$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for managing access to protected computer resources

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
출원번호 US-0141311 (2016-04-28)
등록번호 US-9413768 (2016-08-09)
발명자 / 주소
  • Gregg, Richard L.
  • Giri, Sandeep
  • Goeke, Timothy C.
출원인 / 주소
  • PRISM TECHNOLOGIES LLC
대리인 / 주소
    Martin & Ferraro, LLP
인용정보 피인용 횟수 : 0  인용 특허 : 305

초록

A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software me

대표청구항

1. A system for controlling access to selected computer resources, the system comprising: at least one authentication server having at least one associated database to register at least one digital identification of a hardware key associated with at least one client computer device;said at least one

이 특허에 인용된 특허 (305)

  1. Medvinsky, Alexander; Peterka, Petr; Moroney, Paul, Access control and key management system for streaming media.
  2. Rumsewicz, Michael Peter; Castro, Maurice David, Access control method and apparatus.
  3. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  4. Rand Haverty CA, Access control using attributes contained within public key certificates.
  5. Usui Toshiyuki (Tokyo JPX) Kaneko Saburou (Tokyo JPX), Adaptive dictionary for a fingerprint recognizer.
  6. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  7. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  8. Heath, Jr., William D., Apparatus and method for controlled access to a secured location.
  9. Rosenow Peter D. (Edmonds WA) Trafton Roger M. (Kirkland WA), Apparatus and method for controlling access to and interconnection of computer system resources.
  10. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  11. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  12. Davis Derek L. (Phoenix AZ), Apparatus and method for providing secured communications.
  13. Billstrom Lars (Sonla SEX) Wetterborg Lars (Jarfalla SEX) Dahlin Steinar (Jarfalla SEX) Persson Bengt (Djursholm SEX), Apparatuses and mobile stations for providing packet data communication in digital TDMA cellular systems.
  14. Lilley Robert M. (Knypersley GBX) Ridgway Paul J. (Congleton GBX), Arrangement and procedure for determining the authorization of individuals by verifying their fingerprints.
  15. Chang Cheng-Tze (Lisle IL) Lee Chinmei C. (Woodridge IL) Zhu Yie-de (Naperville IL), Arrangement for obtaining authentication key parameters in a cellular mobile telecommunications switching network.
  16. Aditham Radhakrishna ; Chang Philip ; Kramer Paul H., Authenticating remote users in a distributed environment.
  17. Brinkmeyer Horst,DEX ; Daiss Michael,DEX ; Schwegler Guenter,DEX, Authentication device with electronic authentication communication.
  18. Crane, Michael A.; Milman, Ivan Matthew, Authentication framework for managing authentication requests from multiple authentication devices.
  19. Chavez ; Jr. David L. (Thornton CO), Authentication hierarchical structure of switching nodes for storage of authentication information.
  20. Kokudo,Junichi, Authentication method and apparatus for a wireless LAN system.
  21. Molva Refik (Juan-Les-Pins EPX) Tsudik Gene (Thalwil EPX), Authentication method and system with a smartcard.
  22. Tabuki Takaaki,JPX, Authentication method for networks.
  23. Tabuki Takaaki,JPX, Authentication method for networks.
  24. Mihm ; Jr. Thomas J. (Mesa AZ), Authentication system.
  25. Munck Robert G. (Lexington MA) Chapin Steven E. (Chelmsford MA), Authentication system.
  26. Ohashi Masayoshi,JPX ; Suzuki Toshinori,JPX, Authentication system.
  27. Deo Vinay ; Seidensticker Robert B. ; Simon Daniel R., Authentication system and method for smart card transactions.
  28. Dent Paul (Stehag SEX), Authentication system for digital cellular communications.
  29. Guski Richard H. (Red Hook NY) Larson Raymond C. (Rhinebeck NY) Matyas ; Jr. Stephen M. (Masassas VA) Johnson Donald B. (Masassas VA) Coppersmith Don (Ossining NY), Authentication system using one-time passwords.
  30. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  31. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  32. Gupta Sarbari (Rockville MD) Gligor Virgil D. (Chevy Chase MD), Automated penetration analysis system and method.
