$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Web application server with secure common gateway interface 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0676783 (1996-07-08)
발명자 / 주소
  • Blackwell
  • Jr. William C.
  • Alston Robin,GBX
  • Farrington Kevin M.
출원인 / 주소
  • Gradient Technologies, Inc.
대리인 / 주소
    Hale and Dorr LLP
인용정보 피인용 횟수 : 153  인용 특허 : 10

초록

A web browser communicates through a secure local proxy to a web server that has an interface for secure communications. The application server has an application program conforming to the CGI programming model that can run continuously as a process and can maintain state information, such as pointe

대표청구항

[ What is claimed is:] [4.] A method comprising server-implemented steps of:receiving over the Internet from a web browser a first request for access to a database;accessing the database in response to the first request according to the CGI protocol;providing data from the database to the web browse

이 특허에 인용된 특허 (10)

  1. Stein Scott A. (Phoenix AZ) Carlson Bruce M. (Phoenix AZ) Yen Chung S. (Bedford MA) Farrington Kevin M. (Williamsville NY), Ally mechanism for interconnecting non-distributed computing environment (DCE) and DCE systems to operate in a network s.
  2. Aditham Radhakrishna ; Chang Philip ; Kramer Paul H., Authenticating remote users in a distributed environment.
  3. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  4. Drury William B. (Framington MA) Hsu Yun-Ping (Hudson MA), Method and apparatus for allocating server access in a distributed computing environment.
  5. Rogers Richard Michael (Beacon NY) Lagarde Konrad Charles (Milford CT), Method for fulfilling requests of a web browser.
  6. Sadovsky Vladimir (Kirkland WA), Method for providing access to independent network resources by establishing connection using an application programming.
  7. Reiman Douglas P. ; Lackman Michael ; Seydel Lee C., SS7 gateway.
  8. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.
  9. Kapoor Sandhya (Austin TX) Varadan Kumar S. (Austin TX) Wei Yi-Hsiu (Austin TX), Transparent local RPC optimization.
  10. Stewart Gordon Gregory, Web server mechanism for processing function calls for dynamic data queries in a web page.

이 특허를 인용한 특허 (153)

  1. van der Made, Peter A. J., Analytical virtual machine.
  2. van der Made,Peter A. J., Analytical virtual machine.
  3. Elnozahy Elmootazbellah Nabil ; Ratan Vivek ; Segal Mark Edward, Apparatus and methods for highly available directory services in the distributed computing environment.
  4. Jasik, Benji; Fell, Simon; Viripaeff, Lexi, Asynchronous method and system for performing an operation on metadata.
  5. Hickman, Paul L.; Gough, James J., Automated electronic document filing system, method, and article of manufacture.
  6. Smith, David Gary; Klopfenstein, Anita K.; Dittmar, Russell E.; Epperly, Carl E.; Thomae, Gary K., Business to business computer system for communicating and processing rental car reservations using web services.
  7. Ireland Evan ; Van Couvering David W., Component transaction server for developing and deploying transaction- intensive business applications.
  8. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  9. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  10. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  11. Wentker, Dave; Wong, Erick; Shenker, Gavin; Deibert, Doug, Contactless transaction.
  12. Holt ; III George Alexander, Dynamically generated document cache system.
  13. Weinstock, Timothy Robert; DeVallance, Kimberly Ann; Haselhorst, Randall Allan; Kennedy, Craig Stephen; Smith, David Gary; Tingle, William T.; Klopfenstein, Anita K., Extended web enabled business to business computer system for rental vehicle services.
  14. Weinstock, Timothy Robert; DeVallance, Kimberly Ann; Haselhorst, Randall Allan; Kennedy, Craig Stephen; Smith, David Gary; Tingle, William T.; Klopfenstein, Anita K., Extended web enabled business to business computer system for rental vehicle services.
  15. Weinstock, Timothy Robert; DeVallance, Kimberly Ann; Haselhorst, Randall Allan; Kennedy, Craig Stephen; Smith, David Gary; Tingle, William T.; Klopfenstein, Anita K., Extended web enabled multi-featured business to business computer system for rental vehicle services.
