$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Dynamic file access control and management 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 UP-0989479 (2001-11-20)
등록번호 US-7660902 (2010-04-02)
발명자 / 주소
  • Graham, Todd D.
  • Hudson, Jonathan C.
출원인 / 주소
  • RSA Security, Inc.
대리인 / 주소
    BainwoodHuang
인용정보 피인용 횟수 : 328  인용 특허 : 73

초록

A dynamic file access control and management system and method in accordance with the present invention may be a proxy file management system that includes one or more file system proxy servers that provide selective access and usage management to files available from one or more file systems or sou

대표청구항

What is claimed is: 1. A method performed by a proxy server, the method comprising: receiving, over a first network connection, a Network File System (NFS) based request from a client machine for a data block of a data file from a remote network attached storage system, the request having an associ

이 특허에 인용된 특허 (73)

  1. Beetcher Robert Carl ; Corrigan Michael Joseph ; Reardon ; Jr. Francis Joseph ; Moran James William, Apparatus and method for controlling access to software.
  2. Wong, Dean W., Apparatus and method for providing a device level security mechanism in a network.
  3. Gasper John ; Sutton James Edward, Copy restrictive documents.
  4. Leveridge,Philip C.; Strange,Michael I.; Parkinson,David W.; Roberts,David; Kenning,Michael J.; Tibbitt Eggleton,Robert I., Data communications.
  5. Yagasaki Yoichi,JPX ; Koyanagi Hideki,JPX ; Tahara Katsumi,JPX ; Fujinami Yasushi,JPX, Data recording apparatus and method for preventing illegal copying.
  6. Mason Colin,JPX ; Maruno Koichi,JPX, Data security method and system.
  7. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  8. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeting a playback device.
  9. Nelson David L. ; Uppaluru Premkumar ; Romano Pasquale ; Kleiman Jeffrey L., Digital media data stream network management system.
  10. Herbert Howard C. ; Davis Derek L., Digital signature purpose encoding.
  11. David S. Schneider ; Michael B. Ribet ; Laurence R. Lipstone ; Daniel Jensen, Distributed administration of access to information.
  12. Krishna B. C. ; Melbin Julie ; Latham Daniel E., Distributed electronic publishing system.
  13. Angal Rajeev ; Allavarpu Sai V.S. ; Bhat Shivaram ; Fisher Bart Lee, Distributed system and method for controlling access to network resources and event notifications.
  14. Chernock, Richard S.; Dettori, Paolo; Schaffa, Frank A.; Seidman, David I., Efficient method for rule-based distribution and management of content in a distributed hierarchy of storage devices.
  15. Benson Glenn Stuart,DEX, Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software.
  16. Fielder Guy L. ; Alito Paul N., File encryption method and system.
  17. Deng, Feng; Ke, Yan; Luo, Dongping, Firewall including local bus.
  18. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  19. Kou Weidong,CAX, Generic file format for multiple security requirements.
  20. Saito Atsushi,JPX ; Takasaki Yoshitaka,JPX ; Kinoshita Taizo,JPX ; Kitajima Shigeki,JPX, Information transmission system with variable transmission rate.
  21. Delph Daniel C., Kiosk controller that retrieves content from servers and then pushes the retrieved content to a kiosk in the order specified in a run list.
  22. Franklin Nicholas Huston ; Bodine Bill Guy ; Cook Randall R. ; Gaisford Calvin R. ; Brooks Matthew G. ; Heesch Carla M. ; Sonderegger Kelly E., Licensing controller using network directory services.
  23. Elgressy,Doron; Ben Aderet,Fabian, Method and agent for the protection against the unauthorized use of computer resources.
  24. Arent Michael A., Method and apparatus for authenticating on-line transaction data.
  25. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  26. Staley Clinton A., Method and apparatus for detecting unauthorized copies of software.
  27. Davenport D'Ingianni Rita Rae ; Law ; Jr. Albert Giles, Method and apparatus for facilitating financial transactions within a communications system.
  28. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  29. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  30. Smith Jeffrey C. ; Bandini Jean-Christophe, Method and system for dynamic server document encryption.
  31. Shaath,Kamel; Fu,Yaqun; Parthasarathy,Vinay; Jelvis,Alexel; Liyansky,Abel L., Method and system for electronic file lifecycle management.
  32. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  33. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  34. Nuttall Fran.cedilla.ois-Xavier,FRX, Method for computer network operation providing basis for usage fees.
  35. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  36. Barkan Mordhay,ILX, Method for safe communications.
  37. Murray Christopher Stephen, Method for the sequential transmission of compressed video information at varying data rates.
