$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Security systems for protecting an asset 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
  • G06F-007/02
  • G06F-017/30
  • G06K-009/00
  • H04L-009/32
  • G06F-007/58
  • G11C-007/00
  • H04L-009/00
  • H04K-001/00
  • G06F-011/30
  • G06F-012/14
출원번호 UP-0739021 (2007-04-23)
등록번호 US-7552467 (2009-07-01)
발명자 / 주소
  • Lindsay, Jeffrey Dean
대리인 / 주소
    Lindsay, Jeff
인용정보 피인용 횟수 : 289  인용 특허 : 64

초록

Security systems for protecting assets are described, including password-based security systems that can provide different levels of access responsive to entry of a primary or secondary password. In some versions, user-configurable security rules can provide customized responses to entry of primary

대표청구항

I claim: 1. A security system for controlling the access of a user to an asset, comprising a password-protected access interface and asset access means, the access interface comprising means for receiving user credentials comprising a password, wherein the access interface accepts user credentials

이 특허에 인용된 특허 (64)

  1. Scheidt,Edward M.; Domanque,Ersin; Butler,Roger; Tsang,Wai, Access system utilizing multiple factor identification and authentication.
  2. Baird, III, Leemon C.; Harmon, Mance E.; Young, R. Reed; Armstrong, Jr., James E., Apparatus and method for authenticating access to a network resource.
  3. Kapp Michael A. (New Philadelphia) Protheroe Robert L. (Cambridge) Onega Albert (Lore City OH), Apparatus and method for producing a digitized transaction record including an encrypted signature.
  4. Brown, Michael Wayne; Dutta, Rabindranath; Paolini, Michael A.; Smith, Jr., Newton James, Automatic teller system and method of marking illegally obtained cash.
  5. Eisenberg Alan J. (Monmouth Junction NJ), Automatic teller system and method of operating same.
  6. Shatford,Will, Biometric based authentication system with random generated PIN.
  7. Lane,Kathleen; Lane, III,William H, Birth and other legal documents having an RFID device and method of use for certification and authentication.
  8. Russikoff, Ronald K., Computerized password verification system and method for ATM transactions.
  9. Zingher Joseph P. ; Zingher Abraham R., Computerized system for discreet identification of duress transaction and/or duress access.
  10. Flitcroft,Daniel I.; O'Donnell,Graham, Credit card system and method.
  11. Tannenbaum David H. (14860 Oaks North Pl. Addison TX 75001), Currency transfer system and method.
  12. Brody Bill E. (9254 Forest La. ; Apt. 904 Dallas ; Dallas County TX 75243) Tannenbaum David H. (14860 Oaks North Pl. Addison ; Dallas County TX 75001), Currency transfer system and method using fixed limit cards.
  13. Wood,David L.; Weschler,Paul; Norton,Derk; Ferris,Chris; Wilson,Yvonne; Soley,William R., Default credential provisioning.
  14. Smithies Christopher Paul Kenneth,GBX ; Newman Jeremy Mark,GBX, Document and signature data capture system and method.
  15. Smithies Christopher Paul Kenneth,GB2 ; Newman Jeremy Mark,GB2, Document and signature verification system and method.
  16. Vandergeest, Ronald J., Dynamic security credential generation system and method.
  17. Dawson Gerald Lee ; Thompson Daniel Lee ; Miller J. Clayton ; Harvey Michael P., Electronic combination lock with high security features.
  18. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  19. Symonds,Robert D.; Singer,Irek; St. George,Peter; Gill,Robert Bradley, Financial transaction processing system and method.
  20. Lane,Kathleen; Lane,William; Stewart,Roger, Hierarchical electronic watermarks and method of use.
  21. Vandergeest, Ron J.; Hillier, Stephen W., Method and apparatus for dynamically accessing security credentials and related information.
  22. Lloyd, James Steven; Boeyen, Sharon M.; Vandergeest, Ronald J., Method and apparatus for providing access isolation of requested security related information from a security related information source.
  23. Ketcham, Carl C.; Acomb, Stanford K., Method and system for secure emergency access to network devices.
  24. Christopher Paul Kenneth Smithies GB; Jeremy Mark Newman GB, Method and system for the capture, storage, transport and authentication of handwritten signatures.
  25. Smithies Christopher Paul Kenneth (Corfe Mullen ; Wimborne GB2) Newman Jeremy Mark (Frome ; Somerset GB2), Method and system for the verification of handwritten signatures.
  26. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  27. DeFabio ; Jr. Daniel J., Method for authenticating signatures and memorabilia kit employing same.
