$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System to control content and prohibit certain interactive attempts by a person using a personal computer 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0672105 (1996-06-27)
발명자 / 주소
  • Bradshaw Michael S.
  • Shih George Y.
출원인 / 주소
  • Logon Data Corporation
대리인 / 주소
    Knobbe, Martens, Olson & Bear, LLP
인용정보 피인용 횟수 : 474  인용 특허 : 6

초록

A computer terminal and a method for blocking the use and transmission of vulgar and pornographic material in a responsive and interactive manner that comprehensively monitors computer operations for creation or transmission of vulgar and pornographic material. Data created by the keyboard, data pas

대표청구항

[ What is claimed and desired to be secured by Letters Patent is:] [29.] A computer running under a multi-tasking environment, comprising a blocker that selectively blocks data transmissions within the computer when at least one condition established by a predetermined criteria is met, the selective

이 특허에 인용된 특허 (6)

  1. Hale Robert P. (Irvine CA) Kurashige Jason T. (Irvine CA), Computer security system.
  2. Lantz Kurt C. (Spring TX) Hess Randall L. (Houston TX), Keyboard activated screen blanking.
  3. Clark David K. (Irving TX) Johnson William J. (Flower Mound TX) Lachman Larry M. (Irving TX) Flores David (Keller TX), Local area network peripheral lock method and system.
  4. Canale Leonard M. (Tinton Falls NJ) Kautz Henry A. (Summit NJ) Milewski Allen E. (Red Bank NJ) Selman Bart (Summit NJ), Message filtering techniques.
  5. Scannell Niamh C. (Mountain View CA) Dawson Stuart D. (Reading GB2) Redmond Anthony J. (Dublin IEX) Himbaut Serge (Antibes FRX) Bares Pascale (Villeneuve Loubet FRX) Clark Alison (Morpeth GB2), Method and system for sorting and prioritizing electronic mail messages.
  6. Schloss Robert Jeffrey, System and method for controlling access to data located on a content server.

이 특허를 인용한 특허 (474)

  1. Luna, Michael; Fiatal, Trevor A., 3D mobile user interface with configurable workspace management.
  2. Schlegel, Heather Allison; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Chung, Chris Chih-Shen; Odell, James A.; McNally, Barbara; Enloe, Michael Robert; Wu, Pei-Lin; Richards, Russell William; Inch, Alexis; Cox, David; Zhang, Xiaopeng; Cypes, Gregory; McCormick, David, Account linking.
  3. Barile, Ian, Adaptive data loss prevention policies.
  4. Moussavian, Negeen; Moussavian, Amir; Badiee, Ben; Lewis, Mark, Agreement compliance controlled electronic device throttle.
  5. Moussavian, Negeen; Moussavian, Amir; Badiee, Ben; Lewis, Mark, Agreement compliance controlled information throttle.
  6. Luna, Michael; Tervahauta, Mikko, Aligning data transfer to optimize connections established for transmission over a wireless network.
  7. Jarman, Matthew T., Apparatus and method for blocking audio/visual programming and for muting audio.
  8. Cragun Brian John ; Day Paul Reuben, Apparatus and method for the manual selective blocking of images.
  9. Shakya, Subodh; Zhang, Ruofei, Apparatus and methods for detecting adult videos.
  10. Burman, Kevin; Alderucci, Dean P., Apparatus, processes and articles for facilitating mobile gaming.
  11. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  12. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  13. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  14. Backholm, Ari; Liang, Sheng, Application discovery on mobile devices.
  15. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Application or context aware fast dormancy.
  16. Blattner, Patrick D.; Robinson, John D., Applying access controls to communications with avatars.
  17. Johansson, Jesper Mikael; Canavor, Darren Ernest; Hitchcock, Daniel Wade; Bhimanaik, Bharath Kumar, Approaches for providing multi-factor authentication credentials.
  18. Johansson, Jesper Mikael; McClintock, Jon Arron, Authentication and authorization of a privilege-constrained application.
  19. Taniwaki,George; Chopra,Nitin; Ross,Benjamen Eric; Wood,Matt; Elman,Donald; Pollock,Josh, Automatic correction, and skipping of document design problems based on document types.
  20. Luna, Michael; Bott, Ross, Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network.
  21. Harris, Scott C., Automatic mail rejection feature.
  22. Michael Lawrence Emens ; Reiner Kraft ; Neelakantan Sundaresan, Automatic rating and filtering of data files for objectionable content.
  23. Meyerzon Dmitriy ; Nichols William G., Automatic tagging of documents and exclusion by content.
  24. Christofferson, Frank C.; Miller, Edward M., Automatic teleconferencing control system.
  25. Fiatal, Trevor, Bandwidth measurement.
  26. van Riel, Henri Han, Banning tags.
  27. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Biometric access data encryption.
  28. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Biometric access sensitivity.
