenzie, David; Mand, Arshdeep; Spielberg, Miles, Repository redundancy implementation of a system which incrementally updates clients with events that occurred via a cloud-enabled platform.
  100. Masurkar, Vijay B., Role-based access using combinatorial inheritance and randomized conjugates in an internet hosted environment.
  101. Rexer, Peter, Sandboxing individual applications to specific user folders in a cloud-based service.
  102. Mackenzie, David; Spielberg, Miles; Treyger, Alex; Luecke, Ryan; Bercovici, Tamar; Barreto, Tomas, Scalability improvement in a system which incrementally updates clients with events that occurred in a cloud-based collaboration platform.
  103. L'Heureux, Israel; Alleman, Mark D., Secure file access using a file access server.
  104. Linga, Prakash; Arora, Ajay; Buzuev, Vladimir; Evans, Maurice C., Securing files.
  105. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  106. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  107. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  108. Lockhart, Kimber; Platti, Adam; Ebertz, Joy; Silva, Nicholas, Server side techniques for reducing database workload in implementing selective subfolder synchronization in a cloud-based environment.
  109. DeTreville, John, State reference.
  110. Kiang, Andy; Tu, Kevin; Sheffield, Philip; Vaughn, Alexander; Heilig, Timothy; Tatarchenko, Elena Andreevna; Duvall, Matthew Taro; Vinnik, Natalia, System and method for advanced control tools for administrators in a cloud-based service.
  111. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  112. Pineau, Stephen; Anderson, Garry, System and method for interfacing facility access with control.
  113. Kim, Dong Hwa; Yoo, Chang Hun; Choi, Jin Hyug; Heo, Un Yeong; Shin, Dong Hwan, System and method for preventing the leaking of digital content.
  114. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  115. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  116. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  117. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  118. Chermside, Michael, System and method for providing controlled application programming interface security.
  119. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  120. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  121. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  122. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  123. Tuers, Daniel Edward; Cheng, Steven, System and method to scramble data based on a scramble key.
  124. Bar-El, Hagai; Klimov, Alexander; Shen, Asaf, System, device, and method of provisioning cryptographic data to electronic devices.
  125. Pedersen, Bradley J.; Sinha, Rajiv; Sundarrajan, Prabakar; Treder, Terry, Systems and methods for accelerating delivery of a computing environment to a remote user.
  126. Harris, James; He, Max; Kumar, Arkesh; Soni, Ajay; Venkatraman, Charu; Najundaswamy, Shashi; Mullick, Amarnath, Systems and methods for providing levels of access and action control via an SSL VPN appliance.
  127. Smith, Benjamin Campbell; Mackenzie, David; Lu, Yiming; Parmar, Kunal; Potrebic, Peter, Systems and methods for synchronization event building and/or collapsing by a synchronization component of a cloud-based platform.
  128. Thomas, James Gordon, Techniques for managing heterogeneous key stores.
  129. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Transparent authentication process integration.
  130. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Transparent authentication process integration.
  131. Gerraty, Simon J., Using file metadata for data obfuscation.
  132. Gerraty, Simon J., Using file metadata for data obfuscation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트