$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Data carrier having an optical authenticity feature and methods for producing and testing said data carrier 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • B42D-015/00
출원번호 US-0918921 (1986-10-15)
우선권정보 DE-3536739 (1985-10-15)
발명자 / 주소
  • Becker Wolfgang (Neubiberg DEX) Hierweger Alexander (Rottach-Egern DEX) Merkle Hansjrgen (Munich DEX) Lob Erwin (Munich DEX) Lass Joseph (Munich DEX) Kaule Wittich (Emmering DEX)
출원인 / 주소
  • GAO Gesellschaft fur Automation und Organisation mbH (Munich DEX 03)
인용정보 피인용 횟수 : 202  인용 특허 : 0

초록

The present invention relates to a data carrier (identification card, bank card, credit card, etc.) in which information is provided in an inner volume area by means of a laser beam, the information being visible in the form of changes in the optical properties of the carrier material due to an irre

대표청구항

A data carrier in which information is provided by means of a laser beam in an inside volume area, said information being visible in the form of changes in the optical properties due to an irreversible change of material caused by the laser beam, characterized in that the data carrier contains at le

이 특허를 인용한 특허 (202)

  1. Setteducati, Mark, Amusement device completing composite image by reflection.
  2. Garber, Sharon R.; Gonzalez, Bernard A.; Grunes, Mitchell B.; Jackson, Richard H.; Karel, Gerald L.; Kruse, John M.; Lindahl, Richard W.; Nash, James E.; Piotrowski, Chester; Yorkovich, John D., Applications for radio frequency identification systems.
  3. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  4. Rhoads Geoffrey B., Audio steganography.
  5. Rhoads, Geoffrey B., Audio steganography.
  6. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  7. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  8. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  9. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  10. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  11. Levy, Kenneth L.; LaBrec, Brian; Jones, Robert, Color laser engraving and digital watermarking.
  12. Bergmann Matthias,DEX ; Henkenschuh Horst,DEX ; Krusche Reinhard,DEX ; Riedl Joseph,DEX, Compound film for an identity card with a humanly visible authenticity feature.
  13. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  14. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  15. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  16. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  17. Bi, Daoshen; Jones, Robert, Contact smart cards having a document core, contactless smart cards including multi-layered structure, PET-based identification document, and methods of making same.
  18. Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Counterfeit proof ID card having a scrambled facial image.
  19. Wah Lo, Allen Kwok, Counterfeit proof label having optically concealed security safety features and clues for consumer's self identification.
  20. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  21. Hoppe, Joachim; Haghiri-Tehrani, Yahya; Hohmann, Arno; Strassmaier, Josef; Gauch, Wolfgang; Bergmann, Matthias; Dax, Gustav, Data carrier.
  22. Depta, Georg; Franz, Peter, Data carrier and method for the production thereof.
  23. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  24. Lesur, Jean-Luc, Data medium, identity document and corresponding security-protection method.
  25. Bergmann, Matthias; Endres, Günter; Kruse, Georg, Data support with identifications written thereon by means of a laser beam and method for production thereof.
  26. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  27. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  28. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  29. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  30. Powell, Robert D.; Nitzberg, Mark, Determining whether two or more creative works correspond.
  31. Rhoads, Geoffrey B., Digital watermark decoding method.
  32. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  33. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  34. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  35. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  36. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  37. Mitterhofer, Erik; Prancz, Markus; Reissig, Maximilian, Embossing plate with a three-dimensional structure for the production of documents by a hot-cold laminating press.
  38. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  39. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  40. Rhoads, Geoffrey B., Encoding and decoding media signals.
  41. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  42. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  43. Powell, Robert D.; Nitzberg, Mark, Hiding codes in input data.
  44. Powell,Robert D.; Nitzberg,Mark, Hiding codes in input data.
  45. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  46. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  47. Severinsky Alex J., Hybrid vehicle.
