$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for imposing security on copies of secured items

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-029/06
  • G06F-021/24
  • G06F-021/00
출원번호 UP-0146207 (2002-05-14)
등록번호 US-7631184 (2009-12-16)
발명자 / 주소
  • Ryan, Nicholas
대리인 / 주소
    Sterne Kessler Goldstein & Fox PLLC
인용정보 피인용 횟수 : 29  인용 특허 : 330

초록

Improved approaches for securing files that are derived from secured files are disclosed. In general, a secured file can only be accessed by authenticated users with appropriate access rights or privileges. Each secured file is provided with a header portion and a data portion, where the header port

대표청구항

What is claimed is: 1. A method for securing a copy of a secured file, the secured file having a header portion and a data portion, the header portion including at least access rules, and the data portion including at least data of the secured file, the method comprising: determining whether a file

이 특허에 인용된 특허 (330)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  3. David M. Mooney ; Paul J. Kimlinger ; James Virgil Bradley, Access control/crypto system.
  4. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  5. Zuili Patrick,FRX ; Ice Edward, Adaptive communication system enabling dissimilar devices to exchange information over a network.
  6. Schneck, Phyllis A.; Schwan, Karsten; Chokhani, Santosh, Adaptive data security system and method.
  7. Proctor, Paul E., Adaptive feedback security system and method.
  8. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  9. Brown, Michael Wayne; Hamzy, Mark Joseph; Jones, Scott Thomas, Apparatus and method for providing access rights information in a portion of a file.
  10. Squibb Mark (Kingston NY), Apparatus and method for reconstructing a file from a difference signature and an original file.
  11. Squibb, Mark, Apparatus and method for reconstructing a file from a difference signature and an original file.
  12. Just, Michael K.; Van Oorschot, Paul, Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system.
  13. Chow, Peter Ka-Fai, Apparatus and method for validating and updating an IP checksum in a network switching system.
  14. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  15. Gramsamer, Ferdinand; Klett, Peter Micheal; Liver, Beat; Truong, Hong Linh, Archiving and retrieval method and apparatus.
  16. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
  17. Corella,Francisco, Authorization infrastructure based on public key cryptography.
  18. Strickler Gary E. ; Knapp Herbert William ; Holenstein Bruce D. ; Holenstein Paul J., Bidirectional database replication scheme for controlling ping-ponging.
  19. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  20. Laczko, Sr., Frank L.; Ferguson, Edward, Compresses video decompression system with encryption of compressed data stored in video buffer.
  21. Takechi,Hideaki; Yamada,Masazumi; Iitsuka,Hiroyuki; Nishimura,Takuya; Kuno,Yoshiki; Gotoh,Shoichi, Computer and program recording medium.
  22. Johnson Judy J. ; McElroy ; Jr. James R., Computer based records management system method.
  23. Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
  24. Brown,Daniel; Zapata,Fernando, Computer security system.
  25. Hsu Mike S. C. (1518 Ambergrove Dr. San Jose CA 95131), Computer system including a transparent and secure file transform mechanism.
  26. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  27. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  28. Sarah Baxter ; Lisa C. Vogt, Content management system.
  29. Hsiao,Hui I; Laue,Matthew; Mega,Cataldo, Content management system and methodology employing non-transferable access tokens to control data access.
  30. Ishibashi,Yasuhiro, Content processing system and content protecting method.
  31. Kazuhiro Sakata JP, Cooperative work support system.
  32. Angelo Michael F. ; Driscoll Daniel J., Copy protection for recorded media.
  33. Lee, Chang-Hyi; Chung, Ho-Suk; Kang, Eun-Seong, Copy protection system for portable storage media.
  34. Asano, Tomoyuki; Osawa, Yoshitomo; Komuro, Teruyoshi; Hamada, Ichiro, Copy protection using detailed copy control information.
  35. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  36. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  37. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  38. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
  39. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  40. Seheidt Edward M. ; Crowley John J., Cryptographic key management method and apparatus.
