$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

User controlled browser identification disclosing mechanism 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0752421 (1996-11-19)
발명자 / 주소
  • Rowland Bruce R.
  • Friedman Lee G.
출원인 / 주소
  • NCR Corporation
대리인 / 주소
    Tuo
인용정보 피인용 횟수 : 205  인용 특허 : 0

초록

A user-controlled information disclosure process for web user identification. In this process, a user information database, a BrowserID Client applet, and a BrowserID Website database are configured at a user terminal. The user information database contains a plurality of information records about a

대표청구항

[ What is claimed is:] [1.] A method for providing information to a web site at a user terminal, comprising the steps of:at the user terminal,(a) establishing a plurality of information records with respective access level indicators for indicating access levels;(b) receiving a request from the web

이 특허를 인용한 특허 (205)

  1. McDade, Robert W.; Krook, Anne K.; Bouman, Bonnie, Alternative browse graphs for viewing data.
  2. Damale, Shridhar, Capturing and replaying application sessions using resource files.
  3. Damale, Shridhar, Capturing and replaying application sessions using resource files.
  4. Burch, Lloyd Leon; Vedula, Srinivas, Cardspace history validator.
  5. Norman, James Mark; Sanders, Daniel S., Chaining information card selectors.
  6. Takeo Horiguchi JP; Yosuke Tajika JP; Kazuaki Iwamura JP, Communication equipment and method for business card information interchange.
  7. Dent, Warren T.; Kaethler, Judy; Remington, Darren B.; Saliba, Bassam A., Consumer-based system and method for managing and paying electronic billing statements.
  8. Dent, Warren T.; Kaethler, Judy; Remington, Darren B.; Saliba, Bassam A., Consumer-based system and method for managing and paying electronic billing statements.
  9. Kataoka, Mitsuteru, Control content transmission method and storage-based broadcasting system.
  10. Buss, Duane F.; Felsted, Patrick R.; Hodgkinson, Andrew A.; Sanders, Daniel S., Credential categorization.
  11. Al-Salqan, Yayha; Varma, Sangeeta; Ranganathan, Aravindan, Cryptographic authorization with prioritized authentication.
  12. Barber, Timothy P., Detecting online fraud by proxy piercing to identify address of a user device involved in an online transaction.
  13. Gardner Valerie A., Determining and verifying user data.
  14. Yarsa, Julianne; Rich, Bruce Arland; Shrader, Theodore Jack London; Skibbie, Donna, Determining browser type in an open Java environment.
  15. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  16. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  17. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  18. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  19. Wenig, Robert I.; Punjabi, Manoj, Dynamically configurable session agent.
  20. Douvikas, James G.; Sheehy, Terry R.; McKay, Christopher W. T., E-service to manage contact information with privacy levels.
  21. Remington,Darren B.; Dent,Warren T., Electronic bill presentment and payment system.
  22. Remington,Darren B.; Dent,Warren T., Electronic bill presentment and payment system.
  23. Remington, Darren B.; Dent, Warren T., Electronic bill presentment and payment system with bill dispute capabilities.
  24. Masters, Richard R., Enabling application level persistence between a server and another resource over a network.
  25. Masters,Richard R., Enabling encryption of application level persistence between a server and a client.
  26. Celik, Feyzi; Nowak, Marcin; DeGrace, Chris; Finn, Jeffrey S., Event sharing.
  27. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  28. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  29. Guenthner Timothy John ; Lawlor Francis Daniel ; Schmitt Charles Rudolph, High availability web browser access to servers.
  30. Barber, Timothy P., Identifying and marketing to a user device involved in an online transaction.
  31. Kubo Toru,JPX ; Horiuchi Yasuhide,JPX ; Terasaki Satoshi,JPX, Information acquisition proxy system and information transfer managing system.
  32. Hodgkinson, Andrew A.; Norman, James M., Information card overlay.
  33. Goodwin, III, James S.; Jain, Amit; Natarajan, Ravi, Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels.
  34. Gaware, Amit G.; Hu, Teng; Lee, David P.; Shah, Ankur B., Intelligent analysis based self-scheduling browser reminder.
