$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method of and apparatus for providing secure distributed directory services and public key infrastructure 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0808846 (1997-02-28)
발명자 / 주소
  • Richard Patrick,CAX
  • Csinger Andrew,CAX
  • Knipe Bruce,CAX
  • Woodward Bruce,CAX
출원인 / 주소
  • Xcert Software, Inc., CAX
대리인 / 주소
    Nixon & Vanderhye P.C.
인용정보 피인용 횟수 : 392  인용 특허 : 7

초록

In an exemplary embodiment, the server receives the client's Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the

대표청구항

[ What is claimed is:] [1.] A method for providing secure communications between a client at a first workstation and a computer, comprising the steps of:receiving at said computer, a request from said client for at least one of information and services, said request including at least one digital ce

이 특허에 인용된 특허 (7)

  1. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  2. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  3. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  4. Blakley ; III George R. (Austin TX) Hickerson L. Brooks (Austin TX) Milman Ivan M. (Austin TX) Gittins Robert S. (Woodland Park CO) Scheer Douglas B. (Boynton Beach FL) Wilson John H. (Austin TX), Method and system for providing a user access to multiple secured subsystems.
  5. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  6. Shurts Scott A. (Walnut Creek CA), Secure multi-level system for executing stored procedures.
  7. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.

이 특허를 인용한 특허 (392)

  1. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Wilson, Michael, Administrative notes in network-based commerce facility.
  4. Wilson, Michael, Administrative notes in network-based commerce facility.
  5. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  6. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  7. Hess, Martin L.; Wilson, Michael K., Aggregation of reduced-sized images.
  8. Hess,Martin L.; Wilson,Michael K., Aggregation of reduced-sized images.
  9. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  10. Marshall, Roger S.; Zhu, Yinjun, Ancillary data support in session initiation protocol (SIP) messaging.
  11. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  12. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  13. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  14. Pearson, Jennifer; Wang, Bill, Apparatus and method for generating sub-codes to a turbo-encoder.
  15. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  16. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  17. Woolston, Thomas G., Apparatus and method for remote sellers to initiate auction instances at an auction facilitator system and receive or make payment for items bought and sold with the system by book entry accounting between participant accounts accessible to the system.
  18. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  19. Rao, Ravi; Flannery, Eliot John; Weisberg, Tomer; Parks, III, Upshur Warren; Gupta, Rohit; Tao, Kevin R.; Anirudh, Anirudh; Thaler, David G.; Classen, Andre R.; Manion, Todd R., Application programming interface for inviting participants in a serverless peer to peer network.
  20. Ulrich W. Kohl ; Ling Elizabeth Xu, Architecture for web-based on-line-off-line digital certificate authority.
  21. Zhu, Yinjun; Thompson, Paul, Area event handling when current network does not cover target area.
  22. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  23. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  24. Watt, II, William R.; Ackley, Matthew F.; Cornell, William J., Auction with interest rate bidding.
  25. Watt, II, William R.; Ackley, Matthew F.; Cornell, William J., Auction with interest rate bidding.
  26. Watt, II, William R.; Ackley, Matthew F.; Cornell, William J., Auction with interest rate bidding.
  27. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  28. Yatsukawa Naonobu,JPX, Authentication system using authentication information valid one-time.
  29. McFarland, Keith A., Authentication via motion of wireless device movement.
  30. McFarland, Keith A., Authentication via motion of wireless device movement.
  31. Pearson, Jennifer; Wang, Hsiaozhang Bill, Automated selection of images for web pages.
  32. Pearson, Jennifer; Wang, Hsiaozhang Bill, Automated selection of images for web pages.
  33. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  34. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  35. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  36. Vogel,Inna; Ye,Mei, Automatic notification of irregular activity.
  37. Liu, Allen Yihren; King, Philip J.; Maffeo, Michael; Tamhanker, Hemant V.; Agrawal, Ajay K., Business channel synchronization.
  38. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  39. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  40. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  41. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  42. Fox, Barbara L.; LaMacchia, Brian A., Certificate reissuance for checking the status of a certificate in financial transactions.
  43. Fox,Barbara L.; LaMacchia,Brian A., Certificate reissuance for checking the status of a certificate in financial transactions.
  44. Aull, Kenneth W., Chain of trust processing.
  45. Aull,Kenneth W., Chain of trust processing.
  46. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Communicating between an application process and a server process to manage peer-to-peer identities.