  28. Finkelstein, Alan, Method for making a financial transaction card with embedded electronic circuitry.
  29. Tugenberg,Steven R.; Hardy,Douglas A.; Tkacik,Thomas E., Method for purchasing items over a non-secure communication channel.
  30. Grajewski,Joseph; Jaeger,Douglas, Method of authenticating proper access to secured site and device for implementation thereof.
  31. Moussa Ali Mohammed (1302 Nelson Way Sunnyvale CA 94087) Chan Chih (13301 Glen Brae Dr. San Jose CA 95070), Method of automated signature verification.
  32. Challener,David Carroll; Goodman,Steven Dale, Method of creating password list for remote authentication to services.
  33. Freeman,Joseph Wayne; Springfield,Randall Scott; Goodman,Steven Dale; Karpel,Isaac, Method to use secure passwords in an unsecure program environment.
  34. Excoffier,Karine; Bryne,Robert, Multiple password policies in a directory server system.
  35. Shaffer,James D.; Moore,George G., One number, intelligent call processing system.
  36. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password in a particular remote server.
  37. Nielsen Jakob, Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server.
  38. Moriyama Junichi (Kawasaki JPX), Password security method.
  39. Man,Kwai Hing; Kozina,Gerald Edward; Wang,Shirley S., Password security utility.
  40. Ray N. Hosack, Personal security system.
  41. Brown,Michael Wayne; McIntyre,Joseph Herbert; Paolini,Michael A.; Weaver,James Mark; Winters,Scott Lee, Providing account usage fraud protection.
  42. Hayman Gary D. (96 Mark David Ct. Casselberry FL 32707), Safe apparatus.
  43. Pinkas,Binyamin; Sander,Tomas, Secure authentication systems and methods.
  44. Rahman Sam (4809 Laurette St. Torrance CA 90503) Magner Jim (5092 Tripoli Ave. Los Alamitos CA 90720) Brown John (12831 Longden St. Garden Grove CA 92645) Pun Adarsh (5404 White Fox Dr. Rancho Palos , Secure credit card which prevents unauthorized transactions.
  45. Alizade,Karl, Security and locking mechanism for a double door utilized in a security safe, vault or bunker.
  46. Brown, Michael Wayne; Dutta, Rabindranath; Paolini, Michael A.; Smith, Jr., Newton James, Security system for validation of credit card transactions.
  47. Warfel George H. (1305 Hillview Drive Menlo Park CA 94025), Signature authentication system.
  48. Fukada,Toshiaki, Speech information processing method and apparatus and storage medium using a segment pitch pattern model.
  49. Utsumi,Kenichi; Uchida,Yoshiaki; Kobayashi,Hiroyuki, Storing apparatus and password control method.
  50. French, Jennifer; Wilder, Jone, System and method for authentication of network users.
  51. Tetro, Donald; Lipton, Edward; Sackheim, Andrew, System and method for enhanced fraud detection in automated electronic credit card processing.
  52. Tetro, Donald; Lipton, Edward; Sackheim, Andrew, System and method for enhanced fraud detection in automated electronic credit card processing.
  53. Kawan,Joseph C.; Smushkovich,Yosif; Chu,Ronald King Hang, System and method for user authentication.
  54. Samar Vipin, System and method to transparently integrate private key operations from a smart card with host-based encryption service.
  55. Bailey,Doug, Tamper detection and secure power failure recovery circuit.
  56. Rahman Sam (4809 Laurette St. Torrance CA 90503) Magner James (5092 Tripoli Ave. Los Alamitos CA 90720) Brown John (12831 Longden St. Garden Grove CA 92645) Pun Adarsh (5404 White Fox Dr. Rancho Palo, Transaction device, equipment and method for protecting account numbers and their associated personal identification num.
  57. Uchida Yasuo (Takatsuki JPX), Transaction processing system.
  58. Kuroki Akira (Inagi JPX) Ochiai Satoru (Inagi JPX), Transaction safety system for falsely indicating successful completion of illegal transaction.
  59. Weiss,Kenneth P., Universal secure registry.
  60. Hwang,Eui hyeon; Lee,Jong ha, User authentication method and apparatus.
  61. Xia,Chenhong; Malloy,William Earl, User authorization management system using a meta-password and method for same.
  62. Su, Huan-yu; Assaleh, Khaled, User configurable levels of security for a speaker verification system.
  63. Shimomura,Toshio, Vehicle security system.
  64. Hillis W. Daniel (Cambridge MA), Vertification system for credit or bank card or the like.

이 특허를 인용한 특허 (289)

  1. Priel, Arik; Fishman, Yariv; Visman, Tzvika; Alterman, Yaron; Liberman, Mauri; Peri, Eyal, Access control for a memory device.