  38. Berson William ; Kumar Shailendra, Method for verifying an identification card and recording verification of same.
  39. Brown, Michael Wayne; Lawrence, Kelvin Roderick; Paolini, Michael A., Monitoring and managing user access to content via a universally accessible database.
  40. Warren Robert L. ; Lee Chong U. ; Moallemi Kamran, Multi-media copy management system.
  41. Schales,Douglas Lee; Seshan,Srinivasan; Zohar,Miriam, Network data packet classification and demultiplexing.
  42. Nguyen Minhtam C. (10018 Lexington Estates Blvd. Boca Raton FL 33428), Network with secure communications sessions.
  43. Klingman Edwin E., On-line secured financial transaction system through electronic media.
  44. Putzolu, David Matthew, Policy-based network management system using dynamic policy generation.
  45. Zampese David, Purchase management system and method.
  46. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  47. Kirsch Steven T., Secure, convenient and efficient system and method of performing trans-internet purchase transactions.
  48. O'Brien, Richard; Lu, Raymond; Mitchem, Terrence; Minear, Spencer, Security framework for dynamically wrapping software applications executing in a computing system.
  49. Warner Richard D. ; Lind John T., Security printed document to prevent unauthorized copying.
  50. Delph Daniel C., Server-based host monitor.
  51. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench ; Jr. Edwin H., Stand alone device for providing security within computer networks.
  52. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench Edwin H., Stand alone security device for computer networks.
  53. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  54. Zeanah James ; Abbott Charles ; Boyd Nik ; Cohen Albert ; Cook James ; Grandcolas Michael ; Lan Sikhun ; Lindsley Bonnie ; Markarian Grigor ; Moss Leslie, System and method for delivering financial services.
  55. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  56. Erickson John S., System and method for managing copyrighted electronic media.
  57. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  58. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  59. Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
  60. Schwering, David, System and method for routing and processing data packets.
  61. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  62. Boucher Guillaume,FRX ; Gaillard Joel,BSX ; Villeneuve Charles,BSX, System and method for transparent translation of electronically transmitted messages.
  63. Reisman Richard R. (20 E. 9th St. #14K New York NY 10003), System for automatic unattended electronic information transport between a server and a client by a vendor provided tran.
  64. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  65. Lowthert Jonathan, System for maintaining a minimum level of digitized data signal quality while allowing bandwidth dependent quality enhan.
  66. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  67. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  68. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  69. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  70. Pickett Thomas E., Transaction security method and apparatus.
  71. Atalla Martin M., Unified end-to-end security methods and systems for operating on insecure networks.
  72. Daines Bernard N. ; Birenbaum Lazar ; Hausman Richard J., Variable latency cut through bridge having variable latency threshold point being configured dynamically for forwarding.
  73. Paulsen Gaige B. ; Walker Amanda, Virtual private network system and method.

이 특허를 인용한 특허 (328)

  1. Kumar, Srinivas; Bettadapura, Vijayashree S.; Shah, Shadab Munam, Access, priority and bandwidth management based on application identity.
  2. Dabbiere, Alan, Advanced authentication techniques.
  3. Mullen, Jeffrey D., Advanced dynamic credit cards.
  4. Yen, Philip W.; Mullen, Jeffrey D., Advanced loyalty applications for powered cards and devices.
  5. Yen, Philip W.; Mullen, Jeffrey D., Advanced loyalty applications for powered cards and devices.
  6. Yen, Philip W.; Mullen, Jeffrey D., Advanced loyalty applications for powered cards and devices.
  7. Mullen, Jeffrey D.; Yen, Philip W., Advanced payment options for powered cards and devices.
  8. Mullen, Jeffrey D.; Yen, Philip W., Advanced payment options for powered cards and devices.
  9. Mullen, Jeffrey D.; Yen, Philip W., Advanced payment options for powered cards and devices.
  10. Mullen, Jeffrey D.; Yen, Philip W., Advanced payment options for powered cards and devices.
  11. Phanse, Shruti; Kumar, Bhavesh Krishna, Anonymized application scanning for mobile devices.
  12. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  13. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  14. Brannon, Jonathan Blake, Attempted security breach remediation.
  15. Marshall, John; Sorensen, Christian Blake, Attendance tracking via device presence.
  16. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  17. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  18. Meyer, Cayden, Automatically organizing images.
