$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for injecting new code into existing application code 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/46
출원번호 US-0792719 (1997-01-29)
발명자 / 주소
  • Krishnan Ganapathy
  • Oyler Scott
출원인 / 주소
  • Network Commerce Inc.
대리인 / 주소
    Perkins Coie LLP
인용정보 피인용 횟수 : 157  인용 특허 : 22

초록

A method and system for modifying the behavior of existing executable code by injecting new code into an executable file is provided. The injection mechanism injects a reference to new code contained in a DLL into an existing executable file such that, when the code of the executable file is execute

대표청구항

[ What is claimed:] [1.] A method in a computer system for modifying an existing executable file so that when the executable file is loaded into memory for execution, control is transferred to an injected dynamic link library prior to transferring control to a main entry point of the executable file

이 특허에 인용된 특허 (22)

  1. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  2. Chen Fetchi (Boca Raton FL) Dorrance Daniel M. (Boca Raton FL), Dynamically linked and shared compression/decompression.
  3. Romer Theodore H. ; Wolman Alastair ; Lee Dennis Chua ; Voelker Geoffrey Michael ; Bershad Brian N. ; Chen John Bradley ; Levy Henry M. ; Wong Wayne Anthony, Environment manipulation for executing modified executable and dynamically-loaded library files.
  4. Kirby Graham D. ; Visvanathan Sriram ; Marisetty Suresh K., Method and apparatus for enabling application programs to continue operation when an application resource is no longer.
  5. Cooper Thomas Edward (Louisville CO) Pryor Robert Franklin (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy.
  6. Cooper Thomas E. (Louisville CO) Nagda Jagdish (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted file.
  7. Hastings Reed (La Honda CA), Method and apparatus for modifying relocatable object code files and monitoring programs.
  8. Yasukawa Hiroshi,JPX ; Kurosawa Takashi,JPX, Method and apparatus for protecting widely distributed digital information.
  9. Penzias Arno A. (Chatham NJ), Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transactio.
  10. Aziz Ashar (Fremont CA), Method and apparatus for secure remote authentication in a public network.
  11. Schwartz Edward L. (Sunnyvale CA) Gormish Michael J. (Los Altos CA), Method and apparatus for securing executable programs against copying.
  12. Bailey ; III John E. (207 Leafmore Rd. Rome GA 30165), Method and system for creating and storing a backup copy of file data stored on a computer.
  13. Walsh James E. (Redmond WA), Method and system for dynamic-link library.
  14. Theimer Marvin M. (Mountain View CA) Nichols David A. (Mountain View CA) Terry Douglas B. (San Carlos CA), Method for delegating access rights through executable access control program without delegating access rights not in a.
  15. Flug Christian (Munich DEX) Kolb Dieter (Germering DEX), Method for dynamically linking definable program elements of an interactive data processing system.
  16. Hastings Reed (La Honda CA), Method for inserting new machine instructions into preexisting machine code to monitor preexisting machine access to mem.
  17. Chen Yu-Liang,TWX, Number plate housing.
  18. Bunnell Mitchell (Los Gatos CA) Setia Deepinder (San Jose CA), Operating System architecture with reserved memory space resident program code identified in file system name space.
  19. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  20. Golan Gilad,ILX, Security monitor.
  21. Hastings Reed (La Honda CA), System for modifying relocatable object code files to monitor accesses to dynamically allocated memory.
  22. Lipe Ralph A. (Woodinville WA), System for storing executable code within a resource data section of an executable file.

