$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Network security zones 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0055772 (1998-04-06)
발명자 / 주소
  • Michael J. Wallent
  • Rajeev Dujari
  • Anand Ramakrishna
  • Loren M. Kohnfelder
  • Lewis Geer
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Christensen O'Connor Johnson Kindness PLLC
인용정보 피인용 횟수 : 270  인용 특허 : 15

초록

A computer based system and method of providing security when receiving digital data at a client computer from one or more Web sites is disclosed. The method includes receiving security configuration information that specifies multiple security zones, each zone corresponding to a set of Web sites. T

대표청구항

1. A computer based method for providing client based security during a network browsing session between a client computer and a server computer, the method comprising:receiving, at the client computer, a Web document from the server computer for execution on the client computer that contains code i

이 특허에 인용된 특허 (15)

  1. McDonough John C. ; Saravanan Thiagarajan ; Amatucci Michael P. ; Iannucci Louis A. ; Ingham David M., Controlling access to information.
  2. Thorne John ; Davis Marie L. ; Strauss Michael J., Electronic mail security.
  3. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  4. Zucknovich Stephen M. ; Leisy Jacques ; Kitain Eduard ; Urazov Yuri ; Baird George ; Blazek Paul ; Prohorov Dmitry ; Kolfman Michael ; Yackubovich Alex, Information delivery system and method including restriction processing.
  5. Esbensen Daniel, Method and apparatus for automated network-wide surveillance and security breach intervention.
  6. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  7. Ault Michael Bradford ; Child Garry L. ; Plassmann Ernst Robert ; Rich Bruce Arland ; Shrader Theodore Jack London ; Soper Davis Kent, Method for executing a user-requested CGI program in a new authentication context while protecting operation of a default web server program.
  8. Van Hoff Arthur ; Payne Jonathan ; Shaio Sami, Method for the distribution of code and data updates.
  9. Polcyn Michael J., Monitoring and directing flow of HTML documents for security and access.
  10. Zinsky Timothy R. ; Shaver Charles N. ; Kaiser ; Jr. Roger A. ; Rawlins Paul B., Security control for personal computer.
  11. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for database access control.
  12. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  13. Wied William J. ; Loa Kanchei, System and method of communicating between trusted and untrusted computer systems.
  14. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  15. Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.

이 특허를 인용한 특허 (270)

  1. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  2. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  3. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  4. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  5. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  6. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  7. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  8. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  9. Kedem, Noam, Apparatus and method for screening new data without impacting download speed.
  10. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V.; Hopcroft, Michael J., Architectures for and methods of providing network-based software extensions.
  11. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  12. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  13. Goodman,Marina; Mesoy,Tor; Taylor,Stanton J.; Reiter,Scott R.; Bowen,Michael T.; Auriemma,Ralph; Alairys,Tamara D.; Degiorgio,Christopher M.; Coleman,Lizbeth Johnson, Architectures for netcentric computing systems.
  14. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  15. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  16. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  17. McArdle, Mark J.; Johnston, Brent A.; Nathan, Philip D. R.; Dool, James, Automatically configuring a computer firewall based on network connection.
  18. Mergi, Aryeh; Bychkov, Eyal; Ziv, Aran, Autonomous local web-server updating.
  19. Chang, William Ho; Viswanathan, Vinaynathan, Autorun for integrated circuit memory component.
  20. Sargent, Scott R., Base service architectures for netcentric computing systems.
  21. Wilhelm, Robert Dale; Brewer, Derek Ryan; Bockus, Michael, Browser locking tool to control navigation away from a current webpage to a target webpage.
  22. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  23. Lin, Jason T.; Hahn, Judah Gamliel, Card-based management of discardable files.
  24. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  25. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  26. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  27. Chang, William Ho; Viswanathan, Vinaynathan, Communication device or media device for providing phone calling service, internet access service, or digital content service.
  28. Kaltenmark,John K.; Alber,Michael W.; Gilliland,William M., Communication service architectures for netcentric computing systems.
  29. Gandhi, Amar S.; Praitis, Edward J.; Kim, Jane T.; Lyndersay, Sean O.; von Koch, Walter V.; Gould, William; Morgan, Bruce A.; Kwan, Cindy, Content syndication platform.