  19. Dabbiere, David, Autonomous device interaction.
  20. Martin, Douglas Raymond; Rockwell, Mark Anthony, Autonomous vehicle theft prevention.
  21. Cloutier, Bruce S.; Workley, James H.; Shepherd, William T., Cards and assemblies with user interfaces.
  22. Cloutier, Bruce S.; Workley, James H.; Shepherd, William T., Cards and assemblies with user interfaces.
  23. Cloutier, Bruce S.; Workley, James H.; Shepherd, William T., Cards and assemblies with user interfaces.
  24. Cloutier, Bruce S.; Workley, James H.; Shepherd, William T., Cards and assemblies with user interfaces.
  25. Mullen, Jeffrey D.; Nicklaus, Eric R., Cards and devices with embedded holograms.
  26. Mullen, Jeffrey D.; Nicklaus, Eric R., Cards and devices with embedded holograms.
  27. Mullen, Jeffrey D.; Nicklaus, Eric R., Cards and devices with embedded holograms.
  28. Mullen, Jeffrey D.; Nicklaus, Eric R., Cards and devices with embedded holograms.
  29. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with magnetic emulators and magnetic reader read-head detectors.
  30. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with magnetic emulators with zoning control and advanced interiors.
  31. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with magnetic emulators with zoning control and advanced interiors.
  32. Mullen, Jeffrey David; Lambeth, David; Cloutier, Bruce, Cards and devices with magnetic emulators with zoning control and advanced interiors.
  33. Mullen, Jeffrey David; Lambeth, David; Cloutier, Bruce, Cards and devices with magnetic emulators with zoning control and advanced interiors.
  34. Mullen, Jeffrey D.; Lambeth, David N.; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  35. Mullen, Jeffrey D.; Lambeth, David N.; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  36. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  37. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  38. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  39. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  40. Mullen, Jeffrey David; Lambeth, David; Cloutier, Bruce, Cards and devices with multifunction magnetic emulators and methods for using same.
  41. Mullen, Jeffrey D.; Yen, Philip W.; Rigatti, Christopher J., Cards deployed with inactivated products for activation.
  42. Mullen, Jeffrey D.; Yen, Philip W.; Rigatti, Christopher J., Cards deployed with inactivated products for activation.
  43. Mullen, Jeffrey D.; Yen, Philip W.; Rigatti, Christopher J., Cards deployed with inactivated products for activation.
  44. Cloutier, Bruce S.; Workley, James H.; Lambeth, David N.; Mullen, Jeffrey D., Cards having dynamic magnetic stripe communication devices fabricated from multiple boards.
  45. Mullen, Jeffrey D., Cards including anti-skimming devices.
  46. Cloutier, Bruce S., Cards with power management.
  47. Mullen, Jeffrey D.; Lambeth, David; Kellogg, Ryan, Cards with serial magnetic emulators.
  48. Mullen, Jeffrey D.; Lambeth, David; Kellogg, Ryan, Cards with serial magnetic emulators.
  49. Mullen, Jeffrey D.; Beaver, Jonathan L., Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality.
  50. Batra, Gautam, Cards, devices, systems, methods and dynamic security codes.
  51. Dabbiere, Alan; Stuntebeck, Erich, Certificate based profile confirmation.
  52. Meyer, Cayden; Onofrio, Joel Christopher, Classification and storage of documents.
  53. Ardeli, Ramesh; Kurmala, Hari Krishna, Client reputation driven role-based access control.
  54. Hidayat, Ariya, Client/server polymorphism using polymorphic hooks.
  55. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  56. Pollutro, Dennis Vance; Tran, Kiet Tuan; Kumar, Srinivas, Computer security system.
  57. Poidomani, Mark; Ziegler, Joan; Foo, Eric; Alon, Ziv; McGuire, Charles; Routhenstein, Lawrence, Conducting a transaction with an electronic card.
  58. Bussani, Anthony; Camenisch, Jan L.; Gross, Thomas R.; Husemann, Dirk; Sommer, Dieter M., Confidential presentations in virtual world infrastructure.
  59. Stuntebeck, Erich, Controlling access to resources on a network.
  60. Marshall, John; Rykowski, Adam; Stuntebeck, Erich; Halebeed, Jyothiprakash, Controlling distribution of resources in a network.
  61. Marshall, John; Stuntebeck, Erich; Jayaprakash, Gopinath; Manton, John Joseph; Brannon, Jonathan Blake, Controlling distribution of resources on a network.
  62. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a network environment.
  63. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  64. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  65. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  66. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  67. Mullen, Jeffrey D.; Reutzel, Will, Credit, security, debit cards and the like with buttons.
  68. Mullen, Jeffrey David; Reutzel, Will, Credit, security, debit cards and the like with buttons.
  69. Stuntebeck, Erich, Data access sharing.
  70. Stuntebeck, Erich, Data access sharing.
  71. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  72. Dabbiere, Alan; Stuntebeck, Erich, Data communications management.
