$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for filtering data received by a computer system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0823123 (1997-03-25)
발명자 / 주소
  • Humes Donald Creig
출원인 / 주소
  • Unified Research Laboratories, Inc.
대리인 / 주소
    Larson & Taylor
인용정보 피인용 횟수 : 331  인용 특허 : 18

초록

The present invention provides a system and method for restricting access to data received by a computer over a network by filtering certain data from the data received. In a preferred embodiment, the present invention provides a computer based method for filtering objectionable or target text data

대표청구항

[ I claim:] [1.] A computer readable memory containing a computer program for programming a general purpose computer to perform a method for filtering a block of text data containing words received over a network, wherein said method comprises the steps of:a) providing a listing of target words, eac

이 특허에 인용된 특허 (18)

  1. Doner Christopher G. (San Francisco CA) Miller Lawrence G. (Saratoga CA) Emmons Ian D. (Richmond CA) Barnes Michael R. (Berkeley CA), Apparatus and method for retrieving and grouping images representing text files based on the relevance of key words extr.
  2. Cragun Brian John ; Day Paul Reuben, Censoring browser method and apparatus for internet viewing.
  3. Camaisa Allan J. ; Walden Kevin R. ; Klepeis Timothy G., Closed browser for computer and computer network.
  4. Deerwester Scott C. (Chicago IL) Dumais Susan T. (Berkeley Heights NJ) Furnas George W. (Madison NJ) Harshman Richard A. (London NJ CAX) Landauer Thomas K. (Summit NJ) Lochbaum Karen E. (Chatham NJ) , Computer information retrieval using latent semantic structure.
  5. Turtle Howard R. (Woodbury MN), Concept matching of natural language queries with a database of document concepts.
  6. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  7. Ausborn Carolyn (1904 Bluebird Ave. Huntsville AL 35816), Method and apparatus for abstracting concepts from natural language.
  8. Prager John M. (Ashland MA), Method and apparatus for intelligent help that matches the semantic similarity of the inferred intent of query or comman.
  9. Graham James M. (San Jose CA), Method and apparatus for semantic pattern matching for text retrieval.
  10. Adi Tammam (San Jose CA), Method and apparatus to identify the relation of meaning between words in text expressions.
  11. Kawaguchi Hisamitsu (Sagamihara JPX) Tada Katsumi (Kokubunji JPX) Kato Kanji (Tokorozawa JPX) Shinozaki Masatsugu (Hadano JPX), Method for character string collation with filtering function and apparatus.
  12. Sadler Victor (Hw Utrecht NLX), Method for determining the semantic relatedness of lexical items in a text.
  13. Gallant Stephen I. (49 Fenno St. Cambridge MA 02138), Method for document retrieval and for word sense disambiguation using neural networks.
  14. Cohen Elliot D., Offensive message interceptor for computers.
  15. Driscoll Jim (Orlando FL), Process for determination of text relevancy.
  16. Schloss Robert Jeffrey, System and method for controlling access to data located on a content server.
  17. Kanaegami Atsushi (Kamakura JPX) Koike Kazuhiro (Kamakura JPX) Taki Hirokazu (Kamakura JPX) Ohgashi Hitoshi (Kamakura JPX), Text search system for locating on the basis of keyword matching and keyword relationship matching.
  18. Meyrat Clement,CHX ; Rothen Jean-Christophe,CHX, Timepiece comprising a case wherein a clockwork movement is housed.

이 특허를 인용한 특허 (331)

  1. Sturms,James R.; Thomson,Randy D.; Wang,Ziyi; Ma,Hongzhou, Access trimmed user interface.
  2. Barile, Ian, Adaptive data loss prevention policies.
  3. Curnyn, Jon, Anti-phishing system.
  4. Jungck, Peder J., Apparatus and method for domain name resolution.
  5. Le, Robert; Bean, Timothy; Mctiernan, Kevin, Automatic provisioning of new users of interest for capture on a communication network.
  6. Riemers, Bill C., Automatic uniform resource locator-based message filter.
  7. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Categorization of a mobile user profile based on browse and viewing behavior.
  8. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Categorization of a mobile user profile based on browse behavior.
