$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for secure lightweight transactions in wireless data networks 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/67
출원번호 US-0966988 (1997-11-10)
발명자 / 주소
  • Liao Hanqing
  • Boyle Stephen S.
  • King Peter F.
  • Schwartz Bruce V.
출원인 / 주소
  • Phone.com, Inc.
대리인 / 주소
    Minsk
인용정보 피인용 횟수 : 159  인용 특허 : 4

초록

The present invention is a method and system for establishing an authenticated and secure communication session for transactions between a server and a client in a wireless data network that generally comprises an airnet, a landline network and a link server therebetween. The client having limited c

대표청구항

[ What is claimed is:] [1.] A method for establishing an authenticated and secure communication session for transactions between a client and a server in a wireless data network, the client remotely located with respect to the server, the method comprising:the client sending a session-request signal

이 특허에 인용된 특허 (4)

  1. Hu Wei-Ming (Arlington MA), Method and apparatus for authenticating a client to a server in computer systems which support different security mechan.
  2. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  3. Pinkas Denis,FRX, Process for verifying the preservation of the integrity of an unprotected request sent by a client to a server by verif.
  4. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Server entity that provides secure access to its resources through token validation.

이 특허를 인용한 특허 (159)

  1. Videcrantz Peter,DKX ; Steen S.o slashed.ren,DKX ; Steenberg Kim,DKX, Apparatus and method for performing and controlling encryption/decryption for data to be transmitted on local area network.
  2. Hannula, Esko, Apparatus, and associated method, for loading a mobile terminal with an application program installed at a peer device.
  3. Kokudo,Junichi, Authentication method and apparatus for a wireless LAN system.
  4. Bahl,Paramvir; Venkatachary,Srinivasan; Balachandran,Anand, Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet.
  5. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
  6. Bahl,Paramvir; Venkatachary,Srinivasan; Balachandran,Anand, Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet.
  7. McGhie, Sean I.; Buchheit, Brian K., Automated teller machine (ATM) providing money for loyalty points.
  8. Sarkkinen, Sinikka; Kettunen, Kimmo; Karhuluoma, Niina; Vainio, Antti-Pentti; Niemi, Valtteri; Kall, Jan, Ciphering as a part of the multicast concept.
  9. Sarkkinen, Sinikka; Kettunen, Kimmo; Karhuluoma, Niina; Vainio, Antti-Pentti; Niemi, Valtteri; Kall, Jan, Ciphering data for transmission in a network.
  10. Fukuda, Kunio, Communication method, radio base station apparatus and radio terminal apparatus.
  11. Philyaw,Jeffry Jovan, Controlling a PC using a tone from a cellular telephone.
  12. McGhie, Sean I.; Buchheit, Brian K., Conversion of credits to funds.
  13. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for a financial institution to a different loyalty point program for services.
  14. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty points for gaming to a different loyalty point program for services.
  15. McGhie, Sean I.; Buchheit, Brian K., Conversion of loyalty program points to commerce partner points per terms of a mutual agreement.
  16. McGhie, Sean I.; Buchheit, Brian K., Conversion of non-negotiable credits to entity independent funds.
  17. Buchheit, Brian K.; Mghie, Sean I., Conversion operations for loyalty points of different programs redeemable for services.
  18. McGhie, Sean I.; Buchheit, Brian K., Conversion operations of non-negotiable credits to funds between an entity and a commerce partner.
  19. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of in-game credits to entity independent or negotiable funds.
  20. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to entity independent funds.
  21. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  22. McGhie, Sean I.; Buchheit, Brian K., Conversion/transfer of non-negotiable credits to in-game funds for in-game purchases.
  23. McQuaide, A. Chet; Silver, Edward Michael; Roberts, Linda Ann; Nguyen, Hong, Credit card messenger.
  24. McGhie, Sean I.; Buchheit, Brian K., Cross marketing between an entity's loyalty point program and a different loyalty program of a commerce partner.