  30. Gandhi, Amar S.; Praitis, Edward J.; Kim, Jane T.; Lyndersay, Sean O.; von Koch, Walter V.; Gould, William; Morgan, Bruce A.; Kwan, Cindy, Content syndication platform.
  31. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  32. Chang, William Ho; Viswanathan, Vinaynathan, Copy protection of software and/or data.
  33. Kaza, Akhilesh; Westbrook, Benjamin M.; Cooperstein, Jeffrey M.; Corby, Karen E.; Alcazar, Mark A., Copy-paste trust system.
  34. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  35. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  36. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  37. Taylor,Stanton J., Data management for netcentric computing systems.
  38. Mullen,Nancy K.; Green,Michael J., Data warehouse computing system.
  39. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  40. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  41. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  42. Khijniak, Pavel; Nielsen, Henrik F., Detecting and modifying security settings for deploying web applications.
  43. Khijniak, Pavel; Nielsen, Henrik F., Detecting and modifying security settings for deploying web applications.
  44. Khijniak, Pavel; Nielsen, Henrik Frystyk, Detecting and modifying security settings for deploying web applications.
  45. Dixon, Christopher John; Pinckney, Thomas, Determining website reputations using automatic testing.
  46. Chang, William Ho; Liu, Christina Ying, Digital content services or stores over the internet that transmit or stream protected or encrypted digital content to connected devices and applications that access the digital content services or stores.
  47. Saito,Takeshi; Teramoto,Keiichi; Monma,Nobuyuki; Aizu,Hiroyuki; Kyuma,Shuichi, Digital home electronic device system for checking in advance if selection by user is trustworthy based on whether command is dangerous to human life or safety.
  48. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  49. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  50. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  51. Hahn, Judah Gamliel, Discardable files.
  52. Hahn, Judah Gamliel; Jagannadha, Baddireddi Kalyan Venkannadora; Subramanian, Natarajanja Raja, Discardable files.
  53. Hahn, Judah Gamliel; Jagannadha, Baddireddi Kalyan Venkannadora; Subramanian, Natarajanja Raja, Discardable files.
  54. Wang, Xudong; Rollinger, Victor; Patil, Abhishek; Gui, Chao; Wang, Weilin; Nova, Michael, Distributed multichannel wireless communication.
  55. Hahn, Judah Gamliel; Koren, David, Download management of discardable files.
  56. Hahn, Judah Gamliel; Koren, David, Download management of discardable files.
  57. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  58. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  59. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  60. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  61. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  62. Plummer, David W., Enhanced browser security.
  63. Hu, Limin; Wu, Ting-Hu; Han, Ching-Chih Jason, Enterprise security management system using hierarchical organization and multiple ownership structure.
  64. Hu, Limin; Wu, Ting-Hu; Han, Ching-Chih Jason, Enterprise security management system using hierarchical organization and multiple ownership structure.
  65. Hu, Limin; Wu, Ting-Hu; Han, Ching-Chih Jason, Enterprise security management system using hierarchical organization and multiple ownership structure.
  66. Sargent, Scott R., Environment service architectures for netcentric computing systems.
  67. Chang, William Ho; Liu, Christina Ying, Essential components for enabling a pervasive wireless digital ecosystem and wireless devices that support the wireless digital ecosystem.
  68. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  69. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  70. Kim, Jane T; Gandhi, Amar S.; von Koch, Walter V.; Lyndersay, Sean O.; Praitis, Edward J.; Gould, William; Ruzyski, David M., Feed and email content.
  71. Gandhi, Amar S.; Kim, Jane T.; Lueders, John H.; Lyndersay, Sean O.; Stevens, Warren G.; Choi, Wayne WY.; Gould, William; Morgan, Bruce A., Finding and consuming web subscriptions in a web browser.
  72. Gandhi, Amar S.; Kim, Jane T.; Lueders, John H.; Lyndersay, Sean Obafemi; Stevens, Warren G.; Choi, Wayne W Y; Gould, William; Morgan, Bruce A., Finding and consuming web subscriptions in a web browser.
  73. Gandhi, Amar S.; Kim, Jane T; Lueders, John H; Lyndersay, Sean O.; Stevens, Warren G; Choi, Wayne Wy; Gould, William; Morgan, Bruce A, Finding and consuming web subscriptions in a web browser.