  73. Huang, He Yuan; Liu, Xiao Xi; Hu, Qi; Zhang, Guan Qun, Data leakage protection in cloud applications.
  74. Batra, Gautam, Data modification for magnetic cards and devices.
  75. Batra, Gautam, Data modification for magnetic cards and devices.
  76. Mizuno, Takafumi, Data processing apparatus, control method, and program.
  77. Khanwalkar, Manoj; Camacho, Adler; Van Lare, Stephen; Winkler, Omer; Tuttle, Luke David; Patel, Surag I., Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups.
  78. Manton, John Joseph, Delegating authorization to applications on a client device in a networked environment.
  79. Manton, John Joseph; Kommireddy, Sridhara Babu; Rykowski, Adam Stephen, Delegating authorization to applications on a client device in a networked environment.
  80. Dufel, Michael; Subramanium, Vijayababu; Chowdhury, Mizanul, Delivery of authentication information to a RESTful service using token validation scheme.
  81. Dabbiere, Alan, Device management macros.
  82. Mullen, Jeffrey D.; Nicklaus, Eric R., Display card.
  83. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S.; Mostowy, Jr., L. Casimir, Display with font.
  84. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S.; Mostowy, Jr., L. Casimir, Display with font.
  85. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S.; Mostowy, Jr., L. Casimir, Display with font.
  86. Allaire, Jeremy; Mason, Robert, Distribution of content.
  87. Allaire, Jeremy; Mason, Robert, Distribution of content.
  88. Dabbiere, Alan; Stuntebeck, Erich, Distribution of variably secure resources in a networked environment.
  89. Mullen, Jeffrey D, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
  90. Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
  91. Workley, James H., Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices.
  92. Workley, James H., Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices.
  93. Workley, James H., Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices.
  94. Poidomani, Mark; Ziegler, Joan; Foo, Eric; Alon, Ziv; Routhenstein, Lawrence, Electronic card.
  95. Poidomani, Mark; Ziegler, Joan; Foo, Eric; Alon, Ziv; McGuire, Charles; Routhenstein, Lawrence, Electronic card and methods for making same.
  96. Poidomani, Mark; Ziegler, Joan; Foo, Eric; Alon, Ziv; McGuire, Charles; Routhenstein, Lawrence, Electronic cards and methods for making same.
  97. Johnson, Jay A.; Johnston, Mark A.; Hyman, Ronald M.; Kaschmitter, Chris M., Electronic document management and delivery.
  98. Johnson, Jay A.; Johnston, Mark R.; Hyman, Ronald M.; Kaschmitter, Chris M., Electronic document management and delivery.
  99. Johnson, Jay A.; Johnston, Mark R.; Hyman, Ronald M.; Kaschmitter, Chris M., Electronic document management and delivery.
  100. Poidomani, Mark; Routhenstein, Lawrence; McGuire, Charles; Alon, Ziv, Electronic financial transaction cards and methods.
  101. Lambeth, David N.; Cloutier, Bruce S., Electronic magnetic recorded media emulators in magnetic card devices.
  102. Raggousis, Konstantinos, Electronic medical record distribution, systems and methods.
  103. Raggousis, Konstantinos, Electronic medical record distribution, systems and methods.
  104. Schmoyer, Timothy; Dufel, Michael; Staggs, David; Subramanium, Vijayababu, Elevating trust in user identity during RESTful authentication and authorization.
  105. Martin, Douglas Raymond; Rockwell, Mark Anthony, Encryption for telematics flashing of a vehicle.
  106. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  107. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  108. Marshall, John, Enterprise-specific functionality watermarking and management.
  109. Marshall, John, Enterprise-specific functionality watermarking and management.
  110. Marshall, John, Enterprise-specific functionality watermarking and management.
  111. Yu, Jun; Workley, James H., Exchange coupled amorphous ribbons for electronic stripes.
  112. Stuntebeck, Erich, Facial capture managing access to resources by a device.
  113. Ou-Yang, Darwin; Novotney, Peter; Thind, Ravinder, File encryption support for FAT file systems.
  114. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  115. Dabbiere, Alan; Stuntebeck, Erich, Functionality management via application modification.
  116. Marshall, John, Functionality watermarking and management.
  117. Marshall, John, Functionality watermarking and management.
  118. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  119. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  120. Yen, Philip W.; Mullen, Jeffrey D., Games, prizes, and entertainment for powered cards and devices.