  25. Erickson, Rodger D., Distributed cache for state transfer operations.
  26. Erickson, Rodger D., Distributed cache for state transfer operations.
  27. Erickson, Rodger D., Distributed cache for state transfer operations.
  28. Erickson, Rodger D., Distributed cache for state transfer operations.
  29. Erickson, Rodger D., Distributed cache for state transfer operations.
  30. Erickson, Rodger D., Distributed cache for state transfer operations.
  31. Erickson, Rodger D., Distributed cache for state transfer operations.
  32. Erickson,Rodger D., Distributed cache for state transfer operations.
  33. Patel, Alpesh S.; Leung, Kent K.; Salowey, Joseph A.; Shao, Yu Cheng, EAP/SIM authentication for mobile IP to leverage GSM/SIM authentication infrastructure.
  34. Jones, Mark; Li, Yong, Efficient network resource management in a wireless network.
  35. Shibuya,Akio; Watabe,Yuki, Electronic commerce information processing system and method.
  36. VanHeyningen, Marc D., Encrypted record transmission.
  37. McGhie, Sean I.; Buchheit, Brian K., Exchange of non-negotiable credits of an entity's rewards program for entity independent funds.
  38. Binding, Carl; Hild, Stefan Georg; O'Connor, Luke James; Singhal, Sandeep K., Exchanging supplemental information fields between a client and a server.
  39. Buchheit, Brian K.; Mghie, Sean I., Graphical user interface for the conversion of loyalty points for services.
  40. McGhie, Sean I.; Buchheit, Brian K., Graphical user interface for the conversion of loyalty points via a loyalty point website.
  41. Aura, Tuomas; Roe, Michael, Human input security codes.
  42. Dommety, Gopal; Patel, Alpesh, Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices.
  43. Dommety,Gopal; Patel,Alpesh, Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices.
  44. Philyaw, Jeffry Jovan; Mathews, David Kent, Input device for allowing interface to a web site in association with a unique input code.
  45. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  46. Sandhu, Parampreet, Internet based mobile terminal provisioning.
  47. Medvinsky, Alexander, Internet protocol telephony security architecture.
  48. Tran, Nguyen Khiem; Thomson, Martin Wyville; Pawson, Darren, Maintaining triggered session state in secure user plane location (SUPL) enabled system.
  49. Philyaw, Jeffry Jovan; Davis, Douglas L., Method and apparatus for accessing a remote location with an optical reader having a programmable memory system.
  50. Liao, Hanqing; King, Peter F.; Greer, Russell S., Method and apparatus for caching credentials in proxy servers for wireless user agents.
  51. Johannes Klein ; Keith B. Evans ; Albert C. Gondi ; Sitaram V. Lanka ; Roger J. Hansen, Method and apparatus for conducting a transaction between homogeneous and/or heterogeneous transaction processing systems using asynchronous pull of a transaction transfer.
  52. Klein, Johannes; Evans, Keith B.; Gondi, Albert C.; Lanka, Sitaram V.; Hansen, Roger J., Method and apparatus for conducting a transaction between homogeneous and/or heterogeneous transaction processing systems using asynchronous pull of a transaction transfer.
  53. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for connecting a user location to one of a plurality of destination locations on a network.
  54. Palaniswamy, Avinash C.; Geiger, Robert L.; Van Peursem, James E., Method and apparatus for designating administrative responsibilities in a mobile communications device.
  55. Martin, Jr.,Bruce K.; Wang,Robert T.; Luna,Michael E. S., Method and apparatus for distributing authorization to provision mobile devices on a wireless network.
  56. Gautney, Charles W.; Idris, Nazmul Bin, Method and apparatus for establishing multiple bandwidth-limited connections for a communication device.
  57. Gautney, Charles W.; Idris, Nazmul Bin, Method and apparatus for establishing multiple bandwidth-limited connections for a communication device.
  58. Gautney,Charles W, Method and apparatus for just-in-time provisioning application-related information at a communication device.
  59. Gautney,Charles W, Method and apparatus for managing resources stored on a communication device.
  60. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for matching a user's use profile in commerce with a broadcast.
  61. VanHeyningen, Marc D.; Erickson, Rodger D., Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols.
  62. VanHeyningen, Marc D.; Erickson, Rodger D., Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols.
  63. VanHeyningen,Marc D., Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols.
  64. VanHeyningen,Marc D.; Erickson,Rodger D., Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols.
  65. Vandermeijden,Tom R.; Eberbach,Adam H. E., Method and apparatus for using Caller ID information in a browser of a mobile communication device.
