$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Censoring browser method and apparatus for internet viewing

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0634949 (1996-04-19)
발명자 / 주소
  • Cragun Brian John
  • Day Paul Reuben
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Pennington
인용정보 피인용 횟수 : 200  인용 특허 : 9

초록

A censoring browser method and apparatus are provided for internet viewing. A user profile including user selected censoring parameters is stored. Data packet contents are received and compared with the user selected censoring parameters. Responsive to the comparison, the received data packet conten

대표청구항

[ What is claimed is:] [1.] A censoring browser apparatus for internet viewing comprising:means for storing a user profile, said user profile including user selected censoring parameters;means for receiving a data packet and for comparing contents of said received data packet with said user selected

이 특허에 인용된 특허 (9)

  1. Cragun Brian J. (Rochester MN) Day Paul R. (Rochester MN), Apparatus and method for selectively viewing video information.
  2. Carlgren Richard G. (Gaithersburg MD) Rosenbaum Walter S. (Bethesda MD) Tannenbaum Alan R. (Washington Grove MD), Automatic text grade level analyzer for a text processing system.
  3. Augenbraun Joseph E. (Princeton NJ) Pearlstein Larry A. (Newtown PA) Plotnick Michael A. (Southampton PA), Broadcast interactive multimedia system.
  4. Zamora Elena M. (Gaithersburg MD), Information processing system for compaction and replacement of phrases.
  5. Klinker Gudrun J. (Westborough MA), Interactive visualization environment with improved visual programming interface.
  6. Cline Troy L. (Cedar Park TX) Poston Ricky L. (Austin TX) Werner Jon H. (Oceanside CA), Itinerary list for interfaces.
  7. Large James (Wexford PA) Newcomer Joseph M. (Pittsburgh PA) Thibadeau Robert (Pittsburgh PA), Packet filter engine.
  8. Liu Vince (Saratoga CA) Sun Shirley (Tsyr-Yi) (Sunnyvale CA) Ko Alan (Sunnyvale CA), Remote communication server with automatic filtering.
  9. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.

이 특허를 인용한 특허 (200)