  33. Ahmed, Shahid; Gaddam, Venkat, Automatic device authentication and account identification without user input when application is started on mobile station.
  34. Hirofumi Sawa JP, Bidirectional communication system, client terminal, client management server, and broadcast server.
  35. Lloyd Brian ; McGregor Glenn, Centralized authentication, authorization and accounting server with support for multiple transport protocols and multiple client types.
  36. Micali Silvio, Certificate issue lists.
  37. Perlman Radia J. (Acton MA) Reed Edwards E. (Lindon UT) Carter Tammy G. (Pleasant Grove UT), Certificate revocation performance optimization.
  38. Micali Silvio, Certificate revocation system.
  39. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Certificate revocation system.
  40. Hsu Yung-Kao ; Seymour Stephen, Certification process.
  41. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  42. Hosoe Makoto,JPX, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  43. Hosoe, Makoto, Client-server system, server access authentication method, memory medium stores server-access authentication programs, and issuance device which issues the memory medium contents.
  44. Kunzelman Kevin ; Hutto Sterling, Common session token system and protocol.
  45. Frid Lars,SEX ; Pehrsson Arne,SEX ; Backstrom Martin,SEX ; Andersson Dick,SEX ; Axelsson Ulf,SEX ; Olsson Ulf,SEX, Communicating packet data with a mobile station roaming within an incompatible mobile network.
  46. Carlsson Goran,SEX ; Lambertsson Marie,SEX ; Schmid Glen,CAX, Communication control circuitry and method for a group of commonly-moving mobile transceiver units.
  47. Lebouill,Gilles, Communication methods and apparatus.
  48. Anderson Gary B. ; Gavette Sherman ; Lindsay Charles L. ; Jensen Ryan N., Communication system and method.
  49. Abadi Martin (Palo Alto CA) Goldstein Andrew C. (Hudson MA) Lampson Butler W. (Cambridge MA), Compound principals in access control lists.
  50. Bosen Robert J. (Pittsburg CA) Muir John R. (Antioch CA), Computer access control system and method.
  51. Dykes Pernell James ; Lindberg Erik Duane, Computer apparatus and method for providing security checking for software applications accessed via the World-Wide Web.
  52. Wirstrom Peter (Pepper Pike OH) Cork William H. (Lake Bluff IL), Computer communications security control system.
  53. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  54. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  55. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  56. Lapointe Brian K. (53 Jerdens La. Rockport MA 01966) Lapointe James A. (43 Ledgewood Dr. Danvers MA 01923), Computer security system.
  57. Schlesinger Artie (825 E. 9th St. Brooklyn NY 11230), Computer security system having remote location recognition and remote location lock-out.
  58. Chandos Ronald V. (Tempe AZ) Foster Robert I. (Mesa AZ), Computer system and method for secure remote communication sessions.
  59. Orita Yukio (Tokyo JPX), Computer system with file security function.
  60. Jecha Steven ; Mitchell Winfield A., Computerized prepress authoring for document creation.
  61. Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
  62. O'Toole ; Jr. James W. ; Gifford David K., Controlled transfer of information in computer networks.
  63. Leveridge,Philip C.; Strange,Michael I.; Parkinson,David W.; Roberts,David; Kenning,Michael J.; Tibbitt Eggleton,Robert I., Data communications.
  64. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  65. Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
  66. Hamalainen Jari,FIX ; Jokiaho Timo,FIX, Data transmission in a radio telephone network.
  67. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  68. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Detection of unauthorized use of software applications in communication units.
  69. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  70. Shin Kil-ho,JPX ; Kobayashi Kenichi,JPX ; Aratani Toru,JPX, Device and method for authenticating user's access rights to resources.
  71. Gifford David K., Digital active advertising.
  72. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  73. Schneier Bruce ; Kelsey John, Digital signature with auditing bits.
  74. Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
  75. John Knight ; Thomas Anthony Roden ; Darrell Myers Shively, II ; Pauline Chen ; Kavita Shekhar Patil ; Sonny Bui, Distributed database system with authoritative node.
  76. Knight, John; Roden, Thomas Anthony; Shively, II, Darrell Myers; Chen, Pauline; Patil, Kavita Shekhar; Bui, Sonny, Distributed database system with authoritative node.