  41. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  42. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  43. Hirano,Hideyuki; Hashimoto,Shinji; Hattori,Eiki; Mochizuki,Shigetoshi, Data administration method.
  44. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  45. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  46. Ote Ichiro,JPX ; Iwabuchi Kazunori,JPX ; Washimi Hiroaki,JPX ; Furukawa Hiroshi,JPX ; Sumitomo Masahito,JPX ; Kobayashi Yuuichi,JPX, Data encryption control apparatus and method.
  47. Yoshino, Kenji; Ishibashi, Yoshihito; Akishita, Toru; Shirai, Taizo; Ito, Takeshi; Hayashi, Shigekazu, Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management.
  48. Nonaka,Akira; Ezaki,Tadashi, Data providing system, device, and method.
  49. Mullen,Nancy K.; Green,Michael J., Data warehouse computing system.
  50. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  51. Randal Chilton Burns ; Edward Gustav Chron ; Darrell Long ; Benjamin Clay Reed, Decentralized remotely encrypted file system.
  52. Gune,Prasad; Deighton,Anthony; Chen,Mingte; Kuo,Richard; Walcott,Wister, Defining an approval process for requests for approval.
  53. Lee, Michele C., Delivering output XML with dynamically selectable processing.
  54. En-Seung, Kang; Jin-Young, Byun, Digital content cryptograph and process.
  55. Howard, John H.; Robinson, David; Rettberg, Randall D., Direct access from client to storage device.
  56. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  57. Shanton M. Greg, Distributed cryptographic object method.
  58. Shanton M. Greg, Distributed cryptographic object method.
  59. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  60. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  61. Dondeti Lakshminath R. ; Mukherjee Sarit ; Samal Ashok, Distributed group key management scheme for secure many-to-many communication.
  62. Friedel,Guy; Katz,Ariel; Shamir,Yaron; Nathan,Abraham, Distributed policy model for access control.
  63. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  64. Pendharkar,Sameer, Drain-extended MOS transistors with diode clamp and methods for making the same.
  65. Ohtsu Toshiyuki,JPX, Dynamic adding system for memory files shared among hosts, dynamic adding method for memory files shared among hosts, and computer-readable medium recording dynamic adding program for memory files sh.
  66. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage and export contact information.
  67. Girish Rai ; Philip M. Parsons ; Mooi Chuah, Efficient mobility management scheme for a wireless internet access system.
  68. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  69. Kuroda, Yasutsugu; Kamada, Jun; Iwase, Shoko; Noda, Bintatsu; Ono, Etsuo, Electronic data storage apparatus with key management function and electronic data storage method.
  70. Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
  71. Pravetz James D., Encapsulation of public key cryptography standard number 7 into a secured document.
  72. Sasaki Minoru,JPX ; Yoshikawa Hiroharu,JPX, Enciphering/deciphering device and method, and encryption/decryption communication system.
  73. Raike,William Michael; Donovan Smith,Brian James; Higgins,Sean Joseph; Martin,Patrick John, Encrypted media key management.
  74. Tozawa,Jun; Nogami,Hiroshi; Shibayama,Tetsuya; Kataoka,Tomohiro; Fujio,Hiroshi, Encryption and decryption communication semiconductor device and recording/reproducing apparatus.
  75. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  76. Harrison Colin George, Enhanced data privacy for portable computers.
  77. Radia J. Perlman, Ephemeral decryptability.
  78. David Paul Dutcher ; William H. Sinclair, Jr. ; Stanley Alan Smith, Establishment of user home directories in a heterogeneous network environment.
  79. David L. Drake ; David J. Webster, Event detection.
  80. Bhide,Manish Anand; Mohania,Mukesh Kumar, Event-based database access execution.
  81. Neerdaels,Charles J.; Lewin, deceased,Daniel M., Extending an Internet content delivery network into an enterprise.
  82. Cane David ; Hirschman David ; Speare Philip ; Vaitzblit Lev ; Marson Howard, File comparison for data backup and file synchronization.
