$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Biometric certificates 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-009/00
출원번호 US-0075165 (1998-05-08)
발명자 / 주소
  • Dulude Robert S.
  • Musgrave Clyde
출원인 / 주소
  • GTE Service Corporation
인용정보 피인용 횟수 : 150  인용 특허 : 28

초록

Biometric identification is combined with digital certificates for electronic authentication as biometric certificates. The biometric certificates are managed through the use of a biometric certificate management system. Biometric certificates may be used in any electronic transaction requiring auth

대표청구항

[ What is claimed is:] [1.]1. A method for authenticating an electronic transaction involving a user, comprising the steps of:registering a user, including the steps of:receiving a registration set of physical characteristics of the user at a biometric input device;generating registration biometric

이 특허에 인용된 특허 (28)

  1. Brickell Ernest F. ; Sudia Frank W. ; Kravitz David William ; Freund Peter C. ; Angeles Patrick J., Adaptive multi-step digital signature system and method of operation thereof.
  2. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud verification system using a data card.
  3. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud voter registration and voting system using a data card.
  4. Hill ; Robert B., Apparatus and method for identifying individuals through their retinal vasculature patterns.
  5. Childs Matthew H. (Arlington TX) Norcross Thomas M. (Arlington TX), Automatic data generation for self-test of cryptographic hash algorithms in personal security devices.
  6. Musgrave Clyde, Biometric certifying authorities.
  7. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  8. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  9. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  10. Haab Dan (Springville UT) Patten Dan (Orem UT) Rollins Richard (West Valley City UT) Johnson Kent (Spanish Fork UT) Lee Edgar D. (Highland UT), High speed data acquisition system and method.
  11. Flom Leonard (1903 Post Rd. Fairfield CT 10403) Safir Aran (3 Ellsworth Ave. Cambridge MA 02130), Iris recognition system.
  12. Zubeldia Pedro ; Romney Gordon W., Method and apparatus for managing key revocation.
  13. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for witnessed authentication of electronic documents.
  14. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  15. Kuhns Roger J. (Tower Rd. Lincoln MA 01773) Nathans Robert L. (36 Stag Dr. Billerica MA 01821), Method of reducing fraud in connection with employment, public license applications, social security, food stamps, welfa.
  16. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), Method of verifying fake-proof video identification data.
  17. Eccles Nicholas J. (Edinburgh GB6), Neural network for banknote recognition and authentication.
  18. Katz Alan J. (Dallas TX) Gately Michael T. (Plano TX), Parameter normalized features for classification procedures, systems and methods.
  19. Bonneau ; Jr. Walter C. (Missouri City TX), Personal identification.
  20. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  21. Muftic Sead,SEX, Smart token system for secure electronic transactions and identification.
  22. Sime Iain R. F. (Tayside GB6), System and method for detecting user fraud in automated teller machine transactions.
  23. Galasso Leonard J. ; Zilmer Matthew E. ; Phan Quang, System and method for securely utilizing basic input and output system (BIOS) services.
  24. Monroe Midori (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for decoding and displaying personalized indentification stored on memory storage device.
  25. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  26. Hoffman Ned ; Pare ; Jr. David Ferrin ; Lee Jonathan Alexander, Tokenless biometric electronic rewards system.
  27. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric transaction authorization method and system.
  28. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.

이 특허를 인용한 특허 (150)