  77. Hecht Matthew S. (Potomac MD) Johri Abhai (Gaithersburg MD) Wei Tsung T. (Gaithersburg MD) Steves Douglas H. (Austin TX), Distributed security auditing subsystem for an operating system.
  78. Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Domain communications server.
  79. Berbec Robert R. ; Brady John L. ; Caffrey James M. ; Crimi Joanne T. ; Fenaroli Arthur P. ; Iatridis Matthew C. ; Puchkoff Gary S. ; Sanchez Roberto J. ; Whalen Madeline R. ; Williams Joseph A., Dynamic server-managed access control for a distributed file system.
  80. Doggett John (Brookline MA) Jaffe Frank A. (Sharon MA) Anderson Milton M. (Fair Haven NJ), Electronic funds transfer instruments.
  81. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  82. Olsen James E., Electronic licensing system.
  83. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Electronic payment system and method.
  84. Jones Michael F. (Nashua NH) Zachai Arthur (Swampscott MA), Encrypted data storage card including smartcard integrated circuit for storing an access password and encryption keys.
  85. de Jong,Eduard K.; Levy,Moshe; Leung,Albert Y., Enhanced privacy protection in identification in a data communications network.
  86. Wyman Robert M. (Kirkland WA), Filters in license management system.
  87. Bruestle, Jeremy J.; Lillie, Terrance L., Fine grained access control for wireless networks.
  88. Lee Ho-Gyu (Seoul KRX), Fingerprint identification apparatus for enhancing identification performance by forming an illumination source and a li.
  89. Higuchi Yoshinori (Yokohama JPX) Hanari Jun (Kawasaki JPX), Fingerprint image input apparatus including a cylindrical lens.
  90. Yang Keun Y. (Seoul KRX), Fingerprint recognition device using a hologram.
  91. Knapp Alan G. (Crawley GB2), Fingerprint sensing device and recognition system having predetermined electrode activation.
  92. Botz Patrick Samuel ; Moskalik Thomas Michael ; Snyder Devon Daniel ; Woodbury Carol Jean, Generic user authentication for network computers.
  93. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  94. Mahany Ronald L. ; West Guy J. ; Bunte Alan G. ; Danielson Arvin D. ; Morris Michael D. ; Meier Robert C., Hierarchical communication system providing intelligent data, program and processing migration.
  95. Perkins Charles E. (Ossining NY), Highly dynamic destination-sequenced destination vector routing for mobile computers.
  96. Barbanell Joseph (1945 Contra Costa Blvd. Pleasant Hill CA 94523), Holographic credit card with automatical authentication and verification.
  97. Hiramatsu Kenichi (Kawasaki JPX), IC card with individual authentication function.
  98. Martino Michael J. (Gardiner NY) Meissner Geoffrey L. (Poughkeepsie NY) Paulsen ; Jr. Robert C. (Highland NY), Identity verification system resistant to compromise by observation of its use.
  99. Uchida Satoshi (Kanagawa JPX) Takeda Masahiro (Kanagawa JPX), Individual identification apparatus.
  100. Kobayashi Bujirou (Itami JPX) Gamo Hiroshi (Itami JPX) Kimura Masatoshi (Itami JPX), Individual identification recognition system.
  101. Grundy Gregory (1/21 Hewitt Street Wilston 4051 Queensland AUX), Information distribution system.
  102. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  103. Willmore Michael R. (144 Meadow Dr. Leonardtown MD 20650), Infra-red imaging and pattern recognition system.
  104. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  105. Furukawa,Hisao; Miyaguchi,Shoji, Integrated information communication system using internet protocol.
  106. Weiss Kenneth P. (Newton MA), Integrated network security system.
  107. Renner G. Fred (Dublin OH) Johnson Randall E. (Dublin OH) Chu-Jenq Caroline (Columbus OH), Intelligent card reader having emulation features.
  108. Clark Paul C., Intelligent token protected system with network authentication.
  109. Wirstrom Peter (Pepper Pike OH) Cork William H. (Brecksville OH), Interactive security control system for computer communications and the like.
  110. Atkinson Randall (Annandale VA), Intermediate network authentication.
  111. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  112. Maher David P. (Windham NH), Key management scheme for use with electronic cards.
