$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for determining the rights of object access for a server process by combining them with the rights of the client process 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/14
출원번호 US-0011293 (1993-01-29)
발명자 / 주소
  • East, Jeffrey A.
  • Walker, James J.
  • Jenness, Steven M.
  • Ozur, Mark C.
  • Kelly, Jr., James W.
출원인 / 주소
  • Digital Equipment Corporation
대리인 / 주소
    Flehr, Hohbach, Test, Albritton & Herbert
인용정보 피인용 횟수 : 338  인용 특허 : 20

초록

In a multitasking, multiuser computer system, a server process temporarily impersonates the characteristics of a client process when the client process preforms a remote procedure call on the server process. Each process has an identifier list with a plurality of identifiers that characterize the pr

대표청구항

1. A computer system, comprising: memory means for storing data and data structures; a multiplicity of objects comprising data structures stored in said memory means; a multiplicity of processes running concurrently on sid computer system; each of said multiplicity of processes including charac

이 특허에 인용된 특허 (20)

  1. Schreiber Benn L. (Issaquah WA) Bismuth Robert (Redmond WA) Cockcroft Claire R. (Redmond WA) Ozur Mark C. (Redmond WA) Doherty Dennis J. (Bellevue WA), Computer network providing transparent operation on a compute server and associated method.
  2. Hardy Norman (Portola Valley CA), Computer security system.
  3. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA), Conditional object creating system having different object pointers for accessing a set of data structure objects.
  4. Bratt Richard G. (Wayland MA) Clancy Gerald F. (Saratoga CA) Gavrin Edward S. (Lincoln MA) Gruner Ronald H. (Cary NC) Mundie Craig J. (Cary NC) Schleimer Stephen I. (Chapel Hill NC) Wallach Steven J., Data processing system having a memory using object-based information and a protection scheme for determining access rig.
  5. Bachman Brett L. (Boston MA) Bernstein David H. (Ashland MA) Bratt Richard G. (Wayland MA) Clancy Gerald F. (Saratoga CA) Gavrin Edward S. (Lincoln MA) Gruner Ronald H. (Cary NC) Jones Thomas M. (Cha, Digital data processing system having a uniquely organized memory system and means for storing and accessing information.
  6. Baxter ; III Ward (Carlisle MA) Coder William N. (Raleigh NC) Haeffele Steven M. (Cary NC), Digital data processing system having an I/O means using unique address providing and access priority control techniques.
  7. Bishop Thomas P. (Aurora IL) Davis Mark H. (Warrenville IL) Surratt Grover T. (West Chicago IL), Extended process for a multiprocessor system.
  8. Gladney Henry M. (Saratoga CA) Lorch Douglas J. (San Jose CA) Mattson Richard L. (San Jose CA), Impact calculation for version management in a distributed information service.
  9. Agrawal Rakesh (Chatham NJ) Ezzat Ahmed K. (New Providence NJ), Method of file access in a distributed processing computer network.
  10. Agrawal Rakesh (Chatham NJ) Ezzat Ahmed K. (New Providence NJ), Method of propagating resource information in a computer network.
  11. Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
  12. Mahon Michael J. (San Jose CA) Baum Allen (Palo Alto CA) Bryg William R. (Saratoga CA) Miller Terrence C. (Menlo Park CA), Privilege level checking instruction for implementing a secure hierarchical computer system.
  13. Ritchie Dennis M. (Summit NJ), Protection of data file contents.
  14. Boebert William E. (Hennepin MN) Kain Richard Y. (Hennepin MN), Secure data processing system architecture.
  15. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture.
  16. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture with format control.
  17. East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
  18. Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA), Temporary object handling system and method in an object based computer operating system.
  19. Bishop Thomas P. (Aurora IL) Fish Robert W. (West Chicago IL) Peterson James S. (Aurora IL) Tuvell ; Jr. Walter E. (No. Plainfield NJ), Virtual execution of programs on a multiprocessor system.
  20. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.

이 특허를 인용한 특허 (338)

  1. Khalid,Atm Shafiqul; Bond,Barry, Access redirector and entry reflector.
  2. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  3. Bender, Ernest S.; Guski, Richard H.; Mapes, Deborah F.; Wells, Bruce R., Accessing protected resources via multi-identity security environments.
