$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted file 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0238418 (1994-04-25)
발명자 / 주소
  • Cooper Thomas E. (Louisville CO) Nagda Jagdish (Boulder CO) Pryor Robert F. (Longmont CO)
출원인 / 주소
  • International Business Machines Corporation (Armonk NY 02)
인용정보 피인용 횟수 : 341  인용 특허 : 2

초록

A method and apparatus is provided for transferring encrypted files from a source computer to one or more target computers. An export program is provided in the source computer and an import program is provided in the target computer. The export program decrypts the encrypted file and tags the expor

대표청구항

A system that transfers an encrypted file contained within a removable transfer memory medium between a source data processing system and a target data processing system, comprising: a source data processing system having a file encrypted with a source key, wherein said source key is at least partia

이 특허에 인용된 특허 (2)

  1. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  2. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.

이 특허를 인용한 특허 (341)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Yamagata,Junichi; Kunieda,Takayuki; Wakita,Yuki, Access usage data storing and transmitting program and storage medium.
  6. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  10. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  11. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  12. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  13. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  14. Oshima,Mitsuaki; Gotoh,Yoshiho; Tanaka,Shinichi; Koishi,Kenji; Moriya,Mitsurou; Takemura,Yoshinari, Apparatus for encrypting and recording received content information on a recording medium using both medium identification information and a cipher key for encryption.
  15. Kumar, Abhishek; Triplett, Mark, Associating a captured image with a media item.
  16. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  17. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  18. Dumais, Paul Mark Joseph, Automatic license key injection.
  19. Grawrock, David; Jones, Kevin, Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption.
  20. Ronning Joel A., Central database system for automatic software program sales.
  21. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  22. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  23. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Centralized identification and authentication system and method.
  24. Robinson, Richard L.; Serkowski, Robert J.; Walker, William T., Certificate distribution via license files.
  25. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  26. Harris, Steven M., Computer program for securely viewing a file.
  27. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  28. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  29. Stefik,Mark J., Content rendering device with usage rights.
  30. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  31. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  32. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  33. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  34. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  35. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  36. Park, Tae Joon, Copy prevention method and apparatus of a digital recording/reproducing system.
  37. Park, Tae Joon, Copy prevention method and apparatus of a digital recording/reproducing system.
  38. Kori, Teruhiko; Otsuka, Masaya, Copy protection apparatus and method.
  39. Bramhill,Ian Duncan; Sims,Matthew Robert Charles, Copy protection of data.
  40. Lohstroh Shawn R. ; McDonnal William D. ; Grawrock David, Cryptographic file labeling system for supporting secured access by multiple users.
  41. Ote Ichiro,JPX ; Iwabuchi Kazunori,JPX ; Washimi Hiroaki,JPX ; Furukawa Hiroshi,JPX ; Sumitomo Masahito,JPX ; Kobayashi Yuuichi,JPX, Data encryption control apparatus and method.
  42. Beukema,Bruce L.; Kuesel,Jamie R.; Shearer,Robert A., Data encryption interface for reducing encrypt latency impact on standard traffic.
  43. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  44. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  45. Koppen, Eckhart; Vataja, Timo; Kivimaki, Simo, Digital rights management (DRM) license manager.
  46. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  47. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  48. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  49. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  50. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  51. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  52. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  53. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  54. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  55. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Direct authentication system and method via trusted authenticators.
  56. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Direct authentication system and method via trusted authenticators.
  57. Asghari-Kamrani, Nader; Asghari-Kamrani, Kamran, Direct authentication system and method via trusted authenticators.
  58. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  59. Kageyama,Takahisa; Kawase,Yoshinori, Electronic apparatus, data recording method for the electronic apparatus, and storage medium storing program for executing the data recording method.
  60. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  61. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  62. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  63. Palaniappan, Murugappan, Electronic fulfillment system for distributing digital goods.
  64. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  65. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  66. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  67. Walker, William T.; Rhodes, James E.; Serkowski, Robert J.; Morgan, Lawrence J.; Gopalakrishna, Mohana Krishnan, Flexible license file feature controls.
  68. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  69. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  70. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  71. Walker,William T., Global positioning system hardware key for software licenses.
  72. Haghpassand, Joshua, Highly accurate security and filtering software.
  73. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  74. Chan, Hark, Information distribution and processing system.
  75. Chan, Hark C., Information distribution and processing system.
  76. Chan, Hark C., Information distribution and processing system.
  77. Chan, Hark C., Information distribution and processing system.
  78. Chan, Hark C., Information distribution and processing system.
  79. Chan, Hark C., Information distribution and processing system.