  35. Adam J. Simonoff, Interactive communication system permitting increased collaboration between users.
  36. Gampper, James Michael, Internet data access acknowledgment applet and method.
  37. Cirinna,Mark; Mason,John; Jones,Steve; Massaro,Diana; Rosckes,Renay, Logical architecture for business-to-employee web services.
  38. Klug, John R., Media content notification via communications network.
  39. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  40. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  41. Black, Robert Barth, Method and aparatus for presence based resource management.
  42. Nagaratnam Nataraj ; Byrne Steven B., Method and apparatus for controlling software access to system resources.
  43. Kay, James, Method and apparatus for electronic mail filtering.
  44. Kay, James, Method and apparatus for electronic mail filtering.
  45. Kay, James, Method and apparatus for electronic mail filtering.
  46. Powell, Travis Spence; Caspi, Nadav; Wenig, Robert I.; Herda, Wolf; Dietrich, Gerard, Method and apparatus for generating privacy profiles.
  47. Powell, Travis Spence; Caspi, Nadav; Singhania, Ashwin; Wenig, Robert I., Method and apparatus for intelligent capture of document object model events.
  48. Powell, Travis Spence; Caspi, Nadav; Singhania, Ashwin; Wenig, Robert I., Method and apparatus for intelligent capture of document object model events.
  49. Powell, Travis Spence; Caspi, Nadav; Singhania, Ashwin; Wenig, Robert I., Method and apparatus for intelligent capture of document object model events.
  50. Montulli, Lou, Method and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes.
  51. Wenig, Robert; Dawes, John; Berkley, John; Gettier, Al; Saathoff, Kirk; Herda, Wolf; Austin, Paul; Knudsen, Ted, Method and apparatus for monitoring and synchronizing user interface events with network data.
  52. Wenig, Robert; Dawes, John; Berkley, John; Gettier, Al; Saathoff, Kirk; Herda, Wolf; Austin, Paul; Knudsen, Ted, Method and apparatus for monitoring and synchronizing user interface events with network data.
  53. Black, Robert Barth, Method and apparatus for presence based resource management.
  54. Robert Edward Markowitz ; Steven Howard Nurenberg ; Kenneth H. Rosen, Method and apparatus for providing multimedia buffering capabilities based on assignment weights.
  55. Frankovitz, Jason, Method and apparatus for remotely monitoring a social website.
  56. Feyzi Celik, Method and apparatus for storing and retreiving business contact information in computer system.
  57. Celik, Feyzi, Method and apparatus for storing and retrieving business contact information in a computer system.
  58. Celik,Feyzi, Method and apparatus for storing and retrieving business contact information in a computer system.
  59. Celik,Feyzi, Method and apparatus for storing and retrieving business contact information in a computer system.
  60. Celik,Feyzi, Method and apparatus for storing and retrieving business contact information in a computer system.
  61. Cordasco, Matthew, Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions.
  62. Petras, Michael William; Frank, Alan Stuart; Petty, Douglas, Method and system for activity responsive telemarketing.
  63. Wenig, Robert; Knudsen, Ted, Method and system for communication between a client system and a server system.
  64. Cheah, Chris, Method and system for controlled distribution of information over a network.
  65. Cheah, Chris, Method and system for controlled distribution of information over a network.
  66. Cheah, Chris, Method and system for controlled distribution of information over a network.
  67. Cheah, Chris, Method and system for controlled distribution of one or more distinct profiles for a user.
  68. Fellenstein, Craig William; Hamilton, Rick Allen; Seaman, James Wesley, Method and system for monitoring personal computer documents for sensitive data.
  69. McDade, Robert W.; Krook, Anne K.; Bouman, Bonnie, Method and system for navigating within a body of data using one of a number of alternative browse graphs.
  70. McDade, Robert W.; Krook, Anne K.; Bouman, Bonnie, Method and system for navigating within a body of data using one of a number of alternative browse graphs.