  16. Friedman, Robert B.; Parekh, Sanjay M., Geo-intelligent traffic reporter.
  17. Shu, Jesse C.; Zhang, Chaohui, Intercepting GPRS data.
  18. Shu, Jesse C.; Zhang, Chaohui, Intercepting GPRS data.
  19. Dresel Holger,DEX ; Goertler Georg,DEX, Means system and method for operating an apparatus.
  20. Hammond, Nicolas J., Method and apparatus for auditing network security.
  21. Hawkins, Jeffrey C.; Sipher, Joseph K.; Lincke, Scott D., Method and apparatus for communications over low bandwidth communications networks.
  22. Fitzgerald, Neil; Belanger, Hugues; Boruff, Kelli; Tucker, Paul; Everson, Jeffrey Lee, Method and apparatus for customer direct on-line reservation of rental vehicles including deep-linking.
  23. Fitzgerald, Neil; Belanger, Hugues; Boruff, Kelli; Tucker, Paul; Everson, Jeffrey Lee, Method and apparatus for customer direct on-line reservation of rental vehicles including deep-linking.
  24. Kobata,Hiroshi; Gagne,Robert, Method and apparatus for delivering electronic data through a proxy server.
  25. Chou Tsung-Jen ; Adunuthula Seshu ; Anand Mala ; Sharma Ankur ; Chien Elaine ; Nakhoda Shehzaad, Method and apparatus for handling client request with a distributed web application server.
  26. Boruff, Kelli; Hibbard, Robert Michael; Tucker, Paul, Method and apparatus for improved customer direct on-line reservation of rental vehicles.
  27. Boruff, Kelli; Hibbard, Robert Michael; Tucker, Paul, Method and apparatus for improved customer direct on-line reservation of rental vehicles.
  28. Jacobs Lawrence ; Adunuthula Seshu ; Anand Mala, Method and apparatus for incorporating state information into a URL.
  29. Jacobs, Lawrence; Adunuthula, Seshu; Anand, Mala, Method and apparatus for incorporating state information into a URL.
  30. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  31. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  32. Jacobs Lawrence ; Adunuthula Seshu ; Anand Mala, Method and apparatus for performing transactions in a stateless web environment which supports a declarative paradigm.
  33. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  34. Lum,Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  35. Giles,James Ryan; Sailer,Reiner; Verma,Dinesh Chandra, Method and apparatus for serving content from a semi-trusted server.
  36. Williams, Mark, Method and apparatus to make and transmit objects from a database on a server computer to a client computer.
  37. Jasik, Benji; Fell, Simon; Eidson, Bill; Viripaeff, Lexi, Method and system for applying a group of instructions to metadata.
  38. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  39. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  40. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  41. Kohl Jereme, Method and system for designing, generating and storing applications.
  42. Adunuthula Seshu ; Chien Elaine ; Anand Mala, Method and system for executing and operation in a distributed environment.
  43. Friedman, Robert B.; Parekh, Sanjay M.; Tibrewala, Neal K.; Lutch, Benjamin, Method and system for generating IP address profiles.
  44. Parekh, Sanjay M.; Friedman, Robert B.; Tibrewala, Neal K.; Lutch, Benjamin, Method and system for geo-targeted content delivery.
  45. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  46. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  47. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  48. Moutafov, Kamen K., Method and system for layering an infinite request/reply data stream on finite, unidirectional, time-limited transports.
  49. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  50. Weinstock, Timothy Robert; DeVallance, Kimberly Ann; Haselhorst, Randall Allan; Kennedy, Craig Stephen; Smith, David Gary; Tingle, William T.; Klopfenstein, Anita K., Method and system for managing rental vehicle reservations with user authorization limits.
  51. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  52. Stephens, Scott Paul; Tucker, Paul C.; Boruff, Kelli J.; Zurliene, Colleen M., Method and system for providing and administering online rental vehicle reservation booking services.
  53. Stephens, Scott Paul; Tucker, Paul C.; Boruff, Kelli J.; Zurliene, Colleen M., Method and system for providing and administering online rental vehicle reservation booking services.
  54. Stephens, Scott Paul; Tucker, Paul C.; Boruff, Kelli J.; Zurliene, Colleen M., Method and system for providing and administering online rental vehicle reservation booking services.
