$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] Method and system for preventing impersonation of a computer system user 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
  • G06F-015/16
  • G06F-017/30
  • G06F-012/00
  • G06F-012/14
  • G06F-013/00
  • G06F-021/00
  • H04L-029/06
  • G11C-007/00
  • H04N-007/16
출원번호 US-0451847 (2008-06-11)
등록번호 US-8443426 (2013-05-14)
국제출원번호 PCT/SE2008/050704 (2008-06-11)
§371/§102 date 20100405 (20100405)
국제공개번호 WO2008/153496 (2008-12-18)
발명자 / 주소
  • Mattsson, Ulf
출원인 / 주소
  • Protegrity Corporation
대리인 / 주소
    Fenwick & West LLP
인용정보 피인용 횟수 : 1  인용 특허 : 99

초록

A system and method for preventing an administrator impersonating a user from accessing sensitive resources on a target system is provided. The method comprises receiving a first request from a user to change the user's password on a target system to be changed, sending a “change password” request f

대표청구항

1. A method of changing a user password on a target system, the method comprising: receiving a first request from a user at an access control system to change a user password of the user for a target system to a new password;storing at the access control system the new password;changing, by the acce

이 특허에 인용된 특허 (99) 인용/피인용 타임라인 분석

  1. Miller Donald V. (Los Altos CA), Access restriction facility method and apparatus.
  2. Arlein, Robert M.; Lieuwen, Daniel Francis; Michael, Gavin C.; Ordille, Joann Janet; Silva, Juliana Freire, Active database trigger processing using a trigger gateway.
  3. Heinrich, David F.; Le, Hung Q.; Rawlins, Paul B.; Stancil, Charles J., Apparatus and method for providing access security to a device coupled upon a two-wire bidirectional bus.
  4. Johansson Jan (Torslanda SEX), Apparatus and method for storing data.
  5. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Apparatus and storage medium for decrypting information.
  6. Yatsukawa Naonobu,JPX, Authentication system using authentication information valid one-time.
  7. Dunn, James Patrick, Call rejection interface for internet protocols.
  8. Mattsson, Ulf, Combined hardware and software based encryption of databases.
  9. Tanaka, Kosuke; Iriyama, Yasuomi; Sato, Ryuichi; Morikawa, Hiroaki, Communication processing method and system relating to authentication information.
  10. Abadi Martin (Palo Alto CA) Burrows Michael (Palo Alto CA) Lampson Butler (Cambridge MA), Computer network with modified host-to-host encryption keys.
  11. Veneklase Brian J., Computer security system.
  12. Morisawa Toshikazu (Tokorozawa JPX) Dewa Koichi (Ome JPX) Saito Toshimitsu (Fuchu JPX), Computer with password processing function and password processing method of computer.
  13. Burnett Colin J. (Sydney CA AUX) Haas Garry L. (San Jose CA), Computerized system and process for managing a distributed database system.
  14. Matyas ; Jr. Stephen M. (Manassas VA) Meyer Carl H. W. (Kingston NY) Brachtl Bruno O. (Boeblingen DEX), Controlled use of cryptographic keys via generating station established control values.
  15. Kawamura Shinichi (Kanagawa JPX) Shimbo Atsushi (Tiba JPX), Cryptographic communication method and cryptographic communication device.
  16. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  17. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  18. Davida George I. (Tucker GA), Cryptographic key sharing circuit and method using code correction.
  19. Maurer Ueli (Wil CHX), Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without u.
  20. Taguchi Masahiro,JPX ; Kawano Kenji,JPX ; Saito Kazuo,JPX, Data processing apparatus with software protecting functions.
  21. Thomson Robert David ; Geiwitz Roger, Data security system and method.
  22. Dahl Ulf, Data security system for a database having multiple encryption levels applicable on a data element value level.
  23. Yuji Sugiura JP; Toru Hanada JP, Device management control in response to AC connection/disconnection.
  24. Diachina John W. ; Persson Bengt,SEX ; Raith Alex K. ; Sammarco Anthony J., Digital control channels having logical channels supporting broadcast SMS.
  25. Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A., Digital data storage systems, computers, and data verification methods.
  26. Shanton M. Greg, Distributed cryptographic object method.
  27. Shanton M. Greg, Distributed cryptographic object method.
  28. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  29. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  30. Stieglitz, Jeremy; Potter, Darran, Dynamically mitigating a noncompliant password.
