$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a red 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-015/82
출원번호 US-0486797 (1995-06-07)
발명자 / 주소
  • Gifford David K.
출원인 / 주소
  • Open Market, Inc.
대리인 / 주소
    Hamilton, Brook, Smith & Reynolds, P.C.
인용정보 피인용 횟수 : 468  인용 특허 : 12

초록

This invention relates to methods for providing access to network servers. In particular, the process described in the invention includes client-server sessions over the Internet involving hypertext files. In the hypertext environment, a client views a document transmitted by a content server with a

대표청구항

[ What is claimed is:] [1.] A method of providing a client access to information pages in a server system through a network comprising:providing a descriptor comprising a telephone number at the client;mapping the descriptor to a uniform resource locator using a translation database residing in the

이 특허에 인용된 특허 (12)

  1. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  2. Bernstein Keith (Washington DC) Stephens John A. (Boyds MD), Application independent (open) hypermedia enablement services.
  3. Perlman Radia J. (Acton MA) Koning G. Paul (Brookline NH), Bridge-like internet protocol router.
  4. Belove Edward (Cambridge MA) Culbert James A. (Lynnfield MA) Johnson R. Patrick (Manchester MA) Heath David M. (Nashua NH) Kraley Michael F. (Lexington MA) Mndez Deborah (Malden MA) Pant Sangam (Winc, Distributed, intermittently connected, object-oriented database and management system.
  5. Tsuchiya Paul F. (Lake Hopatcong NJ), General internet method for routing packets in a communications network.
  6. Bernstein Keith (Washington DC) Stephens John A. (Boyds MD), Hypermedia link marker abstract and search services.
  7. Fischer Michael A. (San Antonio TX), Input/output network for computer system.
  8. Sudama Ram (Concord MA) Magid David L. (Worcester MA) Ouellette Kenneth W. (Groton MA), Mechanism for locating without search discrete application resources known by common name only in a distributed network.
  9. Tsuchiya Paul F. (Lake Hopatcong NJ), Method and system for shortcut routing over public data networks.
  10. Meske ; Jr. Carl F. (San Jose CA) Hooper Philip J. (Santa Clara CA) Opperman Mark R. (Palo Alto CA), Method for extracting profiles and topics from a first file written in a first markup language and generating files in d.
  11. Konrad Allan M. (P.O. Box 4023 Berkeley CA 94704), Remote information service access system based on a client-server-service model.
  12. Aziz Ashar (Fremont CA), Scalable and efficient intra-domain tunneling mobile-IP scheme.

이 특허를 인용한 특허 (468)

  1. Hurley Peter Mason, Access mechanism for parallel status update for multiple servers.
  2. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  6. Zhimei Jiang ; Leonard Kleinrock, Adaptive prefetching for computer network and web browsing with a graphic user interface.
  7. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  8. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  9. Goldberg, Sheldon F.; Van Antwerp, John, Advertising system for the internet and local area networks.
  10. Christy, James E., Apparatus and method for redirection of network management messages in a cluster of network devices.
  11. Woolston, Thomas G., Apparatus and method for remote sellers to initiate auction instances at an auction facilitator system and receive or make payment for items bought and sold with the system by book entry accounting between participant accounts accessible to the system.
  12. Wang Edward Yan-Bing ; Dean Dawson F. ; Chen Ling Tony ; Klemets Anders Edgar ; Chaddha Navin, Authentication systems, methods, and computer program products.
  13. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  14. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  15. Philyaw,Jeffry Jovan, Automatic configuration of equipment software.
  16. Himmel, Maria Azua; Rodriguez, Herman; Smith, Jr., Newton James; Spinac, Clifford Jay, Automatically sending a URL by e-mail or telephone.
  17. Harris, Scott C., Barcode device.
  18. Harris, Scott C., Barcode device.
  19. Harris, Scott C., Barcode device.
  20. Harris, Scott C., Barcode device.
  21. Ala Laurila,Juha; Rinnemaa,Jyri; Honkanen,Jukka Pekka; Takamaki,Timo; Vuonnala,Raimo; Ekberg,Jan Erik, Billing in a packet data network.
  22. Immonen, Marko; Juntunen, Ari; Keinänen, Kimmo; Huostila, Tero, Billing in mobile communications system employing wireless application protocol.
  23. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  24. Williams, Randall E.; Fulling, Russell; Heuer, Timothy J.; Pitocco, John Anthony, Calculating a behavioral path based on a statistical profile.
  25. Ong, David, Captive portal that modifies content retrieved from designated web page to specify base domain for relative link and sends to client in response to request from client for unauthorized web page.
  26. Ong, David T., Captive portal that modifies content retrieved from designated web page to specify base domain for relative link and sends to client in response to request from client for unauthorized web page.
  27. Pedersen, Claus; Vestergaard, Bjarne, Cellular communication terminal, a method and a system for accessing servers.
  28. Himmelstein,Richard B., Communication system and method for efficiently accessing internet resources.
  29. Goldberg, Sheldon F.; Dupray, Dennis J.; Van Antwerp, John, Compensation model for network services.
  30. Woolston, Thomas G., Computer-implement method and system for conducting auctions on the internet.
  31. Giordano, III, Joseph; Samboursky, Jacob, Configurable network appliance.
  32. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  33. Rhoads, Geoffrey B., Content objects with computer instructions steganographically encoded therein, and associated methods.