  2. Lundy, Michael T.; Whitney, Jason K., Accessing secure network areas by utilizing mobile-device authentication.
  3. Kapczynski, Mark Joseph; Dean, Michael John; Hunt, III, Herbert Harris, Account vulnerability alerts.
  4. Toksvig, Michael John McKenzie; Papakipos, Matthew Nicholas; Ondrejka, Cory Rudolph, Adjusting mobile device state based on user intentions and/or identity.
  5. Burger, Michael, Adjustment of knowledge-based authentication.
  6. Kapczynski, Mark Joseph; Dean, Michael John, Aggregating user web browsing data.
  7. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Amusement device including means for processing electronic data in play of a game in which an outcome is dependant upon card values.
  8. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Amusement device including means for processing electronic data in play of a game of chance.
  9. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Amusement device including means for processing electronic data in play of a game of chance.
  10. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  11. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  12. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Anonymous location service for wireless networks.
  13. Ziv, Aran; Bychkov, Eyal, Apparatus and method for securing data on a portable storage device.
  14. Ziv, Aran; Bychkov, Eyal, Apparatus and method for securing data on a portable storage device.
  15. Ziv, Aran; Bychkov, Eyal, Apparatus and method for securing data on a portable storage device.
  16. Weiss, Kenneth P., Apparatus, system and method for secure payment.
  17. Bhogal, Kulvir S.; Brunn, Jonathan F.; Hoy, Jeffrey R.; Silva, Asima, Audience-based sensitive information handling for shared collaborative documents.
  18. Bhogal, Kulvir S.; Brunn, Jonathan F.; Hoy, Jeffrey R.; Silva, Asima, Audience-based sensitive information handling for shared collaborative documents.
  19. Bhogal, Kulvir S.; Brunn, Jonathan F.; Hoy, Jeffrey R.; Silva, Asima, Audience-based sensitive information handling for shared collaborative documents.
  20. Bhogal, Kulvir S.; Brunn, Jonathan F.; Hoy, Jeffrey R.; Silva, Asima, Audience-based sensitive information handling for shared collaborative documents.
  21. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  22. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  23. Nandakumar, Gopal, Authentication method.
  24. Nandakumar, Gopal, Authentication method.
  25. Takami, Shinya, Authentication server apparatus, authentication server apparatus-use program and authentication method.
  26. Nandakumar, Gopal, Authentication system.
  27. Nandakumar, Gopal, Authentication system and related method.
  28. Nandakumar, Gopal, Authentication system and related method.
  29. Wilkes, T. Clay, Authentication tokens managed for use with multiple sites.
  30. Jakobsson, Bjorn Markus, Automatic PIN creation using password.
  31. Jakobsson, Markus, Automatic PIN creation using password.
  32. Barrows, Maximilian Francis; Ferraro, Paul Francis Dean; McHugh, Jason George; Passaglia, Abraham Martin; Roths, Andrew Jay; Shell, Eric Allan, Automatic token renewal for device authentication.
  33. Sarris, Helen; Byrd, Timothy B.; Clark, Rhonna J.; Lin, Chuan Bin; Shnowske, Daniel P.; Treadwell, William; Zhou, Mian, Bank card fraud protection system.
  34. Kapczynski, Mark Joseph; Dean, Michael John, Bill payment and reporting.
  35. Krieger, Michael D.; Paczkowski, Lyle W.; Schlesener, Matthew C., Billing varied service based on tier.
  36. Hicks, Glenn; Albury, Richard Franklin; Neil, James Warren, Biometric sensor for human presence detection and associated methods.
  37. Hicks, Glenn; Albury, Richard; Neil, James W., Biometric sensor for human presence detection and associated methods.
  38. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  39. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  40. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  41. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  42. Wasser, Jeremy; Felice-Steele, Michelle; Nies, Melinda; Giltner, Luke, Circular rotational interface for display of consumer credit information.
  43. Madanes, Rodrigo; Sopieva, Natasha Valerie; Nilsson, Linus; Corr, Nick, Communication system.
  44. Barton, William F.; Galanes, Francisco M.; Ockene, Lawrence M.; Ramakrishna, Anand; Saraf, Tal, Communications using different modalities.
  45. Sanchez, Eric Jason, Concealing a personal number.
  46. Votaw, Elizabeth S.; Belchee, William B., Configuring access to online accounts for third parties not associated with the online account.