  66. Philyaw, Jeffry Jovan, Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet.
  67. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for utilizing an existing product code to issue a match to a predetermined location on a global network.
  68. Dusse, Steve; King, Peter F.; Schwartz, Bruce V.; Martin, Jr., Bruce K., Method and system facilitating web based provisioning of two-way mobile communications devices.
  69. Thomas, David Andrew; Sharma, Puneet; Banerjee, Sujata; Lee, Sung-Ju; Dalal, Amy Csizmar, Method and system for content downloads via an insecure communications channel to devices.
  70. Brandsma, Ewout; Eichhorn, Elisabeth; Polak, Piotr; Hendricksen, Ruud, Method and system for facilitating network joining.
  71. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing assurance and financing services.
  72. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing buyer bank payable discounting aggregation services.
  73. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing buyer bank payable discounting services.
  74. Reid, William; Swackhammer, Craig; Lynch, Kerry; Lau, Johnson, Method and system for providing seller bank receivable discounting aggregation services.
  75. Hanqing Liao ; Stephen S. Boyle ; Peter F. King ; Bruce V. Schwartz, Method and system for secure lightweight transactions in wireless data networks.
  76. Jones,Mark; Li,Yong, Method and system for session accounting in wireless networks.
  77. Huber,Adriano, Method for confirming transactions.
  78. R��ver,Stefan; Groffman,Hans Dieter, Method for digital signing of a message.
  79. Rebo,Richard D.; Griswold,Victor J., Method for fast, secure 802.11 re-association without additional authentication, accounting and authorization infrastructure.
  80. Philyaw, Jeffry Jovan; Mathews, David Kent, Method for interfacing scanned product information with a source for the product over a global network.
  81. Nishimura, Takanori; Ihara, Keigo; Yoshimine, Takao; Fukuda, Junko; Sueyoshi, Takahiko, Method of using server, server reservation control apparatus and program storage medium.
  82. Nishimura, Takanori; Ihara, Keigo; Yoshimine, Takao; Fukuda, Junko; Sueyoshi, Takahiko, Method of using server, server reservation control apparatus and program storage medium.
  83. Nishimura, Takanori; Ihara, Keigo; Yoshimine, Takao; Fukuda, Junko; Sueyoshi, Takahiro, Method of using server, server reservation control apparatus and program storage medium.
  84. Leung, Kent K.; Gundavelli, Srinath, Methods and apparatus for authenticating mobility entities using kerberos.
  85. Gundavelli, Srinath; Leung, Kent; Patel, Alpesh, Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home authentication keys in Mobile IP.
  86. Gundavelli, Srinath; Leung, Kent; Patel, Alpesh, Methods and apparatus for bootstrapping mobile-foreign and foreign-home authentication keys in mobile IP.
  87. Patel,Alpesh; Leung,Kent K.; Raab,Stefan; Dommety,Gopal, Methods and apparatus for dynamic session key generation and rekeying in mobile IP.
  88. Mark H. Etzel ; Robert John Frank ; Daniel Nelson Heer ; Robert Joseph McNelis ; Semyon B. Mizikovsky ; Robert John Rance ; R. Dale Shipp, Methods and apparatus for self-inverting multiple-iteration CMEA crypto-processing for improved security for wireless telephone messages.
  89. Venkatachary,Srinivasan; Bahl,Paramvir; Balachandran,Anand, Methods and systems for accessing networks methods and systems for accessing the internet.
  90. Venkatachary,Srinivasan; Bahl,Paramvir; Balachandran,Anand, Methods and systems for accessing networks, methods and systems for accessing the Internet.
  91. Venkatachary,Srinivasan; Bahl,Paramvir; Balachandran,Anand, Methods and systems for accessing networks, methods and systems for accessing the internet.
  92. Venkatachary,Srinivasan; Bahl,Paramvir; Balachandran,Anand, Methods and systems for accessing networks, methods and systems for accessing the internet.
  93. Aura,Anssi Tuomas, Methods and systems for authenticating messages.
  94. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Methods and systems for compressing data packets.
  95. Bahl,Paramvir; Venkatachary,Srinivasan; Balachandran,Anand, Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet.
  96. Bahl, Paramvir; Venkatachary, Srinivasan; Balachandran, Anand, Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet.
