$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for content filtering information retrieved from an internet computer network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0820955 (1997-03-19)
발명자 / 주소
  • Cirasole Peter
  • DeRosa Robert
  • Fox Robert
출원인 / 주소
  • Bascom Global Internet Services, Inc.
대리인 / 주소
    Strobert
인용정보 피인용 횟수 : 186  인용 특허 : 3

초록

A method and system for filtering Internet content retrieved from an Internet computer network (110) by a remote Internet Service Provider ("ISP") server (100) and forwarded to a local client computer (10). The method and system matches at least one filtering scheme (121), such as an inclusive or ex

대표청구항

[ What is claimed is:] [1.] A content filtering system for filtering content retrieved from an Internet computer network by individual controlled access network accounts, said filtering system comprising:a local client computer generating network access requests for said individual controlled access

이 특허에 인용된 특허 (3)

  1. Logan James ; Goessling Daniel F. ; Call Charles G., Audio message exchange system.
  2. Schloss Robert Jeffrey, System and method for controlling access to data located on a content server.
  3. Pepe David Mathew (Middletown NJ) Blitzer Lisa B. (Manalapan NJ) Brockman James Joseph (Perrineville NJ) Cruz William (Eatontown NJ) Hakim Dwight Omar (Matawan NJ) Hovey Richard Reid (Somerville NJ) , System and method for providing protocol translation and filtering to access the world wide web from wireless or low-ban.

이 특허를 인용한 특허 (186)