  74. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  75. Proudler, Graeme John, Identifying a trusted computing entity.
  76. Henrie, James B., Identifying and locating lost or stolen personal digital assistant devices via a landline- or wireless-connected web server.
  77. Dixon, Christopher John; Pinckney, Thomas, Indicating Website reputations during Website manipulation of user information.
  78. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations based on website handling of personal information.
  79. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during an electronic commerce transaction.
  80. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during user interactions.
  81. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  82. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  83. Chang, William Ho; Liu, Christina Ying, Internet based digital content services that provide content upload, content storage, content sharing, content playlist selection, content editing, or content download; and smart phones, information pads, smart televisions and printers with access to the internet based digital content services.
  84. Chang, William Ho; Liu, Christina Ying, Internet-pad specification, the internet-pad specification may include a touch sensitive screen, a digital camera, a document application, an e-mail application, icons over the touch sensitive screen for user selection, a wireless communication unit for wireless connectivity, a digital content application for playing digital content, and an operating system supporting application programming interface (API).
  85. Chang, William Ho; Liu, Christina Ying, Internet-pads that include a digital camera, a touch sensitive screen interface, and support for voice activated commands.
  86. Chang, William Ho; Liu, Christina Ying, Internet-phone or smart phone with applications for managing and playing digital content, and a mobile device operating system supporting application programming interface.
  87. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  88. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  89. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  90. Corr, Jonathan H.; Hu, Limin; Chen, Tsu-Wang, Loan origination software system for processing mortgage loans over a distributed network.
  91. Corr, Jonathan Howard; Hu, Limin; Chen, Tsu-Wang, Loan origination software system for processing mortgage loans over a distributed network.
  92. Hu, Limin; Khanpour, Babak, Loan origination system interface for online loan application processing.
  93. Hu,Limin; Khanpour,Babak, Loan origination system interface for online loan application processing.
  94. Corr, Jonathan; Hu, Limin; Roof, Richard E.; Wu, Ting-Hu, Loan screening.
  95. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  96. Schneider, James P., Managing website blacklists.
  97. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  98. Chang, William Ho; Viswanathan, Vinaynathan, Memory controller that includes support for autorun of software or data.
  99. Hahn, Judah Gamliel; Shmuel, Avraham, Method and apparatus for protecting cached streams.
  100. Mergi, Aryeh; Bychkov, Eyal; Ziv, Aran, Method and apparatus to exchange information with a local storage device.
  101. Makar, Michael G.; Mosley, Joseph M.; Tindall, Tracy A., Method and system for filtering messages based on a user profile and an informational processing system event.
  102. Cofta,Piotr; Paatero,Lauri, Method and system for visualizing a level of trust of network communication operations and connection of servers.
  103. Ruthfield, Scott L.; Banks, Richard, Method and systems of providing information to computer users.
  104. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  105. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  106. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  107. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  108. Chang, William Ho, Method for internet access and for communication.
  109. Chang, William Ho, Method for making phone calls with a portable USB device.
  110. Naccache,David, Method for protection against fraud in a network by icon selection.
  111. Morgan, Dennis; Gavrilescu, Alexandru; Burstein, Jonathan L.; Shelest, Art; LeBlanc, David, Method of assisting an application to traverse a firewall.
  112. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  113. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  114. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  115. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  116. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  117. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  118. Chang, William Ho; Liu, Christina Ying, Methods for universal data output.
  119. Bruton, III, David Aro; Overby, Jr., Linwood H.; Rodriguez, Adolfo Francisco, Methods, systems and computer program products for selectively allowing users of a multi-user system access to network resources.
  120. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  121. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Sanchez, Lawrence M.; Licata, John A., Methods, systems, architectures and data structures for delivering software via a network.
  122. Chang, William Ho; Liu, Christina Ying, Mobile and pervasive output server.
  123. Chang, William Ho; Liu, Christina Ying, Mobile devices supporting wireless synchronization over a wireless Network compatible, at least partly, with IEEE 802.11 standard(s).
  124. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that are configurable to include applications for playing audio digital content received over the internet from subscribed audio digital content service(s).
  125. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that include support for receiving video digital content over the internet from a service, and for wireless displaying or playing over air at least part of the received video digital content from the mobile information apparatus to televisions, television controllers, display devices, or projection devices.