  83. Shimbo Atsushi,JPX ; Takahashi Toshinari,JPX ; Tomoda Ichiro,JPX ; Murota Masao,JPX, File editing system and shared file editing system with file content secrecy, file version management, and asynchronous.
  84. Nozawa Masafumi (Odawara JPX) Shimada Akinobu (Hiratsuka JPX) Nishimura Toshifumi (Minamiashigara JPX) Kakuse Katsuharu (Hadano JPX) Tsukiyama Tokuhiro (Kanagawa JPX) Yata Kiyoshi (Hadano JPX) Ishii , File encryption method and file cryptographic system.
  85. Eshel Marc M. (Tarrytown NY) Hunt Guerney D. H. (Ithaca NY) Jones Donald N. (Vestal NY) Meyer Christopher (Vestal NY) Schwartz Frederick A. (Binghamton NY), File manager for files shared by heterogeneous clients.
  86. Parker Robert D. ; Holloway Matthew S., File privilege administration apparatus and methods.
  87. Witt, Wesley A.; Zbikowski, Mark J.; McMichael, Lonny D., File protection service for a computer system.
  88. Riddle Guy, File sharing in a teleconference application.
  89. Cross,David B.; Leach,Paul J., File system operation and digital rights management (DRM).
  90. Sitaraman Aravind ; Lou Shuxian ; Zhang Shujin, Forced sequential access to specified domains in a computer network.
  91. Kumar,Sanjay; Thomas,Stanton L.; Deshpande,Gaurav M.; Murty,Venkataesh V., Fulfillment management system for managing ATP data in a distributed supply chain environment.
  92. Bonn, David Wayne; Marvais, Nick Takaski, Generalized network security policy templates for implementing similar network security policies across multiple networks.
  93. Harkins Dan, Group key distribution.
  94. Aoki, Ryuichi, Group oriented public key encryption and key management system.
  95. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  96. Tormasov,Alexander; Lunev,Dennis; Beloussov,Serguei; Protassov,Stanislav; Pudgorodsky,Yuri, Hosting service providing platform system and method.
  97. Watanabe Hiroshi (Kokubunji JPX), IC card which can set security level for every memory area.
  98. Kacker,Rishi R.; Appenzeller,Guido; Pauker,Matthew J.; Spies,Terence, Identity-based encryption system for secure data distribution.
  99. Villavicencio,Francisco J., Impersonation in an access system.
  100. Prakash, Nalini J., Indications of secured digital assets.
  101. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  102. Shimizu Hideo,JPX ; Hori Satomi,JPX ; Endoh Naoki,JPX ; Saisho Toshiaki,JPX, Information processing system having function of securely protecting confidential information.
  103. Asano,Tomoyuki; Osawa,Yoshitomo, Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith.
  104. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  105. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  106. Wiederhold Gio, Information sharing system and method with requester dependent sharing and security rules.
  107. Law,Gary K.; Deitz,David L.; Schleiss,Trevor Duncan; Naidoo,Julian, Integrated electronic signatures for approval of process control and safety system software objects.
  108. Choy David M., Integrated method and system for controlling information access and distribution.
  109. Donner Irah H., Intellectual property audit system.
  110. James A. Parker ; Gary J. Legner ; George Lima ; David P. Schwartz ; James R. Gunkel, Intelligent data inventory & asset management systems method and apparatus.
  111. Kino, Shigenori; Koike, Kazuhiro; Mochizuki, Yasuyuki; Mizuguchi, Takehisa, Inter-application data transmitting system and method.
  112. Serbinis, M. Michael; Leibu, Daniel; Chrapko, Evan V; Pappes, Valerian, Internet document management system and methods.
  113. Jancula,Jeffrey John, Internet third-party authentication using electronic tickets.
  114. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics.
  115. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics and distributed access control.
  116. Jun, Dong-suk; Lee, Sang-seok; Choy, Tae-goo, Isolator/circulator having propeller resonator loaded with a plurality of symmetric magnetic walls.