  4. Potter,Timothy; Upton,Mitch; Golding,Christa; DeGrande,Rick, Adapter deployment without recycle.
  5. Anthias Taf (Ampfield GB2) Halliwell Harry (Winchester GB2) Minshull John Francis (Kings Sombourne GB2), Address space utilization in a distributed data processing system.
  6. Matsukura Ryuichi,JPX ; Sasaki Kazuo,JPX ; Watanabe Satoru,JPX ; Obata Akihiko,JPX ; Okahara Tohru,JPX, Apparatus and method for installing software and recording medium storing program for realizing the method.
  7. Nolan Sean P., Apparatus for presenting the content of an interactive on-line network.
  8. Sweeney Christopher Lee ; Stodghill Scott A. ; DeShazer Kurt A. ; Marimuthu Aravindan, Application and database security and integrity system and method.
  9. Gioberti, Stefano Pietro; Thompson, Gary Alan, Application controller.
  10. Upton,Mitch, Application view component for system integration.
  11. Botz, Patrick S.; Dayka, John C.; Dillenberger, Donna N.; Guski, Richard H.; Hahn, Timothy J.; LaBelle, Margaret K.; Nelson, Mark A., Authenticated identity propagation and translation within a multiple computing unit environment.
  12. Chang April S. ; Large Andrew R. ; Snyder Alan, Authentication and access control in a management console program for managing services in a computer network.
  13. Tribble E. Dean ; Miller Mark S. ; Hardy Norman ; Hibbert Christopher T. ; Hill Eric C., Capability security for transparent distributed object systems.
  14. Case, Sr., Paul, Case secure computer architecture.
  15. Case, Sr., Paul, Case secure computer architecture.
  16. Regnier Barbara Ann ; Youngers David Nicholas ; Dettinger Richard Dean ; Spors Daniel Arlan ; Thorson John David, Client/server computer system having personalizable and securable views of database data.
  17. Stewart,Rocky; Metsaportti,Timo; Takacsi Nagy,Pal, Collaboration system for exchanging of data between electronic participants via collaboration space by using a URL to identify a combination of both collaboration space and business protocol.
  18. Blevins, Mike, Collaborative business plug-in framework.
  19. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  20. Rouse, John D.; Delaney, Raymond P., Confidence-based authentication.
  21. Farrell Joel A. (Endicott NY) Record Stephen E. (Ridgefield CT) Wade Brian K. (Apalachin NY), Controlled scheduling of program threads in a multitasking operating system.
  22. Stewart,Rocky; Takacsi Nagy,Pal; Metsaportti,Timo; Dalal,Sanjay; Hoebanx,Pascal, Conversation management system for enterprise wide electronic collaboration.
  23. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  24. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  25. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  26. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  27. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  28. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  29. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Distributed directory service using junction nodes for providing network users with an integrated hierarchical directory services.
  30. Potter, Timothy A.; Upton, Mitch; Golding, Christa, Distributed request and response queues for service processor.
  31. Sethi, Vincent, Electronic vouchers and a system and method for issuing the same.
  32. Johnson Monte L. ; Gauthier Lori Olson ; Thomas Troy ; Dakins Mark, Event notification in a computer system.
  33. Zatloukal,Kevin, Extendable compiler framework.
  34. Polk, Ray, Extensible controls for a content data repository.
  35. Baker Brenda Sue, Filtering for public databases with naming ambiguities.
  36. Kurosawa Takahiro,JPX ; Sato Hiroaki,JPX, Group environment setting method and system thereof to provide an equivalent environment for plural participants.
  37. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  38. Potter, Tim; Upton, Mitch; Golding, Christa, High availability application view deployment.
  39. Bhaghavan, Rupa; Hu, Tawei; Nelson, Kenneth Carlin; Richardt, Randal James, Implementing access control for queries to a content management system.
  40. Dhir, Nitin; Kappagantu, Ravi, In-bound telemarketing system for processing customer offers.
  41. Benantar Messaoud ; Blakley ; III George Robert ; Nadalin Anthony Joseph, Information handling system, method, and article of manufacture including object system authorization and registration.
  42. Cheng Philip Yen-Tang ; Copeland George P. ; High ; Jr. Robert Howard ; Kumar Vinoj Narayan, Information handling system, method, and article of manufacture including persistent, distributed object name services i.
  43. Feller, Todd Stacy Leo, Initiating operating system commands based on browser cookies.
  44. Wallgren, Anders R.; Kothari, Pravin S.; Cleary, Elizabeth A.; Nelson, Philip C.; Battles, Brett E., Iterative constraint collection scheme for preparation of custom manufacturing contracts.
