$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Information record infrastructure, system and method

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
출원번호 UP-0899787 (2001-07-05)
등록번호 US-7587368 (2009-09-22)
발명자 / 주소
  • Felsher, David Paul
대리인 / 주소
    Milde & Hoffberg LLP
인용정보 피인용 횟수 : 178  인용 특허 : 672

초록

A method of maintaining electronic medical records, comprising the steps of receiving a medical transaction record, encrypted with an encryption key relating to a patient association of the file, accessing the encrypted medical transaction record according to a patient association; and further encry

대표청구항

What is claimed is: 1. A method, comprising the steps of: storing a plurality of digital records and respective access rules for each digital record in a computer memory associated with a server system; receiving a request for access, from a remote computer, to access a digital record stored in the

이 특허에 인용된 특허 (672)

  1. Sidlauskas David P. (San Jose CA), 3D hand profile identification apparatus.
  2. Dugan Andrew J. ; McDysan David E., ATM virtual private networks.
  3. Arnold Todd W. (Charlotte NC), Access control apparatus and method.
  4. Carroll Gary T. (Boulder CO) Pilmanis George J. (Boulder CO) Stinton Vincent D. (Littleton CO), Adaptable electronic monitoring and identification system.
  5. Brickell Ernest F. ; Sudia Frank W. ; Kravitz David William ; Freund Peter C. ; Angeles Patrick J., Adaptive multi-step digital signature system and method of operation thereof.
  6. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  7. Camp Linda Jean ; Tygar Justin D. ; Harkavy Michael R., Anonymous certified delivery.
  8. Micali Silvio, Anonymous information retrieval system (ARS).
  9. Rhoads Geoffrey B., Anti-piracy system for wireless telephony.
  10. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  11. Holloway Christopher J.,GBX ; Matyas ; Jr. Stephen Michael, Apparatus and method for authentication of printed documents.
  12. Faulkner Keith W. (Reading GBX), Apparatus and method for biometric identification using silhouette and displacement images of a portion of a person\s ha.
  13. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  14. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  15. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  16. Keagy John Martin ; Pinkhasik Naum ; Muzel Alexander,RUX, Apparatus and method for electronically acquiring fingerprint images.
  17. Yemini Yechiam (Briarcliff Manor NY) Yemini Shaula (Briarcliff Manor NY) Kliger Shmuel (Ossining NY), Apparatus and method for event correlation and problem reporting.
  18. Taylor Kenneth E. (Champaign IL) Glickman Jeff B. (Champaign IL), Apparatus and method for matching image characteristics such as fingerprint minutiae.
  19. Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
  20. Vu Hung T. (Ottawa CAX), Apparatus and method for providing a secure gateway for communication and data exchanges between networks.
  21. Timson Colin J.,GBX ; Yap Chas Hock Eng,GBX ; Kelly Sean,GBX, Apparatus and method for providing access to secured data or area.
  22. Muratani Hirofumi,JPX ; Muto Akihiro,JPX, Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use.
  23. Hassan Amer Aref ; Hershey John Erik ; Chennakeshu Sandeep, Apparatus and method for secure communication based on channel characteristics.
  24. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  25. Davis Derek L. ; Jones Peter, Apparatus and method for securing captured data transmitted between two sources.
  26. Kanevsky Dimitri ; Maes Stephane Herman, Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic mo.
  27. Benton William M. (Fort Lauderdale FL) Mee William (Pompano Beach FL), Apparatus for carrying out financial transactions via a facsimile machine.
  28. Bradley William C. ; Mesher Mark L., Apparatus for coupling multiple data sources onto a printed document.
  29. Bradley William C. ; Mesher Mark L., Apparatus for coupling multiple data sources onto a printed document.
  30. Kenneth Alexander R.,GBX ; Stewart Mark J.,GBX, Apparatus for issuing integrated circuit cards.
  31. Swartz Jerome ; Joseph Eugene ; Katz Joseph, Apparatus for processing symbol-encoded credit card information.
  32. Ciacelli Mark Louis ; Urda John William ; Lam Wai Man ; Kouloheris Jack Lawrence ; Fetkovich John Edward, Apparatus, method and computer program product for protecting copyright data within a computer system.
  33. DiRienzo Andrew L. ; Powell ; Jr. Raymond H. J., Attachment integrated claims system and operating method therefor.
  34. Berson William ; Bernobich Elizabeth ; Heiden Richard W. ; Potoczek Richard A. ; Sisson Robert W. ; Violante Anthony F., Auditable security system for the generation of cryptographically protected digital data.
  35. Tanaka Toshiaki,JPX ; Hada Satoshi,JPX ; Yamada Mitsuru,JPX, Authentication method and system using IC card.
  36. Tabuki Takaaki,JPX, Authentication method for networks.
  37. Kusakabe Susumu,JPX ; Takada Masayuki,JPX, Authentication method, communication method, and information processing apparatus.
  38. Meadows ; II Dexter L. ; Pouratian Allen J., Automated fingerprint identification system.
  39. Langhans Stephen (San Francisco CA) Goodman Laurence M. (Foster City CA) Shapiro Sigman L. (Alamo CA), Automated purchasing control system.
  40. Chan Chih S. ; Moussa Mohamed A., Automated verification and prevention of spoofing for biometric data.
  41. Wildes Richard P. (Princeton NJ) Asmuth Jane C. (Princeton NJ) Hanna Keith J. (Princeton NJ) Hsu Stephen C. (East Windsor NJ) Kolczynski Raymond J. (Trenton NJ) Matey James R. (Hamilton Township ; Me, Automated, non-invasive iris recognition system and method.
  42. Wildes Richard Patrick ; Asmuth Jane Circle ; Hanna Keith James ; Hsu Stephen Charles ; Kolczynski Raymond Joseph ; Matey James Regis ; McBride Sterling Eduard, Automated, non-invasive iris recognition system and method.
  43. Li Jim Y. ; Cobbs Archie L. ; Ozzello Paul D., Automatic configuration for internet access device.
  44. Tomko George J. (East York CAX) Soutar Colin (Toronto CAX) Schmidt Gregory J. (Toronto CAX), Biometric controlled key generation.
  45. Payne John H., Biometric face recognition for applicant screening.
  46. Price-Francis Stephen, Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives.
  47. Dunn Christopher S.,CAX ; Borza Stephen J.,CAX ; Freedman Gordon,CAX, Biometric input device with peripheral port.
  48. Borza Michael Andrew,CAX, Biometric input with encryption.
  49. McCoy Mike ; Chu Kim-Ying ; Annulis James M., Biometric personnel identification system.
  50. Brady Mark J., Biometric recognition using a classification neural network.
  51. DiMaria Peter C. ; Madsen James, Biometric time and attendance system with epidermal topographical updating capability.
  52. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  53. Borza Stephen J.,CAX, Biometrically secured control system for preventing the unauthorized use of a vehicle.
  54. Philipp Harald (651 Holiday Dr. ; Bldg 5 ; Ste. 300 Pittsburgh PA 15200), Capacitively coupled identity verification and escort memory apparatus.
  55. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Card-computer moderated systems.
  56. Stinson Michael C. ; Templer ; Jr. John W. ; Clower Dyron, Cardless automated teller transactions.
  57. Colvin ; Sr. Bryan, Centralized secure communications system.
  58. Micali Silvio, Certificate issue lists.
  59. Weiant ; Jr. Monroe A. ; Ryan ; Jr. Frederick W., Certificate meter with selectable indemnification provisions.
  60. Micali Silvio, Certificate revocation system.
  61. Micali Silvio, Certificate revocation system.
  62. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Certificate revocation system.
  63. Deindl Michael,DEX ; Hanel Walter,DEX ; Schaal Albert,DEX, Certification of cryptographic keys for chipcards.
  64. Trew Timothy I. P. (Horley GB2) Gallery Richard D. (Horley GB2), Classifying faces.
  65. Schneiderman Barry (P.O. Box 53 Rye NH 03870), Clinical database of classified out-patients for tracking primary care outcome.
  66. Kunzelman Kevin ; Hutto Sterling, Common session token system and protocol.
  67. Yamamoto Takahisa,JPX, Communication apparatus and a communication system.
  68. Tatebayashi Makoto,JPX ; Matsuzaki Natsume,JPX ; Harada Syunji,JPX ; Omori Motoji,JPX ; Kozuka Masayuki,JPX ; Yamauchi Kazuhiko,JPX, Communication device which performs two-way encryption authentication in challenge response format.
  69. Brown Daniel Peter ; Finkelstein Louis David ; Pennypacker Frank C., Communication method and device.
  70. Davis Michael G. ; Harting David G. ; Burr Scott F. ; Davies Robert V. ; Bernardi Robert J., Communications headset with universally adaptable receiver and voice transmitter.
  71. Coiera Enrico Guglielmo,GBX ; Gupta Ajay,INX, Communications system for establishing a communication channel on the basis of a functional role or task.
  72. Reed Drummond Shattuck ; Heyman Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Communications system for transferring information between memories according to processes transferred with the information.
  73. Sandford ; II Maxwell T. ; Handel Theodore G. ; Bradley Jonathan N., Compression embedding.
  74. Sandford ; II Maxwell T. ; Handel Theodore G. ; Bradley Jonathan N., Compression embedding.
  75. Narasimhalu Arcot Desai,SGX ; Deng Huijie,SGX ; Wang Weiguo,SGX, Computationally efficient method for trusted and dynamic digital objects dissemination.
  76. Ford Warwick S. (Nepean CAX) Wiener Michael J. (Nepean CAX), Computer network cryptographic key distribution system.
  77. Berlin Howard ; Bochsler Jack W., Computer network debit disk used for prepayment to transfer information from a central computer.
  78. Veneklase Brian J., Computer security system.
  79. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  80. Hunt William A. ; Yauch Elizabeth F. ; Denovich Mark, Computer software for processing medical billing record information.
  81. Karpf Ronald S., Computer system and method for accessing medical information over a network.
  82. Chandos Ronald V. (Tempe AZ) Foster Robert I. (Mesa AZ), Computer system and method for secure remote communication sessions.