  1. Petrovskaya, Anna; Varvak, Peter; Geraschenko, Anton; Koenig, Dylan; Helmy, Youssri, Active region determination for head mounted displays.
  2. Barile, Ian, Adaptive data loss prevention policies.
  3. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Adaptive pattern recognition based control system and method.
  4. Hoffberg,Linda Irene; Hoffberg,Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  6. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  7. Emigh, Aaron T., Alerting based on location, region, and temporal specification.
  8. Roberts, Jr., Evans V., Apparatus and method for interrupting data transmissions.
  9. Baba, Daisuke; Phillips, Charles Douglas, Apparatus and method for linguistic scoring.
  10. Baba, Daisuke; Phillips, Charles Douglas, Apparatus and method for linguistic scoring.
  11. Buzuloiu,Vasile; Cuic,Mihai; Beuran,Razvan; Grecu,Horia; Drimbarean,Alexandru; Corcoran,Peter; Steinberg,Eran, Automated detection of pornographic images.
  12. Emigh, Aaron T., Community-modified profile with activity-based authorization.
  13. Lotvin,Mikhail; Nemes,Richard Michael, Computer apparatus and methods supporting different categories of users.
  14. Oswald, David L., Computer monitor receiver.
  15. Zhao Yan, Concurrent user access control in stateless network computing service system.
  16. Groll, Neil; Dennis, Meg, Content filtering system for a mobile communication device and method of using same.
  17. Ramam, Shishir Krovvidi; Ghosemajumder, Shuman; Hansen, Marc R., Content modification in served code.
  18. Grupe, Robert, Content scanning of copied data.
  19. Baird,Roger T.; Baird,Jeffrey C.; Blair,Timothy P., Controlling the distribution of information.
  20. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  21. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  22. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  23. Redlich,Ron M.; Nemzow,Martin A., Data security system and method.
  24. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  25. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  26. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for portable device.
  27. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for separation of user communities.
  28. Redlich,Ron M.; Nemzow,Martin A., Data security system and method responsive to electronic attacks.
  29. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with adaptive filter.
  30. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with editor.
  31. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with multiple independent levels of security.
  32. Redlich,Ron M.; Nemzow,Martin A., Data security system and method with parsing and dispersion techniques.
  33. Redlich, Ron M.; Nemzow, Martin A., Data security system and with territorial, geographic and triggering event protocol.
  34. Jarman, Matthew T., Delivery of navigation data for playback of audio and video content.
  35. Jarman, Matthew T., Delivery of navigation data for playback of audio and video content.
  36. Jarman, Matthew T., Delivery of navigation data for playback of audio and video content.
  37. Bruening, Oskar; Fridman, Vitali, Detecting policy violations in information content containing data in a character-based language.
  38. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  39. Serena, Frank David, Device, method, and network system for replacing content.
  40. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  41. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  42. Tessman, Gary; Lippert, Patrick D.; Hayman, Timothy B., Distributed image storage architecture.
  43. Tessman, Jr.,Gary; Lippert,Patrick; Hayman,Timothy B., Distributed image storage architecture.
  44. Gross,John N.; Gross,Anthony A., Document distribution control system and method based on content.
  45. Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
  46. Satoru Kikugawa JP, Electronic bulletin board system.
  47. Donahue, Thomas P., Employee internet management device.
  48. Donahue,Thomas P., Employee internet management device.
  49. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  50. Swift, Dana B., Evaluating graphic image files for objectionable content.
  51. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  52. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  53. Toga, James E., Firewall for controlling data transfers between networks based on embedded tags in content description language.
  54. Tada Akihito,JPX, Hypertext transmission method and server apparatus for sending and receiving files other than HTML files.
  55. Enomoto, Katsunori; Kondo, Yoshiyuki; Kokubo, Masatoshi; Aoki, Kazuma, Image forming device capable of acquiring data from web server.
  56. Tsunoda, Tomohiro; Hoshino, Masaaki, Individualized detailed program recommendations with active updating of viewer preferences.
  57. Redlich, Ron M.; Nemzow, Martin A., Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor.
  58. Hoffberg, Steven Mark, Intelligent electronic appliance system and method.
  59. Nishio, Fumihiko; Yoshida, Kimiyoshi, Intelligent information retrieval system using hierarchically classified preferences.
  60. Ellis, Michael D.; Allison, Donald W.; Marshall, Connie T.; Lemmons, Thomas R., Interactive television program guide system with title and description blocking.
  61. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  62. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  63. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali, Mechanism to search information content for preselected data.
  64. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali, Mechanism to search information content for preselected data.
  65. Hoffberg, Steven; Hoffberg-Borghesani, Linda, Media recording device with packet data interface.
  66. Black, Robert Barth, Method and aparatus for presence based resource management.
  67. Indeck, Ronald S.; Cytron, Ron Kaplan; Franklin, Mark Allen, Method and apparatus for adjustable data matching.
  68. Hoashi, Keiichirou; Inoue, Naomi; Hashimoto, Kazuo, Method and apparatus for automatic information filtering using URL hierarchical structure and automatic word weight learning.
  69. Jones, Christopher; Desjardins, Daren; Bothwell, Eric; Fontana, Alexander, Method and apparatus for automatically correlating related incidents of policy violations.