  9. Boro, Clifford T.; Vignisson, Vidar; Broadhead, Thomas C.; Von Reis, Will; Kreiling, Andrew, Child-oriented computing system.
  10. Le, Robert; Dikmen, Cemal; Erbilgin, Bulent; Bean, Timothy, Collecting asymmetric data and proxy data on a communication network.
  11. Murakami, Masahiko; Matsumoto, Yasuhide; Kihara, Hideto, Communication support method and system.
  12. Lotvin,Mikhail; Nemes,Richard Michael, Computer apparatus and methods supporting different categories of users.
  13. Hafeman, Carolyn W., Computer recovery or return.
  14. Cormack, Christopher J.; Moy, Tony, Content filtering for a digital audio signal.
  15. Cormack, Christopher J.; Moy, Tony, Content filtering for a digital audio signal.
  16. Wang, Jiang; Gao, Jianzhong; Wang, Nan; Zhu, Guang; Xiao, Hang, Contents filter based on the comparison between similarity of content character and correlation of subject matter.
  17. Ramer, Jorey; Doughty, Dennis; Soroca, Adam, Contextual mobile content placement on a mobile communication facility.
  18. Soroca, Adam; Tengler, Matthew, Contextual targeting of content using a monetization platform.
  19. Barsness, Eric Lawrence, Controlled access to audio signals based on objectionable audio content detected via sound recognition.
  20. Baird,Roger T.; Baird,Jeffrey C.; Blair,Timothy P., Controlling the distribution of information.
  21. Myers, Michael, Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping.
  22. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  23. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  24. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  25. Redlich,Ron M.; Nemzow,Martin A., Data security system and method.
  26. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  27. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  28. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for portable device.
  29. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for separation of user communities.
  30. Redlich,Ron M.; Nemzow,Martin A., Data security system and method responsive to electronic attacks.
  31. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with adaptive filter.
  32. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with editor.
  33. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with multiple independent levels of security.
  34. Redlich,Ron M.; Nemzow,Martin A., Data security system and method with parsing and dispersion techniques.
  35. Redlich, Ron M.; Nemzow, Martin A., Data security system and with territorial, geographic and triggering event protocol.
  36. Bennett, Dominic; Hu, Dan, Database structure and front end.
  37. Wetherall, David J.; Savage, Stefan R.; Anderson, Thomas E., Detecting and preventing undesirable network traffic from being sourced out of a network domain.
  38. Bruening, Oskar; Fridman, Vitali, Detecting policy violations in information content containing data in a character-based language.
  39. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  40. Serena, Frank David, Device, method, and network system for replacing content.
  41. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  42. Keeler, James D.; Melendez, John R., Device-specific authorization at distributed locations.
  43. Little, II,Charles Reeves; Eilebrecht,Eric L., Dictionary attack e-mail identification.
  44. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  45. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  46. Tessman, Gary; Lippert, Patrick D.; Hayman, Timothy B., Distributed image storage architecture.
  47. Tessman, Jr.,Gary; Lippert,Patrick; Hayman,Timothy B., Distributed image storage architecture.
  48. Kirsch,Steven T., Document retrieval system with access control.
  49. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Dynamic bidding and expected value.
  50. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Dynamic bidding and expected value.
  51. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Dynamic bidding and expected value.
  52. Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
  53. Pachikov, Stepan; Kvitek, Peter; Lunsford, Michael; Talnykine, Edouard, Electronic note management system and user-interface.
  54. Ramer, Jorey; Doughty, Dennis; Soroca, Adam; Karasic, Neal J., Embedding sponsored content in mobile applications.
  55. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Embedding sponsored content in mobile applications.
  56. Donahue, Thomas P., Employee internet management device.
  57. Donahue,Thomas P., Employee internet management device.
  58. Swift, Dana B., Evaluating graphic image files for objectionable content.
  59. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Exclusivity bidding for mobile sponsored content.
  60. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  61. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  62. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  63. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  64. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  65. Moran,James R.; Brown,Benjamin D., Help center and condition-based applications.