  83. Eberhardt Silvio P., Computer system and method for storing medical histories using a smartcard to store data.
  84. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  85. Benson Glenn,DEX, Computer system for protecting software and a method for protecting software.
  86. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  87. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  88. Thorsen Hans Verner,SEX, Computer-implemented control of access to atomic data items.
  89. Wical Kelly, Concept knowledge base search and retrieval system.
  90. Sullivan Robert R. ; Acken John M. ; Aucsmith David W., Conditional access and content security method.
  91. Johns-Vano Kerry Lucille ; Harrison David Michael ; Carswell Phillip Anthony ; Perea William Louis ; Lien Ty Bao, Configurable cryptographic processing engine and method.
  92. Traw Chandler Brendan Stanton ; Aucsmith David Wayne, Content protection for transmission systems.
  93. Gong Li, Controlling access to a resource.
  94. McDonough John C. ; Saravanan Thiagarajan ; Amatucci Michael P. ; Iannucci Louis A. ; Ingham David M., Controlling access to information.
  95. Park Tae Joon,KRX, Copy prevention method and apparatus for digital video system.
  96. Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Counterfeit proof ID card having a scrambled facial image.
  97. Becker Glenn ; Dahbour Salam H., Covert digital identifying indicia for digital image.
  98. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  99. Scheidt Edward M. ; Wack C. Jay, Cryptographic communication process and apparatus.
  100. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  101. Moreau Thierry,CAXITX H1M 2A1, Cryptographic data integrity with serial bit processing and pseudo-random generators.
  102. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  103. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  104. Bjorn Vance, Cryptographic key generation using biometric data.
  105. Dai Wei, Cryptographic system and method with fast decryption.
  106. Miyaguchi Shoji (Yokohama JPX), Cryptosystem.
  107. Smid Miles E. (Silver Spring MD) Branstad Dennis K. (Gaithersburg MD), Crytographic key notarization methods and apparatus.
  108. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  109. Beker Henry J. (Wokingham GB2) Halliden Paul W. (Salisbury GB2) Friend John M. K. (Purlieu GB2), Data communication systems and methods.
  110. Saito Makoto,JPX ; Momiki Shunichi,JPX, Data copyright management system.
  111. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  112. Sanford ; II Maxwell T. ; Handel Theodore G., Data embedding employing degenerate clusters of data having differences less than noise value.
  113. Heer Daniel Nelson ; Maher David P., Data encryption security module.
  114. Saito Makoto,JPX, Data management system.
  115. Saito Makoto,JPX, Data management system.
  116. Yin John, Data security system and method.
  117. Sandford ; II Maxwell T. ; Handel Theodore G., Data validation.
  118. Fernadez Alberto J. (Miami FL), Data verification method and magnetic media therefor.
  119. Gower Stefan F., Database system with methods for controlling object interaction by establishing database contracts between objects.
  120. Gower Stefan F. (Fremont CA), Database system with methods for controlling object interaction by establishing database contracts between objects.
  121. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  122. Helland Patrick James ; Limprecht Rodney ; Al-Ghosein Mohsen ; Reed David R. ; Devlin William D., Declarative and programmatic access control of component-based server applications using roles.
  123. Alessandro Manneschi,ITX, Dector system for access control, and a detector assembly for implementing such a system.
  124. Sloane Neil J. A. (Highland Park NJ), Delivery of medical services using electronic data communications.
  125. Boule Jean-Pierre (12 rue de la Rsistance 14540 Soliers FRX) Hamel Dominique (37 rue Lanfranc 14000 Caen FRX) Menconi Martial (Rsidence Olympia 14000 Caen FRX), Device and method to render secure the transfer of data between a videotex terminal and a server.
  126. Tatebayashi Makoto,JPX ; Matsuzaki Natsume,JPX ; Fukushima Yoshihisa,JPX ; Hirayama Koichi,JPX ; Ishihara Atsushi,JPX, Device authentication system which allows the authentication function to be changed.
  127. Mills Robert A. (Gambrills MD) Unkenholz Mark R. (Eldersburg MD) Wilson Mark W. (Columbia MD) Burroughs John E. (Annapolis MD), Device for and method of cryptography that allows third party access.
  128. Kigo Kenichiro,JPX ; Kyojima Masaki,JPX ; Kojima Shunichi,JPX ; Shin Kil-Ho,JPX, Device for authenticating user's access rights to resources and method.
  129. Selker Harry P. ; Griffith John L. ; Beshansky Joni R., Diagnostic tool using a predictive instrument.
  130. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  131. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  132. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  133. Candelore Brant, Digital coupons for pay televisions.
  134. Renaud Benjamin J., Digital signatures for data streams and data archives.
  135. Cox Ingemar J. ; Miller Matthew L.,LTX ; Tanaka Kazuyoshi,JPX ; Wakasu Yutaka,JPX, Digital watermarking.
  136. Wang Shen-ge, Digital watermarking using conjugate halftone screens.
  137. Knox Keith T., Digital watermarking using stochastic screen patterns.
  138. LeBourgeois John H., Digitally certifying a user identity and a computer system in combination.
  139. Micali Silvio, Distributed split-key cryptosystem and applications.
  140. Smithies Christopher Paul Kenneth,GBX ; Newman Jeremy Mark,GBX, Document and signature data capture system and method.
  141. Grantham Paul V. ; Lyles Joseph B. ; Smith William T., Document communications controller.
  142. Jachimowicz Karen E. ; Novis Scott R. ; Barry Dennis, Dual card smart card reader.
  143. Findley ; Jr. Raymond ; Dixon Robert, Dual smart card access control electronic data storage and retrieval system and methods.
  144. Scanlan Thomas K., Dynamic assignment of security parameters to web pages.
  145. Bowker J. Kent ; Miller Stephen G. ; Lubard Stephen C. ; Wartman John M. ; Bolton Clive, Economical skin-pattern-acquisition and analysis apparatus for access control; systems controlled thereby.
  146. Yacobi Yacov (Berkeley Heights NJ), Efficient electronic money.
  147. Jarecki Stanislaw ; Odlyzko Andrew M., Efficient micropayment system.
  148. Hardy Ann Ewing ; Hardy Norman ; Tribble E. Dean, Electronic authority server.
  149. Smorodinsky Lev, Electronic bill presentment and payment system which deters cheating by employing hashes and digital signatures.
  150. Takahashi Naoki,JPX ; Shiina Hiromitsu,JPX ; Matsunawa Masahito,JPX ; Yamada Shinichi,JPX ; Kamada Yoshiharu,JPX ; Miyake Tsuyoshi,JPX ; Okamura Akira,JPX ; Tominaga Masasuke,JPX, Electronic business transaction system with notarization database and means for conducting a notarization procedure.
  151. Fujisaki Eiichiro,JPX ; Okamoto Tatsuaki,JPX ; Ohta Kazuo,JPX, Electronic cash implementing method using a trustee.
  152. Okamoto Tatsuaki,JPX, Electronic cash implementing method with a surveillance institution, and user apparatus and surveillance institution apparatus for implementing the same.
  153. Loosmore N. Bert (New York NY) Ehrman Kenneth (New York NY) Jagid Bruce (New York NY), Electronic control system/network.
  154. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  155. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  156. Anderson Robert ; Schultz George R. ; Heptig John P., Electronic encryption device and method.
  157. Doggett John (Brookline MA) Jaffe Frank A. (Sharon MA) Anderson Milton M. (Fair Haven NJ), Electronic funds transfer instruments.
  158. Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
  159. Landfield Kent B. (Papillion NE) Zechmann Albert J. (Omaha NE), Electronic mail management system for operation on a host computer system.
  160. Landfield Kent B. ; Zechmann Albert J., Electronic mail management system for operation on a host computer system.
  161. Myers Dennis Lee ; Culp Kim Steven, Electronic medical record using text database.
  162. Evans Jae A., Electronic medical records system.
  163. Earl Mark J. ; Valenzuela Antonio P. ; Toll Michael C. ; Larson Wayne F., Electronic security system.
  164. Rosen Sholom S., Electronic-monetary system.
  165. Rosen Sholom S., Electronic-monetary system.
  166. Rosen Sholom S., Electronic-monetary system.
  167. Rosen Sholom S., Electronic-monetary system.
  168. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  169. Cass Todd A. ; Tong Xin, Encoding data in color images using patterned color modulated image regions.
  170. Okamoto Eiji,JPX ; Mambo Masahiro,JPX ; Domyo Seiichi,JPX ; Tsuchiya Hiroyoshi,JPX ; Kawai Tooru,JPX ; Takaragi Kazuo,JPX ; Torii Naoya,JPX ; Tanida Takeshi,JPX, Encrypted data recovery method using split storage key and system thereof.
  171. Heer Daniel N. ; Rance Robert J., Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network.
  172. Saito Tamio,JPX ; Tokuyo Masanaga,JPX ; Iida Ichiro,JPX ; Takada Yuji,JPX, Encryption communication system using an agent and a storage medium for storing that agent.
  173. Wright Andrew S.,CAX, Encryption of data packets using a sequence of private keys generated from a public key exchange.
  174. Everhart Joseph R. (Holmdel NJ) Osborn Jeffrey G. (Old Bridge NJ), Encryption system key distribution method and apparatus.
  175. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  176. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  177. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  178. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  179. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  180. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  181. Weiss Kenneth P. (Newton MA), Enhanced security for a secure token code.
  182. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  183. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  184. Hoffberg Steven Mark ; Hoffberg-Borghesani Linda Irene, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  185. Schneier Bruce ; Kelsey John M., Event auditing system.
  186. Brothers Harlan Jay ; Genly Chris Hind, Event verification system.
  187. Coffin Jeffrey S. ; Ingram Darryl, Facial recognition system for security access and identification.
  188. Lermuzeaux Jean-Marc (St Michel sur Orge FRX) Emery Thierry (St Germain les Arpajon FRX) Gonthier Patrice (Antony FRX), Facility for detecting intruders and suspect callers in a computer installation and a security system including such a f.
