$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for enabling users of a group shared across multiple file security systems to access secured files 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
  • G06F-017/30
  • H04N-007/16
출원번호 UP-0610832 (2003-06-30)
등록번호 US-7730543 (2010-06-22)
발명자 / 주소
  • Nath, Satyajit
대리인 / 주소
    Sterne, Kessler, Goldstein & Fox PLLC
인용정보 피인용 횟수 : 38  인용 특허 : 185

초록

Improved system and approaches for permitting users of different organizations to access secured files (e.g., documents) are disclosed. These users can be part of a group that is shared across a plurality of file security systems. For example, at a first file security system, a user of the shared gr

대표청구항

What is claimed is: 1. A computer-implemented method for interacting between file security systems, the method comprising: creating, using a computing device, a first shared group at a first file security system; creating, using the computing device, a second shared group at a second file security

이 특허에 인용된 특허 (185)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  3. David M. Mooney ; Paul J. Kimlinger ; James Virgil Bradley, Access control/crypto system.
  4. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  5. Brown, Michael Wayne; Hamzy, Mark Joseph; Jones, Scott Thomas, Apparatus and method for providing access rights information in a portion of a file.
  6. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  7. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
  8. Strickler Gary E. ; Knapp Herbert William ; Holenstein Bruce D. ; Holenstein Paul J., Bidirectional database replication scheme for controlling ping-ponging.
  9. Laczko, Sr., Frank L.; Ferguson, Edward, Compresses video decompression system with encryption of compressed data stored in video buffer.
  10. Takechi,Hideaki; Yamada,Masazumi; Iitsuka,Hiroyuki; Nishimura,Takuya; Kuno,Yoshiki; Gotoh,Shoichi, Computer and program recording medium.
  11. Johnson Judy J. ; McElroy ; Jr. James R., Computer based records management system method.
  12. Brown,Daniel; Zapata,Fernando, Computer security system.
  13. Hsu Mike S. C. (1518 Ambergrove Dr. San Jose CA 95131), Computer system including a transparent and secure file transform mechanism.
  14. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  15. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  16. Sarah Baxter ; Lisa C. Vogt, Content management system.
  17. Ishibashi,Yasuhiro, Content processing system and content protecting method.
  18. Kazuhiro Sakata JP, Cooperative work support system.
  19. Angelo Michael F. ; Driscoll Daniel J., Copy protection for recorded media.
  20. Lee, Chang-Hyi; Chung, Ho-Suk; Kang, Eun-Seong, Copy protection system for portable storage media.
  21. Asano, Tomoyuki; Osawa, Yoshitomo; Komuro, Teruyoshi; Hamada, Ichiro, Copy protection using detailed copy control information.
  22. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  23. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  24. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  25. Seheidt Edward M. ; Crowley John J., Cryptographic key management method and apparatus.
  26. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  27. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  28. Hirano,Hideyuki; Hashimoto,Shinji; Hattori,Eiki; Mochizuki,Shigetoshi, Data administration method.
  29. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  30. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  31. Roumiantsev,Andrei Igorevich; Koltsov,Alexandre Vladimirovich; O'Doherty,Brian John; Tararoukhine,Ilia Valerievich, Data transfer and management system.
  32. En-Seung, Kang; Jin-Young, Byun, Digital content cryptograph and process.
  33. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  34. Shanton M. Greg, Distributed cryptographic object method.
  35. Shanton M. Greg, Distributed cryptographic object method.
  36. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  37. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  38. Ohtsu Toshiyuki,JPX, Dynamic adding system for memory files shared among hosts, dynamic adding method for memory files shared among hosts, and computer-readable medium recording dynamic adding program for memory files sh.
  39. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage and export contact information.
  40. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  41. Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
  42. Sasaki Minoru,JPX ; Yoshikawa Hiroharu,JPX, Enciphering/deciphering device and method, and encryption/decryption communication system.
  43. Raike,William Michael; Donovan Smith,Brian James; Higgins,Sean Joseph; Martin,Patrick John, Encrypted media key management.
  44. Tozawa,Jun; Nogami,Hiroshi; Shibayama,Tetsuya; Kataoka,Tomohiro; Fujio,Hiroshi, Encryption and decryption communication semiconductor device and recording/reproducing apparatus.
  45. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  46. Radia J. Perlman, Ephemeral decryptability.
  47. David Paul Dutcher ; William H. Sinclair, Jr. ; Stanley Alan Smith, Establishment of user home directories in a heterogeneous network environment.
  48. Neerdaels,Charles J.; Lewin, deceased,Daniel M., Extending an Internet content delivery network into an enterprise.
  49. Cane David ; Hirschman David ; Speare Philip ; Vaitzblit Lev ; Marson Howard, File comparison for data backup and file synchronization.
