$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Directional set operations for permission based security in a computer system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-001/26
출원번호 US-0116515 (1998-07-15)
발명자 / 주소
  • Michael S. Jerger
  • Jeffrey A. Bisset
  • Craig T. Sinclair
  • Michael J. Toutonghi
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Christensen O'Connor Johnson Kindness, PLLC
인용정보 피인용 횟수 : 180  인용 특허 : 21

초록

Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. The security model includes the configuration of a system security policy that is stored on a host computer. The system security policy is configured by

대표청구항

1. A computer based method for comparing a dominant set of elements to a subordinate set of elements, comprising:retrieving an element from a subordinate set of elements derived from an electronic document and a corresponding element from a dominant set of elements stored in a computer memory; compa

이 특허에 인용된 특허 (21)

  1. McDonough John C. ; Saravanan Thiagarajan ; Amatucci Michael P. ; Iannucci Louis A. ; Ingham David M., Controlling access to information.
  2. Kennelly Richard J. ; Donahue Peter E. ; Ouellette Kenneth W., Dynamic presentation of management objectives based on administrator privileges.
  3. Thorne John ; Davis Marie L. ; Strauss Michael J., Electronic mail security.
  4. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  5. Zucknovich Stephen M. ; Leisy Jacques ; Kitain Eduard ; Urazov Yuri ; Baird George ; Blazek Paul ; Prohorov Dmitry ; Kolfman Michael ; Yackubovich Alex, Information delivery system and method including restriction processing.
  6. Roskind James A., Java security mechanism.
  7. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  8. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  9. Van Hoff Arthur ; Payne Jonathan ; Shaio Sami, Method for the distribution of code and data updates.
  10. Polcyn Michael J., Monitoring and directing flow of HTML documents for security and access.
  11. Gerstel Ornan Alexander, Paradigm for enabling interoperability between different subnetworks.
  12. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  13. Lenz Frederick P., Quality driven expert system.
  14. Zinsky Timothy R. ; Shaver Charles N. ; Kaiser ; Jr. Roger A. ; Rawlins Paul B., Security control for personal computer.
  15. Eick Stephen G. ; Mockus Audris ; Graves Todd L. ; Karr Alan F., System and method for interactive visualization, analysis and control of a dynamic database.
  16. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  17. Wied William J. ; Loa Kanchei, System and method of communicating between trusted and untrusted computer systems.
  18. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  19. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  20. Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.
  21. Rowney Kevin T. B. ; Chen Yuhua, System, method and article of manufacture for secure digital certification of electronic commerce.

이 특허를 인용한 특허 (180)