  29. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Biometric access sensitivity.
  30. Grawrock, David; Jones, Kevin, Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption.
  31. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  32. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  33. Luna, Michael, Cache state management on a mobile device to preserve user experience.
  34. Kucharewski, Valerie; Traylor, Michael; Buonomo, Michael Anthony; Panzer, John; Mazzeo, Jack, Central people lists accessible by multiple applications.
  35. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timoth T.; Goldman, Phillip Y., Centralized behavioral information system.
  36. Servi,Daniel S.; Tarlton,Mark A., Communication device operation management.
  37. Coverstone, Thomas E., Communication system for sending advertisements based on location determination and previously specified user selections.
  38. Landsman, Richard A., Community messaging lists for authorization to deliver electronic messages.
  39. Oswald, David L., Computer monitor receiver.
  40. Johansson, Jesper Mikael; Canavor, Darren Ernest; Jezorek, Matthew Ryan; Lee, Brian Young, Computing device with integrated authentication token.
  41. Johansson, Jesper Mikael; Canavor, Darren Ernest; Jezorek, Matthew Ryan; Lee, Brian Young, Computing device with integrated authentication token.
  42. Johansson, Jesper Mikael; Canavor, Darren Ernest; Jezorek, Matthew Ryan; Lee, Brian Young, Computing device with integrated authentication token.
  43. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Conditional biometric access in a gaming environment.
  44. Alderucci, Dean P.; Asher, Joseph M.; Papageorgiou, Antonio, Conditional biometric access in a gaming environment.
  45. Gary Lee Mullen-Schultz, Configurable disablement of display objects in a browser.
  46. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
  47. Fiatal, Trevor, Content delivery to a mobile device from a content service.
  48. Leonardo C. Massarani, Content-indexing search system and method providing search results consistent with content filtering and blocking policies implemented in a blocking engine.
  49. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Context aware data presentation.
  50. Rodney A. Korn ; Gregory H. Kisor ; Richard C. Calderwood, Controlling data transmissions from a computer.
  51. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  52. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  53. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  54. Fleming, Michael, Cross-platform event engine.
  55. Moussavian, Negeen; Moussavian, Amir; Badiee, Ben; Lewis, III, Mark, Data mining system for agreement compliance controlled information throttle.
  56. Bennett, Dominic; Hu, Dan, Database structure and front end.
  57. Sherman, David L.; Sterne, Daniel F.; Lawler, Geoffrey T.; Heyman, Michael D., Decryption system and method for network analyzers and security programs.
  58. Jarman, Matthew, Delivery of navigation data for playback of audio and video content.
  59. Jarman, Matthew T., Delivery of navigation data for playback of audio and video content.
  60. Jarman, Matthew T., Delivery of navigation data for playback of audio and video content.
  61. Jarman, Matthew T., Delivery of navigation data for playback of audio and video content.
  62. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  63. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  64. Luna, Michael, Detecting and preserving state for satisfying application requests in a distributed proxy and cache system.
  65. Wetherall, David J.; Savage, Stefan R.; Anderson, Thomas E., Detecting and preventing undesirable network traffic from being sourced out of a network domain.
  66. Bruening, Oskar; Fridman, Vitali, Detecting policy violations in information content containing data in a character-based language.
  67. Luna, Michael; Bott, Ross, Detection and management of user interactions with foreground applications on a mobile device in distributed caching.
  68. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Device detection.
  69. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  70. Luna, Michael; Bott, Ross, Device resources sharing for network resource conservation.
  71. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Device with time varying signal.
  72. Luna, Michael; Haines, John, Distributed caching for resource and mobile network traffic management.
  73. Luna, Michael; Tsõmbaljuk, Andrei, Distributed caching in a wireless network of content delivered for a mobile application over a long-held request.
  74. Backholm, Ari; Luna, Michael, Distributed implementation of dynamic wireless traffic policy.
  75. Luna, Michael; Tervahauta, Mikko, Distributed management of keep-alive message signaling for mobile network resource conservation and optimization.
  76. Luna, Michael; Ponomarenko, Andrei, Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  77. Lai, William Y.; Kalki, Jagadeesh, Distributing notifications to multiple recipients via a broadcast list.
  78. Gross,John N.; Gross,Anthony A., Document distribution control system and method based on content.
  79. Luna, Michael, Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications.
  80. Luna, Michael; Bott, Ross, Dynamic categorization of applications for network access in a mobile network.
  81. Appelman, Barry; Buonviri, Terry Christian; Buonviri, Joseph Paul; Erickson, Andrew Ivar; Jarmolowski, Thomas; Weltman, Robert Eugene, Dynamic identification of other users to an online user.
  82. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Dynamic location of a subordinate user.
  83. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Dynamic online and geographic location of a user.
  84. Satoru Kikugawa JP, Electronic bulletin board system.
  85. Appelman, Barry; Hussain, Muhammad Mohsin, Electronic message delivery based on presence information.
  86. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Electronic message system with federation of trusted senders.
