$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for providing distributed access control to secured documents 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-015/173
  • G06F-007/04
출원번호 UP-0076181 (2002-02-12)
등록번호 US-7783765 (2010-09-13)
발명자 / 주소
  • Hildebrand, Hal S.
  • Vainstein, Klimenty
대리인 / 주소
    Sterne Kessler Goldstein & Fox PLLC
인용정보 피인용 횟수 : 30  인용 특허 : 249

초록

A system and method for providing distributed access control are disclosed. A number of local servers are employed to operate largely on behalf of a central server responsible for centralized access control management. Such a distributed fashion ensures the dependability, reliability and scalability

대표청구항

We claim: 1. A method for providing access to a secured document, the method comprising: requesting authentication of a user having credential information to a first server at a first location having a first instance of the secured document stored therein; in response to determining that the user i

이 특허에 인용된 특허 (249)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Numao, Masayuki; Kudoh, Michiharu; Amano, Tomio, Access control system, access control method, storage medium and program transmission apparatus.
  3. David M. Mooney ; Paul J. Kimlinger ; James Virgil Bradley, Access control/crypto system.
  4. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  5. Zuili Patrick,FRX ; Ice Edward, Adaptive communication system enabling dissimilar devices to exchange information over a network.
  6. Schneck, Phyllis A.; Schwan, Karsten; Chokhani, Santosh, Adaptive data security system and method.
  7. Proctor, Paul E., Adaptive feedback security system and method.
  8. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  9. Brown, Michael Wayne; Hamzy, Mark Joseph; Jones, Scott Thomas, Apparatus and method for providing access rights information in a portion of a file.
  10. Just, Michael K.; Van Oorschot, Paul, Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system.
  11. Chow, Peter Ka-Fai, Apparatus and method for validating and updating an IP checksum in a network switching system.
  12. Davies Donald W. (Sunbury-on-Thames GB2), Apparatus and methods for granting access to computers.
  13. Gramsamer, Ferdinand; Klett, Peter Micheal; Liver, Beat; Truong, Hong Linh, Archiving and retrieval method and apparatus.
  14. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
  15. Corella,Francisco, Authorization infrastructure based on public key cryptography.
  16. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  17. Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
  18. Brown,Daniel; Zapata,Fernando, Computer security system.
  19. Hsu Mike S. C. (1518 Ambergrove Dr. San Jose CA 95131), Computer system including a transparent and secure file transform mechanism.
  20. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  21. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  22. Zhao Yan, Concurrent user access control in stateless network computing service system.
  23. Sarah Baxter ; Lisa C. Vogt, Content management system.
  24. Hsiao,Hui I; Laue,Matthew; Mega,Cataldo, Content management system and methodology employing non-transferable access tokens to control data access.
  25. Ishibashi,Yasuhiro, Content processing system and content protecting method.
  26. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  27. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  28. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
  29. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  30. Seheidt Edward M. ; Crowley John J., Cryptographic key management method and apparatus.
  31. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  32. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  33. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  34. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  35. Ote Ichiro,JPX ; Iwabuchi Kazunori,JPX ; Washimi Hiroaki,JPX ; Furukawa Hiroshi,JPX ; Sumitomo Masahito,JPX ; Kobayashi Yuuichi,JPX, Data encryption control apparatus and method.
  36. Yoshino, Kenji; Ishibashi, Yoshihito; Akishita, Toru; Shirai, Taizo; Ito, Takeshi; Hayashi, Shigekazu, Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management.
  37. Nonaka,Akira; Ezaki,Tadashi, Data providing system, device, and method.
  38. Mullen,Nancy K.; Green,Michael J., Data warehouse computing system.
  39. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  40. Randal Chilton Burns ; Edward Gustav Chron ; Darrell Long ; Benjamin Clay Reed, Decentralized remotely encrypted file system.
  41. Gune,Prasad; Deighton,Anthony; Chen,Mingte; Kuo,Richard; Walcott,Wister, Defining an approval process for requests for approval.