  45. Swift Michael M., Least privilege via restricted tokens.
  46. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  47. Bau, David, Marshaling and un-marshaling data types in XML and Java.
  48. Nozue Hiroshi (Tokyo JPX) Saito Mitsuo (Tokyo JPX) Maeda Kenichi (Tokyo JPX) Asano Shigehiro (Tokyo JPX) Okamoto Toshio (Tokyo JPX) Sungho Shin (Tokyo JPX) Segawa Hideo (Tokyo JPX), Memory management and protection system for virtual memory in computer system.
  49. Matheny John R. ; White Christopher ; Anderson David R. ; Schaeffer Arn J., Menu state system.
  50. Nord, Joseph H.; Hoy, David Randal, Method and a system for responding locally to requests for file metadata associated with files stored remotely.
  51. Browning, Luke Matthew; Rozendal, Kenneth Bernard; Warrier, Suresh Eswara, Method and apparatus for allowing restarted programs to use old process identification.
  52. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  53. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  54. Simmons, Timothy Ernest, Method and apparatus for associating tickets in a ticket hierarchy.
  55. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  56. Levy, Kenneth L., Method and apparatus for automatic ID management.
  57. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  58. Levy, Kenneth L., Method and apparatus for content management.
  59. Levy, Kenneth L., Method and apparatus for content management.
  60. Levy, Kenneth L., Method and apparatus for content management.
  61. Donald Fred Ault ; John Carr Dayka ; Eric Charles Finkelstein AU; Richard Henry Guski, Method and apparatus for controlling server access to a resource in a client/server system.
  62. Palevich Jack H. (Sunnyvale CA), Method and apparatus for dynamic update of an existing object in an object editor.
  63. Cox, Andrew; Sieber, Robert; Balding, Alison; Karunaratne, Anil; Chandumont, Jean-Christopher, Method and apparatus for evaluating a financial transaction.
  64. Hamilton Graham (Palo Alto CA) Kessler Peter B. (Palo Alto CA), Method and apparatus for generating and using short operation identifiers in object oriented systems.
  65. Palevich Jack H. (Sunnyvale CA) Taylor Thomas H. (San Jose CA), Method and apparatus for importing and exporting archive files for a graphical user interface.
  66. Cox, Andrew; Dellosso, Donna; Cisz, Mark; Bekker, Ela; Chandumont, Jean-Christopher; Dafni, Joseph, Method and apparatus for managing credit limits.
  67. Cox, Andrew; Chandumont, Jean-Christopher; Bainbridge, Dianne; Haas, Lauren, Method and apparatus for managing risk.
  68. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  69. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  70. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
  71. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  72. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  73. Hare, Dwight; Callsen, Christian J., Method and apparatus for providing client support without installation of server software.
  74. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  75. Basibes, Mounir Emil; Haugh, Julianne Frances, Method and apparatus for providing process-based access controls on computer resources.
  76. Basibes,Mounir Emil; Haugh,Julianne Frances, Method and apparatus for providing process-based access controls on computer resources.
  77. Higley DeeAnne Barker ; Thorne Bruce Warner ; Jarvis Brian Lee, Method and apparatus for proxy authentication.
  78. Kocherlakota, Sitarama S., Method and apparatus for proxy chaining.
  79. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  80. Matena Vladimir, Method and apparatus for reliable disk fencing in a multicomputer system.
  81. Matena Vladimir, Method and apparatus for reliable disk fencing in a multicomputer system.
  82. Matena,Vladimir, Method and apparatus for reliable disk fencing in a multicomputer system.
  83. Kougiouris Panagiotis ; Hamilton Graham, Method and apparatus for space efficient inter-process communications.
  84. Kougiiouris, Panagiotis; Hamilton, Graham, Method and apparatus for space-efficient inter-process communication.
  85. Kougiouris Panagiotis ; Hamilton Graham, Method and apparatus for space-efficient inter-process communication.
  86. Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
  87. Deinhart Klaus,DEX ; Gligor Virgil ; Lingenfelder Christoph,DEX ; Lorenz Sven,DEX, Method and system for advanced role-based access control in distributed and centralized computer systems.
  88. Cummings Christopher R., Method and system for allowing a single-user application executing in a multi-user environment to create objects having both user-global and system global visibility.