  34. Chi, Timothy Rotau; Cane, Daniel; Oerter, Lara; Finnefrock, Jessica; Everhart, Deborah; Chasen, Michael Lewis, Content system and associated methods.
  35. Brown, Sanford Samuel; Danyluk, Oleh George; Grippo, Ronald V., Correlating information between internet and call center environments.
  36. Brown,Sanford Samuel; Danyluk,Oleh George; Grippo,Ronald V., Correlating information between internet and call center environments.
  37. Blinn, Arnold N.; Guo, Wei-Quiang Michael; Jiang, Wei; Perumal, Raja Pazhanivel; Calinov, Iulian D., Cross-domain authentication.
  38. Blinn, Arnold; Guo, Wei Quiang Michael; Jiang, Wei; Perumal, Raja Pazhanivel; Calinov, Iulian D., Cross-domain authentication.
  39. Herz,Frederick S. M., Customized electronic newspapers and advertisements.
  40. Warrick, Peter S.; Ong, David T., DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP address.
  41. Warrick, Peter S.; Ong, David T., DNS-based captive portal with integrated transparent proxy to protect against user device caching incorrect IP address.
  42. Leveridge,Philip C.; Strange,Michael I.; Parkinson,David W.; Roberts,David; Kenning,Michael J.; Tibbitt Eggleton,Robert I., Data communications.
  43. Schneiter,Andrea M.; Schneiter,John L.; Gaulin,Mark R., Database search in distributed computer system on portion of remote database.
  44. McCorkendale, Bruce; Sobel, William E., Detecting entry-portal-only network connections.
  45. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  46. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  47. Choi, Hyok-sung, Distributed control method and apparatus using URL.
  48. Noble Alan C. ; Freivald Matthew P., Distributed-client change-detection tool with change-detection augmented by multiple clients.
  49. Hishida, Toshihiro; Ura, Seiji; Shin, Hidehiko; Ishigaki, Junji; Sasaki, Keizaburo; Ooseki, Eriko, Document processor.
  50. Warrick, Peter S.; Cassidy, Brendan G.; Carriere, Lindsey M.; McCarthy, Michael D., Dynamic assignment of central media device supporting network-based media sharing protocol to guest device of hospitality establishment for media sharing purposes.
  51. Warrick, Peter S.; Cassidy, Brendan G.; Carriere, Lindsey M.; McCarthy, Michael D., Dynamically enabling guest device supporting network-based media sharing protocol to share media content over local area computer network of lodging establishment with subset of in-room media devices connected thereto.
  52. Cheng, Shang-Che; Pressman, Alexander; Zhang, Hong; Ma, Pei Chiang; Zhang, Shuan; Hummel, Jochen, E-services translation utilizing machine translation and translation memory.
  53. Cheng, Shang-Che; Pressman, Alexander; Zhang, Hong; Ma, Pei Chiang; Zhang, Shuan; Hummel, Jochen, E-services translation utilizing machine translation and translation memory.
  54. Megiddo, Nimrod; McCurley, Kevin S., Efficient retrieval of uniform resource locators.
  55. Jeffrey C. Smith ; Jean-Christophe Bandini, Electronic document delivery system in which notification of said electronic document is sent a recipient thereof.
  56. Douceur, John R.; Adya, Atul; Bolosky, William J.; Theimer, Marvin M., Encrypted key cache.
  57. Douceur,John R.; Adya,Atul; Bolosky,William J.; Theimer,Marvin M., Encrypted key cache.
  58. Douceur, John R.; Adya, Atul; Benaloh, Josh D.; Yuval, Gideon A., Exclusive encryption.
  59. Douceur, John R.; Benaloh, Josh D.; Yuval, Gideon A.; Adya, Atul, Exclusive encryption.
  60. Douceur, John R.; Benaloh, Josh D.; Yuval, Gideon A.; Adya, Atul, Exclusive encryption.
  61. Douceur, John R.; Benaloh, Josh D.; Yuval, Gideon A.; Adya, Atul, Exclusive encryption.
  62. Douceur,John R.; Benaloh,Josh D.; Yuval,Gideon A.; Adya,Atul, Exclusive encryption.
  63. Douceur,John R.; Benaloh,Josh D.; Yuval,Gideon A.; Adya,Atul, Exclusive encryption.
  64. Schneider,Eric, Fictitious domain name method, product, and apparatus.
  65. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  66. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  67. Douceur,John R.; Wattenhofer,Roger P., File availability in distributed file storage systems.
  68. Douceur,John R.; Wattenhofer,Roger P., File availability in distributed file storage systems.
  69. Byrne,Robert, Filter-based attribute value access control.
  70. Anderson, William P.; Geller, Jacob B.; Cunningham, G. Cotter; Rodgers, Kris; Mason, Brian, Financial information access system.
  71. Delpuch, Alain, Flexible interface for secure input of pin code.
  72. Peter Van Horne ; Edwin James Van Horne, Forced network portal.
  73. Van Horne, Peter; Van Horne, Edwin James, Forced network portal.
  74. Linehan Mark, Four-party credit/debit payment protocol.
  75. Linehan,Mark, Four-party credit/debit payment protocol.
  76. Cheng, Shang-Che; Pressman, Alexander, Globalization management system and method therefor.
  77. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  78. Slater, Charles; Chennapragada, Krishna Rao, HTTP redirection of configuration data for network devices.
  79. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  80. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  81. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  82. Moriya Koji,JPX, Home page creating systems apparatuses and program recording mediums, and home page displaying systems and program recording mediums.