  117. Christiano Matt (Saratoga CA), License management system for software applications.
  118. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  119. Thomsen,Daniel Jay; O'Brien,Richard; Bogle,Jessica; Payne,Charles, Locally adaptable central security management in a heterogeneous network environment.
  120. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Logon certification.
  121. Shida,Tetsuro, MPEG data recorder having IEEE 1394 interface.
  122. John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
  123. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  124. Mamiya Akira (Yokohama JPX) Suga Akira (Tokyo JPX) Kawamura Hideaki (Kawasaki JPX) Aizawa Takashi (Yokohama JPX) Takahashi Fumiaki (Machida JPX) Hatori Kenji (Hatogaya JPX), Management system of multimedia.
  125. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  126. Brown Scott K. (San Jose CA) Hoem Robert H. (Fremont CA), Method and apparatus for changing the master key in a cryptographic system.
  127. Carter Stephen R., Method and apparatus for collaborative document control.
  128. Zavalkovsky,Arthur; Elfassy,Nitsan, Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points.
  129. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for controlling access to encrypted data files in a computer system.
  130. Batten-Carew, Mark Christopher; Wiener, Michael James, Method and apparatus for controlling release of time sensitive information.
  131. Mast Michael B., Method and apparatus for copy protection of images in a computer system.
  132. Lee Dilkie CA; Paul C. Van Oorschot CA, Method and apparatus for correcting improper encryption and/or for reducing memory storage.
  133. Van Oorschot Paul C.,CAX, Method and apparatus for creating communities of trust in a secure communication system.
  134. McLaughlin Michael D. (San Jose CA) Signa John C. (Sunnyvale CA) Greicar Richard K. (Moss Beach CA) Taylor John M. (London GB2), Method and apparatus for display calibration and control.
  135. Bodie Kathrow ; John R Skelton, III, Method and apparatus for identifying the existence of differences between two files.
  136. Kathrow Bodie ; Skelton ; III John R, Method and apparatus for identifying the existence of differences between two files.
  137. Kadansky Miriam C. ; Hanna Stephen R., Method and apparatus for multicast indication of group key change.
  138. Timothy E. Moses CA; Sharon M. Boeyen CA, Method and apparatus for obtaining status of public key certificate updates.
  139. Batten-Carew Mark,CAX ; Buchler Marek,CAX ; Hiller Stephen William,CAX ; Otway Josanne Mary,CAX, Method and apparatus for processing administration of a secured community.
  140. Chemtob,Helen J., Method and apparatus for providing group interaction via communications networks.
  141. Paul C. Van Oorschot CA, Method and apparatus for public key management.
  142. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
  143. Sames, David L.; Whitmore, Brent S.; Niebuhr, Brian S.; Tally, Gregg W., Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system.
  144. Garcia,Denis Jacques Paul, Method and apparatus for securing digital assets.
  145. Asano,Tomoyuki; Osawa,Yoshitomo, Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode.
  146. Salkewicz William M. ; Callon Ross W., Method and apparatus for synchronizing multiple copies of a database.
  147. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  148. Suarez Larry, Method and architecture for the creation, control and deployment of services within a distributed computer environment.
  149. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall, Method and system for automatically merging files into a single instance store.
  150. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  151. Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
  152. Sieffert, Kent J.; Schaffran, Curtis A., Method and system for gathering information resident on global computer networks.
  153. Le Pennec,Jean Fran챌ois; Hericourt,Olivier; Fieschi,Jacques, Method and system for generating and using a virus free file certificate integrated within a file.
  154. Vainstein, Klimenty, Method and system for managing security tiers.
  155. Stoodley, Marcus A., Method and system for medical patient data analysis.
  156. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  157. Jakobsson, Markus Bjorn, Method and system for providing translation certificates.
  158. Jakobsson, Markus Bjorn, Method and system for quorum controlled asymmetric proxy encryption.
  159. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  160. Krueger, Scott; Goodman, Daniel, Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program.
  161. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  162. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Method and system for securely archiving core data secrets.