  97. Bahl,Paramvir; Venkatachary,Srinivasan; Balachandran,Anand, Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet.
  98. Bahl,Paramvir; Venkatachary,Srinivasan; Balachandran,Anand, Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet.
  99. O'Shea,Gregory; Roe,Michael, Methods and systems for unilateral authentication of messages.
  100. Shelest, Art; Thaler, David G.; O'Shea, Gregory; Roe, Michael; Zill, Brian D., Methods and systems for unilateral authentication of messages.
  101. Senese, Thomas J.; Lewis, Adam C.; Metke, Anthony R.; Popovich, George; Thomas, Shanthi E., Methods for establishing a secure point-to-point call on a trunked network.
  102. Sahota, Jagdeep Singh; Hill, Trudy; Oppenlander, Carole; Smets, Patrik; Van de Velde, Eddy Lodewijk Hortensia, Methods for performing transactions in a wireless environment.
  103. Kuritzky, Matt R.; Morgan, Fabian F.; Schlosser, Sandra J.; White Eagle, Sarah V., Multiple authentication support in a shared environment.
  104. Kuritzky, Matt R.; Morgan, Fabian F.; Schlosser, Sandra J.; White Eagle, Sarah V., Multiple authentication support in a shared environment.
  105. Tachikawa,Hirohide, Network configuration method and communication system and apparatus.
  106. Aura, Tuomas; Roe, Michael, Non-cryptographic addressing.
  107. McGhie, Sean I.; Buchheit, Brian K., Online shopping sites for redeeming loyalty points.
  108. Shibuya,Akio; Watabe,Yuki, Order processing system and method.
  109. Ogushi,Minoru; Matsumoto,Norihisa, PPPoE network system that can distribute connection requests from PPPoE client terminals to specific PPPoE servers.
  110. Philyaw, Jeffry Jovan, Portable scanner for enabling automatic commerce transactions.
  111. Dervarics, Gergely, Print option for WAP browsers.
  112. Röver, Stefan; Groffman, Hans-Dieter, Process for digital signing of a message.
  113. Abdulrahiman, Najeeb; Guo, Lisa, Protocol to prevent replay attacks on secured wireless transactions.
  114. VanHeyningen, Marc D.; Erickson, Rodger D., Providing secure connections for data transmission.
  115. Koch, Robert A., Remote access and retrieval of electronic files.
  116. Koch,Robert A., Remote access and retrieval of electronic files.
  117. McGhie, Sean I.; Buchheit, Brian K., Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds.
  118. McGhie, Sean I.; Buchheit, Brian K., Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds.
  119. Buddhikot, Milind M; Garay, Juan A; Miller, Scott C; Salgarelli, Luca, Scheme for authentication and dynamic key exchange.
  120. McGarvey, John R.; Kuehr-McLaren, David, Secure delegation using public key authentication.
  121. McGarvey, John R.; Kuehr-McLaren, David, Secure delegation using public key authentication.
  122. McGarvey,John R.; Kuehr McLaren,David, Secure delegation using public key authorization.
  123. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  124. Gazier, Mich?el; Strawczynski, Leo, Secure maintenance messaging in a digital communications network.
  125. Billhartz,Thomas Jay; Fleming,Frank Joseph, Secure mobile ad-hoc network and related methods.
  126. Swartz, Troy A., Security encapsulation of ethernet frames.
  127. McGhie, Sean I.; Buchheit, Brian K., Self-service stations for utilizing non-negotiable credits earned from a game of chance.
  128. Philyaw, Jeffry Jovan; Mathews, David Kent, Software downloading using a television broadcast channel.
  129. de Boer, Elts; Jackson, Glyn Philip; Ramsey, Samuel Martin; Voltmer, Theodore S., System and method for a merchant loyalty system.
  130. de Boer, Elts; Jackson, Glyn Philip; Ramsey, Samuel Martin; Voltmer, Theodore S., System and method for a merchant loyalty system.
  131. Baysinger, Mark Wayne, System and method for authenticating remote server access.
  132. Christison, Gregory L., System and method for implementing content protection in a wireless digital system.
  133. Haines, Mark; Ferrell, Raymond R; Ariff, Fauziah B; Voltmer, Theodore S, System and method for monitoring consumer purchasing activity.