  66. Moran,James R.; Haddock,Gail, Help center and filtering applications.
  67. Moran, James R.; Haddock, Gail; Smith, Greg Weston; Brannam, Todd, Help center and print center applications.
  68. Haghpassand, Joshua, Highly accurate security and filtering software.
  69. Chen,Jay Chieh, Hyperlink park and search.
  70. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Idle screen advertising.
  71. Enomoto, Katsunori; Kondo, Yoshiyuki; Kokubo, Masatoshi; Aoki, Kazuma, Image forming device capable of acquiring data from web server.
  72. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Increasing mobile interactivity.
  73. Redlich, Ron M.; Nemzow, Martin A., Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor.
  74. Doddapaneni, Ashok Babu, Intelligent feedback loop to iteratively reduce incoming network data for analysis.
  75. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritization of mobile content.
  76. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritization of mobile content.
  77. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritization of mobile content.
  78. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritzation of mobile content.
  79. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Interactive mobile advertisement banners.
  80. Ellis, Michael D., Interactive television system with newsgroups.
  81. Strasnick, Steven L., Level-based network access restriction.
  82. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Location based mobile shopping affinity program.
  83. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Location influenced search results.
  84. Soroca, Adam; Karasic, Neal J., Management of multiple advertising inventories using a monetization platform.
  85. Soroca, Adam; Karasic, Neal J., Management of multiple advertising inventories using a monetization platform.
  86. Umbreit, Timothy F., Managing internet pornography effectively.
  87. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  88. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  89. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  90. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  91. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  92. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on device characteristics.
  93. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on geographic region.
  94. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  95. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  96. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  97. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  98. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  99. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content for delivery to mobile communication facilities.
  100. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali, Mechanism to search information content for preselected data.
  101. Ellis, Michael D., Media system with internet content.
  102. Black, Robert Barth, Method and aparatus for presence based resource management.
  103. Jones, Christopher; Desjardins, Daren; Bothwell, Eric; Fontana, Alexander, Method and apparatus for automatically correlating related incidents of policy violations.
  104. Cowden,Jax B.; Dahlstrom,Kevin V.; Eagle,Scott G.; Gilbert,Charles; Hollrah,Philip D.; Martin,Anthony G.; McFadden,Jeffrey A.; Pennell,Mark E.; Silverberg,Marc E., Method and apparatus for blocking unwanted windows.
  105. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  106. Jones, Chris; Bothwell, Eric; Rowney, Kevin T., Method and apparatus for creating an information security policy based on a pre-configured template.
  107. Vignisson, Vidar; Von Reis, Will, Method and apparatus for custodial monitoring, filtering, and approving of content.
  108. Vignisson, Vidar; Von Reis, Will, Method and apparatus for custodial monitoring, filtering, and approving of content.
  109. Pennell, Mark E.; Primak, L. Scott; Gilbert, Charles, Method and apparatus for defeating a mechanism that blocks windows.
  110. Zoppas, Michel; Hermann, Jeremy; O'Raghallaigh, Conal; Bothwell, Eric; Fontana, Alexander, Method and apparatus for detecting policy violations in a data repository having an arbitrary data schema.
  111. Kay, James, Method and apparatus for electronic mail filtering.
  112. Kay, James, Method and apparatus for electronic mail filtering.
  113. Kay, James, Method and apparatus for electronic mail filtering.
  114. Jungck,Peder J., Method and apparatus for facilitating client server communications over a network.
  115. Leak Bruce A. ; Killianey Michael A., Method and apparatus for generating a tour of world wide web sites.
  116. Rowney, Kevin T.; Fridman, Vitali; Bothwell, Eric, Method and apparatus for handling messages containing pre-selected data.
  117. Gassen, Derek; Donahue, Thomas P., Method and apparatus for predictive and actual intrusion detection on a network.
  118. Black, Robert Barth, Method and apparatus for presence based resource management.
  119. Cowden,Jax B.; Dahlstrom,Kevin V.; Eagle,Scott G.; Gilbert,Charles; Hollrah,Philip D.; Martin,Anthony G.; McFadden,Jeffrey A.; Pennell,Mark E.; Silverberg,Marc E., Method and apparatus for providing information regarding computer programs.
  120. Dorian, Paul Jacob; Drago, Joseph Salvatore; Dorian, Peter, Method and apparatus for providing pre-screened content.