  71. McDade, Robert W; Krook, Anne K.; Bouman, Bonnie, Method and system for navigating within a body of data using one of a number of alternative browse graphs.
  72. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  73. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  74. Hughes, John R.; Masters, Richard Roderick; Gilde, Robert George, Method and system for providing persistence in a secure network access.
  75. Wagner Richard H., Method and system for responding to hidden data and programs in a datastream.
  76. Gudorf, Gregory D.; Siegel, Brian M., Method and system for user information verification.
  77. Rawat, Jai; Doundakova, Silvia; D'Sa, Oswald; Gordon, Julian; Kulkami, Renuka; Dhanapal, Vijayasankar; Gubbala, Srinivas; Raman, Santhosh; Anand, Rajiv, Method and system of automating data capture from electronic correspondence.
  78. Rawat, Jai; Doundakova, Silvia; D'sa, Oswald Dominic; Gordon, Julian; Kulkarni, Renuka; Dhanapal, Vijayasankar; Gubbala, Srinivas; Raman, Santhosh; Anand, Rajiv, Method and system of automating data capture from electronic correspondence.
  79. Rawat, Jai; Doundakova, Silvia; D'sa, Oswald Dominic; Gordon, Julian; Kulkarni, Renuka; Dhanapal, Vijayasankar; Gubbala, Srinivas; Raman, Santhosh; Anand, Rajiv, Method and system of automating data capture from electronic correspondence.
  80. Rawat, Jai; Gordon, Julian; Raman, Santhosh; Kulkami, Renuka; Anand, Rajiv; Doundakova, Silvia; Dhanapal, Vijayasankar; D'Sa, Oswald; Gubbala, Srinivas, Method and system of automating data capture from electronic correspondence.
  81. Pearce,William M; Tan,Huanyu, Method for automatically filling in web forms.
  82. Klug, John R.; Klug, Noah H., Method for providing node targeted content in an addressable network.
  83. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  84. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  85. Ishii,Atsushi; Detlef,Michael John; Park,Kenneth James, Method for transferring data objects between portable devices.
  86. Wenzel, Roberto; Kalinovsky, Alexander; Billinghay, Justin Michael; Kommaraju, Aditya; Madhavan, Suresh; Kumar, Akhilesh; Hoysted, Fred; Hoyle, Rachel; Michaluk, Henry Robert, Methods and systems for single sign on with dynamic authentication levels.
  87. Celik, Feyzi; DeGrace, Christopher; Yanik, Andrea, Mobile virtual communication invitations.
  88. Murakami,Akihiko, Moral standard protecting system in voice and/or text communication and interactive game system using therewith.
  89. Sermersheim, James; Hodgkinson, Andrew A.; Sanders, Daniel S.; Doman, Thomas E.; Buss, Duane F., Multiple persona information cards.
  90. Cardasco, Matthew, On-page manipulation and real-time replacement of content.
  91. Barber, Timothy P., Online machine data collection and archiving process.
  92. Barber,Timothy P., Online machine data collection and archiving process.
  93. Montulli Lou, Persistant client state in a hypertext transfer protocol based client-server system.
  94. Kwok, Thomas Y.; Mok, Lawrence S., Personal website for electronic commerce on a smart Java card with multiple security check points.
  95. Celik, Feyzi, Phone to phone data exchange.
  96. Celik, Feyzi, Phone to phone data exchange.
  97. Celik, Feyzi, Phone to phone data exchange.
  98. Celik, Feyzi, Phone to phone data exchange.
  99. Celik, Feyzi, Phone to phone data exchange.
  100. Maritzen,Lynn Michael; Dimaandal,Rolando D., Platform independent on-line project management tool.
  101. Ahles, Daniel R.; Redmon, Lara Carsley, Point of sale devices for converting promissory transactions into debit transactions.
  102. Ahles,Daniel; Redmon,Lara Carsley, Point of sale devices for converting promissory transactions into debit transactions.
