$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for database access control 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0469342 (1995-06-06)
발명자 / 주소
  • Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ)
출원인 / 주소
  • Lucent Technologies Inc. (Murray Hill NJ 02)
인용정보 피인용 횟수 : 337  인용 특허 : 0

초록

A system and method for selectively controlling database access by providing a system and method that allows a network administrator or manager to restrict specific system users from accessing information from certain public or otherwise uncontrolled databases (i.e., the WWW and the Internet). The i

대표청구항

A system for selectively controlling network access to one or more resources through a firewall server, the system comprising: a relational database containing a stored listing of user identification codes and resource identifiers, wherein each of said resource identifiers corresponds to one or more

이 특허를 인용한 특허 (337)

  1. Barrows Sue Ellen, Abstract manager system and method for managing an abstract database.
  2. Hannel, Clifford Lee; May, Anthony, Access control.
  3. Shannon Steven, Access control of networked data.
  4. Urakawa, Yasutaka; Fujita, Masanori, Access control system.
  5. Urakawa, Yasutaka; Fujita, Masanori, Access control system and access control method.
  6. Patel, Rakesh; Nicholl, Mara; Harju, Lindsey, Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria.
  7. Patel, Rakesh; Nicholl, Mara; Harju, Lindsey Greenwell, Access control system for implementing access restrictions of regulated database records while identifying and providing indicators of regulated database records matching validation criteria.
  8. Behera, Prasanta, Access control via properties system.
  9. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  10. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  11. Borders,Lenzie; Keaton,Bernadette L.; Kellett,Irene M.; Mancuso,David; Novotny,Mark W.; Prieto,Vincent; Roos,John R.; Safos,Susan, Apparatus and method for configuring, installing and monitoring spray coating application systems.
  12. Guskov, Sergey; Allsop, Robert J.; McMahon, Ronald E., Apparatus and method for remote monitoring and servicing material application systems.
  13. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Apparatus and method for weighted and aging spam filtering rules.
  14. Csaszar Andras ; Friedman Stephen ; Ligeti Gabor,HUX, Apparatus for bleaching a de-activated link in a web page of any distinguishing color or feature representing an activ.
  15. McCollum Tab ; Jury Thomas W., Assigning security levels to particular documents on a document by document basis in a database.
  16. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  17. Lamkin,Allan B.; Blair,Jeff G.; Collart,Todd R., BCA writer serialization management.
  18. Giannandrea John ; Bina Eric J. ; Montulli Louis J., Browser having automatic URL generation.
  19. Camaisa Allan J. ; Walden Kevin R. ; Klepeis Timothy G., Closed browser for computer and computer network.
  20. Fransson,Bjorn; Sandstrom,Ola, Communication protocol.
  21. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  22. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  23. Kimura, Tomoko; Okayama, Nobuya; Koike, Hiroshi; Namioka, Miyoko, Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program.
  24. Kimura,Tomoko; Okayama,Nobuya; Koike,Hiroshi; Namioka,Miyoko, Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program.
  25. Shannon, Steven, Controlling client access to networked data based on content subject matter categorization.
  26. Collart,Todd, Controlling playback of content stored on a portable storage medium.
  27. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  28. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  29. Kikinis, Dan, Customizable media player with online/offline capabilities.
  30. Kikinis,Dan, Customizable media player with online/offline capabilities.
  31. Wassom, Jack; Schaefer, Renee; Chandler, Cory, Customized user interface.
  32. Wassom, Jack; Schaefer, Renee; Chandler, Cory, Customized user interface.
  33. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customized user interface based on user profile information.
  34. Kimball,Jeffrey David; Wassom, Jr.,John Thurston; Dolan,Christina Ann Rank, Customized user interface based on user record information.
  35. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customized user interface for subordinate users.
  36. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customizing user interfaces.
  37. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customizing user interfaces based on user activities.