  189. Henry Paul S. (Holmdel NJ), Fast real-time public key cryptography.
  190. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  191. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  192. Fielder Guy L. ; Alito Paul N., File encryption method and system.
  193. Shrader Theodore Jack London, Filter rule validation and administration for firewalls.
  194. Bonder Ronne ; Fisher ; Jr. Albert J., Fingerprint identification security system.
  195. Salatino Matthew M. ; Setlak Dale R. ; Newton Mike ; Adkins Cal ; Van Vanno Nicolaas W., Fingerprint sensor and token reader and associated methods.
  196. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  197. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  198. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  199. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  200. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  201. Anand Rangachari ; Giraud Frederique-Anne ; Islam Nayeem ; Jaeger Trent Ray ; Liedtke Jochen, Flexible and dynamic derivation of permissions.
  202. Bhaskaran Vasudev ; Ratnakar Viresh, Fragile watermarks for detecting tampering in images.
  203. Copley Jeffrey D. ; Whited John ; Brown ; Jr. Marcus V. ; Kohli Pardeep, Fully flexible routing service for an advanced intelligent network.
  204. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  205. Johnson Donald B., Generating unique and unpredictable values.
  206. Rhoads Geoffrey B., Graphics processing system employing embedded code signals.
  207. Harkins Dan, Group key distribution.
  208. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Guaranteed partial key-escrow.
  209. Smyers Scott D., Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network.
  210. Raymond Stephen A. ; Gordon Geoffrey E. ; Singer Daniel B., Health monitoring system.
  211. Bouricius Willard G. (Katonah NY) Feistel Horst (Lexington MA), High security system for electronic signature verification.
  212. Weber David C. ; Trolinger James D., Holographic labeling and reading machine for authentication and security applications.
  213. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Human factored interface incorporating adaptive pattern recognition based controller apparatus.
  214. Pearson Peter Kelley ; Rowley Thomas Edward ; Upton Jimmy Ray, Identification and security using biometric measurements.
  215. Keskin Yucel K. (Cupertino CA) Gokcebay Asil T. (San Francisco CA), Identification card and access control device.
  216. Marckini Eugene F., Identification card with delimited usage.
  217. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  218. Swanson Mitchell D. ; Tewfik Ahmed H. ; Hosur Srinath, Image and document management system for content-based retrieval.
  219. Komatsu Kenichi (Nishinasuno-machi JPX) Nishihara Eitaro (Otawara JPX) Tawara Kiyoshi (Otawara JPX) Fujimoto Seiji (Otawara JPX), Image data management system particularly for use in a hospital.
  220. Colvill Robert H. (Surrey GB2) Lowther Derek R (Hampshire GB2) Shenton Colin N. (Surrey GB2) Shillito Robert T. (Somerset GB2) Trinder Rosemary (Suffolk GB2) Wallis Andrew F. (Bath GB2), Image handling facilitating computer aided design and manufacture of documents.
  221. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  222. Ginzboorg Philip,FIX ; Ekberg Jan-Erik,FIX ; Yla-Jaaski Antti,FIX, Implementation of charging in a telecommunications system.
  223. Kuhn D. Richard, Implementation of role-based access control in multi-level secure systems.
  224. Toyoda Haruyoshi,JPX ; Kobayashi Yuuji,JPX ; Mukohzaka Naohisa,JPX, Individual identification apparatus for selectively recording a reference pattern based on a correlation with comparative patterns.
  225. Bull David Stanley ; Carr ; Jr. Robert Neal ; Offutt ; Jr. Joseph Robert, Information aggregation and synthesization system.
  226. Shimakawa Masato,JPX ; Akabane Makoto,JPX ; Hongchang Bao,JPX ; Rekimoto Junichi,JPX ; Kitano Hiroaki,JPX ; Sasano Kazunori,JPX ; Ishii Kazuo,JPX ; Yamada Keiichi,JPX ; Ogawa Hiroaki,JPX ; Kakuda Hir, Information processing apparatus and information processing method.
  227. Hara Hiroshi,JPX ; Hosoya Hideki,JPX, Information recording method for preventing alteration, information recording apparatus, and information recording medium.
  228. Choi Seung-ryeol,KRX, Information security system for tracing the information outflow and a method for tracing the same.
  229. Mark Andrew R., Information storage device for storing personal identification information.
  230. Moreau Thierry,CAX, Initial secret key establishment including facilities for verification of identity.
  231. Frailong Jean-Marc ; Price Charles A. ; Tardo Joseph John, Initializing and reconfiguring a secure network interface.
  232. McAllister Alex (Wheaton MD) Curry James (Herndon VA) Meador Frank (Baltimore MD), Intelligent recognition.
  233. Clark Paul C., Intelligent token protected system with network authentication.
  234. Chang Te-An ; Rostock Joseph R., Internet-web link for access to intelligent network service control.
  235. Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system with verification by comparison.
  236. Nishioka Mototsugu,JPX ; Umeki Hisashi,JPX ; Matsui Susumu,JPX, Key distribution method and system in secure broadcast communication.
  237. Aucsmith David Wayne, Key management system for DVD copyright management.
  238. Colbert Charles, Knuckle profile identity verification system.
  239. Colbert Charles (Yellow Springs OH), Knuckle profile indentity verification system.
  240. Hogl Christian,DEX, Locking device for systems access to which is time-restricted.
  241. Kuhns Roger J. (Tower Rd. Lincoln MA 01773) Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Low cost method employing time slots for thwarting fraud in the periodic issuance of food stamps, unemployment benefits.
  242. Matsuura Hirokazu (Yamatokoriyama JPX) Anzai Shunju (Nara JPX), Manual copying apparatus.
  243. Nelson Theodor Holm,JPX, Many-to-many payments system for network content materials.
  244. Adams Phillip M., Media-independent document security method and apparatus.
  245. Honda Hiroto,JPX ; Shiina Shinichi,JPX, Medical information management system.
  246. Ema Takehiro,JPX ; Nishihara Eitaro,JPX, Medical information processing system for supporting diagnosis.
  247. Newman Iris ; McSweeney ; Jr. Thomas, Medical practitioner credentialing system.
  248. Clark Melanie Ann ; Gold John Finley ; Huska Michael Edward ; Kabel Geoffrey Harold ; Graham Marc Merrill, Medical record management system and process with improved workflow features.
  249. Seto Hiromitsu,JPX ; Nishihara Eitaro,JPX ; Fukushima Yuki,JPX ; Nematbakhsh Mohammad Ali, Medical support system.
  250. Burks James L. (Pendleton KY) Schick Robert R. (Louisville KY) Schweitzer Sheila H. (Louisville KY), Medical transaction system.
  251. Stock Michael J. ; Davis Keith ; Myers James W., Memory card having a biometric template stored thereon and system for using same.
  252. Manneschi Alessandro (15 ; Via XXV Aprile (I) 52100 Arezzo ITX), Metal detector for control of access combined in an integrated form with a transponder detector.
  253. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support exper.
  254. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  255. Laubach Mark ; Baran Paul ; Raissinia Ali ; Gorman Kenneth ; Helton Sanford, Method and apparatus for an application interface module in a subscriber terminal unit.
  256. Arent Michael A., Method and apparatus for authenticating on-line transaction data.
  257. Hillis W. Daniel, Method and apparatus for authenticating recorded media.
  258. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  259. Bartoli Paul D. ; Griesmer Stephen J. ; Lidor Gideon ; Ronen Yzhak ; Tessier Jean, Method and apparatus for billing for transactions conducted over the internet.
  260. Seliger Robert (Winchester MA) Ehrhardt Fred W. (Lynnfield MA) Braunstein Andrew S. (Chestnut Hill MA), Method and apparatus for coordinating concurrent updates to a medical information database.
  261. Crandall Richard E., Method and apparatus for digital signature authentication.
  262. Ballantyne Douglas J.,CAX ; Mulhall Michael,CAX, Method and apparatus for electronically accessing and distributing personal health care information and services in hos.
  263. Barton James M., Method and apparatus for embedding authentication information within digital data.
  264. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  265. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for embedding data, including watermarks, in human perceptible images.
  266. Jakobsson Markus, Method and apparatus for encrypting, decrypting, and providing privacy for data values.
  267. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO) Engel George Lawrence (St. Louis MO) Hege Alan L. (St. Louis MO), Method and apparatus for fingerprinting and authenticating various magnetic media.
  268. Indeck Ronald S. ; Muller Marcel W. ; Morley ; Jr. Robert E., Method and apparatus for fingerprinting and authenticating various magnetic media.
  269. Prokoski Francine J. (Fairfax VA), Method and apparatus for flash correlation.
  270. Graunke Gary L. ; Aucsmith David W., Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation.
  271. Sadovnik Lev S. (Los Angeles CA) Lu Taiwei (Torrance CA), Method and apparatus for image recognition using invariant feature signals.
  272. Ohta Kazuo (Zushi JPX) Okamoto Tatsuaki (Yokosuka JPX), Method and apparatus for implementing electronic cash.
  273. Okamoto Tatsuaki,JPX, Method and apparatus for implementing hierarchical electronic cash.
  274. Ohta Kazuo,JPX ; Fujisaki Eiichiro,JPX ; Fujioka Atsushi,JPX ; Abe Masayuki,JPX, Method and apparatus for implementing traceable electronic cash.
  275. Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
  276. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  277. Knutson James Irwin, Method and apparatus for licensing computer programs using a DSA signature.
  278. Massey James L. (Zurich CA CHX) Omura Jimmy K. (Culver City CA), Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission.
  279. Liu Quentin C., Method and apparatus for managing a virtual private network.
  280. Zubeldia Pedro ; Romney Gordon W., Method and apparatus for managing key revocation.
  281. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  282. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  283. Curiger Andreas ; Little Wendell, Method and apparatus for masking modulo exponentiation calculations in an integrated circuit.
