1
Brenda Sue Baker, Eric Grosse: System and method for restricting user access rights on the internet based on rating information stored in a relational database. AT&T, Michele Conover, October 14, 1997: US05678041 (508 worldwide citation)

A system and method for selectively controlling database access by providing a system and method that allows a network administrator or manager to restrict specific system users from accessing information from certain public or otherwise uncontrolled databases (i.e., the WWW and the Internet). The i ...


2
Brenda Sue Baker, Eric Grosse: System and method for database access control. Lucent Technologies, James A DiGiorgio, December 9, 1997: US05696898 (302 worldwide citation)

A system and method for selectively controlling database access by providing a system and method that allows a network administrator or manager to restrict specific system users from accessing information from certain public or otherwise uncontrolled databases (i.e., the WWW and the Internet). The i ...


3
Eric Grosse: Computer security using virus probing. Lucent Technologies, Donald P Dinella, March 20, 2001: US06205551 (74 worldwide citation)

A technique for determining whether particular clients within a computer network are universally configured in accordance with the desired network security features of the computer network. A probe is randomly inserted within incoming files, e.g., at a firewall in the computer network. The probe is ...


4
Eric Grosse, David Leo Presotto: Database dependency resolution method and system for identifying related data files. Lucent Technologies, March 31, 1998: US05734886 (56 worldwide citation)

A method and system for displaying names of data files in a collection of data files represented by a corresponding symbol. According to one embodiment of the present invention, a user may display a listing of subroutine library files required to execute a particular subroutine. In such an embodimen ...


5
Victor Vladimir Boyko, Eric Grosse, Philip Douglas MacKenzie, Sarvar Patel: Secure mutual network authentication and key exchange protocol. Lucent Technologies, Jeffrey M Weinick, Donald P Dinella, May 16, 2006: US07047408 (36 worldwide citation)

Secure communication protocols are disclosed in which two parties generate a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at le ...


6
Eric Grosse: Automatic rack storage system. TGW Logistics Group, Collard & Roe P C, September 19, 2017: US09764900

The invention relates to a rack storage system comprising a storage rack (1) with storage shelves (12a, 12b) having storage spaces (17) for articles in rack stages (16) lying one above the other with a rack aisle (15) extending in between. Several guide tracks with first and second guide rails run a ...


7
Eric Grosse: Arrangement and method for operating a storage and retrieval unit. TGW Mechanics, Collard & Roe P C, July 24, 2018: US10029895

A method and an arrangement for operating a storage and retrieval unit (3) are specified. A rail line (1) respectively a power supply rail (6) for the storage and retrieval unit (3) is set to a risk mode voltage, the rectified value/effective value of which lies below a minimum rectified value/minim ...


8
Brenda Sue Baker, Eric Grosse: System and method for database access administration. At &Amp T, GUO XIAOMEI, March 19, 1997: CN96107933

A system and method for selectively controlling database access by providing a system and method that allows a network administrator or manager to restrict specific system users from accessing information from certain public or otherwise uncontrolled databases. The invention employs a relational dat ...