  38. Perell, William S.; Hayden, Neil S.; Benvin, Walter D., Data certification and verification system having a multiple-user-controlled data interface.
  39. Berstis, Viktors, Data processing system and method for accessing files.
  40. Michael E. See ; John W. Bailey ; Charles L. Panza ; Yuri Pikover ; Geoffrey C. Stone, Deterministic user authentication service for communication network.
  41. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  42. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C., Deterministic user authentication service for communication network.
  43. See, Michael E.; Bailey, John W.; Panza, Charles L.; Pikover, Yuri; Stone, Geoffrey C.; Goodwin, Michele Wright; Sangroniz, Robert Leon, Deterministic user authentication service for communication network.
  44. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  45. Serena, Frank David, Device, method, and network system for replacing content.
  46. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  47. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  48. Kim,Wooyoung; Sarukkai,Sekhar R., Discovery of an advertising service in e-speak.
  49. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information and interface for same.
  50. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Distributed monitoring for a video security system.
  51. Angal Rajeev ; Allavarpu Sai V.S. ; Bhat Shivaram ; Fisher Bart Lee, Distributed system and method for controlling access to network resources and event notifications.
  52. Gross,John N.; Gross,Anthony A., Document distribution control system and method based on content.
  53. Arganbright, Daniel A.; Bamborough, Dave; Bancino, Randy S.; Blodgett, James G.; Carlson, Bruce H.; Dangl, William; Hazard, William; Horder-Koop, Robin; Hunking, Jim; Kamphuis, Aaron M.; Lang, Gregor, Electronic commerce transactions within a marketing system that may contain a membership buying opportunity.
  54. Bamborough, David L.; Blodgett, James G.; Dangl, William R.; Horder-Koop, Robin A.; Hunking, James P.; McDonald, Kenneth J.; Parker, John P.; Savage, Kelly K.; Zevalkink, Claire E.; Paasche, Thomas D., Electronic commerce transactions within a marketing system that may contain a membership buying opportunity.
  55. Bamborough, David L.; Blodgett, James G.; Dangl, William R.; Horder-Koop, Robin A.; Hunking, James P.; McDonald, Kenneth J.; Parker, John P.; Savage, Kelly K.; Zevalkink, Claire E.; Paasche, Thomas D., Electronic commerce transactions within a marketing system that may contain a membership buying opportunity.
  56. Bamborough, David L.; Blodgett, James G.; Dangl, William R.; Horder-Koop, Robin A.; Hunking, James P.; McDonald, Kenneth J.; Parker, John P.; Savage, Kelly K.; Zevalkink, Claire E.; Paasche, Thomas D., Electronic commerce transactions within a marketing system that may contain a membership buying opportunity.
  57. Bamborough, David L.; Blodgett, James G.; Dangl, William R.; Horder-Koop, Robin A.; Hunking, James P.; McDonald, Kenneth J.; Parker, John P.; Savage, Kelly K.; Zevalkink, Claire E.; Paasche, Thomas D., Electronic commerce transactions within a marketing system that may contain a membership buying opportunity.
  58. Feldman Daniel J., Entitlement management and access control system.
  59. Baker Brenda Sue, Filtering for public databases with naming ambiguities.
  60. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  61. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  62. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  63. Kay Jeffrey Brian, Front-end proxy for transparently increasing web server functionality.
  64. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  65. Hannel, Clifford L.; Lipstone, Laurence R.; Schneider, David S., Generalized policy server.
  66. Hannel,Clifford L.; Lipstone,Laurence R.; Schneider,David S., Generalized policy server.
  67. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  68. Haghpassand, Joshua, Highly accurate security and filtering software.
  69. Bhattacharjee, Bishwaranjan; Dan, Asit, Identification, notification, and control of data access quantity and patterns.
  70. Bhaghavan, Rupa; Hu, Tawei; Nelson, Kenneth Carlin; Richardt, Randal James, Implementing access control for queries to a content management system.