  89. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  90. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  91. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  92. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  93. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  94. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  95. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  96. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  97. Mikhail,Grinshetyn; Chang,Matthias E.; Wong,Hok Yee; Chao,Anthony; Graham,Mark, Method and system for data capture with hidden applets.
  98. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for delayed cookie transmission in a client-server architecture.
  99. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for determining receipt of a delayed cookie in a client-server architecture.
  100. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  101. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  102. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method and system for locating and accessing resources.
  103. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  104. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  105. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  106. Herrick Thomas R. ; Lenharth Scott A. ; Wadood Syed A., Method and system for managing access to objects.
  107. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  108. O'Leary, Denis; D'Agostino, Vincent; Re, S. Richard; Burney, Jessica; Hoffman, Adam, Method and system for processing internet payments.
  109. Blasiak, Richard John; Cosby, David Wayne; Gallo, Anthony Matteo; Smoak, Frank Andrew, Method and system for providing remote procedure calls in a multiprocessing system.
  110. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  111. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  112. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  113. Kilkkil?, Sami, Method and system in a telephone switching system.
  114. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  115. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  116. Narayanan,Lakshmi, Method for controlled and audited access to privileged accounts on computer systems.
  117. Mannik, Peeter Todd; Hyser, Stephen Andrew; Hutchinson, Kristopher Derek; Headrick, Garland Todd; Harris, III, James Edwin, Method for determining effectiveness of display of objects in advertising images.
  118. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., Method for downloading an icon corresponding to a hierarchical directory structure from a directory service.
  119. Bhaghavan,Rupa; Hu,Tawei; Nelson,Kenneth Carlin; Richardt,Randal James, Method for implementing access control for queries to a content management system.
  120. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  121. Freeman,Charles J.; Xue,Xingxiong, Method for mortgage and closed end loan portfolio management.
  122. Pugh,William A.; Eckels,Joshua Moll, Method for multi-language debugging.
  123. Stewart,Rocky; Metdsportii,Timo; Takacsi Nagy,Pal, Method for providing real-time conversations among business partners.
  124. Discavage, Michael Jerome; Iacobucci, Edward Ernest, Method for providing user global object name space in a multi-user operating system.
  125. Liebl Robert,DEX ; Pfaehler Wolfgang,DEX, Method for the coordination of parallel accesses of a plurality of processors to resource configurations.
  126. Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., Method of redirecting a client service session to a second application server without interrupting the session by forwa.
  127. Everhart,Glenn C., Method/system for preventing identity theft or misuse by restricting access.
  128. Hayton,Richard; Otway,Dave, Methods and apparatus for communicating changes between a user interface and an executing application using property paths.
  129. Hayton, Richard; Otway, David John, Methods and apparatus for communicating changes between a user-interface and an executing application, using property paths.
  130. Mitchell, David C.; Walters, Ben; Mitchell, Dale K., Methods and apparatus for efficiently transmitting interactive application data between a client and server using markup language.
  131. Hayton, Richard; Halls, David, Methods and apparatus for incorporating a partial page on a client.
  132. Hayton,Richard; Halls,David, Methods and apparatus for incorporating a partial page on a client.
  133. Aahlad Yeturu, Methods and apparatus for managing deactivation and shutdown of a server.
  134. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  135. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  136. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  137. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  138. Chinta, Madhav; Raj, Sam Arun, Methods and systems for launching applications into existing isolation environments.
  139. Chinta, Madhav; Raj, SamArun, Methods and systems for launching applications into existing isolation environments.
  140. Bowie Britton,Simon, Methods and systems for managing successful completion of a network of processes.
  141. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  142. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  143. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  144. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  145. Erickson, John S., Methods for playing protected content.
  146. Mann, II,William Frederick; Hirka,Jeffrey L., Methods for providing cardless payment.
  147. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  148. Piehler, Britton Worth; Zatloukal, Kevin; Garber, David Glen, Methods for type-independent source code editing.
  149. Garthwaite,Alexander T.; Flood,Christine H.; Dice,David, Multi-threaded garbage collector employing cascaded memory arrays of task identifiers to implement work stealing queues for task identification and processing.
  150. Poindexter,Luen Kimball; Seidman,Glenn R.; Timm,Stephen R.; Waddington,Bruce A., Multilevel queuing system for distributing tasks in an enterprise-wide work flow automation.
  151. Lange, Danny; Nelson, Barbara; Su, Jing; White, James E., Network system extensible by users.
  152. Thackston James D., Network-based system for the manufacture of parts with a virtual collaborative environment for design, developement, and fabricator selection.