  103. Hodgkinson, Andrew A.; Buss, Duane F.; Doman, Thomas E.; Felsted, Patrick R.; Sermersheim, James G., Policy-based auditing of identity credential disclosure by a secure token service.
  104. Caven,Howard; Peterson,Matthew; Blankstrom,Diane; Smith,David W., Pre-paid activation and replenishment on a point-of-sale device.
  105. Belyi, Boris, Profitability evaluation in transaction decision.
  106. Belyi,Boris, Profitability evaluation in transaction decision.
  107. Barber, Timothy P., Proxy piercing for identifying address of and marketing to a user device involved in an online transaction.
  108. Gaillard, Eric; Charbonnier, Bertrand; Voyer, Jérôme, Radiotelephone terminal with chip card provided with browser.
  109. Gong Qing, Relay server for unsigned applets.
  110. Burch, Lloyd Leon; Sanders, Daniel S.; Hodgkinson, Andrew A.; Carter, Stephen R., Remotable information cards.
  111. Wenig, Robert I.; Saathoff, Kirk R.; Gettier, Albert F., Replaying captured network interactions.
  112. Wenig, Robert I.; Saathoff, Kirk R.; Gettier, Albert F., Replaying captured network interactions.
  113. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  114. Flynn, Sean L.; Kohnfelder, Loren M.; Hennings, Eric J.; Sun, Ray; Wallent, Michael J.; Berman, Eric R.; Shenoy, Sanjay G., Saved Web page security system and method.
  115. Wallace, Jr., Clyde Riley, Secure internet user state creation method and system with user supplied key and seeding.
  116. Bahlmann, Bruce F., Self service gateway.
  117. Celik, Feyzi; Nowak, Marcin; Say, Burak, Short message service network plug-in.
  118. Celik, Feyzi; Nowak, Marcin; Say, Burak, Short message service network plug-in.
  119. Celik,Feyzi; Nowak,Marcin; Say,Burak, Short message service network plug-in.
  120. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  121. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  122. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  123. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  124. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  125. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  126. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  127. Walker James D. ; Webb Alexander F., System and method for authorizing access to data on content servers in a distributed network.
  128. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  129. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  130. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  131. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  132. Straub Eric John ; Martineau Teresa Anne ; Jakstadt Eric George ; Isaac Steven Alfred, System and method for integrating a document into a desktop window on a client computer.
  133. Laslo Olah ; Ferenc Friedler ; Zoltan Kovacs HU, System and method for monitoring computer usage.
  134. Kroon, Thad; McGinnis, Charles, System and method for overturning of risk evaluation performed by risk model to control financial risk.
  135. Masters, Richard R., System and method for performing application level persistence.
  136. Masters, Richard R., System and method for performing application level persistence.
  137. Masters, Richard Roderick, System and method for performing application level persistence.
  138. Masters, Richard Roderick, System and method for performing application level persistence.
  139. Masters,Richard R., System and method for performing application level persistence.
  140. Roach, Perry J., System and method for providing customized response messages based on requested website.
  141. Jakstadt, Eric G.; Waterston, Michael L.; Badari, Vasantha; Pfost, Jarrod E., System and method for secure third-party development and hosting within a financial services network.
  142. Jakstadt, Eric G.; Waterston, Michael L.; Badari, Vasantha; Pfost, Jarrod E., System and method for secure third-party development and hosting within a financial services network.
  143. Brown,Michael T., System and method for sharing data.
  144. Morris, Robert P., System and method for tracking user activity related to network resources using a browser.
  145. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  146. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  147. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  148. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  149. Hubbard, Dan, System and method of controlling access to the internet.
  150. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  151. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  152. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  153. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  154. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  155. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  156. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  157. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  158. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  159. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  160. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  161. Hernandez, Omar; Singh, Sukhbir; Phadnis, Neel, System for capturing and replaying screen gestures.
  162. Martin Christopher W. ; Korbman Mauricio ; Green Kenneth, System for communicating state information relating to user previous interactions with other internet web sites during an internet session.