  80. Chan, Hark C., Information distribution and processing system.
  81. Chan, Hark C., Information distribution and processing system.
  82. Chan,Hark C., Information distribution and processing system.
  83. Chan,Hark C., Information distribution and processing system.
  84. Hark C. Chan, Information distribution and processing system.
  85. Doi, Toshitada; Osawa, Yoshitomo, Information processing apparatus, information processing method, data recording medium, and information processing system.
  86. Tominaga, Takehiro; Higuchi, Masaki; Shimizu, Keisuke, Information processor.
  87. Iino,Yoichiro, Information recording medium, information processing apparatus and method, program recording medium, and information processing system.
  88. Cooper, Thomas Edward; Pryor, Robert Franklin, Installing and controlling trial software.
  89. Cooper, Thomas Edward; Pryor, Robert Franklin, Installing and controlling trial software.
  90. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  91. Bader, James E.; Waters, II, Jack R.; Beaubien, Eric R., Key interface for secure object manipulation.
  92. Gilman,Robert R.; Robinson,Richard L., Key server for securing IP telephony registration, control, and maintenance.
  93. Utsumi,Kenichi; Hirano,Hideyuki; Kotani,Seigo, License devolution apparatus.
  94. Serkowski,Robert J.; Walker,William T., License file serial number tracking.
  95. Rhodes, James E.; Serkowski, Robert J.; Walker, William T.; Morgan, Lawrence John; Gopalakrishna, Mohana Krishnan, License modes in call processing.
  96. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  97. Beukema, Bruce L.; Drehmel, Robert A.; Hall, William E.; Kuesel, Jamie R.; Pivonia, Gilad; Shearer, Robert A., Low-latency data decryption interface.
  98. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  99. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  100. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  101. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  102. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  103. Kuper, Ron; Coburn, IV, Arthur L.; Meyer, John; Delaney, Mike, Media experience social interface.
  104. Corbin, Keith; Kumar, Abhishek; Kuper, Ron; Ramsperger, Gregory Paul; Sarkic, Andrej, Media item context from social media.
  105. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  106. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  107. Walker,William T., Method and apparatus for controlling data and software access.
  108. Park, Tae Joon, Method and apparatus for descrambling digital video data and digital audio data using control data.
  109. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  110. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  111. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  112. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  113. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  114. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  115. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  116. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  117. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  118. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  119. Chavez,David L., Method and apparatus for license distribution.
  120. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  121. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  122. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  123. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  124. Park, Tae Joon, Method and apparatus for scrambling and/or descrambling digital video data and digital audio data using control data.
  125. Torrubia Saez,Andres, Method and apparatus for secure distribution of software.
  126. Lee, Se-Wai; Ingalls, Paul E.; Scotzin, Shawn C., Method and apparatus for software delivery and management.
  127. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  128. Elliot,Brig Barnum, Method and apparatus for the generation and distribution of random bits.
  129. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  130. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  131. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  132. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  133. Ernst, Matthias; Specht, Jens, Method and device for transmitting decryption codes of freely transmitted, encrypted program contents to clearly identifiable receivers.
  134. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  135. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  136. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  137. Gauba, Ravi; Eubanks, Curtis Ray; Hofrichter, Klaus; Wang, Annie; Lau, Clement; Dara-Abrams, Joseph Alexander, Method and system for content sharing and authentication between multiple devices.
  138. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  139. Mithal, Ashish K; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  140. Krishnan Ganapathy ; Oyler Scott, Method and system for injecting new code into existing application code.
  141. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  142. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  143. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  144. Lao, Guillermo, Method and system for subscription digital rights management.
  145. Lao, Guillermo, Method and system for subscription digital rights management.
  146. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  147. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  148. Durbin, Winnie C.; Zhang, Kun; Singh, Karamjeet; Mehring, Dave; Lamoureux, Thomas Leroy; Zettel, Hubert A.; Butler, Timothy D, Method and system to remotely enable software-based options for a trial period.
  149. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  150. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Method for authorizing a substitute software license server.
  151. Nuttall,Fran챌ois Xavier, Method for computer network operation basis for usage fees.
  152. Nuttall, François Xavier, Method for computer network operation providing basis for usage fees.
  153. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  154. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  155. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  156. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  157. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  158. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  159. Vollmer, Vasco; Hofmann, Matthias, Method of controlling access.
  160. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  161. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  162. Torrubia-Saez, Andres, Methods and apparatus for secure distribution of software.
  163. Yan, Paul D; Vorachart, Thitikun, Methods and systems to modify a two dimensional facial image to increase dimensional depth and generate a facial image that appears three dimensional.
