Security system that uses indirect password-based encryption
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/00
G06F-007/04
G06F-017/30
H04L-029/06
H04L-009/32
H04L-009/00
H04L-009/28
H04K-001/00
출원번호
UP-0286524
(2002-11-01)
등록번호
US-7836310
(2011-01-16)
발명자
/ 주소
Gutnik, Yevgeniy
대리인 / 주소
Sterne, Kessler, Goldstein & Fox P.L.L.C.
인용정보
피인용 횟수 :
14인용 특허 :
316
초록▼
An improved system and approaches for protecting passwords are disclosed. A file security system for an organization operates to protect the files of the organization and thus prevents or limits users from accessing some or all of the files (e.g., documents) associated with the organization. Accordi
An improved system and approaches for protecting passwords are disclosed. A file security system for an organization operates to protect the files of the organization and thus prevents or limits users from accessing some or all of the files (e.g., documents) associated with the organization. According to one aspect, a password entered by a user is used, provided it is authenticated, to obtain a respective authentication string (a relatively longer string of numbers or characters). The retrieved authentication string is then used to enable the user to enter the file security system and/or to access secured files therein. According to another aspect, user passwords are not stored in the file security system to avoid security breaches due to unauthorized capture of user passwords.
대표청구항▼
What is claimed is: 1. A method for authenticating a user to a file security system, the method comprising: receiving notification of a login request that includes at least a password associated with the user; decrypting an encrypted authentication string with the password received with the login r
What is claimed is: 1. A method for authenticating a user to a file security system, the method comprising: receiving notification of a login request that includes at least a password associated with the user; decrypting an encrypted authentication string with the password received with the login request to produce a decrypted authentication string, the encrypted authentication string having been created using a random number of a predetermined length and encrypted using a previously-received password associated with the user; and determining whether the user is authenticated based on the decrypting. 2. The method as recited in claim 1, wherein the received password is never stored in a file by or for the file security system. 3. The method as recited in claim 1, wherein the received password is never stored in a non-volatile manner. 4. The method as recited in claim 1, further comprising: permitting access to files protected by the file security system in response to determining that the user is authenticated. 5. The method as recited in claim 1, further comprising: denying access to files protected by the file security system in response to determining that the user is not authenticated. 6. A method for authenticating a user to a file security system, the method comprising: receiving a password associated with the user; accessing an encrypted authentication string from a server machine associated with the file security system, the encrypted authentication string having been created using a random number of a predetermined length and encrypted using a previously-received password, wherein the encrypted authentication string is associated with the user; decrypting the encrypted authentication string with the received password to produce a decrypted authentication string; and determining whether the user is authenticated based on the decrypting. 7. The method as recited in claim 6, further comprising removing the received password from memory after the decrypting. 8. The method as recited in claim 6, wherein the file security system is provided on at least one computer, the computer having non-volatile storage and volatile storage, the method further comprising: removing the received password from the volatile storage after the decrypting, and wherein following receiving the password and before removing the received password after the decrypting, the received password is only stored in the volatile storage. 9. The method as recited in claim 6, the determining further comprising determining whether decryption of the encrypted authentication string was successful. 10. The method as recited in claim 6, further comprising: permitting access to files protected by the file security system in response to determining that the user is authenticated. 11. The method as recited in claim 6, further comprising: denying access to files protected by the file security system in response to determining that the user is not authenticated. 12. A method for re-authenticating a user to a file security system, where the user was previously authenticated to the file security system, comprising: determining whether a re-authorization condition exists; and re-authenticating the user to the file security system in response to determining that the re-authorization condition exists, said re-authenticating includes at least: receiving a password associated with the user; accessing an encrypted authentication string from a server machine associated with the file security system; decrypting the encrypted authentication string with the received password to produce an authentication string; and determining whether the user is re-authenticated based on said decrypting. 13. The method as recited in claim 12, wherein determining whether a re-authorization condition exists includes determining that the user is attempting to perform an operation with respect to the file security system that is deemed to be highly guarded. 14. The method as recited in claim 12, wherein determining whether a re-authorization condition exists includes determining that the user is attempting to export a certificate. 15. The method as recited in claim 12, wherein the re-authentication further includes the act of removing the received password from memory after the decrypting. 16. The method as recited in claim 12, wherein the file security system is provided on at least one computer, the computer having non-volatile storage and volatile storage, wherein the re-authentication further includes the act of: removing the received password from the volatile storage after the decrypting, and wherein following the receiving of the password and before the removing, the received password is only stored in the volatile storage. 