  87. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Susan Rayl, Electronic message system with federation of trusted senders.
  88. Odell, James A.; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Bergstrom, Raine; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Electronic messaging using reply telephone numbers.
  89. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  90. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  91. Donahue, Thomas P., Employee internet management device.
  92. Donahue,Thomas P., Employee internet management device.
  93. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Enhanced buddy list using mobile device identifiers.
  94. Bott, Ross, Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network.
  95. Simon,Daniel R.; Balfanz,Dirk, Enhancing computer system security via multiple user desktops.
  96. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  97. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  98. Ariel, Ido; van Gent, Robert Paul, Extending user relationships.
  99. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  100. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  101. Heiner, Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  102. Goldman, Phillip Y.; Landsman, Richard A.; Migliore, Michael R.; Heiner, Jeffrey N.; Logue, Jay, Filtering electronic messages while permitting delivery of solicited electronics messages.
  103. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  104. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  105. Luna, Michael, Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation.
  106. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, Flexible billing architecture.
  107. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  108. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  109. Asher, Joseph M.; Rushin, Ron; Alderucci, Dean P.; Gelman, Geoffrey M., Game access device.
  110. Asher, Joseph M.; Rushin, Ron; Alderucci, Dean P.; Gelman, Geoffrey M., Game access device with privileges.
  111. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Game access device with time varying signal.
  112. Gelman, Geoffrey M.; Rushin, Ronald; Alderucci, Dean P.; Asher, Joseph M., Game account access device.
  113. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., Gaming system with identity verification.
  114. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert E.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., Gaming system with location determination.
  115. Luna, Michael; Bott, Ross, Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization.
  116. Schnackenberg, Daniel D.; Schnackenberg, legal representative, Janell; Bunn, Kelly S.; Donofrio, Thomas E.; Arnold, Steven L.; Reid, Travis S.; Hammond, Ryan D., High-assurance file-driven content filtering for secure network server.
  117. Haghpassand, Joshua, Highly accurate security and filtering software.
  118. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  119. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  120. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  121. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Host-based intelligent results related to a character stream.
  122. Morimoto Osamu,JPX, Hyper text reading system.
  123. Shuster, Gary Stephen, Identifying and characterizing electronic files using a two-stage calculation.
  124. Ben-Yoseph, Roy, Identifying and using identities deemed to be known to a user.
  125. Ben-Yoseph, Roy, Identifying and using identities deemed to be known to a user.
  126. Alles, David; Moore, George M., Identity-based distributed computing for device resources.
  127. Lewis, Sheena; Malkin, Peter K.; Oduor, Kenya F.; Rhodes, Philippa M., Inappropriate content detection method for senders.
  128. Jung, Kil soo; Moon, Seong jin, Information storage medium storing a plurality of titles, reproducing apparatus and method thereof.
  129. Jung, Kil-soo; Moon, Seong-jin, Information storage medium storing a plurality of titles, reproducing apparatus and method thereof.
  130. Jung, Kil-soo; Moon, Seong-jin, Information storage medium storing a plurality of titles, reproducing apparatus and method thereof.
  131. Jung, Kil-soo; Moon, Seong-jin, Information storage medium storing a plurality of titles, reproducing apparatus and method thereof.
  132. Hunter, Edward; Moussavian, Negeen; Moussavian, Amir; Lewis, Mark, Information throttle based on compliance with electronic communication rules.
  133. Nicholls, Jonathan; Hunter, Edward; Moussavian, Negeen; Moussavian, Amir; Lewis, Mark, Information throttle that enforces policies for workplace use of electronic devices.
  134. Fiatal, Trevor, Integrated messaging.
  135. Fiatal, Trevor, Integrated messaging.
  136. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent client capability-based results related to a character stream.
  137. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent community based results related to a character stream.
  138. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent map results related to a character stream.
  139. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent messaging label results related to a character stream.
  140. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  141. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  142. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  143. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  144. Fleming, Michael, Intelligent rendering of information in a limited display environment.
  145. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results based on database queries.
  146. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results related to a character stream.
  147. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results related to a portion of a search query.
  148. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results using a spelling correction agent.
  149. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent results using an assistant.
  150. Mehanna, Lara; Hasan, Shawkat; Vandermolen, Harmannus; Campbell, Gerald, Intelligent vendor results related to a character stream.
  151. Fiatal, Trevor; Guesman, Jason, Location-based operations and messaging.
  152. Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Maintaining an IP connection in a mobile network.
  153. Backholm, Ari; Ahonen, Jukka; Groeber, Marcus; Salorinne, Seppo; Vuornos, Lauri; Saarlilahti, Antti; Ketonen, Marko; Salmi, Petri, Maintaining mobile terminal information for secure communications.