  121. Yen, Philip W.; Mullen, Jeffrey D., Games, prizes, and entertainment for powered cards and devices.
  122. Mercury, Mark Thomas; Schmidt, Kurt Jarin, Generation, management, and tracking of digital credentials.
  123. Mercury, Mark Thomas; Schmidt, Kurt Jarin, Generation, management, and tracking of digital credentials.
  124. DiRico, John; Stuntebeck, Erich, Individual-specific content management.
  125. Phanse, Shruti; Kumar, Bhavesh Krishna, Integrated application scanning and mobile enterprise computing management system.
  126. Mullen, Jeffrey D.; Hartwick, David J.; Mostowy, Jr., L. Casimir, Interactive card.
  127. Mullen, Jeffrey D.; Hartwick, David J.; Mostowy, Jr., L. Casimir, Interactive card.
  128. Mullen, Jeffrey D.; Hartwick, David J.; Mostowy, Jr., L. Casimir, Interactive display card.
  129. Mullen, Jeffrey D.; Hartwick, David J.; Mostowy, Jr., L. Casimir, Interactive display card.
  130. Mullen, Jeffrey D.; Hartwick, David J.; Mostowy, Jr., L. Casimir, Interactive display card.
  131. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with button.
  132. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with buttons.
  133. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with buttons.
  134. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with buttons.
  135. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with buttons.
  136. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with buttons.
  137. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with buttons.
  138. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with buttons.
  139. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with buttons.
  140. O'Shea, Norman E.; Brown, W. Barry, Interactive electronic card with contact connector.
  141. O'Shea, Norman E.; Brown, W. Barry, Interactive electronic card with contact connector.
  142. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Interactive electronic card with display.
  143. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Interactive electronic card with display.
  144. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  145. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  146. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  147. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  148. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  149. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  150. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  151. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  152. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  153. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and button.
  154. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with display and button.
  155. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with display and button.
  156. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and buttons.
  157. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and buttons.
  158. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and buttons.
  159. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display and buttons.
  160. Nicklaus, Eric R.; Mullen, Jeffrey D., Interactive electronic card with display and buttons.
  161. Mullen, Jeffrey D.; Nicklaus, Eric R., Interactive electronic card with display buttons.
  162. Cloutier, Bruce S.; Mullen, Jeffrey D., Laminated cards with manual input interfaces.
  163. Cloutier, Bruce S.; Mullen, Jeffrey D., Laminated cards with manual input interfaces.
  164. Foo, Eric; Ziegler, Joan; Poidomani, Mark; Routhenstein, Lawrence; Alon, Ziv; McGuire, Charles, Laminated electronic card assembly.
  165. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Location-based configuration policy toggling.
  166. Mullen, Jeffrey D.; Cloutier, Bruce S.; Wallace, Michael T., Locking features for powered cards and devices.
  167. Li, Chengliu; Workley, James H.; Bruner, Kevin David; Bowers, Allen D., Magnetic cards and devices for motorized readers.
  168. Mullen, Jeffrey D., Magnetic stripe track signal having multiple communications channels.
  169. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  170. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  171. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  172. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  173. Anderson, Sheehan; Kulp, Richard Lee; Mendel, Gili, Mapping the network file system (NFS) protocol to secure web-based applications.
  174. Gehani, Samir; Beaman, Alexander B.; Calhoun, Kevin; Bushell, John Samuel, Media asset proxies.
  175. Bhatia, Gaurav; Swaminathan, Arun; Desai, Ajay, Method and apparatus to facilitate security-enabled content caching.
  176. Molau, Sirko, Method and device for accessing files of a secure file server.
  177. Hopkins, Matthew Edward, Method and system for generating an API request message.
  178. Hill, Gregg Alan; Arrington, Tamara Lynn; Hosp, Adam Kenneth, Method and system for managing programmed applications in an open API environment.
  179. Kumar, Srinivas; Bettadapura, Vijayashree S., Method and system for policy simulation.
  180. Kirk, Stephen Christopher; Byrd, Nathaniel David; Alger, Eric G., Method and system for propagating a client identity.
  181. Hada, Satoshi; Kudo, Michiharu; Seki, Naishin; Tozawa, Akihiko; Van der Linden, Robbert C., Method and system for providing path-level access control for structured documents stored in a database.
  182. Kamat, Shreyas J.; Lowe, G. Mack; Morgan, Robert E.; Ross, Larry V., Method and system for providing point of sale services.
  183. Foo, Eric; Weng, Wong Chee; Chang, Liu, Method for broadcasting a magnetic stripe data packet from an electronic smart card.
  184. Foo, Eric; Weng, Wong Chee; Chang, Liu; Honnegowda, Lakshmisha, Method for broadcasting a magnetic stripe data packet from an electronic smart card.