  47. Amin,Baber; Ebrahimi,Hashem Mohammad, Computer network having a security layer interface independent of the application transport mechanism.
  48. Woolston, Thomas G., Computer-implement method and system for conducting auctions on the internet.
  49. Hines, Gordon John; Cousins, Will, Consequential location derived information.
  50. Classen, Andre R.; Anirudh, Anirudh; Thaler, David G.; Tao, Kevin R.; Rao, Ravi T.; Gupta, Rohit; Weisberg, Tomer; Parks, III, Upshur Warren, Contact management in a serverless peer-to-peer system.
  51. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  52. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  53. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  54. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  55. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  56. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  57. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  58. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  59. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  60. Marc David Dyksterhouse ; Jonathan David Callas ; Mark James McArdle, Cryptographic system and methodology for creating and managing crypto policy on certificate servers.
  61. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  62. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  63. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  64. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  65. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  66. Veres, Robert Dean; Liang, Ching-Jye, Customizing an application.
  67. Veres, Robert Dean; Liang, Ching-Jye, Customizing an application.
  68. Xiao, Cun, Delayed secure data retrieval.
  69. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  70. Ratterman, Robert J.; Maltzman, Reed; Knepfle, Joshua D., Determining a community rating for a user using feedback ratings of related users in an electronic environment.
  71. Ratterman, Robert J; Maltzman, Reed; Knepfle, Joshua D, Determining a community rating for a user using feedback ratings of related users in an electronic environment.
  72. Ginter, Jr., Thomas; Ali, Salman; Pann, Tim, Device independent caller data access for emergency calls.
  73. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  74. Maltzman, Reed, Dual purchase process within an online auction environment.
  75. Thompson, Paul C., Efficient prisoner tracking.
  76. Woolston, Thomas G., Electronic marketplace system and method for creation of a two-tiered pricing scheme.
  77. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  78. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  79. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  80. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  81. Filipi Martin,Adrian; Hope,Brian, Encryption management system and method.
  82. Dickinson, Richard; Hines, Gordon John; Croy, Jonothan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  83. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  84. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  85. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  86. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  87. Zhu, Yinjun, Extended area event for network based proximity discovery.
  88. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  89. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  90. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  91. Haney, Richard D., Formation of wireless device location sharing group.
  92. Wang, Hsiaozhang Bill, Generic attribute database system.
  93. Wang,Hsiaozhang Bill, Generic attribute database system.
  94. Wang, Hsiaozhang Bill, Generic attribute database system for storing items of different categories having shared attributes.
  95. Pitt, Lance Douglas, GeoNexus proximity detector network.
  96. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  97. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  98. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  99. Lee,Lane W.; Feldman,Timothy R.; Rayburn,Douglas M.; Kiwimagi,Gary G., Host certification method and system.
  100. Guski,Richard H.; Farrell,Walter B.; Sweeny,James W.; Szczygielski,Thomas J.; Thompson,John M., Identity vectoring via chained mapping records.
  101. Ehrlich, Robert; Mitchell, Donald L.; Marshall, Roger S.; Hines, Gordon John, Index of suspicion determination for communications request.
  102. Anderson, Anne H.; Hanna, Stephen R., Inexpensive secure on-line certification authority system and method.
  103. Hess, Martin L.; Wilson, Michael K., Information presentation and management in an online trading environment.
  104. Hess,Martin L.; Wilson,Michael K., Information presentation and management in an online trading environment.
  105. Martin L. Hess ; Michael K. Wilson, Information presentation and management in an online trading environment.
  106. Proudler, Graeme John; Balacheff, Boris, Information system.
  107. Handler,Brad, Integrated auction.
  108. Choy David M., Integrated method and system for controlling information access and distribution.
  109. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  110. Ghozati, Kambiz; Thompson, Paul, Intelligent load balancer enhanced routing.
  111. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  112. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  113. Fox, Barbara L.; LaMacchia, Brian A., Intelligent trust management method and system.
  114. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  115. Grove, Brian Alan; Edson, Zachary James; Grove, Steve; Sandler, Andrew Leigh, Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism.
  116. Grove, Brian Alan; Edson, Zak James; Grove, Steve; Sandler, Andrew Leigh, Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism.
  117. Grove, Brian; Edson, Zak; Grove, Steve; Sandler, Andrew Leigh, Introducing a fixed-price transaction mechanism in conjunction with an auction transaction mechanism.