  126. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that includes intelligent wireless display, wireless direct display, or transfer of digital content for playing over air the digital content at smart televisions, television controllers, or audio output devices.
  127. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that includes voice commands for playing digital content that is received from a digital content service provided over the internet.
  128. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  129. Kohli, Jaspal, Network integrated dynamic resource routing.
  130. Shelest, Art; Ward, Richard B., Network zones.
  131. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  132. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Raman,Suryanarayanan V., Network-based software extensions.
  133. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  134. Hu, Limin; Khanpour, Babak; Wu, Ting-Hu, Online system for fulfilling loan applications from loan originators.
  135. Hu,Limin; Khanpour,Babak; Wu,Ting Hu, Online system for fulfilling loan applications from loan originators.
  136. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  137. Kaltenmark,John K.; Degiorgio,Christopher M., Operations architectures for netcentric computing systems.
  138. Chang, William Ho; Liu, Christina Ying, Output device and method for output without an output driver.
  139. Chang, William Ho; Liu, Christine Ying, Output device and method for output without an output driver.
  140. Chang, William Ho; Liu, Christina Ying, Output service over a network.
  141. Chang, William Ho; Liu, Christina Ying, Output systems, information apparatus, or internet appliances supporting voice commands for receiving and for playing selected digital content from a service over a network.
  142. Welingkar, Bharat; Prasad, Srikiran, Over the air services for mobile devices.
  143. Welingkar, Bharat; Prasad, Srikiran; Eisner, William; Wu, Kevin T., Over-the-air device services and management.
  144. Chang, William Ho, Portable communication USB device for providing mobile internet access service or for providing other communication services.
  145. Chang, William Ho, Portable communication device for providing phone calling service.
  146. Chang, William Ho; Liu, Christina Ying, Portable electronic device configured to receive voice activated commands and to wirelessly manage or drive an output device.
  147. Chang, William Ho; Liu, Christine Ying, Portable information apparatus that includes touch sensitive screen interface and wireless communication circuitry for selecting an output device on the touch sensitive screen and for wireless transmitting output stream to the selected output device.
  148. Arvanitis,Yannis S.; Taylor,Stanton J., Presentation service architectures for netcentric computing systems.
  149. Yeung,Mike; Shahindoust,Amir; Krishna,Girish R., Preset security levels.
  150. Chang, William Ho; Liu, Christina Ying, Printers, printer controllers, printer software, or printer firmware for supporting wireless printing or printing over air.
  151. Li, Richard Ding, Privacy enhanced browser.
  152. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  153. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  154. Dixon, Christopher John; Pinckney, Thomas, Providing alternative web content based on website reputation assessment.
  155. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  156. Von Koch, Walter V.; Lyndersay, Sean O., RSS data-processing object.
  157. Kim, Jane T.; Gandhi, Amar S.; Lyndersay, Sean O., RSS hostable control.
  158. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  159. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  160. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  161. Kohli, Jaspal, Routing proxy for resource requests and resources.
  162. Kohli, Jaspal, Routing proxy for resource requests and resources.
  163. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  164. Wang, Xudong; Gui, Chao; Patil, Abhishek; Wang, Weilin; Nova, Michael, Scalable media access control for multi-hop high bandwidth communications.
  165. Wang, Xudong; Gui, Chao; Patil, Abhishek; Wang, Weilin; Nova, Michael, Scalable media access control for multi-hop high bandwidth communications.
  166. Wang, Xudong; Gui, Chao; Patil, Abhishek; Wang, Weilin; Nova, Michael, Scalable media access control for multi-hop high bandwith communications.
  167. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  168. Epling, Jeremiah Seth; Huang, Li-Hsin; Van Dok, Cornelis K.; Davis, Jeffrey M., Searching and browsing URLs and URL history.
  169. Epling, Jeremiah Seth; Huang, Li-Hsin; Van Dok, Cornelis K.; Davis, Jeffrey M., Searching and browsing URLs and URL history.
  170. Li, Hong C.; Boucher, Mark D.; Cahill, Conor P.; Castelino, Manohar R.; Orrin, Steve; Phegade, Vinay; Simpson, Jr., John E., Secure local web application data manager.