  153. Thackston, James D., Network-based system for the manufacture of parts with a virtual collaborative environment for design, development and fabricator selection.
  154. Copeland, George Prentice; Hambrick, Geoffrey Martin; High, Jr., Robert Howard, Object oriented information handling system including an extensible instance manager.
  155. John R. Matheny ; Christopher White ; David R. Anderson ; Arn J. Schaeffer, Object-oriented event notification system with listener registration of both interests and methods.
  156. Watson Ralph T. ; Robson Jack R. ; Watanabe Ryoji ; Wishnie Jeff, Object-oriented global cursor tool.
  157. Watson Ralph T. ; Robson Jack R. ; Watanabe Ryoji ; Wishnie Jeff, Object-oriented global cursor tool.
  158. Orton, Debra Lyn; Bolton, Eugenie Lee; Chernikoff, Daniel F.; Goldsmith, David Brook; Moeller, Christopher P., Object-oriented interface for portability to diverse operating systems or hardware platforms.
  159. Endicott John C. ; Halter Steven L. ; Munroe Steven J. ; Voldal Erik Edward, Object-oriented method routing mechanism for automatically performing supervisory functions during method calls.
  160. Burnard David J. (San Jose CA) Taylor Thomas H. (San Jose CA), Object-oriented operating system.
  161. Debra Lyn Orton ; Eugenie Lee Bolton ; Daniel F. Chernikoff ; David Brook Goldsmith ; Christopher P. Moeller, Object-oriented operating system.
  162. Orton Debra Lyn ; Bolton Eugenie Lee ; Chernikoff Daniel F. ; Goldsmith David Brook ; Moeller Christopher P., Object-oriented operating system.
  163. Orton, Debra Lyn; Bolton, Eugenie Lee; Chernikoff, Daniel F.; Goldsmith, David Brook; Moeller, Christopher P., Object-oriented operating system.
  164. Orton,Debra Lyn; Bolton,Eugenie Lee; Chernikoff,Daniel F.; Goldsmith,David Brook; Moeller,Christopher P., Object-oriented operating system.
  165. Parrish Jeff W. (Los Altos CA) Maghoul Farzin (Hayward CA) Thyagarajan P. (Campbell CA), Object-oriented system for program version and history database management system for various program components.
  166. Lynch-Freshner Lawrence A. (Boulder Creek CA) Marsh Donald M. (Mountain View CA) Milne Steve H. (Palo Alto CA) Zias Jeff A. (Saratoga CA), Object-oriented system for servicing windows.
  167. David J. Burnard ; Thomas H. Taylor, Object-oriented system for the transparent translation among locales of locale-dependent application programs.
  168. Ireland, Leigh-Anne T.; Strand, Marilyn; Goldberg, Michele; Winzer, Etienne, On-line higher education financing system.
  169. Novak, Christopher S.; D'Angelo, Michael; Giancola, Tom, Online interactive and partner-enhanced credit card.
  170. Orton Debra L. ; Rollin Keith A. ; Gibbons Bill, Oriented view system having a common window manager for defining application window areas in a screen buffer and appli.
  171. Norton, Scott J.; Kim, Hyun J., Parallel traversal of a dynamic list.
  172. Stewart,Rocky; Takacsi Nagy,Pal; Hoebanx,Pascal; Dalal,Sanjay; Wiser,David, Pluggable hub system for enterprise wide electronic collaboration.
  173. Benson, Glenn Stuart; Calaceto, Joseph R.; Logar, Russell M., Portable security transaction protocol.
  174. Azagury, Alain; Factor, Michael; Moatti, Yosef; Rosberg, Zvi; Zangi, Eyal, Preserving thread identity during remote calls.
  175. Cooper, Thomas P.; Hill, Michael J.; Konrad, Dennis R.; Nowatzki, Thomas L., Protecting duplicate/lost updates against host failures.
  176. Boutcher David C., Remote procedure interface with support for multiple versions.
  177. David C. Boutcher, Remote procedure interface with support for multiple versions.
  178. de Rose, Cesar; Netto, Marco Aurelio Stelmar; Northfleet, Caio; Filho, Walfredo Cirne, Resource allocation method and system.
  179. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A., Secure access of objects generated from data representation language representations of the objects in a distributed computing environment.