  118. Garrison, John Michael; Skibbie, Donna E., Lightweight directory access protocol, (LDAP) trusted processing of unique identifiers.
  119. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  120. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  121. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  122. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  123. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  124. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  125. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  126. Hines,Gordon John; Tapia,Mario G.; Cousins,Will; Carey,Patrick, Location derived presence information.
  127. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  128. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  129. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  130. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  131. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  132. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  133. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  134. Haney, Richard D., Location sharing group for services provision.
  135. Haney, Richard D., Location sharing group map management.
  136. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  137. Manion,Todd R.; Donner,Robert D.; Simionescu,Radu, Managed peer name resolution protocol (PNRP) interfaces for peer to peer networking.
  138. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  139. Woolston, Thomas G., Marketing goods with bar codes.
  140. Woolston, Thomas G., Marketplace payments.
  141. McDonough, John C.; McDonough, Suzanne K.; O'Brien, Erin D., Message passing over secure connections using a network server.
  142. Bunnell Karl Lee, Method and apparatus for acquiring authorized access to resources in a distributed system.
  143. Hillier Stephen William,CAX ; Dilkie Ramon Jonathan Lee,CAX ; Rosenquist Gerrard Eric,CAX, Method and apparatus for centralizing processing of key and certificate life cycle management.
  144. May, Jason; Flint, Ian, Method and apparatus for facilitating online payment transactions in a network-based transaction facility.
  145. May, Jason; Flint, Ian, Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments.
  146. May,Jason; Flint,Ian, Method and apparatus for facilitating online payment transactions in a network-based transaction facility using multiple payment instruments.
  147. Poon,Alex D., Method and apparatus for facilitating user registration in an on-line auction environment.
  148. Poon, Alex Dai-Shun, Method and apparatus for facilitating user selection of a category item in a transaction.
  149. Poon, Alex Dai-Shun, Method and apparatus for facilitating user selection of a category item in a transaction.
  150. Poon, Alex Dai-Shun, Method and apparatus for facilitating user selection of an item category in an online auction.
  151. Levy, Daniele; Handler, Brad, Method and apparatus for holding a two-stage live auction for on-site and on-line bidders.
  152. Levy, Daniele; Handler, Brad, Method and apparatus for holding an online live auction to combine features of both the Internet and traditional, real world auctions.
  153. Levy, Daniele; Handler, Brad, Method and apparatus for holding an online live auction to combine features of both the internet and traditional, real world auctions.
  154. Inada,Ryu; Kurosaki,Masato, Method and apparatus for processing subject name included in personal certificate.
  155. Boone, Barry, Method and apparatus for providing predefined feedback.
  156. Boone, Barry, Method and apparatus for providing predefined feedback.
  157. Boone, Barry, Method and apparatus for providing predefined feedback.
  158. Anoop Goyal ; Alex D. Poon ; Wen Wen, Method and apparatus for verifying the identity of a participant within an on-line auction environment.
  159. Van Horne, III,Edwin J.; King,Matthew; Bendelac,Chaim, Method and apparatus providing policy-based determination of network addresses.
  160. Poon, Alex D.; Leahy, Scott; Wilson, Mike, Method and apparatus to facilitate a transaction within a network-based facility.
  161. Grove, Steve; Yan, Steve; Aidun, Rashid; Singh, Premendra; Rajesh, S. N.; Somani, Preeti; Cooney, Kevin, Method and system automatically to support multiple transaction types, and to display seller-specific transactions of various transaction types in an integrated, commingled listing.
  162. Grove, Steve; Yan, Steve; Aidun, Rashid; Singh, Premendra; Rajesh, S. N.; Somani, Preeti; Cooney, Kevin, Method and system automatically to support multiple transaction types, and to display seller-specific transactions of various transaction types in an integrated, commingled listing.
  163. Veres, Robert Dean; Liang, Ching-Jye, Method and system for automatically updating a seller application utilized in a network-based transaction facility.
  164. Seamon, Joseph, Method and system for categorizing items in both actual and virtual categories.
  165. Monahan, Jay; Handler, Bradley A., Method and system for communicating selected search results between first and second entities over a network.
  166. Monahan,Jay; Handler,Bradley A., Method and system for communicating selected search results between first and second users over a network.
  167. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  168. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  169. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  170. Monahan, Jay; Handler, Bradley A., Method and system for communicating user interfaces between first and second users over a network.