  154. Luna, Michael; Bott, Ross, Managing cache to prevent overloading of a wireless network due to user activity.
  155. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  156. Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing electronic messages.
  157. Ben-Yoseph, Roy, Managing electronic messages based on inference scores.
  158. Odell, James A.; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Bergstrom, Raine; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Managing electronic messages sent to reply telephone numbers.
  159. Landsman,Richard A.; Sullivan,Timothy Thomas; Logue,Jay Dare, Managing electronic messages using contact information.
  160. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Managing forwarded electronic messages.
  161. Logue, Jay; Heiner, Jeffrey N.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing self-addressed electronic messages.
  162. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Managing user-to-user contact with inferred presence information.
  163. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali, Mechanism to search information content for preselected data.
  164. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali, Mechanism to search information content for preselected data.
  165. Jarman, Matthew T.; Iverson, Brent L., Media player configured to receive playback filters from alternative storage mediums.
  166. Odell, James A.; Bergstrom, Raine; Appelman, Barry; Wick, Andrew L.; Keister, Alan; Yin, Xiaoyan; McNally, Barbara; Hullfish, Keith C., Message delivery control settings.
  167. Lu, Larry L., Message screening system.
  168. Lu, Larry L., Message screening system.
  169. Lu,Larry L., Message screening system.
  170. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  171. Lu, Larry L., Message screening system utilizing supervisory screening and approval.
  172. Landsman, Richard A., Messaging systems and methods.
  173. Landsman, Richard A., Messaging systems and methods.
  174. Black, Robert Barth, Method and aparatus for presence based resource management.
  175. Hoashi, Keiichirou; Inoue, Naomi; Hashimoto, Kazuo, Method and apparatus for automatic information filtering using URL hierarchical structure and automatic word weight learning.
  176. Jones, Christopher; Desjardins, Daren; Bothwell, Eric; Fontana, Alexander, Method and apparatus for automatically correlating related incidents of policy violations.
  177. Ro,Yong Man, Method and apparatus for blocking contents of pornography on internet.
  178. Cowden,Jax B.; Dahlstrom,Kevin V.; Eagle,Scott G.; Gilbert,Charles; Hollrah,Philip D.; Martin,Anthony G.; McFadden,Jeffrey A.; Pennell,Mark E.; Silverberg,Marc E., Method and apparatus for blocking unwanted windows.
  179. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  180. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  181. Pennell, Mark E.; Primak, L. Scott; Gilbert, Charles, Method and apparatus for defeating a mechanism that blocks windows.
  182. Zoppas, Michel; Hermann, Jeremy; O'Raghallaigh, Conal; Bothwell, Eric; Fontana, Alexander, Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema.
  183. Kay, James, Method and apparatus for electronic mail filtering.
  184. Kay, James, Method and apparatus for electronic mail filtering.
  185. Kay, James, Method and apparatus for electronic mail filtering.
  186. Rowney, Kevin T.; Fridman, Vitali; Bothwell, Eric, Method and apparatus for handling messages containing pre-selected data.
  187. Shuster, Gary Stephen, Method and apparatus for identifying and characterizing errant electronic files.
  188. Shuster, Gary Stephen, Method and apparatus for identifying and characterizing errant electronic files.
  189. Shuster, Gary Stephen, Method and apparatus for identifying and characterizing errant electronic files.
  190. Fiatal, Trevor A.; Sutaria, Jay; Nanjundeswaran, Sridhar; Bavadekar, Shailesh, Method and apparatus for intercepting events in a communication system.
  191. Gassen, Derek; Donahue, Thomas P., Method and apparatus for predictive and actual intrusion detection on a network.
  192. Black, Robert Barth, Method and apparatus for presence based resource management.
  193. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  194. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  195. Cowden,Jax B.; Dahlstrom,Kevin V.; Eagle,Scott G.; Gilbert,Charles; Hollrah,Philip D.; Martin,Anthony G.; McFadden,Jeffrey A.; Pennell,Mark E.; Silverberg,Marc E., Method and apparatus for providing information regarding computer programs.
  196. Bennett, Dominic; Paczkowski, Remigiusz K., Method and apparatus for responding to request for information-personalization.
  197. Steinberg, Eran, Method and apparatus for the automatic real-time detection and correction of red-eye defects in batches of digital images or in handheld appliances.
  198. Bonnie J. Lowell, Method and apparatus for tracking network usage.
  199. Rowney, Kevin T.; Wolfe, Michael R.; Jones, Chris; Kessler, Dirk; Chen, Hai; Bothwell, Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  200. Rowney,Kevin T.; Wolfe,Michael R.; Jones,Chris; Kessler,Dirk; Chen,Hai; Bothwell,Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  201. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  202. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  203. Bates, Cary Lee; Cragun, Brian John; Day, Paul Reuben, Method and computer program product for implementing parental supervision for internet browsing.