  70. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  71. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  72. Zoppas, Michel; Hermann, Jeremy; O'Raghallaigh, Conal; Bothwell, Eric; Fontana, Alexander, Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema.
  73. Kay, James, Method and apparatus for electronic mail filtering.
  74. Kay, James, Method and apparatus for electronic mail filtering.
  75. Kay, James, Method and apparatus for electronic mail filtering.
  76. Rowney, Kevin T.; Fridman, Vitali; Bothwell, Eric, Method and apparatus for handling messages containing pre-selected data.
  77. Gassen, Derek; Donahue, Thomas P., Method and apparatus for predictive and actual intrusion detection on a network.
  78. Black, Robert Barth, Method and apparatus for presence based resource management.
  79. Indeck, Ronald S.; Cytron, Ron Kaplan; Franklin, Mark Allen, Method and apparatus for processing streaming data using programmable logic.
  80. Morar, John Frederick; Chess, David Michael; Kephart, Jeffrey Owen; Swimmer, Morton Gregory; White, Steve Richard, Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment.
  81. Steinberg, Eran, Method and apparatus for the automatic real-time detection and correction of red-eye defects in batches of digital images or in handheld appliances.
  82. Rowney, Kevin T.; Wolfe, Michael R.; Jones, Chris; Kessler, Dirk; Chen, Hai; Bothwell, Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  83. Rowney,Kevin T.; Wolfe,Michael R.; Jones,Chris; Kessler,Dirk; Chen,Hai; Bothwell,Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  84. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  85. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  86. Holland, Jeffrey W.; Wells, Bradley K., Method and system for generating application simulations.
  87. Indeck, Ronald S.; Indeck, David Mark; Singla, Naveen; Taylor, David E., Method and system for high performance integration, processing and searching of structured and unstructured data.
  88. Indeck, Ronald S.; Indeck, David Mark, Method and system for high performance integration, processing and searching of structured and unstructured data using coprocessors.
  89. Indeck, Ronald S.; Indeck, David Mark, Method and system for high performance integration, processing and searching of structured and unstructured data using coprocessors.
  90. Indeck, Ronald S.; Singla, Naveen; Taylor, David E., Method and system for high performance pattern indexing.
  91. Chin, Frances Mu-Fen; Chou, Jennifer L.; Su, Daisy Feng-Mei; Yang, ZhongJin; Yin, Yu, Method and system for internet censorship.
  92. Bowker Michael ; Sharma Vivek, Method and system for interrupting page delivery operations in a web environment.
  93. Challenger, James R. H.; Ferstat, Cameron; Iyengar, Arun K.; Reed, Paul; Spivak, Gerald A.; Witting, Karen A., Method and system for rapid publishing and censoring information.
  94. Forman, Ernest H., Method and system of converting data and judgements to values or priorities.
  95. Redlich, Ron M.; Nemzow, Martin A., Method and system of quantifying risk.
  96. Jarman, Matthew T.; Iverson, Brent L., Method and user interface for downloading audio and video content filters to a media player.
  97. Jarman, Matthew T.; Iverson, Brent L., Method and user interface for downloading audio and video content filters to a media player.
  98. Krishna Asur Bharat ; Robert Chisolm Miller, Method for learning character patterns to interactively control the scope of a web crawler.
  99. Russell-Falla, Adrian Peter; Hanson, Andrew Bard, Method for scanning, analyzing and handling various kinds of digital information content.
  100. Russell-Falla Adrian Peter ; Hanson Andrew Bard, Method for scanning, analyzing and rating digital information content.
  101. Page, Lawrence E., Method for searching media.
  102. Page, Lawrence E., Method for searching media.
  103. Page, Lawrence E., Method for searching media.
  104. Page,Lawrence E., Method for searching media.
  105. Serena, Frank David, Method of replacing content.
  106. Stockton,Marcia L., Method, system and program product for locating personal information over a network.
  107. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  108. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  109. Bishop, Fred A.; Saunders, Peter D., Methods and apparatus for conducting electronic transactions.
  110. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  111. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  112. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  113. Bishop, Fred Alan; Glazer, Elliott Harold; Gorgol, Zygmunt Steven; Hohle, William G.; Johnson, Michael G.; Johnstone, David E.; Lake, Walter Donald; Royer, Coby; Simkin, Marvin; Swift, Nick; White, Dirk B.; Bennett, Russell, Methods and apparatus for conducting electronic transactions.
  114. Bishop,Fred Alan; Glazer,Elliot Harold; Gorgol,Zygmunt Steven; Hohle,William G.; Johnson,Michael G.; Johnstone,David E; Lake,Walter Donald; Royer,Coby; Simkin,Marvin; Swift,Nick; White,Dirk B; Bennett,Russell, Methods and apparatus for conducting electronic transactions.
  115. Bishop,Fred; Bonalle,David S; Salow,Glen, Methods and apparatus for conducting electronic transactions using biometrics.
  116. Breese John S. ; Kadie Carl M., Methods and apparatus for matching entities and for predicting an attribute of an entity based on an attribute frequency value.
  117. Dugan, Brian M., Methods and apparatus for news delivery.
  118. Tessman, Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  119. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  120. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  121. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  122. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  123. Tessman, Jr.,Gary; Lippert,Patrick D.; Hayman,Timothy B., Monitoring digital images.
  124. Jarman, Matthew T., Multimedia content navigation and playback.
  125. Serena, Frank David, Observation device, method, and computer program product for replacing content.
  126. Petrovskaya, Anna; Varvak, Peter, Optimizing head mounted displays for augmented reality.
  127. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali A.; Ansanelli, Joseph, Personal computing device-based mechanism to detect preselected data.