  171. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  172. Veres, Robert Dean; Liang, Ching-Jye, Method and system for customizing a network-based transaction facility seller application.
  173. Sun, Ken; Ghatare, Sanjay Pundlkrao; Dumon, Oliver G.; Netzloff, Julie Lavee; Rehman, Muhammad Faisal; McDonald, Ryan, Method and system for determining an order of presentation of search results.
  174. Sun, Ken; Ghatare, Sanjay Pundlkrao; Dumon, Olivier G.; Netzloff, Julie; Rehman, Muhammad Faisal; McDonald, Ryan, Method and system for determining an order of presentation of search results.
  175. Levy, Daniele V.; Grove, Steve; Mohnia, Dheeraj; Poon, Alex, Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility.
  176. Levy,Daniele V.; Grove,Steve; Mohnia,Dheeraj; Poon,Alex, Method and system for harvesting feedback and comments regarding multiple items from users of a network-based transaction facility.
  177. Boone, Barry; Sacco, Nathan; Chard, Rhys, Method and system for listing items globally and regionally, and customized listing according to currency or shipping area.
  178. Boone, Barry; Sacco, Nathan; Chard, Rhys, Method and system for listing items globally and regionally, and customized listing according to currency or shipping area.
  179. Benantar Messaoud ; High ; Jr. Robert Howard ; Rathi Mahesh Kumar, Method and system for maintaining client server security associations in a distributed computing system.
  180. Pearson, Jennifer; Poon, Alex D.; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  181. Pearson, Jennifer; Poon, Alex Dai-Shun; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  182. Pearson, Jennifer; Poon, Alex Dai-Shun; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  183. Pearson, Jennifer; Poon, Alex Dai-Shun; Poon, Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  184. Pearson,Jennifer; Poon,Alex D.; Poon,Buffy, Method and system for maintaining login preference information of users in a network-based transaction facility.
  185. Cook, Jeff; Heyman, Michael; Dinsmore, Peter, Method and system for management and notification of electronic certificate changes.
  186. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  187. Fisher, Alan S.; Kaplan, Samuel Jerrold, Method and system for performing a progressive auction.
  188. Boone, Barry; Sacco, Nathan; Chard, Rhys, Method and system for providing a record.
  189. Fisher, Alan S.; Kaplan, Samuel Jerrold, Method and system for providing simultaneous on-line auctions.
  190. Elley,Yassir K.; Anderson,Anne H.; Hanna,Stephen R.; Mullan,Sean J.; Perlman,Radia J., Method and system for proving membership in a nested group using chains of credentials.
  191. Woolston, Thomas G., Method and system for retrieving information regarding an item posted for sale.
  192. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yongqiang, Method and system for secure authentication of a user by a host system.
  193. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yongqiang, Method and system for secure authentication of a user by a host system.
  194. Liu, Allen Yihren; King, Philip J.; Agrawal, Ajay K., Method and system for sharing metadata between interfaces.
  195. Grandcolas,Michael L.; Law,France; Doshi,Ashwin; Williams,Michael; Jang,Yeona; Merschen,Toni; Pan,Jack, Method and system for single sign-on user access to multiple web servers.
  196. Wilson,Michael, Method and system for the creation and communication of notes concerning an auction participant or item within a network-based auction facility.
  197. Fisher, Alan S.; Kaplan, Samuel Jerrold, Method and system for updating information on a merchandise catalog page.
  198. Schwankl, Michael; Balijepalli, Srinivas; Geshel, Vadim; Borowsky, Pete; Kopelman, Joshua, Method and system of facilitating a transaction.
  199. Grove, Brian Alan; Edson, Zak James; Grove, Steve; Sandler, Andrew Leigh, Method and system to adjust a seller fixed price offer.
  200. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Cooney, Kevin W.; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  201. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  202. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  203. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Hsin, James; Fung, Elaine; Shaviv, Vered; Maltzman, Reed, Method and system to automatically qualify a party to participate within a network-based commerce transaction.
  204. Embree, Kevin H., Method and system to detect outlying behavior in a network-based marketplace.
  205. Munro, Bart; Pritchett, Daniel L; Monier, Louis Marcel Gino, Method and system to display and search in a language independent manner.
  206. Munro, Jr., W. Barton; Pritchett, Dan; Monier, Louis, Method and system to display and search in a language independent manner.
  207. Stuart, Erik Anderson, Method and system to enable a fixed price purchase within a multi-unit online auction environment.