  284. Lawrence Stephen Robert,AUX ; Giles C. Lee, Method and apparatus for object recognition.
  285. Polk John, Method and apparatus for payment processing using debit-based electronic funds transfer and disbursement processing usin.
  286. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  287. Vaid Aseem ; Sawhney Sanjay ; Antur Anand K. ; Bisht Naveen S., Method and apparatus for quality of service management.
  288. Kurtzberg Jerome M. ; Levanoni Menachem, Method and apparatus for realizing computer security.
  289. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  290. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  291. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  292. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure measurement certification.
  293. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  294. Tomko George J.,CAX, Method and apparatus for securely handling data in a database of biometrics and associated data.
  295. Aziz Ashar,PKX, Method and apparatus for sending secure datagram multicasts.
  296. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  297. Wiklof Christopher A. ; Millet Edward M., Method and apparatus for storing and reading data.
  298. Abadi Martin ; Needham Roger Michael,GBX ; Lomas Thomas Mark Angus,GBX, Method and apparatus for strengthening passwords for protection of computer systems.
  299. Dyke David W. (342 Club View Dr. Great Falls VA 22066), Method and apparatus for the identification of personnel.
  300. Mark Andrew R. (205 W. End Ave. New York NY 10023), Method and apparatus for the secure communication of data.
  301. Garay Juan Alberto ; Gennaro Rosario ; Jutla Charanjit Singh ; Rabin Tal D., Method and apparatus for the secure distributed storage and retrieval of information.
  302. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  303. Ferguson Daniel T., Method and apparatus for transmitting secured data.
  304. LaDue Christoph K., Method and apparatus for transmitting subject status information over a wireless communications network.
  305. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305) Bach Carl E. (Albany CA), Method and apparatus for use in public-key data encryption system.
  306. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for witnessed authentication of electronic documents.
  307. Konheim Alan G. (Yorktown Heights NY) Matyas Stephen M. (Kingston NY) Meyer Carl H. (Kingston NY), Method and apparatus incorporating a one-way sequence for transaction and identity verification.
  308. Mueller-Schloer Christian (Vorhees NJ), Method and apparatus providing registered mail features in an electronic communication system.
  309. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  310. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  311. Cabrera Luis Felipe ; Narang Inderpal Singh ; Rees Robert Michael, Method and means for linking a database system with a system for filing data.
  312. Deinhart Klaus,DEX ; Gligor Virgil ; Lingenfelder Christoph,DEX ; Lorenz Sven,DEX, Method and system for advanced role-based access control in distributed and centralized computer systems.
  313. Goldberg Max Motti ; Gates Melodi Mosley ; Ericksen Susan Barbara ; White William O., Method and system for authenticating and auditing access by a user to non-natively secured applications.
  314. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  315. Nightingale Peter D., Method and system for communicating service information in an advanced intelligent network.
  316. Lesk Michael E., Method and system for copy protection of on-screen display of text.
  317. Obata Masanori,JPX ; Sugiyama Hiroyuki,JPX ; Okukawa Moribumi,JPX ; Okamoto Tatsuaki,JPX, Method and system for depositing private key used in RSA cryptosystem.
  318. Motoyama Tetsuro, Method and system for diagnosis and control of machines using connectionless modes of communication.
  319. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  320. Smith Jeffrey C. ; Bandini Jean-Christophe, Method and system for dynamic server document encryption.
  321. Nielsen Jakob, Method and system for escrowed backup of hotelled world wide web sites.
  322. Lo Ron ; Mahajan Om Prakash ; Vaios Christos I. ; Visser Eldred James, Method and system for implementing intelligent telecommunication services utilizing self-sustaining, fault-tolerant object oriented architecture.
  323. Borza Stephen J.,CAX, Method and system for improving security in network applications.
  324. Colon Michael ; Marks Ronald G. ; Pepine Carl J. ; Handberg-Thurmond Eileen M. ; Cooper-DeHoff Rhonda M. ; Padgett Phillip, Method and system for interactive prescription and distribution of prescriptions in conducting clinical studies.
  325. McGauley James L. ; Krumme Christopher, Method and system for maintaining and updating computerized medical records.
  326. Benantar Messaoud ; High ; Jr. Robert Howard ; Rathi Mahesh Kumar, Method and system for maintaining client server security associations in a distributed computing system.
  327. Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
  328. Strait Robert S. ; Pearson Peter K. ; Sengupta Sailes K., Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy.
  329. Nikander Pekka,FIX, Method and system for performing electronic money transactions.
  330. McGough Paul, Method and system for performing secure electronic monetary transactions.
  331. Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
  332. Moore James G. ; Jones Wayne E., Method and system for processing health care electronic data transactions.
  333. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  334. Basso ; Jr. Micheal R. ; Lee Joonho ; Li Chunhua, Method and system for providing controlled access to information stored on a portable recording medium.
  335. Joseph Rayappu F. ; Payne William A., Method and system for provisioning databases in an advanced intelligent network.
  336. Challener David C. ; Kelley Richard A. ; Newman Palmer E., Method and system for secure computer moderated voting.
  337. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Method and system for securely archiving core data secrets.
  338. Smithies Christopher P. K. (Wimborne GB2) Newman Jeremy M. (Somerset GB2), Method and system for the capture, storage, transport and authentication of handwritten signatures.
  339. Deindl Michael,DEX ; Witzel Martin,DEX, Method and system for the secure transmission and storage of protectable information.
  340. Smithies Christopher Paul Kenneth (Corfe Mullen ; Wimborne GB2) Newman Jeremy Mark (Frome ; Somerset GB2), Method and system for the verification of handwritten signatures.
  341. Reiter Michael Kendrick ; Stubblebine Stuart Gerald, Method for authenticating a channel in large-scale distributed systems.
  342. Palage Michael D. ; Cona ; Jr. Frank A., Method for authenticating electronic documents on a computer network.
  343. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  344. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  345. Holmquist Kurt E. (Largo FL) Smith Richard K. (Seminole FL), Method for dial-in access security using a multimedia modem.
  346. Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
  347. Fridrich Jiri, Method for encrypting and decrypting data using chaotic maps.
  348. Johnson Gary Duane (Lewisville TX) Campbell Kelly Scott (Richardson TX), Method for extracting pre-defined data items from medical service records generated by health care providers.
  349. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  350. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  351. Nematbakhsh Mohammad Ali ; Tsubura Shinichi,JPX, Method for managing clustered medical data and medical data filing system in clustered form.
  352. Ippolito Giovanni,ITX ; Fortina Marco Giovanni Emilio,ITX ; Colombo Gianluca,ITX, Method for obtaining authenticity identification devices for using services in general, and device obtained thereby.
  353. Leighton F. Thomson, Method for protecting content using watermarking.
  354. Naor Moni,ILX ; Pinkas Binyamin,ILX, Method for secure accounting and auditing on a communications network.
  355. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method for secure data transmission between remote stations.
  356. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method for secure data transmission between remote stations.
  357. Field Robert G. ; Layne Michael W., Method for secure key distribution over a nonsecure communications network.
  358. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  359. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  360. Hsieh Vincent, Method for security shield implementation in computer system's software.
  361. Denker John Stewart ; Watkins Christopher J. C. H.,GBX, Method for separately permissioned communication.
  362. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  363. Horn Gunther,DEX ; Muller Klaus,DEX ; Kessler Volker,DEX, Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N.
  364. Toga James E., Method for transferring data between a network of computers dynamically based on tag information.
  365. Nilsen Curt A. (Castro Valley CA), Method for transferring data from an unsecured computer to a secured computer.
  366. Berson William ; Kumar Shailendra, Method for verifying an identification card and recording verification of same.
  367. Barber Timothy P., Method of charging for pay-per-access information over a network.
  368. Krsul Ivan V. ; Mudge J. Craig ; Demers Alan J., Method of electronic payments that prevents double-spending.
  369. Batten Lynn Margaret,CAXITX R3T 5V4, Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem.
  370. Rozen Michael J. ; Doherty Connie B. ; Chesko Karen L., Method of managing and controlling access to personal information.
  371. Fukushima Yuki (Tochigiken JPX), Method of managing medical diagnostic data with reference relationship.
  372. Shamir Adi,ILX, Method of protecting broadcast data by fingerprinting a common decryption function.
  373. Merkle Ralph C. (Mountain View CA), Method of providing digital signatures.
  374. Wertheimer Michael A. ; Livingston Boyd T. ; White Tad P. ; Bielefeld Benjamin M. ; Monroe Thomas H. ; Pendergrass J. William, Method of public key cryptography that includes key escrow.
  375. Drupsteen Michel Marco Paul,NLX, Method of securely loading commands in a smart card.
  376. Hillhouse Robert D.,CAX, Method of securing a cryptographic key.
  377. Zhang Guang Hua, Method of selecting the best enroll image for personal identification.
  378. Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.
  379. Sloane Neil James Alexander, Method using central epidemiological database.
  380. Beecham James E., Method, apparatus and system for verification of human medical data.
  381. Clark Robert L. ; Morgan Glen A., Methods and apparatus for authenticating informed consent.
  382. Clark Dereck D., Methods and apparatus for securely encrypting data in conjunction with a personal computer.
  383. Johnson, Richard C., Methods and systems for carrying out directory-authenticated electronic transactions including contingency-dependent payments via secure electronic bank drafts.
  384. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  385. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  386. Ezawa Kazuo J. ; Napiorkowski Gregory, Micro-dynamic simulation of electronic cash transactions.
  387. Uesaka Yasushi,JPX ; Yamauchi Kazuhiko,JPX ; Kozuka Masayuki,JPX ; Higaki Nobuo,JPX ; Horiuchi Koichi,JPX ; Haruna Syusuke,JPX, Microprocessor suitable for reproducing AV data while protecting the AV data from illegal copy and image information processing system using the microprocessor.
  388. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  389. Borza Stephen J.,CAX ; Borza Michael A.,CAX ; Teitelbaum Neil,CAX, Mouse adapted to scan biometric data.