  48. Severinsky, Alex J.; Louckes, Theodore, Hybrid vehicle configuration.
  49. Severinsky, Alex J.; Louckes, Theodore, Hybrid vehicles.
  50. Severinsky,Alex J.; Louckes,Theodore, Hybrid vehicles.
  51. Severinsky,Alex J.; Louckes,Theodore, Hybrid vehicles.
  52. Severinsky,Alex J.; Louckes,Theodore, Hybrid vehicles.
  53. Severinsky,Alex J.; Louckes,Theodore, Hybrid vehicles.
  54. Alex J. Severinsky ; Theodore Louckes, Hybrid vehicles incorporating turbochargers.
  55. Bi, Daoshen; Jones, Robert; Yeh, Tung-Feng; Haigh, Scott D., ID document structure with pattern coating providing variable security features.
  56. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  57. Waller Robert A., Identification document and personalization and assembly process.
  58. Waller Robert A., Identification document with enhanced level of security.
  59. Jones, Robert L., Identification document with three dimensional image of bearer.
  60. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  61. Schmuck,Arno; Geiger,Markus; Vermeulen,Leo, Identity card.
  62. Solmsdorf Bernhard,DEX, Identity card protected from unauthorized reproduction with a copying machine.
  63. Powell, Robert D.; Nitzberg, Mark J., Image capture and marking.
  64. Powell, Robert D.; Nitzberg, Mark J., Image marking with pixel modification.
  65. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Image presentation and micro-optic security system.
  66. Steenblik,Richard A.; Hurt,Mark J.; Jordan,Gregory R., Image presentation and micro-optic security system.
  67. Schneck, Nelson T.; Duggan, Charles F.; Jones, Robert L.; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  68. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  69. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  70. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  71. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  72. Stark, Michael; Rutigliano, Michael; Kirtikar, Amol; Davison, Peter A., Injection mold gate concealment by integrating surface recess and cosmetic label attachment.
  73. Jones,Robert; Bloomberg,Bentley, Ink with cohesive failure and identification document including same.
  74. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  75. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  76. Rhoads,Geoffrey B., Internet linking from image content.
  77. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  78. Theodossiou,George; Jones,Robert, Laser etched security features for identification documents and methods of making same.
  79. Cape, Samuel M.; Gosnell, Jonathan D.; Helminen, Kaj Markkus; Jordan, Gregory R.; Palm, Scott K.; Prett, Giles D.; Schneider, Timothy W.; Zucchero, Anthony J., Laser marked device.
  80. Cape, Samuel M.; Gosnell, Jonathan D.; Helminen, Kaj Markkus; Jordan, Gregory R.; Palm, Scott K.; Prett, Giles D.; Schneider, Timothy W.; Zucchero, Anthony J., Laser marked device.
  81. Ugajin, Tomohisa; Umezawa, Ryoichi, Laser marker.
  82. Chen-Ho, Kui; Haas, Christopher K.; Dunn, Douglas S.; Kong, Steven Hin-Chung; Olson, David B.; Larson, Randy A.; Potts, Travis L., Laser-personalizable security articles.
  83. Schilling,Andreas; Tompkin,Wayne Robert, Layer arrangement provided with a structure producing a diffractive optical effect and a lens-type effect.
  84. Goggins, Timothy P., Lenticular bar code image.
  85. Bielesch, Ulrich, Light control film formed with a security feature.
  86. Hawes, Jonathan L., Linking documents through digital watermarking.
  87. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  88. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  89. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  90. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  91. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  92. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  93. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  94. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  95. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  96. Hayashi, Kenichi, Method for making marks in a transparent material by using a laser.
  97. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  98. Lazzari, Jean-Pierre; Lazzari, Jean-Marc, Method for producing a colour laser image that can be observed in three dimensions and document on which a colour laser image that can be observed in three dimensions is produced.