  42. Lee, Michele C., Delivering output XML with dynamically selectable processing.
  43. Howard, John H.; Robinson, David; Rettberg, Randall D., Direct access from client to storage device.
  44. Win Teresa ; Belmonte Emilio, Distributed access management of information resources.
  45. Shanton M. Greg, Distributed cryptographic object method.
  46. Shanton M. Greg, Distributed cryptographic object method.
  47. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  48. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  49. Dondeti Lakshminath R. ; Mukherjee Sarit ; Samal Ashok, Distributed group key management scheme for secure many-to-many communication.
  50. Friedel,Guy; Katz,Ariel; Shamir,Yaron; Nathan,Abraham, Distributed policy model for access control.
  51. Boyen,Xavier; Qian,Zhenyu; Teodosiu,Dan, Distributed scalable cryptographic access control.
  52. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  53. Ahlard,David; Bergkvist,Joakim; Bystr��m,Leif; Hansson,Urban, Distributed server functionality for emulated LAN.
  54. Austin Paul R. ; Kibler Wendell L. ; Kulbida Christopher ; Haehn Steven E. ; Bunker Keith G., Document server for processing a distribution job in a document processing system.
  55. Pendharkar,Sameer, Drain-extended MOS transistors with diode clamp and methods for making the same.
  56. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage and export contact information.
  57. Girish Rai ; Philip M. Parsons ; Mooi Chuah, Efficient mobility management scheme for a wireless internet access system.
  58. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  59. Kuroda, Yasutsugu; Kamada, Jun; Iwase, Shoko; Noda, Bintatsu; Ono, Etsuo, Electronic data storage apparatus with key management function and electronic data storage method.
  60. Pravetz James D., Encapsulation of public key cryptography standard number 7 into a secured document.
  61. Sasaki Minoru,JPX ; Yoshikawa Hiroharu,JPX, Enciphering/deciphering device and method, and encryption/decryption communication system.
  62. Raike,William Michael; Donovan Smith,Brian James; Higgins,Sean Joseph; Martin,Patrick John, Encrypted media key management.
  63. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  64. Harrison Colin George, Enhanced data privacy for portable computers.
  65. Radia J. Perlman, Ephemeral decryptability.
  66. David Paul Dutcher ; William H. Sinclair, Jr. ; Stanley Alan Smith, Establishment of user home directories in a heterogeneous network environment.
  67. David L. Drake ; David J. Webster, Event detection.
  68. Bhide,Manish Anand; Mohania,Mukesh Kumar, Event-based database access execution.
  69. Shimbo Atsushi,JPX ; Takahashi Toshinari,JPX ; Tomoda Ichiro,JPX ; Murota Masao,JPX, File editing system and shared file editing system with file content secrecy, file version management, and asynchronous.
  70. Nozawa Masafumi (Odawara JPX) Shimada Akinobu (Hiratsuka JPX) Nishimura Toshifumi (Minamiashigara JPX) Kakuse Katsuharu (Hadano JPX) Tsukiyama Tokuhiro (Kanagawa JPX) Yata Kiyoshi (Hadano JPX) Ishii , File encryption method and file cryptographic system.
  71. Parker Robert D. ; Holloway Matthew S., File privilege administration apparatus and methods.
  72. Riddle Guy, File sharing in a teleconference application.
  73. Sitaraman Aravind ; Lou Shuxian ; Zhang Shujin, Forced sequential access to specified domains in a computer network.
  74. Kumar,Sanjay; Thomas,Stanton L.; Deshpande,Gaurav M.; Murty,Venkataesh V., Fulfillment management system for managing ATP data in a distributed supply chain environment.
  75. Bonn, David Wayne; Marvais, Nick Takaski, Generalized network security policy templates for implementing similar network security policies across multiple networks.
  76. Harkins Dan, Group key distribution.
  77. Aoki, Ryuichi, Group oriented public key encryption and key management system.
  78. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  79. Tormasov,Alexander; Lunev,Dennis; Beloussov,Serguei; Protassov,Stanislav; Pudgorodsky,Yuri, Hosting service providing platform system and method.
  80. Watanabe Hiroshi (Kokubunji JPX), IC card which can set security level for every memory area.
  81. Kacker,Rishi R.; Appenzeller,Guido; Pauker,Matthew J.; Spies,Terence, Identity-based encryption system for secure data distribution.
