$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for managing access to protected computer resources 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/20
출원번호 US-0944473 (2010-11-11)
등록번호 US-8387155 (2013-02-26)
발명자 / 주소
  • Gregg, Richard L.
  • Giri, Sandeep
  • Goeke, Timothy C.
출원인 / 주소
  • Prism Technologies LLC
인용정보 피인용 횟수 : 26  인용 특허 : 167

초록

A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol. The system includes at least one authentication server and at least one access server. The at least one authentication server is adapted to authenticate identity data asso

대표청구항

1. A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the system comprising: at least one authentication server having an associated database to store (i) identity data associated with at least one client computer device,

이 특허에 인용된 특허 (167)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  3. Rosenow Peter D. (Edmonds WA) Trafton Roger M. (Kirkland WA), Apparatus and method for controlling access to and interconnection of computer system resources.
  4. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  5. Davis Derek L. (Phoenix AZ), Apparatus and method for providing secured communications.
  6. Crane, Michael A.; Milman, Ivan Matthew, Authentication framework for managing authentication requests from multiple authentication devices.
  7. Kokudo,Junichi, Authentication method and apparatus for a wireless LAN system.
  8. Molva Refik (Juan-Les-Pins EPX) Tsudik Gene (Thalwil EPX), Authentication method and system with a smartcard.
  9. Tabuki Takaaki,JPX, Authentication method for networks.
  10. Tabuki Takaaki,JPX, Authentication method for networks.
  11. Ohashi Masayoshi,JPX ; Suzuki Toshinori,JPX, Authentication system.
  12. Deo Vinay ; Seidensticker Robert B. ; Simon Daniel R., Authentication system and method for smart card transactions.
  13. Guski Richard H. (Red Hook NY) Larson Raymond C. (Rhinebeck NY) Matyas ; Jr. Stephen M. (Masassas VA) Johnson Donald B. (Masassas VA) Coppersmith Don (Ossining NY), Authentication system using one-time passwords.
  14. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  15. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  16. Gupta Sarbari (Rockville MD) Gligor Virgil D. (Chevy Chase MD), Automated penetration analysis system and method.
  17. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  18. Micali Silvio, Certificate issue lists.
  19. Perlman Radia J. (Acton MA) Reed Edwards E. (Lindon UT) Carter Tammy G. (Pleasant Grove UT), Certificate revocation performance optimization.
  20. Micali Silvio, Certificate revocation system.
  21. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Certificate revocation system.
  22. Hsu Yung-Kao ; Seymour Stephen, Certification process.
  23. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  24. Hosoe Makoto,JPX, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  25. Hosoe, Makoto, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  26. Kunzelman Kevin ; Hutto Sterling, Common session token system and protocol.
  27. Abadi Martin (Palo Alto CA) Goldstein Andrew C. (Hudson MA) Lampson Butler W. (Cambridge MA), Compound principals in access control lists.
  28. Bosen Robert J. (Pittsburg CA) Muir John R. (Antioch CA), Computer access control system and method.
  29. Wirstrom Peter (Pepper Pike OH) Cork William H. (Lake Bluff IL), Computer communications security control system.
  30. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  31. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  32. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  33. Lapointe Brian K. (53 Jerdens La. Rockport MA 01966) Lapointe James A. (43 Ledgewood Dr. Danvers MA 01923), Computer security system.
  34. Schlesinger Artie (825 E. 9th St. Brooklyn NY 11230), Computer security system having remote location recognition and remote location lock-out.
  35. Chandos Ronald V. (Tempe AZ) Foster Robert I. (Mesa AZ), Computer system and method for secure remote communication sessions.
  36. Jecha Steven ; Mitchell Winfield A., Computerized prepress authoring for document creation.
  37. Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
  38. Leveridge,Philip C.; Strange,Michael I.; Parkinson,David W.; Roberts,David; Kenning,Michael J.; Tibbitt Eggleton,Robert I., Data communications.
  39. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  40. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  41. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Detection of unauthorized use of software applications in communication units.
  42. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  43. Gifford David K., Digital active advertising.
  44. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  45. Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
  46. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  47. Doggett John (Brookline MA) Jaffe Frank A. (Sharon MA) Anderson Milton M. (Fair Haven NJ), Electronic funds transfer instruments.
  48. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  49. Olsen James E., Electronic licensing system.
  50. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Electronic payment system and method.
  51. Jones Michael F. (Nashua NH) Zachai Arthur (Swampscott MA), Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys.
  52. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced privacy protection in identification in a data communications network.
  53. Wyman Robert M. (Kirkland WA), Filters in license management system.
  54. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  55. Grundy Gregory (1/21 Hewitt Street Wilston 4051 Queensland AUX), Information distribution system.
  56. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  57. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  58. Weiss Kenneth P. (Newton MA), Integrated network security system.
  59. Renner G. Fred (Dublin OH) Johnson Randall E. (Dublin OH) Chu-Jenq Caroline (Columbus OH), Intelligent card reader having emulation features.
  60. Wirstrom Peter (Pepper Pike OH) Cork William H. (Brecksville OH), Interactive security control system for computer communications and the like.
  61. Atkinson Randall (Annandale VA), Intermediate network authentication.
  62. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  63. Lewis Tony, Key replacement in a public key cryptosystem.
  64. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  65. Walters Kenn D. (Vaterstetten DEX), Memory card.
  66. Murphy Michael V. ; West Earle H., Method and apparatus for authenticating users on a network using a smart card.
  67. Heath Chester A. (Boca Raton FL) Langgood John K. (Boca Raton FL) Valli Ronald E. (Pittsburgh PA), Method and apparatus for automatic initialization of pluggable option cards.
  68. Donald Fred Ault ; John Carr Dayka ; Eric Charles Finkelstein AU; Richard Henry Guski, Method and apparatus for controlling server access to a resource in a client/server system.
  69. DeMont Jason Paul, Method and apparatus for distributing information products.
  70. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  71. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  72. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  73. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  74. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
  75. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard (278 Russet Rd. Stamford CT 06903) Kulinets Joseph M. (126 Hoyt St. ; Apt. 5J Stamford CT 06905), Method and apparatus for protecting multiple copies of computer software from unauthorized use.
  76. Logan Andrew J. (Gladwyne PA), Method and apparatus for protecting software.