  163. Komuro Teruyoshi,JPX ; Osawa Yoshitomo,JPX ; Shima Hisato ; Asano Tomoyuki,JPX, Method and system for transferring information using an encryption mode indicator.
  164. Komuro,Teroyoshi; Osawa,Yoshitomo; Shima,Hisato; Asano,Tomoyuki, Method and system for transferring information using an encryption mode indicator.
  165. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  166. Chan, Victor; Ho, Francis, Method and system providing in-line pre-production data preparation and personalization solutions for smart cards.
  167. Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
  168. Morgan Joseph M. ; Harold Michael D., Method for creating specific purpose rule-based n-bit virtual machines.
  169. Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA), Method for ensuring secure communications.
  170. Wu Shye-Lin,TWX, Method for fabricating trench-isolation structure.
  171. Still Kelly W., Method for gradual deployment of user-access security within a data processing system.
  172. Davy William R. (Dublin OH), Method for moving an open file being accessed by at least one user.
  173. Kramer Paul H. (Rochester MN) Tate Kay A. (Rochester MN), Method for protecting data in a computer system.
  174. Bala,Vasanth; Smith,Michael D., Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent.
  175. Boneh Dan ; Lipton Richard J., Method for revoking computer backup files using cryptographic techniques.
  176. Novorita Robert J. (Orland Park IL), Method for updating encryption key information in communication units.
  177. Pinkas, Denis, Method for verifying the use of public keys generated by an on-board system.
  178. Skarbo Rune A. ; Clitheroe Cameron J. ; Lawless Christopher C. ; Kukkal Puneet ; Hochman Stephen D., Method for web based storage and retrieval of documents.
  179. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  180. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  181. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  182. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  183. Stakutis,Christopher John; Haselton,William Robert; Stearns,Kevin Michael; Stuart,Alan L.; Marek,Toby Lyn, Method, system, and program for archiving files.
  184. Wilson, Rodger P., Method, system, and program for encrypting files in a computer system.
  185. Stuart,Alan L.; Marek,Toby Lyn, Method, system, and program for implementing retention policies to archive records.
  186. Hochberg,Avishai Haim; Marek,Toby Lyn; Cannon,David Maxwell; Martin,Howard Newton; Warren, Jr.,Donald Paul; Haye,Mark Alan, Method, system, and program for retention management and protection of stored objects.
  187. Hartman, Bret A.; Flinn, Donald J.; Burghart, Jr., Theodore R., Methods and apparatus for facilitating security in a network.
  188. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  189. Arlein,Robert M.; Jai,Ben; Jakobsson,Bjorn Markus; Monrose,Fabian; Reiter,Michael Kendrick, Methods and apparatus for providing privacy-preserving global customization.
  190. Dickinson, Peter, Methods and apparatuses for file synchronization and updating using a signature list.
  191. Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  192. Kluttz, Karen Ruth; Singhal, Sandeep Kishan, Methods, systems and computer program products for multi-level encryption.
  193. Schell, Roger R.; Jueneman, Robert R.; Gayman, Mark G., Module authentication and binding library extensions.
  194. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  195. Multerer Boyd ; Schwartz Kerry S. ; Stebbens Kim, Multi-server location-independent authentication certificate management system.
  196. Goetz Tom ; Sridhar Manickam R. ; Prasad Mukesh, Multimedia file, supporting multiple instances of media types, and method for forming same.
  197. Preston Harold W. (Carrollton TX) Rush Jeffrey R. (Richardson TX), Multiple user stored data cryptographic labeling system and method.
  198. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  199. Vahalia Uresh K. ; Gupta Uday ; Porat Betti ; Tzelnic Percy, Network file server sharing local caches of file access information in data processors assigned to respective file systems.
  200. Jacobson, Andrea M., Network policy management and effectiveness system.
  201. Alon Cohen IL, Network vaults.
  202. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin, Object caching and update queuing technique to improve performance and resource utilization.
  203. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin, Object caching and update queuing technique to improve performance and resource utilization.