  55. Wagner Richard H., Method and system for responding to hidden data and programs in a datastream.
  56. Lincke Scott D. ; Marianetti ; II Ronald, Method and system for secure communications.
  57. Shrader,Theodore Jack London; Cohen,Richard Jay, Method and system for web-based DCE management.
  58. Ault Michael Bradford ; Child Garry L. ; Plassmann Ernst Robert ; Rich Bruce Arland ; Shrader Theodore Jack London ; Soper Davis Kent, Method for executing a user-requested CGI program in a new authentication context while protecting operation of a default web server program.
  59. Felger, David, Method of billing a purchase made over a computer network.
  60. Felger, David, Method of billing a purchase made over a computer network.
  61. Felger, David, Method of billing a purchase made over a computer network.
  62. Burdette, Jeff; Hebenstreit, Joseph; Cabrera, Richard; Lee, Christopher Jason; Friedman, Robert; Helsper, David, Method, computer program product and electronic device for hyper-local geo-targeting.
  63. Pestoni,Florian; Drews,Clemens, Method, computer readable media and apparatus for the selection and rendering of audio files in a networked environment.
  64. Shafiee,Mohammad Reza; Subramanian,Sankar, Methods and apparatus for providing agent controlled synchronized browsing at a terminal.
  65. Shafiee,Mohammad Reza; Subramanian,Sankar, Methods and apparatus for providing agent controlled synchronized browsing at a terminal.
  66. Shafiee, Mohammad Reza; Subramanian, Sankar, Methods and apparatus for providing live agent assistance.
  67. Cardina,Donald M.; Lewis,John Ervin; Heil,Kenneth Dale, Methods and systems for routing messages through a communications network based on message content.
  68. McNamara, Justin, Methods and systems for tracking and playing back errors in a communications network.
  69. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  70. Shenker, Gavin; Wentker, David; Deibert, Douglas; Wong, Erick, Mobile device with disabling feature.
  71. Deibert, Doug; Wong, Erick; Shenker, Gavin; Wentker, David, Mobile phone payment with disabling feature.
  72. Viripaeff, Alexis; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  73. Viripaeff, Alexis; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  74. Viripaeff, Alexis; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  75. Viripaeff, Lexi; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  76. Viripaeff, Lexi; Mehra, Vinod; Warshavsky, Alex; Horne, Nate; Dapkus, Peter J., On-demand database service system, method and computer program product for conditionally allowing an application of an entity access to data of another entity.
  77. Teixeira, Steven L.; Carr, Christopher, Security system and methodology for providing indirect access control.
  78. Herrmann, Conrad K., Security system providing methodology for cooperative enforcement of security policies during SSL sessions.
  79. Bentley,Joseph, Security system with methodology for computing unique security signature for executable file employed across different machines.
  80. Linetsky, Gene, Security system with methodology for defending against security breaches of peripheral devices.
  81. Freund, Gregor P., Security system with methodology for interprocess communication control.
  82. Freund, Gregor Paul, Security system with methodology providing verified secured individual end points.
  83. Cave Ellis K., Switchless call processing.
  84. Harold, Lee C.; Selvarajan, Inbarajan; Liebl, Herbert, System and method for OLAP report generation with spreadsheet report within the network user interface.
  85. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for a virtual telephony intermediary.
  86. Sinha, Anand, System and method for adaptive allocation of threads to user objects in a computer system.
  87. Sinha, Anand, System and method for allocation of threads to user objects in a computer system.
  88. Zirngibl,Michael; Patnaik,Anurag; Leon,Christopher S.; Yoon,Ki Sung; Mosle,Wolf; Yost,Kyle N.; Wilding,Peter G.; Trenkamp,Robert G., System and method for automatic transmission of audible on-line analytical processing system report output.
  89. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  90. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  91. Pearce,Christopher E.; Whetten,Delon R.; Michalewicz,Larry G., System and method for enabling multicast telecommunications.
  92. Chow ChungHen ; Fountain ; Jr. James William ; Llames Rene Lim, System and method for implementing proxy objects in a visual application builder framework.
  93. Saylor,Michael J.; Yost,Kyle N.; Wilding,Peter G.; Trenkamp,Robert G., System and method for management of an automatic OLAP report broadcast system.
  94. Yost, Kyle N.; Wilding, Peter G.; Trenkamp, Robert G., System and method for management of an automatic OLAP report broadcast system.
  95. Yost, Kyle; Saylor, Michael; Wilding, Peter; Trenkamp, Robert, System and method for management of an automatic OLAP report broadcast system.