  99. Yrjonen, Tapio, Method for producing a data carrier and data carrier produced therefrom.
  100. Prett, Giles D.; Jain, Manish; Brigham, Kraig M., Method for the surface application of a security device to a substrate.
  101. Masse Christophe (La Tronche FRX) Philippe Michel (Villaines sous Malicorne FRX), Method of preparing pre-distorted images for decorating a shaped blank.
  102. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  103. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  104. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  105. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  106. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  107. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  108. Rhoads, Geoffrey B., Methods for encoding security documents.
  109. Gates, Brian J.; Krasa, Robert T.; Potts, Travis L.; Wetzels, Serge, Methods for forming sheeting with a composite image that floats and a master tooling.
  110. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  111. Rhoads, Geoffrey B., Methods for marking images.
  112. Rhoads,Geoffrey B., Methods for marking images.
  113. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  114. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  115. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  116. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  117. Endle, James P.; Krasa, Robert T.; Dower, William V.; Dolezal, Michael W., Methods of forming sheeting with a composite image that floats and sheeting with a composite image that floats.
  118. Endle, James P.; Lorimor, Lynn E., Methods of forming sheeting with composite images that float and sheeting with composite images that float.
  119. Endle, James P.; Lorimor, Lynn E., Methods of forming sheeting with composite images that float and sheeting with composite images that float.
  120. Endle, James P.; Lorimor, Lynn E., Methods of forming sheeting with composite images that float and sheeting with composite images that float.
  121. Endle, James P.; Lorimor, Lynn E.; Kramlich, David C., Methods of forming sheeting with composite images that float and sheeting with composite images that float.
  122. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  123. Crane, Timothy T.; Mörck-Hamilton, Karin; Maraschi, Marco; Niedeck, Tod L., Micro-optic film structure that alone or together with a security document or label projects images spatially coordinated with static images and/or other projected images.
  124. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Micro-optic security and image presentation system.
  125. Steenblik,Richard A.; Hurt,Mark J.; Jordan,Gregory R., Micro-optic security and image presentation system.
  126. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Micro-optic security and image presentation system for a security device.
  127. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Micro-optic security and image presentation system presenting a synthetically magnified image that appears to lie above a given plane.
  128. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Micro-optic security and image presentation system presenting a synthetically magnified image that appears to lie above a given plane.
  129. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Micro-optic security and image presentation system presenting a synthetically magnified image that appears to lie below a given plane.
  130. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R., Micro-optic security and image presentation system presenting a synthetically magnified image that appears to transform into another image.
  131. Schilling, Andreas; Tompkin, Wayne Robert, Multi-layer body with micro-lens arrangement.
  132. Schilling, Andreas; Tompkin, Wayne Robert, Multilayer body and method for producing a multilayer body.
  133. Lass Joseph (Munich DEX) Merkle Hansjurgen (Munich DEX) Hierweger Alexander (Rottach-Egern DEX) Lob Erwin (Munich DEX), Multilayer identity card usable as a printing block and a method of producing it.
  134. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  135. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  136. Labrec, Brian; Anderson, Joseph; Jones, Robert; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  137. Brian Klure, Multiple-component data package.
  138. Klure Brian, Multiple-component data package.
  139. Klure, Brian, Multiple-component data package.
  140. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  141. Rhoads,Geoffrey B., Network linking using index modulated on data.
  142. Cape, Samuel M.; van Gumster, Jason, Optical security device.
  143. Steenblik, Richard A.; Hurt, Mark J.; Cape, Samuel M.; Jordan, Gregory R., Optical system demonstrating improved resistance to optically degrading external effects.
  144. Vosoogh-Grayli, Sasan; Vosoogh-Grayli, Siamack, Optically variable data storage device.
  145. Vosoogh-Grayli, Sasan; Vosoogh-Grayli, Siamack, Optically variable data storage device.
  146. Dunn, Paul; Renton, Robert Edward; Tomkins, Donald William, Optically variable devices, security device and article employing same, and associated method of creating same.