  204. Iyer, Mahadevan; Apsani, Lavanya; Malviya, Pankaj, Object model for network policy management.
  205. Bolosky, William J.; Cermak, Gerald; Adya, Atul; Douceur, John R., On-disk file format for a serverless distributed file system.
  206. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  207. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  208. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  209. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  210. Bolosky,William J.; Adya,Atul; Douceur,John R., On-disk file format for serverless distributed file system with signed manifest of file modifications.
  211. Riedel,Erik; Kallahalla,Mahesh; Swaminathan,Ram, Optimizing costs associated with managing encrypted data.
  212. Begis, Glenn, Out-of-band signaling for network based computer session synchronization.
  213. Schmuck Frank B. ; Wyllie James Christopher ; Engelsiepen Thomas E., Parallel file system and method with extensible hashing.
  214. Schmuck Frank B. ; Zlotek Anthony J. ; Shmueli Boaz,ILX ; Mandler Benjamin,ILX ; Yehudai Zvi Yosef,ILX ; Kish William A., Parallel file system with method using tokens for locking modes.
  215. Venkatesan, Ramarathnam; Yacobi, Yacov, Passive and active software objects containing bore resistant watermarking.
  216. Kadooka Etsuko (Tokyo JPX), Password updating system to vary the password updating intervals according to access frequency.
  217. Aboulhosn, Amir L.; Chen, Rui; Koo, David M.; Vineberg, David J.; Wald, James F.; Murphy, Stephen, Peer-to-peer file sharing.
  218. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  219. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  220. Smith, Jeffrey C.; Bandini, Jean-Christophe, Private, trackable URLs for directed document delivery.
  221. Nevoux Rola (Elancourt FRX) Campana Mireille (Clamart FRX), Process of combined authentication of a telecommunication terminal and of a user module.
  222. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Protected storage of core data secrets.
  223. Singhal, Sandeep Kishan; Gopal, Ajei Sarat, Providing secure network access for short-range wireless computing devices.
  224. Roddy, Brian J.; Hanson, Michael; Lilly, III, John O., Providing security for external access to a protected computer network.
  225. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  226. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  227. Lortz, Victor B., Resource policy management using a centralized policy data structure.
  228. Teresa Win ; Emilio Belmonte, Role-based navigation of information resources.
  229. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  230. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  231. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Secure data storage and retrieval with key management and user authentication.
  232. Folmsbee Alan, Secure execution of program instructions provided by network interactions with processor.
  233. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  234. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  235. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  236. Carroll Robert B., Secure server and method of operation for a distributed information system.
  237. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  238. Garcia,Denis Jacques Paul, Secured data format for access control.
  239. Pravetz James D. ; Malloy Thomas J., Secured document access control using recipient lists.
  240. Mark E. Peters, Securing Web server source documents and executables.
  241. Rose Anthony M. (66 Drumalbyn Road Bellevue Hill ; Sydney AUX 2023), Securing a computer against undesired write operations to or read operations from a mass storage device.
  242. Feuerstein,Yehuda; Pfost,Jared E.; Purpura,Stephen J., Security component for a computing device.
  243. Deo Umesh, Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems.
  244. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  245. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
  246. Ram, Prasad; Ta, Thanh T.; Wang, Xin, Self-protecting documents.
  247. Roseman, Robert D., Server based virtual conferencing.
  248. Kauffman Steven Victor ; Lewis Lara Marie ; Willey James Albert, Shared file system for digital content.
  249. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall ; Richard F. Rashid ; Nathan P. Myhrvold ; David A. Goebel, Single instance store for file systems.
  250. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  251. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  252. Shah, Rajendra; Shanumgam, Udayakumar; Apsani, Lavanya, State transition protocol for high availability units.
  253. Tsuge,Munetoshi, Storage management integrated system and storage control method for storage management integrated system.
  254. Kobayashi,Hiroyuki; Uchida,Yoshiaki, Storage medium and method and apparatus for separately protecting data in different areas of the storage medium.
  255. Dewitt Frederick J. ; McGuire Thomas D., Storage optimizing encoder and method.
  256. Mahar Robert C. (P.O. Box "B" Pennsburg PA 18073), Subroutine-type computer program for enhancing the speed of data processing in data management programs systems.