  121. Bennett, Dominic; Paczkowski, Remigiusz K., Method and apparatus for responding to request for information-personalization.
  122. Berstis,Viktors; Ullmann,Lorin Evan, Method and apparatus in a data processing system for word based render browser for skimming or speed reading web pages.
  123. Rowney, Kevin T.; Wolfe, Michael R.; Jones, Chris; Kessler, Dirk; Chen, Hai; Bothwell, Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  124. Rowney,Kevin T.; Wolfe,Michael R.; Jones,Chris; Kessler,Dirk; Chen,Hai; Bothwell,Eric, Method and apparatus to define the scope of a search for information from a tabular data source.
  125. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  126. Jones, Chris; Chen, Hai; Ansanelli, Joseph; Wolfe, Michael R.; Rowney, Kevin T., Method and apparatus to report policy violations in messages.
  127. Bates, Cary Lee; Cragun, Brian John; Day, Paul Reuben, Method and computer program product for implementing parental supervision for internet browsing.
  128. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  129. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  130. Yoshitsugi Inoue JP, Method and system for controlling data delivery and reception based on timestamps of data records.
  131. Kay, James, Method and system for filtering electronic messages.
  132. Holland, Jeffrey W.; Wells, Bradley K., Method and system for generating application simulations.
  133. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  134. Fink,Ian M., Method and system for providing network access and services using access codes.
  135. Redlich, Ron M.; Nemzow, Martin A., Method and system of quantifying risk.
  136. Kay, James, Method and systems for collecting addresses for remotely accessible information sources.
  137. Goulden, David L.; Gilbert, Charles; Zeldin, Craig, Method for attributing and allocating revenue related to embedded software.
  138. Vinati,Samuele; Vinati,Felice; Berardinelli,Ivan, Method for controlling access to a data communication network, with user identification.
  139. Gardner, Philip B.; Volodarets, Victor, Method for determining identification of an electronic device.
  140. Auvenshine,John Jason, Method for filtering content using neural networks.
  141. Russell-Falla, Adrian Peter; Hanson, Andrew Bard, Method for scanning, analyzing and handling various kinds of digital information content.
  142. Russell-Falla Adrian Peter ; Hanson Andrew Bard, Method for scanning, analyzing and rating digital information content.
  143. Dougu, Toshio; Takahashi, Noriyuki, Method of and apparatus for controlling access to the internet in a computer system and computer readable medium storing a computer program.
  144. Crawford, C. S. Lee, Method of conducting operations for a social network application including activity list generation.
  145. Crawford, C. S. Lee, Method of conducting social network application operations.
  146. Crawford, C. S. Lee, Method of conducting social network application operations.
  147. Crawford, C. S. Lee, Method of conducting social network application operations.
  148. Crawford, C. S. Lee, Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry.
  149. Serena, Frank David, Method of replacing content.
  150. Auvenshine, John Jason, Method, system, and program for filtering content using neural networks.
  151. Dugan, Brian M., Methods and apparatus for news delivery.
  152. Schepis, Adam; Newstadt, Keith, Methods and systems for enforcing parental-control policies on user-generated content.
  153. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal, Methods and systems for mobile coupon placement.
  154. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Methods and systems for mobile coupon placement.
  155. Matz, William R., Methods systems, and products for providing substitute content.
  156. Matz, William R., Methods, systems, and products for blocking content.
  157. Matz, William R., Methods, systems, and products for content blocking.
  158. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile advertisement syndication.
  159. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile advertisement syndication.
  160. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile advertisement syndication.
  161. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile advertisement syndication.
  162. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile comparison shopping.
  163. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile content cross-inventory yield optimization.
  164. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Groh, Andrew M., Mobile content spidering and compatibility determination.
  165. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal, Mobile dynamic advertisement creation and placement.
  166. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Mobile dynamic advertisement creation and placement.
  167. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Mobile dynamic advertisement creation and placement.
  168. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile search service instant activation.
  169. Tessman, Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  170. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  171. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  172. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  173. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  174. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  175. Tessman, Jr.,Gary; Lippert,Patrick D.; Hayman,Timothy B., Monitoring digital images.