  390. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  391. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  392. Sudia Frank W. ; Freund Peter C. ; Huang Stuart T.F., Multi-step digital signature method and system.
  393. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,GBX, Multi-view personalized communications agent.
  394. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  395. Lee Lin-Nan (Germantown MD) Lu Shyue-Ching (Taiwan TWX), Multiple-destinational cryptosystem for broadcast networks.
  396. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  397. Jain Lalit ; Ford Michael T., Network device for supporting construction of virtual local area networks on arbitrary local and wide area computer networks.
  398. Rhoads Geoffrey B., Network linking method using steganographically embedded data objects.
  399. Harvey John Paul, Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level.
  400. Cohn Robert S. ; Vaudreuil Gregory M. ; Schoeneberger Carl F. ; Reece David M. ; O'Neal Carlton C. ; Kalbfleisch Carl W. ; Whipple Mark B. ; Swoopes James R. ; Huch Alan T. ; Dimitroff Michael P., Network-based multimedia communications and directory system and method of operation.
  401. Dean Robert John,GBX ; Unitt Brian Michael,GBX ; Kanabar Yashvant,GBX ; McCaughan Daniel Vincent,IEX, Networked personal customized information and facility services.
  402. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  403. Luckenbaugh Gary L., Object-oriented trusted application framework.
  404. Kravitz David W. ; Gemmell Peter S. ; Brickell Ernest F., Off-line compatible electronic cash method and system.
  405. Polnerow Dean ; Canon ; Jr. James M. ; Warner Lawrence Z. ; Blum Nancy ; Procopio Michael ; Wright David A., On-line directory service with a plurality of databases and processors.
  406. Wright Gregory John ; Hochberg Philip Scott ; Bellusci Darcy B. ; Brinster Eric Gregory ; Brinton Mark Willard ; Folkerts Sue R. ; Foster Brian Timothy ; King Anthony Edward ; Maloney Kevin Patrick ;, Open architecture cardiology information system.
  407. Gifford David K., Open network payment system for providing for authentication of payment orders based on a confirmation electronic mail message.
  408. Borza Stephen J.,CAX, Optical imaging device.
  409. Horner Joseph L. (Belmont MA) Javidi Bahram (Storrs CT) Walkup John F. (Lubbock TX), Optical pattern recognition system and method for verifying the authenticity of a person, product or thing.
  410. Frankel Yair ; Yung Marcel M., Optimal-resilience, proactive, public-key cryptographic system and method.
  411. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  412. Frasca ; Jr. Ralph V., Outpatient care data system.
  413. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  414. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  415. Chaum David ; Ferguson Niels T.,NLX ; Schoenmakers Berry,NLX ; Voskuil Erik W.,NLX, Partitioned information storage systems with controlled retrieval.
  416. Kravitz David William, Payment and transactions in electronic commerce system.
  417. Miller Mark S. ; Hardy Norman ; Tribble E. Dean ; Hibbert Christopher T. ; Hill Eric C., Persistent distributed capabilities.
  418. Rapaport Jeffrey Alan ; Rapaport Seymour Alvin, Personal feedback browser for obtaining media files.
  419. Basile Mark R. ; Weinreb Alan H., Personal identification and promotional system using personal and medical information.
  420. Davies John H. E. (4A Cowper Road Berkhamsted ; Hertfordshire ; HP4 3DA GB2), Personal identification devices and access control systems.
  421. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Personal identification fob.
  422. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  423. Weiser Mark D. ; Want Roy ; Kozinski Stephanie L. ; Boehm Hans-Juergen ; Sethi Komal S., Personal storage device for application and data transfer.
  424. Moshfeghi Mehran ; Wang Jun ; Wong Stephen L. ; Yu Yuan-Pin ; Glicksman Robert A., Personalizing hospital intranet web sites.
  425. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  426. Wu Tajen R. ; Shannon William A. ; Fronberg Paul ; Stephenson Donald R. ; Samar Vipin, Pluggable account management interface with unified login and logout and multiple user authentication services.
  427. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  428. Novis Scott R. ; Carns William E. ; Jachimowicz Karen E., Portable electronic device with transceiver and visual image display.
  429. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  430. Graf Ulrich,CHX ; Locher Johann,CHX, Portable identification carrier.
  431. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  432. Behram Sepehr (Hampton VA) Grauzlis Nancy T. (Hampton VA) Joseph Sammy W. (Derwood MD), Privacy protected information medium using a data compression method.
  433. Derksen Eduard (Hinterfultigen CHX), Process as safety concept against unauthorized use of a payment instrument in cashless payment at payment sites.
  434. Khosla Vinod, Process for issuing coupons for goods or services to purchasers at non-secure terminals.
  435. Teicher Mordechai,ILX, Processing system and method for a heterogeneous electronic cash environment.
  436. Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
  437. Weinstein Stephen B. (Summit NJ), Protection system for intelligent cards.
  438. Harvell Joseph ; Stovall Gregory T., Proxy VAT-PSTN origination.
  439. DeBellis Robert S. ; Smith ; Sr. Ronald M. ; Yeh Phil Chi-Chung, Pseudorandom number generator.
  440. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  441. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Public key cryptosystem method and apparatus.
  442. Miller William J. (North Miami FL) Trbovich Nick G. (Hollywood FL), RSA Public-key data encryption system having large random prime number generating microprocessor or the like.
  443. Randle William ; Ercole Richard ; Geer Terry L. ; James David L. ; Fredelake Jodie M. ; Roman Dennis ; Fontana Fabio ; Bartlett Rick ; Rosenberg Ruth ; Murphy Robert W. ; Tran Tuong T. ; Lampru Paul, Real time bank-centric universal payment system.
  444. Fiedler Steven P. (Leominster MA), Real-time event charting in an electronic flowsheet.
  445. Turner Stephen J. (Saffron Walden GB2) Lilley John B. (Brentwood GB2), Recognition procedure and an apparatus for carrying out the recognition procedure.
  446. Leonard Eugene (Sands Point NY) Perlman Bill (New York NY), Reliable secure, updatable “cash”card system.
  447. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  448. Ballard Claudio R., Remote image capture with centralized processing and storage.
  449. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  450. Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
  451. Eldridge Alan D. ; Kaufman Charles W., Removable media for password based authentication in a distributed system.
  452. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  453. Aoki Kazumaro,JPX ; Ohta Kazuo,JPX, Scheme for arithmetic operations in finite field and group operations over elliptic curves realizing improved computational speed.
  454. Green Graeme Allan,AUX, Secure access control system.
  455. Tolopka Stephen J. ; Light John J., Secure and convenient information storage and retrieval method and apparatus.
  456. Hauser Ralf Ch.,CHX ; Tsudik Gene, Secure anonymous information exchange in a network.
  457. Vardanyan Arthur,CAX ; Reed Wayne,CAX ; Freedman Gordon,CAX, Secure card for E-commerce and identification.
  458. Brands Stefanus Alfonsus (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secure cryptographic methods for electronic transfer of information.
  459. Brands Stefanus Alfonsus (Ioa Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secure cryptographic methods for electronic transfer of information.
  460. Ho Andrew P., Secure database management system for confidential records using separately encrypted identifier and access request.
  461. McEvoy Steven P. ; Ochotta Emilian S. ; Richardson Kent R. ; Hatcher David C. ; Mah Raymond T., Secure digital x-ray image authentication method.
  462. Haynes ; III Patrick J. ; Friedman Thomas Jay ; Shoupp Douglas Scott ; Mitty Todd Jay ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary.
  463. Mitty Todd Jay ; Shoupp Douglas Scott ; Prabhu Ajit Mathias ; Cantone Michael Robert, Secure electronic transactions using a trusted intermediary to perform electronic services.
  464. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  465. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  466. Chadha Tejpal, Secure logon to notebook or desktop computers.
  467. Benhammou Jean-Pierre ; Baran Dennis F. ; Tonge Phillip D. ; Terry ; Jr. Edward L., Secure memory having multiple security levels.
  468. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  469. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  470. Chen Tsuhan, Secure telecommunications data transmission.
  471. Osmond Roger F., Secure transmission using an ordinarily insecure network communication protocol such as SNMP.
  472. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  473. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  474. Hoffstein Jeffrey ; Kaliski ; Jr. Burton S. ; Lieman Daniel Bennett ; Robshaw Matthew John Barton ; Yin Yiqun Lisa, Secure user identification based on constrained polynomials.
  475. Birrell Andrew D. ; Wobber Edward P. ; Abadi Martin ; Stata Raymond P., Secure web tunnel.
  476. Muftic Sead,SEX, Secure world wide electronic commerce over an open network.
  477. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  478. Bouthillier ; deceased Stephen W. ; Seybold Ross E. ; Wesche Kenneth D. ; Sulkowski Robert V. ; Dodge Brian L. ; Kellogg Dana C. ; Morse Randall, Secured network system.
  479. Bouthillier Stephen W. ; Seybold Ross E. ; Blowers Sydney R. ; Sulkowski ; Jr. Robert V. ; Morse Randall P., Secured network system.
  480. Miller ; II Robert Raymond, Security access system.
  481. Suzuki Kaoru,JPX ; Fukui Kazuhiro,JPX ; Kazama Hisashi,JPX ; Yamaguchi Osamu,JPX ; Tanaka Eiji,JPX ; Taniguchi Yasuhiro,JPX, Security apparatus and method.
  482. Barnett Donald A., Security card and system for use thereof.
  483. Korshun Yvan,UAX, Security device for controlling the access to a personal computer or to a computer terminal.
  484. Mowry ; Jr. William H., Security document containing encoded data block.
  485. Worth Erik K., Security monitor for controlling functional access to a computer system.
  486. Scholnick Michael ; Schlesinger John F., Security process for public networks.
  487. Kirchhoff Gerhard,DEX, Security structure with electronic smart card access thereto with transmission of power and data between the smart card.
  488. Shaffer Stephen L. ; Townsend Kevin Arnold, Security system for controlling access to images and image related services.