  208. Stuart, Erik Anderson, Method and system to enable a fixed price purchase within a multi-unit online auction environment.
  209. Maltzman,Reed, Method and system to enable a fixed price purchase within a online auction environment.
  210. Lee, Stacy A.; Early, Justin Christopher; McSpadden, Kevin; Pedone, Greg, Method and system to facilitate an online promotion relating to a network-based marketplace.
  211. Schwankl, Michael; Balijepalli, Srinivas; Geshel, Vadim; Borowsky, Pete; Kopelman, Joshua, Method and system to facilitate pre-ordering via an electronic commerce facility, and to automatically facilitate satisfying of a pre-order upon listing of an appropriate offer via the electronic commerce facility.
  212. Taylor, Jeffrey; Morin, Noel; Goodwine, Annette; Sze, Vicky; Cooney, Kevin W.; Hsin, James; Fung, Elaine; Shaviv, Vered, Method and system to implement seller authorized buying privileges within a network-based shopping facility.
  213. Taylor,Jeffrey; Morin,Noel; Goodwine,Annette; Sze,Vicky; Cooney,Kevin W.; Hsin,James; Fung,Elaine; Shaviv,Vered, Method and system to implement seller authorized buying privileges within a network-based shopping facility.
  214. Powers,Calvin S.; Presler Marshall,Martin, Method for automatically managing information privacy.
  215. Manion, Todd R.; Rao, Ravi T.; Shappell, Michael, Method for efficient content distribution using a peer-to-peer networking infrastructure.
  216. Woolston, Thomas G., Method for facilitating commerce at an internet-based auction.
  217. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  218. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  219. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  220. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  221. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  222. Woolston, Thomas G., Method for reposting a good for sale using a consignment node.
  223. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  224. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  225. Byrne, Debora Jean; Shi, Shaw-Ben, Method, mechanism and computer program product for processing sparse hierarchical ACL data in a relational database.
  226. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  227. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  228. Maltzman, Reed, Methods and machine readable mediums to enable a fixed price purchase within an online auction environment.
  229. Haney, Richard D., Methods and systems for annotating target locations.
  230. Levy, Daniele V.; Grove, Steve; Mohnia, Dheeraj; Poon, Alex, Methods and systems for harvesting comments regarding events on a network-based commerce facility.
  231. Levy, Daniele; Grove, Steve; Mohnia, Dheeraj Singh; Poon, Alex Dai-Shun, Methods and systems for harvesting comments regarding users on a network-based facility.
  232. Woolston, Thomas G., Methods and systems for searching for goods.
  233. Woolston, Thomas G., Methods and systems for searching for goods and services.
  234. Woolston, Thomas G., Methods and systems for searching for goods in a virtual marketplace.
  235. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yonggiang, Methods and systems for secure authentication of a user by a host system.
  236. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  237. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  238. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  239. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  240. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  241. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  242. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  243. Dickinson, Richard, Mobile automatic location identification (ALI) for first responders.
  244. Zhu, Yinjun, Mobile internet protocol (IP) location.
  245. Zhu, Yinjun, Mobile internet protocol (IP) location.
  246. Vogel, Inna; Ye, Mei, Monitoring and automatic notification of irregular activity in a network-based transaction facility.
  247. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants.
  248. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants.
  249. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants of a network-based transaction facility.
  250. Digrigoli, Giacomo; Lee, George, Multi currency exchanges between participants of a networked-based transaction facility.
  251. Zhu, Yinjun, Multiple location retrieval function (LRF) network having location continuity.
  252. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  253. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  254. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  255. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  256. Martin, Jean-Christophe; Duloutre, Sylvain, Network directory access mechanism.
  257. Mike E. Williams ; Keith Holmes, Network information control method utilizing a common command format and a centralized storage management system.
  258. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., No responders online.
  259. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  260. Proudler,Graeme John; Chan,David, Operation of trusted state in computing platform.
  261. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination.
  262. Huitema,Christian; Gavrilescu,Alexandru; Anderson,Noel W.; Zhang,Xiaohai, Peer-to-peer group management and method for maintaining peer-to-peer graphs.
  263. Manion, Todd R.; Dewey, Jeremy L.; Donner, Robert D.; Senkeresty, Scott A.; Parks, III, Upshur, Peer-to-peer grouping interfaces and methods.
  264. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  265. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  266. Manion, Todd R.; Donner, Robert D.; Somin, Grigori M., Peer-to-peer identity management interfaces and methods.