  176. Serena, Frank David, Observation device, method, and computer program product for replacing content.
  177. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitali A.; Ansanelli, Joseph, Personal computing device-based mechanism to detect preselected data.
  178. Rowney, Kevin T.; Wolfe, Michael R.; Gopalakrishnan, Mythili; Fridman, Vitall A., Personal computing device-based mechanism to detect preselected data.
  179. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Predictive text completion for a mobile communication facility.
  180. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of search results to mobile devices based on television viewing history.
  181. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of search results to mobile devices based on television viewing history.
  182. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content based on mobile transaction event.
  183. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content based on mobile transaction event.
  184. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  185. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  186. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  187. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  188. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  189. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  190. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  191. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  192. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  193. Brown, Kyle Gene; Joines, Stacy Renee, Probabalistic throttling of application server requests.
  194. Russell Falla,Adrian Peter; Hanson,Andrew Bard, Rating and controlling access to emails.
  195. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Realtime surveying within mobile sponsored content.
  196. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Rendering targeted advertisement on mobile communication facilities.
  197. Mayer, Georg; Obermaier, Richard; Straulino, Heiko, Representation of Boolean expressions for specifying filters using XML.
  198. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  199. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Revenue models associated with syndication of a behavioral profile using a monetization platform.
  200. McAllister, Ian A.; Ponath, Christoph R.; Hewett, Delane R.; Steele, Mackenzie; Copparam, Srivaths B., Reviewing user-created content before website presentation.
  201. Martin, Anthony G., Search engine for a computer network.
  202. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  203. Rowney, Kevin T., Secure and scalable detection of preselected data embedded in electronically transmitted messages.
  204. Movshovitz, David, Security for WAP servers.
  205. Redlich, Ron M.; Nemzow, Martin A., Security system with extraction, reconstruction and secure recovery and storage of data.
  206. Bharadwaj, Manjunath; Howell, Nathan; Jiang, Wei, Selective filtering of network traffic requests.
  207. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Michael; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  208. Raman, Shree; Ferguson, John Gerald; Wootton, Bruce Christopher; Wyatt, Timothy Micheal; Chen, Hai, Selective removal of protected content from web requests sent to an interactive website.
  209. Harris, Scott C., Spam detector defeating system.
  210. Kirby, James M, Speech screening.
  211. Meyers, Stephan; Holopainen, Jussi; Lundin, Terje; Mattila, Jonka; Räsänen, Eero, Statistical metering and filtering of content via pixel-based metadata.
  212. Ravindranath, Vinodh Kumar, Supporting a community of subscribers in an environment using a service selection gateway (SSG).
  213. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Syndication of a behavioral profile associated with an availability condition using a monetization platform.
  214. Auvenshine, John Jason, System and article of manufacturing for filtering content using neural networks.
  215. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  216. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  217. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  218. Kester,Harold; Ruskin,Dan; Lee,Chris; Anderson,Mark, System and method for adapting an internet filter.
  219. O'Sullivan, Patrick Joseph; Stern, Edith Helen; Weir, Robert Cameron; Willner, Barry E., System and method for allowing access to content.
  220. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  221. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  222. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  223. Keorkunian,Gary S.; Hirst,Steven B.; Waldron,Melodie, System and method for anonymous observation and use of premium content by indirect access through portal.
  224. Colledge, Matthew; Carrier, Marc, System and method for associating queries and documents with contextual advertisements.
  225. Colledge, Matthew; Carrier, Marc, System and method for associating queries and documents with contextual advertisements.
  226. Walker James D. ; Webb Alexander F., System and method for authorizing access to data on content servers in a distributed network.
  227. O'Sullivan, Patrick Joseph; Stern, Edith Helen; Weir, Robert Cameron; Willner, Barry E., System and method for caching linked email data for offline use.
  228. Shaw, Eric D., System and method for computer analysis of computer generated communications to produce indications and warning of dangerous behavior.
  229. Shaw,Eric D., System and method for computer analysis of computer generated communications to produce indications and warning of dangerous behavior.
  230. Shaw,Eric D., System and method for computer analysis of computer generated communications to produce indications and warning of dangerous behavior.