17. The method as recited in claim 12, the determining further comprising determining whether decryption of the encrypted authentication string was successful. 18. The method as recited in claim 12, further comprising: permitting access to the file security system in response to determining that the user is re-authenticated. 19. The method as recited in claim 12, further comprising: denying access to the file security system in response to determining that the user is not re-authenticated. 20. A method for changing a password of a user, wherein the password is associated with a file security system, the method comprising: retrieving a stored, existing password associated with the user; accessing an encrypted authentication string from a server machine associated with the file security system, the encrypted authentication string having been created by: generating a random number of a predetermined length; converting the random number into the authentication string; and encrypting the authentication string using the existing password, so as to associate the encrypted authentication string with the user; decrypting the encrypted authentication string with the existing password to produce a decrypted authentication string; and determining whether the user is authenticated based on the decrypting. 21. The method as recited in claim 20, wherein the method does not require any of the files protected by the file security system to be modified if a password is changed for the user. 22. The method as recited in claim 20, further comprising: denying the user from changing the password from the existing password to a new password in response to determining that the user is not authenticated. 23. The method as recited in claim 20, further comprising: permitting a password to be changed from the existing password to the new password in response to determining that the user is authenticated. 24. The method as recited in claim 23, wherein the permitting comprises: encrypting the authentication string using the new password to produce a new encrypted authentication string; and storing the new encrypted authentication string in the server machine for subsequent usage. 25. An article of manufacture including a computer readable medium having instructions stored thereon, that, in response to execution by a computing device, cause the computing device to perform operations for authenticating a user to a file security system, the operations comprising: receiving a file access request including at least a password associated with the user; decrypting an encrypted authentication string with the password received with the file access request to produce a decrypted authentication string, the encrypted authentication string having been created using a random number of a predetermined length and encrypted using a previously-received password associated with the user; and determining whether the user is authenticated based on the decrypting. 26. The article of manufacture as recited in claim 25, the operations further comprising: permitting access to files protected by the file security system in response to determining that the user is authenticated. 27. The article of manufacture as recited in claim 25, the operations further comprising: denying access to files protected by the file security system in response to determining that the user is not authenticated. 28. A computer readable medium having stored thereon, computer program code that, in response to execution by a computer, causes the computer to authenticate a user to a file security system by a method comprising: receiving a password associated with the user; accessing an encrypted authentication string from a server machine associated with the file security system, the encrypted authentication string having been created using a random number of a predetermined length and encrypted using a previously-received password, wherein the encrypted authentication string is associated with the user; wherein the encrypted authentication string is associated with the user; decrypting the encrypted authentication string with the received password to produce an authentication string; and determining whether the user is authenticated based on the decrypting by the computer code for decrypting. 29. The computer readable medium as recited in claim 28, the method further comprising: permitting access to files protected by the file security system in response to determining that the user is authenticated. 30. The computer readable medium as recited in claim 28, the method further comprising: denying access to files protected by the file security system in response to determining that the user is not authenticated. 31. A computer readable medium having stored thereon, computer program code that, in response to execution by a computer, causes the computer to re-authenticate a user to a file security system by a method, where the user was previously authenticated to the file security system, the method comprising: accessing an encrypted authentication string from a server machine associated with the file security system, wherein the encrypted authentication string is associated with the user; determining whether a re-authorization condition exists; and re-authenticating the user to the file security system when the re-authorization condition exists, the re-authenticating comprising: receiving a password associated with the user; accessing an encrypted authentication string from a server machine associated with the file security system; decrypting the encrypted authentication string with the received password to produce an authentication string; and determining whether the user is re-authenticated based on the decrypting by the computer code for decrypting. 32. The computer readable medium as recited in claim 31, the method further comprising: permitting access to the file security system in response to determining that the user is re-authenticated. 33. The computer readable medium as recited in claim 31, the method further comprising: denying access to the file security system determining determines that the user is not re-authenticated. 