  50. Shimbo Atsushi,JPX ; Takahashi Toshinari,JPX ; Tomoda Ichiro,JPX ; Murota Masao,JPX, File editing system and shared file editing system with file content secrecy, file version management, and asynchronous.
  51. Nozawa Masafumi (Odawara JPX) Shimada Akinobu (Hiratsuka JPX) Nishimura Toshifumi (Minamiashigara JPX) Kakuse Katsuharu (Hadano JPX) Tsukiyama Tokuhiro (Kanagawa JPX) Yata Kiyoshi (Hadano JPX) Ishii , File encryption method and file cryptographic system.
  52. Eshel Marc M. (Tarrytown NY) Hunt Guerney D. H. (Ithaca NY) Jones Donald N. (Vestal NY) Meyer Christopher (Vestal NY) Schwartz Frederick A. (Binghamton NY), File manager for files shared by heterogeneous clients.
  53. Parker Robert D. ; Holloway Matthew S., File privilege administration apparatus and methods.
  54. Witt, Wesley A.; Zbikowski, Mark J.; McMichael, Lonny D., File protection service for a computer system.
  55. Riddle Guy, File sharing in a teleconference application.
  56. Cross,David B.; Leach,Paul J., File system operation and digital rights management (DRM).
  57. Sitaraman Aravind ; Lou Shuxian ; Zhang Shujin, Forced sequential access to specified domains in a computer network.
  58. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  59. Tormasov,Alexander; Lunev,Dennis; Beloussov,Serguei; Protassov,Stanislav; Pudgorodsky,Yuri, Hosting service providing platform system and method.
  60. Villavicencio,Francisco J., Impersonation in an access system.
  61. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  62. Shimizu Hideo,JPX ; Hori Satomi,JPX ; Endoh Naoki,JPX ; Saisho Toshiaki,JPX, Information processing system having function of securely protecting confidential information.
  63. Asano,Tomoyuki; Osawa,Yoshitomo, Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith.
  64. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  65. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  66. Wiederhold Gio, Information sharing system and method with requester dependent sharing and security rules.
  67. Choy David M., Integrated method and system for controlling information access and distribution.
  68. Donner Irah H., Intellectual property audit system.
  69. Serbinis, M. Michael; Leibu, Daniel; Chrapko, Evan V; Pappes, Valerian, Internet document management system and methods.
  70. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics.
  71. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics and distributed access control.
  72. Thomsen,Daniel Jay; O'Brien,Richard; Bogle,Jessica; Payne,Charles, Locally adaptable central security management in a heterogeneous network environment.
  73. Shida,Tetsuro, MPEG data recorder having IEEE 1394 interface.
  74. John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
  75. Mamiya Akira (Yokohama JPX) Suga Akira (Tokyo JPX) Kawamura Hideaki (Kawasaki JPX) Aizawa Takashi (Yokohama JPX) Takahashi Fumiaki (Machida JPX) Hatori Kenji (Hatogaya JPX), Management system of multimedia.
  76. Carter Stephen R., Method and apparatus for collaborative document control.
  77. Zavalkovsky,Arthur; Elfassy,Nitsan, Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points.
  78. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for controlling access to encrypted data files in a computer system.
  79. Van Oorschot Paul C.,CAX, Method and apparatus for creating communities of trust in a secure communication system.
  80. McLaughlin Michael D. (San Jose CA) Signa John C. (Sunnyvale CA) Greicar Richard K. (Moss Beach CA) Taylor John M. (London GB2), Method and apparatus for display calibration and control.
  81. Chemtob,Helen J., Method and apparatus for providing group interaction via communications networks.
  82. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
  83. Asano,Tomoyuki; Osawa,Yoshitomo, Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode.
  84. Salkewicz William M. ; Callon Ross W., Method and apparatus for synchronizing multiple copies of a database.
  85. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  86. Sieffert, Kent J.; Schaffran, Curtis A., Method and system for gathering information resident on global computer networks.
  87. Stoodley, Marcus A., Method and system for medical patient data analysis.
  88. Jakobsson, Markus Bjorn, Method and system for providing translation certificates.
  89. Jakobsson, Markus Bjorn, Method and system for quorum controlled asymmetric proxy encryption.
  90. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  91. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  92. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Method and system for securely archiving core data secrets.
  93. Komuro Teruyoshi,JPX ; Osawa Yoshitomo,JPX ; Shima Hisato ; Asano Tomoyuki,JPX, Method and system for transferring information using an encryption mode indicator.
  94. Komuro,Teroyoshi; Osawa,Yoshitomo; Shima,Hisato; Asano,Tomoyuki, Method and system for transferring information using an encryption mode indicator.
  95. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  96. Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
  97. Wu Shye-Lin,TWX, Method for fabricating trench-isolation structure.
  98. Davy William R. (Dublin OH), Method for moving an open file being accessed by at least one user.
  99. Kramer Paul H. (Rochester MN) Tate Kay A. (Rochester MN), Method for protecting data in a computer system.
  100. Bala,Vasanth; Smith,Michael D., Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent.