  47. Whitney, Jason Kent; Delker, Jason R., Covert message redaction and recovery in a wireless communication device.
  48. Dean, Michael John; Kapczynski, Mark Joseph, Credit card account data extraction.
  49. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Credit report timeline user interface.
  50. Wasser, Jeremy; Felice-Steele, Michelle; Nies, Melinda; Giltner, Luke, Credit score goals and alerts systems and methods.
  51. Arnold, Karl; Hunt, III, Herbert Harris, Credit utilization tracking and reporting.
  52. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Data transfer and control among multiple computer devices in a gaming environment.
  53. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  54. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  55. Bye, Stephen James; Paczkowski, Lyle W.; Schlesener, Matthew C., Delivering digital content to a mobile device via a digital rights clearing house.
  56. Doui, Takayuki, Device administration apparatus, device administration method and recording medium.
  57. Cordes, Kevin R.; Loman, Clinton H.; Mantel, Brian D.; Paczkowski, Lyle W.; Steele, Kenneth R., Digest of biographical information for an electronic device with static and dynamic portions.
  58. Cordes, Kevin R.; Loman, Clinton H.; Mantel, Brian D.; Paczkowski, Lyle W.; Steele, Kenneth R., Digest of biographical information for an electronic device with static and dynamic portions.
  59. Kapczynski, Mark Joseph, Digital identity.
  60. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  61. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  62. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  63. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Electrical transmission among interconnected gaming systems.
  64. Greisen, David J.; Greisen, Daniel H., Electronic lock and method.
  65. Akin, Jeremiah Joseph, Electronic payment restriction.
  66. Paczkowski, Lyle W.; Schlesener, Matthew C., Enablement of a trusted security zone authentication for remote mobile device management systems and methods.
  67. Kritt, Barry Alan; Law, Douglas Alan; Vargas, Juan F., Enabling access to removable hard disk drives.
  68. McRoberts, Leo Michael; Paczkowski, Lyle W.; Rondeau, David E., End-to-end trusted communications infrastructure.
  69. McRoberts, Leo Michael; Paczkowski, Lyle W.; Rondeau, David E., End-to-end trusted communications infrastructure.
  70. Cope, Warren B.; Paczkowski, Lyle W., Extended trusted security zone radio modem.
  71. Bertz, Lyle T.; Bye, Stephen J.; Sershen, Daniel J., File retrieval in real-time brokering of digital content.
  72. DeLuca, Lisa Seacat; Do, Lydia Mai, Flexible display security CAPTCHA bends.
  73. Bertz, Lyle T.; Bye, Stephen J.; Paczkowski, Lyle W.; Sershen, Daniel J., Framework for real-time brokering of digital content delivery.
  74. Bertz, Lyle T.; Bye, Stephen J.; Paczkowski, Lyle W.; Sershen, Daniel J., Framework for real-time brokering of digital content delivery.
  75. Mates, John W., Generating a challenge response image including a recognizable image.
  76. Piersol, Kurt W., Generating log with location and accelerometer history.
  77. Harrison, Ryan James, Generation of one time use login pairs via a secure mobile communication device for login on an unsecure communication device.
  78. Bertz, Lyle T.; Paczkowski, Lyle W., Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers.
  79. Warren, Jeremy B., Home automation via voice control.
  80. Khen, Amnon; Hodgman, Roy; Kaufman, Alon, Human interaction detection.
  81. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Identity blocking service from a wireless service provider.
  82. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Identity blocking service from a wireless service provider.
  83. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Identity blocking service from a wireless service provider.
  84. Domenikos, Steven D.; Astras, Stamatis; Seri, Iris, Identity protection.
  85. Sharma, Vishnu, Increased communication security.
  86. Sharma, Vishnu, Increased communication security.
  87. Sharma, Vishnu, Increased communication security.
  88. Sharma, Vishnu, Increased communication security.
  89. Sharma, Vishnu, Increased communication security.
  90. Sharma, Vishnu, Increased communication security.
  91. Sharma, Vishnu, Increased communication security.
  92. Sharma, Vishnu, Increased communication security.
  93. Sharma, Vishnu, Increased communication security.
  94. Sharma, Vishnu, Increased communication security.
  95. Marquardt, Ronald R.; Paczkowski, Lyle W., Infrastructure for secure short message transmission.
  96. Freund, Thomas J.; Grisby, Travis M.; Lamb, Albert A.; Surprenant, Lee M., Interactive video captcha.
  97. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Interprocess communication regarding movement of game devices.
  98. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., JTAG fuse vulnerability determination and protection using a trusted execution environment.
  99. Dubey, Sankalp; Venkataramani, Srinath; Garimella, Phalgun, Knowledge-based authentication based on tracked credential usage.