이 특허를 인용한 특허 (157)

  1. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  2. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  3. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  4. Spertus, Michael P.; Stuckmann, David A.; Schooler, Richard; Metcalf, Christopher D., Application failure diagnosis.
  5. Evans, Ethan Zane; Markley, David Allen; Adkins, III, James Newton, Application recommendations based on application and lifestyle fingerprinting.
  6. Hoen, IV, Hudson Philip; Alexandrian, Jason N., Application shell login role based access control.
  7. Johansson, Jesper M.; Stathakopoulos, George N., Behavior-based identity system.
  8. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  9. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  10. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  11. Stern,Donald, Code linking system.
  12. Saunier, Louisa, Computer security method and computer system.
  13. Kim, Eun Ah; Jin, Weon Il; Kim, Hwan Joon, Computer system and method for preventing dynamic-link library injection attack.
  14. Gadea, Ivan; Torrubia, Andres M., Computer-implemented method and system for binding digital rights management executable code to a software application.
  15. Torrubia, Andres M.; Roman, Miguel A.; Gadea, Ivan; Sanchez, Pau, Computer-implemented method and system for binding digital rights management executable code to a software application.
  16. Lee, Jong-Il; Yi, Nam-Su, Computing device having a DLL injection function, and DLL injection method.
  17. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  18. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  19. Szor,Peter; Nachenberg,Carey, Countering malicious code infections to computer files that have been infected more than once.
  20. Evans, Ethan Zane; Markley, David Allen; Ryder, Paul Allan; Roque, Miguel Azancot; Adkins, III, James Newton; Paleja, Ameesh; Lavin, Christopher Lawrence; Chein, Jason Shih Shen; Frazzini, Michael Anthony; Rubenson, Aaron Curtis, Developing versions of applications based on application fingerprinting.
  21. Albert, Eric; Culbert, Michael; Patience, Simon; Smith, Michael, Digital rights management for computer program code.
  22. Richard P. Hammond, Dynamic injection of execution logic into main dynamic link library function of the original kernel of a windowed operating system.
  23. Andersen, Gregory T.; Jizrawi, Alexander, Dynamic linking of modules in a pre-operating system environment.
  24. Forin, Alessandro; Helander, Johannes V., Efficient linking and loading for late binding and platform retargeting.
  25. Forin, Alessandro; Helander, Johannes V., Efficient linking and loading for late binding and platform retargeting.
  26. Forin, Alessandro; Helander, Johannes V., Efficient linking and loading for late binding and platform retargeting.
  27. Epis, Glenn; Halchin, Judy; Sharp, Chris; Cue, Eduardo; Fitzgerald, Thomas Alan, Electronic single action software distribution.
  28. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  29. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  30. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  31. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  32. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  33. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  34. Kemp, Devon James; Carcerano, Christopher John, Extensible device driver.
  35. Kemp,Devon James; Carcerano,Christopher John, Extensible device driver.
  36. Bond, Barry; Khalid, ATM Shafiqul, Extensible loader.
  37. Wang, Min, File manipulation during early boot time.
  38. Lupu, Corneliu I.; Colleran, John D., Fixing incompatible applications by providing stubs for APIs.
  39. Lupu,Corneliu I.; Colleran,John D., Fixing incompatible applications using a light debugger.
  40. Lancaster, Gregory Knight; Lancaster, William Gregory; Lemire, Pierre Joseph, Generalized proxy architecture to provide remote access to an application framework.
  41. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  42. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  43. Forin,Alessandro; Helander,Johannes V.; Raffman,Andrew R.; Odinak,Gilad, Highly componentized system architecture with a demand-loading namespace and programming model.
  44. Kambayashi,Toru; Akiyama,Koichiro; Tsujimoto,Shuichi; Sumita,Kazuo; Hirakawa,Hideki; Sugaya,Toshihiro, Information recording apparatus, information reproducing apparatus, and information distribution system.
  45. Tucker, David; Crump, Matt A.; Witmann, Jerome, Information security method and system.
  46. Sinha,Saurabh; Jakubowski,Mariusz H.; Venkatesan,Ramarathnam; Chen,Yuqun; Cary,Matthew; Pang,Ruoming, Integrity ordainment and ascertainment of computer-executable instructions.
  47. Sinha, Saurabh; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam; Chen, Yuqun; Cary, Matthew; Pang, Ruoming, Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context.
  48. Sinha, Saurabh; Jakubowski, Mariusz H.; Venkatesan, Ramarathnam; Chen, Yuqun; Cary, Matthew; Pang, Ruoming, Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context.
  49. Sinha,Saurabh; Jakubowski,Mariusz H.; Venkatesan,Ramarathnam; Chen,Yuqun; Cary,Matthew; Pang,Ruoming, Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context.