  489. Rhoads Geoffrey B., Security system for photographic identification.
  490. McAllister Alex (Wheaton MD) Cheston Frank (Potomac MD) Young David E. (Silver Spring MD) Hanle John P. (Silver Spring MD), Selection of a voice recognition data base responsive to video data.
  491. Biffar Peter, Self-contained payment system with circulating digital vouchers.
  492. Biffar Peter C., Self-contained payment system with circulating digital vouchers.
  493. Cowan Richard ; Eckley Gordon P. ; Panchangam Prasad V. R. ; Leong Winston C. W., Server for starting client application on client if client is network terminal and initiating client application on ser.
  494. Pinard Deborah L.,CAX ; Gray Thomas A.,CAX, Service context sensitive features and applications.
  495. Beatson Rodney ; Kelty Mark A. ; Riley Marc J., Signature capture/verification systems and methods.
  496. Okamoto Tatsuaki (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Shiraishi Akira (Yokosuka JPX) Kawaoka Tsukasa (Yokosuka JPX), Signed document transmission system.
  497. Shin Kil-Ho,JPX ; Kobayashi Kenichi,JPX ; Aratani Toru,JPX, Signing method and apparatus using the same.
  498. Lu Shyue-Ching (Chung-Li MD TWX) Lee Lin-nan (Germantown MD), Simple and effective public-key cryptosystem.
  499. Micali Silvio, Simultaneous electronic transactions.
  500. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions.
  501. Micali Silvio, Simultaneous electronic transactions with subscriber verification.
  502. Micali Silvia (459 Chestnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  503. Micali Silvio, Simultaneous electronic transactions with visible trusted parties.
  504. Micali Silvio (459 Chesnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  505. Novis Scott R. ; Carns William E. ; Jachimowicz Karen E., Smart card device with pager and visual image display.
  506. Jachimowicz Karen E. ; Novis Scott R., Smart card with Iintegrated reader and visual image display.
  507. Jachimowicz Karen E. ; Novis Scott R. ; Barry Dennis ; Jiang Wenbin ; Lebby Michael S., Smart card with contactless optical interface.
  508. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  509. Cargile William P. (Half Moon Bay CA) Freeman Richard D. (Sunnyvale CA) Lyon James M. (San Jose CA), Solid state key for controlling access to computer systems and to computer software and/or for secure communications.
  510. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of electronic payments.
  511. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of redeeming electronic payments.
  512. Demers Alan J. ; Greene Daniel H. ; Spitznagel Bridget A. ; Want Roy, Space efficient method of verifying electronic payments.
  513. Javidi Bahram ; Mok Fai ; Psaltis Demetri, Spatial integrating optical correlator for verifying the authenticity of a person, product or thing.
  514. Feustel Timothy C. (Hanover NJ) Glemboski Mark A. (Newton NJ) Ordun Michael R. (Randolph NJ) Velius George A. (Morristown NJ) Weinstein Stephen B. (Summit NJ), Speaker verification system using integrated circuit cards.
  515. Cox Ingemar J., Spread spectrum watermark for embedded signalling.
  516. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench Edwin H., Stand alone security device for computer networks.
  517. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  518. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  519. Rhoads Geoffrey B., Steganographic system.
  520. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  521. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  522. Feinberg Lawrence E., Storing personal medical information.
  523. Henry Paul S. (Holmdel NJ), Stream cipher operation using public key cryptosystem.
  524. Schanze Martin Lee, Synchronous message control system in a Kerberos domain.
  525. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  526. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  527. Thomas Michael W. ; Allard James E. ; Howard Michael ; Chung Sophia ; Ferroni Cameron ; Henbenthal Douglas C. ; Ludeman John ; Stebbens Kim ; Sanders ; II Henry L. ; Treadwell ; III David R., System and method for administering a meta database as an integral component of an information server.
  528. Bolt Thomas B. ; McClain Fred W., System and method for backing up computer files over a wide area computer network.
  529. McClain Fred W. ; Bolt Thomas B., System and method for backing up computer files over a wide area computer network.
  530. Ronen Yzhak, System and method for billing for transactions conducted over the internet from within an intranet.
  531. Dulman Scott, System and method for changing advanced intelligent network services from customer premises equipment.
  532. Rosen Sholom S., System and method for connecting money modules.
  533. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  534. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  535. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  536. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  537. Freishtat, Gregg; Rajan, Palaniswamy, System and method for determining revenue from an intermediary derived from servicing data requests.
  538. Houvener Robert C. ; Hoenisch Ian P., System and method for efficiently processing payments via check and electronic funds transfer.
  539. Goldschlag David M. ; Stubblebine Stuart Gerald ; Syverson Paul F., System and method for electronic transactions.
  540. Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
  541. Talmor Rita,ILX ; Talmor Eli,ILX, System and method for establishing identity of a speaker.
  542. McManis Charles E., System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources.
  543. Simon Daniel R., System and method for fair exchange of time-independent information goods over a network.
  544. Hardy Norman ; Vetter Linda L. ; Tribble E. Dean, System and method for generating unique secure values for digitally signing documents.
  545. Numao Masayuki,JPX ; Shimizu Shuichi,JPX ; Morimoto Norishige,JPX ; Kobayashi Mei,JPX, System and method for hiding and extracting message data in multimedia data.
  546. Birnbaum William C., System and method for implementing a hierarchical policy for computer system administration.
  547. Ellard Scott, System and method for indexing information about entities from different information sources.
  548. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  549. Johnson William A., System and method for management of connection oriented networks.
  550. Erickson John S., System and method for managing copyrighted electronic media.
  551. Lee David K. ; Riley David W. ; Ryan ; Jr. Frederick W., System and method for managing multiple users with different privileges in an open metering system.
  552. Lavin Marianne ; Nathan Michael, System and method for managing patient medical records.
  553. Friedman Carol, System and method for medical language extraction and encoding.
  554. Ryan ; Jr. Frederick W. ; Sisson Robert W., System and method for mutual authentication and secure communications between a postage security device and a meter server.
  555. Viavant Steven ; Gleckler Arthur A. ; Wessman Richard R., System and method for negotiating security services and algorithms for communication across a computer network.
  556. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  557. Wong Jacob Y. ; Anderson Roy L., System and method for pseudo cash transactions with credit back.
  558. Rensimer Edward R. ; Tomsovic Jacqueline P. ; Wright Pamela A., System and method for recording patient-history data about on-going physician care procedures.
  559. Harkins Dan, System and method for regenerating secret keys in diffie-hellman communication sessions.
  560. Houvener Robert C. ; Hoenisch Ian P. ; Schappler Joseph, System and method for remote, wireless positive identity verification.
  561. Bapat Subodh ; Fisher Bart Lee, System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects.
  562. Simon Daniel R. ; Benaloh Josh ; Chinn Donald D. ; Hitchcock Gregory ; Meltzer David, System and method for secure font subset distribution.
  563. Conner Guy (Santa Rosa CA) Schmier Larry (Santa Rosa CA), System and method for secure medical and dental record interchange.
  564. Rosen Sholom S., System and method for secure presentment and payment over open networks.
  565. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  566. .ANG.strom Bo Arne Valdemar,SEX ; Svennesson Bjorn Arne,SEX ; Sumar Gulamabbas,SEX ; Schmersel Robert Johannes Bernardus,NLX, System and method for subscriber activity supervision.
  567. Freeman ; Jr. Berkley Irving ; Smith Edgar William, System and method for supporting delivery of health care.
  568. de la Huerga Carlos ; Craig William E., System and method for translating, collecting and archiving patient records.
  569. Rosen Sholom S., System and method for updating security information in a time-based electronic monetary system.
  570. Audebert Yves, System and method for user authentication employing dynamic encryption variables.
  571. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for verifying signatures on documents.
  572. Houvener Robert C. ; Hoenisch Ian P., System and method of assessing the quality of an identification transaction using an identificaion quality score.
  573. Houvener Robert C. ; Hoenisch Ian P., System and method of providing system integrity and positive audit capabilities to a positive identification system.
  574. Cordery Robert A. ; Lee David K. ; Pauly Steven J. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., System and method of verifying cryptographic postage evidencing using a fixed key set.
  575. Mark Andrew R., System and method using personal identification numbers and associated prompts for controlling unauthorized use of a se.
  576. Teitelbaum Neil,CAX ITX K1S 4Y3 ; Freedman Gordon Sean,CAX ITX K2G 3Y1 ; Borza Stephen J.,CAX ITX K1S 3N3 ; Borza Michael A.,CAX ITX K1H 6H8, System configuration contingent upon secure input.
  577. Hoehn-Saric Rudolph Christopher ; Nguyen Christopher L. ; Stevens Patrick D., System for administration of remotely-proctored, secure examinations and methods therefor.
  578. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  579. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  580. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  581. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  582. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  583. Herz Frederick S. M., System for customized electronic identification of desirable objects.
  584. Brands Stefanus A.,NLX, System for ensuring that the blinding of secret-key certificates is restricted, even if the issuing protocol is performed in parallel mode.
  585. Spurgeon Loren J., System for exchanging health care insurance information.
  586. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
  587. Lachelt David Jonathan ; Houck Peter Thomas, System for logging and enabling ordered retrieval of management events.
  588. Kawan Joseph C., System for performing financial transactions using a smartcard.
  589. Tanno Kazuhira,JPX, System for performing remote operation between firewall-equipped networks or devices.
  590. Coppersmith Don ; Greengard Claude A. ; Tresser Charles P. ; Wu Chai Wah, System for protection of goods against counterfeiting.
  591. Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.
  592. Grawrock David ; Lohstroh Shawn R., System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record.
  593. McGrady R. Michael ; Slaymaker ; Jr. R. Barrie ; Kroah-Hartman Greg ; Sukan Eser, System for tracking and dispensing medical items.
  594. McCalley Karl W. ; Schmitt John C., System including separable protected components and associated methods.
  595. Sugauchi Kiminori,JPX ; Hirata Toshiaki,JPX ; Nishiki Kenya,JPX ; Miyazaki Satoshi,JPX ; Mizuguchi Keizo,JPX ; Fujino Shuji,JPX, System management/network correspondence display method and system therefor.