  164. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  165. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  166. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  167. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  168. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  169. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  170. Rachlin John N. ; Akkiraju Rama Kalyani Tirumala, Non-invasive networked-based customer support.
  171. Ronning Joel A., On-line try before you buy software distribution system.
  172. Barber,Timothy P., Online machine data collection and archiving process.
  173. Kori, Teruhiko; Otsuka, Masaya, Outputting apparatus, outputting method, recording apparatus, recording method, reproduction apparatus, reproduction method and recording medium.
  174. Kori,Teruhiko; Otsuka,Masaya, Outputting apparatus, outputting method, recording apparatus, recording method, reproduction apparatus, reproduction method and recording medium.
  175. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  176. Foss,Jonathan G., Point-of-sale provider evaluation.
  177. Steinberg, Kenneth D, Pre-emptive anti-virus protection of computing systems.
  178. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  179. Fernández Gutiérez, Alvaro, Process for the on-line sale of a software product.
  180. Fernández Gutiérrez, Alvaro, Process for the on-line sale of a software product.
  181. Okada, Takayuki, Processor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program.
  182. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  183. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  184. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium reproducer, cryptocommunication system and program license system.
  185. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium, recorder, reproducer, cryptocommunication system and program license system.
  186. Oshima,Mitsuaki; Gotoh,Yoshiho; Tanaka,Shinichi; Koishi,Kenji; Moriya,Mitsurou; Takemura,Yoshinari, Recording medium, recorder, reproducer, cryptocommunication system and program license system.
  187. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  188. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  189. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  190. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  191. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  192. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  193. Ohmori,Motoji; Futa,Yuichi; Tatebayashi,Makoto, Rental system.
  194. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  195. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  196. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  197. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  198. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  199. Matyas, Jr.,Stephen Michael; Peyravian,Mohammad; Roginsky,Allen Leonid; Zunic,Nevenko, Secure data storage and retrieval in a client-server environment.
  200. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Secure data storage and retrieval with key management and user authentication.
  201. Rao, Santhpur N.; Trapa, Valerie, Secure download manager.
  202. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  203. Gilman, Robert R.; Robinson, Richard L.; Serkowski, Robert J., Secure installation activation.
  204. Suzuki,Shigeo, Secure media on demand system whereby charge is determined in part from the periodicity of an encryption key.
  205. Myers, Rob; Rafey, Richter A.; Hofrichter, Klaus; Ludtke, Harold Aaron, Secure module and a method for providing a dedicated on-site media service.
  206. Elliott,Scott Thomas; Hoff,James Patrick; Long,Christopher Scott; Rivera,David; Ward,James Peter, Securing decrypted files in a shared environment.
  207. Ronning Joel A., Self-launching encrypted digital information distribution system.
  208. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  209. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  210. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  211. Sako, Yoichiro; Osawa, Yoshitomo; Kurihara, Akira; Kawashima, Isao; Yoneyama, Shigeyuki, Signal transmision method.
  212. Corbin, Keith; Kumar, Abhishek; Kuper, Ron; Ramsperger, Gregory Paul; Sarkic, Andrej, Social media connection recommendations based on playback information.
  213. Corbin, Keith; Kafadar, Paul; Kumar, Abhishek; Kuper, Ron; Ramsperger, Gregory Paul; Sarkic, Andrej, Social media queue.
  214. Clayton, Eric; Valente, Danny, Social playback queues.
  215. Clayton, Eric; Valente, Danny, Social playback queues.
  216. Steinberg Henry L. ; Gordon Scott B., Software fingerprinting and branding.
  217. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  218. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Software reproduction apparatus.
  219. Akiyama,Ryota; Yoshioka,Makoto, Software reproduction apparatus.
  220. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  221. Liu Larry Lingnan, Source data compression and decompression in code symbol printing and decoding.
  222. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  223. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  224. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  225. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  226. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  227. Chan, Hark C., System and method for accessing set of digital data at a remote site.
  228. Kohler, Johan; Nandakumar, Bharathwaj, System and method for creating and streaming augmented game sessions.
  229. Begega, Lee, System and method for delivering content in a unicast/multicast manner.
  230. Begeja, Lee, System and method for delivering content in a unicast/multicast manner.
  231. Begeja, Lee, System and method for delivering content in a unicast/multicast manner.
  232. Begeja,Lee, System and method for delivering content in a unicast/multicast manner.
  233. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  234. Wang,Xin, System and method for document distribution.
  235. Hofrichter, Klaus; Rafey, Richter A.; Gauba, Ravi; Wang, Annie; Lau, Clement, System and method for enabling distribution and brokering of content information.
  236. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  237. Lynch, Eric James; Kanouse, Darryl, System and method for generating personalized messaging campaigns for video game players.
  238. Curley, Jeffrey C.; Kerby, Paul; Lin, Calvin; Hampton, Edward Alexander; Haile, Paul R., System and method for identifying spawn locations in a video game.
  239. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  240. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  241. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  242. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  243. Wang, Xin, System and method for protection of digital works.