  171. Lukkaroinen,Mikko; Inget,Virve, Secure user action request indicator.
  172. Lukkaroinen,Mikko; Inget,Virve, Secure user action request indicator.
  173. Whitmer,Ray; Dhurvasula,Harish, Securing resources from untrusted scripts behind firewalls.
  174. Ross, David Andrew; Franco, Roberto A.; Bedworth, John Green; Ganesh, Shankar; Kudallur, Venkatraman V.; Ganjam, Anantha P.; Schmucker, Kurt James, Security context lockdown.
  175. Barrett, John, Security management tool for managing security attributes in computer systems.
  176. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  177. Li, Richard Ding, Selective use of anonymous proxies.
  178. Li, Richard Ding, Selective use of anonymous proxies.
  179. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  180. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  181. Chang, William Ho; Liu, Christina Ying, Smart phone that includes a wireless communication unit compatible with at least one protocol within bluetooth and/or IEEE802.11 standards for wireless transmission of audio digital content from the smart phone to a wireless audio output device for voice output or music playing.
  182. Chang, William Ho; Liu, Christina Ying, Smart phones that include a digital camera, a touch sensitive screen, support for voice activated commands, and support to at least part of a protocol within IEEE 802.11 standards.
  183. Chang, William Ho; Liu, Christina Ying, Smart phones that include touch sensitive screen and supporting voice activated commands for managing or replying to E-mails.
  184. Chang, William Ho; Liu, Christina Ying, Smart phones that support wireless printing of emails over air to a wireless printer in a wireless local area network.
  185. Chang, William Ho; Liu, Christina Ying, Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network.
  186. Chang, William Ho; Liu, Christina Ying, Specification of smart wireless television for rendering digital content.
  187. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  188. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  189. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  190. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  191. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  192. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  193. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  194. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  195. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  196. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  197. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  198. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  199. Glazer, Elliott; White, Dirk; Armes, David; Bishop, Fred Alan; Barrett, Michael, System and method for authenticating a web page.
  200. Glazer,Elliott; White,Dirk; Armes,David; Bishop,Fred Alan; Barrett,Michael, System and method for authenticating a web page.
  201. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  202. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  203. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  204. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  205. Jogand-Coulomb, Fabrice; Patel, Shalin; Kavanagh, Brendan; Hahn, Judah Gamliel, System and method for host management of discardable objects.
  206. Gillies,Donald W.; Wang,Weilin; Nova,Michael P., System and method for identifying nodes in a wireless mesh network.
  207. Wang,Weilin; Nova,Michael; Gillies,Donald, System and method for identifying nodes in a wireless network.
  208. Swingler, Michael Alan; O'Brien, Thomas John, System and method for incorporating an originating site into a security protocol for a downloaded program object.
  209. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  210. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  211. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  212. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  213. Ross, David Andrew; Franco, Roberto A.; Bedworth, John Green; Ganesh, Shankar; Kudallur, Venkatraman V.; Ganjam, Anantha P.; Schmucker, Kurt James, System and method for local machine zone lockdown with relation to a network browser.
  214. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  215. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  216. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  217. Wang, Xudong; Wu, Yun; Gui, Chao; Tao, Xiaojing; Wang, Weilin; Nova, Michael, System and method for timeslot and channel allocation.
  218. Wang, Weilin; Edler, John; Nova, Michael; Rimmer, James; Okumoto, Max; Gundeti, Siddartha, System and method for transparent wireless bridging of communication channel segments.
  219. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  220. Ganesh, Shankar; Franco, Roberto A.; Schmucker, Kurt James, System and method for zone transition mitigation with relation to a network browser.
  221. Jogand-Coulomb, Fabrice; Balma, Phillip Jeffrey; Caillon, Pascal Achille; Alluf, Aviv; Kavanagh, Brendan Barry; Webster, Kurt Forsyth; Broadwin, Elliot; Schram, James Frederick; Hutton, Henry Ricardo, System and method of predictive data acquisition.
  222. Konanka, Dzmitry; Liahuski, Andrei, System and methodology providing secure workspace environment.
  223. Chang, William Ho; Liu, Christina Ying, System for capturing and outputting digital content over a network that includes the internet.
  224. Heron, George L.; Bolin, Christopher S., System, method and computer program product for obtaining a reputation associated with a file.