  257. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  258. Barlow, Doug; Dillaway, Blair; Fox, Barbara; Lipscomb, Terry; Spies, Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  259. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  260. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  261. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  262. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  263. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  264. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  265. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  266. Dutta,Tanmoy; Balikov,Alexander; Naresh,Himani, System and method for document isolation.
  267. Estrada,Julio; Estrada,Miguel A.; Shore,Maurice E., System and method for dynamic browser management of web site.
  268. Najork Marc Alexander ; Heydon Clark Allan, System and method for efficient representation of data set addresses in a web crawler.
  269. Olsen, Theis; Bundesen, Rune Windfeld; Hougaard, Claes Christian; Nordly, Trygve Thor, System and method for ensuring secure transfer of a document from a client of a network to a printer.
  270. Meyer, Marc A., System and method for flexible packaging of software application licenses.
  271. Dennis, Michael W.; Freed, Michele L.; Plastina, Daniel; Flo, Eric R.; Kays, Jr., David E.; Corrington, Robert E., System and method for implementing group policy.
  272. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  273. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  274. Moriconi, Mark; Qian, Shelly, System and method for maintaining security in a distributed computer network.
  275. Kiessig,Rick; Yost,David A.; Mathon,John D., System and method for managing content with event driven actions to facilitate workflow and other features.
  276. Erickson John S., System and method for managing copyrighted electronic media.
  277. Erickson, John S., System and method for managing copyrighted electronic media.
  278. Leong, Sang; Telkowski, William, System and method for managing information retrievals from distributed archives.
  279. Rose John R., System and method for managing try-and-buy usage of application programs.
  280. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  281. Morishita,Takuya, System and method for preventing an illegal copy of contents.
  282. Sakurai Hiroshi (Tokyo JPX) Ikeda Nobuyuki (Tokyo JPX) Watabe Akehiro (Tokyo JPX), System and method for processing document information using password protected icons that represent document content.
  283. Alben,Jonah M.; Pember,Bruce W., System and method for providing a hardware icon with magnification and security.
  284. Henry,Paul S.; Luo,Hui, System and method for providing access to multiple user accounts via a common password.
  285. Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
  286. Novak, Robert E., System and method for providing conditional access to digital content.
  287. Greg B. Garrison, System and method for restricting access to a data table within a database.
  288. Mittra Suvo, System and method for secure group communications via multicast or broadcast.
  289. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  290. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  291. Dixon Peggy PakFan ; Shi Danling ; Verburg Richard Lee ; Wood Donald Edwin, System and method for transferring a session from one application server to another without losing existing resources.
  292. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  293. Bess, Dwayne Lamarr; Brischke, Harold Allan; Keller, Andrew Charles; Wagner-Krankel, Dale Alan; Tijerina, Jacob Garza; Connolly, Jr., Billy Ray; O'Connor, Karen Ann; McDaniel, James William; Lewis, R, System and method of providing electronic access to one or more documents.
  294. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  295. McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
  296. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  297. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  298. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  299. Bacha, Hamid; Carroll, Robert Bruce; Mirlas, Lev; Tchao, Sung Wei, System for electronic repository of data enforcing access control on data search and retrieval.
  300. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for enabling lazy-revocation through recursive key generation.
  301. Riedel,Erik; Karamanolis,Christos; Kallahalla,Mahesh; Swaminathan,Ram, System for ensuring data privacy and user differentiation in a distributed file system.
  302. Stelliga, Tony, System for multi-layer broadband provisioning in computer networks.
  303. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for optimized key management with file groups.
  304. Hahn Samuel S. ; LeGault Kenn ; Wheeler Maxon ; Degenhardt Jon R., System for organizing document icons with suggestions, folders, drawers, and cabinets.
  305. Donaghey, Robert J.; Carielli, Sandra E.; Helinek, Pamela, System for selecting and disseminating active policies to peer device and discarding policy that is not being requested.