  50. Nathan, Adam D.; Montgomery, John I., Interruptible client-side scripts.
  51. Fu,Xiaodong, Key based decipher including its generation, distribution and usage.
  52. Schneider, Jerome L., Malware management through kernel detection during a boot sequence.
  53. Li Weijun, Merging of separate executable computer programs to form a single executable computer program.
  54. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  55. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  56. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  57. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  58. Maliszewski,Richard L., Method and apparatus to test an instruction sequence.
  59. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  60. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  61. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  62. Hammond, Richard P., Method and system for dynamic injection of dynamic link libraries into a windowed operating system.
  63. Hammond, Richard P., Method and system for dynamic interception of function calls to dynamic link libraries into a windowed operating system.
  64. Holmes, Colin John; Thomas, Monroe Milas; Lehmann, Glen; Lemire, Pierre Joseph, Method and system for enabling interaction with a plurality of applications using a single user interface.
  65. Shuster, Gary Stephen, Method and system for licensing a copy of a copyright protected work.
  66. Tinker, Jeffrey L., Method and system for modifying executable code to add additional functionality.
  67. Cheng, Yuan; Hong, Hua Feng; Qu, Min; Wei, Xing; Yan, Xiao Bing, Method and system for monitoring and adaptively pre-loading crucial dynamic link libraries.
  68. Smith,Michael D.; Bala,Vasanth, Method and system for protecting software applications against static and dynamic software piracy techniques.
  69. Lemire, Pierre Joseph; Thomas, Monroe Milas; Stephure, Matthew James; McFadzean, David Bruce; Robinson, Kevin Glen; Lehmann, Glen, Method and system for providing a state model of an application program.
  70. Lemire, Pierre Joseph; Thomas, Monroe Milas; Stephure, Matthew James; McFadzean, David Bruce; Robinson, Kevin Glen; Lehmann, Glen, Method and system for providing a state model of an application program.
  71. Thomas, Monroe M.; McFadzean, David B.; Beauregard, Michael; Scherger, Derek, Method and system for providing remote access to a state of an application program.
  72. Thomas, Monroe Milas; McFadzean, David Bruce; Beauregard, Michael; Scherger, Derek, Method and system for providing remote access to a state of an application program.
  73. Thomas, Monroe Milas; McFadzean, David Bruce; Beauregard, Michael; Scherger, Derek, Method and system for providing remote access to a state of an application program.
  74. Holmes, Colin J.; Lemire, Pierre; Lehmann, Glenn, Method and system for providing remote access to data for display on a mobile device.
  75. Holmes, Colin J., Method and system for providing synchronized views of multiple applications for display on a remote computing device.
  76. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  77. Krueger, Scott; Goodman, Daniel, Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program.
  78. Wang, Min, Method and system of file manipulation during early boot time by accessing user-level data associated with a kernel-level function.
  79. Lambert, Martin R., Method for controlling access to protected content.
  80. Thomas, Monroe M.; McFadzean, David B.; Stephure, Matt; Robinson, Kevin, Method for flow control and reliable communication in a collaborative environment.
  81. Jones,Richard A., Method for increasing performance of select and poll applications without recompilation.
  82. Bala,Vasanth; Smith,Michael D., Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent.
  83. Leitch, Sam Anthony; Stephure, Matthew James; Robinson, Kevin Glen, Method for providing a connection of a client to an unmanaged service in a client-server remote access system.
  84. Leitch, Sam Anthony; Stephure, Matthew James; Robinson, Kevin Glen, Method for providing a connection of a client to an unmanaged service in a client-server remote access system.
  85. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  86. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  87. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  88. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  89. Mudusuru,Giri P., Method, system, and computer-readable medium for enabling multi-segmented recovery of basic input output system program code in a computer system.
  90. Thomas, Monroe M.; Lehmann, Glen; Stephure, Matt; McFadzean, David B.; Lemire, Pierre; Taerum, Torin Arni, Non-invasive remote access to an application program.
  91. Green, Heidi A.; Green, M. David; Corison, Norman, Non-resident metering and billing system for applications and devices.
  92. Green, Heidi A.; Green, M. David; Corison, Norman D., Non-resident metering and billing system for applications and devices.
  93. Cook, John; Otten, Martin, Overlaying interactive video game play with real-time chat sessions with game switching.