  113. Lewis Tony, Key replacement in a public key cryptosystem.
  114. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  115. Dobbins,Kurt A.; Poirier,Jason P.; Weiss,Wouter Johan; Boutin,Andre C.; Haddad,Justin William; Delahunty,Stephen G.; Cullerot,David L.; Sexton,Mark Thomas; Lederman,Adam Michael; Cheetham,Christopher Lawrence; Ruffen,David, Managing content resources.
  116. Walters Kenn D. (Vaterstetten DEX), Memory card.
  117. Schanze Martin Lee, Message control system for managing message response in a kerberos environment.
  118. Moh Sang-Man,KRX ; Shin Sang-Seok,KRX ; Yoon Suk-Han,KRX, Message-passing multiprocessor system.
  119. Toth Stefan,SEX ; Hall Goran,SEX, Method and apparatus for addressing a wireless communication station with a dynamically-assigned address.
  120. Schnizlein,John M.; Droms,Ralph, Method and apparatus for assigning network addresses based on connection authentication.
  121. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  122. Murphy Michael V. ; West Earle H., Method and apparatus for authenticating users on a network using a smart card.
  123. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  124. Heath Chester A. (Boca Raton FL) Langgood John K. (Boca Raton FL) Valli Ronald E. (Pittsburgh PA), Method and apparatus for automatic initialization of pluggable option cards.
  125. Fishbine Brian H. (Albuquerque NM) Fishbine Glenn M. (Eden Prairie MN) Klein Theodore D. (Mound MN) Germann Daniel E. (Bloomington MN) Ransom Mark (Golden Valley MN), Method and apparatus for capturing skin print images.
  126. Donald Fred Ault ; John Carr Dayka ; Eric Charles Finkelstein AU; Richard Henry Guski, Method and apparatus for controlling server access to a resource in a client/server system.
  127. DeMont Jason Paul, Method and apparatus for distributing information products.
  128. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  129. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  130. Owens Leslie D. (Westford MA) Jueneman Robert R. (Acton MA) Worrest Ralph (Hudson MA) Davis Alvah B. (Atlanta GA), Method and apparatus for entity authentication.
  131. Parrillo Larry A. (15312 Dearborn St. Sepulveda CA 91343), Method and apparatus for improved security using access codes.
  132. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  133. Molne Anders Lennart, Method and apparatus for over the air activation of a multiple mode/band radio telephone handset.
  134. Weiss Kenneth P. (Newton MA), Method and apparatus for personal identification.
  135. Weiss Kenneth P. (7 Park Ave. Newton MA 02150), Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics.
  136. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  137. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
  138. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard (278 Russet Rd. Stamford CT 06903) Kulinets Joseph M. (126 Hoyt St. ; Apt. 5J Stamford CT 06905), Method and apparatus for protecting multiple copies of computer software from unauthorized use.
  139. Logan Andrew J. (Gladwyne PA), Method and apparatus for protecting software.
  140. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  141. Billstrom Lars Axel,SEX, Method and apparatus for providing anonymous data transfer in a communication system.
  142. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  143. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  144. Salowey,Joseph, Method and apparatus for re-authenticating computing devices.
  145. Stoltz, Benjamin H.; Hanko, James G., Method and apparatus for remotely administered authentication and access control.
  146. Grimmer Francine Gail, Method and apparatus for retrieving X.509 certificates from an X.500 directory.
  147. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  148. Fortenberry Keith Neil ; Rodriquez Herman, Method and apparatus for storing an internet user's identity and access rights to world wide web resources.
  149. Belville Daniel R. ; Goble George R., Method and system for allowing remote procedure calls through a network firewall.
  150. Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
  151. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  152. Newcombe,Christopher Richard, Method and system for binding kerberos-style authenticators to single clients.
  153. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  154. Dempski, David R., Method and system for collecting data on the internet.
  155. Basilier, Henrik; Gustafson, Ulf, Method and system for combined transmission of access specific access independent and application specific information over public IP networks between visiting and home networks.
  156. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  157. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  158. Wang Diana S. (Trophy Club TX), Method and system for controlling public access to a plurality of data objects within a data processing system.