  180. Meyers William J. ; Fraioli Marc J. ; Spencer Jon F., Secure computer system.
  181. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure file system server architecture and methods.
  182. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Secure file system server architecture and methods.
  183. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  184. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  185. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  186. Siefert David M., Security aspects of computer resource repositories.
  187. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  188. Magennis,Gerard; Buchendorfer,Thomas, Setuid-filter method for providing secure access to a credentials store for computer systems.
  189. Potter,Timothy; Upton,Mitch; Golding,Christa; DeGrande,Rick, Shared common connection factory.
  190. Wiser, David, Single servlets for B2B message routing.
  191. Garimella, Sandilya; Dalal, Sanjay, Single system user identity.
  192. James Michael Tindell ; Steven H. Milne, Software program for routing graphic image data between a source located in a first address space and a destination located in a second address space.
  193. Louie, Edmund H.; Campbell, Michael X., Syndication loan administration and processing system.
  194. Brown Michael Wayne ; Collins Michael Thomas ; Gu Weiming ; Kilpatrick Paul Jerome ; Lawrence Kelvin Roderick, System and method for adding highly optimized synchronization capability to objects at run-time.
  195. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA 4), System and method for adding new waitable object types to object oriented computer operating system.
  196. Benson, Glenn S., System and method for anti-phishing authentication.
  197. Benson, Glenn S., System and method for anti-phishing authentication.
  198. Benson, Glenn S., System and method for anti-phishing authentication.
  199. Benson, Glenn S., System and method for anti-phishing authentication.
  200. Benson, Greg; Franklin, Martin; Knauft, Christopher L., System and method for authenticating peer components.
  201. Gendler, Joseph, System and method for automatic financial project management.
  202. Lindholm Timothy G. ; Payne Jonathan, System and method for caching and allocating thread synchronization constructs.
  203. Harrison, Clifford A.; Weber, Emery J.; Bush, Phillip M., System and method for computer-aided technician dispatch and communication.
  204. Harrison,Clifford A.; Weber,Emery J.; Bush,Phillip M., System and method for computer-aided technician dispatch and communication.
  205. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  206. Knauft,Christopher L., System and method for controlling and enforcing access rights to encrypted media.
  207. Noble William ; Knight Michael ; Nelson-Katt Karen, System and method for cooperative processing using object-oriented framework.
  208. Bunkerr, Ross; MacLean, Brendan; Piehler, Britton W., System and method for describing application extensions in XML.
  209. Headrick, Garland Todd; Hutchinson, Kristofer Derek; Harris, III, James Edwin; Hyser, Stephen Andrew; Mannik, Peeter Todd, System and method for displaying an interactive electronic representation of a corresponding static media object.
  210. White James E. ; Helgeson Christopher S. ; Steedman Douglas A., System and method for distributed computation based upon the movement, execution, and interaction of processes in a network.
  211. O'Neil, Edward K.; Olander, Daryl B., System and method for dynamic data binding in distributed applications.
  212. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  213. Upton, Mitch, System and method for enterprise application interactions.
  214. Upton,Mitch, System and method for enterprise application interactions.
  215. Warren, Mary Carter; Barrett, Donna M.; Schmitt, Donald H.; Ehemann, Karen R., System and method for establishing or modifying an account with user selectable terms.
  216. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  217. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  218. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  219. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  220. Allen, Brian J.; Buroker, Bruce A.; Flood, John P.; Gentz, Scott A.; Lidman, Gina M.; Teichman, William J., System and method for generating graphical user interface.
  221. Allen, Brian J.; Buroker, Bruce A.; Flood, John P.; Gentz, Scott A.; Lidman, Gina M.; Teichman, William J., System and method for generating graphical user interfaces.
  222. Rosko, Robert J., System and method for implementing a consolidated application process.
  223. Rosko, Robert J., System and method for implementing a consolidated application process.
  224. Rosko, Robert J., System and method for implementing a consolidated application process.
  225. Birnbaum William C., System and method for implementing a hierarchical policy for computer system administration.
  226. Upton, Mitch, System and method for implementing a schema object model in application integration.
  227. Upton, Mitch, System and method for implementing a service adapter.
  228. Upton, Mitch, System and method for implementing an event adapter.
  229. Brenner, Margaret S.; Proud, Scott C., System and method for management and delivery of content and rules.
  230. Brenner, Margaret S.; Proud, Scott C., System and method for management and delivery of content and rules.
  231. Erickson, John S., System and method for managing copyrighted electronic media.
  232. Reed, Christopher; Horsburgh, Mark, System and method for managing the allocating and freeing of objects in a multi-threaded system.