  1. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  2. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  7. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  8. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  9. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  10. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  11. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  12. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  13. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  14. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  15. LaMacchia,Brian A.; Fee,Gregory Darrell; Kohnfelder,Loren M.; Kamath,Ashok Cholpady, Applying a permission grant set to a call stack during runtime.
  16. Yarsa, Julianne; Rich, Bruce Arland; Shrader, Theodore Jack London; Skibbie, Donna, Architecture for denied permissions in Java.
  17. Shrader, Theodore Jack London; Rich, Bruce Arland; Yarsa, Julianne; Skibbie, Donna, Architecture for dynamic permissions in java.
  18. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V.; Hopcroft, Michael J., Architectures for and methods of providing network-based software extensions.
  19. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  20. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  21. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  22. Hill, Duncan Christopher, Cloud computing gateway, cloud computing hypervisor, and methods for implementing same.
  23. Hill, Duncan Christopher, Cloud computing gateway, cloud computing hypervisor, and methods for implementing same.
  24. Hill, Duncan Christopher, Cloud computing gateway, cloud computing hypervisor, and methods for implementing same.
  25. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  26. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  27. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  28. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  29. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  30. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  31. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  32. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  33. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  34. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  35. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  36. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  37. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  38. Satish, Sourabh; Hernacki, Brian, Detecting new or modified portions of code.
  39. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  40. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  41. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  42. Ng,Raymond K., Distributed capability-based authorization architecture using roles.
  43. Brothers,Laurence R., Electronic catalog method.
  44. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  45. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  46. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  47. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  48. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  49. Kovarik, Jr.,Vincent Joseph, Enforcing computer security utilizing an adaptive lattice mechanism.
  50. Fee, Gregory D.; Goldfeder, Aaron; Hawkins, John M.; Cool, Jamie L.; Lange, Sebastian; Khorun, Sergey, Evidence-based application security.
  51. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  52. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  53. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  54. Milas, Brian T., Identity map creation.
  55. Codignotto, John D., Individual user selectable multi-level authorization method for accessing a computer system.
  56. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Information processing apparatus, and system having preview control, and method thereof, and storage medium storing program for implementing the method.
  57. Leong, Chik Weng; Ng, Ying Chyn; Lau, Chee Hoo, Internet security.
  58. Leverenz, Neal T., Java automation, testing, and analysis.
  59. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  60. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  61. Hiller,Dean, Method and apparatus for processing internet site names through regular expression comparison.
  62. Sawicki, Marcin; Namba, Katsuhiro A.; Jones, Brian; Pratley, Christopher, Method and apparatus for protecting regions of an electronic document.
  63. Chandrasekar Balasubramaniam ; Ravi Kannan ; Siddaraya Basappa Revashetti IN; Srivats Sampath ; Babu Katchapalayam, Method and apparatus for securing software distributed over a network.
  64. Natarajan,Vijaykumar; Kasaravalli,Vishwanath; Scott,Goerge Mark, Method and system for dynamic protocol selection among object-handled specified protocols.
  65. Manfe, Thierry; Packer, Allan Neil; Gerdts, Michael Leroy; Nadkarni, Sanjay Gurudatt; Butler, Jesse, Method and system for generating and deploying container templates.
  66. Doron Elgressy IL; Asher Jospe IL, Method and system for preventing the downloading and execution of executable objects.
  67. Elgressy, Doron; Jospe, Asher, Method and system for preventing the downloading and execution of executable objects.
  68. Ruthfield, Scott L.; Banks, Richard, Method and systems of providing information to computer users.
  69. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  70. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  71. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  72. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  73. Morgan, Dennis; Gavrilescu, Alexandru; Burstein, Jonathan L.; Shelest, Art; LeBlanc, David, Method of assisting an application to traverse a firewall.
  74. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  75. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  76. Murphy, Christopher, Methods and systems for internet security via virtual software.
  77. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  78. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  79. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  80. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  81. Murphy, Christopher, Methods for internet security via multiple user authorization in virtual software.
  82. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  83. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Sanchez, Lawrence M.; Licata, John A., Methods, systems, architectures and data structures for delivering software via a network.
  84. Lotter, Robert A.; Allard, Timothy S., Mobile communication device monitoring systems and methods.
  85. Lotter, Robert A.; Allard, Timothy S., Mobile communication device monitoring systems and methods.
  86. Lotter, Robert A.; Allard, Timothy S., Mobile communication device monitoring systems and methods.
  87. Lotter, Robert A.; Allard, Timothy S., Mobile communication device monitoring systems and methods.
  88. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  89. Oliphant, Brett M., Multiple-path remediation.
  90. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  91. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  92. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Raman,Suryanarayanan V., Network-based software extensions.
  93. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  94. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  95. Ghemawat, Sanjay; Piscitello, John; Tong, Simon; Cutts, Matt, Permitting users to remove documents.
  96. Ghemawat, Sanjay; Piscitello, John; Tong, Simon; Cutts, Matt, Permitting users to remove documents.
  97. Milas, Brian T., Policy enforcement using ESSO.
  98. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  99. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  100. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  101. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  102. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  103. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  104. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  105. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  106. Phillips, Debra; Wilson, Brian; Leach, Lorraine; Webster, Thomas Scott; Mayo, Michelle, Rules-based content management.
  107. Phillips, Debra; Wilson, Brian; Leach, Lorraine; Webster, Thomas Scott; Mayo, Michelle, Rules-based content management.
  108. Phillips, Debra; Wilson, Brian; Leach, Lorraine; Webster, Thomas Scott; Mayo, Michelle, Rules-based content management.
  109. Phillips, Debra; Wilson, Brian; Leach, Lorraine; Webster, Thomas Scott; Mayo, Michelle, Rules-based content management.
  110. Phillips, Debra; Wilson, Brian; Leach, Lorraine; Webster, Thomas Scott; Mayo, Michelle, Rules-based content management.
  111. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  112. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  113. Isaacs, Scott; Yolleck, Stephen Mark; Logan, Ronald Keith, Secure and extensible policy-driven application platform.
  114. Zissimopoulos,Vasileios; Topalov,Ognian Zdravkov, Secure method for roaming keys and certificates.
  115. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  116. Teixeira, Steven L.; Carr, Christopher, Security system and methodology for providing indirect access control.
  117. Freund, Gregor P., Security system with methodology for interprocess communication control.
  118. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  119. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  120. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  121. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  122. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  123. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  124. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  125. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  126. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  127. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  128. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  129. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  130. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  131. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  132. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  133. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  134. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  135. Martinez, Frank; Pulier, Eric, System and method for a cloud computing abstraction with self-service portal for publishing resources.
  136. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  137. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  138. Kaufmann, Tzach; Samia, Alon, System and method for dynamically enforcing security policies on electronic files.
  139. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  140. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  141. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  142. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  143. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  144. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  145. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  146. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  147. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  148. Owen, Russell Norman; Little, Herbert Anthony; Yach, David Paul; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  149. Owen, Russell Norman; Little, Herbert Anthony; Yach, David Paul; Shenfield, Michael, System and method for secure control of resources of wireless mobile communication devices.
  150. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  151. Freund, Gregor P., System and methodology for protecting new computers by applying a preconfigured security update policy.
  152. Albert, Anthony; Kawamura, Kyle; Haycock, Keith; Herrmann, Conrad, System and methodology for security policy arbitration.
  153. Teixeira, Steven L., System and methodology providing information lockbox.
  154. Konanka, Dzmitry; Liahuski, Andrei, System and methodology providing secure workspace environment.
  155. Agarwal, Sameet H.; Raman, Balan Sethu; Anand, Sanjay; Leach, Paul J.; Ward, Richard B., System and methods providing enhanced security model.
  156. Agarwal,Sameet H.; Raman,Balan Sethu; Anand,Sanjay; Leach,Paul J.; Ward,Richard B., System and methods providing enhanced security model.
  157. Herrmann, Conrad K., System providing methodology for access control with cooperative enforcement.
  158. LaRue, Daniel V., System that employs inferencing for troubleshooting complex user authentication problems.
  159. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  160. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, System, method and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  161. Balasubramaniam, Chandrasekar; Kannan, Ravi; Revashetti, Siddaraya Basappa; Sampath, Srivats; Katchapalayam, Babu, System, method, and computer program product for performing one or more maintenance tasks on a remotely located computer connected to a server computer via a data network.
  162. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  163. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  164. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  165. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  166. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  167. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  168. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  169. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  170. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  171. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  172. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  173. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  174. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  175. Balasubramaniam,Chandrasekar; Kannan,Ravi; Revashetti,Siddaraya Basappa; Sampath,Srivats; Katchapalayam,Babu, Uniform resource locator (URL)-based secure download system and method.
  176. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  177. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  178. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  179. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  180. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로