  83. Kajita, Koji, Image reading device and image processing method utilizing the same.
  84. Kajita, Koji; Kadowaki, Toshihiro; Ejiri, Seishi; Yamamuro, Soichi; Kondo, Masaya; Kumagai, Takekazu; Tsukamoto, Takeshi; Saruwatari, Masaru; Toyama, Masaki, Image reading device and image processing method utilizing the same.
  85. Kajita, Koji; Kadowaki, Toshihiro; Ejiri, Seishi; Yamamuro, Soichi; Kondo, Masaya; Kumagai, Takekazu; Tsukamoto, Takeshi; Saruwatari, Masaru; Toyama, Masaki, Image reading device and image processing method utilizing the same.
  86. Villavicencio, Francisco J., Impersonation in an access system.
  87. Villavicencio,Francisco J., Impersonation in an access system.
  88. Ross, Russell G.; Gillespie, Kevin, In-context exact (ICE) matching.
  89. Hidemi Munakata JP, Information providing apparatus for server and computer-readable recording medium storing information providing program for server.
  90. Philyaw, Jeffry Jovan; Mathews, David Kent, Input device for allowing interface to a web site in association with a unique input code.
  91. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  92. Golden, Steven M.; Levin, Hillel; Anderson, Bradley A.; Gentry, Gary D.; Barbour, James A.; Schornberg, Albert, Interactive marketing network and process using electronic certificates.
  93. Golden, Steven M.; Levin, Hillel; Anderson, Bradley A.; Gentry, Gary D.; Barbour, James A.; Schornberg, Albert, Interactive marketing network and process using electronic certificates.
  94. Nitta,Yoshihiko; Fujimura,Yoshiki, Internet access system and telephone directory.
  95. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  96. Headd, Travis L.; Callaway, Craig S., Internet based resource retrieval system.
  97. Waites, Nigel, Internet directory system and method using telephone number based addressing.
  98. Wilson James E., Internet phone set.
  99. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  100. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  101. Levergood,Thomas Mark; Stewart,Lawrence C.; Morris,Stephen Jeffrey; Payne,Andrew C.; Treese,George Winfield, Internet server access control and monitoring systems.
  102. Kamasaka Hitoshi,JPX ; Shiraki Hiroaki,JPX ; Torato Masashi,JPX, Internet server providing link destination deletion, alteration, and addition.
  103. Alcorn, Robert L.; Cane, Daniel E.; Chasen, Michael L.; Chi, Timothy R.; Gilfus, Stephen R.; Perian, Scott; Pittinsky, Matthew L., Internet-based education support system and methods.
  104. Alcorn,Robert L.; Cane,Daniel E.; Chasen,Michael L.; Chi,Timothy R.; Gilfus,Stephen R.; Perian,Scott; Pittinsky,Matthew L., Internet-based education support system and methods.
  105. Philyaw, Jeffry Jovan, Launching a web site using a passive transponder.
  106. Philyaw,Jeffry Jovan, Launching a web site using a portable scanner.
  107. Whitfield,Henry, Linking method for printed telephone numbers identified by a non-indicia graphic delimiter.
  108. Adya,Atul; Bolosky,William J.; Douceur,John R.; Theimer,Marvin M., Locating potentially identical objects across multiple computers.
  109. Douceur, John R.; Theimer, Marvin M.; Adya, Atul; Bolosky, William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  110. Douceur, John R.; Theimer, Marvin M.; Adya, Atul; Bolosky, William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  111. Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  112. Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  113. Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  114. Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  115. Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
  116. Byrne,Robert; Behara,Pransanta, Macro-based access control.
  117. Aldred Barry Keith,GBX ; Brown Charles Spencer ; Hahn Timothy J. ; Stokes Ellen Jean, Management of and access to information and other material via the world wide web in an LDAP environment.
  118. Dumitru,Marius M.; Fuhge,Robert B.; Stiegeler,Ute M., Managing application status information for a computer application.
  119. Armstrong, Brad; Huang, Peter; Charbonneau, Daniel John, Mapped parameter sets using bulk loading system and method.
  120. Woolston, Thomas G., Marketing goods with bar codes.
  121. Woolston, Thomas G., Marketplace payments.
  122. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  123. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  124. Warrick, Peter S.; Cassidy, Brendan G.; Carriere, Lindsey M.; McCarthy, Michael D., Media proxy that transparently proxies network-based media sharing protocol between guest device and an associated one of a plurality of media devices.
  125. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  126. Mueller, Frank; Kearns, Steven; Hunter, Kevin Doré , Messaging interchange system.
  127. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for accessing a remote location by receiving a product code.
  128. Philyaw,Jeffry Jovan; Davis,Douglas L., Method and apparatus for accessing a remote location with an optical reader having a dedicated memory system.
  129. Philyaw, Jeffry Jovan; Davis, Douglas L., Method and apparatus for accessing a remote location with an optical reader having a programmable memory system.
  130. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  131. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  132. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  133. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  134. Low,Colin; Seaborne,Andrew Franklin; Bouthors,Nicolas, Method and apparatus for accessing communication data relevant to a target entity identified by a number string.
  135. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method and apparatus for accessing service resource items that are for use in a telecommunications system.