  244. Stirling, Spencer D., System and method for reading graphically-encoded identifiers from physical trading cards through image-based template matching.
  245. Marr, Michael D.; Kaplan, Keith S., System and method for replaying video game streams.
  246. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  247. Chrisop, Roy K.; Sojian, Lena; Ferlitsch, Andrew Rodney, System and method for securely accessing downloaded print job resources.
  248. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  249. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  250. Wang,Xin, System and method for transferring the right to decode messages.
  251. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  252. Condrey, Michael; Rubin, Mark, System and method for transparently styling non-player characters in a multiplayer video game.
  253. Linden, John P.; Watkins, III, James R.; Medeiros, Ryan H.; Marr, Michael D.; Pasteris, Paul G., System and method for uniquely identifying physical trading cards and incorporating trading card game items in a video game.
  254. De La Cruz, Allen Joseph, System and method of generating and providing interactive annotation items based on triggering events in a video game.
  255. Marr, Michael D.; Kaplan, Keith S., System and method of inferring user interest in different aspects of video game streams.
  256. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  257. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  258. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  259. Nuttall, Francois-Xavier; Collier, David Charles; Fenney, Robert J.; Capitant, Patrice J., System and methods providing secure delivery of licenses and content.
  260. Nuttall,Francois Xavier; Collier,David Charles; Fenney,Robert J.; Capitant,Patrice J., System and methods providing secure delivery of licenses and content.
  261. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  262. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  263. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  264. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  265. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  266. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  267. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  268. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  269. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  270. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  271. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  272. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  273. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  274. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  275. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  276. Riedel,Erik; Kallahalla,Mahesh; Swaminathan,Ram, System for encrypted file storage optimization via differentiated key lengths.
  277. Kupka,Michael S.; Hawkins,Michael L.; Thomas,Trent M., System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key.
  278. Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
  279. Ronning Joel A., System for preventing unauthorized copying of active software.
  280. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  281. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  282. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  283. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  284. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  285. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  286. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  287. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  288. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  289. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  290. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  291. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  292. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  293. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  294. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  295. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  296. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  297. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  298. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  299. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  300. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  301. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  302. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  303. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  304. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  305. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  306. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  307. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  308. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  309. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  310. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  311. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  312. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  313. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  314. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  315. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  316. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  317. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  318. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  319. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  320. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  321. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  322. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  323. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  324. Rosen Sholom S., Trusted agents for open electronic commerce where the transfer of electronic merchandise or electronic money is provisional until the transaction is finalized.
  325. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  326. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  327. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  328. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  329. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  330. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  331. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  332. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  333. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  334. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  335. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  336. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  337. Ronning Joel A., Try before you buy software distribution and marketing system.
  338. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  339. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  340. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  341. Lin, Ted M.; Bass, Eric M., Webpage media playback.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로