$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure e-mail system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-012/14
출원번호 US-0558691 (2000-04-25)
발명자 / 주소
  • Olkin, Terry M.
  • Moreh, Jahanshah
출원인 / 주소
  • Sigaba Corporation
대리인 / 주소
    Roberts, Raymond E.IPLO Intellectual Property Law Offices
인용정보 피인용 횟수 : 222  인용 특허 : 6

초록

A secure e-mail system (10) permitting a sender (12) to send a secure e-mail (14) to one or more receivers (16). The sender (12) employs a sending unit (18) having a software module (26) to compose the secure e-mail (14), to send data about it to a security server (24), to receive back from that sec

대표청구항

A secure e-mail system (10) permitting a sender (12) to send a secure e-mail (14) to one or more receivers (16). The sender (12) employs a sending unit (18) having a software module (26) to compose the secure e-mail (14), to send data about it to a security server (24), to receive back from that sec

이 특허에 인용된 특허 (6)

  1. Owens Stephen J. H. ; Finney Michael S. ; Snider Michael L. ; Wright Randall S. ; Paynter James W. ; Bard Robin R., Electronic mail distribution system for integrated electronic communication.
  2. Hussey Peter, Electronic mail interface for a network server.
  3. Murota Masao,JPX, Method and apparatus for encrypting and transferring electronic mails.
  4. Luneau Greg,CAX ITX R3T 3M3 ; Remillard Jason,CAX ITX R2J 2L4 ; King Thomas, Method for providing secured commerical transactions via a networked communications system.
  5. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  6. Mark James McArdle ; Steven Blair Schoenfeld, System and methodology for messaging server-based management and enforcement of crypto policies.

이 특허를 인용한 특허 (222)