  136. Philyaw,Jeffry Jovan, Method and apparatus for automatic configuration of equipment.
  137. Merriman,Dwight A; O'Connor,Kevin, Method and apparatus for automatic placement of advertising.
  138. Dowling, Eric Morgan, Method and apparatus for co-socket telephony.
  139. Dowling, Eric Morgan, Method and apparatus for co-socket telephony.
  140. Dowling, Eric Morgan, Method and apparatus for co-socket telephony.
  141. Dowling, Eric Morgan, Method and apparatus for co-socket telephony.
  142. Dowling,Eric M., Method and apparatus for co-socket telephony.
  143. Dowling,Eric Morgan, Method and apparatus for co-socket telephony.
  144. Lund, Arnold M., Method and apparatus for communicating information about a called party to a calling party.
  145. Lund, Arnold M., Method and apparatus for communicating information about a called party to a calling party.
  146. Lund, Arnold M., Method and apparatus for communicating information about a called party to a calling party.
  147. Lund,Arnold M., Method and apparatus for communicating information about a called party to a calling party.
  148. Lund,Arnold M., Method and apparatus for communicating information about a called party to a calling party.
  149. Joseph Giordano, III ; Jacob Samboursky IL, Method and apparatus for configuring an internet appliance.
  150. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for connecting a user location to one of a plurality of destination locations on a network.
  151. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  152. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  153. Philyaw,Jeffry Jovan; Mathews,David Kent, Method and apparatus for controlling a user's PC through an audio-visual broadcast to archive information in the user's PC.
  154. Jeffrey C. Smith ; Jean-Christophe Bandini ; Randy Shoup, Method and apparatus for delivering documents over an electronic network.
  155. Bikram Singh Bakshi ; Michael Man-Hak Tso, Method and apparatus for detecting a user-controlled parameter from a client device behind a proxy.
  156. Low,Colin; Seaborne,Andrew Franklin; Bouthors,Nicolas, Method and apparatus for determining a telephone number for accessing a target entity.
  157. Philyaw,Jeffry Jovan; Mathews,David Kent, Method and apparatus for directing an existing product code to a remote location.
  158. Smith Jeffrey C., Method and apparatus for effecting secure document format conversion.
  159. Wesinger, Jr., Ralph E.; Coley, Christopher D., Method and apparatus for electronically publishing information on a computer network.
  160. Papierniak, Karen A.; Thaisz, James E.; Chiang, Luo-Jen; Diwekar, Anjali M., Method and apparatus for forming user sessions and presenting internet data according to the user sessions.
  161. Robert Pang ; Jim Stabile, Method and apparatus for implementing an extensible authentication mechanism in a web application server.
  162. Philyaw,Jeffry Jovan; Mathews,David Kent, Method and apparatus for launching a web browser in response to scanning of product information.
  163. Montulli, Lou, Method and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes.
  164. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for matching a user's use profile in commerce with a broadcast.
  165. Markowitz Robert Edward ; O'Neil Joseph Thomas, Method and apparatus for modifying an information page transmitted in a communications network.
  166. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for opening and launching a web browser in response to an audible signal.
  167. Philyaw,Jeffry Jovan; Mathews,David Kent, Method and apparatus for opening and launching a web browser in response to an audible signal.
  168. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a dynamically-updating pay-for-service web site.
  169. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method and apparatus for providing a pay-for-service web site.
  170. Malkin Gary, Method and apparatus for redirecting packets using encapsulation.
  171. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  172. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  173. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  174. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  175. Kirsch, Steven T.; Lindblad, Christopher J., Method and apparatus for redirection of server external hyper-link references.
  176. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  177. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  178. Kanefsky, Steven T.; Kocheisen, Michael; Kormann, David P.; Renger, Bernard S., Method and apparatus for sharing wireless content.
  179. Philyaw,Jeffry Jovan; Mathews,David Kent, Method and apparatus for tracking user profile and habits on a global network.
  180. Andersen David B. ; Brandewie Dirk J., Method and apparatus for translating a static identifier including a telephone number into a dynamically assigned networ.
  181. Philyaw, Jeffry Jovan, Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet.
  182. Philyaw,Jeffry Jovan, Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet.
  183. Philyaw,Jeffry Jovan, Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet.
  184. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for utilizing an existing product code to issue a match to a predetermined location on a global network.
  185. Philyaw,Jeffry Jovan; Mathews,David Kent, Method and apparatus for utilizing an existing product code to issue a match to a predetermined location on a global network.
  186. Stangl,Norbert, Method and device for the transfer of electronic data volumes.
  187. Osaku Teizo,JPX ; Pan Rong,JPX, Method and system for accessing information on a network using message aliasing functions having shadow callback functions.
  188. Marcu, Daniel; Dreyer, Markus, Method and system for automatic management of reputation of translators.
  189. Jeffrey C. Smith ; Jean-Christophe Bandini, Method and system for binary data firewall delivery.
  190. Berstis, Viktors; Himmel, Maria Azua, Method and system for certifying authenticity of a web page copy.
  191. Allibhoy, Nizar; Elliott, L. Dane; Fernandez Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/service systems.
  192. Allibhoy, Nizar; Elliott, L. Dane; Fernandez-Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/service systems.
  193. Allibhoy, Nizar; Elliott, L. Dane; Fernandez-Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/service systems.
  194. Allibhoy,Nizar; Elliott,L. Dane; Fernandez Silva,Joaquin; Johnson,Stephen M., Method and system for controlling and auditing content/service systems.
  195. Allibhoy,Nizar; Elliott,L. Dane; Fernandez Silva,Joaquin; Johnson,Stephen M., Method and system for controlling and auditing content/service systems.
  196. Allibhoy, Nizar; Elliott, L. Dane; Fernandez Silva, Joaquin; Johnson, Stephen M., Method and system for controlling and auditing content/services systems.