  185. Foo, Eric; Ziegler, Joan; Poidomani, Mark; Routhenstein, Lawrence; Alon, Ziv; McGuire, Charles, Method for broadcasting a magnetic stripe data packet from an electronic smart card.
  186. Foo, Eric; Ziegler, Joan; Poidomani, Mark; Routhenstein, Lawrence; Alon, Ziv; McGuire, Charles, Method for broadcasting a magnetic stripe data packet from an electronic smart card.
  187. Poidomani, Mark; Ziegler, Joan; Foo, Eric; Alon, Ziv; McGuire, Charles; Routhenstein, Lawrence, Method for conducting a transaction between a magnetic stripe reader and an electronic card.
  188. Reynolds, Patrick A.; Yumerefendi, Aydan R.; Nethercutt, Glenn T., Methods and computer program products for monitoring the contents of network traffic in a network device.
  189. Eisen, Ori; Yalov, Raz, Methods and systems for persistent cross-application mobile device identification.
  190. Byrd, Nathaniel David; Zhang, Jenny Qian; Alger, Eric G., Methods and systems for providing a signed digital certificate in real time.
  191. Byrd, Nathaniel David; Kirk, Stephen Christopher; Pilling, Cynthia Elizabeth, Methods and systems for throttling calls to a service application through an open API.
  192. Wong, Alexander; Schoffler, Eric Benson; York, George; Hudgins, Joshua; Vasic Cooper, Nicholas Mark, Methods for displaying object history information.
  193. York, George; Douglas, Donald Dylan; Davis, William Buckner, Methods for generating an activity stream.
  194. Davis, William Buckner; York, George; Douglas, Donald Dylan; Procopio, Michael Jeffrey; Schoeffler, Eric Benson, Methods for real-time notifications in an activity stream.
  195. Strandell, Toni Peter; Vartiainen, Elina; Kaasalainen, Janne Pekko, Methods, apparatuses, and computer program products for providing filtered services and content based on user context.
  196. Strandell, Toni Peter; Vartiainen, Elina; Kaasalainen, Janne Pekko, Methods, apparatuses, and computer program products for providing filtered services and content based on user context.
  197. Strandell, Toni Peter; Vartiainen, Elina; Kaasalainen, Janne Pekko, Methods, apparatuses, and computer program products for providing filtered services and content based on user context.
  198. DeWeese, William; Brannon, Jonathan Blake; Stuntebeck, Erich, Multi-persona devices and management.
  199. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card.
  200. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card.
  201. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card.
  202. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card.
  203. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card.
  204. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card.
  205. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with display.
  206. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light source.
  207. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light source.
  208. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light source and display.
  209. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light sources.
  210. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light sources.
  211. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light sources.
  212. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Multiple button interactive electronic card with light sources.
  213. Hartwick, David Joseph; Batra, Gautam, Multiple layer card circuit boards.
  214. Workley, James H.; Shippee, Geoffrey D.; Bruner, Kevin David, Multiple sensor detector systems and detection methods of magnetic cards and devices.
  215. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  216. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  217. Fay, Jonathan Edgar; Standefer, III, Robert Earl; Mullins, Christopher Lee; Cowhig, Joshua Allen, Painting content classifications onto document portions.
  218. Cloutier, Bruce S., Passive detection mechanisms for magnetic cards and devices.
  219. Mullen, Jeffrey D.; Yen, Philip W.; Cloutier, Bruce S., Payment cards and devices for displaying barcodes.
  220. Mullen, Jeffrey D.; Yen, Philip W., Payment cards and devices with budgets, parental controls, and virtual accounts.
  221. Mullen, Jeffrey David; Cloutier, Bruce, Payment cards and devices with displays, chips, RFIDS, magnetic emulators, magnetic decoders, and other components.
  222. Mullen, Jeffrey D.; Cloutier, Bruce, Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components.
  223. Mullen, Jeffrey D.; Cloutier, Bruce, Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components.
  224. Mullen, Jeffrey D.; Cloutier, Bruce, Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components.
  225. Mullen, Jeffrey D.; Cloutier, Bruce, Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components.
  226. Mullen, Jeffrey David; Cloutier, Bruce, Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components.
  227. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Payment cards and devices with enhanced magnetic emulators.
  228. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Payment cards and devices with enhanced magnetic emulators.
  229. Mullen, Jeffrey David; Lambeth, David; Cloutier, Bruce, Payment cards and devices with enhanced magnetic emulators.
  230. Mullen, Jeffrey David; Lambeth, David; Cloutier, Bruce, Payment cards and devices with enhanced magnetic emulators.
  231. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality.