  71. Hughes, Patrick Alan; Elswick, Paul Blair, Inappropriate site management software.
  72. Nishimoto Atsushi,JPX ; Fuku Hirokuni,JPX ; Watanabe Minami,JPX, Information management system and apparatus using open network environment, and storage medium storing control program of apparatus and capable of being read by computer.
  73. Nakamura,Ikuo, Information processing apparatus, method thereof, network system, record medium, and program.
  74. Matsui,Kazuki; Sugano,Hiroyasu; Mitsuoka,Madoka, Information service system, information service participation management apparatus, information service providing apparatus, and recording medium.
  75. Brayton, D. Dwight, Integrated acceptance testing.
  76. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  77. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  78. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  79. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  80. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  81. Daniel C. Delph, Intermediate server having control program for storing content accessed during browsing sessions and playback program for asynchronously replaying browsing sessions.
  82. Rao Chung-Hwa Herman,TWX, Internet file system.
  83. Rhoads,Geoffrey B., Internet linking from audio and image content.
  84. Michael M. Chlan ; Richard E. Davis, Internet web server cache storage and session management system.
  85. Delph Daniel C., Kiosk controller that retrieves content from servers and then pushes the retrieved content to a kiosk in the order specified in a run list.
  86. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  87. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  88. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  89. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  90. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  91. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  92. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  93. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  94. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  95. Spicer, Steven; Martin, Christopher; Pidduck, Patrick; Lehan, Tim; Pereira, Kathy, Limited-bandwidth electronic data communication system field of the invention.
  96. Low, Sydney Gordon, Link usage.
  97. Low, Sydney Gordon, Link usage.
  98. Dircks, Charles E.; Osmann, Eric E., Logon authentication and security system and method.
  99. Douglas Jeffrey G., Management of client requests in a client-server environment.
  100. Illg, Jason J.; Murray, Sean; Pisello, John M., Matching entitlement information for multiple sources.
  101. Skelton Becker,Cynthia; Allsop,Robert J., Material application system with remote access.
  102. Charbonneau,Marc Laurier; Ashdown,Scott Newman, Media router.
  103. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  104. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  105. Low, Sydney Gordon; Lang, William Dennis, Message processing system.
  106. Black, Robert Barth, Method and aparatus for presence based resource management.
  107. Hoashi, Keiichirou; Inoue, Naomi; Hashimoto, Kazuo, Method and apparatus for automatic information filtering using URL hierarchical structure and automatic word weight learning.
  108. Chin, Ren; Cowings, David; Jensen, Sanford, Method and apparatus for certifying mass emailings.
  109. Meyerson, Randy, Method and apparatus for controlling access restrictions for media playback.
  110. Bikram Singh Bakshi ; Michael Man-Hak Tso, Method and apparatus for detecting a user-controlled parameter from a client device behind a proxy.
  111. Kay, James, Method and apparatus for electronic mail filtering.
  112. Kay, James, Method and apparatus for electronic mail filtering.
  113. Kay, James, Method and apparatus for electronic mail filtering.
  114. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan; Medlar, Art, Method and apparatus for filtering E-mail.
  115. Aronson, Daniel Alex; Paul, Sunil; Khalsa, Kirpal Singh; Pozar, Timothy Milan, Method and apparatus for filtering e-mail.
  116. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  117. Gleeson, Matt; Hoogstrate, David; Jensen, Sandy; Mantel, Eli; Medlar, Art; Schneider, Ken, Method and apparatus for filtering email spam using email noise reduction.
  118. Cowings, David; Jensen, Sanford; Wiegner, Carlin, Method and apparatus for maintaining reputation lists of IP addresses to detect email spam.
  119. Black, Robert Barth, Method and apparatus for presence based resource management.
  120. Liao Hanqing ; King Peter F. ; Martin ; Jr. Bruce K., Method and apparatus for providing access control to local services of mobile devices.
