$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus to determine user identity and limit access to a communications network 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • H04L-009/00
출원번호 US-0980313 (1997-11-26)
발명자 / 주소
  • Skopp Peter
  • Vitale Benjamin F.
  • Marur Vinod R.
  • Tse Clifford S.C.
  • Dulai Dharmender S.
출원인 / 주소
  • Juno Online Services, Inc.
대리인 / 주소
    Kenyon & Kenyon
인용정보 피인용 횟수 : 317  인용 특허 : 10

초록

A method and apparatus to determine user identity and limit access to a communications network. A first message containing user identity information is received from a client computer in accordance with a first protocol. A first network address is determined from the first message. A second message

대표청구항

[ What is claimed is:] [1.]1. A method of operating an access control system for information retrievable using a communications network, comprising the steps of:receiving at the access control system from a client a first message containing user identity information in accordance with a first protoc

이 특허에 인용된 특허 (10)

  1. Skeen Marion D. (3826 Magnolia Dr. Palo Alto CA 94306) Bowles Mark (30 Tripp Ct. Woodside CA 94062), Apparatus and method for providing decoupling of data exchange details for providing high performance communication betw.
  2. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  3. Shaw David E. ; Ardai Charles E. ; Marsh Brian D. ; Moraes Mark A. ; Rudolph Dana B. ; Mc Auliffe Jon D., Electronic mail system for displaying advertisement at local computer received from remote system while the local compu.
  4. Hann J. David (Vienna VA) Holdahl Theodore S. (Bethesda MD) Lum James C. P. (Herndon VA), Method and apparatus for enhancing security of communications in a packet-switched data communications system.
  5. Khakzar Karim,DEX, Method of controlling an access network as well as exchange and access network.
  6. Kung Kenneth C. (Cerritos CA), One-time logon means and methods for distributed computing systems.
  7. Szwarc Michal (Valley Cottage NY), Packet switched information network with universal access to enhanced network services.
  8. Johnson Donavon W. (Georgetown TX) Smith Todd A. (Austin TX), Remote authentication and authorization in a distributed data processing system.
  9. Boebert William E. (Minneapolis MN), System and method for trusted path communications.
  10. Wood Michael A. ; Roncalez Pascal ; Pflugrath Lauren S. ; Souquet Jacques, Ultrasonic diagnostic imaging system with universal access to diagnostic information and images.

이 특허를 인용한 특허 (317)

  1. Knouse, Charles W.; Gupta, Minoo, Access system interface.
  2. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  3. Knouse,Charles W.; Gupta,Minoo, Access system interface.
  4. Haitsuka,Stacy; Burr,Ronald; MacKenzie,Harold; Zebian,Marwan; Warren,Terry; Blaser,Shane, Access to internet search capabilities.
  5. Nochta, Zoltan; Sa de Souza, Luciana Moreira; Haller, Stephan; Spiess, Patrik, Active intervention in service-to-device mapping for smart items.
  6. Landau,Michael; Horowitz,Evan, Advertising markup language.
  7. Jungck, Peder J., Apparatus and method for domain name resolution.
  8. Jungck,Peder J., Apparatus and method for domain name resolution.
  9. Doviak, William; Whitmore, David L.; Houvig, Flex, Apparatus and method for intelligent routing of data between a remote device and a host system.
  10. Jungck, Peder J., Apparatus and method for virtual edge placement of web sites.
  11. Campbell, Douglas A.; Hamor, Alan B.; Helton, Mike D., Apparatus, system, and method for communicating to a network through a virtual domain.
  12. Campbell,Douglas A.; Hamor,Alan B.; Helton,Mike D., Apparatus, system, and method for communicating to a network through a virtual domain providing anonymity to a client communicating on the network.
  13. Shaked, Shvat; Tal, Or; Tarsi, Yuval; Wilf, Saar, Application of automatic internet identification methods.
  14. Villavicencio,Francisco J.; Knouse,Charles W., Authorization services with external authentication.
  15. Agarwal,Sachin; Lee,Michele C., Automatic configuration of attribute sets.
  16. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  17. Tung Loo,Elise Y.; Lee,Chi Cheng; Agarwal,Sachin, Blocking cache flush requests until completing current pending requests in a local server and remote server.