  233. Zatloukal,Kevin, System and method for multi-language extensible compiler framework.
  234. Scott, Kelly W., System and method for network-based project management.
  235. Scott,Kelly W., System and method for network-based project management.
  236. Headrick, Garland Todd; Hutchinson, Kristopher Derek; Mignone, Robert Bruno; Harris, III, James Edwin; Mannik, Peeter Todd; Hyser, Stephen Andrew, System and method for obtaining and displaying an interactive electronic representation of a conventional static media object.
  237. Taylor,James W.; Coro,Luz Maria, System and method for offering a financial product.
  238. Das, Jayanta, System and method for offering risk-based interest rates in a credit instrument.
  239. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  240. Gene D. Kavner, System and method for performing remote requests with an on-line service network.
  241. Kavner Gene D., System and method for performing remote requests with an on-line service network.
  242. Kevner Gene D., System and method for performing remote requests with an on-line service network.
  243. Skingle, Bruce James, System and method for portal infrastructure tracking.
  244. Skingle,Bruce James, System and method for portal infrastructure tracking.
  245. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  246. Upton, Mitch, System and method for providing a java interface to an application view component.
  247. Bales, Christopher E.; Olson, Nathan; Coates, Charles, System and method for providing active menus in a communities framework.
  248. Hora,Rajesh; Dommer,Lisa Marie, System and method for providing automated database assistance to financial service operators.
  249. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  250. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  251. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  252. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  253. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  254. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  255. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  256. Bowers,Theodore J.; Ilijasic,Dean; Sanders,Shelley F., System and method for providing discriminated content to network users.
  257. Bales, Christopher E.; Coates, Charles, System and method for providing drag and drop functionality in a communities framework.
  258. Polk, Ray; McMullen, Cindy; Bales, Christopher E.; Olson, Nathan, System and method for providing extensible controls in a communities framework.
  259. Gendler,Joseph, System and method for providing funding approval associated with a project based on a document collection.
  260. McMullen,Cindy; Polk,Ray; Wille,Jason, System and method for providing generic controls in a communities framework.
  261. Potter,Tim; Upton,Mitch; Golding,Christa, System and method for providing highly available processing of asynchronous service requests.
  262. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  263. White, Brigette A.; Levinson, Ronald; Sabharwal, Mohit, System and method for providing instant-decision, financial network-based payment cards.
  264. White, Brigette A.; Levinson, Ronald; Sabharwal, Mohit, System and method for providing instant-decision, financial network-based payment cards.
  265. White, Brigette A.; Levinson, Ronald; Sabharwal, Mohit, System and method for providing instant-decision, financial network-based payment cards.
  266. Bales, Christopher E.; Pepper, Stephen L.; Beartusk, Brodi; Frender, Kevin Blair; O'Neil, Edward K.; Olander, Daryl B.; Feit, Richard, System and method for providing notifications in a communities framework.
  267. McMullen, Cindy; Patadia, Jalpesh; Griffin, Philip B.; Beartusk, Brodi, System and method for providing security in a communities framework.
  268. McMullen, Cindy; Cleveland, Amy, System and method for providing testing for a communities framework.
  269. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  270. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  271. Lehman, Dean K.; McCullough, Joseph R.; Orth, Nancy A., System and method for sending money via E-mail over the internet.
  272. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  273. Skingle,Bruce James, System and method for single session sign-on with cryptography.
  274. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  275. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  276. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  277. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  278. Ellmore,Kimberly, System and method for single sign on process for websites with multiples applications and services.
  279. Wiser,David; Dalal,Sanjay; Hoebanx,Pascal, System and method for storing large messages.
  280. Olander, Daryl B.; Feit, Richard; O'Neil, Edward; Giridhar, Sathyanarayana; Howes, Jason; Dew, Douglas; Cook, Thomas A., System and method for structuring distributed applications.
  281. Colcord, Brian, System and method for testing applications.
  282. Upton,Mitch, System and method for using web services with an enterprise system.
  283. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  284. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  285. Everhart, Glenn C., System and method providing improved error detection related to transmission of data over a communication link.