  1. Coulter, Peter; Panagia, Adam, Alert feature for text messages.
  2. Sadri, Pasha; Trevor, Jonathan J., Alternate page determination for a requested target page.
  3. Sadri, Pasha; Trevor, Jonathan J., Alternate page determination for a requested target page.
  4. van der Made, Peter A. J., Analytical virtual machine.
  5. van der Made,Peter A. J., Analytical virtual machine.
  6. Fellenstein,Craig William; Gusler,Carl Phillip; Hamilton, II,Rick Allen; Schatz,Harry, Apparatus and method for monitoring and analyzing instant messaging account transcripts.
  7. Fellenstein,Craig William; Gusler,Carl Phillip; Hamilton, II,Rick Allen; Schatz,Harry, Apparatus and method for monitoring instant messaging accounts.
  8. Aborn, Justin, Automated management of content servers based on change in demand.
  9. Robarts,James O.; Newell,Dan; Abbott,Kenneth H., Automated selection of appropriate information based on a computer user's context.
  10. Robarts,James O.; Newell,Dan; Abbott,Kenneth H., Automated selection of appropriate information based on a computer user's context.
  11. Aborn,Justin, Automated server replication.
  12. Parkinson, Steven W., Browser initiated reporting of fraud.
  13. Lotvin,Mikhail; Nemes,Richard Michael, Computer apparatus and methods supporting different categories of users.
  14. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  15. van der Made, Peter A. J., Computer immune system and method for detecting unwanted code in a computer system.
  16. van der Made,Peter A. J, Computer immune system and method for detecting unwanted code in a computer system.
  17. Ritter, Rudolf, Computer-aided auctioning method and auctioning system.
  18. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Hagberg, Aric; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted, Configurable adaptive global traffic control and management.
  19. Tony Speakman ; Alex G. Tweedly ; Steven Lin ; Dino Farinacci, Content - based filtering of multicast information.
  20. Slocombe, Michael; Miller, Matthew; Ajalat, Casey; Fuller, III, Vincent A., Content request routing and load balancing for content distribution networks.
  21. Lars-Olof Haster SE, Control of communication traffic.
  22. Bennett, Dominic; Hu, Dan, Database structure and front end.
  23. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Delivering resources to clients in a distributed computing environment.
  24. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Delivering resources to clients in a distributed computing environment.
  25. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Delivering resources to clients in a distributed computing environment with rendezvous based on load balancing and network conditions.
  26. Wetherall, David J.; Savage, Stefan R.; Anderson, Thomas E., Detecting and preventing undesirable network traffic from being sourced out of a network domain.
  27. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  28. Serena, Frank David, Device, method, and network system for replacing content.
  29. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  30. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  31. Smith, Justin N.; Nowotarski, Mark S., Digital reservoir controller.
  32. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Hagberg, Aric; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted, Distributing requests across multiple content delivery networks based on subscriber policy.
  33. Fields Duane Kimbell ; Hassinger Sebastian ; Hurley ; II William W., Distribution mechanism for filtering, formatting and reuse of web based content.
  34. Ahlander, John Lyman; Fonnesbeck, J. Michael; Toone, Nathan David; Valimaki, Mikko, Dynamic background rater for internet content.
  35. Erickson, Thomas D.; Kellogg, Wendy A.; Malkin, Peter K.; Richards, John T.; Yu, Philip S., Dynamic behavior-based access control system and method.
  36. Dozier, Linda T.; Fish, Edmund J.; Gilburne, Miles R.; Zolt, Nina, Dynamic characterization of nodes in a semantic network for desired functions such as search, discovery, matching, content delivery, and synchronization of activity and information.
  37. Forlenza,Randolph Michael; Sang,Miguel, Extension of browser web page content labels and password checking to communications protocols.
  38. Ahlander, John Lyman; Valimaki, Mikko, Filtering cached content based on embedded URLs.
  39. Reardon, David C, Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  40. Reardon, David C., Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  41. Reardon, David C., Financial transaction system with integrated electronic messaging, control of marketing data, and user defined charges for receiving messages.
  42. Matoba, Kazumine, Firewall device.
  43. Fullagar, David; Newton, Christopher; Lipstone, Laurence, Handling long-tail content in a content delivery network (CDN).
  44. Fullagar, David; Newton, Christopher; Lipstone, Laurence R., Handling long-tail content in a content delivery network (CDN).
  45. Newton, Christopher; Lipstone, Laurence; Fullagar, David, Handling long-tail content in a content delivery network (CDN).
  46. Redmore, Seth, Hardware based security groups, firewall load sharing, and firewall redundancy.
  47. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  48. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  49. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  50. Haghpassand, Joshua, Highly accurate security and filtering software.
  51. Ellis, Michael D., Interactive television system with newsgroups.
  52. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Internet content delivery network.
  53. Georgi, Randolph, Interoperable reward currency system, method, and apparatus.
  54. Council, Michael O.; Santos, Daniel J., METHOD AND APPARATUS FOR ENABLING A FEE TO BE CHARGED TO A PARTY INITIATING AN ELECTRONIC MAIL COMMUNICATION WHEN THE PARTY IS NOT ON AN AUTHORIZATION LIST ASSOCIATED WITH THE PARTY TO WHOM THE COMMU.
  55. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Managed object replication and delivery.