34. A tangible computer readable medium having instructions stored thereon to change a password associated with a file security system, the instructions comprising: instructions to receive a new password; instructions to retrieve a stored, existing password associated with the user; instructions to access an encrypted authentication string from a server machine associated with the file security system, the encrypted authentication string having been created by: generating a random number of a predetermined length; converting the random number into the authentication string; and encrypting the authentication string using the existing password, wherein the encrypted authentication string is associated with a user; instructions to decrypt the encrypted authentication string with the existing password to produce a decrypted authentication string; and instructions to determine whether the user is authenticated based on the decrypting. 35. The tangible computer readable medium as recited in claim 34, the instructions further comprising: instructions to deny the password to be changed from the existing password to the new password in response to determining that the user is not authenticated. 36. The tangible computer readable medium as recited in claim 34, the instructions further comprising: instructions to permit the password to be changed from the existing user password to the new password in response to determining that the user is authenticated. 37. A method for authenticating a user to a file security system, wherein the file security system includes a server portion and at least one client portion, the server portion residing in a server machine, and the client portion residing in a client machine, the method comprising: receiving a login request including at least a password associated with the user; decrypting an encrypted authentication string with the password received with the login request to produce a decrypted authentication string, the encrypted authentication string having been created using a random number of a predetermined length and encrypted using a previously-received password associated with the user; and determining whether the user is authenticated based on the decrypting. 38. The method as recited in claim 37, further comprising: permitting access to files protected by the file security system in response to determining that the user is authenticated. 39. The method as recited in claim 37, further comprising: denying access to files protected by the file security system in response to determining that the user is not authenticated. 40. A method for authenticating a user to a file security system, the method comprising: generating a random number of a predetermined length; converting the random number into an authentication string; encrypting the authentication string using a previously-received password to produce an encrypted authentication string, wherein the encrypted authentication string and the previously-received password are associated with the user; and storing the encrypted authentication string in a server machine associated with the file security system for subsequent usage. 41. The method as recited in claim 40, wherein the file security system includes a server portion and at least one client portion, the server portion residing in a server machine, and the client portion residing in a client machine associated with the user, and further comprising causing the client machine to store the encrypted authentication string associated with the user. 42. The method as recited in claim 40, further comprising storing the encrypted authentication string in the server machine. 43. The method as recited in claim 40, wherein the method is performed on a client machine operating on a client portion of the file security system, and further comprising causing deletion of the received password after the authentication string is encrypted from memory of the client machine. 44. An article of manufacture including a computer readable medium having instructions stored thereon, that, in response to execution by a computing device, cause the computing device to perform operations for authenticating a user to a file security system, the operations comprising: generating a random number of a predetermined length; converting the random number into an authentication string; encrypting the authentication string using a previously-the received password to produce an encrypted authentication string, wherein the encrypted authentication string and the previously-received password are is associated with the user; and storing the encrypted authentication string in a server machine associated with the file security system for subsequent usage. 45. A method for authenticating a user to a file security system, wherein the file security system includes a server portion and at least one client portion, the server portion residing in a server machine, and the client portion residing in a client machine, the method comprising: generating a random number of a predetermined length; converting the random number into an authentication string; encrypting the authentication string using a previously-received password associated with a user to produce an encrypted authentication string; and storing the encrypted authentication string in the file security system to the server machine for subsequent usage.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (316)
Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
Just, Michael K.; Van Oorschot, Paul, Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system.
Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
Strickler Gary E. ; Knapp Herbert William ; Holenstein Bruce D. ; Holenstein Paul J., Bidirectional database replication scheme for controlling ping-ponging.
Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
Brownlie,Michael; Hillier,Stephen; Van Oorschot,Paul C., Computer network security system and method having unilateral enforceable security policy provision.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Sahulka Richard J. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for multiple domain networks.
Yoshino, Kenji; Ishibashi, Yoshihito; Akishita, Toru; Shirai, Taizo; Ito, Takeshi; Hayashi, Shigekazu, Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management.
Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
Ohtsu Toshiyuki,JPX, Dynamic adding system for memory files shared among hosts, dynamic adding method for memory files shared among hosts, and computer-readable medium recording dynamic adding program for memory files sh.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Kuroda, Yasutsugu; Kamada, Jun; Iwase, Shoko; Noda, Bintatsu; Ono, Etsuo, Electronic data storage apparatus with key management function and electronic data storage method.
Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
Tozawa,Jun; Nogami,Hiroshi; Shibayama,Tetsuya; Kataoka,Tomohiro; Fujio,Hiroshi, Encryption and decryption communication semiconductor device and recording/reproducing apparatus.
Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
Shimbo Atsushi,JPX ; Takahashi Toshinari,JPX ; Tomoda Ichiro,JPX ; Murota Masao,JPX, File editing system and shared file editing system with file content secrecy, file version management, and asynchronous.
Eshel Marc M. (Tarrytown NY) Hunt Guerney D. H. (Ithaca NY) Jones Donald N. (Vestal NY) Meyer Christopher (Vestal NY) Schwartz Frederick A. (Binghamton NY), File manager for files shared by heterogeneous clients.
Kumar,Sanjay; Thomas,Stanton L.; Deshpande,Gaurav M.; Murty,Venkataesh V., Fulfillment management system for managing ATP data in a distributed supply chain environment.
Bonn, David Wayne; Marvais, Nick Takaski, Generalized network security policy templates for implementing similar network security policies across multiple networks.
Shimizu Hideo,JPX ; Hori Satomi,JPX ; Endoh Naoki,JPX ; Saisho Toshiaki,JPX, Information processing system having function of securely protecting confidential information.
Asano,Tomoyuki; Osawa,Yoshitomo, Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith.
Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
Law,Gary K.; Deitz,David L.; Schleiss,Trevor Duncan; Naidoo,Julian, Integrated electronic signatures for approval of process control and safety system software objects.
Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics.
Phillips,Robert S.; Davis,Scott H.; Dietterich,Daniel J.; Nyman,Scott E.; Porter,David, Internet-based shared file service with native PC client access and semantics and distributed access control.
Thomsen,Daniel Jay; O'Brien,Richard; Bogle,Jessica; Payne,Charles, Locally adaptable central security management in a heterogeneous network environment.
John E. Parsons, Jr. ; Bradley J. Graziadio ; Oshoma Momoh, Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different com.
Zavalkovsky,Arthur; Elfassy,Nitsan, Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points.
McLaughlin Michael D. (San Jose CA) Signa John C. (Sunnyvale CA) Greicar Richard K. (Moss Beach CA) Taylor John M. (London GB2), Method and apparatus for display calibration and control.
Batten-Carew Mark,CAX ; Buchler Marek,CAX ; Hiller Stephen William,CAX ; Otway Josanne Mary,CAX, Method and apparatus for processing administration of a secured community.
Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for reliable and scalable distribution of data files in distributed networks.
Sames, David L.; Whitmore, Brent S.; Niebuhr, Brian S.; Tally, Gregg W., Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system.
DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Krueger, Scott; Goodman, Daniel, Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program.
Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
Komuro Teruyoshi,JPX ; Osawa Yoshitomo,JPX ; Shima Hisato ; Asano Tomoyuki,JPX, Method and system for transferring information using an encryption mode indicator.
Lambert Howard Shelton,GBX ; Orchard James Ronald Lewis,GBX, Method for controlling access to electronically provided services and system for implementing such method.
Bala,Vasanth; Smith,Michael D., Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent.
Kung Kenneth C. (Cerritos CA) Bathrick Erwin W. (Brea CA) Huang Cheng-Chi (Irvine CA) Ma Mae-Hwa (Cerritos CA) Matthews Todd E. (Santa Ana CA) Zmuda James E. (Lake Forest CA), Method for providing mutual authentication of a user and a server on a network.
Skarbo Rune A. ; Clitheroe Cameron J. ; Lawless Christopher C. ; Kukkal Puneet ; Hochman Stephen D., Method for web based storage and retrieval of documents.
Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
Hochberg,Avishai Haim; Marek,Toby Lyn; Cannon,David Maxwell; Martin,Howard Newton; Warren, Jr.,Donald Paul; Haye,Mark Alan, Method, system, and program for retention management and protection of stored objects.
Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
Arlein,Robert M.; Jai,Ben; Jakobsson,Bjorn Markus; Monrose,Fabian; Reiter,Michael Kendrick, Methods and apparatus for providing privacy-preserving global customization.
Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
Vahalia Uresh K. ; Gupta Uday ; Porat Betti ; Tzelnic Percy, Network file server sharing local caches of file access information in data processors assigned to respective file systems.
Schmuck Frank B. ; Zlotek Anthony J. ; Shmueli Boaz,ILX ; Mandler Benjamin,ILX ; Yehudai Zvi Yosef,ILX ; Kish William A., Parallel file system with method using tokens for locking modes.
Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Secure data storage and retrieval with key management and user authentication.
Rose Anthony M. (66 Drumalbyn Road Bellevue Hill ; Sydney AUX 2023), Securing a computer against undesired write operations to or read operations from a mass storage device.
Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
William J. Bolosky ; John R. Douceur ; Scott M. Cutshall ; Richard F. Rashid ; Nathan P. Myhrvold ; David A. Goebel, Single instance store for file systems.
Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
Barlow, Doug; Dillaway, Blair; Fox, Barbara; Lipscomb, Terry; Spies, Terrence, System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer.
Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
Richard R. Viets ; David G. Motes ; Paula Budig Greve ; Wayne W. Herberg, System and method for controlling access to documents stored on an internal network.
Viets, Richard R.; Motes, David G.; Greve, Paula Budig; Herberg, Wayne W., System and method for controlling access to documents stored on an internal network.
Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
Olsen, Theis; Bundesen, Rune Windfeld; Hougaard, Claes Christian; Nordly, Trygve Thor, System and method for ensuring secure transfer of a document from a client of a network to a printer.
Dennis, Michael W.; Freed, Michele L.; Plastina, Daniel; Flo, Eric R.; Kays, Jr., David E.; Corrington, Robert E., System and method for implementing group policy.
Michael W. Dennis ; Michele L. Freed ; Daniel Plastina ; Eric R. Flo ; David E. Kays, Jr. ; Robert E. Corrington, System and method for implementing group policy.
Kiessig,Rick; Yost,David A.; Mathon,John D., System and method for managing content with event driven actions to facilitate workflow and other features.
Sakurai Hiroshi (Tokyo JPX) Ikeda Nobuyuki (Tokyo JPX) Watabe Akehiro (Tokyo JPX), System and method for processing document information using password protected icons that represent document content.
Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
Dixon Peggy PakFan ; Shi Danling ; Verburg Richard Lee ; Wood Donald Edwin, System and method for transferring a session from one application server to another without losing existing resources.
Bess, Dwayne Lamarr; Brischke, Harold Allan; Keller, Andrew Charles; Wagner-Krankel, Dale Alan; Tijerina, Jacob Garza; Connolly, Jr., Billy Ray; O'Connor, Karen Ann; McDaniel, James William; Lewis, R, System and method of providing electronic access to one or more documents.
McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
Bacha, Hamid; Carroll, Robert Bruce; Mirlas, Lev; Tchao, Sung Wei, System for electronic repository of data enforcing access control on data search and retrieval.
Riedel,Erik; Karamanolis,Christos; Kallahalla,Mahesh; Swaminathan,Ram, System for ensuring data privacy and user differentiation in a distributed file system.
Hahn Samuel S. ; LeGault Kenn ; Wheeler Maxon ; Degenhardt Jon R., System for organizing document icons with suggestions, folders, drawers, and cabinets.
Donaghey, Robert J.; Carielli, Sandra E.; Helinek, Pamela, System for selecting and disseminating active policies to peer device and discarding policy that is not being requested.
Krishnaswamy, Sridhar; Elliott, Isaac K.; Reynolds, Tim E.; Forgy, Glen A.; Solbrig, Erin M., System, method and article of manufacture for a communication system architecture including video conferencing.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Davis Mark Charles ; Gray Steve D. ; Kuehr-McLaren David Gerard ; Morrison Ian A. ; Shoriak Timothy G., Systems, methods and computer program products for authenticating client requests with client certificate information.
Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
Brown, Douglas S.; Kelley, John F.; Seager, Todd; Torres, Robert J., Lightweight document access control using access control lists in the cloud storage or on the local file system.
Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.