  231. Shaw,Eric D., System and method for computer analysis of computer generated communications to produce indications and warning of dangerous behavior.
  232. Shaw, Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  233. Shaw, Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  234. Shaw, Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  235. Shaw, Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  236. Shaw, Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  237. Shaw, Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  238. Shaw,Eric D., System and method for computerized psychological content analysis of computer and media generated communications to produce communications management support, indications, and warnings of dangerous behavior, assessment of media images, and personnel selection support.
  239. Donahue,David B., System and method for content filtering using static source routes.
  240. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  241. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  242. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  243. Hall, Robert J., System and method for counteracting message filtering.
  244. Ting, David, System and method for data and request filtering.
  245. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  246. Eichstaedt, Matthias; Emens, Michael Lawrence; Kraft, Reiner, System and method for dynamically limiting robot access to server data.
  247. Humes, Donald Creig, System and method for filtering data received by a computer system.
  248. Saeidi,Babak, System and method for identifying information.
  249. Chen, Shun; Dandliker, Richard Bruce; DiCorpo, Phillip; Wootton, Bruce Christopher; Kessler, Dirk; Wyatt, Timothy Micheal, System and method for identity consolidation.
  250. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  251. North, David G.; Engstrom, John P.; De Rudder, Stephen L.; Cathey, David L., System and method for managing computing devices within a data communications network from a remotely located console.
  252. Saeidi,Babak, System and method for monitoring and analyzing communications.
  253. He, Ling, System and method for preventing web crawler access.
  254. Colledge,Matthew; Carrier,Marc, System and method for processing a query.
  255. Jungck, Peder J., System and method for processing packets according to concurrently reconfigurable rules.
  256. Jungck, Peder J., System and method for processing packets according to user specified rules governed by a syntax.
  257. Jungck,Peder J., System and method for processing packets using location and content addressable memories.
  258. Tarquini,Richard P., System and method for uniform resource locator filtering.
  259. Keeler, James D.; Fink, Ian M.; Krenzer, Matthew M., System and method for user access to a distributed network communication system using persistent identification of subscribers.
  260. O'Sullivan, Patrick Joseph; Weir, Robert Cameron; Stern, Edith Helen; Willner, Barry E., System and method for verifying access to content.
  261. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  262. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  263. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  264. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  265. Hubbard, Dan, System and method of controlling access to the internet.
  266. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  267. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  268. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  269. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  270. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  271. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  272. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  273. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  274. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  275. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  276. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  277. Le, Robert; Bean, Timothy; Huang, Henry, System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data.
  278. Bennett, Dominic V.; Hu, Dan, System for database reporting.
  279. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  280. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  281. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  282. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  283. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  284. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  285. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  286. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  287. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  288. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  289. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  290. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  291. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  292. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  293. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  294. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  295. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  296. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  297. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  298. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  299. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  300. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  301. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  302. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  303. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  304. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  305. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  306. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  307. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  308. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  309. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  310. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  311. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  312. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  313. Reinart, Manfred; Steltz, Jan-Erik, Systems and methods for protecting sensitive data.
  314. Woods,Jonathan; Wynne,Ed, Systems and methods for site access.
  315. Goulden, David L.; Shevach, Matthew A.; Bennett, Dominic, Techniques for displaying impressions in documents delivered over a computer network.
  316. Lotvin, Mikhail; Nemes, Richard M., Tracking points related to a user account for online redemption.
  317. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  318. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  319. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  320. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  321. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  322. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  323. Tyler, Stephen Leslie; Hardy, Rodney Bernard James, URL-based facility enablement.
  324. Martin, Anthony G.; Vandevelde, Scott; Goulden, David L., Updating content of presentation vehicle in a computer network.
  325. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, User characteristic influenced search results.
  326. Fink, Ian M.; Keeler, James D., User fraud detection and prevention of access to a distributed network communication system.
  327. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, User history influenced search results.
  328. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, User transaction history influenced search results.
  329. Haghpassand, Joshua, Web-based security and filtering system for inbound/outbound communications with proxy chaining.
  330. Haghpassand, Joshua, Web-based security and filtering system with proxy chaining.
  331. Gross, John N.; Gross, Anthony A., Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로