  134. Ariff, Fauziah B.; Voltmer, Theodore S.; Antonucci, Donna A.; Greenhut, Scott M.; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D.; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraj; Zeisser, Michel P.; Fernandes, Joseph; Segal, Elizabeth Hilton, System and method for networked loyalty program.
  135. Ariff, Fauziah B.; Voltmer, Theodore S.; Antonucci, Donna A.; Greenhut, Scott M.; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D.; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraj; Zeisser, Michel P.; Fernandes, Joseph; Segal, Elizabeth Hilton, System and method for networked loyalty program.
  136. Ariff, Fauziah B.; Voltmer, Theodore S.; Antonucci, Donna A.; Greenhut, Scott M.; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D.; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraq; Zeisser, Michel P.; Fernandes, Joseph; Segel, Elizabeth Hilton, System and method for networked loyalty program.
  137. Ariff, Fauziah B; Voltmer, Theodore S; Antonucci, Donna A; Greenhut, Scott M; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraq; Zeisser, Michel P; Fernandes, Joseph; Segel, Elizabeth Hilton, System and method for networked loyalty program.
  138. Ariff, Fauziah B; Voltmer, Theodore S; Antonucci, Donna A; Greenhut, Scott M; Hayes, John; Sneddon, Kendall; Ciccarone, Christine D; Ewell, Jason; Lam, Johnson; Zaiac, Joanne; Lang, Laura; Bharwani, Seraq; Zeisser, Michel P; Fernandes, Joseph; Segel, Elizabeth Hilton, System and method for networked loyalty program.
  139. Voltmer, Theodore S.; Ariff, Fauziah B., System and method for networked loyalty program.
  140. Voltmer, Theodore S.; Ariff, Fauziah B., System and method for networked loyalty program.
  141. Mousseau, Gary P; Ferguson, Tabitha; Linkert, Barry; Vander Veen, Raymond; Castell, William D.; Lazaridis, Mihal, System and method for pushing information from a host system to a mobile data communication device.
  142. Ariff, Fauziah B.; Bishop, Fred; Neemann, Trey; Voltmer, Theodore S., System and method for securing data through a PDA portal.
  143. Bishop, Fred; Neemann, Trey; Voltmer, Theodore S; Ariff, Fauziah B, System and method for securing data through a PDA portal.
  144. Bishop,Fred; Neemann,Trey; Voltmer,Theodore S.; Ariff,Fauziah B., System and method for securing data through a PDA portal.
  145. Antonucci, Donna; Voltmer, Theodore S., System and method for the real-time transfer of loyalty points between accounts.
  146. Antonucci, Donna A.; Voltmer, Theodore S., System and method for the transfer of loyalty points.
  147. Senghore, Medina J.; Thomas, Tracey R.; Ariff, Fauziah, System and method for tiered filtering of purchase transactions.
  148. Senghore, Medina J.; Thomas, Tracey R.; Ariff, Fauziah, System and method for tiered filtering of purchase transactions.
  149. Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C R; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
  150. Lazaridis, Mihal; Mousseau, Gary P., System and method for using trigger events and a redirector flag to redirect messages.
  151. Lim, Jin Seong, System and method of transmitting/receiving security data.
  152. Broquist, Thomas; Eriksson, Lars, System operable to identify and access information about a user.
  153. Ebrahimi, Hashem M.; Carter, Stephen R; Oyler, Mel J, Techniques for managing secure communications.
  154. Ebrahimi, Hashem Mohammad; Ackerman, Mark D.; Oyler, Mel J, Techniques for securely managing and accelerating data delivery.
  155. Peyravian, Mohammad; Roginsky, Allen; Zunic, Nevenko; Matyas, Jr., Stephen M., Time stamping method employing multiple receipts linked by a nonce.
  156. McGhie, Sean I.; Buchheit, Brian K., User interface for the exchange of non-negotiable credits for entity independent funds.
  157. Aura, Tuomas; Roe, Michael, Using time to determine a hash extension.
  158. Acosta,Edward; Thompson,David, Wireless services provider network system and method.
  159. Thompson, David; Acosta, Edward, Wireless services provider network system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로