  18. Scheinkman,Luiz, Browser with messaging capability and other persistent connections.
  19. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Bulk configuring a virtual private network.
  20. Bate,Lyle; Carter,Stephen R.; Nevarez,Carlos A., Caching and accessing rights in a distributed computing system.
  21. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Categorization of a mobile user profile based on browse and viewing behavior.
  22. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Categorization of a mobile user profile based on browse behavior.
  23. Mercier, Christina Woody; Fuller, William Tracy; Banks, Donald Edward; Rinehart, Thomas Alan; Chang, Bang; Melville, Noel Christopher, Coherent device to device data replication.
  24. Ramer, Jorey; Doughty, Dennis; Soroca, Adam, Contextual mobile content placement on a mobile communication facility.
  25. Soroca, Adam; Tengler, Matthew, Contextual targeting of content using a monetization platform.
  26. Anke, Juergen, Cost-based deployment of components in smart item environments.
  27. Toomey,Christopher Newell, Cross-site timed out authentication management.
  28. Wassom, Jack; Schaefer, Renee; Chandler, Cory, Customized user interface.
  29. Wassom, Jack; Schaefer, Renee; Chandler, Cory, Customized user interface.
  30. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customized user interface based on user profile information.
  31. Kimball,Jeffrey David; Wassom, Jr.,John Thurston; Dolan,Christina Ann Rank, Customized user interface based on user record information.
  32. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customized user interface for subordinate users.
  33. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customizing user interfaces.
  34. Kimball, Jeffrey David; Wassom, Jr., John Thurston; Dolan, Christina Ann Rank, Customizing user interfaces based on user activities.
  35. Umbreit, Timothy F., Date of birth authentication system and method using demographic and/or geographic data supplied by a subscriber that is verified by a third party.
  36. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  37. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  38. Jacoby, Brian; Wright, Christopher J., Deep packet scan hacker identification.
  39. Delany,Shawn P.; Ahmed,Sajeed, Determining a user's groups.
  40. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Determining group membership.
  41. Bornhoevd, Christof; Mo, Brian S.; Wiemann, Matthias M., Device registration in a hierarchical monitor service.
  42. Kent, Jr., Larry G.; Peterson, Bruce, Distributed web publishing.
  43. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  44. Teng, Joan C.; Remahl, Thomas B., Domain based workflows.
  45. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Dynamic bidding and expected value.
  46. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Dynamic bidding and expected value.
  47. Eyal, Aviv; Aposporos, George, Dynamic ratings-based streaming media playback system.
  48. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter apparatus and method.
  49. Jungck,Peder J.; Najam,Zahid; Nguyen,Andrew T.; Penke,Ramachandra Rao, Edge adapter architecture apparatus and method.
  50. Ramer, Jorey; Doughty, Dennis; Soroca, Adam; Karasic, Neal J., Embedding sponsored content in mobile applications.
  51. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Embedding sponsored content in mobile applications.
  52. Sinn, Richard P.; Teng, Joan C.; Remahl, Thomas B., Employing electronic certificate workflows.
  53. Sinn, Richard P., Employing job code attributes in provisioning.
  54. Agarwal,Sachin; Remahl,Thomas; Teng,Joan, Employing local data stores to maintain data during workflows.
  55. Sinn, Richard; Yuen, Stan; Lee, Chi-Cheng, Employing wrapper profiles.
  56. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  57. Alcazar,Mark A.; Michail,Ashraf A.; Bedworth,John G., Event routing model for an extensible editor.
  58. Michail, Ashraf A.; Bedworth, John G.; Alcazar, Mark A., Event routing model for an extensible editor.
  59. Tsai, Peter Ming, Facility for distributing and providing access to electronic mail message attachments.
  60. Tsai, Peter Ming, Facility for distributing and providing access to electronic mail message attachments.
  61. Moreira Sa de Souza, Luciana, Fault tolerance framework for networks of nodes.
  62. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  63. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  64. Seamus Brendan Donohue IR, Filtering incoming e-mail.
  65. Gregory Grefenstette FR; Claude Roux FR, Finding groups of people based on linguistically analyzable content of resources accessed.