  204. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  205. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  206. Heikes, Brian Dean; Krantz, Kristine Amber; Mathews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Jr., Richard W.; Roman, Perry E. Miranda; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah Ruth, Method and system for capturing instant messages.
  207. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  208. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  209. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  210. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  211. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  212. de Vries,Jeffrey; Zavertnik,Gregory, Method and system for executing a software application in a virtual environment.
  213. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  214. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  215. Luna, Michael; Tervahauta, Mikko; Pan, Yixin, Method and system for management of a virtual network connection without heartbeat messages.
  216. Cunningham Mark,GBX ; Trevarrow Andrew,GBX, Method and system for monitoring and controlling network access.
  217. Yuri Urazov ; Evgueni Belitski, Method and system for providing data to a user based on a user's query.
  218. Goodman, Daniel I., Method and system for real-time control of document printing.
  219. Goodman, Daniel I., Method and system for real-time control of document printing.
  220. Jarman, Matthew T.; Iverson, Brent L., Method and user interface for downloading audio and video content filters to a media player.
  221. Goulden, David L.; Gilbert, Charles; Zeldin, Craig, Method for attributing and allocating revenue related to embedded software.
  222. Vinati,Samuele; Vinati,Felice; Berardinelli,Ivan, Method for controlling access to a data communication network, with user identification.
  223. Jude Gerard Dieterman, Method for controlling the delivery of electronic mail messages.
  224. Dietl Bo ; Warman Edward ; Balan Sajay ; Rybalko Oleg, Method for performing in interactive review of data contents of a computer.
  225. Russell-Falla, Adrian Peter; Hanson, Andrew Bard, Method for scanning, analyzing and handling various kinds of digital information content.
  226. Dougu, Toshio; Takahashi, Noriyuki, Method of and apparatus for controlling access to the internet in a computer system and computer readable medium storing a computer program.
  227. MacPhail, Margaret Gardner, Method to keep a persistent trace of weblink use per user.
  228. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  229. Appelman, Barry; Hussain, Muhammad Mohsin, Methods and system for delivering multiple notifications.
  230. Heikes, Brian D.; Krantz, Kristine Amber; Matthews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Richard W.; Roman, Perry E.; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah R., Methods and systems for capturing and managing instant messages.
  231. Schepis, Adam; Newstadt, Keith, Methods and systems for enforcing parental-control policies on user-generated content.
  232. Hew, Chin; Kyaw, Thu Rein, Methods and systems for restricting electronic content access based on guardian control decisions.
  233. Heikes, Brian Dean; Krantz, Kristine Amber; Mathews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Jr., Richard W.; Roman, Perry E. Miranda; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah Ruth, Methods for capturing electronic messages based on capture rules relating to user actions regarding received electronic messages.
  234. Heikes, Brian Dean; Krantz, Kristine Amber; Mathews, Kelly Monroe; Medeiros, Russell Scott; Ramanathan, Venkatesh; Robinson, Jr., Richard W.; Roman, Perry E. Miranda; Sears, Edward L.; Wick, Andrew L.; Yurow, Deborah Ruth, Methods for controlling display of electronic messages captured based on community rankings.
  235. Ben-Yoseph, Roy, Methods of providing access to messages based on degrees of separation.
  236. Luna, Michael, Mobile application traffic optimization.
  237. Luna, Michael; Ylinen, Heikki; Salorinne, Seppo, Mobile application traffic optimization.
  238. Luna, Michael, Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation.
  239. Fiatal, Trevor, Mobile device configured for communicating with another mobile device associated with an associated user.
  240. Alisawi, Rami, Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network.
  241. Luna, Michael, Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor.
  242. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
  243. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Mobile device with application or context aware fast dormancy.
  244. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management.
  245. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management with optimized polling intervals.
  246. Backholm, Ari; Bott, Ross; Luna, Michael, Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system.
  247. Backholm, Ari; Luna, Michael; Ylinen, Heikki, Mobile network traffic coordination across multiple applications.
  248. Luna, Michael, Mobile network traffic coordination across multiple applications.
  249. Luna, Michael; Backholm, Ari, Mobile traffic categorization and policy for network use optimization while preserving user experience.
  250. Fiatal, Trevor, Mobile virtual network operator.
  251. Fiatal, Trevor, Mobile virtual network operator.
  252. Blattner, Patrick D., Modifying avatar behavior based on user action or mood.
  253. Tessman, Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  254. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  255. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  256. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  257. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  258. Luna, Michael; Bott, Ross, Monitoring mobile application activities for malicious traffic on a mobile device.
  259. Amaitis, Lee; Williams, Paul; Tara, Sunny, Multi-process communication regarding gaming information.
  260. Amaitis, Lee; Williams, Paul; Tara, Sunny; Morrissette, Matthew, Multi-process communication regarding gaming information.