  225. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface.
  226. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface.
  227. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  228. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  229. Kuo, Chengi Jimmy; Viljoen, Petrus Johannes; Ganesan, Prasanth; Wall, Dermot; Chung, Dong, Systems and methods for automatically making selections in user interfaces.
  230. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  231. Patil, Abhishek; Wang, Xudong; Gui, Chao; Wang, Weilin; Nova, Michael, Systems and methods for determining location of devices within a wireless network.
  232. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  233. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  234. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  235. Meza, Joseph R.; Hahn, Judah Gamliel; Hutton, Henry; Sherry, Leah, Systems and methods for managing an upload of files in a shared cache storage system.
  236. Wang, Weilin; Shi, Weiguang; Rollinger, Victor; Wu, Yun; Nova, Michael, Systems and methods for voice and video communication over a wireless network.
  237. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  238. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  239. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  240. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  241. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  242. Toomey, Christopher, Techniques for detecting and preventing unintentional disclosures of sensitive data.
  243. Chang, William Ho; Liu, Christina Ying, Televisions, output controllers, or speakers that are setup to wirelessly connect to a network and to receive digital content from a digital content service over the network.
  244. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  245. Kohli, Jaspal, Terminating connections and selecting target source devices for resource requests.
  246. Harris, Mark; Bolin, Christopher Scott; Emm, David, Testing a computer system.
  247. Cooley, Shaun, Thwarting phishing attacks by using pre-established policy files.
  248. Sauve, Aaron; Huang, Li-Hsin; Schreiner, Tony; Davis, Jeffrey; Pipinich, Tom; Gass, Jonathan; Hally, J. Craig, Tiered object-related trust decisions.
  249. Sauve, Aaron; Huang, Li-Hsin; Schreiner, Tony; Davis, Jeffrey; Pipinich, Tom; Gass, Jonathan; Hally, J. Craig, Tiered object-related trust decisions.
  250. Sauve, Aaron; Huang, Li-Hsin; Schreiner, Tony; Davis, Jeffrey; Pipinich, Tom; Gass, Jonathan; Hally, J. Craig, Tiered object-related trust decisions.
  251. Sauve, Aaron; Huang, Li-Hsin; Schreiner, Tony; Davis, Jeffrey; Pipinich, Tom; Gass, Jonathan; Hally, J. Craig, Tiered object-related trust decisions.
  252. Chang, William Ho; Liu, Christina Ying, Touch sensitive screen information apparatus that includes close proximity or near distance radio frequency field communication.
  253. Chang, William Ho; Liu, Christina Ying, Touch sensitive screen information apparatus that includes close proximity or near distance radio frequency field communication.
  254. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  255. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  256. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  257. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  258. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  259. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  260. Kristensen, Kristian H.; Zeuthen, David, Using multiple display servers to protect data.
  261. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
  262. Poisson, Matthew W.; Desroches, Melissa L.; Milillo, James M., Virtual private network manager GUI with links for use in configuring a virtual private network.
  263. Sauve, Aaron J.; Van Dok, Cornelis K.; Silbey, Marc A., Visualization of trust in an address bar.
  264. Chang, William Ho; Liu, Christina Ying, Wireless controller wire connectable to output devices such as televisions for accessing digital content and for wireless communication with mobile information apparatus.
  265. Chang, William Ho; Liu, Christina Ying, Wireless devices that communicate, via short range wireless communication, with a mobile client device for establishing services of the wireless device with a server over the internet.
  266. Chang, William Ho; Liu, Christina Ying, Wireless devices that establish a wireless connection with a mobile information apparatus by wirelessly detecting, within physical proximity, the mobile information apparatus.
  267. Chang, William Ho; Liu, Christina Ying, Wireless output devices or wireless controllers that support wireless device discovery for establishing wireless connectivity.
  268. Chang, William Ho; Liu, Christina Ying, Wireless printing device for printing digital content received via wireless communication compatible, at least partly, with IEEE 802.11 or Bluetooth.
  269. Chang, William Ho; Liu, Christina Ying, Wireless television or controller wire connectable to a television for receiving and rendering digital content.
  270. Parthasarathy, Krishna Kumar; Panasyuk, Anatoliy, Zone classification of electronic mail messages.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로