  147. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  148. Gregarek, Andre; Rahm, Michael; Schinabeck, Josef; Hoffmuller, Winfried, Optically variable security element.
  149. Fuhse, Christian; Heim, Manfred; Rahm, Michael; Endres, Günter, Optically variable security element with tilt image.
  150. Klure Brian, Packaged data card assembly.
  151. Koretsune, Hideyuki; Nagaki, Masakane, Paper sheet recognition apparatus and paper sheet recognition method.
  152. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  153. Gosnell, Jonathan D.; Jordan, Gregory R.; Kennedy, Caroline B., Process for transferring microstructures to a final substrate.
  154. Powell,Robert D.; Nitzberg,Mark, Protecting images with image markings.
  155. Scarbrough,Joel Scott; Faul,Daniel C.; LaSorsa,Louis, Reflective article and method of manufacturing same.
  156. Foo, Siang Leong, Reflective encoder with lens on code strip.
  157. Kaizuka, Tomoyoshi, Resin sheet and booklet.
  158. Cote, Paul F., Secure lens layer.
  159. Holmes, Brian William; Commander, Lawrence George, Security device.
  160. Drinkwater Kenneth J.,GBX ; Hudson Philip M. G.,GBX, Security device for security documents such as bank notes and credit cards.
  161. Scheuer, Jürgen, Security document and method for producing a security document.
  162. Kaule, Wittich, Security element.
  163. Fuhse, Christian; Rahm, Michael; Gregarek, André, Security element having a lenticular image.
  164. Lawrence, Christopher Robert; O'Keefe, Eoin Seiorse, Security label.
  165. Mann Graeme R.,AUX, Security reader for automatic detection of tampering and alteration.
  166. Mann, Graeme R., Security reader for automatic detection of tampering and alteration.
  167. Mann, Graeme R., Security reader for automatic detection of tampering and alteration.
  168. Mann,Graeme R., Security reader for automatic detection of tampering and alteration.
  169. Bradley, Brett A., Self-orienting watermarks.
  170. Bradley,Brett A., Self-orienting watermarks.
  171. Dunn, Douglas S.; Smithson, Robert L. W.; Krasa, Robert T.; Dolezal, Michael W.; Florczak, Jeffrey M.; Maki, Stephen P.; Osgood, III, Richard M., Sheeting with composite image that floats.
  172. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  173. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  174. Cape, Samuel M.; Steenblik, Richard A.; Jordan, Gregory R., Single layer image projection film.
  175. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  176. Rhoads Geoffrey B., Steganographic methods and media for photography.
  177. Rhoads Geoffrey B., Steganographic system.
  178. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  179. Tamai, Natsuko, Stereoscopic sheet structure.
  180. Tamai, Natsuko, Stereoscopic sheet structure.
  181. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  182. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  183. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  184. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  185. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  186. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  187. Steenblik, Richard A.; Hurt, Mark J.; Jordan, Gregory R.; Cape, Samuel M., Tamper indicating optical security device.
  188. Bravenec, Daniel W.; Marsh, Gary C., Telephone card or the like using lenticular lens material.
  189. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  190. Bloomberg, Bentley; Jones, Robert L., Use of pearlescent and other pigments to create a security document.
  191. Bloomberg,Bentley; Jones,Robert L., Use of pearlescent and other pigments to create a security document.
  192. Brooks, Brian E.; Smithson, Robert L. W.; Casner, Glenn E., User interface including composite images that float.
  193. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  194. Rhoads Geoffrey B., Video steganography.
  195. Rhoads,Geoffrey B., Video steganography.
  196. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  197. Rhoads, Geoffrey B., Watermark embedder and reader.
  198. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  199. Geoffrey B. Rhoads, Watermark enabled video objects.
  200. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  201. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  202. Rhoads, Geoffrey B., Watermarking methods and media.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로