  159. Thomas Richard B. (1902 E. Hope St. Mesa AZ 85203), Method and system for controlling use of protected software.
  160. Grundy Gregory (1/21 Hewitt Street Wilston 4051 ; Queensland AUX), Method and system for decentralized manufacture of copy-controlled software.
  161. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  162. Asokan, Nadarajah; Valtteri, Niemi, Method and system for managing cryptographic keys.
  163. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  164. Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
  165. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Method and system for providing certificates holding authentication and authorization information for users/machines.
  166. Brian Kevin Daly ; David William James Holmes ; Michael Luna ; Michael P. Moore ; John Eric Myhre ; Adrian David Smith, Method and system for providing data communication with a mobile station.
  167. Sixtus Timothy, Method and system for secure online transaction processing.
  168. Anderson Gary B. ; Gavette Sherman ; Hetherington William D., Method and system for transferring information within a mobile communication system.
  169. Gary B. Anderson ; Sherman Gavette ; William D. Hetherington, Method and system for transferring information within a mobile communication system.
  170. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  171. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  172. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  173. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  174. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  175. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Method for detecting unauthorized modification of a communication or broadcast unit.
  176. Van Oorschot Paul C. (Ottawa CAX) Ford Warwick S. (Nepean CAX) Hillier Stephen W. (Ottawa CAX) Otway Josanne (Ottawa CAX), Method for efficient management of certificate revocation lists and update information.
  177. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  178. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  179. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  180. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  181. Colvin, David S., Method for securing software to decrease software piracy.
  182. Hill Charles E., Method for updating a remote computer.
  183. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  184. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  185. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  186. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  187. Chou Wayne W. ; Kulinets Joseph M. ; Elteto Laszlo, Method of metering and protecting computer software.
  188. Brown Mark (174 Elmsley Ct. Ridgewood NJ 07450), Method of protecting computer software.
  189. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard (278 Russet Rd. Stamford CT 06903) Kulinets Joseph M. (Stamford CT), Method of protecting computer software from unauthorized execution using multiple keys.
  190. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  191. Bosen Robert J. (Pittsburg CA) Tucker James J. (Berkeley CA), Methods and apparatus for controlling access to information processed a multi-user-accessible digital computer.
  192. Parker John Patrick,GBX, Methods and apparatus for locking communications devices.
  193. Callaghan Brent P. ; Eisler Michael R., Methods and apparatus for providing dynamic network file system client authentication.
  194. Kent K. Leung ; Gopal K. Dommety, Methods and apparatus for providing mobility of a node that does not support mobility.
  195. Igaki Seigo (Hiraojutaku 59-103 ; 474 ; Hirao Inagi-shi ; Tokyo 206 JPX) Shinzaki Takashi (Fujitsu Atsugiryo 305 ; 2-3-10 ; Sakae-cho Atsugi-shi ; Kanagawa 243 JPX) Yamagishi Fumio (5-541 ; 40-1 ; Oy, Minutia data extraction in fingerprint identification.
  196. Malinen, Jari T.; Kniveton, Timothy J.; Haverinen, Henry, Modular authentication and authorization scheme for internet protocol.
  197. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  198. Dethloff Juergen (Hamburg DEX) Hinneberg Christian (Hamburg DEX), Multi-user card system.
  199. Lin David Dah-Haur ; Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, Multiple remote data access security mechanism for multitiered internet computer networks.
  200. Willens Steven M., Network access control system and process.
  201. Xu Yingchun ; Cardwell Bennett S., Network access methods, including direct wireless to internet access.
  202. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  203. Payne Andrew C. ; Stewart Lawrence C. ; Mackie David J., Network sales system.
  204. Andrews, Anthony D.; Thatte, Satish R.; Hill, Richard D.; Norlander, Rebecca A.; Armanasu, Alexander A., Object security boundaries.
  205. Horie Ryuji (Yokohama JPX), Person identification apparatus.
  206. Mosley Ernest D. (572 Dunleith Greenville MS 38701), Personal identification system.
  207. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  208. Caputo Anthony A. (Coatesville PA) Amoruso Victor P. (Cumberland MD), Pocket encrypting and authenticating communications device.