  197. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Method and system for counting web access requests.
  198. Ayers, Matt; Black, Benjamin J.; Brown, Chris; Carlson, John; Cohn, Dan; Laird, Scott; Miller, Jonathan; Ramsey, Stephen; Ronen, Ophir; Schachter, Paul; Stiffelman, Oscar, Method and system for directing requests for content to a content server based on network performance.
  199. Smith Jeffrey C. ; Bandini Jean-Christophe, Method and system for dynamic server document encryption.
  200. Sanford Samuel Brown ; Oleh George Danyluk ; Ronald V. Grippo, Method and system for establishing voice communications in an internet environment.
  201. Strandell, Toni; Tammi, Tuomas, Method and system for initiating a communication from an arbitrary document.
  202. Ackerman, Jake; Lloyd, Steven, Method and system for instant redirection of an online consumer from a referring website to a vendor website.
  203. Verma Dinesh Chandra, Method and system for measuring Web site access requests.
  204. Carusi,Francesco; Sciacca,Vincenzo, Method and system for monitoring performance of distributed applications.
  205. Ahuja, Abha; Ayers, Matt; Black, Ben; Brown, Chris; Cohn, Daniel T.; Ramsey, Stephen; Ronen, Ophir; Schachter, Paul J.; Stiffelman, Oscar B.; Wheeler, Christopher D., Method and system for optimizing routing through multiple available internet route providers.
  206. Goldberg, Sheldon F.; Antwerp, John Van, Method and system for playing games on a network.
  207. Lund, Arnold M., Method and system for providing computer-network related information about a calling party.
  208. Lund, Arnold M., Method and system for providing computer-network related information about a calling party.
  209. McCrossin, James; Hiller, Dean; Kornutik, Richard, Method and system for providing local information over a network.
  210. Lund, Arnold M., Method and system for providing to a second party, computer-network related information about a first party.
  211. Lund, Arnold M., Method and system for providing to a second party, computer-network related information about a first party.
  212. Lund, Arnold M., Method and system for providing to a second party, computer-network related information about a first party.
  213. Lund, Arnold M., Method and system for providing to a second party, computer-network related information about a first party.
  214. Van Wyngarden,Amy, Method and system for receiving and providing access to information at a web site.
  215. Wyngarden, Amy Van, Method and system for receiving and providing access to information at a web site.
  216. Chan,Kok Wai; Toncheva,Dafina Ivanova; Dharmarajan,Baskaran; Newaskar,Rahul Shrikant; Back,Adam, Method and system for recovering password protected private data via a communication network without exposing the private data.
  217. Woolston, Thomas G., Method and system for retrieving information regarding an item posted for sale.
  218. Hunter, Kevin D., Method and system for simplified access to internet content on a wireless device.
  219. Lita, Christian, Method and system for using virtual URLs for load balancing.
  220. Lash, Todd; Salo, Daniel; Weber, Jay, Method and system for video enhancement transport alteration.
  221. Osaku,Teizo; Yoshinaga,Yoshihiro, Method and systems for accessing information on a network using message aliasing functions having shadow callback functions.
  222. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  223. Low, Colin; Seaborne, Andrew Franklin; Bouthors, Nicolas, Method for accessing service resource items that are for use in a telecommunications system.
  224. Newton Eric Robert,GBX ; MacDonald Simon John,GBX ; Cruickshank David Richard,GBX ; Clark Phil,GBX, Method for automatic and periodic requests for messages to an e-mail server from the client.
  225. Philyaw,Jeffry Jovan, Method for conducting a contest using a network.
  226. Philyaw, Jeffry Jovan, Method for configuring a piece of equipment with the use of an associated machine resolvable code.
  227. Henaff,Mari Mai; Aubertin,Laurent, Method for controlling access to internet sites.
  228. Brei,James; Holt,Mark; Olson,Ken; Potharaju,Sri, Method for creating durable web-enabled uniform resource locator links.
  229. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  230. Reisman, Richard R., Method for distributing content to a user station.
  231. Reisman, Richard R., Method for distributing content to a user station.
  232. Reisman, Richard R., Method for distributing content to a user station.
  233. Woolston, Thomas G., Method for facilitating commerce at an internet-based auction.
  234. Philyaw, Jeffry Jovan; Mathews, David Kent, Method for interfacing scanned product information with a source for the product over a global network.
  235. Philyaw,Jeffry Jovan; Mathews,David Kent, Method for interfacing scanned product information with a source for the product over a global network.
  236. Yacoby, Nir; Qiu, Tau (Tony), Method for linking on the internet with an advertising feature.
  237. Chandra Rohit, Method for managing a repository of user information using a personalized uniform locator.
  238. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  239. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  240. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Method for updating personal financial information on a web site.
  241. Philyaw,Jeffry Jovan, Method for utilizing visual cue in conjunction with web access.
  242. Felger, David, Method of billing a purchase made over a computer network.
  243. Felger, David, Method of billing a purchase made over a computer network.
  244. Felger, David, Method of billing a purchase made over a computer network.
  245. Merriman, Dwight Allen; O'Connor, Kevin J., Method of delivery, targeting, and measuring advertising over networks.
  246. Merriman, Dwight Allen; O'Connor, Kevin J., Method of delivery, targeting, and measuring advertising over networks.
  247. Merriman, Dwight Allen; O'Connor, Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  248. Merriman, Dwight Allen; O'Connor, Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  249. Merriman, Dwight Allen; O'Connor, Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  250. Degraeve, Michel, Method of triggering a transfer of data stored in a database.