  261. Jarman, Matthew, Multimedia content navigation and playback.
  262. Jarman, Matthew T., Multimedia content navigation and playback.
  263. Mandri, Giuseppe Li, Multimedia educational system.
  264. Blattner, Patrick D.; Robinson, John D.; Weaver, Andrew C., Multiple avatar personalities.
  265. Blattner, Patrick D.; Robinson, John D.; Weaver, Andrew C., Multiple avatar personalities.
  266. Blattner, Patrick D.; Robinson, John D.; Weaver, Andrew C., Multiple avatar personalities.
  267. Sutaria, Jay; Gustafson, Brian Daniel; van Gent, Robert Paul; Lin, Ruth; Merriwether, David; Sawhney, Parvinder, Multiple data store authentication.
  268. Weaver, Andrew; Wolf, Eric Jeffrey; McCool, Julie; Mills, Julie; Heikes, Brian, Multiple personalities.
  269. Maude, Peter; Hildreth, Adam, Net moderator.
  270. Maude, Peter; Hildreth, Adam, Net moderator.
  271. Lamb,Richard H.; Guzovsky,Eduard, Network access control using network address translation.
  272. Pauley, Justin, Network appliance for monitoring network requests for multimedia content.
  273. Pauley, Justin, Network appliance for monitoring network requests for multimedia content.
  274. Milan V. Trcka ; Kenneth T. Fallon ; Mark R. Jones ; Ronald W. Walker, Network security and surveillance system.
  275. Appelman, Barry; Hussain, Muhammad Mohsin, Notification archive.
  276. Austin-Lane, Christopher Emery, Offline alerts mechanism.
  277. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang, Operating system and data protection.
  278. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang, Operating system and data protection.
  279. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang, Operating system and data protection.
  280. Bott, Ross; Luna, Michael, Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic.
  281. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  282. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  283. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  284. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  285. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  286. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  287. Luna, Michael, Optimization of mobile traffic directed to private networks and operator configurability thereof.
  288. Luna, Michael; Campbell, Stan, Optimization of resource polling intervals to satisfy mobile device requests.
  289. Wendling, Michael; Kokhanovskyi, Andrii; Backholm, Ari; Bott, Ross, Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion.
  290. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  291. Coverstone, Thomas E., Parental control of access to information from a computer system.
  292. Moussavian, Negeen; Moussavian, Amir; Lewis, Mark; Duke, III, Godfrey Lawrence, Partial information throttle based on compliance with an agreement.
  293. Kucharewski, Valerie; Traylor, Michael; Buonomo, Michael Anthony; Panzer, John; Mazzeo, Jack, People lists.
  294. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali A.; Ansanelli, Joseph, Personal computing device-based mechanism to detect preselected data.
  295. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitall A., Personal computing device-based mechanism to detect preselected data.
  296. Cowan, Stanley Crispin; Arnold, Seth Richard; Beattie, Steven Michael; Wagle, Perry Michael, Pointguard: method and system for protecting programs against pointer corruption attacks.
  297. Cowan, Stanley Crispin; Arnold, Seth Richard; Beattie, Steven Michael; Wagle, Perry Michael, Pointguard: method and system for protecting programs against pointer corruption attacks.
  298. Fiatal, Trevor, Policy based content service.
  299. Fiatal, Trevor, Polling.
  300. Goldman, Phillip Y., Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses.
  301. Fiatal, Trevor, Predictive content delivery.
  302. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Presenting dynamic location of a user.
  303. Backholm, Ari, Provisioning applications for a mobile device.
  304. Backholm, Ari, Provisioning applications for a mobile device.
  305. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  306. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  307. Alisawi, Rami, Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network.
  308. van Gent, Robert Paul; Ariel, Ido, Publishing data in an information community.
  309. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  310. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  311. Russell Falla,Adrian Peter; Hanson,Andrew Bard, Rating and controlling access to emails.
  312. Emens Michael Lawrence ; Kraft Reiner ; Sundaresan Neelakantan, Rating hypermedia for objectionable content.
  313. Blattner, Patrick D.; Robinson, John D., Reactive avatars.
  314. Blattner, Patrick D.; Robinson, John D., Reactive avatars.
  315. Blattner,Patrick D.; Robinson,John D., Reactive avatars.
  316. Appelman, Barry; Hussain, Muhammad Mohsin, Reconfiguring an electronic message to effect an enhanced notification.
  317. Petropoulakis, Lykourgos; Stephen, Bruce, Remote monitoring by tracking, storing, and analyzing user interactions with an operating system of a data processing device.
  318. Luna, Michael; Tsõmbaljuk, Andrei, Request and response characteristics based adaptation of distributed caching in a mobile network.
  319. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  320. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  321. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  322. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  323. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  324. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  325. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  326. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  327. Hitomi, Arthur Shingen; Tran, Robert; Kammer, Peter Joseph; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  328. Hitomi, Arthur Shingen; Tran, Robert; Kammer, Peter Joseph; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  329. Hitomi, Arthur Shingen; Tran, Robert; Kammer, Peter Joseph; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  330. Badiee, Ben; Moussavian, Amir; Lewis, Mark, Schedule and location responsive agreement compliance controlled device throttle.