  267. Huitema,Christian; Miller,John L.; Gavrilescu,Alexandru, Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
  268. Miller, John L., Peer-to-peer network communication.
  269. Miller, John L., Peer-to-peer network information storage.
  270. Proudler, Graeme John, Performance of a service on a computing platform.
  271. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  272. Hess, Martin L.; Wilson, Michael K., Periodically reloading image in order to obtain any changes to the images.
  273. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  274. Johnson, Peter K.; Minnick, J. Doug; Robertson, Ian; Peterson, Samuel J., Point-and-shoot product lister.
  275. Johnson, Peter K.; Minnick, J. Doug; Robertson, Ian; Peterson, Samuel J., Point-and-shoot product lister.
  276. Byrne, Patrick Michael; Atkinson, Geoffrey Russell, Positioning E-commerce product related to graphical imputed consumer demand.
  277. Watson, Angela; Richardson, Rebecca; Jalora, Anshu; Liu, Wendy; Hofmann, Ryan, Pricing and forecasting.
  278. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  279. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  280. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  281. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  282. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  283. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  284. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  285. Leahy, Scott; Cohen, Alon, Prioritization of third party access to an online commerce site.
  286. Leahy,Scott; Cohen,Alon, Prioritization of third party access to an online commerce site.
  287. Swaay, Eveline Wesby-van, Programmable communicator.
  288. Wesby-van Swaay, Eveline, Programmable communicator.
  289. Wesby-van Swaay, Eveline, Programmable communicator.
  290. Wesby-van Swaay, Eveline, Programmable communicator.
  291. Doyle, Ronald P.; King, Julie H.; Pogue, Steven W., Providing end-to-end user authentication for host access using digital certificates.
  292. Rhodes, Jeffrey C.; Luo, Tong; Burton, Victor; Conner, Christine, Public safety access point (PSAP) selection for E911 wireless callers in a GSM type system.
  293. Veres, Robert Dean; Liang, Ching-Jye, Publishing user submissions.
  294. Veres, Robert Dean; Liang, Ching-Jye, Publishing user submissions at a network-based facility.
  295. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  296. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., Rapid assignment dynamic ownership queue.
  297. Yu, Kevin John; Chong, Joseph; Tien, Alan, Release of funds based on criteria.
  298. Yu, Kevin John; Chong, Joseph; Tien, Alan, Release of funds based on criteria.
  299. Karchov, David, Relying party trust anchor based public key technology framework.
  300. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  301. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  302. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  303. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  304. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  305. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  306. Hare, Jonathan Paul, Resilient trust network services.
  307. Lee, Lane W.; Feldman, Timothy R.; Rayburn, Douglas M.; Kiwimagi, Gary G., Revocation method and apparatus for secure content.
  308. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  309. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  310. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  311. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  312. Thompson, Paul; Hines, Gordon John, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices.
  313. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  314. Garg, Praerit; Dyke, Cliff Van; Jaganathan, Karthik; Pustilnik, Mark; Schmidt, Donald E., Selective cross-realm authentication.
  315. Byrne, Patrick Michael; Park, Susan, Social choice engine.
  316. Byrne, Patrick Michael; Park, Susan, Social choice engine.
  317. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  318. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  319. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  320. Poremba, Todd, Special emergency call treatment based on the caller.
  321. Robertson, Ian B., System and method for assigning computer users to test groups.
  322. Wu,Vincent; Wilson,Silvy, System and method for caching directory data in a networked computer environment.
  323. Stern, Robert Allen; Drury, Rod; Ahn, Sunny, System and method for context association.
  324. Fisher, Alan S.; Kaplan, Samuel Jerrold, System and method for creating a customer account.
  325. Fisher, Alan S.; Kaplan, Samuel Jerrold, System and method for creating a customer account.
  326. Aull, Kenneth W., System and method for cross directory authentication in a public key infrastructure.
  327. Stern,Robert A; Drury,Rod; Ahn,Sunny, System and method for directory services and e-commerce across multi-provider networks.
  328. Genty,Denise Marie; Venkataraman,Guha Prasad; Wilson,Jacqueline Hegedus, System and method for dynamically determining CRL locations and access methods.
  329. Martin, James, System and method for graphically building weighted search queries.
  330. Martin, James, System and method for graphically building weighted search queries.
  331. Morin, Noel; Holmquest, Hilary; Maltzman, Reed; Taylor, Jeffrey, System and method for handling complaints about unsolicited communications.