  66. Rampal, Sanjeev; Retana, Alvaro; White, Russell; Ervin, Jimmy; Trinh, Hoe, Forwarding for network devices.
  67. Lemon,Ana H. von Klopp, HTTP transaction monitor.
  68. Bornhoevd, Christof; Avanes, Artin; Ziekow, Holger R.; Mo, Brian S.; Wiemann, Matthias M., Hierarchical, multi-tiered mapping and monitoring architecture for service-to-device re-mapping for smart items.
  69. Bornhoevd, Christof; Avanes, Artin; Ziekow, Holger Robert; Mo, Brian S.; Wiemann, Matthias M., Hierarchical, multi-tiered mapping and monitoring architecture for smart items.
  70. Bornhoevd, Christof; Avanes, Artin; Ziekow, Holger Robert; Mo, Brian S.; Wiemann, Matthias M., Hierarchical, multi-tiered mapping and monitoring architecture for smart items.
  71. Michail, Ashraf A.; Alcazar, Mark A.; Bedworth, John G., Highlight rendering services component for an extensible editor.
  72. Michail,Ashraf A.; Alcazar,Mark A.; Bedworth,John G., Highlight rendering services component for an extensible editor.
  73. Schneider, Eric, Homepage access method, product, and apparatus.
  74. Schneider,Eric, Homepage access method, product, and apparatus.
  75. Delaney, Shawn P.; Summers, Robert, Identifying dynamic groups.
  76. Delaney,Shawn P.; Summers,Robert, Identifying dynamic groups.
  77. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  78. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Idle screen advertising.
  79. Villavicencio, Francisco J., Impersonation in an access system.
  80. Villavicencio,Francisco J., Impersonation in an access system.
  81. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Increasing mobile interactivity.
  82. Doi, Masataka, Information processing apparatus, method of controlling information processing apparatus, program for control method, and recording medium for program.
  83. Chun, Jon Andre; Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Intelligent secure data manipulation apparatus and method.
  84. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritization of mobile content.
  85. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritization of mobile content.
  86. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritization of mobile content.
  87. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Interaction analysis and prioritzation of mobile content.
  88. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Interactive mobile advertisement banners.
  89. Hodges, Jeffrey D., Intrusion threat detection.
  90. Ramamurthy,Srinivasagopalan; Teng,Joan C., Localized access.
  91. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Location based mobile shopping affinity program.
  92. Joshi, Vrinda S.; Ramamurthy, Srinivasagapala, Logging access system events.
  93. Soroca, Adam; Karasic, Neal J., Management of multiple advertising inventories using a monetization platform.
  94. Soroca, Adam; Karasic, Neal J., Management of multiple advertising inventories using a monetization platform.
  95. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Managing a virtual private network.
  96. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  97. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  98. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  99. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing payment for sponsored content presented to mobile communication facilities.
  100. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on device characteristics.
  101. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  102. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content based on usage history.
  103. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Managing sponsored content for delivery to mobile communication facilities.
  104. Hsu, Stephen Dao Hui; Hormuzdiar, James Noshir; Chun, Jon A, Method and apparatus for encrypted communications to a secure server.
  105. Hsu,Stephen Dao Hui; Hormuzdiar,James Noshir; Chun,Jon A, Method and apparatus for encrypted communications to a secure server.
  106. Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Method and apparatus for encrypted communications to a secure server.
  107. Jungck,Peder J., Method and apparatus for facilitating client server communications over a network.
  108. Vora, Kumar; Raman, Rajesh; Ramamurthy, Prakash; Swadi, Praveen R.; Shandony, Michael J.; Joshi, Vrinda S.; Moatazedi, Shahram; Stone, Adam C., Method and apparatus for implementing a corporate directory and service center.
  109. Vora,Kumar; Raman,Rajesh; Ramamurthy,Prakash; Swadi,Praveen R.; Shandony,Michael J.; Joshi,Vrinda S.; Moatazedi,Shahram; Stone,Adam C., Method and apparatus for implementing a corporate directory and service center.
  110. Gai, Silvano; McCloghrie, Keith; Kanekar, Bhushan M., Method and apparatus for organizing, storing and evaluating access control lists.