  1. Richard, Philippe, Adaptive data transformation engine.
  2. Richard, Philippe, Adaptive data transformation engine.
  3. DeLazzer, Michael; Kuehnrich, Franz, Article dispensing system and method for same.
  4. Kuehnrich, Franz; Palmer, Jonathan, Article vending machine and method for authenticating received articles.
  5. Kuehnrich, Franz; Palmer, Jonathan, Article vending machine and method for authenticating received articles.
  6. Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
  7. Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
  8. Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
  9. Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
  10. Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., Article vending machine and method for exchanging an inoperable article for an operable article.
  11. Youstra, William N., Authentication of electronic data.
  12. Youstra, William N., Authentication of electronic data.
  13. Youstra, William N., Authentication of electronic data.
  14. Cook, David P.; Liu, Gary G.; Kalan, John, Automatic delivery selection for electronic content.
  15. Cook, David P.; Liu, Gary G.; Kalan, John, Automatic delivery selection for electronic content.
  16. Jain, Chandresh K.; Mehta, Mayank; Byrum, Frank D.; Banti, Edward; Koman, Ayse Yesim; Knibb, James R.; Nelte, Michael A.; Barnes, Christopher; Zhang, Hao; Boctor, Victor; Patel, Tejas D.; Zhong, Yuhui; Kostal, Gregory; Yarmolenko, Vladimir; Kamat, Pankaj M.; Fulay, Amit K.; Karamfilov, Krassimir E., Business to business secure mail.
  17. Akimoto,Masao; Murata,Matsutoshi, Communication control apparatus and a communication control method.
  18. Bluth, Charles P., Community based managed health kiosk and prescription dispensement system.
  19. Knight, William C., Computer-implemented system and method for assigning concept classification suggestions.
  20. Evans, Lynne Marie, Computer-implemented system and method for building cluster spine groups.
  21. Evans, Lynne Marie, Computer-implemented system and method for cluster spine group arrangement.
  22. Gallivan, Dan; Kawai, Kenji, Computer-implemented system and method for clustering similar documents.
  23. Borchardt, Jonathan M.; Walter, Edward L., Computer-implemented system and method for displaying clusters via a dynamic user interface.
  24. Knight, William C., Computer-implemented system and method for displaying visual classification suggestions for concepts.
  25. Gallivan, Dan, Computer-implemented system and method for generating a display of document clusters.
  26. Knight, William C.; McNee, Sean M., Computer-implemented system and method for generating a reference set via clustering.
  27. Knight, William C.; McNee, Sean M., Computer-implemented system and method for generating a reference set via seed documents.
  28. Knight, William C.; McNee, Sean M., Computer-implemented system and method for generating a training set for use during document review.
  29. Evans, Lynne Marie, Computer-implemented system and method for generating and placing cluster groups.
  30. Gallivan, Dan, Computer-implemented system and method for generating clusters for placement into a display.
  31. Gallivan, Dan; Kawai, Kenji, Computer-implemented system and method for generating document groupings for display.
  32. Evans, Lynne Marie, Computer-implemented system and method for grafting cluster spines.
  33. Kawai, Kenji; McDonald, David T., Computer-implemented system and method for identifying duplicate and near duplicate messages.
  34. Kawai, Kenji; McDonald, David T., Computer-implemented system and method for identifying related messages.
  35. Gallivan, Dan; Kawai, Kenji, Computer-implemented system and method for identifying relevant documents for display.
  36. Knight, William C.; Nussbaum, Nicholas I., Computer-implemented system and method for inclusion-based electronically stored information item cluster visual representation.
  37. Evans, Lynne Marie, Computer-implemented system and method for organizing cluster groups within a display.
  38. Evans, Lynne Marie, Computer-implemented system and method for placing cluster groupings into a display.
  39. Evans, Lynne Marie, Computer-implemented system and method for placing groups of cluster spines into a display.
  40. Evans, Lynne Marie, Computer-implemented system and method for placing groups of document clusters into a display.
  41. Gallivan, Dan, Computer-implemented system and method for populating clusters of documents.
  42. Borchardt, Jonathan M.; Walter, Edward L., Computer-implemented system and method for providing a display of clusters.
  43. Knight, William C.; Nussbaum, Nicholas I., Computer-implemented system and method for providing visual suggestions for cluster classification.
  44. Kawai, Kenji; McDonald, David T., Computer-implemented system and method for selecting documents for review.
  45. Knight, William C., Computer-implemented system and method for visual document classification.
  46. Knight, William C.; Nussbaum, Nicholas I., Computer-implemented system and method for visually suggesting classification for inclusion-based cluster spines.
  47. Graham, Chris; Cahill, Jason; Brown, Kevin, Content rights management for document contents and systems, structures, and methods therefor.
  48. Graham, Chris; Cahill, Jason; Brown, Kevin, Content rights management for email and documents contents and systems, structures, and methods therefor.
  49. Fontanella, D. Alan; Klinefelter, Gary M.; Upin, Jeffrey D.; Ekers, John E.; Platner, Thomas C.; Nehowig, Kelly R.; Goldenstein, Angela Marie, Credential production using a secured consumable supply.
  50. Lai, William Y.; Kalki, Jagadeesh, Distributing notifications to multiple recipients via a broadcast list.
  51. Chen, Yen-Fu; Handy-Bosma, John Hans; Walker, Keith Raymond, Duplicate e-mail content detection and automatic doclink conversion.
  52. Yoshizawa,Hiroyuki, Electronic apparatus transmitting electronic mail including image information, a control apparatus, and a storage medium.
  53. Awada,Faisal M.; Brown,Joe Nathan; Burkes,Philip Bernard, Electronic mail distribution network implementation for safeguarding sender's address book covering addressee aliases with minimum interference with normal electronic mail transmission.