  100. Dean, Michael John; Kapczynski, Mark Joseph, Lifescore.
  101. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  102. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  103. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a web advertiser.
  104. Zellner, Samuel N.; Enzmann, Mark J.; Morton, Jr., Robert T., Location blocking service from a wireless service provider.
  105. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Jr., Robert T., Location blocking service from a wireless service provider.
  106. Zellner, Samuel N.; Enzmann, Mark J.; Moton, Robert T., Location blocking service from a wireless service provider.
  107. Zellner, Samuel, Location-based security rules.
  108. Hoesl, Mark J., Managing security restrictions on a resource in a defined environment.
  109. Nelson, Tracy L.; Paczkowski, Lyle W., Mated universal serial bus (USB) wireless dongles configured with destination addresses.
  110. Agrawal, Banit; Bidarkar, Rishi; Kurkure, Uday; Magdon-Ismail, Tariq; Sivaraman, Hari; Spracklen, Lawrence, Measurement of remote display performance with image-embedded markers.
  111. Assadi, Houssem; Habermacher, Loïc; Louet, Erwan, Method and a device for making a computer application secure.
  112. Bjorn, Vance; Katkov, Igor; Lipin, Sergey; Santini, Fabio, Method and apparatus for an end user identity protection suite.
  113. Kuo, Christine E.; Kuo, David E.; Wu, Hui-Hsin; Kuo, James S., Method and apparatus for asynchronous dynamic password.
  114. Schultz, Paul T.; Hahn, Mark J.; Sartini, Robert A.; Swinton, Jeffrey H., Method and apparatus for providing multi-sensor multi-factor identity verification.
  115. Sriraghavan, Priyanka G.; Nrusimhan N. V., Lakshmi, Method and apparatus for providing user authentication based on user actions.
  116. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  117. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  118. Weiss, Kenneth P., Method and apparatus for secure access payment and identification.
  119. Hughes, James P.; Tow, Robert F., Method and apparatus for secure information distribution.
  120. Zhang, Jiang; Chen, Peter; Franks, Bill; Medvinsky, Alexander, Method and apparatus for secure management of debugging processes within communication devices.
  121. Wei, Ran; Yang, Jie, Method and device for classifying and processing data in instant messaging system.
  122. Perlman, Jeffrey W.; Kearney, Michael J.; Lee, Timothy M.; Storey, Gregory, Method and system for processing micropayment transactions.
  123. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory.
  124. Krstic, Ivan; Martel, Pierre-Olivier J.; Hughes, Gregory Daniel, Method for managing security of a data processing system with configurable security restrictions.
  125. Ganesan, Ravi, Method for secure site and user authentication.
  126. Ganesan, Ravi, Method for secure site and user authentication.
  127. Vidal, Joel, Method, device, and system of accessing online accounts.
  128. Corlett, Douglas Dwyer; Weber, Jeffrey Lee; Larson, Todd Andrew; Hagerman, Ronald Christopher; Jones, Adam D.; Huynh, Frank, Methods and credential servers for controlling access to a computer system.
  129. Truskovsky, Alexander; Bender, Christopher Lyle; Martin, Daryl Joseph, Methods and devices for detecting unauthorized access to credentials of a credential store.
  130. Kominar, Jeremy L.; Adams, Neil Patrick; Truskovsky, Alexander; Bender, Christopher Lyle; Martin, Daryl Joseph, Methods and devices for providing warnings associated with credentials to be stored in a credential store.
  131. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  132. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  133. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  134. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  135. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  136. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  137. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  138. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  139. Kanevsky, Dimitri; Yung, Marcel, Methods and systems for online access credential transition.
  140. Pineau, Richard; Pineau, Adam, Methods and systems for remote management of security systems.
  141. McCracken, Jr., Billy Gene; Spanel, Robert L.; Urbanek, Robert E., Mobile communication device profound identity brokering framework.
  142. McCracken, Jr., Billy Gene; Spanel, Robert L.; Urbanek, Robert E., Mobile communication device profound identity brokering framework.
  143. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Mobile playing card devices.
  144. Spracklen, Lawrence Andrew, Monitoring audio fidelity and audio-video synchronization.
  145. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  146. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  147. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  148. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  149. Jones, Jeffrey Dick; Nolan, Sean Patrick; Apacible, Johnson T.; Varadan, Vijay; Guarraci, Brian J.; White, Christopher C., Multiple entity authorization model.
  150. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services.