  232. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality.
  233. Mullen, Jeffrey D.; Lambeth, David; Cloutier, Bruce, Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality.
  234. Mullen, Jeffrey David; Lambeth, David; Cloutier, Bruce, Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality.
  235. Dabbiere, David, Peripheral device management.
  236. Dabbiere, David, Peripheral device management.
  237. Mullen, Jeffrey D.; Wallace, Michael T., Powered cards and devices designed, programmed, and deployed from a kiosk.
  238. Hao, Fang; Puttaswamy Naga, Krishna P.; Kodialam, Murali; Lakshman, Tirunell V., Probabilistic fingerprint checking for preventing data leakage.
  239. Zhang, Brian; Cloutier, Bruce S.; Mostowy, Jr., L. Casimir, Programming protocols for powered cards and devices.
  240. Hada, Satoshi; Kudo, Michiharu; Seki, Naishin; Tozawa, Akihiko; Van Der Linden, Robbert C., Providing path-level access control for structured documents stored in a database.
  241. Lazar, Gregory W.; Mogavero, Greg; Hamel, Michael; Wang, Yidong; Chanderia, Prakash; Zhou, Feng; Tidke, Ashwin Ramkrishna, Providing secure access to a set of credentials within a data security mechanism of a data storage system.
  242. van Rossum, Guido, Random identifier generation for offline database.
  243. van Rossum, Guido, Random identifier generation for offline database.
  244. Procopio, Michael Jeffrey; Rose, Robert Brett, Recommendations based on device usage.
  245. Marshall, John; DeWeese, William, Resource watermarking and management.
  246. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  247. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  248. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  249. DeWeese, William; Stuntebeck, Erich, Secondary device as key for authorizing access to resources.
  250. Marshall, John; Stuntebeck, Erich; Sorensen, Blake, Secure application leveraging of web filter proxy services.
  251. Brannon, Jonathan Blake, Securely authorizing access to remote resources.
  252. Brannon, Jonathan Blake, Securely authorizing access to remote resources.
  253. Brannon, Jonathan Blake, Securely authorizing access to remote resources.
  254. Marshall, John; DeWeese, William, Shared resource watermarking and management.
  255. Mullen, Jeffrey D.; Workley, James H., Shielded magnetic stripe for magnetic cards and devices.
  256. Sorensen, Christian Blake, Social media and data sharing controls for data security purposes.
  257. Gunn, Ian, Storage system user interface with floating file collection.
  258. Kumar, Srinivas; Weber, Dean A., System and method for inferring access policies from access event records.
  259. Moore, Robert K.; Dickerson, Robert S.; Collins, Jeffrey M., System and method for managing content items for sharing across multiple sites.
  260. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  261. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  262. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  263. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  264. Kumar, Srinivas; Bettadapura, Vijayashree S., System and method for using variable security tag location in network communications.
  265. Kumar, Srinivas; Weber, Dean A.; Roth, Virginia L.; Shah, Shadab Munam, System and method using globally unique identities.
  266. Roegner, Michael W., System for managing access to protected resources.
  267. Roegner, Michael W., System for managing access to protected resources.
  268. Phadke, Madhav S; Phadke, Kedar M, System, method and apparatus for securely distributing content.
  269. Phadke, Madhav S; Phadke, Kedar M, System, method and apparatus for securely distributing content.
  270. Wilson, Robin D.; Heideman, Dennis C.; Yee, Daniel; Dickerson, Robert Scott, System, method and computer program product for asset sharing among hierarchically interconnected objects.
  271. Massand, Deepak, Systems and methods for a bidirectional multi-function communication module.
  272. Massand, Deepak, Systems and methods for a bidirectional multi-function communication module.
  273. Mullen, Jeffrey D.; Nicklaus, Eric R., Systems and methods for advanced card printing.
  274. Cloutier, Bruce S., Systems and methods for advanced communication mechanisms for magnetic cards and devices.
  275. Cloutier, Bruce S.; Mullen, Jeffrey D., Systems and methods for advanced detection mechanisms for magnetic cards and devices.
  276. Cloutier, Bruce S., Systems and methods for alignment techniques for magnetic cards and devices.
  277. Auerbach, David Benjamin; Lawrence, Stephen R., Systems and methods for article location and retrieval.
  278. O'Shea, Norman E., Systems and methods for automated assembly of dynamic magnetic stripe communications devices.
  279. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  280. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  281. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  282. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  283. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  284. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  285. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  286. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  287. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  288. Stuntebeck, Erich, Systems and methods for controlling email access.