  111. Khirman,Stanislav; Stone,Mark Ronald; Arial,Oren; Cohen,Ori, Method and apparatus for providing additional information in response to an application server request.
  112. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  113. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olsen, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  114. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  115. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  116. Hanson, Aaron D.; Sturniolo, Emil A.; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  117. Hanson, Aaron D.; Sturniolo, Emil; Menn, Anatoly; Olson, Erik D.; Savarese, Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  118. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  119. Hanson,Aaron D.; Sturniolo,Emil A.; Menn,Anatoly; Olson,Erik D.; Savarese,Joseph T., Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  120. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Thompson, Dave; Jackson, Michael; Renouard, Julia, Method and apparatus for providing mobile and other intermittent connectivity in a computing environment.
  121. Sturniolo, Emil; Stavens, Aaron; Savarese, Joseph, Method and apparatus for providing secure connectivity in mobile and other intermittent computing environments.
  122. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  123. Sinn,Richard P., Method and apparatus for provisioning tasks using a provisioning bridge server.
  124. Vinati,Felice; Vinati,Samuele; Vinati,Matteo, Method and device for controlling the time which a user spends connected to a data communication network.
  125. Dempski, David R., Method and system for collecting data on the internet.
  126. Pelletier,Michael C., Method and system for delivering encrypted content with associated geographical-based advertisements.
  127. Bova, Alfred T., Method and system for digital coupons distributed via a television program.
  128. Bova, Alfred T., Method and system for integrating television brand advertising with promotional marketing.
  129. Bova, Alfred T., Method and system for integrating television brand advertising with promotional marketing.
  130. Yamamoto,Hidenobu; Ogawa,Yukio; Wada,Tokuhiro; Yoshino,Hirofumi; Saitoh,Michiko, Method and system for secure URL-based access control.
  131. Jenkins, Gerald L., Method and system to enable contact with unknown internet account holders.
  132. Jenkins,Gerald L., Method and system to enable contact with unknown internet account holders.
  133. Vinati,Samuele; Vinati,Felice; Berardinelli,Ivan, Method for controlling access to a data communication network, with user identification.
  134. Mair, David A.; Lee, Thomas N., Method for mapping a flat namespace onto a hierarchical namespace using locality of reference cues.
  135. Walters, Glen R., Method for preventing deep linking into a web site.
  136. Bistriceanu, Virgil; Muller, Craig, Method for providing custom profile analysis in a demographic information system.
  137. Goodwin, III,John C.; Francis,John Brian, Method of limiting access to network sites for a network kiosk.
  138. Hoyle, Martin David, Method of reactive targeted advertising.
  139. King, Steve; Stillwell, Jr., Paul M.; Mao, Chiayin, Method of routing HTTP and FTP services across heterogeneous networks.
  140. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  141. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  142. Schneider, Eric, Method, product, and apparatus for processing a data request.
  143. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  144. Kumar, Jainendra; Dixit, Vineet; Seshachellum, Prabhu, Methods and apparatus for accessing a secure network segment.
  145. O'Toole, Jr.,James W., Methods and apparatus for providing security in a caching device.
  146. Mowrer, Samantha M.; Poppie, Molly; Shankar, Balachander; Wong, Ieok Hou; Lee, Choongkoo; Cui, Xiaoqi; Kurzynski, David J.; Peters, Richard; Spoentgen, Remy, Methods and apparatus to assign viewers to media meter data.
  147. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  148. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  149. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  150. Shankar, Balachander; Poppie, Molly; Kurzynski, David J; Garcia, Jarrett; Chmura, Lukasz; You, Huaxin; Doe, Peter; Bourquin, Christine; Dolson, Timothy; Cui, Xiaoqi; Lee, Choongkoo; Spoentgen, Remy, Methods and apparatus to characterize households with media meter data.
  151. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal, Methods and systems for mobile coupon placement.
  152. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Methods and systems for mobile coupon placement.
  153. Thapliyal, Ashish V.; Mittal, Vishal; Spataro, Tony; Kennedy, John, Methods and systems for providing scalable authentication.
  154. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  155. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  156. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile advertisement syndication.