  596. Nguyen Trong ; Haller Daniel R. ; Kramer Glenn A., System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture.
  597. Kramer Glenn A., System, method and article of manufacture for a modular gateway server architecture.
  598. Nguyen Trong ; Haller Daniel R. ; Subramanian Mahadevan P., System, method and article of manufacture for a payment gateway system architecture for processing encrypted payment tr.
  599. Rowney Kevin T. B., System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible.
  600. Bahreman Ali Reza, System, method and article of manufacture for dynamic negotiation of a network payment framework.
  601. Haller Daniel R. ; Nguyen Trong, System, method and article of manufacture for handling transaction results in a gateway payment architecture utilizing.
  602. Haller Daniel R. ; Nguyen Trong ; Rowney Kevin T. B. ; Berger David A. ; Kramer Glenn A., System, method and article of manufacture for managing transactions in a high availability system.
  603. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.
  604. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment.
  605. Berger David A. ; Weber Jay C. ; Kramer Glenn A., System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a.
  606. Weber Jay C., System, method and article of manufacture for remote virtual point of sale processing utilizing a multichannel, extensi.
  607. Rowney Kevin T. B. ; Chen Yuhua, System, method and article of manufacture for secure digital certification of electronic commerce.
  608. Rowney Kevin Thomas Bartholomew ; Nadig Deepak S., System, method and article of manufacture for secure network electronic payment and credit collection.
  609. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for the use of payment instrument holders and payment instruments in network.
  610. Weber Jay C., System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing.
  611. Berger David A. ; Weber Jay C. ; Madapurmath Vilas I., System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible archite.
  612. malik Sohail ; Muresan Michael, System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver.
  613. March Anthony W., System/method for secure storage of personal information and for broadcast of the personal information at a time of emergency.
  614. Bouchard Ann Marie ; Osbourn Gordon Cecil, Systems and methods for biometric identification using the acoustic properties of the ear canal.
  615. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  616. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  617. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  618. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  619. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  620. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  621. Schanz Stephen J., Systems, methods and computer program products for identifying unique and common legal requirements for a regulated activity among multiple legal jurisdictions.
  622. Ellison Carl, Tamper resistant method and apparatus.
  623. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  624. Ashworth Mark,GBX ; Donaldson Iain Alexander,GBX, Telecommunications system and method for processing call-independent signalling transactions.
  625. Muehlberger Karl (Lakeland FL) Sinek Richard (Lakeland FL) Hughes Michael (St. Petersburg Beach FL), Telephone debit card dispenser and method.
  626. Teitelbaum Neil,CAX, Telephone with biometric sensing device.
  627. Katz Penina (Flushing NY), Telephone-based personnel tracking system.
  628. Goldwasser Shafi ; Bellare Mihir, Time delayed key escrow.
  629. Davis Derek L., Time-bracketing infrastructure implementation.
  630. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  631. Cordery Robert A. ; Pintsov Leon A., Token key distribution system controlled acceptance mail payment and evidencing system.
  632. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  633. Hoffman Ned ; Pare ; Jr. David Ferrin ; Lee Jonathan Alexander, Tokenless biometric electronic rewards system.
  634. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  635. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  636. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  637. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  638. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  639. Metz Michael ; Phillips Nicholas J.,GBX ; Coleman Zane ; Flatow Carl, Topographical object detection system.
  640. Micali Silvio, Traceable anonymous transactions.
  641. Boston Vincent (San Mateo CA) Boggan Elvis W. (Concord CA) Asbo Einar L. (Mill Valley CA), Transaction system with off-line risk assessment.
  642. Boston Vincent (San Mateo CA) Boggan Elvis W. (Concord CA) Asbo Einar L. (Mill Valley CA), Transaction system with off-line risk assessment.
  643. Templeton Randy Joe (Bellaire TX) Gulden Gerald (Houston TX), Transaction system with on/off line risk assessment.
  644. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  645. Griffin Claire ; Barnes Douglas, Trusted delegation system.
  646. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Two stage read-write method for transaction cards.
  647. Gennaro Rosario ; Johnson Donald Byron ; Karger Paul Ashley ; Matyas ; Jr. Stephen Michael ; Peyravian Mohammad ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Two-phase cryptographic key recovery system.
  648. Elliott, John C.; O'Connell, James A.; Ladouceur, Lawrence; Altman, William; Jarett, Keith, Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device.
  649. Schneider John K. (Snyder NY) Marshall Gerald F (Morgan Hill CA) Vassallo Andrew D. (Williamsville NY), Ultrasonic biometric imaging and identity verification system.
  650. Schneider John K. ; Marshall Gerald F. ; Vassallo Andrew D., Ultrasonic biometric imaging and identity verification system.
  651. Hutchison Stephen (Kirkwood MO) Ritter J. Alan (Des Peres MO) Virkus Mark (Ellisville MO), Ultrasonic system for obtaining ocular measurements.
  652. Priddy Dennis G., Unalterable self-verifying articles.
  653. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  654. Simon Daniel R., Untraceable electronic cash.
  655. Cotugno Lauren Ann ; Frankel Edward Henry, Unwrapping system and method for multiple files of a container.
  656. Glitho Roch,CAX ; Leduc Francois,CAX ; Crowe Thomas,IEX ; Hogberg Lena,SEX, Use of web technology for subscriber management activities.
  657. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
  658. Koenig Andrew R. (Elizabeth NJ), User authentication system employing encryption functions.
  659. Pu Allen ; Psaltis Demetri, User identification through sequential input of fingerprints.
  660. Jones Timothy L. (East Sussex GB2) Higgins Graham R. L. (Avon GB2), Value transfer system.
  661. Rhoads Geoffrey B., Video steganography.
  662. Vaeth J. Stuart ; Walton Charles S., Virtual certificate authority.
  663. Sprague David L., Virtual people networking.
  664. Pfundstein Matthias,DEX, Virtual private network for mobile subscribers.
  665. Tello Antonio G. ; Hui Margaret ; Holmes Kim, Virtual private network service provider for asynchronous transfer mode network.
  666. Paulsen Gaige B. ; Walker Amanda, Virtual private network system and method.
  667. Tomoike Hiroyuki,JPX, Virtual private network system over public mobile data network and virtual LAN.
  668. Martinez Ronald ; Schneier Bruce ; Guerin Greg, Virtual property system.
  669. Cox Ingemar J., Watermarking of image data using MPEG/JPEG coefficients.
  670. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.
  671. Haverstock Paul ; Estrada Miguel ; Estrada Julio, Web server with integrated scheduling and calendaring.
  672. Sato Shinichi,JPX ; Sano Koichi,JPX, Wide area medical information system and method using thereof.

이 특허를 인용한 특허 (178)

  1. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. Kapczynski, Mark Joseph; Dean, Michael John; Hunt, III, Herbert Harris, Account vulnerability alerts.
  3. Burger, Michael, Adjustment of knowledge-based authentication.
  4. Kapczynski, Mark Joseph; Dean, Michael John, Aggregating user web browsing data.
  5. Ito, Satoshi; Aisu, Hideyuki; Kamibayashi, Tooru; Akiyama, Koichiro; Hamada, Shinichiro, Apparatus and method for digital content editing.
  6. Aisu, Hideyuki; Ito, Satoshi, Apparatus and method for playback of digital content.
  7. Skidgel, Brandon Shane, Apparatus and method for remotely sharing information and providing remote interactive assistance via a communications network.
  8. Ishigaki, Yoshinobu; Numao, Masayuki; Yuriyama, Madoka; Watanabe, Yuji, Attribute information providing method.
  9. Ishigaki, Yoshinobu; Numao, Masayuki; Yuriyama, Madoka; Watanabe, Yuji, Attribute information providing system.
  10. Petruzzi, Christopher R., Auditing custodial accounts.
  11. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  12. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  13. Kapczynski, Mark Joseph; Dean, Michael John, Bill payment and reporting.
  14. Duschl, Heather L.; Markello, Alexandra D.; Price, Dana L., Capturing contextual information on a device.
  15. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  16. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  17. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  18. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  19. Wasser, Jeremy; Felice-Steele, Michelle; Nies, Melinda; Giltner, Luke, Circular rotational interface for display of consumer credit information.
  20. Sievert, Jim; Bailey, Eric P.; Mass, William R., Communications hub for use in life critical network.
  21. Piersol, Kurt W., Creation of signatures for authenticating applications.
  22. Dean, Michael John; Kapczynski, Mark Joseph, Credit card account data extraction.
  23. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Credit report timeline user interface.
  24. Wasser, Jeremy; Felice-Steele, Michelle; Nies, Melinda; Giltner, Luke, Credit score goals and alerts systems and methods.
  25. Arnold, Karl; Hunt, III, Herbert Harris, Credit utilization tracking and reporting.
  26. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  27. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  28. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Detecting deviation from compliant execution of a template.
  29. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K.Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Detecting deviation from compliant execution of a template.
  30. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Development of personalized plans based on acquisition of relevant reported aspects.
  31. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Development of personalized plans based on acquisition of relevant reported aspects.
  32. Kapczynski, Mark Joseph, Digital identity.
  33. Ehlke, Joshua Todd; Khandavilli, Narasimha Rao; McVaugh, Timothy Mark; Melanson, Anthony J.; Selzer, Steve; Stratman, Curtis; Virnik, Marina; Weihnacht, Joshua Micah; Zeng, Zhen, Digital pathology system.
  34. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  35. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  36. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  37. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  38. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  39. Olson, Gregory Thomas; Sivaji, Vijay Prakash; Yu, Nelson; Monteath, Ralph Keith, Display screen or portion thereof with graphical user interface.
  40. Hinchliffe, Alex J.; Howard, Fraser P.; Rai, Bobby; Kemp, Andrew, Distribution of security policies for small to medium-sized organizations.