  251. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  252. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  253. Schneider, Eric, Method, product, and apparatus for processing a data request.
  254. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  255. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  256. Kaiser, David H.; Lash, Todd; Weber, Jay C., Method, system, and apparatus for providing action selections to an image referencing a product in a video production.
  257. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  258. Ebert, Peter, Methods and systems for generating interactive information formatted for a device.
  259. Woolston, Thomas G., Methods and systems for searching for goods.
  260. Woolston, Thomas G., Methods and systems for searching for goods and services.
  261. Woolston, Thomas G., Methods and systems for searching for goods in a virtual marketplace.
  262. Reisman, Richard R., Methods for transacting electronic commerce.
  263. Helferich, Richard J., Methods of performing actions in a cell phone based on message parameters.
  264. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  265. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  266. Nakanaga,Isao, Mobile telephone system.
  267. Shuster, Gary, Monitoring application for automatically requesting content.
  268. Shuster, Gary, Monitoring application for automatically requesting content.
  269. Shuster, Gary, Monitoring application for automatically requesting content.
  270. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  271. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  272. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  273. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  274. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  275. Goldberg, Sheldon F.; Antwerp, John Van, Network advertising and game playing.
  276. Merriman, Dwight A; O'Connor, Kevin J, Network for distribution of re-targeted advertising.
  277. Carl Potvin CA, Network interconnected computing device, server and notification method.
  278. Hu Wei-Ming, Network request distribution based on static rules and dynamic performance data.
  279. Schneider, Eric, Network resource access method, product, and apparatus.
  280. Philyaw,Jeffry Jovan; Matthews,David Kent, Network routing utilizing a product code.
  281. Hulse, David Andrew; Bryars, Mark Howard, Off-site user access control.
  282. Hulse, David Andrew; Bryars, Mark Howard, Off-site user access control.
  283. Hulse, David Andrew; Bryars, Mark Howard, Off-site user access control.
  284. Bolosky, William J.; Cermak, Gerald; Adya, Atul; Douceur, John R., On-disk file format for a serverless distributed file system.
  285. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  286. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  287. Bolosky,William J.; Cermak,Gerald; Adya,Atul; Douceur,John R., On-disk file format for a serverless distributed file system.
  288. Bolosky,William J.; Adya,Atul; Douceur,John R., On-disk file format for serverless distributed file system with signed manifest of file modifications.
  289. Kaneko Toshiyuki,JPX, On-line shopping system.
  290. Philyaw,Jeffry Jovan; Holberg,Douglas R., Optical reader with ultraviolet wavelength capability.
  291. Williams, Randall E.; Fulling, Russell; Heuer, Timothy J.; Pitocco, John Anthony, Optimizing behavioral change based on a patient statistical profile.
  292. Williams, Randall E.; Fulling, Russell; Heuer, Timothy J.; Pitocco, John Anthony, Optimizing behavioral change based on a population statistical profile.
  293. Su,Jin; Hillyard,Paul; Butt,Alan B., PKI-based client/server authentication.
  294. Refuah, Aviv; Refuah, Zeev; Nhaissi, Eli; Fenster, Maier, Personalized internet interaction.
  295. Refuah, Aviv; Refuah, Zeev; Nhaissi, Eli; Fenster, Maier, Personalized internet interaction by adapting a page format to a user record.
  296. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  297. Philyaw, Jeffry Jovan, Portable scanner for enabling automatic commerce transactions.
  298. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  299. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  300. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  301. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  302. Smith Jeffrey C. ; Bandini Jean-Christophe, Private, trackable URLs for directed document delivery.
  303. Smith, Jeffrey C.; Bandini, Jean-Christophe, Private, trackable URLs for directed document delivery.
  304. Mavinkurve, Sanjay G.; Miller, Steve, Providing a locator, such as a URL, for tracking multiple types of user-advertisement actions.
  305. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  306. Herz, Frederick S. M., Providing customized electronic information.
  307. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  308. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  309. Chan,Kok Wai; Jiang,Wei; Guo,Wei Quiang Michael, Public key infrastructure scalability certificate revocation status validation.
  310. Crosbie, Tanya M. Mastin; Knouse, Charles W., Query string processing.
  311. Schneider, Eric, Real-time communication processing method, product, and apparatus.
  312. Emens, Michael Lawrence; Kraft, Reiner, Repository protection by URL expiration.
  313. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  314. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  315. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  316. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  317. Karri Kalpio FI; Mika P. Nieminen FI; Jorma Rinkinen FI, Resource retrieval over a source network determined by checking a header of the requested resource for access restrictions.
  318. Deen, Brian; Hopmann, Alex; Soderberg, Joel, Routing client requests to back-end servers.
  319. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  320. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  321. Christie, William; Beliveau, Jeffery; Lellouche, Henri, Secure coupon distribution.
  322. Herz, Frederick S. M.; Labys, Walter Paul; Parkes, David C.; Kannan, Sampath; Eisner, Jason M., Secure data interchange.
  323. Calinov,Iulian D.; Peterson,Christopher N.; Guo,Wei Quiang Michael; Zhang,Danpo; McQuillan,Gilbert M.; Jiang,Wei; Nagvekar,Sanjeev M.; Steinbok,Jeff, Secure registration.
  324. Tieken, Craig A., Secure transaction management.
  325. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  326. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  327. Smith, Jeffrey C.; Bandini, Jean-Christophe, Sender driven certification enrollment system.