  157. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile advertisement syndication.
  158. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile comparison shopping.
  159. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile content cross-inventory yield optimization.
  160. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Groh, Andrew M., Mobile content spidering and compatibility determination.
  161. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal, Mobile dynamic advertisement creation and placement.
  162. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Mobile dynamic advertisement creation and placement.
  163. Ramer, Jorey; Soroca, Adam; Doughty, Dennis; Karasic, Neal J., Mobile dynamic advertisement creation and placement.
  164. Sturniolo, Emil A.; Savarese, Joseph T.; Olson, Erik; Patashnik, Eli, Mobile networking system and method using IPv4 and IPv6.
  165. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Mobile search service instant activation.
  166. Bornhoevd, Christof; Mo, Brian S.; Wiemann, Matthias M., Modular monitor service for smart item monitoring.
  167. Bornhoevd, Christof; Mo, Brian S.; Wiemann, Matthias M., Modular monitor service for smart item monitoring.
  168. Pansari, Ambar; Ewing, Jessica R., Monetizing service calls through advertising.
  169. Pansari, Ambar; Ewing, Jessica R., Monetizing service calls through advertising.
  170. Poisson,Matthew W.; Desroches,Melissa L.; Milillo,James M.; Subbarao,Ravi, Monitoring a virtual private network.
  171. Remahl, Thomas; Tsang, Andy; Summers, Bob, Multi-language support for enterprise identity and access management.
  172. Kerr, Brian J.; Anderson, Russell; Young, Corey, Network access control using a quarantined server.
  173. Campbell, Douglas A.; Hamor, Alan B.; Helton, Mike D., Network communication through a virtual domain.
  174. Schneider, Eric, Network resource access method, product, and apparatus.
  175. Sinn,Richard P., Obtaining and maintaining real time certificate status.
  176. de Heer, David L., Online advertisement selection.
  177. Ghatare,Sanjay P., Partitioning data access requests.
  178. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  179. Delany,Shawn P.; Ahmed,Sajeed; Ganitsky,Vivian M., Policies for modifying group membership.
  180. Tsang,Andy; Barber,Brandon, Portal bridge.
  181. Knouse,Charles W.; Thiyagarajan,Lakshmi Velandai, Post data processing.
  182. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Predictive text completion for a mobile communication facility.
  183. Lee, Michele C., Preparing output XML based on selected programs and XML templates.
  184. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of search results to mobile devices based on television viewing history.
  185. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of search results to mobile devices based on television viewing history.
  186. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  187. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  188. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  189. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presentation of sponsored content on mobile device based on transaction event.
  190. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  191. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  192. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Presenting sponsored content on a mobile communication facility.
  193. Chan, Victor S.; Khusial, Darshanand; Vandergoot, Jacob T., Previewing in live electronic commerce environment.
  194. Loukianov, Dmitrii, Providing a configuration file to a communication device.
  195. Joshi,Vrinda S.; Thiyagarajan,Lakshmi Velandai, Providing data to applications from an access system.
  196. Drakeley, Erin E.; Amatucci, Mike; Iannucci, Lou; McLure, David; McDonough, John, Providing one party access to an account of another party.
  197. Teng,Joan C.; Lee,Chi Cheng, Proxy system.
  198. Elliott, Karl E.; Garrard, Kenneth W.; Huang, Andy; Gratzer, Peter, Real time dynamic client access control.
  199. Abelow, Daniel H., Reality alternate.
  200. Eisendrath,Benjamin; Spannbauer,Bradley; Smith, Jr.,Stanley O., Regulating concurrent logins associated with a single account.
  201. Cui, Lawrence; Marchukov, Mark Vladimirovich; Vo, Phan T.; Mendhekar, Anurag; Vishwanath, Mohan, Removing cookies from web page response headers and storing the cookies in a repository for later use.
  202. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Rendering targeted advertisement on mobile communication facilities.
  203. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Revenue models associated with syndication of a behavioral profile using a monetization platform.
  204. Sinn,Richard P.; Remahl,Thomas B.; Tsang,Andy M., Rule based data management.
  205. Delany,Shawn P.; Ahmed,Sajeed, Runtime modification of entries in an identity system.
  206. Toomey, Christopher Newell; Cahill, Conor, Seamless cross-site user authentication status detection and automatic login.