  1. Stobbe, Anatoli, Access control system.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  3. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  4. Little, Mark Cameron, Adding biometric identification to the client security infrastructure for an enterprise service bus system.
  5. Mages, Kenneth G.; Lo, Chi Wah; Mages, Kent H.; Tang, Tai Kwan, Apparatus and method for conducting secure financial transactions.
  6. Chen, Lee; Oshiba, Dennis; Chiong, John, Applying security policy to an application session.
  7. Lee, Jonathan Alexander; Lapsley, Philip Dean; Pare, Jr., David Ferrin, Association of finger pores and macrofeatures for identification of individuals.
  8. Zheng, Mingxie; Segawa, Eigo; Shiohara, Morito, Authentication apparatus, authentication method, and computer readable storage medium.
  9. Yasukura,Yutaka, Authentication card system.
  10. Jonas, Jeffrey J., Authorized anonymous authentication.
  11. Jonas, Jeffrey J., Authorized anonymous authentication.
  12. Steinmetz, Richard A.; Brunt, Richard P.; Zahorec, Kenneth W., Automated banking machine configuration system and method.
  13. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  14. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  15. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  16. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael, Biometric financial transaction system and method.
  17. Lapsley, Philip D.; Kleeman, Michael; Gioia, Philip J., Biometric financial transaction system and method.
  18. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Biometric tokenless electronic rewards system and method.
  19. Lapsley, Philip D.; Gioia, Philip J.; Kleeman, Michael; Goff, Tennille V.; Corwin, Daniel J., Biometric transaction system and method.
  20. Ballard, Claudio R.; Pathak, Amarish; Imbruce, Michael T.; Currie, Edward H.; Cassata, James; Freedman, Maurice N., Biometrically enabled private secure information repository.
  21. Forrest,Simon J., Biometrics template.
  22. Chang, Yao-Jen; Chen, Tsu-Han; Zhang, Wen-De, Biometrics-based cryptographic key generation system and method.
  23. Bolle,Rudolf Maarten; Connell,Jonathan H.; Ratha,Nalini K.; Percello,Louis J., Business system and method using a distorted biometrics.
  24. Nomura, Ryosuke, Client distribution system, content distribution method, and client terminal.
  25. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  26. Kaminski, Jr., Charles, Content identification based on a search of a fingerprint database.
  27. O'Connor, Michael; Girard, Luke; Schiffer, Jeff, Continuous verification system.
  28. Bjorn, Vance C.; Lopez, Daniel, Crypto-proxy server and method of using the same.
  29. Karroumi, Mohamed; Courtay, Olivier, Device and method certificate generation.
  30. Groeneveld, Bennett J.; Austad, Wayne E.; Walsh, Stuart C.; Herring, Catherine A., Digital data storage systems, computers, and data verification methods.
  31. Mark Raymond Pace ; Brooks Cash Talley, Distributed content identification system.
  32. Gabryjelski, Henry P.; Miller, Wesley, Enhancement to volume license keys.
  33. Gabryjelski, Henry P.; Miller, Wesley, Enhancement to volume license keys.
  34. Kaminski, Jr., Charles, Fingerprint generation of multimedia content based on a trigger point with the multimedia content.
  35. Kaminski, Jr., Charles F., Generation of fingerprints for multimedia content based on vectors and histograms.
  36. Bransom, Kris; Zarcone, Christopher, Identity authentication using credentials.
  37. Ebrahimi, Armin, Identity management service using a blockchain providing certifying transactions between devices.
  38. Ebrahimi, Armin, Identity management service using a blockchain providing identity transactions between devices.
  39. Nanavati,Samir H.; Nanavati,Rajkumar, Identity verification method using a central biometric authority.
  40. Kon,Masashi; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Watanabe,Hideaki, Information processing apparatus, information processing method, and program providing medium.
  41. Thompson, Micheal, Location determination for user authentication.
  42. Thompson, Micheal, Location determination for user authentication.
  43. Thompson, Micheal, Location determination for user authentication.
  44. Malpani, Ambarish; Varadarajan, Rammohan, Mapping biometrics to a unique key.
  45. Lange, Daniel H., Method and apparatus for electro-biometric identity recognition.
  46. Lange,Daniel H., Method and apparatus for electro-biometric identity recognition.
  47. Jaeger, Jr., William L.; Shanton, M. Greg, Method and apparatus for providing human readable signature with digital signature.
  48. Bjorn,Vance C., Method and apparatus for using a third party authentication server.
  49. Russo, Anthony P., Method and system for biometric image assembly from multiple partial biometric frame scans.
  50. Russo,Anthony P., Method and system for biometric image assembly from multiple partial biometric frame scans.
  51. Mamdani,Malik; Grant,Curtis; Johnson,Patrick; Bomar,Kevin; Whatley,Tim, Method and system for facilitation of wireless e-commerce transactions.
  52. Siegel, Brian; Abram, Philip Michael; Beckwitt, Marc; Gudorf, Gregory D.; Iso, Kazuaki; Raymond, Brian; Tobin, Christopher M., Method and system for restricted biometric access to content of packaged media.
  53. Flink,Yona; Gerber,Itzhak; Maroely,Yariv, Method for carrying out secure digital signature and a system therefor.
  54. Kisters, Friedrich, Method for the temporary personalization of a communication device.
  55. Lapstun, Paul; Silverbrook, Kia, Method of authorizing network publishing.
  56. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  57. Niwa, Kiyohiko, Method of using personal device with internal biometric in conducting transactions over a network.
  58. Ludtke,Harold Aaron; Maritzen,L. Michael, Method or system for executing deferred transactions.
  59. Wanish,Paul J., Method, system and computer program product for facilitating digital certificate state change notification.
  60. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  61. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  62. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  63. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  64. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  65. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  66. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  67. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  68. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  69. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  70. Ching, Peter N., Multi-way transaction related data exchange apparatus and methods.
  71. Shigematsu,Satoshi; Nakanishi,Mamoru; Suto,Hiroki, Network authentication system, method, and program, service providing apparatus, certificate authority, and user terminal.
  72. Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method and program providing medium.
  73. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, and program providing medium.
  74. Futamura,Ichiro; Ishibashi,Yoshihito; Matsuyama,Shinako; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  75. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  76. Watanabe,Hideaki; Ishibashi,Yoshihito; Matsuyama,Shinako; Futamura,Ichiro; Kon,Masashi, Person authentication system, person authentication method, information processing apparatus, and program providing medium.