  101. Boneh Dan ; Lipton Richard J., Method for revoking computer backup files using cryptographic techniques.
  102. Pinkas, Denis, Method for verifying the use of public keys generated by an on-board system.
  103. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  104. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  105. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  106. Stakutis,Christopher John; Haselton,William Robert; Stearns,Kevin Michael; Stuart,Alan L.; Marek,Toby Lyn, Method, system, and program for archiving files.
  107. Wilson, Rodger P., Method, system, and program for encrypting files in a computer system.
  108. Stuart,Alan L.; Marek,Toby Lyn, Method, system, and program for implementing retention policies to archive records.
  109. Hochberg,Avishai Haim; Marek,Toby Lyn; Cannon,David Maxwell; Martin,Howard Newton; Warren, Jr.,Donald Paul; Haye,Mark Alan, Method, system, and program for retention management and protection of stored objects.
  110. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  111. Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  112. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  113. Preston Harold W. (Carrollton TX) Rush Jeffrey R. (Richardson TX), Multiple user stored data cryptographic labeling system and method.
  114. Vahalia Uresh K. ; Gupta Uday ; Porat Betti ; Tzelnic Percy, Network file server sharing local caches of file access information in data processors assigned to respective file systems.
  115. Iyer, Mahadevan; Apsani, Lavanya; Malviya, Pankaj, Object model for network policy management.
  116. Riedel,Erik; Kallahalla,Mahesh; Swaminathan,Ram, Optimizing costs associated with managing encrypted data.
  117. Begis, Glenn, Out-of-band signaling for network based computer session synchronization.
  118. Venkatesan, Ramarathnam; Yacobi, Yacov, Passive and active software objects containing bore resistant watermarking.
  119. Aboulhosn, Amir L.; Chen, Rui; Koo, David M.; Vineberg, David J.; Wald, James F.; Murphy, Stephen, Peer-to-peer file sharing.
  120. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  121. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  122. Smith, Jeffrey C.; Bandini, Jean-Christophe, Private, trackable URLs for directed document delivery.
  123. Nevoux Rola (Elancourt FRX) Campana Mireille (Clamart FRX), Process of combined authentication of a telecommunication terminal and of a user module.
  124. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Protected storage of core data secrets.
  125. Singhal, Sandeep Kishan; Gopal, Ajei Sarat, Providing secure network access for short-range wireless computing devices.
  126. Roddy, Brian J.; Hanson, Michael; Lilly, III, John O., Providing security for external access to a protected computer network.
  127. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  128. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  129. Toh,Eng Whatt; Wong,Chee Hong; Teo,Kok Hoon; Yip,See Wai, Secure and reliable document delivery.
  130. Folmsbee Alan, Secure execution of program instructions provided by network interactions with processor.
  131. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  132. Garcia,Denis Jacques Paul, Secured data format for access control.
  133. Mark E. Peters, Securing Web server source documents and executables.
  134. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  135. Ram, Prasad; Ta, Thanh T.; Wang, Xin, Self-protecting documents.
  136. Roseman, Robert D., Server based virtual conferencing.
  137. Kauffman Steven Victor ; Lewis Lara Marie ; Willey James Albert, Shared file system for digital content.
  138. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  139. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  140. Shah, Rajendra; Shanumgam, Udayakumar; Apsani, Lavanya, State transition protocol for high availability units.
  141. Dewitt Frederick J. ; McGuire Thomas D., Storage optimizing encoder and method.
  142. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  143. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  144. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  145. Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
  146. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  147. Dutta,Tanmoy; Balikov,Alexander; Naresh,Himani, System and method for document isolation.
  148. Estrada,Julio; Estrada,Miguel A.; Shore,Maurice E., System and method for dynamic browser management of web site.
  149. Olsen, Theis; Bundesen, Rune Windfeld; Hougaard, Claes Christian; Nordly, Trygve Thor, System and method for ensuring secure transfer of a document from a client of a network to a printer.
  150. Meyer, Marc A., System and method for flexible packaging of software application licenses.
  151. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  152. Kiessig,Rick; Yost,David A.; Mathon,John D., System and method for managing content with event driven actions to facilitate workflow and other features.
  153. Erickson, John S., System and method for managing copyrighted electronic media.
  154. Leong, Sang; Telkowski, William, System and method for managing information retrievals from distributed archives.
  155. Rose John R., System and method for managing try-and-buy usage of application programs.
  156. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  157. Sakurai Hiroshi (Tokyo JPX) Ikeda Nobuyuki (Tokyo JPX) Watabe Akehiro (Tokyo JPX), System and method for processing document information using password protected icons that represent document content.