  332. Wang, Hsiaozhang Bill, System and method for handling item listings with generic attributes.
  333. Wang, Hsiaozhang Bill, System and method for handling item listings with generic attributes.
  334. Kaliski, Jr., Burton S., System and method for increasing the security of encrypted secrets and authentication.
  335. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  336. D'Sa, Ajit Clarence; Fiveash, William Alton; Genty, Denise Marie; Venkataraman, Guha Prasad; Wilson, Jacqueline Hegedus, System and method for multiple virtual private network authentication schemes.
  337. Fisher, Alan S.; Kaplan, Samuel Jerrold, System and method for receiving a bid.
  338. Coleridge, Robert, System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths.
  339. Morin, Noel; Holmquest, Hilary, System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility.
  340. Morin, Noel; Holmquest, Hilary; Maltzman, Reed; Taylor, Jeffrey, System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based system based on an identifier of the sender of the unsolicited communication.
  341. Grove, Steve, System and method to facilitate translation of communications between entities over a network.
  342. Grove, Steve, System and method to facilitate translation of communications between entities over a network.
  343. Grove, Steve, System and method to facilitate translation of communications between entities over a network.
  344. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.
  345. MacDonald-Korth, Holly C.; Peterson, Samuel Jacob, System and methods for electronic commerce using personal and business networks.
  346. MacDonald-Korth, Holly C.; Peterson, Samuel Jacob, System and methods for electronic commerce using personal and business networks.
  347. Powers, Calvin S.; Presler-Marshall, Martin, System and program product for automatically managing information privacy.
  348. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  349. Vogel, Inna; Ye, Mei, System to monitor irregular activity.
  350. Vogel, Irina; Ye, Mei, System to monitor irregular activity.
  351. MacDonald Korth, Holly C.; Peterson, Samuel Jacob, System, program product, and methods for online image handling.
  352. MacDonald Korth, Holly C.; Peterson, Samuel Jacob, System, program product, and methods for online image handling.
  353. MacDonald Korth, Holly C; Peterson, Samuel Jacob, System, program product, and methods for online image handling.
  354. Byrne, Patrick, System, program product, and methods for social network advertising and incentives for same.
  355. Poon, Alex Dai-Shun; Leahy, Scott; Wilson, Michael K., Systems and methods to facilitate transactions.
  356. Poon, Alex Dai-Shun; Leahy, Scott; Wilson, Michael K., Systems and methods to facilitate transactions.
  357. Poon, Alex Dai-Shun; Leahy, Scott; Wilson, Michael K., Systems and methods to facilitate transactions.
  358. Davis Mark Charles ; Gray Steve D. ; Kuehr-McLaren David Gerard ; Morrison Ian A. ; Shoriak Timothy G., Systems, methods and computer program products for authenticating client requests with client certificate information.
  359. Wilson, Michael K., Taxonomy based database partitioning.
  360. Wilson, Michael K., Taxonomy based database partitioning.
  361. Wilson, Michael K., Taxonomy based database partitioning.
  362. Wilson, Michael K., Taxonomy-based database partitioning.
  363. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  364. Haney, Richard D., Techniques for sharing position data between first and second devices.
  365. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  366. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  367. Hess,Martin L.; Wilson,Michael K., Thumbnail image virtual address space.
  368. Haney, Richard D., Tracking proximity of services provider to services consumer.
  369. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  370. Fahn, Paul Neil; Semple, James, URL-based certificate in a PKI.
  371. Fahn, Paul Neil; Semple, James, URL-based certificate in a PKI.
  372. Fahn, Paul Neil; Semple, James, URL-based certificate in a PKI.
  373. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank 911 calls.
  374. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  375. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  376. Meisel,William S., Use of identification codes in the handling and management of communications.
  377. Kai,Akinori, User authentication method in network.
  378. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  379. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  380. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  381. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  382. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  383. Zhu,Yinjun, User plane location based service using message tunneling to support roaming.
  384. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  385. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  386. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  387. Croy, Jon; Hines, John Gordon; Johnson, Darrin; Lendvay, Kathleen, Voice over internet protocol (VoIP) multi-user conferencing.
  388. Mitchell, Jr., Donald L.; Marshall, Roger S.; Singer, Andrew; Aryana, Firdaus, Wireless emergency caller profile data delivery over a legacy interface.
  389. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  390. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  391. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  392. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로