  56. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Managed object replication and delivery.
  57. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  58. Ganetakos, Joseph Benjamin; Scoble, Jesse Daniel; Larsen, John Alexander; Borst, Karl Joseph, Matchmaking system for virtual social environment.
  59. Ellis, Michael D., Media system with internet content.
  60. Borst, Karl Joseph; Christensen, Sally, Message filter with replacement text.
  61. Gardner, Jon S.; Wang, Juin J.; Scott, Matthew V., Messaging and document management system and method.
  62. Gardner,Jon S., Messaging and document management system and method.
  63. Black, Robert Barth, Method and aparatus for presence based resource management.
  64. Hammond, Nicolas J., Method and apparatus for auditing network security.
  65. Hoashi, Keiichirou; Inoue, Naomi; Hashimoto, Kazuo, Method and apparatus for automatic information filtering using URL hierarchical structure and automatic word weight learning.
  66. Council Michael O., Method and apparatus for billing a fee to a party initiating an electronic mail communication when the party is not on an authorization list associated with the party to whom the communication is dir.
  67. Cowden,Jax B.; Dahlstrom,Kevin V.; Eagle,Scott G.; Gilbert,Charles; Hollrah,Philip D.; Martin,Anthony G.; McFadden,Jeffrey A.; Pennell,Mark E.; Silverberg,Marc E., Method and apparatus for blocking unwanted windows.
  68. Pennell, Mark E.; Primak, L. Scott; Gilbert, Charles, Method and apparatus for defeating a mechanism that blocks windows.
  69. Kay, James, Method and apparatus for electronic mail filtering.
  70. Kay, James, Method and apparatus for electronic mail filtering.
  71. Kay, James, Method and apparatus for electronic mail filtering.
  72. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  73. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  74. Black, Robert Barth, Method and apparatus for presence based resource management.
  75. Cowden,Jax B.; Dahlstrom,Kevin V.; Eagle,Scott G.; Gilbert,Charles; Hollrah,Philip D.; Martin,Anthony G.; McFadden,Jeffrey A.; Pennell,Mark E.; Silverberg,Marc E., Method and apparatus for providing information regarding computer programs.
  76. Dorian, Paul Jacob; Drago, Joseph Salvatore; Dorian, Peter, Method and apparatus for providing pre-screened content.
  77. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  78. Lum,Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  79. Bennett, Dominic; Paczkowski, Remigiusz K., Method and apparatus for responding to request for information-personalization.
  80. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  81. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  82. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  83. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  84. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  85. Dozier, Linda; Fish, Edmund J.; Gilburne, Miles R.; Zolt, Nina, Method and system for developing process, project or problem-based learning systems within a semantic collaborative social network.
  86. McCaffrey, William Joseph; Dohring, Doug Carl, Method and system for filtering website content.
  87. Dodd, Timothy D.; Mewett, Scott; Ide, Curtis E.; Overcash, Kevin A.; Dennerline, David A.; Williams, Bobby J.; Sells, Martin D., Method and system for identifying, fixing, and updating security vulnerabilities.
  88. Hackenberger, William Frank; Hendry, Randy Jay; Wood, Christopher James, Method and system for implementing security devices in a network.
  89. Irving, John; Bursztein, Marcello; Mulligan, Steve; Lajeunesse, Patrick; Killeen, Pierre, Method and system for interactive, multi-user electronic data transmission in a multi-level monitored and filtered system.
  90. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  91. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  92. Irving, John; Bursztein, Marcello; Mulligan, Steve; Lajeunesse, Patrick, Method and system for monitoring and filtering data transmission.
  93. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  94. Fink,Ian M., Method and system for providing network access and services using access codes.
  95. Challenger, James R. H.; Ferstat, Cameron; Iyengar, Arun K.; Reed, Paul; Spivak, Gerald A.; Witting, Karen A., Method and system for rapid publishing and censoring information.
  96. Goulden, David L.; Gilbert, Charles; Zeldin, Craig, Method for attributing and allocating revenue related to embedded software.
  97. Lin,Po Ching; Lin,Ying Dar; Liu,Ming Dao, Method for web content filtering.
  98. Dougu, Toshio; Takahashi, Noriyuki, Method of and apparatus for controlling access to the internet in a computer system and computer readable medium storing a computer program.
  99. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Method of generating a web page.
  100. Serena, Frank David, Method of replacing content.
  101. Ogram Mark E., Monitoring and regulatory system for the internet.
  102. Ganz, Howard; Borst, Karl Joseph, Multiple-layer chat filter system and method.
  103. Ganz, Howard; Borst, Karl Joseph, Multiple-layer chat filter system and method.
  104. Dozier, Linda T.; Fish, Edmund J.; Zolt, Nina; Gilburne, Miles R., Object-based system and language for dynamic data or network interaction including learning management.
  105. Serena, Frank David, Observation device, method, and computer program product for replacing content.
  106. Lotvin, Mikhail; Nemes, Richard Michael, Online system enabling control of educational and advertising content.
  107. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Optimized network resource location.
  108. Ricciulli, Livio, Overlay network.
  109. Cheng, Kit Ning; Kandial, Simon; Singh, Harjeet, Peer-to-peer location-based messaging.
  110. Brady, Mark; Yevmenkin, Maksim; Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey; Hagberg, Aric; Pfitzner, David; Middleton, Ted, Policy-based content delivery network selection.
  111. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted; Hagberg, Aric, Policy-based content delivery network selection.