  96. Yost, Kyle; Saylor, Michael; Wilding, Peter; Trenkamp, Robert, System and method for management of an automatic OLAP report broadcast system.
  97. Harold, Lee C.; Zhu, Qing; Liebl, Herbert, System and method for network user interface OLAP report formatting.
  98. Lewis, John Ervin, System and method for password protecting a distribution list.
  99. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  100. Lewis, John Ervin, System and method for providing message notification.
  101. Tighe, James R.; Higgins, Ronald D.; Platt, Richard B.; Bell, Robert T., System and method for providing security in a telecommunication network.
  102. Tighe,James R.; Higgins,Ronald D.; Platt,Richard B.; Bell,Robert T., System and method for providing security in a telecommunication network.
  103. Hedy,Shad, System and method for real-time electronic inquiry, delivery, and reporting of credit information.
  104. Hedy,Shad, System and method for real-time electronic inquiry, delivery, and reporting of credit information.
  105. Saylor, Michael J.; Richards, III, Frederick; Patnaik, Anurag; Zirngibl, Michael, System and method for real-time, personalized, dynamic, interactive voice services for book-related information.
  106. Saylor,Michael J.; Richards, III,Frederick; Patnaik,Anurag; Zirngibl,Michael, System and method for real-time, personalized, dynamic, interactive voice services for corporate-analysis related information.
  107. Langseth, Justin; Orolin, Nicolas J.; Patnaik, Anurag; Zirngibl, Michael; Saylor, Michael J.; Richards, III, Frederick, System and method for real-time, personalized, dynamic, interactive voice services for entertainment-related information.
  108. Zirngibl, Michael; Patnaik, Anurag; Saylor, Michael J.; Richards, III, Frederick, System and method for real-time, personalized, dynamic, interactive voice services for information related to existing travel schedule.
  109. Zirngibl,Michael; Anurag,Patnaik; Saylor,Michael J.; Richards, III,Frederick, System and method for real-time, personalized, dynamic, interactive voice services for information related to existing travel schedule.
  110. Langseth, Justin; Orolin, Nicolas J.; Patnaik, Anurag; Zirngibl, Michael; Saylor, Michael J.; Richards, III, Frederick, System and method for real-time, personalized, dynamic, interactive voice services for property-related information.
  111. Langseth, Justin; Orolin, Nicolas J.; Richards, III, Frederick; Patnaik, Anurag; Saylor, Michael J.; Zirngibl, Michael, System and method for real-time, personalized, dynamic, interactive voice services for travel availability information.
  112. Langseth, Justin; Orolin, Nicolas J.; Richards, III, Frederick; Patnaik, Anurag; Saylor, Michael J.; Zirngibl, Michael, System and method for real-time, personalized, dynamic, interactive voice services for travel availability information.
  113. Eberle, Hannes; Leon, Christopher S.; Maass, Bodo; Patnaik, Anurag; Santa Ana, Alberto; Zirngibl, Michael; Reyes, Benjamin; Mosle, Wolf, System and method for the creation and automatic deployment of personalized dynamic and interactive voice services.
  114. Zirngibl,Michael; Patnaik,Anurag, System and method for the creation and automatic deployment of personalized dynamic and interactive voice services with integrated inbound and outbound voice services.
  115. Eberle, Hannes; Leon, Christopher S.; Maass, Bodo; Patnaik, Anurag; Santa Ana, Alberto; Zirngibl, Michael, System and method for the creation and automatic deployment of personalized, dynamic and interactive inbound and outbound voice services, with real-time interactive voice database queries.
  116. Eberle,Hannes; Leon,Christopher S.; Maass,Bodo; Patnaik,Anurag; Santa Ana,Alberto; Zirngibl,Michael; Reyes,Benjamin; Mosle,Wolf, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services.
  117. Eberle, Hannes; Leon, Christopher S.; Maass, Bodo; Patnaik, Anurag; Santa Ana, Alberto; Zirngibl, Michael, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services including module for generating and formatting voice services.
  118. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Leon, Christopher S., System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services with closed loop transaction processing.
  119. Eberle, Hannes; Patnaik, Anurag; Zirngibl, Michael; Mosle, Wolf, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services with customized message depending on recipient.
  120. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Eberle, Hannes, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, including deployment through digital sound files.
  121. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Eberle, Hannes; Langseth, Justin, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, including deployment through personalized broadcasts.