  209. Caputo Anthony A. ; Amoruso Victor P., Pocket encrypting and authenticating communications device.
  210. Caputo Anthony A. ; Amoruso Victor P., Pocket encrypting and authenticating communications device.
  211. Fishbine Glenn M. (Eden Prairie MN) Withoff Robert J. (Minnetonka MN), Portable fingerprint scanning apparatus for identification verification.
  212. Bush George (1675 York Ave. ; Ste. 34B New York NY 10128) Ross Estelle (41 Buxton St. Lido Beach NY 11561) Belfield Robert (104 Benson Ave. Sayville NY 11782), Portable pin card.
  213. Pailen William (Derwood MD) Harper Jim L. (Olney MD), Protected software access control apparatus and method.
  214. Stewart,Brett B.; Thompson,James W.; McClelland,Kathleen E., Providing different network access levels in a network communication system.
  215. Fortinsky Michael S.,ILX, Provision of secure access to external resources from a distributed computing environment.
  216. Richard J. Dynarski ; Matthew Harper ; Yingchun Xu ; Andrew Bezaitis, Radius-based mobile internet protocol (IP) address-to-mobile identification number mapping for wireless communication.
  217. Mizikovsky Semyon B., Re-authentication procedure for over-the-air activation.
  218. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  219. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  220. Burger Wilhelm F. (Bethesda MD) Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD) Stokes Ellen J. (Liberty Hill TX), Remote trusted path mechanism for telnet.
  221. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  222. Uchiyama Yasuyuki,JPX ; Nakamura Hiroshi,JPX, Roaming mobile communication system and method.
  223. Overby, Jr., Linwood Hugh; Jakubik, Patricia, SYSTEM AND METHOD FOR AUTHORIZING A NETWORK USER AS ENTITLED TO ACCESS A COMPUTING NODE WHEREIN AUTHENTICATED CERTIFICATE RECEIVED FROM THE USER IS MAPPED INTO THE USER IDENTIFICATION AND THE USER IS.
  224. Nordman Mikael,SEX, Secure access method, and associated apparatus, for accessing a private IP network.
  225. de Bruijn Ronny P. (St. Jansteen NLX) Verboven Marc L. K. (Nazareth BEX) van Weele Leonardus A. (Terneuzen NLX) Vermeire Roger R. (Terneuzen MI NLX) Schulze Oscar E. (Midland MI) Schultz Dale H. (Mid, Secure communication system for re-establishing time limited communication between first and second computers before com.
  226. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  227. Shurts Scott A. (Walnut Creek CA), Secure multi-level system for executing stored procedures.
  228. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  229. Foster,Ward Scott; Madril, Jr.,Robert John; Simpson,Shell Sterling, Secure resource access.
  230. Elgamal Taher (Palo Alto CA) Hickman Kipp E. B. (Los Altos CA), Secure socket layer application program apparatus and method.
  231. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  232. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  233. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  234. He Jingsha ; Hall Randle D., Security system and method for network element access.
  235. Ikudome Koichiro, Security system for internet provider transaction.
  236. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Server entity that provides secure access to its resources through token validation.
  237. Reeds ; III James A. (New Providence NJ) Treventi Philip A. (Murray Hill NJ), Service provision authentication protocol.
  238. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  239. Greer Dennis Keith ; Wilhoit ; III Frank Eldon, Smart card for offline automated meal plans.
  240. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  241. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  242. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  243. Hill Charles E., Software piracy detection system.
  244. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  245. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  246. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Subscription access system for use with an untrusted network.
  247. Chau Wing Cheong ; Leu Darren ; Liu Tze-jian ; Nilakantan Chandy ; Pao Jeffrey Kaiping ; Sun Tsyr-Shya Joe ; Tai Wayming Daniel ; Wang Xiaohu, Supporting authentication across multiple network access servers.
  248. Mital Amit, System and apparatus for monitoring secure information in a computer network.
  249. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  250. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  251. Hudson Jerome D. ; Champagne Jean-Paul,FRX ; Galindo Mary A. ; Hickerson Cynthia M. K. ; Hickman Donna R. ; Lockhart Robert P. ; Saddler Nancy B. ; Stange Patricia A., System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential.