  328. Guo,Wei Quiang Michael; Jiang,Wei; Chow,Colin, Separate client state object and user interface domains.
  329. Adya, Atul; Cermak, Gerald; Douceur, John R.; Theimer, Marvin M.; Wattenhofer, Roger P.; Bolosky, William J., Serverless distributed file system.
  330. Adya,Atul; Bolosky,William J.; Cermak,Gerald; Douceur,John R.; Theimer,Marvin M.; Wattenhofer,Roger P., Serverless distributed file system.
  331. Adya,Atul; Bolosky,William J.; Cermak,Gerald; Douceur,John R.; Theimer,Marvin M.; Wattenhofer,Roger P., Serverless distributed file system.
  332. Guo, Wei-Quiang Michael; Dharmarajan, Baskaran; Battle, Ryan W., Service routing and web integration in a distributed, multi-site user authentication system.
  333. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  334. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  335. Guo, Wei Quiang Michael; Howard, John Hal; Chan, Kok Wai, Session key security protocol.
  336. Guo, Wei-Quiang Michael; Howard, John Hal; Chan, Kok Wai, Session key security protocol.
  337. Schneider, Eric, Sitemap access method, product, and apparatus.
  338. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  339. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  340. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  341. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  342. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  343. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  344. Reisman, Richard R., Software distribution over a network.
  345. Philyaw, Jeffry Jovan; Mathews, David Kent, Software downloading using a television broadcast channel.
  346. Clinton L. Ballard, Software execution contingent on home page setting.
  347. Poder, James, Stateful home phone service.
  348. van den Oever, Laurens; Dent, Jason Matthew, Statistical linguistic analysis of source content.
  349. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  350. Himmel Maria Azua ; Rodriguez Herman ; LaBaw Jeffrey Scott, Subscription and internet advertising via searched and updated bookmark sets.
  351. Shoji, Wataru; Tabuchi, Daisuke; Nakajima, Ichiro; Gramlich, Gabriele, System and a process for specifying a location on a network.
  352. Himmelstein, Richard B., System and method for a social network.
  353. Waters, Christopher J. F., System and method for accessing external memory using hash functions in a resource limited device.
  354. d'Eon Christopher E. ; Bolt Thomas B., System and method for assessing effectiveness of internet marketing campaign.
  355. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  356. Schneck David H. ; Cherry Steve ; Goodman David,GBX, System and method for creating a search form for accessing directory information.
  357. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  358. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  359. Helferich, Richard J., System and method for delivering information to a transmitting and receiving device.
  360. Dutta, Tanmoy; Balikov, Alexander G.; Naresh, Himani, System and method for document isolation.
  361. Dutta, Tanmoy; Balikov, Alexander G.; Naresh, Himani, System and method for document isolation.
  362. Himmelstein, Richard B., System and method for efficiently accessing internet resources.
  363. Himmelstein, Richard B., System and method for efficiently accessing internet resources.
  364. Himmelstein, Richard B., System and method for efficiently accessing internet resources.
  365. Himmelstein, Richard B., System and method for efficiently accessing internet resources.
  366. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  367. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  368. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection with unknown network and/or user device.
  369. Short,Joel E.; Kleinrock,Leonard, System and method for establishing network connection with unknown network and/or user device.
  370. Satagopan, Murli; Cameron, Kim, System and method for name resolution.
  371. Herz, Frederick; Ungar, Lyle; Zhang, Jian; Wachob, David, System and method for providing access to data using customer profiles.
  372. Herz, Frederick; Ungar, Lyle; Zhang, Jian; Wachob, David; Salganicoff, Marcos, System and method for providing access to video programs and other data using customer profiles.
  373. Frederick S. M. Herz, System and method for providing customized electronic newspapers and target advertisements.
  374. Scroggie, Michael C.; Kacaba, Michael E.; Rochon, David A.; Diamond, David M., System and method for providing shopping aids and incentives to customer through a computer network.
  375. Scroggie, Michael C.; Kacaba, Michael E.; Rochon, David A.; Diamond, David M., System and method for providing shopping aids and incentives to customers through a computer network.
  376. Scroggie,Michael C.; Kacaba,Michael E.; Rochon,David A.; Diamond,David M., System and method for providing shopping aids and incentives to customers through a computer network.
  377. Allen, Thomas H.; Irwin, Gregg, System and method for providing to multiple user computers concurrent telephonic access to multiple remote devices.
  378. Pratt, Richard W., System and method for remote device management.
  379. Pratt,Richard W., System and method for remote device management.
  380. Himmelstein, Richard B., System and method for searching a social network.
  381. Soderberg, Joel; Deen, Brian; Hopmann, Alex, System and method for transparently redirecting client requests for content using a front-end indicator to preserve the validity of local caching at the client system.
  382. Hudetz, Frank C; Hudetz, Peter R, System and method for using an ordinary article of commerce to access a remote computer.
  383. Na, Hong Chan, System and method of composing search free mail.
  384. Durst, Jr., Robert T.; Hunter, Kevin; Kearns, Steven, System and method of using machine-readable or human-readable linkage codes for accessing networked data resources.
  385. David H. Kaiser ; Todd Lash ; Jay C. Weber, System for indexical triggers in enhanced video productions by redirecting request to newly generated URI based on extracted parameter of first URI.
  386. Slater, Charles; Chennapragada, Krishna Rao, System for managing cluster of network switches using IP address for commander switch and redirecting a managing request via forwarding an HTTP connection to an expansion switch.