  151. Jiang, Tao T T; Romano, George J.; Zhao, Guo Xin, Obfuscated passwords.
  152. Lu, Zhou; Yu, Huazhang, One time password generating method and apparatus.
  153. Barton, William F.; Galanes, Francisco M.; Ramakrishna, Anand; Ranjan, Vishwa; Saraf, Tal, Outgoing call classification and disposition.
  154. Mahmoud Abd Alla, Hanan Ahmed Hossni; Alghathbar, Khaled Soliman, Password generation methods and systems.
  155. Perlman, Jeffrey William, Peer-to-peer and group financial management systems and methods.
  156. Perlman, Jeffrey William, Peer-to-peer and group financial management systems and methods.
  157. Bar, Nadav; Jurgenson, Tom, Personalized inferred authentication for virtual assistance.
  158. Miller, Mark A.; Alderucci, Dean P.; Bradshaw, Thomas D., Portable electronic charge device for card devices.
  159. Duane, William M., Powering security devices.
  160. Bye, Stephen James; Paczkowski, Lyle W.; Schlesener, Matthew C., Protection for multimedia files pre-downloaded to a mobile device.
  161. Kapczynski, Mark Joseph, Providing credit data in search results.
  162. Dean, Michael John; Kapczynski, Mark Joseph, Providing credit inquiry alerts.
  163. Spracklen, Lawrence Andrew; Agrawal, Banit; Bidarkar, Rishi, Quality evaluation of multimedia delivery in cloud environments.
  164. Cordes, Kevin R.; Loman, Clinton H.; Mantel, Brian D.; Paczkowski, Lyle W.; Steele, Kenneth R., Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device.
  165. Bidarkar, Rishi; Spracklen, Lawrence; Agrawal, Banit; Makhija, Vikram, Real-time, interactive measurement techniques for desktop virtualization.
  166. Pravetz, James D.; Steele, Joseph D.; Agrawal, Sunil, Relying party specifiable format for assertion provider token.
  167. Ichinose, Susumu; Takaya, Kentaro; Kato, Kikuji; Shirouzu, Hiroaki; Hayakawa, Shinpei, Remote access method.
  168. Martin, Christopher D., Remote control of a security system using telephone device.
  169. Agrawal, Banit; Bidarkar, Rishi; Kurkure, Uday; Magdon-Ismail, Tariq; Sivaraman, Hari; Spracklen, Lawrence, Remote display performance measurement triggered by application display upgrade.
  170. Agrawal, Banit; Bidarkar, Rishi; Kurkure, Uday; Magdon-Ismail, Tariq; Sivaraman, Hari; Spracklen, Lawrence Andrew, Remote display performance measurement triggered by application display upgrade.
  171. Bertz, Lyle T.; Bye, Stephen J.; Sershen, Daniel J., Reservations in real-time brokering of digital content delivery.
  172. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device.
  173. Wall, Charles, Secret supplemental username.
  174. Prabhu, Triveni; Neelaraddi, Reshma Hanamantharaddi; Bhattacharya, Debojyoti; Krishnarao, Niranjan Sathyanarayanarao, Secure access control to an embedded device through a networked computer.
  175. Ting, David M. T.; Boone, Pieter-Jan; Ford, Timothy, Secure access supersession on shared workstations.
  176. Wu, Paul Ying-Fung; Nathan, Richard J.; Tredennick, Harry Leslie, Secure communications using loop-based authentication flow.
  177. Gasparini, Louis A.; Harris, Jr., William H.; Park, Do-Pil (Don), Secure network computing.
  178. Gasparini, Louis A.; Harris, Jr., William H.; Park, Do-Pil (Don), Secure network computing.
  179. Kunkel, Philip M.; Paczkowski, Lyle W., Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning.
  180. Katzer, Robin D.; Paczkowski, Lyle W., Secure placement of centralized media controller application in mobile access terminal.
  181. Pravetz, James D.; Steele, Joseph D.; Agrawal, Sunil, Secure portable store for security skins and authentication information.
  182. Pravetz, James D.; Steele, Joseph Donovan; Agrawal, Sunil, Secure portable store for security skins and authentication information.
  183. Hall, David R.; Hall, Mark; Boswell, Craig, Secure remote actuation system.
  184. Hall, David R.; Hall, Mark; Boswell, Craig, Secure remote actuation system.
  185. Hall, David R.; Hall, Mark; Boswell, Craig, Secure remote actuation system.
  186. Hall, David R.; Hall, Mark; Boswell, Craig; Malone, Steven, Secure remote actuation system with dynamic constraints.
  187. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, Security control access system.
  188. Radicella, Michael; Matsumoto, Roger; Morrison, Matthew J.; Burkley, Richard; Chapman, Kriston; Jones, Shirl, Security control and access system.