  207. Toomey, Christopher Newell; Cahill, Conor, Seamless cross-site user authentication status detection and automatic login.
  208. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  209. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  210. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  211. Lee,Michele C.; Ahmed,Sajeed, Securely persisting network resource identifiers.
  212. Michail,Ashraf A.; Alcazar,Mark A.; Bedworth,John G., Selection services component for an extensible editor.
  213. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  214. Joshi,Vrinda S.; Swadi,Praveen R.; Summers,Robert L., Selective cache flushing in identity and access management systems.
  215. Bharadwaj, Manjunath; Howell, Nathan; Jiang, Wei, Selective filtering of network traffic requests.
  216. Gbadegesin,Abolade, Server access control methods and arrangements.
  217. Bornhoevd, Christof; Avanes, Artin; Ziekow, Holger Robert; Nochta, Zoltan; Kubach, Uwe; Spiess, Patrik; Moreira Sa de Souza, Luciana; Haller, Stephan, Service-to-device re-mapping for smart items.
  218. Koch, Robert A.; Caldwell, Hamish M., Simultaneous visual and telephonic access to interactive information delivery.
  219. Koch, Robert A.; Caldwell, Hamish M., Simultaneous visual and telephonic access to interactive information delivery.
  220. Azuma, Tomihiko, Single sign-on system and single sign-on method for a web site and recording medium.
  221. Hyatt, David; Guha, Ramanathan, Smart browsing providers.
  222. Hyatt,David; Guha,Ramanathan, Smart browsing providers.
  223. Vora, Sanjay V.; Kluck, Joseph R.; Nerenberg, William J.; Dent, David E.; Cohen, Paul M., Structured web advertising.
  224. Vora, Sanjay V.; Kluck, Joseph R.; Nerenberg, William J.; Dent, David E.; Cohen, Paul M., Structured web advertising.
  225. Vora, Sanjay V.; Kluck, Joseph R.; Nerenberg, William J.; Dent, David E.; Cohen, Paul M., Structured web advertising.
  226. Vora,Sanjay V.; Kluck,Joseph R.; Nerenberg,William J.; Dent,David E.; Cohen,Paul M., Structured web advertising.
  227. Brohlin, Paul L., Supply independent low quiescent current undervoltage lockout circuit.
  228. Ghatare, Sanjay P., Support for RDBMS in LDAP system.
  229. Lee, Chi-Cheng; Tsang, Andy M.; Remahl, Thomas B., Support for multiple data stores.
  230. Agarwal,Sachin; Thiyagarajan,Lakshmi V., Support for multiple mechanisms for accessing data stores.
  231. Jain,Vikas; Lee,Michele C., Supporting multiple application program interfaces.
  232. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, Syndication of a behavioral profile associated with an availability condition using a monetization platform.
  233. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  234. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  235. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  236. Leonardo C. Massarani, System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks.
  237. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  238. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  239. Christiansen, Bernd Oliver, System and method for dynamically altering videoconference bit rates and layout based on participant activity.
  240. Eichstaedt, Matthias; Emens, Michael Lawrence; Kraft, Reiner, System and method for dynamically limiting robot access to server data.
  241. Carringer, Michael; Schmid, Mark, System and method for generating a modified web page by inline code insertion in response to an information request from a client computer.
  242. Carringer, Michael; Schmid, Mark, System and method for generating a modified web page by inline code insertion in response to an information request from a client computer.
  243. Carringer, Michael; Schmid, Mark L., System and method for generating a modified web page by inline code insertion in response to an information request from a client computer.
  244. Mark L. Schmid ; Michael W. Carringer, System and method for generating a modified web page in response to an information request from a client computer.
  245. Desai, Ajay; Lei, Ming; Goell, Fredric; Jacobs, Lawrence, System and method for managing security meta-data in a reverse proxy.