  289. Stuntebeck, Erich, Systems and methods for controlling email access.
  290. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  291. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  292. Stuntebeck, Erich; Burnett, Michelle, Systems and methods for controlling network access.
  293. Cloutier, Bruce S.; Mullen, Jeffrey D., Systems and methods for detection mechanisms for magnetic cards and devices.
  294. Cloutier, Bruce S.; Mullen, Jeffrey D., Systems and methods for detection mechanisms for magnetic cards and devices.
  295. Cloutier, Bruce; Mullen, Jeffrey D., Systems and methods for detection mechanisms for magnetic cards and devices.
  296. Eisen, Ori, Systems and methods for detection of session tampering and fraud prevention.
  297. Cloutier, Bruce S.; Lambeth, David N.; Workley, James H., Systems and methods for drive circuits for dynamic magnetic stripe communications devices.
  298. Cloutier, Bruce S.; Lambeth, David; Workley, James H., Systems and methods for drive circuits for dynamic magnetic stripe communications devices.
  299. Cloutier, Bruce S.; Lambeth, David; Workley, James H., Systems and methods for drive circuits for dynamic magnetic stripe communications devices.
  300. Mullen, Jeffrey D., Systems and methods for extended stripe mechanisms for magnetic cards and devices.
  301. Mullen, Jeffrey D.; O'Shea, Norman E., Systems and methods for flexible components for powered cards and devices.
  302. Mullen, Jeffrey D.; Yen, Philip W., Systems and methods for information exchange mechanisms for powered cards and devices.
  303. Balia, Hinal K., Systems and methods for managing and monitoring mobile data, content, access, and usage.
  304. Mullen, Jeffrey D.; Yen, Philip, Systems and methods for programmable payment cards and devices with loyalty-based payment applications.
  305. Mullen, Jeffrey D.; Yen, Philip, Systems and methods for programmable payment cards and devices with loyalty-based payment applications.
  306. Mullen, Jeffrey D.; Yen, Philip, Systems and methods for programmable payment cards and devices with loyalty-based payment applications.
  307. Mullen, Jeffrey David; Yen, Philip, Systems and methods for programmable payment cards and devices with loyalty-based payment applications.
  308. Mullen, Jeffrey David; Yen, Philip, Systems and methods for programmable payment cards and devices with loyalty-based payment applications.
  309. Rhoades, Randy L.; Workley, James H.; Mullen, Jeffrey D., Systems and methods for sensor mechanisms for magnetic cards and devices.
  310. Rhoades, Randy L.; Workley, James H.; Mullen, Jeffrey D., Systems and methods for sensor mechanisms for magnetic cards and devices.
  311. Rhoades, Randy L.; Workley, James H.; Mullen, Jeffrey D., Systems and methods for sensor mechanisms for magnetic cards and devices.
  312. Bohac, Jr., Frank J., Systems and methods for spike suppression for dynamic magnetic stripe communications devices.
  313. Rigatti, Christopher J., Systems and methods for synchronization mechanisms for magnetic cards and devices.
  314. Rhoades, Randy L.; Hartwick, David J., Systems and methods for waveform generation for dynamic magnetic stripe communications devices.
  315. Eisen, Ori, Systems and methods of global identification.
  316. Eisen, Ori, Systems and methods of sharing information through a tag-based consortium.
  317. Edwards, Jr., Robert Clair; Kaczmarski, Michael Allen; Vargas, Omar Bond, Systems for authenticating a user's credentials against multiple sets of credentials.
  318. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration policy toggling.
  319. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration profile toggling.
  320. Dentamaro, Vicenzo; Sardella, Francesco; Somma, Mario, Transfer of files with arrays of strings in soap messages.
  321. Dentamaro, Vicenzo; Sardella, Francesco; Somma, Mario, Transfer of files with arrays of strings in soap messages.
  322. O'Sullivan, Joseph K.; Khaliq, Siraj; Smith, Adam M.; MacGillivray, Alexander; Sriver, Joe, Variable user interface based on document access privileges.
  323. O'Sullivan, Joseph K.; Khaliq, Siraj; Smith, Adam M.; MacGillivray, Alexander; Sriver, Joe, Variable user interface based on document access privileges.
  324. Whitten, Alma W.; O'Sullivan, Joseph K., Variably controlling access to content.
  325. Whitten, Alma W.; O'Sullivan, Joseph K., Variably controlling access to content.
  326. Rose, Robert Brett; Procopio, Michael Jeffrey, Visualization and control of ongoing ingress actions.
  327. Dabbiere, Alan; Stuntebeck, Erich, Watermarking detection and management.
  328. Shinde, Suraj, Web browser-based content management system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로