  121. Gewickey,Greg; Collart,Todd, Method and apparatus for providing content-owner control in a networked device.
  122. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  123. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  124. Andersen David B., Method and apparatus for remote network access logging and reporting.
  125. Kohavi,Itai; Bar David,Yosh, Method and apparatus for the composition and sale of travel-oriented packages.
  126. Bonnie J. Lowell, Method and apparatus for tracking network usage.
  127. Chang,Ching Jye; Ullmann,Lorin Evan, Method and apparatus in an application framework system for providing a port and network hardware resource firewall for distributed applications.
  128. Casagrande,Steven, Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to users.
  129. Todd R. Collart, Method and program product for preventing unauthorized users from using the content of an electronic storage medium.
  130. King,Peter F., Method and system for exchanging sensitive information in a wireless communication system.
  131. Patrick Alan Hughes ; Paul Blair Elswick, Method and system for identifying and locating inappropriate content.
  132. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  133. Cuomo Gennaro A. ; Nguyen Binh Q. ; Nguyen Hung D. ; Singhal Sandeep K., Method and system for portably enabling awareness, touring, and conferencing over the world-wide web using proxies and s.
  134. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  135. Singh, Dalvinder; Mishra, Vinod Kumar, Method and system for rendering a web page free of inappropriate URLs.
  136. Hughes, James P., Method and system for secure information handling.
  137. Isherwood,David; Lommock,John; Nygren,Kaj; Ritz,Peter, Method and system for sharing end user information on network.
  138. Kaplan, Ari David, Method and system for wireless database management.
  139. Kaplan,Ari D., Method and system for wireless database management.
  140. Ooki, Masayoshi; Nishimoto, Kouji; Hama, Nobuyuki, Method for accessing information.
  141. Fruchtman,Barry, Method for controlling client access.
  142. Still Kelly W., Method for gradual deployment of user-access security within a data processing system.
  143. Bhaghavan,Rupa; Hu,Tawei; Nelson,Kenneth Carlin; Richardt,Randal James, Method for implementing access control for queries to a content management system.
  144. Liu, Yi Bo; Chen, Tong S.; Lin, Kuang Shin, Method for managing and using test system.
  145. Russell-Falla, Adrian Peter; Hanson, Andrew Bard, Method for scanning, analyzing and handling various kinds of digital information content.
  146. Russell-Falla Adrian Peter ; Hanson Andrew Bard, Method for scanning, analyzing and rating digital information content.
  147. Daase Detlef,DEX ; Legat Karl-Heinz,DEX ; Muller Irina,DEX, Method for tying additional function modules into a controlling facility of a switching system, and a switching system.
  148. Felger, David, Method of billing a purchase made over a computer network.
  149. Felger, David, Method of billing a purchase made over a computer network.
  150. Felger, David, Method of billing a purchase made over a computer network.
  151. Edward Blaine Eytchison, Method of managing resources within a network of consumer electronic devices.
  152. Serena, Frank David, Method of replacing content.
  153. Fruchtman, Barry, Method, system and article of manufacture for controlling client access.
  154. Bhogal,Kulvir Singh; Ishmael, Jr.,Nizamudeen; Sidhu,Mandeep Singh, Method, system, and computer program product for restricting access to a network using a network communications device.
  155. Alagna, Michael Anthony; Payne, Charles Andrew; Loiodice, Luca; Smith, Todd Allen, Method, system, and computer program product for security within a global computer network.
  156. Panasyuk, Anatoliy; Sirjani, Abolfazl; Walters, Ben; Burr, Michael; Earl, Min-Chih Lu, Methods and apparatus for scalable secure remote desktop access.
  157. Balabine, Igor, Methods and apparatus for securing access to a computer.
  158. Shekar, Ravi, Methods and computer programs for database structure comparison.
  159. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and system for use in network management of content.
  160. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  161. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  162. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and systems for use in network management of content.
  163. Brown, Michael Wayne; Lawrence, Kelvin Roderick; Paolini, Michael A., Monitoring and managing user access to content via a universally accessible database.