  112. Barrett, Joseph G., Public network access server having a user-configurable firewall.
  113. Barrett, Joseph G., Public network access server having a user-configurable firewall.
  114. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  115. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Resource invalidation in a content delivery network.
  116. Damick, Jeffrey Joseph; Cunningham, Sean, Router-host logging.
  117. Martin, Anthony G., Search engine for a computer network.
  118. Clark, Adam T.; Cragun, Brian J.; Petri, John E., Search query obfuscation via broadened subqueries and recombining.
  119. Clark, Adam T.; Cragun, Brian J.; Petri, John E., Search query obfuscation via broadened subqueries and recombining.
  120. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H., Server handoff in content delivery network.
  121. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Server handoff in content delivery network.
  122. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure.
  123. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure.
  124. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure and method of generating a web page.
  125. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure with rendezvous based on load balancing and network conditions.
  126. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  127. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  128. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  129. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  130. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  131. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  132. Walker James D. ; Webb Alexander F., System and method for authorizing access to data on content servers in a distributed network.
  133. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  134. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  135. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  136. Chong, Lester J; Makaijani, Michael; Cheline, Douglas, System and method for content filtering.
  137. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  138. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  139. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  140. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  141. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  142. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  143. Trudeau, Pierre; Moineau, Gilbert, System and method for providing HTML authentication using an access controller.
  144. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  145. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  146. Reardon, David C.; Henson, Timothy L., System and method for two-way transfer of funds and electronic content between summa account users with gathering of behavioral metrics and management of multiple currencies and escrow accounts.
  147. Keeler, James D.; Fink, Ian M.; Krenzer, Matthew M., System and method for user access to a distributed network communication system using persistent identification of subscribers.
  148. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  149. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  150. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  151. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  152. Hubbard, Dan, System and method of controlling access to the internet.
  153. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  154. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  155. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  156. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  157. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  158. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  159. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  160. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  161. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  162. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  163. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  164. Bennett, Dominic V.; Hu, Dan, System for database reporting.
  165. Burke, II, Robert M.; Carman, David Z., System for regulating access to and distributing content in a network.
  166. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  167. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  168. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  169. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  170. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  171. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  172. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  173. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  174. Goulden, David L.; Shevach, Matthew A.; Bennett, Dominic, Techniques for displaying impressions in documents delivered over a computer network.
  175. Wexelblat,David Eli, Third party provided transactional white-listing for filtering electronic communications.
  176. Lotvin, Mikhail; Nemes, Richard M., Tracking points related to a user account for online redemption.
  177. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Transparent redirection of resource requests.
  178. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Transparent redirection of resource requests.
  179. Tyler, Stephen Leslie; Hardy, Rodney Bernard James, URL-based facility enablement.
  180. Coburn, Douglas, Universal media firewall.
  181. Martin, Anthony G.; Vandevelde, Scott; Goulden, David L., Updating content of presentation vehicle in a computer network.
  182. Fink, Ian M.; Keeler, James D., User fraud detection and prevention of access to a distributed network communication system.
  183. Newstadt, Keith; Schepis, Adam, Using sentiment-based analysis in the filtering of web content.
  184. Diwan, Arif, Verification of content stored in a network.
  185. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  186. Brown, Michael Wayne; Lawrence, Kelvin Roderick; Paolini, Michael A., Web page thumbnails and user configured complementary information provided from a server.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로