  82. Villavicencio,Francisco J., Impersonation in an access system.
  83. Prakash, Nalini J., Indications of secured digital assets.
  84. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  85. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  86. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  87. Wiederhold Gio, Information sharing system and method with requester dependent sharing and security rules.
  88. Law,Gary K.; Deitz,David L.; Schleiss,Trevor Duncan; Naidoo,Julian, Integrated electronic signatures for approval of process control and safety system software objects.
  89. Choy David M., Integrated method and system for controlling information access and distribution.
  90. Kino, Shigenori; Koike, Kazuhiro; Mochizuki, Yasuyuki; Mizuguchi, Takehisa, Inter-application data transmitting system and method.
  91. Jancula,Jeffrey John, Internet third-party authentication using electronic tickets.
  92. Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics and distributed access control.
  93. Jun, Dong-suk; Lee, Sang-seok; Choy, Tae-goo, Isolator/circulator having propeller resonator loaded with a plurality of symmetric magnetic walls.
  94. Christiano Matt (Saratoga CA), License management system for software applications.
  95. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  96. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Logon certification.
  97. John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
  98. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  99. Mamiya Akira (Yokohama JPX) Suga Akira (Tokyo JPX) Kawamura Hideaki (Kawasaki JPX) Aizawa Takashi (Yokohama JPX) Takahashi Fumiaki (Machida JPX) Hatori Kenji (Hatogaya JPX), Management system of multimedia.
  100. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  101. Brown Scott K. (San Jose CA) Hoem Robert H. (Fremont CA), Method and apparatus for changing the master key in a cryptographic system.
  102. Carter Stephen R., Method and apparatus for collaborative document control.
  103. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for controlling access to encrypted data files in a computer system.
  104. Batten-Carew, Mark Christopher; Wiener, Michael James, Method and apparatus for controlling release of time sensitive information.
  105. Mast Michael B., Method and apparatus for copy protection of images in a computer system.
  106. Lee Dilkie CA; Paul C. Van Oorschot CA, Method and apparatus for correcting improper encryption and/or for reducing memory storage.
  107. Van Oorschot Paul C.,CAX, Method and apparatus for creating communities of trust in a secure communication system.
  108. McLaughlin Michael D. (San Jose CA) Signa John C. (Sunnyvale CA) Greicar Richard K. (Moss Beach CA) Taylor John M. (London GB2), Method and apparatus for display calibration and control.
  109. Kathrow Bodie ; Skelton ; III John R, Method and apparatus for identifying the existence of differences between two files.
  110. Kadansky Miriam C. ; Hanna Stephen R., Method and apparatus for multicast indication of group key change.
  111. Timothy E. Moses CA; Sharon M. Boeyen CA, Method and apparatus for obtaining status of public key certificate updates.
  112. Batten-Carew Mark,CAX ; Buchler Marek,CAX ; Hiller Stephen William,CAX ; Otway Josanne Mary,CAX, Method and apparatus for processing administration of a secured community.
  113. Chemtob,Helen J., Method and apparatus for providing group interaction via communications networks.
  114. Paul C. Van Oorschot CA, Method and apparatus for public key management.
  115. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
  116. Sames, David L.; Whitmore, Brent S.; Niebuhr, Brian S.; Tally, Gregg W., Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system.
  117. Garcia,Denis Jacques Paul, Method and apparatus for securing digital assets.
  118. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  119. Suarez Larry, Method and architecture for the creation, control and deployment of services within a distributed computer environment.
  120. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall, Method and system for automatically merging files into a single instance store.
  121. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  122. Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
  123. Sieffert, Kent J.; Schaffran, Curtis A., Method and system for gathering information resident on global computer networks.
  124. Vainstein, Klimenty, Method and system for managing security tiers.
  125. Stoodley, Marcus A., Method and system for medical patient data analysis.
  126. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  127. Krueger, Scott; Goodman, Daniel, Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program.
  128. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  129. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Method and system for securely archiving core data secrets.
  130. Chan, Victor; Ho, Francis, Method and system providing in-line pre-production data preparation and personalization solutions for smart cards.
  131. Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
  132. Morgan Joseph M. ; Harold Michael D., Method for creating specific purpose rule-based n-bit virtual machines.
  133. Rasmussen Harry R. (Tacoma WA) LaBounty Jack D. (Bellevue WA) Rosenow Michael J. (Issaquah WA), Method for ensuring secure communications.