  122. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Eberle, Hannes; Langseth, Justin, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, including deployment through personalized broadcasts.
  123. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Leon, Christopher S., System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time database queries.
  124. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Leon, Christopher S., System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time database queries.
  125. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time drilling via telephone.
  126. Zirngibl,Michael; Patnaik,Anurag; Maass,Bodo, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with real-time drilling via telephone.
  127. Eberle,Hannes; Leon,Christopher S.; Maass,Bodo; Patnaik,Anurag; Santa Ana,Alberto; Zirngibl,Michael, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with system and method that enable on-the-fly content and speech generation.
  128. Zirngibl, Michael; Patnaik, Anurag; Maass, Bodo; Eberle, Hannes, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with telephone-based service utilization and control.
  129. Zirngibl,Michael; Patnaik,Anurag; Maass,Bodo; Eberle,Hannes, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with telephone-based service utilization and control.
  130. Zirngibl, Michael; Patnaik, Anurag, System and method for the creation and automatic deployment of personalized, dynamic and interactive voice services, with the direct delivery of voice services to networked voice messaging systems.
  131. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  132. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  133. Eberle,Hannes; Leon,Christopher S.; Maass,Bodo; Patnaik,Anurag; Santa Ana,Alberto; Zirngibl,Michael, System and method for voice-enabled input for use in the creation and automatic deployment of personalized, dynamic, and interactive voice services.
  134. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  135. Albert, Anthony; Kawamura, Kyle; Haycock, Keith; Herrmann, Conrad, System and methodology for security policy arbitration.
  136. Teixeira, Steven L., System and methodology providing information lockbox.
  137. Lewis,John Ervin; Schlieber,Karl J.; Lai,Danh Tan; McNamara,Justin, System for handling file attachments.
  138. Lewis,John Ervin; Yarkoni,Erez; Patron,David, System for the centralized storage of wireless customer information.
  139. Patron, David; Yarkoni, Erez; Lewis, John Ervin, System for the centralized storage of wireless customer information.
  140. Lewis, John Ervin; Lai, Danh Tan; McNamara, Justin; Schlieber, Karl J., System for the storage and retrieval of messages.
  141. Lewis, John Ervin; Lai, Danh Tan; Richardson, Simon James; Tam, Richard Man Keung; McNamara, Justin; Schlieber, Karl J.; Lee, Jessie T., System for translation and communication of messaging protocols into a common protocol.
  142. Freund,Gregor; Haycock,Keith; Hermann,Conrad, System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices.
  143. Freund, Gregor Paul; Haycock, Keith Allan; Herrmann, Conrad Kamaha'o, System providing internet access management with router-based policy enforcement.
  144. Herrmann, Conrad K., System providing methodology for access control with cooperative enforcement.
  145. Alvarez, Guillermo Alejandro; Chambliss, David Darden; Pandey, Prashant; Raman, Vijayshankar; Ruddy, James Alan; Swart, Garret Frederick; Yudenfriend, Harry Morris, System to delegate virtual storage access method related file operations to a storage server using an in-band RPC mechanism.
  146. Parekh,Sanjay M.; Friedman,Robert B.; Tibrewala,Neal K.; Lutch,Benjamin, Systems and methods for determining, collecting, and using geographic locations of internet users.
  147. Parekh,Sanjay M.; Friedman,Robert B.; Tibrewala,Neal K.; Lutch,Benjamin, Systems and methods for determining, collecting, and using geographic locations of internet users.
  148. Sabin, Jason Allen; Brown, Jeremy Ray; Timpson, Daniel Robert, Techniques for network process identity enablement.
  149. Sabin, Jason Allen; Brown, Jeremy Ray; Timpson, Daniel Robert, Techniques for network process identity enablement.
  150. Sragner Ruth, Transferring selected formatted documents over a computer network using interface script.
  151. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  152. Weinstock,Timothy Robert; DeVallance,Kimberly Ann; Haselhorst,Randall Allan; Kennedy,Craig Stephen; Smith,David Gary, Web enabled business to business operating system for rental car services.
  153. Adunuthula, Seshu; Anand, Mala; Chou, Tsung-Jen; Nakhoda, Shehzaad; Ng, Raymond; Pang, Robert; Sharma, Ankur; Bookman, Matthew, Web request broker controlling multiple processes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로