  246. He, Ling, System and method for preventing web crawler access.
  247. Jungck, Peder J., System and method for processing packets according to concurrently reconfigurable rules.
  248. Jungck, Peder J., System and method for processing packets according to user specified rules governed by a syntax.
  249. Jungck,Peder J., System and method for processing packets using location and content addressable memories.
  250. Thai, Hien T.; Shatzkamer, Kevin D.; Gasson, Andrew G.; Andriantsiferana, Laurent; Hamel, Eric; Iyer, Jayaraman R., System and method for providing security in a network environment using accounting information.
  251. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  252. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  253. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  254. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  255. Hubbard, Dan, System and method of controlling access to the internet.
  256. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  257. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  258. Yamamoto, Hidenobu; Ogawa, Yukio; Wada, Tokuhiro; Yoshino, Hirofumi; Saitoh, Michiko, System and program for access control.
  259. Eyal, Aviv; Aposporos, George, System for sharing and rating streaming media playlists.
  260. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  261. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  262. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  263. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  264. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  265. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  266. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  267. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  268. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  269. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  270. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  271. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  272. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  273. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  274. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  275. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  276. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  277. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  278. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  279. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  280. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  281. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  282. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  283. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  284. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  285. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, System for targeting advertising content to a plurality of mobile communication facilities.
  286. Spiess, Patrik; Sa de Souza, Luciana Moreira; Haller, Stephan; Nochta, Zoltan, System monitor for networks of nodes.
  287. Broquist, Thomas; Eriksson, Lars, System operable to identify and access information about a user.
  288. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  289. Falcon, Stephen R.; Vetrivelkumaran, Vellore T.; Gulabani, Raju; Malik, Neel, Systems and methods for controlling the number of clients that access a server.
  290. Vetrivelkumaran, Vellore T.; Gulabani, Raju; Falcon, Stephen R.; Malik, Neel, Systems and methods for controlling the number of clients that access a server.
  291. Vetrivelkumaran, Vellore T.; Malik, Neel; Gulabani, Raju; Falcon, Stephen Russell, Systems and methods for controlling the number of clients that access a server.
  292. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  293. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  294. Agarwal, Puneet; Adhya, Saibal Kumar; Thirunarayanan, Srinivasan; Harris, James, Systems and methods for fine grain policy driven cookie proxying.
  295. Gilbert, Lanny, Systems and methods for limiting web site access.
  296. Gilbert, Lanny, Systems and methods for limiting web site access.
  297. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  298. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  299. Agarwal, Puneet; Adhya, Saibal Kumar; Thirunarayanan, Srinivasan; Harris, James, Systems and methods for proxying cookies for SSL VPN clientless sessions.
  300. Agarwal, Puneet; Adhya, Saibal Kumar; Thirunarayanan, Srinivasan; Harris, James, Systems and methods for proxying cookies for SSL VPN clientless sessions.
  301. Chan,Christine Wai Han, Systems and methods for testing whether access to a resource is authorized based on access information.
  302. Margel, Shiri; Mantin, Itsik; Shulman, Amichai, Techniques for preventing large-scale data breaches utilizing differentiated protection layers.
  303. Teng, Joan C., Template based workflow definition.
  304. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  305. Margel, Shiri; Mantin, Itsik; Shulman, Amichai, Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets.
  306. Martherus, Robin E.; Ramamurthy, Srinivasagopalan, User authentication.
  307. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  308. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, User characteristic influenced search results.
  309. Eyal, Aviv; Aposporos, George, User input-based play-list generation and playback system.
  310. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, User profile-based presentation of sponsored mobile content.
  311. Ramer, Jorey; Soroca, Adam; Doughty, Dennis, User transaction history influenced search results.
  312. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  313. Maes, Stephane H., Using identity/resource profile and directory enablers to support identity management.
  314. Elberse, Arik; Yoakum, John H., Using interactive communication session cookies in web sessions.
  315. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Virtual private network manager GUI with links for use in configuring a virtual private network.
  316. Baker, Chad; Chacon, Ryan Edward; Jones, Dave; Linhoff, David M.; Rohr, William, Wireless two-way communication protocol for automated furniture accessory integration.
  317. Baker, Chad; Chacon, Ryan Edward; Jones, Dave; Rohr, William; Gopalakrishnan, Vinod Kumar; Linhoff, David M., Wireless two-way communication protocol for automated furniture accessory integration.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로