  134. Still Kelly W., Method for gradual deployment of user-access security within a data processing system.
  135. Kramer Paul H. (Rochester MN) Tate Kay A. (Rochester MN), Method for protecting data in a computer system.
  136. Novorita Robert J. (Orland Park IL), Method for updating encryption key information in communication units.
  137. Skarbo Rune A. ; Clitheroe Cameron J. ; Lawless Christopher C. ; Kukkal Puneet ; Hochman Stephen D., Method for web based storage and retrieval of documents.
  138. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  139. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  140. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  141. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  142. Stakutis,Christopher John; Haselton,William Robert; Stearns,Kevin Michael; Stuart,Alan L.; Marek,Toby Lyn, Method, system, and program for archiving files.
  143. Wilson, Rodger P., Method, system, and program for encrypting files in a computer system.
  144. Stuart,Alan L.; Marek,Toby Lyn, Method, system, and program for implementing retention policies to archive records.
  145. Hochberg,Avishai Haim; Marek,Toby Lyn; Cannon,David Maxwell; Martin,Howard Newton; Warren, Jr.,Donald Paul; Haye,Mark Alan, Method, system, and program for retention management and protection of stored objects.
  146. Hartman, Bret A.; Flinn, Donald J.; Burghart, Jr., Theodore R., Methods and apparatus for facilitating security in a network.
  147. Arlein,Robert M.; Jai,Ben; Jakobsson,Bjorn Markus; Monrose,Fabian; Reiter,Michael Kendrick, Methods and apparatus for providing privacy-preserving global customization.
  148. Kluttz, Karen Ruth; Singhal, Sandeep Kishan, Methods, systems and computer program products for multi-level encryption.
  149. Schell, Roger R.; Jueneman, Robert R.; Gayman, Mark G., Module authentication and binding library extensions.
  150. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  151. Multerer Boyd ; Schwartz Kerry S. ; Stebbens Kim, Multi-server location-independent authentication certificate management system.
  152. Preston Harold W. (Carrollton TX) Rush Jeffrey R. (Richardson TX), Multiple user stored data cryptographic labeling system and method.
  153. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  154. Vahalia Uresh K. ; Gupta Uday ; Porat Betti ; Tzelnic Percy, Network file server sharing local caches of file access information in data processors assigned to respective file systems.
  155. Jacobson, Andrea M., Network policy management and effectiveness system.
  156. Alon Cohen IL, Network vaults.
  157. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin, Object caching and update queuing technique to improve performance and resource utilization.
  158. Ims,Steven D.; Li,Yongcheng; Tan,Yih Shin, Object caching and update queuing technique to improve performance and resource utilization.
  159. Davies John W. (Shoreview MN) McClintock John H. (Tigard OR), Object lock management system with improved local lock management and global deadlock detection in a parallel data proce.
  160. Schmuck Frank B. ; Zlotek Anthony J. ; Shmueli Boaz,ILX ; Mandler Benjamin,ILX ; Yehudai Zvi Yosef,ILX ; Kish William A., Parallel file system with method using tokens for locking modes.
  161. Venkatesan, Ramarathnam; Yacobi, Yacov, Passive and active software objects containing bore resistant watermarking.
  162. Kadooka Etsuko (Tokyo JPX), Password updating system to vary the password updating intervals according to access frequency.
  163. Aboulhosn, Amir L.; Chen, Rui; Koo, David M.; Vineberg, David J.; Wald, James F.; Murphy, Stephen, Peer-to-peer file sharing.
  164. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  165. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  166. Nevoux Rola (Elancourt FRX) Campana Mireille (Clamart FRX), Process of combined authentication of a telecommunication terminal and of a user module.
  167. Thomlinson Matthew W. ; Field Scott ; Cooper Allan, Protected storage of core data secrets.
  168. Roddy, Brian J.; Hanson, Michael; Lilly, III, John O., Providing security for external access to a protected computer network.
  169. Beller Michael J. (Little Silver NJ) Yacobi Yacov (Berkeley Heights NJ), Public key authentication and key agreement for low-cost terminals.