  31. Miyahara Gary K. (Rancho Palos Verdes CA), Efficient security kernel for the 80960 extended architecture.
  32. Nakasuji Masataka,JPX ; Kawai Shoichi,JPX ; Kihara Yoshiro,JPX ; Saitou Junichi,JPX ; Nishioka Youko,JPX, Electronic apparatuses capable of scrambling confidential data for display.
  33. McCaughan Daniel Vincent,GBX ; Unitt Brian Michael,GBX ; Dean Robert John,GBX ; Kanabar Yashvant,GBX, Electronic sealed envelope.
  34. Dutcher David Paul ; Sinclair ; Jr. William H. ; Smith Stanley Alan, Enabling target servers to control determination of full user synchronization.
  35. McCreight, Shawn; Weber, Dominik; Garrett, Matthew, Enterprise computer investigation system.
  36. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  37. Iwase, Kazuhisa, File access control device, password setting device, process instruction device, and file access control method.
  38. Moore James W. (Potomac MD), Hybrid encryption method and system for protecting reusable software components.
  39. Sutter Herbert P.,CAX, Independent distributed database system.
  40. Lim, Mario, Integrating heterogeneous authentication and authorization mechanisms into an application access control system.
  41. Craig H. Rowland, Intrusion detection system.
  42. Yamamoto Keiji ; Onishi Noriyasu,JPX, Key code correlation security.
  43. Okamoto Eiji (Tokyo JPX), Key distribution method.
  44. Wyman Robert M. (Kirkland WA), License document interchange format for license management system.
  45. Grainger, Steven Phillip, Method and apparatus for an intruder detection reporting and response system.
  46. Wessman,Richard R., Method and apparatus for automatic database encryption.
  47. Abraham Robert L. (Marietta GA) Mitchell Herman (Lithonia GA) Panuganti Badari N. (Mableton GA) Stowers Laura A. (Smyrna GA), Method and apparatus for controlling access to data elements in a data processing system based on status of an industria.
  48. Reiner, David; Miller, Jeffrey M.; Wheat, David C., Method and apparatus for database query decomposition.
  49. Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
  50. Vaughan Mark P. ; Sturgeon Derrill L., Method and apparatus for overriding access security to a PC when a password is lost.
  51. Basani, Vijay R.; Mangiapudi, Krishna; Murach, Lynne M.; Karge, Leroy R.; Revsin, Vitaly S.; Bestavros, Azer; Crovella, Mark E.; LaRosa, Domenic J., Method and apparatus for scalable distribution of information in a distributed network.
  52. Angelo Michael F. ; Miller Craig A., Method and apparatus for secure execution of software prior to a computer system being powered down or entering a low.
  53. Goldstein Benjamin D., Method and apparatus for secure storage of data.
  54. Sung Chiakang ; Wang Bonnie I., Method and apparatus for securing programming data of programmable logic device.
  55. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  56. Bailey ; III John E. (207 Leafmore Rd. Rome GA 30165), Method and system for creating and storing a backup copy of file data stored on a computer.
  57. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification using proofs of legitimacy.
  58. Swift Michael M. ; Van Dyke Clifford P. ; Misra Pradyumna Kumar, Method for changing passwords on a remote computer.
  59. Bass Walter E. (Sunnyvale CA) Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Method for establishing user authenication with composite session keys among cryptographically communicating nodes.
  60. Mattsson,Ulf, Method for intrusion detection in a database system.
  61. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Springfield, Randall Scott; Ward, James Peter, Method of providing enhanced security in a remotely managed computer system.
  62. Coss Michael John ; Majette David L. ; Sharp Ronald L., Methods and apparatus for a computer network firewall with proxy reflection.
  63. Wee,Susie J.; Apostolopoulos,John G., Methods and systems for packetizing encoded data.
  64. Morris,Scott; Conner,William, Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products.
  65. Hattori Seiji (Tokyo JPX) Kasukawa Akihide (Tokyo JPX) Shibano Yoshizo (Osaka JPX) Kobayashi Yoshinobu (Osaka JPX) Suzuki Shinji (Osaka JPX), Mobile communication system.
  66. Maruyama Minoru (Kawasaki JPX) Fujiwara Shuuji (Kawasaki JPX), Mobile unit and a method for enabling a dial lock in the mobile unit.
  67. D'Angelo Michael R. ; Eggert Geoffrey M. ; Bresler Robert G. ; Qualitz Joseph E., Motion sensitive anti-theft device with alarm screening.
