$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Securely downloading and executing code from mutually suspicious authorities 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
출원번호 US-0920814 (1997-08-29)
발명자 / 주소
  • Smith Sean William
  • Weingart Steve Harris
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Herzberg
인용정보 피인용 횟수 : 165  인용 특허 : 11

초록

An apparatus, system and method for secure code-downloading and information exchange, in the full generality of complex code dependencies while considering the implications of mutual distrust and hot-swapping. Included are secure techniques wherein an authority signs code from another party upon whi

대표청구항

[ What is claimed is:] [1.] A method for a node's authority to download new code into an existing node within a device, said method comprising:said authority preparing a command message including the new code, load predicates and trust parameters, where the load predicates specify whether a current

이 특허에 인용된 특허 (11)

  1. Davis Derek L., Apparatus and method for a vetted field upgrade.
  2. Miller Mark S. ; Tribble E. Dean ; Hardy Norman ; Hill Eric C. ; Hibbert Christopher T., Capability security for distributed object systems.
  3. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  4. Tyra Kristopher L. (Morrisville NC) Gainey Grant R. (Raleigh NC) Zimmerman David P. (Garner NC), Object based system for software maintenance.
  5. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  6. Dan Asit ; Ramaswami Rajiv ; Sitaram Dinkar, Support for portable trusted software.
  7. Picott Kevin P.,CAX ; McPherson Brent,CAX ; Davis Angus W.,CAX ; Nagendra Ichanahalli V.,CAX, System and method for using dependency graphs for the control of a graphics creation process.
  8. Picott Kevin P.,CAX ; McPherson Brent,CAX ; Davis Angus W.,CAX ; Nagendra Ichanahalli V.,CAX, System and method for using dependency graphs for the control of a graphics creation process.
  9. Rosen Sholom S., Tamper-proof electronic processing device.
  10. Rosen Sholom S. (New York NY), Trusted agents for open electronic commerce.
  11. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.

이 특허를 인용한 특허 (165)