  164. Kuindersma, Michael; St. Laurent, Michael; Onischke, Mark, Multi-stage polling mechanism and system for the transmission and processing control of network resource data.
  165. Willens Steven M., Network access control system and process.
  166. Dircks Charles E. ; Osmann Eric E., Network desktop management security system and method.
  167. Kelly, Bryan M., Network gaming system.
  168. Kelly, Bryan M., Network gaming system.
  169. Kelly, Bryan M., Network gaming system.
  170. Rhoads, Geoffrey B, Network linking methods and apparatus.
  171. Rhoads,Geoffrey B., Network linking using index modulated on data.
  172. Dircks, Charles E.; Osmann, Eric E., Network provider loop security system and method.
  173. Michael J. Wallent ; Rajeev Dujari ; Anand Ramakrishna ; Loren M. Kohnfelder ; Lewis Geer, Network security zones.
  174. Serena, Frank David, Observation device, method, and computer program product for replacing content.
  175. Jade Prashanth ; Moore Victor Stuart ; Rao Arun Mohan ; Walters Glen Robert, Outside access to computer resources through a firewall.
  176. Korenshtein, Roni, Page prerequisite control mechanism.
  177. Korenshtein, Roni, Page sub-component prerequisite control mechanism.
  178. Kelley Edward E. ; Dauerer Norman J. ; Knickerbocker John U., Password control via the web.
  179. Schaefer,Robert G.; Wardhan,Harsh, Performance path method and apparatus for exchanging data among systems using different data formats.
  180. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  181. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  182. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content from multiple media sources.
  183. Schena, Robert J.; Anderer, Mike E.; Ritz, Peter B.; Bernstein, Mike, Printed medium activated interactive communication of multimedia information, including advertising.
  184. Theriault Roger ; Lockhart Thomas Wayne,CAX ; Battin Robert D., Proxy host computer and method for accessing and retrieving information between a browser and a proxy.
  185. Luotonen Ari, Proxy server caching mechanism that provides a file directory structure and a mapping mechanism within the file director.
  186. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  187. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  188. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  189. Hannel, Clifford Lee; May, Anthony, Query interface to policy server.
  190. Russell Falla,Adrian Peter; Hanson,Andrew Bard, Rating and controlling access to emails.
  191. Kikinis, Dan, Remote proxy server agent.
  192. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  193. Hietala, Marko J.; Ojanaho, Janne J., Resource control.
  194. Damick, Jeffrey Joseph; Cunningham, Sean, Router-host logging.
  195. Cook, William R.; Gannholm, Martin R., Rule based database security system and method.
  196. Ashdown Mike ; Lynchard Steve, SS7 firewall system.
  197. Nygren, Kaj; Stephanson, Thomas; Skagerwall, Roger, Scalable distributed database system and method for linking codes to internet information.
  198. Hickman, Robert Chris; DeMello, Marco A., Scalable storage system supporting multi-level query resolution.
  199. Desai, Purvi; Mahajan, Vikas; Bansal, Abhinav, Secure and lightweight traffic forwarding systems and methods to cloud based network security systems.
  200. Desai, Purvi; Mahajan, Vikas; Bansal, Abhinav, Secure and lightweight traffic forwarding systems and methods to cloud based network security systems.
  201. Spicer, Steven; Martin, Christopher; Kuhl, Larry; Hollander, Brian; Pidduck, Patrick; Coutts, Steven; Hatten, Philip Von; Onischke, Mark; Grassick, Clayton; Lehan, Tim, Secure network resource access system.
  202. Andrew W. Trieger, Secure session tracking method and system for client-server environment.
  203. Trieger Andrew W., Secure session tracking method and system for client-server environment.
  204. Naidoo, Surendra N.; Glasgow, William P., Security system.
  205. Naidoo, Surendra N.; Glasgow, William P., Security system.
  206. Kanzawa, Hiroshi; Hata, Kazuhiro, Security system for transmission device.
  207. Dawes, Paul J., Security system with networked touchscreen and gateway.
  208. Forlenza, Randolph Michael; Rodriguez, Herman, Selective and multiple programmed settings and passwords for web browser content labels.