  189. Cho, Eun-sung; Jung, Soo-Jin, Security method and system using touch screen.
  190. Bradshaw, Dexter P.; Tipton, William R.; Groff, Dana; Vacheri, Zoheb Lester Alexander, Security model for common multiplexed transactional logs.
  191. Kelly, Jason L., Security system.
  192. Ramachandran, Anirudh V.; Mundada, Yogesh H.; Bin Tariq, Muhammad Mukarram; Feamster, Nicholas G., Security systems and methods to reduce data leaks in enterprise networks.
  193. Faher, Mourad, Selection of access conditions for portable tokens.
  194. McCown, Jonathan; Hubner, Paul V.; Archer, Steven T.; Hubbard, Paul, Selective complex data entry from one time passwords for authentication.
  195. Dent, Nathan, Self-service device security alert response system.
  196. Dent, Nathan, Self-service device user asset condition alert.
  197. Roger, Edwin Sidney; Cundiff, Daniel Mark; Olson, Ari Edwin, Sensitive information handling on a collaboration system.
  198. Roger, Edwin Sidney; Cundiff, Daniel Mark; Olson, Ari Edwin, Sensitive information handling on a collaboration system.
  199. Matsuda, Araki; Hitaka, Yosato, Server apparatus, and control method and computer-readable storage medium therefor.
  200. Camenisch, Jan L.; Lehmann, Anja; Neven, Gregory; Preiss, Franz-Stefan; Samelin, Kai W., Server-assisted authentication.
  201. Driscoll, Kevin Raymond, Simple authentication of messages.
  202. Kapczynski, Mark Joseph; Dean, Michael John, Storage and maintenance of personal data.
  203. Martel, Pierre-Olivier; Jennings, Austin G., Storage volume protection using restricted resource classes.
  204. Urbanek, Robert E., Subscriber identity module virtualization.
  205. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  206. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  207. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  208. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., Surveying wireless device users by location.
  209. Nigam, Amit, System and method for asset tracking.
  210. Barnabo, Christopher E.; Greenlee, Gordan G., System and method for authentication to an application.
  211. O'Connor, Neil; Geary, Dara; McCormack, Tony, System and method for enhancing self-service security applications.
  212. Varadarajan, Rammohan, System and method for generating a dynamic card value.
  213. Varadarajan, Rammohan, System and method for generating a dynamic card value.
  214. Buss, Duane, System and method for implementing an extended authentication and authorization credential store.
  215. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  216. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  217. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  218. Zaitsev, Oleg V., System and method for password protection.
  219. Enzmann, Mark J.; Moton, Jr., Robert T.; Zellner, Samuel N., System and method for permission to access mobile location information.
  220. Bleahen, Micheal, System and method for preventing unauthorized access to information.
  221. Perlman, Jeffrey William; Dempsey, Caroline Grace, System and method for promotion processing and authorization.
  222. Azar, Cyrus; Brostoff, George, System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics.
  223. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N, System and method for remote control of appliances utilizing mobile location-based applications.
  224. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
  225. Moton, Jr., Robert T.; Enzmann, Mark J.; Zellner, Samuel N., System and method for remote control of appliances utilizing mobile location-based applications.
  226. Paczkowski, Lyle W.; Spanel, Robert L.; Urbanek, Robert E., System and method for secure USIM wireless network access.
  227. Pravetz, James D.; Steele, Joseph D.; Agrawal, Sunil, System and method for trusted embedded user interface for authentication.
  228. Zellner, Samuel N., System and method for using location information to execute an action.
  229. Zellner, Samuel N., System and method for using location information to execute an action.
  230. Perlman, Jeffrey William; Walsh, Sofia; Storey, Gregory Kenneth, System and method of validating a relationship between a user and a user account at a financial institution.
  231. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  232. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  233. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  234. Gottschalk, Jr., Harold E.; Caldwell, Michael; Carleton, Joel, System and methods for identifying compromised personally identifiable information on the internet.
  235. Gottschalk, Jr., Harold E.; Caldwell, Michael; Carleton, Joel, System and methods for identifying compromised personally identifiable information on the internet.
  236. Gottschalk, Jr., Harold E.; Caldwell, Michael; Carleton, Joel, System and methods for identifying compromised personally identifiable information on the internet.
  237. Cordes, Kevin R.; Loman, Clinton H.; Paczkowski, Lyle W.; Steele, Kenneth R., System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device.