  41. Balinsky, Helen; Chen, Liqun; Simske, Steven J., Document management system and method.
  42. Balinsky, Helen; Simske, Steven J., Document management system and method.
  43. Balinsky, Helen; Simske, Steven J., Document management system and method.
  44. Jaye, Daniel; Secretan, James Q., Dual blind method and system for attributing activity to a user.
  45. Bamsch, Brian; Balasubramanian, Krishnakumar; Craig, Tim; Tai, Ray, Forced virtual machine warm-up.
  46. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  47. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  48. Milman, Ivan M.; Oberhofer, Martin; Fot, Dmitriy, Generalized identity mediation and propagation.
  49. Milman, Ivan M.; Oberhofer, Martin; Fot, Dmitriy, Generalized identity mediation and propagation.
  50. Chase, Melissa E.; Kamara, Seny F., Graph encryption.
  51. Monden, Akira, ID system and program, and ID method.
  52. Monden, Akira, ID system and program, and ID method.
  53. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes.
  54. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Identification and provision of reported aspects that are relevant with respect to achievement of target outcomes.
  55. Fiferlick, Jeffrey, Information record management system.
  56. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  57. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  58. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  59. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  60. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  61. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  62. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  63. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  64. Scott, Hugh Logan; Roemerman, Steven D.; Volpi, John P., Interrogator and system employing the same.
  65. Scott, Hugh Logan; Roemerman, Steven D.; Volpi, John P., Interrogator and system employing the same.
  66. Dean, Michael John; Kapczynski, Mark Joseph, Lifescore.
  67. Simske, Steven J.; Balinsky, Helen, Managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow.
  68. Balinsky, Helen; Simske, Steven J., Managing access to a secure content-part of a PPCD using a key reset point.
  69. Kim, Hyung Sun; Kim, Byuong Jin, Managing copy protecting information of encrypted data.
  70. LaLonde, John; Mass, William R.; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joseph E.; Gryzwa, Mark, Medical data transport over wireless life critical network.
  71. LaLonde, John; Mass, William R.; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joseph E.; Gryzwa, Mark, Medical data transport over wireless life critical network.
  72. LaLonde, John; Mass, William R.; Hoyme, Kenneth P.; Johnson, David C.; Bange, Joseph E.; Gryzwa, Mark T., Medical data transport over wireless life critical network.
  73. Johnson, David C.; Sievert, Jim; Hoyme, Kenneth; Lalonde, John; Mass, William; Duccini, David V., Medical data transport over wireless life critical network employing dynamic communication link mapping.
  74. Liberty, Michael A.; Love, Mike, Messaging within a multi-access health care provider portal.
  75. Crandell, Todd J.; Shell, Michael D.; Heathcock, O. Wayne, Method and apparatus for integrated telephone and internet services.
  76. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  77. Li, Hui; Qu, Jin, Method and apparatus for pseudonym generation and authentication.
  78. Barton, Samuel G.; Ketkar, Bhalchandra R.; O'Hara, Casey V.; Goldwasser, Todd, Method and system for compiling a multi-source database of composite investor-specific data records with no disclosure of investor identity.
  79. Barton, Samuel G.; Ketkar, Bhalchandra R.; O'Hara, Casey V.; Goldwasser, Todd, Method and system for compiling a multi-source database of composite investor-specific data records with no disclosure of investor identity.
  80. Barton, Samuel G.; Ketkar, Bhalchandra R.; O'Hara, Casey V.; Goldwasser, Todd, Method and system for compiling a multi-source database of composite investor-specific data records with no disclosure of investor identity.
  81. Micali, Silvio; Rivest, Ronald L., Method and system for micropayment transactions.
  82. Lorsch, Robert H., Method and system for providing online records.
  83. Park, Hanna; Yoo, Done Sik; Kim, Seunghwan, Method of managing medical information in operating system for medical information database.
  84. Kim, Hyung Sun; Kim, Byung Jin, Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium.
  85. Sievert, Jim; Mass, William R., Modular communicator for use in life critical network.
  86. Sievert, Jim; Mass, William, Modular patient communicator for use in life critical network.
  87. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  88. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  89. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  90. Haller, Eric; Kent, Kelly, Multi-bureau credit file freeze and unfreeze.
  91. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development.
  92. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development.
  93. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development based on identification of one or more relevant reported aspects.
  94. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development based on identification of one or more relevant reported aspects.
  95. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development based on one or more reported aspects' association with one or more source users.
  96. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development based on one or more reported aspects' association with one or more source users.
  97. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development based on outcome identification.
  98. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Personalized plan development based on outcome identification.
  99. Maguire, Yael; Shen, Shizhe, Post-manufacture camera calibration.
  100. Lorsch, Robert H., Prepaid card for services related to personal health records.
  101. Nakata, Hiroaki, Printing management system and printing management method.
  102. Mawdsley, Gary; Meyfroidt, Steven, Private information storage system.
  103. Kapczynski, Mark Joseph, Providing credit data in search results.
  104. Dean, Michael John; Kapczynski, Mark Joseph, Providing credit inquiry alerts.
  105. Spies, Terence; Pauker, Matthew J., Purchase transaction system with encrypted payment card data.
  106. Kim, Hyung Sun; Kim, Byung Jin, Recording medium containing sample data and reproducing thereof.
  107. Beenau, Blayn W.; Bonalle, David S.; Fields, Seth W.; Gray, William J.; Larkin, Carl; Montgomery, Joshua L.; Saunders, Peter D., Registering a biometric for radio frequency transactions.
  108. Gaudet, Edward J.; Gage, John; Kashtan, David; Mafera, Jason; Rubinov, Eliot; Sengupta, Kuntal; Ting, David M. T.; Vernest, Kyle; Galloway, Bryan; Gavin, Mae-Ellen, Secure content sharing.
  109. Gaudet, Edward J.; Gage, John; Kashtan, David; Mafera, Jason; Rubinov, Eliot; Sengupta, Kuntal; Ting, David M. T.; Vernest, Kyle; Galloway, Bryan; Gavin, Mae-Ellen, Secure content sharing.
  110. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  111. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  112. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  113. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  114. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  115. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  116. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  117. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  118. Monk, David, Secure data transfer system and method.
  119. Barbas, Pedro M.; Duffy, Joseph; Maycock, Ken; Tilson, David M., Secure database backup and recovery.
  120. Barbas, Pedro M.; Duffy, Joseph; Maycock, Ken; Tilson, David M., Secure database backup and recovery.
  121. Barbas, Pedro M.; Duffy, Joseph; Maycock, Ken; Tilson, David M., Secure database backup and recovery.
  122. Revell, Elise, Secure node-to-multinode communication.
  123. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Source user based provision of one or more templates.
  124. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Source user based provision of one or more templates.
  125. Gagnon, Jean; Lagassey, Paul J., Spam filtering system and method.
  126. Kapczynski, Mark Joseph; Dean, Michael John, Storage and maintenance of personal data.
  127. Atkinson, Bob; DeTreville, John; LaMacchia, Brian A., Substitution groups/inheritance for extensibility in authorization policy.
  128. Celka, Christopher J.; Rojas, Cristian R., System and method for automated detection of never-pay data sets.
  129. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  130. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  131. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  132. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  133. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  134. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  135. Gonzales, Jr., Merced; Loya, III, Francisco; Gonzales, Michael, System and method for gauging performance based on analysis of hospitalist and patient information.
  136. Patten, Terry; Thurn, Martin, System and method for information sharing across security boundaries.
  137. Patten, Terry; Thurn, Martin, System and method for information sharing across security boundaries.
  138. Gonzales, Jr., Merced; Loya, III, Francisco; Gonzales, Michael, System and method for maintaining hospitalist and patient information.
  139. Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent O.; Lee, Kuang-chih; Vu, Diem Thanh; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
  140. Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent; Lee, Kuang-Chih; Vu, Diem; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
  141. Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent; Lee, Kuang-chih; Vu, Diem; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
  142. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  143. Wilding, Mark F.; Horman, Randall W., System and method for secure remote access.
  144. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  145. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  146. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  147. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for a cryptographic file system layer.
  148. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  149. Haller, Eric; Hirn, Mark; Dichiara, Christer, Systems and methods for data verification.
  150. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  151. McMillan, Helen; Skurtovich, John Lawrence; Kress, Anita; Sumida, Timothy; McVey, Michael Charles, Systems and methods for providing an integrated identifier.
  152. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  153. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  154. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  155. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  156. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  157. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  158. O'Hare, Mark S.; Orsini, Rick L.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  159. O'Hare, Mark S.; Orsini, Rick L.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  160. Potash, Marc; Gowda, Preetham, Systems and methods of generating an authenticated document biosignature.
  161. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  162. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  163. Burger, Michael; Kapczynski, Mark Joseph, Systems and methods of identity protection and management.
  164. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  165. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  166. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Target outcome based provision of one or more templates.
  167. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Target outcome based provision of one or more templates.
  168. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Template development based on reported aspects of a plurality of source users.
  169. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Template development based on reported aspects of a plurality of source users.
  170. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Template development based on sensor originated reported aspects.
  171. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Template development based on sensor originated reported aspects.
  172. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Template modification based on deviation from compliant execution of the template.
  173. Firminger, Shawn P.; Garms, Jason; Hyde, Roderick A.; Jung, Edward K. Y.; Karkanias, Chris D.; Leuthardt, Eric C.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T.; Tolle, Kristin M.; Wood, Jr., Lowell L., Template modification based on deviation from compliant execution of the template.
  174. Shen, Shizhe; Maguire, Yael; Kowalewski, Damian; Passichenko, Viktor Vladimirovich, Training image adjustment preferences.
  175. Everett, David, Trusted message storage and transfer protocol and system.
  176. Lehew, Christian R.; Pyle, Harry S.; Fang, Nicholas Jie, Trusted network transfer of content using off network input code.
  177. Li, Jun; Swaminathan, Ram; Singhal, Sharad, Validating a metadata tree using a metadata integrity validator.
  178. Mass, William R.; LaLonde, John; Barton, Michael W., Wireless patient communicator for use in a life critical network.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트