  306. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  307. Mahajan Rakesh (Laguna Hills CA), System for updating directory information and data on write once media such as an optical memory card.
  308. Krishnaswamy, Sridhar; Elliott, Isaac K.; Reynolds, Tim E.; Forgy, Glen A.; Solbrig, Erin M., System, method and article of manufacture for a communication system architecture including video conferencing.
  309. Elliott,Isaac K., System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture.
  310. Minkin, Ilya; Balabine, Igor V.; Eschelbeck, Gerhard, System, method and computer program product for rule based network security policies.
  311. Murray,Bill; Lewitzky,Andre; Boldt,Tim, Systems and methods for data backup over a network.
  312. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  313. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K.; Twaddell,Gordon W., Systems and methods for state-less authentication.
  314. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  315. Davis Mark Charles ; Gray Steve D. ; Kuehr-McLaren David Gerard ; Morrison Ian A. ; Shoriak Timothy G., Systems, methods and computer program products for authenticating client requests with client certificate information.
  316. Amini,Lisa; Belknap,William R., Systems, methods, and computer program products for accelerated dynamic protection of data.
  317. Peterson ; Jr. Mendel Lazear, Time based availability to content of a storage medium.
  318. Donald Ralph Hart, Tracker sensing method for regulating synchronization of audit files between primary and secondary hosts.
  319. Freivald Matthew P. ; Noble Alan C., Unique-change detection of dynamic web pages using history tables of signatures.
  320. Squier,Anthony C.; Austin,Calvin J., Universal session sharing.
  321. Hinchliffe,Alexander James; Howard,Fraser Peter; Rai,Bobby; Kemp,Andrew, Updating data from a source computer to groups of destination computers.
  322. Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
  323. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  324. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  325. Takada,Yuji; Nishida,Taishin, Variable-length key cryptosystem.
  326. Bobbitt,Jared E.; Doll,Stephan A.; Friedman,Marc T.; Lau,Patrick Wing Sang; Mullally,Joseph P., Virtual file system.
  327. Keller Neal Martin ; Pickover Clifford Alan, Visual access to restricted functions represented on a graphical user interface.
  328. McBride Randall C., Volatile key apparatus for safeguarding confidential data stored in a computer system memory.
  329. Natarajan, Balas K., Watermarking of digital object.
  330. Cannata,Michael J.; Lee,Richard; Powell,Matthew; Ramasra,Ryan; Smith,Gerald William; Tatham,Charles Edward; Remme,Randall Nelson, Web-based groupware system.

이 특허를 인용한 특허 (29)

  1. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Distributed document version control.
  2. Herbach, Jonathan D.; Gilchrist, Gary, Distributed document version control.
  3. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  4. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  5. Brickell, Justin Lee; Mahadevan, Swaminathan; Butler, IV, Harry Lee; Wieler, Bobby; Blanco, Ignacio Carlos, Dynamic alteration of track data.
  6. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  7. Furuya, Tomoyuki, Information processing apparatus and data management system.
  8. Vembu, Balaji; Sarangdhar, Nitin; Shanbhogue, Vedvyas, Method and apparatus for providing a secure display window inside the primary display.
  9. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  10. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  11. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  12. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  13. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  14. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  15. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  16. Monga, Indermohan, Method for dynamic sensor network processing.
  17. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  18. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  19. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  20. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  21. Wollmershauser, Steven M.; Diroo, Yolius; Walter, Edward; Bangor, Aaron; Sullivan, Marc, Methods and systems to process an image.
  22. Shapiro, William M.; Donahue, James; Herbach, Jonathan D., Offline access in a document control system.
  23. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  24. Andrews, Mark William; Blandina, Michael; Bedier, Osama, Selecting a preferred payment instrument.
  25. Andrews, Mark William; Blandina, Michael; Bedier, Osama, Selecting a preferred payment instrument.
  26. Mizhen, Boris; Curtis, Kendra Shannon, Selecting a preferred payment instrument based on a merchant category.
  27. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  28. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  29. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트