  209. Choi, Seokhoon, Server apparatus, control method for server apparatus, and program.
  210. Choi, Seokhoon, Server apparatus, control method for server apparatus, and program.
  211. Delph Daniel C., Server-based host monitor.
  212. Fiveash William Alton ; Wang Xinya ; Wenzel Christiaan Blake ; Wilson Jacqueline Hegedus ; Wisham Opral Vanan, Simplified method of configuring internet protocol security tunnels.
  213. Kikinis, Dan, Simplified-file hyper text protocol.
  214. Kikinis, Dan, Simplified-file hyper text protocol.
  215. Hyatt, David; Guha, Ramanathan, Smart browsing providers.
  216. Hyatt,David; Guha,Ramanathan, Smart browsing providers.
  217. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  218. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  219. Lamkin,Allan; Collart,Todd; Blair,Jeff, Software engine for combining video or audio content with programmatic content.
  220. Shelton, Robert H., Standing order database search system and method for internet and intranet application.
  221. Shelton, Robert H., Standing order database search system and method for internet and intranet application.
  222. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  223. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Steganographically encoded video, deriving or calculating identifiers from video, and related methods.
  224. Burns, Mark; St. Laurent, Michael; Krishnammagaru, Dharmesh, Streamlined system for the transmission of network resource data.
  225. Fruchtman, Barry, System and article of manufacture for controlling client access.
  226. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  227. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  228. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  229. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  230. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  231. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  232. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  233. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  234. Duffy Robert A. ; Griffin Lyle N., System and method for computer-based rating of information retrieved from a computer network.
  235. Donahue,David B., System and method for content filtering using static source routes.
  236. Feldman, Daniel J., System and method for control of access to resources.
  237. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  238. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  239. Lee,Chung I; Lee,Da Peng, System and method for controlling user authorities to access one or more databases.
  240. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  241. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  242. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  243. Cowings, David; Hoogstrate, David; Jensen, Sandy; Medlar, Art; Schneider, Ken, System and method for filtering spam messages utilizing URL filtering module.
  244. Saeidi,Babak, System and method for identifying information.
  245. Valenti,Mark E., System and method for internet broadcast searching.
  246. Von Hatten, Philip; Pidduck, Patrick; Evers, Rob; Kavanaugh, Frank; Sobiski, Mike; Hollander, Brian; Zhou, Mei; Turner, Justin; Onischke, Mark; Kuindersma, Michael; Krishnammagaru, Dharmesh; St. Laurent, Michael, System and method for managing printer resources on an internal network.
  247. Kerker, William S.; Paasche, Thomas D.; Bamborough, Dave; Bancino, Randy S.; Horder-Koop, Robin; McDonald, Kenneth J.; Parker, John P.; Zevalkink, Claire E., System and method for managing recurring orders in a computer network.
  248. Paasche,Thomas D.; Kerker,William S., System and method for managing recurring orders in a computer network.
  249. Saeidi,Babak, System and method for monitoring and analyzing communications.
  250. Carden, Chris, System and method for providing update information.
  251. Carden, Chris, System and method for providing update information.
  252. Carden,Chris, System and method for providing update information.
  253. St. Laurent, Michael; Onischke, Mark; Kuindersma, Michael; Krishnammagaru, Dharmesh; Stairs, Jonathon; Noreikis, Ken, System and method for releasing print jobs based on location information.
  254. Pitzel,Bradley John; Bobrovskiy,Stanislav; Roberts,William A., System and method for updating information via a network.
  255. Hartmann,Richard G.; Martino,Gilford F.; Timon, III,Vincent T., System and method for variable size retrieval of webpage data.