  387. Anderson,William P.; Geller,Jacob B., System for on-line financial services using distributed objects.
  388. Anderson,William P.; Geller,Jacob B., System for on-line financial services using distributed objects.
  389. Anderson William P. ; Geller Jacob B., System for on-line services using distributed objects.
  390. Reisman Richard R., System for transporting information objects between a user station and multiple remote sources based upon user modifiable object manifest stored in the user station.
  391. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  392. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  393. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  394. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  395. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  396. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  397. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  398. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  399. Bagley, David T.; Fearing, Roger N., Systems and methods for communicating across various communication applications using single address strings.
  400. Homer, Ian; Diss, Matthew, Systems and methods for contextual vocabularies and customer segmentation.
  401. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  402. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  403. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  404. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  405. Judge, Paul, Systems and methods for message threat management.
  406. Judge, Paul, Systems and methods for message threat management.
  407. Judge, Paul, Systems and methods for message threat management.
  408. Judge, Paul, Systems and methods for message threat management.
  409. Judge,Paul, Systems and methods for message threat management.
  410. Judge,Paul, Systems and methods for message threat management.
  411. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  412. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  413. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  414. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  415. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  416. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  417. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  418. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  419. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  420. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  421. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  422. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing dynamic network authorization, authentication and accounting.
  423. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  424. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  425. Harris, James; Li, Rui; Kumar, Arkesh; Thakur, Ravindranath; Agarwal, Puneet; Choudhary, Akshat, Systems and methods for selecting an authentication virtual server from a plurality of virtual servers.
  426. Harris, James; Li, Rui; Kumar, Arkesh; Thakur, Ravindranath; Agarwal, Puneet; Choudhary, Akshat, Systems and methods for selective authentication, authorization, and auditing in connection with traffic management.
  427. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  428. Judge,Paul, Systems and methods for upstream threat pushback.
  429. Harris, James; Li, Rui; Kumar, Arkesh; Thakur, Ravindranath; Agarwal, Puneet; Choudhary, Akshat; Gupta, Punit, Systems and methods for using end point auditing in connection with traffic management.
  430. Harris, James; Li, Rui; Kumar, Arkesh; Thakur, Ravindranath; Agarwal, Puneet; Choudhary, Akshat; Gupta, Punit, Systems and methods for using end point auditing in connection with traffic management.
  431. Helferich, Richard J., Systems and methods providing advertisements to a cell phone based on location and external temperature.
  432. Trese, Andrew; Closset, Frank, Systems, methods, and media for generating analytical data.
  433. Case, Ralph B.; Topol, Brad B., Technique for measuring round-trip latency to computing devices requiring no client-side proxy presence.
  434. Muralidharan Ramaswamy, Telephone activated web server.
  435. Nelson, Mark R.; Platt, Richard B., Telephone-based hypertext transport protocol server.
  436. Nelson,Mark R.; Platt,Richard B., Telephone-based hypertext transport protocol server.
  437. Shneidman, Jonathan, Telescreen operating method.
  438. Shneidman,Jonathan, Telescreen operating method.
  439. Shneidman,Jonathan, Telescreen operating method.
  440. Nishioka Hisao,JPX ; Enomoto Takaaki,JPX ; Ota Jun,JPX ; Kisanuki Chisato,JPX, Television transmitter, television transmitting method, television receiver and television receiving method.
  441. Nishioka, Hisao; Enomoto, Takaaki; Ota, Jun; Kisanuki, Chisato, Television transmitter, television transmitting method, television receiver and television receiving method.
  442. Nishioka, Hisao; Enomoto, Takaaki; Ota, Jun; Kisanuki, Chisato, Television transmitter, television transmitting method, television receiver and television receiving method.
  443. Nishioka,Hisao; Enomoto,Takaaki; Ota,Jun; Kisanuki,Chisato, Television transmitter, television transmitting method, television receiver and television receiving method.
  444. Nishioka,Hisao; Enomoto,Takaaki; Ota,Jun; Kisanuki,Chisato, Television transmitter, television transmitting method, television receiver and television receiving method.
  445. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  446. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  447. Hashiguchi, Masahiro, User authentication method and user authentication system.
  448. Ikudome, Koichiro; Yeung, Moon Tai, User specific automatic data redirection system.
  449. Blair Dana L., Using an authentication server to obtain dial-out information on a network.
  450. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  451. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  452. Refuah, Aviv; Dayagi, Gil; Roth, Roby, WWW addressing.
  453. Refuah, Aviv; Dayagi, Gil; Roth, Roby, WWW addressing.
  454. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen J.; Payne, Andrew C.; Treese, George W., Web advertising method.
  455. Schneck David H. ; Cherry Steve ; Goodman David,GBX, Web interface and method for accessing and displaying directory information.
  456. Schneck David H. ; Cherry Steve ; Goodman David,GBX, Web interface and method for accessing directory information.
  457. Schneck David H. ; Cherry Steve ; Goodman David,GBX, Web interface and method for displaying directory information.
  458. Trese, Andrew; Closset, Frank; van den Oever, Laurens, Web interface including the review and manipulation of a web document and utilizing permission based control.
  459. Sakamaki Katsuya,JPX, Web page display system utilizing locally stored image data components that are integrated according to part combination information transmitted by a server.
  460. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  461. Kirsch Steven T., Web scan process.
  462. Helferich, Richard J., Wireless messaging and content provision systems and methods.
  463. Helferich, Richard J., Wireless messaging systems and methods.
  464. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  465. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  466. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  467. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  468. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로