$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for protecting confidential information 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/31
  • G06F-021/62
출원번호 US-0371590 (2012-02-13)
등록번호 US-9348984 (2016-05-24)
발명자 / 주소
  • Peled, Ariel
  • Troyansky, Lidror
  • Carny, Ofir
출원인 / 주소
  • PortAuthority Technologies, Inc.
인용정보 피인용 횟수 : 0  인용 특허 : 40

초록

A method for computer workstation based information protection is presented, the method comprises: a) monitoring user's actions on the computer workstation, b) analysis of the actions in respect to a pre-defined policy to determine whether the actions prejudice information to which the policy applie

대표청구항

1. A method for information protection, said information comprising a plurality of distinct information items together in a document, said document being for presentation on a computer screen, the method comprising: a) defining respective information protection policies with respect to certain ones

이 특허에 인용된 특허 (40)

  1. Tehranchi,Babak; Jones,Paul W., Copy protection for digital motion picture image data.
  2. Lacan,Francis M.; Perez,Ronald; Shub,Michael I.; Tresser,Charles P., Data management system and method.
  3. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  4. Slaney, Malcolm; Johnson, Bonnie M.; Tomasi, Annarosa; Covell, Michele M.; Miller, Gavin S. P.; Saunders, Steven E., Detection of content display observers with prevention of unauthorized access to identification signal.
  5. Dudasik, Edward, Device, method, and system of display for controlled viewing.
  6. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  7. Hideo Hotomi JP; Takashi Kondo JP; Isao Hayami JP; Katsuyuki Nanba JP; Sadafusa Tsuji JP, Information display device and display control method.
  8. Maloney Michael P. ; Suit John M. ; Rubel Rich ; Woodus Francis M., Information security analysis system.
  9. Eberl,Heinrich A.; Eberl,Roland H. C.; Dickerson,David P.; K?nigstein,Karsten; Jochheim,Edgar, Interactive data view and command system.
  10. Voronka Nestor ; Jacobus Charles J., Low-cost non-imaging eye tracker system for computer control.
  11. Tognazzini Bruce ; Nielsen Jakob ; Glass Robert, Method and apparatus for eyetrack-driven text enlargement.
  12. Popp, Nicolas; Ong, Bruce, Method and apparatus for generating object-oriented world wide web pages.
  13. Chen, Shigang; Wei, Liman, Method and apparatus for managing security policies on a network.
  14. Gilmour David L., Method and apparatus for querying a user knowledge profile.
  15. Garcia,Denis Jacques Paul, Method and apparatus for securing digital assets.
  16. Mead Donald C. (Carlsbad CA), Method and system for anti-piracy using frame rate dithering.
  17. Mannila, Heikki; Rusakov, Dmitry, Method and system for finding a query-subset of events within a master-set of events.
  18. Holland,Karen Mae; Kreulen,Jeffrey Thomas; Spangler,William Scott, Method and system for identifying relationships between text documents and structured variables pertaining to the text documents.
  19. Dunn, James M.; Stern, Edith H.; Willner, Barry E., Method for providing privately viewable data in a publically viewable display.
  20. Stern, Edith H.; Willner, Barry E., Method for providing privately viewable data in a publically viewable display.
  21. Needham Bradford H ; Koizumi David H, Method of displaying private data to collocated users.
  22. Chow Chee-Seng (Briarcliff Manor NY) Kutten Shay (Rockaway NJ) Yung Marcell Mordechay (New York NY), Method to deter document and intellectual property piracy through individualization.
  23. Vanden Berge Thomas A., Proprietary information protection method.
  24. Motoyama, Tetsuro; Fong, Avery; Lyapustina, Yevgeniya, Remote system usage monitoring with flexible packaging of data.
  25. Karch,Robert, Rule based security policy enforcement.
  26. Rikk Crill ; David Bruce ; Kevin Schehrer, Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network.
  27. Ho Andrew P., Secure database management system for confidential records using separately encrypted identifier and access request.
  28. Dunn, James M.; Stern, Edith H.; Willner, Barry E., Secure entry of a user-identifier in a publicly positioned device.
  29. Stern,Edith H.; Willner,Barry E., Secure method for providing privately viewable data in a publicly viewable display.
  30. Suzuki Kaoru,JPX ; Fukui Kazuhiro,JPX ; Kazama Hisashi,JPX ; Yamaguchi Osamu,JPX ; Tanaka Eiji,JPX ; Taniguchi Yasuhiro,JPX, Security apparatus and method.
  31. Ronning Joel A., Self-launching encrypted digital information distribution system.
  32. Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Lu, Jeannie J., System and method for a web based trust model governing delivery of services and programs.
  33. McManis Charles E. (Sunnyvale CA), System and method for data security.
  34. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  35. Albert, Anthony; Kawamura, Kyle; Haycock, Keith; Herrmann, Conrad, System and methodology for security policy arbitration.
  36. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  37. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  38. Flynn Rex A. (Belmont MA) Anick Peter G. (Marlboro MA), System for reconstructing prior versions of indexes using records indicating changes between successive versions of the.
  39. Vignoles,James M.; Hearnden,Stephen Owen; Smithson,Robert Hugh, System, method and computer program product for applying prioritized security policies with predetermined limitations.
  40. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로