  1. Gunasekara, Don; Nallani, Laxman, Apparatus and method for wireless network services in moving vehicles.
  2. Hybertson, Eric, Apparatus and methods for content transfer protection.
  3. Hybertson, Eric, Apparatus and methods for content transfer protection.
  4. Gunasekara, Don; Bencheikh, Ahmed; Vira, Priyank, Apparatus and methods for monitoring and diagnosing a wireless network.
  5. Apsangi, Shrikant; Guduru, Srinivas; Schnitzer, Jason Kazimir; Markley, Jeffrey P.; Carlucci, John B.; Bevilacqua, John G., Apparatus and methods for provisioning in a download-enabled system.
  6. Sarosi, George; Miles, Wilfred Jaime; Cholas, Chris, Apparatus and methods for recording, accessing, and delivering packetized content.
  7. Gunasekara, Don, Apparatus and methods for selective data network access.
  8. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V.; Hopcroft, Michael J., Architectures for and methods of providing network-based software extensions.
  9. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  10. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  11. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  12. Patrick, Kyle Nathan, Comparison of documents possessed by two parties.
  13. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database.
  14. Spalka, Adrian; Lenhardt, Jan, Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device.
  15. Spalka, Adrian; Lehnhardt, Jan; Gotthardt, Frank, Computer implemented method for performing cloud computing on data being stored pseudonymously in a database.
  16. Spalka, Adrian; Lehnhardt, Jan, Computer implemented method for sending a message to a recipient user, receiving a message by a recipient user, a computer readable storage medium and a computer system.
  17. Stickle, Thomas Charles; Moses, Carl Jay; Holland, Ryan Christopher, Computer security threat sharing.
  18. Meier, John D., Configuring and organizing server security information.
  19. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  20. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  21. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  22. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  23. Gotthardt, Frank, Data structure, method, and system for predicting medical conditions.
  24. Spalka, Adrian; Lehnhardt, Jan, Database system, computer system, and computer-readable storage medium for decrypting a data record.
  25. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  26. David C. Wentker ; Klaus P. Gungl DE, Delegated management of smart card applications.
  27. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  28. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  29. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  30. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  31. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  32. Helms, William L.; Carlucci, John B.; Schnitzer, Jason Kazmir, Downloadable security and protection methods and apparatus.
  33. Helms, William L.; Carlucci, John B.; Schnitzer, Jason Kazmir, Downloadable security and protection methods and apparatus.
  34. Helms, William L.; Carlucci, John B.; Schnitzer, Jason Kazmir, Downloadable security and protection methods and apparatus.
  35. Mancini, Adrian O.; Simzer, Kevin T.; Turnbull, James, Dynamic trust anchor system and method.
  36. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  37. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  38. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  39. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  40. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  41. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  42. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  43. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  44. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  45. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  46. Bonwick,Jeffrey S.; Moore,William H., I/O dependency graphs.
  47. Howry, Dolores F.; Shah, Yogendra C.; Brusilovsky, Alec; Gredone, Joseph, Layered certification.
  48. Osthoff, Harro; Smeets, Bernard; Gehrmann, Christian, Loading data into a mobile terminal.
  49. Bodensjö, Marcus; Osthoff, Harro; Schalin, Patrik; Smeets, Bernard, Loading data onto an electronic device.
  50. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  51. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  52. Goldfeder, Aaron R.; Hawkins, John M.; Khorun, Sergey A.; Ramdatmisier, Viresh N.; Farro, Joseph Thomas; Fee, Gregory Darrell; Epling, Jeremiah S.; Bybee, Andrew G.; Xu, Jingyang; Schreiner, Tony Edward; Cool, Jamie L., Mechanism for evaluating security risks.
  53. Cholas, Chris; Helms, William L.; Markley, Jeffrey P., Media bridge apparatus and methods.
  54. Cholas, Chris; Helms, William L.; Markley, Jeffrey P., Media bridge apparatus and methods.
  55. Cholas, Chris; Helms, William L.; Markley, Jeffrey P., Media bridge apparatus and methods.
  56. Adkins, Christopher Alan; Bush, Stephen Porter; Fagan, Mark Walter; Norris, Duane Edward; Perterson, Jr., Douglas Keith; Wack, Thomas James; Woods, Gregory Scott, Method and apparatus for configuring an electronics device.
  57. Trapp,Martin; Zwissler,Sonja, Method and apparatus for secure processing of sensitive data.
  58. Rodgers, Stephane; Chen, Xuemin, Method and system for command authentication to achieve a secure interface.
  59. Marks, Laurence Victor, Method and system for providing data output for analysis.
  60. Ruthfield, Scott L.; Banks, Richard, Method and systems of providing information to computer users.
  61. Patrick,Kyle Nathan, Method of comparing documents possessed by two parties.
  62. Bocking, Andrew; Hardy, Michael Thomas; Roberts, Phillip; Rawlins, Rudy; Hanson, Ronald, Method of customizing a standardized IT policy.
  63. Roberts, Phillip; Hanson, Ronald J. J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  64. Roberts, Phillip; Hanson, Ronald J.J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  65. Roberts, Phillip; Rawlins, Rudy; Hanson, Ron, Method of customizing a standardized IT policy.
  66. Gallagher, Robert J.; Rooney, William J., Method, apparatus and computer program for informing a requesting device of port configuration changes in a computer network switching device.
  67. McAllister, Bryan, Methods and apparatus for determining an optimized wireless interface installation configuration.
  68. Cholas, Chris; Helms, William L.; Carlucci, John B.; Markley, Jeffrey P., Methods and apparatus for premises content distribution.
  69. Cholas, Chris; Helms, William L.; Carlucci, John B.; Markley, Jeffrey P., Methods and apparatus for premises content distribution.
  70. Cholas, Chris; Helms, William; Carlucci, John; Markley, Jeffrey, Methods and apparatus for premises content distribution.
  71. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  72. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  73. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  74. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  75. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  76. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  77. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  78. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Sanchez, Lawrence M.; Licata, John A., Methods, systems, architectures and data structures for delivering software via a network.