  77. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  78. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  79. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  80. Grimmer Francine Gail, Method and apparatus for retrieving X.509 certificates from an X.500 directory.
  81. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  82. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  83. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  84. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  85. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  86. Wang Diana S. (Trophy Club TX), Method and system for controlling public access to a plurality of data objects within a data processing system.
  87. Thomas Richard B. (1902 E. Hope St. Mesa AZ 85203), Method and system for controlling use of protected software.
  88. Grundy Gregory (1/21 Hewitt Street Wilston 4051 ; Queensland AUX), Method and system for decentralized manufacture of copy-controlled software.
  89. Asokan, Nadarajah; Valtteri, Niemi, Method and system for managing cryptographic keys.
  90. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  91. Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
  92. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Method and system for providing certificates holding authentication and authorization information for users/machines.
  93. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  94. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  95. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Method for detecting unauthorized modification of a communication or broadcast unit.
  96. Van Oorschot Paul C. (Ottawa CAX) Ford Warwick S. (Nepean CAX) Hillier Stephen W. (Ottawa CAX) Otway Josanne (Ottawa CAX), Method for efficient management of certificate revocation lists and update information.
  97. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  98. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  99. Hill Charles E., Method for updating a remote computer.
  100. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  101. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  102. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  103. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  104. Chou Wayne W. ; Kulinets Joseph M. ; Elteto Laszlo, Method of metering and protecting computer software.
  105. Brown Mark (174 Elmsley Ct. Ridgewood NJ 07450), Method of protecting computer software.
  106. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard (278 Russet Rd. Stamford CT 06903) Kulinets Joseph M. (Stamford CT), Method of protecting computer software from unauthorized execution using multiple keys.
  107. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  108. Bosen Robert J. (Pittsburg CA) Tucker James J. (Berkeley CA), Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer.
  109. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  110. Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
  111. Willens Steven M., Network access control system and process.
  112. Payne Andrew C. ; Stewart Lawrence C. ; Mackie David J., Network sales system.
  113. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  114. Caputo Anthony A. (Coatesville PA) Amoruso Victor P. (Cumberland MD), Pocket encrypting and authenticating communications device.
  115. Caputo Anthony A. ; Amoruso Victor P., Pocket encrypting and authenticating communications device.
  116. Caputo Anthony A. ; Amoruso Victor P., Pocket encrypting and authenticating communications device.
  117. Pailen William (Derwood MD) Harper Jim L. (Olney MD), Protected software access control apparatus and method.
  118. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  119. Burger Wilhelm F. (Bethesda MD) Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD) Stokes Ellen J. (Liberty Hill TX), Remote trusted path mechanism for telnet.
  120. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  121. de Bruijn Ronny P. (St. Jansteen NLX) Verboven Marc L. K. (Nazareth BEX) van Weele Leonardus A. (Terneuzen NLX) Vermeire Roger R. (Terneuzen MI NLX) Schulze Oscar E. (Midland MI) Schultz Dale H. (Mid, Secure communication system for re-establishing time limited communication between first and second computers before com.
  122. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  123. Shurts Scott A. (Walnut Creek CA), Secure multi-level system for executing stored procedures.
  124. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  125. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  126. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  127. He Jingsha ; Hall Randle D., Security system and method for network element access.
  128. Greer Dennis Keith ; Wilhoit ; III Frank Eldon, Smart card for offline automated meal plans.
  129. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  130. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  131. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  132. Hill Charles E., Software piracy detection system.
  133. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  134. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  135. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Subscription access system for use with an untrusted network.
  136. Mital Amit, System and apparatus for monitoring secure information in a computer network.
  137. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  138. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  139. Bernardo Richard S. ; Macphee David A. ; Smith Jennifer J., System and method for building a web site with automated help.
  140. Erickson John S., System and method for managing copyrighted electronic media.
  141. Coleman David Allen, System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single.
  142. Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
  143. Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
  144. Cox James O. (Austin TX) Mott James M. (Austin TX), System and method for secure initial program load for diskless workstations.
  145. Yee Bennet ; Benaloh Josh, System and method for self-identifying a portable information device to a computing unit.
  146. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  147. Samar Vipin, System and method to transparently integrate private key operations from a smart card with host-based encryption service.
  148. Akiyama Ryota,JPX ; Munakata Akio,JPX ; Koga Yuzuru,JPX ; Ishizaki Masayuki,JPX, System for and method of authenticating a client.
  149. Dedrick Rick, System for automatically updating personal profile server with updates to additional user information gathered from mon.
  150. McCarty Johnnie C. (2304 Wright Cir. Round Rock TX 78664), System for computer software protection.
  151. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  152. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  153. Walsh Joe (Lynnwood WA), System for detecting unauthorized account access.
  154. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  155. Brown Gary S., System for remote pass-phrase authentication.
  156. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  157. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  158. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  159. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  160. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  161. Colonel Kenneth, Thermal ink printer with ink ribbon supply.
  162. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  163. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.
  164. Vaeth J. Stuart ; Walton Charles S., Virtual certificate authority.
  165. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.
  166. Micall Silvio, Witness-based certificate revocation system.
  167. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.