  331. Badiee, Ben; Moussavian, Amir; Lewis, Mark, Schedule and location responsive agreement compliance controlled information throttle.
  332. Badiee, Ben; Moussavian, Amir; Lewis, Mark, Schedule and location responsive agreement compliance controlled information throttle.
  333. Martin, Anthony G., Search engine for a computer network.
  334. Lowe, John C., Second person review of E-mail.
  335. Lowe, John C., Second person review of email.
  336. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  337. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  338. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  339. Luna, Michael, Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic.
  340. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Michael; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  341. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Micheal; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  342. Cottrille Scott C. ; Bakshi Ashesh P., Server-side chat monitor.
  343. Backholm, Ari, Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols.
  344. Jackson, Lincoln; Wilde, Thomas, Smart browser panes.
  345. Luna, Michael; Bott, Ross, Social caching for device resource sharing and management.
  346. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  347. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  348. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  349. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  350. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  351. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  352. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  353. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  354. Goldman, Phillip Y; Landsman, Richard A, Sorting electronic messages using attributes of the sender address.
  355. Goldman,Phillip Y.; Landsman,Richard A., Sorting electronic messages using attributes of the sender address.
  356. Kirby, James M, Speech screening.
  357. Austin-Lane, Christopher Emery, State change alerts mechanism.
  358. Austin-Lane, Christopher Emery, State change alerts mechanism.
  359. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang; Vohariwatt, Janet; Murray, Timothy John, Stored memory recovery system.
  360. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang; Vohariwatt, Janet; Murray, Timothy John, Stored memory recovery system.
  361. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang; Vohariwatt, Janet; Murray, Timothy John, Stored memory recovery system.
  362. Shen,Andrew W.; Sun,Hanxiang; Jian,Zhang; Vohariwatt,Janet; Murray,Timothy John, Stored memory recovery system.
  363. de Vries, Jeffrey; Zavertnik, Greg; Hubbell, Ann, Streaming from a media device.
  364. de Vries, Jeffrey; Zavertnik, Greg; Hubbell, Ann, Streaming from a media device.
  365. Schuler, John A., Supervised access computer network router.
  366. Lu, Larry L.; O' Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  367. Lu, Larry L.; O'Laughlen, Eric; Crowley, John, Supervising user interaction with online services.
  368. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  369. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  370. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  371. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  372. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  373. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  374. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  375. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  376. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  377. Walker James D. ; Webb Alexander F., System and method for authorizing access to data on content servers in a distributed network.
  378. Clarke, Matthew; Robertson, Marek, System and method for automated alerts in anticipation of inappropriate communication.
  379. Waggoner, Steven E., System and method for automated data retrieval based on data placed in clipboard memory.
  380. Waggoner, Steven E., System and method for automated data retrieval based on data placed in clipboard memory.
  381. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  382. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  383. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  384. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., System and method for convenience gaming.
  385. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., System and method for convenience gaming.
  386. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  387. Jois Suresh Krishna ; Stankovic Alex ; Stankovic William ; Dressel Arthur, System and method for dynamic data interaction in a hypertext data processing system.
  388. Rosen,James S.; Putnam,Christopher M.; Schmitter,Thomas A.; Torop,Daniel, System and method for enabling information associations.
  389. Fleming, Michael, System and method for executing commands that are non-native to the native environment of a mobile device.
  390. Humes, Donald Creig, System and method for filtering data received by a computer system.
  391. Humes, Donald Creig, System and method for filtering data received by a computer system.
  392. Saeidi,Babak, System and method for identifying information.
  393. Chen, Shun; Dandliker, Richard Bruce; DiCorpo, Phillip; Wootton, Bruce Christopher; Kessler, Dirk; Wyatt, Timothy Micheal, System and method for identity consolidation.
  394. Chernin, Michael A., System and method for integrating a proxy server, an e-mail server, and a DHCP server, with a graphic interface.
  395. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  396. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  397. Saeidi,Babak, System and method for monitoring and analyzing communications.
  398. Laslo Olah ; Ferenc Friedler ; Zoltan Kovacs HU, System and method for monitoring computer usage.
  399. de Vries,Jeffrey, System and method for predictive streaming.
  400. Fiatal, Trevor, System and method for providing a network service in a distributed fashion to a mobile device.
  401. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for providing wireless gaming as a service application.
  402. Luna, Michael; Diederich, Anton, System and method for reduction of mobile network traffic used for domain name system (DNS) queries.
  403. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, System and method for tracking billing events in a mobile wireless network for a network operator.
  404. de Vries, Jeffrey, System and method for tracking changes to files in streaming applications.
  405. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming system with alerts.