  79. Campagna,Matthew J., Monitoring system for a corporate network.
  80. Fujii, Yukio; Obata, Shinichi; Shirane, Hiroaki; Yamamoto, Eiji, Multiplexed audio data decoding apparatus and receiver apparatus.
  81. Fujii,Yukio; Obata,Shinichi; Shirane,Hiroaki; Yamamoto,Eiji, Multiplexed audio data decoding apparatus and receiver apparatus.
  82. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  83. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  84. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Raman,Suryanarayanan V., Network-based software extensions.
  85. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  86. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  87. Bartram,Linda Ruth; Chesser,Mark Miller; Sawadsky,Nicholas; Schumacher,Steven Joseph; Blackstock,Michael, Peer-to-peer authentication for real-time collaboration.
  88. Meier, John D.; Vasireddy, Srinath, Performance engineering and the application life cycle.
  89. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  90. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  91. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  92. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  93. Cross, David; Field, Scott; Kurien, Varugis, Reputation-based authorization decisions.
  94. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  95. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  96. Smith, Michael; de Cesare, Joshua; De Atley, Dallas Blake; Wright, John Andrew, Secure booting a computing device.
  97. Smith, Michael; de Cesare, Joshua; De Atley, Dallas Blake; Wright, John Andrew, Secure booting a computing device.
  98. Penugonda, Madhusudhan R.; Johnson, Michael W.; Sprunk, Eric J.; Tonthat, An, Secure scan.
  99. De Atley, Dallas Blake; De Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  100. De Atley, Dallas Blake; De Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  101. De Atley, Dallas Blake; de Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  102. De Atley, Dallas; de Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  103. Rodgers, Stephane; Dellow, Andrew; Shekhar, Shashank, Security central processing unit management of a transcoder pipeline.
  104. de Cesare, Joshua; De Atley, Dallas Blake; Andrews, Jonathan Jay; Smith, Michael John, Single security model in booting a computing device.
  105. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  106. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  107. Cross, David B.; Kurien, Thekkthalackal Varugis; Field, Scott A., Software authorization utilizing software reputation.
  108. Sobel, William E.; Hernacki, Brian, Software reputation establishment and monitoring system and method.
  109. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  110. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  111. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  112. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  113. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  114. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  115. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  116. Aupperle, Bryan E.; Kaminsky, David L., Suspicious node detection and recovery in mapreduce computing.
  117. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  118. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  119. Kahandaliyanage, Shawn R., System and method for application program operation on a wireless device.
  120. Sridhar, Varadarajan; Amur, Ravi G.; Rao, Korrapati Kalyane, System and method for automated safe reprogramming of software radios.
  121. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  122. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  123. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  124. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  125. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  126. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  127. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  128. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  129. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  130. Hollis, Robert L.; Engelbach, R. Gunnar; Taylor, Randal S., System and method for secure message-oriented network communications.
  131. Little, Herbert Anthony; Clark, David; Owen, Russell Norman; Totzke, Scott William; Adams, Neil Patrick; Brown, Michael Stephen, System and method of installing software applications on electronic devices.
  132. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  133. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  134. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  135. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  136. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  137. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  138. Nogin, Aleksey; Kuan, George; Kopylov, Alexei, System for detecting source code security flaws through analysis of code history.
  139. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  140. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  141. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  142. Sarkissian, Shaunt Mark; Sarkissian, Vahe Andre, Systems, methods and apparatuses for secure digital transactions.
  143. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  144. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  145. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  146. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  147. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  148. Helms, William; Hayashi, Michael T.; Leddy, Kevin J.; Christman, David A., Technique for securely communicating and storing programming material in a trusted domain.
  149. Helms, William; Hayashi, Michael T.; Leddy, Kevin J.; Christman, David A., Technique for securely communicating and storing programming material in a trusted domain.
  150. Helms, William; Hayashi, Michael T.; Leddy, Kevin J.; Christman, David A., Technique for securely communicating and storing programming material in a trusted domain.
  151. Helms, William L.; Carlucci, John B.; Hayashi, Michael T.; Fahrny, James W., Technique for securely communicating programming content.
  152. Helms, William; Carlucci, John B.; Hayashi, Michael T.; Fahrny, James W., Technique for securely communicating programming content.
  153. Helms, William; Carlucci, John B.; Hayashi, Michael T.; Fahrny, John W., Technique for securely communicating programming content.
  154. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  155. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  156. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  157. de Cesare, Joshua; Smith, Michael; De Atley, Dallas Blake; Wright, John Andrew, Trusting an unverified code image in a computing device.
  158. de Cesare, Joshua; Smith, Michael; De Atley, Dallas Blake; Wright, John Andrew, Trusting an unverified code image in a computing device.
  159. Sakushima,Hiromi; Uranaka,Sachiko, User information control device.
  160. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  161. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  162. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  163. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  164. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
  165. Meier, John D., Web application security frame.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로