  163. Cheah, Chris, System for controlled distribution of user profiles over a network.
  164. Cheah, Chris, System for controlled distribution of user profiles over a network.
  165. Oliver, David M.; Densmore, William P.; Callahan, Michael J., System for management of alternatively priced transactions on network.
  166. Fellenstein, Craig William; Hamilton, Rick Allen; Seaman, James Wesley, System for monitoring personal computer documents for sensitive data.
  167. Wenig, Robert I.; Punjabi, Manoj; Townsend, Geoff, System identifying and inferring web session events.
  168. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  169. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  170. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  171. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  172. Phillips, Cheryl; Smith, David, Systems and methods for generating receipts.
  173. Spataro, Jared M.; West, Cornelia A.; Glazer, David; Schneider, Ronald E., Systems and methods for providing access to data and searchable attributes in a collaboration place.
  174. Ahles, Daniel, Systems and methods for selective use of risk models to predict financial risk.
  175. Templeton, Randy; Barron, Tamila; Ahles, Daniel; Shankar, Sharat, Systems and methods for selectively accessing or using financial account data for subsequent risk determination.
  176. Ahles,Daniel; Templeton,Randy, Systems and methods for selectively delaying financial transactions.
  177. Nguyen, Binh Q., Systems, methods and computer program products for linking transactions by multiple web site servers to web site visitors.
  178. Krishnamurthy, Balachander; Bender, Adam C.; Wills, Craig E., Tailored protection of personally identifiable information.
  179. Krishnamurthy, Balachander; Bender, Adam Christopher; Wills, Craig Ellis, Tailored protection of personally identifiable information.
  180. Ghassemi Hamadani, Babak; Trueman, Timothy; Gade, Krishna; Li, Yu-shuang; Gupta, Pankaj; Jhala, Pradhuman, Typeahead using messages of a messaging platform.
  181. Ghassemi Hamadani, Babak; Trueman, Timothy; Gade, Krishna; Li, Yu-shuang; Gupta, Pankaj; Jhala, Pradhuman, Typeahead using messages of a messaging platform.
  182. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  183. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  184. Masonis, John T.; Parker, Sean; Ring, Cameron T.; Carey, Richard J., Viral engine for network deployment.
  185. Masonis, John T.; Parker, Sean; Ring, Cameron T.; Carey, Richard J., Viral engine for network deployment.
  186. Cordasco, Matthew, Visualization of website analytics.
  187. John F. W. Hunt ; Benedict T. S. Gladstone ; Kief S. Morris GB; Patrick B. Kalaher ; Mark A. Byrn IE; Esa Moilanen CH; Peter R. Lidwell GB, Web site registration proxy system.
  188. Cannata, Michael J.; Lee, Richard; Powell, Matthew; Ramasra, Ryan; Smith, Gerald William, Web-based groupware system.
  189. Cannata, Michael J.; Lee, Richard; Powell, Matthew; Ramasra, Ryan; Smith, Gerald William; Tatham, Charles Edward; Remme, Randall Nelson, Web-based groupware system.
  190. Cannata,Michael J.; Lee,Richard; Powell,Matthew; Ramasra,Ryan; Smith,Gerald William; Tatham,Charles Edward; Remme,Randall Nelson, Web-based groupware system.
  191. Smith, Gerald William; Tatham, Charles Edward; Remme, Randall Nelson, Web-based groupware system.
  192. Smith, Gerald William; Tatham, Charles Edward; Remme, Randall Nelson, Web-based groupware system.
  193. Smith,Gerald William; Tatham,Charles Edward; Remme,Randall Nelson, Web-based groupware system.
  194. Khemlani, Sanjeev; Singer, Adam, Website for financial information.
  195. Celik, Feyzi, Wireless data exchange.
  196. Celik, Feyzi, Wireless data exchange.
  197. Celik, Feyzi, Wireless data exchange.
  198. Celik, Feyzi, Wireless data exchange.
  199. Waxler,Andrea, Work sharing and communicating in a web site system.
  200. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  201. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  202. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  203. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  204. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  205. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로