  68. Elko David A. (Poughkeepsie NY) Frey Jeffrey A. (Fishkill NY) Mohan Chandrasekaran (San Jose CA) Narang Inderpal S. (Saratoga CA) Nick Jeffrey M. (Fishkill NY) Strickland Jimmy P. (Saratoga CA) Swans, Multiple processor system having software for selecting shared cache entries of an associated castout class for transfer.
  69. Prafullchandra Hemlata S., NIS+ password update protocol.
  70. Picazo ; Jr. Jose J. ; Lee Paul Kakul ; Zager Robert P., Network packet switch using shared memory for repeating and bridging packets at media rate.
  71. Kurahashi Masayuki (Kanagawa JPX) Saito Takahiro (Kanagawa JPX) Yoshinari Toshiaki (Kanagawa JPX) Maeda Masahiro (Kanagawa JPX) Yamada Kazuya (Kanagawa JPX), Network system having controlled access to available resources.
  72. Geary Wade S., Non-linear database set searching apparatus and method.
  73. Smith Robert D. (Malibu CA), Occurence and value based security system for computer databases.
  74. Ong, Peng T.; Ramachandran, Sriram, One time passcode system.
  75. Huynh Dung ; Robshaw Matthew ; Juels Ari ; Kaliski ; Jr. Burton, Password synchronization.
  76. Masaki Ichihara JP, Password updating apparatus and recording medium used therefor.
  77. Shieh Shiuh-Pyung W. (Hsinchu MD TWX) Gligor Virgil D. (Chevy Chase MD), Pattern-oriented intrusion-detection system and method.
  78. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  79. Anderson Milton M., Re-initialization of an iterated hash function secure password system over an insecure network connection.
  80. Hirose Masaki,JPX, Scramble/descramble method and apparatus for data broadcasting.
  81. Novoa, Manuel; Crisan, Adrian, Secure and dynamic biometrics-based token generation for access control and authentication.
  82. Boebert William E. (Minneapolis MN) Hanson Mark H. (Eagan MN) Markham Thomas R. (Anoka MN), Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local wo.
  83. Cane David ; Hirschman David ; Speare Philip ; Vaitzblit Lev, Secure file archive through encryption key management.
  84. Bulfer Andrew F. (Mountain Lakes NJ) Kaplan Michael M. (Rockport MA) McNair Bruce E. (Holmdel NJ) Wegrzynowicz Carol A. (Holmdel NJ), Secure telecommunications.
  85. Hinsley Stewart R. (Alsager GB3) Hughes Christopher D. (Audlem GB3), Security mechanism for a computer system.
  86. Uchida, Yoshiaki, Storage device and access control method.
  87. Robusto John D. (Herndon VA) Boswell William H. (State College PA) Meckley Mary E. (Las Vegas NV) Niechwiadowicz Deanna R. (State College PA) Watt David J. (Freeport PA) Findley Gorman N. (Boalsburg , System and method for monitoring and controlling one or more computer sites.
  88. Gough,Richard Bruce; Crosby,Charles A.; O'Connell,Ellen R.; Deckard,Jennifer L.; Funk,Steven R., System and method for synchronizing a user password between mainframe and alternative computer operating environments.
  89. Silverman, Brian D.; Peterson, Mitchell O., System and method for transaction access control.
  90. McDonnal William D. (Tigard OR) Lohstroh Shawn (Beaverton OR) Grawrock David (Aloha OR), System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-thre.
  91. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  92. Yoshimoto Masahiko,JPX, System for controlling the authority of a terminal capable of simultaneously operating a plurality of client softwares which transmit service requests.
  93. Prokupets, Rudy; Regelski, Michael, System for integrating security and access for facilities and information systems.
  94. Leah,Robert C.; McGarvey,John Ryan, Technique for synchronizing security credentials from a master directory, platform, or registry.
  95. Webb ; Jr. Frederick W. (Edina MN) Almendinger Allen D. (Bloomington MN) Bright Kevin L. (Minneapolis MN) Hendren Kenneth J. (Eagan MN) Petersen Donald D. (Long Lake MN) Dandrea Michael B. (Minneapol, Time clock system including scheduling payroll and productivity analysis capability.
  96. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  97. Dutcher David Paul ; Sinclair ; Jr. William H. ; Smith Stanley Alan, User account establishment and synchronization in heterogeneous networks.
  98. Kajimoto, Kazuo, Video file providing apparatus, video receiving/reproducing apparatus, internet broadcast system, and computer-readable recording medium.
  99. Arsenault, Robert G.; Stanger, Leon J., Virtual video on demand using multiple encrypted video segments.

이 특허를 인용한 특허 (1) 인용/피인용 타임라인 분석

  1. Jerdonek, Robert A.; Chung, Christopher C., Systems and methods for evaluating a password policy.

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 특허

해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로