  170. Lortz, Victor B., Resource policy management using a centralized policy data structure.
  171. Teresa Win ; Emilio Belmonte, Role-based navigation of information resources.
  172. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  173. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Secure data storage and retrieval with key management and user authentication.
  174. Folmsbee Alan, Secure execution of program instructions provided by network interactions with processor.
  175. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  176. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  177. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  178. Carroll Robert B., Secure server and method of operation for a distributed information system.
  179. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  180. Pravetz James D. ; Malloy Thomas J., Secured document access control using recipient lists.
  181. Rose Anthony M. (66 Drumalbyn Road Bellevue Hill ; Sydney AUX 2023), Securing a computer against undesired write operations to or read operations from a mass storage device.
  182. Feuerstein,Yehuda; Pfost,Jared E.; Purpura,Stephen J., Security component for a computing device.
  183. Deo Umesh, Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems.
  184. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  185. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
  186. Ram, Prasad; Ta, Thanh T.; Wang, Xin, Self-protecting documents.
  187. Roseman, Robert D., Server based virtual conferencing.
  188. William J. Bolosky ; John R. Douceur ; Scott M. Cutshall ; Richard F. Rashid ; Nathan P. Myhrvold ; David A. Goebel, Single instance store for file systems.
  189. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  190. Tsuge,Munetoshi, Storage management integrated system and storage control method for storage management integrated system.
  191. Kobayashi,Hiroyuki; Uchida,Yoshiaki, Storage medium and method and apparatus for separately protecting data in different areas of the storage medium.
  192. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  193. Johnson Donavon W. (Georgetown TX) Neuman Grover H. (Austin TX) Sauer Charles H. (Austin TX) Shaheen-Gouda Amal A. (Austin TX) Smith Todd A. (Austin TX), System and method for accessing remote files in a distributed networking environment.
  194. Barlow, Doug; Dillaway, Blair; Fox, Barbara; Lipscomb, Terry; Spies, Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
  195. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  196. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  197. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  198. Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
  199. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  200. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  201. Najork Marc Alexander ; Heydon Clark Allan, System and method for efficient representation of data set addresses in a web crawler.
  202. Olsen, Theis; Bundesen, Rune Windfeld; Hougaard, Claes Christian; Nordly, Trygve Thor, System and method for ensuring secure transfer of a document from a client of a network to a printer.
  203. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  204. Dennis, Michael W.; Freed, Michele L.; Plastina, Daniel; Flo, Eric R.; Kays, Jr., David E.; Corrington, Robert E., System and method for implementing group policy.
  205. Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
  206. Moriconi Mark ; Qian Shelly, System and method for maintaining security in a distributed computer network.
  207. Moriconi, Mark; Qian, Shelly, System and method for maintaining security in a distributed computer network.
  208. Erickson John S., System and method for managing copyrighted electronic media.
  209. Rose John R., System and method for managing try-and-buy usage of application programs.
  210. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  211. Morishita,Takuya, System and method for preventing an illegal copy of contents.
  212. Sakurai Hiroshi (Tokyo JPX) Ikeda Nobuyuki (Tokyo JPX) Watabe Akehiro (Tokyo JPX), System and method for processing document information using password protected icons that represent document content.
  213. Alben,Jonah M.; Pember,Bruce W., System and method for providing a hardware icon with magnification and security.
  214. Henry,Paul S.; Luo,Hui, System and method for providing access to multiple user accounts via a common password.
  215. Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
  216. Hurvig Hans, System and method for providing opportunistic file access in a network environment.
  217. Greg B. Garrison, System and method for restricting access to a data table within a database.
  218. Mittra Suvo, System and method for secure group communications via multicast or broadcast.
  219. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  220. Dixon Peggy PakFan ; Shi Danling ; Verburg Richard Lee ; Wood Donald Edwin, System and method for transferring a session from one application server to another without losing existing resources.
  221. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  222. Yamaguchi Toshikazu (Kanagawaken JPX) Tanaka Kiyoto (Kanagawaken JPX), System and scheme of cipher communication.
  223. McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
  224. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  225. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  226. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  227. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for enabling lazy-revocation through recursive key generation.
  228. Riedel,Erik; Karamanolis,Christos; Kallahalla,Mahesh; Swaminathan,Ram, System for ensuring data privacy and user differentiation in a distributed file system.