  94. Lari, Mohammad Shoaib; Pingte, Rajendra S.; Krishnaswamy, Srinath, Packaging multiple groups of read-only files of an application's components into multiple shared libraries.
  95. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  96. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  97. Safa,John Aram, Plurality of loader modules with a CO-ordinator module where selected loader module executes and each loader module execute.
  98. Tran, Hoa Thu, Preventing unauthorized access of routines in a library.
  99. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  100. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  101. Thomas, Monroe M.; Lehmann, Glen; Stephure, Matt; McFadzean, David B.; Lemire, Pierre; Taerum, Torin Arni, Remote access to an application program.
  102. Stephure, Matthew James; Thomas, Monroe M., Remote control of an application using dynamic-linked library (DLL) injection.
  103. Needamangala, Ashwin S.; Mihai, Daniel S.; Ivanov, Hristo H.; Popa, Marius; Fransazov, Mariyan D., Runtime code hooking for print driver and functionality testing.
  104. Needamangala, Ashwin S.; Mihai, Daniel S.; Ivanov, Hristo H.; Popa, Marius; Fransazov, Mariyan D., Runtime code hooking for print driver and functionality testing.
  105. Khosravi, Hormuzd, Security protocols on incompatible transports.
  106. Kedma, Gabriel; Havazelet, Doron, Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems.
  107. Kedma,Gabriel; Havazelet,Doron, Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems.
  108. Cheng, Peter, Software license embedded in shell code.
  109. Sotoodeh,Mehdi; Grove,Brian Douglas; Elteto,Laszlo, Software protection method utilizing hidden application code in a protection dynamic link library object.
  110. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  111. Sebes, E. John, Solidifying the executable software set of a computer.
  112. Sebes, E. John, Solidifying the executable software set of a computer.
  113. Voellm,Anthony F.; Mohamed,Ahmed H., System and method for changing operation of an application without recompiling.
  114. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  115. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  116. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  117. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  118. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  119. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  120. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  121. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  122. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  123. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  124. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  125. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  126. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  127. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  128. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  129. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  130. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  131. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  132. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  133. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  134. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  135. Beckett, Stephen Marshall; Castagno, Antony J.; Lockwood, Damon Gerard; McDougald, Horace Daniel, System and method for non-programmatically constructing software solutions.
  136. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  137. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  138. Varadarajan, Sridhar; Rao, Korrapati Kalyana, System and method for protected content rendering.
  139. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  140. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  141. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  142. Buer, Mark, System and method for securing executable code.
  143. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  144. Davis,Alan L.; Humphreys,Jonathan F.; Snider,Todd M., System and method for translating include files.
  145. Adams, Stephen Robert, System and method of updating programs and data.
  146. Weicher,Neil, System for encrypting data files of application programs.
  147. Henderson,Barnaby; Elliot,Paul, System, method, and computer program product for identifying code development errors.
  148. Chow, Alex C.; Harvey, John P., Systems and methods for embedded shared libraries in an executable image.
  149. Venkatramani, Anjan, Systems and methods for implementing end-to-end checksum.
  150. Venkatramani,Anjan, Systems and methods for implementing end-to-end checksum.
  151. Lopatic, Thomas, Technique for license management and online software license enforcement.
  152. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  153. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  154. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  155. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  156. Alexandrian, Jason N.; Hoen, IV, Hudson Philip, Updating roles based access.
  157. McMillan, John; Chirhart, Gary, Virtual OS computing environment.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로