  238. Carow, Michael D.; James, Vicki L., Systems and methods for authorization of information access.
  239. James, Vicki L., Systems and methods for authorization of information access.
  240. Perlman, Jeffrey William, Systems and methods for brokered authentication express seller links.
  241. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  242. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  243. Samineni, Naga Rohit, Systems and methods for differential access control based on secrets.
  244. Dixon, David Patrick; Harris, Gary Scott, Systems and methods for emergency duress security code and related instructions.
  245. Ott, Tammy Elizabeth; Thomsen, Daniel Jay, Systems and methods for performing security authentication based on responses to observed stimuli.
  246. Narayanan, Anantha; Cave, Ellis K.; Blaszczak, Bogdan; Broughton, Justin; Rangarajan, Mohan, Systems and methods for preventing sensitive information from being communicated into a non-secure environment.
  247. McMillan, Helen; Skurtovich, John Lawrence; Kress, Anita; Sumida, Timothy; McVey, Michael Charles, Systems and methods for providing an integrated identifier.
  248. Schultz, Paul T., Systems and methods for providing network-based voice authentication.
  249. Schultz, Paul T., Systems and methods for providing network-based voice authentication.
  250. Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C.; Shipley, Trevor D., Systems and methods for provisioning and using multiple trusted security zones on an electronic device.
  251. Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C.; Shipley, Trevor D., Systems and methods for provisioning and using multiple trusted security zones on an electronic device.
  252. Gottschalk Jr., Harold E., Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository.
  253. Gottschalk, Jr., Harold E., Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository.
  254. Courtright, Christopher Paul; Billman, Bradly Jay, Systems and methods for user authentication via mobile device.
  255. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  256. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  257. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  258. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  259. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  260. Keohane, Susann Marie; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Murillo, Jessica Carol; Shieh, Johnny Meng-Han, Techniques for presenting password feedback to a computer system user.
  261. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted code generation and verification to prevent fraud from maleficent external devices that capture data.
  262. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted display and transmission of digital ticket documentation.
  263. Paczkowski, Lyle W.; Parsel, William M.; Rajagopal, Arun, Trusted policy and charging enforcement function.
  264. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted processing location within a graphics processing unit.
  265. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone access to peripheral devices.
  266. Paczkowski, Lyle W.; Parsel, William M.; Schlesener, Matthew C., Trusted security zone communication addressing on an electronic device.
  267. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone containers for the protection and confidentiality of trusted service manager data.
  268. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone enhanced with trusted hardware drivers.
  269. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone re-provisioning and re-use capability for refurbished mobile devices.
  270. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone watermark.
  271. Paczkowski, Lyle W.; Ray, Amar N.; Sisul, James P., Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system.
  272. Paczkowski, Lyle W.; Ray, Amar N.; Sisul, James P., Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system.
  273. Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Schlesener, Matthew C.; Shipley, Trevor D., Trusted signaling in long term evolution (LTE) 4G wireless communication.
  274. Cho, Jung-Sik, Unified IC card.
  275. Weiss, Kenneth P., Universal secure registry.
  276. Weiss, Kenneth P., Universal secure registry.
  277. Weiss, Kenneth P., Universal secure registry.
  278. Lundy, Michael T.; Whitney, Jason K., Utilizing a mobile device to operate an electronic locking mechanism.
  279. Gargi, Ullas, Variable-strength security based on time and/or number of partial password unlocks.
  280. Loman, Clint H.; Paczkowski, Lyle W.; Spanel, Robert L., Verification of mobile device integrity during activation.
  281. Prchal, Ken; Slusar, Mark, Verification that a user attempting to access content is a human user.
  282. Slusar, Mark; Prchal, Ken, Verification that a user attempting to access content is a human user.
  283. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew Carl, Verifying Applications in Virtual Environments Using a Trusted Security Zone.
  284. Miller, Landon C. G., Water friend or foe system for global vessel identification and tracking.
  285. Agrawal, Banit; Bidarkar, Rishi N.; Satnur, Sunil; Makhija, Vikram, Watermarking and scalability techniques for a virtual desktop planning tool.
  286. Agrawal, Banit; Bidarkar, Rishi N.; Satnur, Sunil; Makhija, Vikram, Watermarking and scalability techniques for a virtual desktop planning tool.
  287. Katzer, Robin Dale; Paczkowski, Lyle W., Web server bypass of backend process on near field communications and secure element chips.
  288. Katzer, Robin Dale; Paczkowski, Lyle W., Web server bypass of backend process on near field communications and secure element chips.
  289. Tseng, Yin-Hung; Lin, Chung-Ming; Liu, Sheng-Chang, Wireless authentication system and wireless authentication method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로