  229. Stelliga, Tony, System for multi-layer broadband provisioning in computer networks.
  230. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for optimized key management with file groups.
  231. Hahn Samuel S. ; LeGault Kenn ; Wheeler Maxon ; Degenhardt Jon R., System for organizing document icons with suggestions, folders, drawers, and cabinets.
  232. Donaghey, Robert J.; Carielli, Sandra E.; Helinek, Pamela, System for selecting and disseminating active policies to peer device and discarding policy that is not being requested.
  233. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  234. Krishnaswamy, Sridhar; Elliott, Isaac K.; Reynolds, Tim E.; Forgy, Glen A.; Solbrig, Erin M., System, method and article of manufacture for a communication system architecture including video conferencing.
  235. Elliott,Isaac K., System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture.
  236. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  237. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K.; Twaddell,Gordon W., Systems and methods for state-less authentication.
  238. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  239. Davis Mark Charles ; Gray Steve D. ; Kuehr-McLaren David Gerard ; Morrison Ian A. ; Shoriak Timothy G., Systems, methods and computer program products for authenticating client requests with client certificate information.
  240. Amini,Lisa; Belknap,William R., Systems, methods, and computer program products for accelerated dynamic protection of data.
  241. Squier,Anthony C.; Austin,Calvin J., Universal session sharing.
  242. Hinchliffe,Alexander James; Howard,Fraser Peter; Rai,Bobby; Kemp,Andrew, Updating data from a source computer to groups of destination computers.
  243. Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
  244. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  245. Takada,Yuji; Nishida,Taishin, Variable-length key cryptosystem.
  246. Bobbitt,Jared E.; Doll,Stephan A.; Friedman,Marc T.; Lau,Patrick Wing Sang; Mullally,Joseph P., Virtual file system.
  247. Keller Neal Martin ; Pickover Clifford Alan, Visual access to restricted functions represented on a graphical user interface.
  248. McBride Randall C., Volatile key apparatus for safeguarding confidential data stored in a computer system memory.
  249. Cannata,Michael J.; Lee,Richard; Powell,Matthew; Ramasra,Ryan; Smith,Gerald William; Tatham,Charles Edward; Remme,Randall Nelson, Web-based groupware system.

이 특허를 인용한 특허 (30)

  1. Moriai, Shiho; Shimada, Muneki; Shibutani, Kyoji, Authentication device and method.
  2. Veeraraghavan, Venkatesh; Huang, Lin; Tennisberg, Targo; Fink, Nathan, Content targeting with audiences.
  3. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  4. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  5. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  6. Herbach, Jonathan D.; Gilchrist, Gary, Distributed document version control.
  7. Mason, W. Anthony; Noone, Scott J.; Widdowson, Roderick David Wolfe, File system directory attribute correction.
  8. Mason, W. Anthony; Noone, Scott J.; Widdowson, Roderick David Wolfe, File system directory attribute correction.
  9. Roegner, Michael W., Method and system for dynamically implementing an enterprise resource policy.
  10. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  11. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  12. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  13. Roegner, Michael W., Method and system for selecting advertisements to be presented to a viewer.
  14. Roegner, Michael W., Method and system for selecting content items to be presented to a viewer.
  15. Mason, W. Anthony, Methods and systems for data storage.
  16. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  17. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  18. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  19. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  20. Balasubramanian, Shankar; Kishore, K. Uday, Migration engine for use in a logical namespace of a storage system environment.
  21. Shapiro, William M.; Donahue, James; Herbach, Jonathan D., Offline access in a document control system.
  22. Videlov, Vladimir; Mihaylov, Dimitar, Single sign-on for disparate servers.
  23. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  24. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  25. Roegner, Michael W., System for managing access to protected resources.
  26. Roegner, Michael W., System for managing access to protected resources.
  27. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Systems and methods for arbitrary data transformations.
  28. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Systems and methods for arbitrary data transformations.
  29. Sabin, Jason Allen; Brown, Jeremy Ray; Timpson, Daniel Robert, Techniques for network process identity enablement.
  30. Sabin, Jason Allen; Brown, Jeremy Ray; Timpson, Daniel Robert, Techniques for network process identity enablement.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로