  77. Jonas, Jeffrey J., Post-anonymous fuzzy comparisons without the use of pre-anonymization variants.
  78. Lapstun, Paul; Silverbrook, Kia, Region delimited coded data having unique length digital signature.
  79. Benson, Wade; Sykora, Libor; Kuzela, Vratislav; Brouwer, Michael; Whalley, Andrew R.; Hauck, Jerrold V.; Finkelstein, David; Mensch, Thomas, Secure circuit for encryption key generation.
  80. Azema, Jerome; Chateau, Alain; Balard, Eric, Secure management of configuration parameters in a computing platform.
  81. Bauchot, Frederic; Marmigere, Gerard; Truntschka, Carole; Tressols, Florence, Secure method and apparatus to verify personal identity over a network.
  82. Chemla, Yves; Richard, Christophe, Security device, method and system for financial transactions, based on the identification of an individual using a biometric profile and a smart card.
  83. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  84. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  85. Kaminski, Jr., Charles F., Surrogate heuristic identification.
  86. Robinson, Timothy, System and method for biometric authorization for check cashing.
  87. Robinson, Timothy L., System and method for biometric authorization for check cashing.
  88. Robinson,Timothy, System and method for biometric authorization for financial transactions.
  89. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for biometrically-initiated refund transactions.
  90. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J., System and method for biometrically-initiated refund transactions.
  91. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  92. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for categorizing transactions.
  93. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for categorizing transactions.
  94. Ludtke, Harold Aaron; Maritzen, L. Michael, System and method for conducting secure transactions over a network.
  95. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for depositing negotiable instruments.
  96. Solinsky,James C., System and method for dynamic knowledge construction.
  97. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J., System and method for enrolling in a biometric system.
  98. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  99. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  100. Robinson, Timothy L.; Schildt, Bradford R.; Gott, Tennille V.; Robinson, Mark B., System and method for enrolling in a biometric system.
  101. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Robinson,Mark B., System and method for enrolling in a biometric system.
  102. Wiersma, Hieronymus Watse, System and method for generating a signature.
  103. Kaminski, Jr., Charles, System and method for identifying substantially similar files.
  104. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for negotiable instrument cashing fee setup by type.
  105. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for negotiable instrument cashing transaction assistance procedures.
  106. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for offering in-lane periodical subscriptions.
  107. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for operating a parking facility.
  108. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  109. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  110. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  111. Hoffman, Ned; Lapsley, Philip Dean, System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse.
  112. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for purchase benefits at a point of sale.
  113. Robinson,Timothy L.; Schildt,Bradford R.; Goff,Tennille V.; Corwin,Daniel J.; Watson,Timothy Neil, System and method for purchase benefits at a point of sale.
  114. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  115. Hoffman, Ned, System and method for tokenless biometric authorization of electronic communications.
  116. Hoffman, Ned, System and method for tokenless biometric electronic scrip.
  117. Montgomery, Jr., William S.; Cooley, II, Leland H.; Lunday, Robert A., System and method for using biometric data for providing identification, security, access and access records.
  118. Robinson, Timothy L.; Schildt, Bradford R.; Goff, Tennille V.; Corwin, Daniel J.; Watson, Timothy Neil, System and method for verifying identity.
  119. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  120. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  121. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  122. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  123. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  124. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  125. Jun, Moon-Seog, System, terminal, and method for digital electrocardiogram authentication.
  126. Geosimonian, Armen, Systems and methods for online identity verification.
  127. Geosimonian, Armen, Systems and methods for online identity verification.
  128. Geosimonian, Armen, Systems and methods for online identity verification.
  129. Geosimonian, Armen, Systems and methods for online identity verification.
  130. Geosimonian, Armen, Systems and methods for online identity verification.
  131. Geosimonian,Armen, Systems and methods for online identity verification.
  132. Bhalerao, Kokil, Systems and methods for secure communications between devices.
  133. Kaminski, Jr., Charles, Systems for comparing image fingerprints.
  134. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic debit and credit transactions.
  135. Lapsley, Philip D.; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  136. Lapsley, Philip Dean; Lee, Jonathan Alexander; Pare, Jr., David Ferrin; Hoffman, Ned, Tokenless biometric electronic financial transactions via a third party identicator.
  137. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean, Tokenless biometric electronic transactions using an audio signature to identify the transaction processor.
  138. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  139. Hoffman, Ned; Pare, Jr., David Ferrin; Lee, Jonathan Alexander, Tokenless electronic transaction system.
  140. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  141. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander, Tokenless electronic transaction system.
  142. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander; Lapsley,Philip Dean, Tokenless financial access system.
  143. Hoffman, Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  144. Hoffman,Ned, Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  145. Ebrahimi, Armin; Khot, Gaurav, Transferring data files using a series of visual codes.
  146. Perfitt, Timothy James, Trusted beacon system and method.
  147. Kaminski, Jr., Charles, Use of hash values for identification and location of content.
  148. Chen, Lee; Chiong, John; Yu, Yang, User access authentication based on network access point.
  149. Yim, Kyeong-Su; Kim, Yang-Gi; Lee, Jeong-Soo; Chang, Eun-Kyu, User authentication method for a remote control apparatus and a remote control apparatus.
  150. Ebrahimi, Armin; Weitzman, Jeff, User identification management system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로