  128. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitall A., Personal computing device-based mechanism to detect preselected data.
  129. Russell Falla,Adrian Peter; Hanson,Andrew Bard, Rating and controlling access to emails.
  130. Emens Michael Lawrence ; Kraft Reiner ; Sundaresan Neelakantan, Rating hypermedia for objectionable content.
  131. Marks, Daniel L, Real time communications system.
  132. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  133. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  134. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  135. Griffith, John B., Secure unrestricted network for innovation.
  136. Redlich, Ron M.; Nemzow, Martin A., Security system with extraction, reconstruction and secure recovery and storage of data.
  137. Forlenza, Randolph Michael; Rodriguez, Herman, Selective and multiple programmed settings and passwords for web browser content labels.
  138. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Michael; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  139. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Micheal; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  140. Petrovskaya, Anna; Varvak, Peter, Social applications for augmented reality technologies.
  141. Schran,Adam; Neil,Michael J., Supervising monitoring and controlling activities performed on a client device.
  142. Surasathian, Janet, System and method for adapting an internet and intranet filtering system.
  143. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  144. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  145. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  146. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  147. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  148. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  149. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  150. Walker James D. ; Webb Alexander F., System and method for authorizing access to data on content servers in a distributed network.
  151. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  152. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  153. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  154. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  155. Rosen,James S.; Putnam,Christopher M.; Schmitter,Thomas A.; Torop,Daniel, System and method for enabling information associations.
  156. Humes Donald Creig, System and method for filtering data received by a computer system.
  157. Humes, Donald Creig, System and method for filtering data received by a computer system.
  158. Humes, Donald Creig, System and method for filtering data received by a computer system.
  159. Saeidi,Babak, System and method for identifying information.
  160. Chen, Shun; Dandliker, Richard Bruce; DiCorpo, Phillip; Wootton, Bruce Christopher; Kessler, Dirk; Wyatt, Timothy Micheal, System and method for identity consolidation.
  161. Saeidi,Babak, System and method for monitoring and analyzing communications.
  162. Laslo Olah ; Ferenc Friedler ; Zoltan Kovacs HU, System and method for monitoring computer usage.
  163. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  164. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  165. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  166. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  167. Hubbard, Dan, System and method of controlling access to the internet.
  168. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  169. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  170. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  171. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  172. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  173. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  174. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  175. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  176. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  177. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  178. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  179. Ford K. Harlan, System for filtering content from videos.
  180. Ford, K. Harlan, System for filtering content from videos.
  181. Bradshaw Michael S. ; Shih George Y., System to control content and prohibit certain interactive attempts by a person using a personal computer.
  182. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  183. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  184. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  185. Petrovskaya, Anna; Varvak, Peter, Systems and methods for augmented reality preparation, processing, and application.
  186. Petrovskaya, Anna; Varvak, Peter, Systems and methods for augmented reality preparation, processing, and application.
  187. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  188. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  189. Dingle, Adam; Provos, Niels; Schneider, Fritz; Cutts, Matt, Systems and methods for detecting potential communications fraud.
  190. Dingle, Adam; Provos, Niels; Schneider, Fritz; Cutts, Matt, Systems and methods for detecting potential communications fraud.
  191. Dingle, Adam; Provos, Niels; Schneider, Fritz; Cutts, Matt, Systems and methods for detecting potential communications fraud.
  192. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  193. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  194. Reeves, Raymond E.; Youngs, Simon; Koller, Gary D.; Jethwa, Piyush; Peden, Mark D., Systems and methods of filtering an audio speech stream.
  195. Lotvin, Mikhail; Nemes, Richard M., Tracking points related to a user account for online redemption.
  196. Noguchi, Tetsuya; Seki, Naishin, Transmission control system, server, terminal station, transmission control method, program and storage medium.
  197. Brown, Michael Wayne; Lawrence, Kelvin Roderick; Paolini, Michael A., Web page thumbnails and user configured complementary information provided from a server.
  198. Gross, John N.; Gross, Anthony A., Word checking tool for controlling the language content in documents using dictionaries with modifyable status fields.
  199. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
  200. Steinberg, Eran; Bigioi, Petronel; Raducan, Ilariu, Workflow system for detection and classification of images suspected as pornographic.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트