  256. Mukherjee,Rajat, System and method for web or file system asset management.
  257. Heckel, Bjoern; Mukherjee, Rajat, System and method for web or file system asset management and visualization.
  258. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  259. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  260. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  261. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  262. Hubbard, Dan, System and method of controlling access to the internet.
  263. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  264. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  265. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  266. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  267. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  268. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  269. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  270. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  271. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  272. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  273. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  274. St. Laurent, Michael D.; Krishnammagaru, Dharmesh; Tomlin, Craig A.; Kuindersma, Michael Edward; Stairs, Jonathan; Onischke, Mark; Clement, Conrad R., System for internet enabled printing.
  275. Bradshaw Michael S. ; Shih George Y., System to control content and prohibit certain interactive attempts by a person using a personal computer.
  276. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  277. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  278. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  279. Kaplan, Ari David, System, method and apparatus for wireless monitoring and management of computer systems.
  280. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a business layer component in a multimedia synchronization framework.
  281. Lamkin,Allan B.; Collart,Todd R., System, method and article of manufacture for a common cross platform framework for development of DVD-Video content integrated with ROM content.
  282. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a synchronizer component in a multimedia synchronization framework.
  283. Todd R. Collart, System, method and article of manufacture for authorizing the use of electronic content utilizing a laser-centric medium.
  284. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for java/javascript component in a multimedia synchronization framework.
  285. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers.
  286. Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R.; Lewis, Michael J., System, method and article of manufacture for remote control and navigation of local content.
  287. Getsin,Evgeniy M.; Lamkin,Allan B.; Collart,Todd R.; Lewis,Michael J., System, method and article of manufacture for remote control and navigation of local content.
  288. Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for tracking and supporting the distribution of content electronically.
  289. Collart, Todd, System, method and article of manufacture for updating content stored on a portable storage medium.
  290. Collart, Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  291. Collart,Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  292. Collart, Todd R., System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server.
  293. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  294. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  295. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method, and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  296. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  297. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  298. Bessis, David, Systems and methods for data mining automation.
  299. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  300. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  301. Smith, Patrick W., Systems and methods for managing disclosure of protectable information.
  302. Smith, Patrick W., Systems and methods for managing disclosure of protectable information.
  303. Smith, Patrick W., Systems and methods for managing disclosure of protectable information.
  304. Stack, Brian; Lientz, Andrew; Chamberlain, Simon; Abdous, Yacine; Kahn, Ray, Systems and methods for providing anonymized user profile data.
  305. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  306. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  307. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  308. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  309. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  310. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  311. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  312. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  313. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  314. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  315. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  316. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing dynamic network authorization, authentication and accounting.
  317. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  318. Short, Joel E.; Delley, Frederic; Logan, Mark F.; Pagan, Florence C. I., Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability.
  319. Kikinis, Dan, Tailoring data and transmission protocol for efficient interactive data transactions over wide-area networks.
  320. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  321. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  322. Koneru Sudheer ; Tuchen Michael H., Tracking a user across both secure and non-secure areas on the Internet, wherein the users is initially tracked using a.
  323. Hannel, Clifford Lee; May, Anthony, Tunneling using encryption.
  324. Kao I-Lung, User access to objects in group based access control based on result of greatest common divisor of assigned unique prime numbers of user and object.
  325. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  326. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  327. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security system.
  328. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security systems and methods.
  329. McMillan James Michael, Web information kiosk.
  330. Kirsch Steven T., Web scan process.
  331. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  332. Haghpassand, Joshua, Web-based security and filtering system with proxy chaining.
  333. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
  334. Harris, Scott C., Wireless network having multiple communication allowances.
  335. Henry N. Holtzman ; Jeff Mock, Wireless transceiver for communicating with tags.
  336. Gross, John N.; Gross, Anthony A., Word checking tool for controlling the language content in documents using dictionaries with modifyable status fields.
  337. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로