  406. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming system with user profiles.
  407. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming with location determination.
  408. Amaitis, Lee M.; Asher, Joseph M.; Bahrampour, Robert F.; Mylet, Darrin M.; Wilkins, Alan B.; Lutnick, Howard W., System and method for wireless gaming with location determination.
  409. Fiatal, Trevor, System and method of a relay server for managing communications and notification between a mobile device and a web access server.
  410. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  411. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  412. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  413. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  414. Hubbard, Dan, System and method of controlling access to the internet.
  415. Knauft, Christopher L.; Franklin, Martin, System and method of dynamically generating index information.
  416. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  417. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  418. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  419. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  420. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  421. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  422. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  423. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  424. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  425. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  426. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  427. Grassle, Geoffrey J., System for character-child interaction with adult character control.
  428. Bennett, Dominic V.; Hu, Dan, System for database reporting.
  429. Fiatal, Trevor, System for providing policy based content service in a mobile network.
  430. Quine, Douglas B.; Blue, Richard D, System for selective delivery of electronic communications.
  431. Luna, Michael, System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation.
  432. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  433. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  434. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  435. Bowman-Amuah Michel K., System, method and article of manufacture for security management in a development architecture framework.
  436. Backholm, Ari; Alisawi, Rami, Systems and methods for application management of mobile device radio state promotion and demotion.
  437. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  438. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  439. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  440. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  441. Appelman, Barry; Hussain, Muhammad Mohsin, Systems and methods for notification delivery.
  442. Appelman, Barry; Hussain, Muhammad Mohsin, Systems and methods for notification management and delivery.
  443. Alderucci, Dean; Asher, Joseph M.; Bahrampour, Robert F.; Burman, Kevin; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  444. Alderucci, Dean; Asher, Joseph M.; Bahrampour, Robert F.; Burman, Kevin; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  445. Alderucci, Dean; Asher, Joseph M.; Bahrampour, Robert F.; Burman, Kevin; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  446. Alderucci, Dean; Burman, Kevin; Asher, Joseph M.; Coffey, James J.; Rushin, Ronald, Systems and methods for providing access to wireless gaming devices.
  447. Appelman, Barry; Hussain, Muhammad Mohsin, Systems and methods for reconfiguring electronic messages.
  448. Woods,Jonathan; Wynne,Ed, Systems and methods for site access.
  449. Goulden, David L.; Shevach, Matthew A.; Bennett, Dominic, Techniques for displaying impressions in documents delivered over a computer network.
  450. Christofferson,Frank C.; Miller,Edward M., Teleconferencing bridge with EdgePoint mixing.
  451. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., Time and location based gaming.
  452. Amaitis, Lee M.; Asher, Joseph M.; Lutnick, Howard W.; Mylet, Darrin M.; Wilkins, Alan B., Time and location based gaming.
  453. Appelman, Barry; Hussain, Muhammad Mohsin, Time based electronic message delivery.
  454. Nguyen, Hong T; Silver, Edward M; Roberts, Linda A., Time control of internet usage.
  455. Luna, Michael; Tervahauta, Mikko, Timing of keep-alive messages used in a system for mobile network resource conservation and optimization.
  456. Tyler, Stephen Leslie; Hardy, Rodney Bernard James, URL-based facility enablement.
  457. Martin, Anthony G.; Vandevelde, Scott; Goulden, David L., Updating content of presentation vehicle in a computer network.
  458. Luna, Michael; Bott, Ross, User as an end point for profiling and optimizing the delivery of content and data in a wireless network.
  459. Hullfish, Keith C.; Carey, Charles A.; Longe, Michael R.; Parr, Joe, User-defined electronic message preferences.
  460. Levinson,David S., Using an avatar to generate user profile information.
  461. Levinson, David S., Using user profile information to determine an avatar and/or avatar characteristics.
  462. Kirsch Steven T., Web scan process.
  463. Fiatal, Trevor, Web-based access to data objects.
  464. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  465. Haghpassand, Joshua, Web-based security and filtering system with proxy chaining.
  466. Jeffrey, Joel, Wide-spectrum information search engine.
  467. Jeffrey,Joel, Wide-spectrum information search engine.
  468. Joel Jeffrey, Wide-spectrum information search engine.
  469. Coverstone, Thomas E., Wireless communication system and method for sending a notification of proximity of a first wireless communications device to a second wireless communication device.
  470. Coverstone, Thomas E., Wireless communication system and method for sending a notification of proximity of a first wireless communications device to a second wireless communication device.
  471. Luna, Michael, Wireless traffic management system cache optimization using http headers.
  472. Gross, John N.; Gross, Anthony A., Word checking tool for controlling the language content in documents using dictionaries with modifyable status fields.
  473. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
  474. Steinberg, Eran; Bigioi, Petronel; Raducan, Ilariu, Workflow system for detection and classification of images suspected as pornographic.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로