  252. Mashayekhi Cameron, System and method for automically authenticating a user in a distributed network system.
  253. Bernardo Richard S. ; Macphee David A. ; Smith Jennifer J., System and method for building a web site with automated help.
  254. Erickson John S., System and method for managing copyrighted electronic media.
  255. Rose John R., System and method for managing try-and-buy usage of application programs.
  256. Cheng Pau-Chen (Yorktown Heights NY) Luan Shyh-Wei (San Jose CA), System and method for policy-based inter-realm authentication within a distributed processing system.
  257. McManis Charles E., System and method for protecting use of dynamically linked executable modules.
  258. McManis Charles E., System and method for protecting use of dynamically linked executable modules.
  259. McManis, Charles E., System and method for protecting use of dynamically linked executable modules.
  260. MacPherson,Matthew S.; Tan,Godfrey; Sealey,Robert R., System and method for providing access to a network in a communications environment.
  261. Coleman David Allen, System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single.
  262. Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
  263. Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
  264. Cox James O. (Austin TX) Mott James M. (Austin TX), System and method for secure initial program load for diskless workstations.
  265. Yee Bennet ; Benaloh Josh, System and method for self-identifying a portable information device to a computing unit.
  266. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  267. Samar Vipin, System and method to transparently integrate private key operations from a smart card with host-based encryption service.
  268. Akiyama Ryota,JPX ; Munakata Akio,JPX ; Koga Yuzuru,JPX ; Ishizaki Masayuki,JPX, System for and method of authenticating a client.
  269. Dedrick Rick, System for automatically updating personal profile server with updates to additional user information gathered from mon.
  270. McCarty Johnnie C. (2304 Wright Cir. Round Rock TX 78664), System for computer software protection.
  271. Allegre Fran.cedilla.ois,FRX ; Campana Mireille,FRX ; Roy Jean-Michel,FRX, System for control of access to computer machines which are connected in a private network.
  272. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  273. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  274. Walsh Joe (Lynnwood WA), System for detecting unauthorized account access.
  275. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  276. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  277. Brown Gary S., System for remote pass-phrase authentication.
  278. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  279. Nguyen Trong ; Haller Daniel R. ; Kramer Glenn A., System, method and article of manufacture for a gateway payment architecture utilizing a multichannel, extensible, flexible architecture.
  280. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  281. Ruixi Yuan, Systems and methods for internetworking data networks having mobility management functions.
  282. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  283. Short, Joel E.; Delley, Frederic; Logan, Mark F.; Pagan, Florence C. I., Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability.
  284. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  285. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  286. Ankney Richard C. (Chantilly VA) Bonica Ronald P. (Falls Church VA) Kay Douglas E. (Chevy Chase MD) Pashayan Patricia A. (Herndon VA) Spitzer Roy L. (Vienna VA), Telecommunication access management system for a packet switching network.
  287. Goodman David J. (Aberdeen Township ; Monmouth County NJ), Telecommunications switching system.
  288. Colonel Kenneth, Thermal ink printer with ink ribbon supply.
  289. Chen James F. ; Wang Jieh-Shan, Token distribution, registration, and dynamic configuration of user entitlement for an application level security system.
  290. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  291. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  292. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  293. Goldfine Milton (201 Ootsima Way Loudon TN 37774) Perlman Marvin (11000 Dempsey Ave. Granada Hills CA 91344) Montgomery Robert A. (306 Chuniloti Cir. Loudon TN 37774-2607), Transaction authentication using a centrally generated transaction identifier.
  294. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  295. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  296. Newton Farrell ; Williams Gareth, User identification and authentication system using ultra long identification keys and ultra large databases of identif.
  297. Jan Vilhuber, Validating connections to a network system.
  298. Brinkmeyer Horst,DEX ; Daiss Michael,DEX ; Schwegler Gunter,DEX ; Kruger Bertolt,DEX, Vehicle security device with electronic use authorization coding.
  299. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.
  300. Lafreniere Roger F. (Tewksbury MA), Video image system for personal identification.
  301. Vaeth J. Stuart ; Walton Charles S., Virtual certificate authority.
  302. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.
  303. Bilgic Murat I. ; Menon Narayan P., Wireless local loop system and method.
  304. Micall Silvio, Witness-based certificate revocation system.
  305. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트