  158. Novak, Robert E., System and method for providing conditional access to digital content.
  159. Greg B. Garrison, System and method for restricting access to a data table within a database.
  160. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  161. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  162. Bess, Dwayne Lamarr; Brischke, Harold Allan; Keller, Andrew Charles; Wagner-Krankel, Dale Alan; Tijerina, Jacob Garza; Connolly, Jr., Billy Ray; O'Connor, Karen Ann; McDaniel, James William; Lewis, R, System and method of providing electronic access to one or more documents.
  163. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  164. McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
  165. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  166. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  167. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  168. Bacha, Hamid; Carroll, Robert Bruce; Mirlas, Lev; Tchao, Sung Wei, System for electronic repository of data enforcing access control on data search and retrieval.
  169. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for enabling lazy-revocation through recursive key generation.
  170. Riedel,Erik; Karamanolis,Christos; Kallahalla,Mahesh; Swaminathan,Ram, System for ensuring data privacy and user differentiation in a distributed file system.
  171. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for optimized key management with file groups.
  172. Hahn Samuel S. ; LeGault Kenn ; Wheeler Maxon ; Degenhardt Jon R., System for organizing document icons with suggestions, folders, drawers, and cabinets.
  173. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  174. Minkin, Ilya; Balabine, Igor V.; Eschelbeck, Gerhard, System, method and computer program product for rule based network security policies.
  175. Murray,Bill; Lewitzky,Andre; Boldt,Tim, Systems and methods for data backup over a network.
  176. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  177. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  178. Davis Mark Charles ; Gray Steve D. ; Kuehr-McLaren David Gerard ; Morrison Ian A. ; Shoriak Timothy G., Systems, methods and computer program products for authenticating client requests with client certificate information.
  179. Peterson ; Jr. Mendel Lazear, Time based availability to content of a storage medium.
  180. Donald Ralph Hart, Tracker sensing method for regulating synchronization of audit files between primary and secondary hosts.
  181. Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
  182. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  183. Bobbitt,Jared E.; Doll,Stephan A.; Friedman,Marc T.; Lau,Patrick Wing Sang; Mullally,Joseph P., Virtual file system.
  184. Keller Neal Martin ; Pickover Clifford Alan, Visual access to restricted functions represented on a graphical user interface.
  185. Natarajan, Balas K., Watermarking of digital object.

이 특허를 인용한 특허 (38)

  1. Ramachandran, Arun, Access rights management in enterprise digital rights management systems.
  2. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  3. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  4. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  5. Sgro, Richard Joseph; Sharma, Manoj; Rhee, Yong Woo; Duke, Bojana Marjanovic, Identification of sharing level.
  6. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  7. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  8. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  9. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  10. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  11. Nath, Satyajit, Method and system for providing document retention using cryptography.
  12. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  13. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  14. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  15. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  16. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  17. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  18. Odnovorov, Igor; Stamos, Nicholas, Multi-identity for secure file sharing.
  19. Odnovorov, Igor; Stamos, Nicholas, Multi-identity for secure file sharing.
  20. Odnovorov, Igor; Stamos, Nicholas, Multi-identity graphical user interface for secure file sharing.
  21. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  22. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  23. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  24. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  25. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  26. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  27. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  28. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  29. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  30. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  31. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  32. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  33. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  34. Eng, Chi; Dmytrichenko, Eugene; Myasushkin, Eugene, System and method for virtual team collaboration in a secure environment.
  35. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  36. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  37. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  38. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로