이 특허를 인용한 특허 (26)

  1. Mason, Jeremy Roger, Controlled access.
  2. Schaefer, Manfred, Controlling access.
  3. Baliga, Arati, Device-based authentication for secure online access.
  4. Baliga, Arati, Device-based authentication for secure online access.
  5. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  6. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  7. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  8. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  9. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  10. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for data services.
  11. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for data services.
  12. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing data.
  13. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing data.
  14. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing data.
  15. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing data and/or services for devices.
  16. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing device data.
  17. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing one or more services and/or device data.
  18. Jung, Edward K.Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing one or more services and/or device data.
  19. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for managing services and device data.
  20. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for monitoring and/or managing device data.
  21. Jung, Edward K. Y.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A., Methods and systems for monitoring and/or managing device data.
  22. Budhani, Haseeb Siddique; Ayyadevara, Seetharama Sarma; Kavuluru, Hanumantharao, Secure application delivery system with dial out and associated method.
  23. Budhani, Haseeb Siddique; Ayyadevara, Seetharama Sarma; Kavuluru, Hanumantharao, Secure application delivery system with dynamic stitching of network connections in the cloud.
  24. Budhani, Haseeb Siddique; Ayyadevara, Seetharama Sarma; Kavuluru, Hanumantharao, Secure application delivery system with security services interface in the cloud.
  25. Budhani, Haseeb Siddique; Ayyadevara, Seetharama Sarma; Kavuluru, Hanumantharao, Secure scalable multi-tenant application delivery system and associated method.
  26. Fiala, Garrick; Kasal, Radek, System and process for managing network communications.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로