  286. Upton, Mitch, System and method using a connector architecture for application integration.
  287. Upton,Mitch, System and method utilizing an interface component to query a document.
  288. Erickson,John S., System and methods for managing digital creative works.
  289. Garg,Praerit; Reichel,Robert P.; Ward,Richard B.; Dubhashi,Kedarnath A.; Hamblin,Jeffrey B.; Hopkins,Anne C., System and methods for providing dynamic authorization in a computer system.
  290. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
  291. Olds Dale R., System for dynamically replacing operating software which provides distributed directory service after verifying that v.
  292. Luen Kimball Poindexter ; Glenn R. Seidman ; Stephen R. Timm ; Bruce A. Waddington, System for enterprise-wide work flow automation.
  293. Poindexter, Luen Kimball; Seidman, Glenn R.; Timm, Stephen R.; Waddington, Bruce A., System for enterprise-wide work flow automation.
  294. Berdahl Eric M., System for processing user events with input device entity associated with event producer which further links communica.
  295. Eerola,Severi, System for processing wireless connections using connection handles.
  296. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  297. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  298. Mann, III,William Frederick; Hirka,Jeffrey L., System for providing cardless payment.
  299. San Andres,Ramon J.; Sanderman,David S.; Nolan,Sean P., System for providing users an integrated directory service containing content nodes located in different groups of application servers in computer network.
  300. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., System for providing users with a filtered view of interactive network directory obtains from remote properties cache that provided by an on-line service.
  301. Maria,Arturo, System for securing inbound and outbound data packet flow in a computer network.
  302. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  303. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  304. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  305. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  306. Copeland George Prentice ; Holdsworth Simon Antony James,GB2 ; Smith Stanley Alan, System, method, and article of manufacture for adding concurrency to a binary class in an object oriented system.
  307. Copeland George Prentice ; Holdsworth Simon Antony James,GB2 ; Smith Stanley Alan, System, method, and article of manufacture for adding transactional recovery to a binary class in an object oriented sys.
  308. Takacsi-Nagy, Pal; Blow, Michael Douglas; Blevins, Michael, Systems and methods extending an existing programming language with constructs.
  309. Marvin,Kyle, Systems and methods for a common runtime container framework.
  310. Marvin, Kyle W.; Bau, III, David; Chavez, Roderick A., Systems and methods for an extensible software proxy.
  311. Marvin, Kyle W.; Bau, III, David; Chavez, Roderick A., Systems and methods for an extensible software proxy.
  312. Potter, Timothy; Upton, Mitch; Golding, Christa; DeGrande, Rick, Systems and methods for application view transactions.
  313. Blevins,Mike, Systems and methods for business process plug-in development.
  314. Blevins, Michael; Shafer, John C., Systems and methods for client-side filtering of subscribed messages.
  315. Blevins,Michael; Shafer,John, Systems and methods for client-side filtering of subscribed messages.
  316. Blevins, Mike, Systems and methods for collaborative business plug-ins.
  317. Marvin, Kyle; Remy, David; Bau, David; Chavez, Roderick A.; Read, David, Systems and methods for creating network-based software services using source code annotations.
  318. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  319. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  320. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  321. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  322. Marvin, Kyle, Systems and methods for dynamic component versioning.
  323. Upton, Mitch, Systems and methods for integration adapter security.
  324. Wiser,David; Dalal,Sanjay, Systems and methods for maintaining transactional persistence.
  325. Wiser,David; Dalal,Sanjay, Systems and methods for maintaining transactional persistence.
  326. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  327. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  328. Potter,Timothy; Upton,Mitch; Golding,Christa; DeGrande,Rick, Systems and methods for modular component deployment.
  329. Eckels, Josh; Pugh, William, Systems and methods for multi-view debugging environment.
  330. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  331. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  332. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  333. Hong, Xiao; Song, Xiaolan; Dong, Xin; Fei, Huchen; Wang, Lihua, Systems and methods for performing scoring optimization.
  334. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  335. San Andres Ramon J. ; Choquier Philippe,FRX ; Greenberg Richard G. ; Peyroux Jean-Francois, Transaction replication system and method for supporting replicated transaction-based services.
  336. Levy,Kenneth L., User-friendly rights management systems and methods.
  337. Walters, Robert V.; Chauhan, Abhishek; Mirani, Rajiv; Kohli, Prince, Using application gateways to protect unauthorized transmission of confidential data via web applications.
  338. Stewart,Rocky; Takacsi Nagy,Pal; Metsaportti,Timo; Price,Adrian, Workflow integration system for enterprise wide electronic collaboration.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로