  54. Sen,Yafen, Electronic mail program.
  55. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with aggregation and integrated display of related messages.
  56. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with functionality to include both private and public messages in a communication.
  57. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with functionally for senders to control actions performed by message recipients.
  58. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Electronic mail system with pre-message-retrieval display of message metadata.
  59. Johnson, Michael E.; Wilson, Kenneth L., Electronic transmission security process.
  60. van der Horst, Timothy W.; Seamons, Kent Eldon, Encrypted email based upon trusted overlays.
  61. Toyota,Kiyoshi; Murata,Matsutoshi; Akimoto,Masao, Encrypted mail transmission system.
  62. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  63. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  64. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  65. Batthish,Karim; Davis,Malcolm; Williams,Roy; Wu,Jean, Encryption to BCC recipients with S/MIME.
  66. Mock, Marcel; Swedor, Olivier, End-to-end encryption method and system for emails.
  67. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  68. Elvanoglu, Ferhan; Pierce, Shaun D., Executing dynamically assigned functions while providing services.
  69. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  70. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  71. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  72. Klinefelter, Gary M.; Platner, Thomas C.; Schuler, Joseph F.; Gershenovich, Leon; Kaiser, David W.; Holland, Gary R., Identification card manufacturing security.
  73. Klinefelter,Gary M.; Platner,Thomas C.; Schuler,Joseph F.; Gershenovich,Leon; Kaiser,David W.; Holland,Gary R., Identification card manufacturing security.
  74. Sutton, Jr.,Lorin R.; Despeaux,Craig E.; Adamski,Michael K., Identifying unwanted electronic messages.
  75. Alles, David; Moore, George M., Identity-based distributed computing for device resources.
  76. Kay, Jeffrey B.; Tribble, Eric D.; Williams, Roy; Freeman, Trevor W.; Pearson, Malcolm E., Key distribution for secure messaging.
  77. Ekers,John E.; Klinefelter,Gary M.; Fontanella,David A., Managed credential issuance.
  78. Clark, Peter E.; Ives, Paul M.; Gentry, Michael V., Managed virtual point to point communication service having verified directory, secure transmission and controlled delivery.
  79. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  80. Bruns, Logan O'Sullivan; Moreh, Jahanshah, Mediated key exchange between source and target of communication.
  81. Appelman, Barry, Messaging stamp authority.
  82. Appelman, Barry, Messaging stamp authority.
  83. Appelman, Barry, Messaging stamp authority.
  84. Price, III, William F., Method and apparatus for facilitating secure anonymous email recipients.
  85. Seshadri, Harish; Ruane, Noel, Method and apparatus for trusted branded email.
  86. Seshadri,Harish; Ruane,Noel, Method and apparatus for trusted branded email.
  87. DiSanto, Frank J.; Krusos, Denis A.; Lewit, Edward, Method and system for securing E-mail transmissions.
  88. DiSanto, Frank J.; Krusos, Denis A.; Lewit, Edward, Method and system for securing e-mail transmissions.
  89. Fenton, James L.; Thomas, Michael A.; Baker, Frederick J., Method and system for verifying identification of an electronic mail message.
  90. Fenton,James L.; Thomas,Michael A.; Baker,Frederick J, Method and system for verifying identification of an electronic mail message.
  91. Fenton, James L.; Thomas, Michael A., Method and system for verifying identification of an electronic message.
  92. Giersch, Daniel; Dohmke, Thomas; Joswig, Julian; Haubold, Stefan, Method for asynchronous communication by means of an internet platform, and internet platform.
  93. Greenberg,Eric; Gaskill,Braddock, Method for identification of a user's unique identifier without storing the identifier at the identification site.
  94. Baylis, Stephen W.; Baylis, S. Todd, Method of establishing a secure e-mail transmission link.
  95. Mora,Frederic, Method, system and computer program product for generating and processing a disposable email address.
  96. Henson, Kevin M.; Smith, Eric Myron, Method, system and process for data encryption and transmission.
  97. Aaron, Jeffrey A.; Alin, Jun-Gang, Methods and systems that selectively resurrect blocked communications between devices.
  98. Aaron, Jeffrey A.; Alin, Jun-Gang, Methods and systems that selectively resurrect blocked communications between devices.
  99. Aaron, Jeffrey A.; Alin, Jun-Gang, Methods and systems that selectively resurrect blocked communications between devices.
  100. Aaron, Jeffrey A; Alin, Jun-Gang, Methods and systems that selectively resurrect blocked communications between devices.
  101. Aaron,Jeffrey A.; Alin,Jun Gang, Methods and systems that selectively resurrect blocked communications between devices.
  102. Sievers,A. Kent; Parker,Jay; Stephenson,Preston D.; Fletcher,Samuel F., Methods, data structures, and systems to remotely validate a message.
  103. Ruiz, Tim, Notification system and method for domain name options.
  104. Cahill,Jason; Graham,Chris; Antonoff,Lauren; Brown,Kevin; Kouznetsov,Pavel, Organization-based content rights management and systems, structures, and methods therefor.
  105. Kouznetsov, Pavel; Cahill, Jason; Ornstein, David; Antonoff, Lauren; Walker, Mark, Organization-based content rights management and systems, structures, and methods therefor.
  106. Kouznetsov,Pavel; Cahill,Jason; Antonoff,Lauren; Brown,Kevin; Lutz,Moshe Randall; Gerhard,Lutz; Walker,Mark, Organization-based content rights management and systems, structures, and methods therefor.
  107. Mahmoud Abd Alla, Hanan Ahmed Hossni; Alghathbar, Khaled Soliman, Password generation methods and systems.
  108. Keane, Michael; Duryea, Trygve; Woods, Alex Robert, Real time transmission of photographic images from portable handheld devices.
  109. Mullins, James Anthony; Woods, Alex Robert, Real time transmission of photographic images from portable handheld devices.
  110. Martin, Christopher D.; Kern, Jr., James W., Remote control of a security system using e-mail.
  111. Horvitz,Eric J.; Steckler,Paul A.; Pierce,Shaun D.; Fang,Lijiang; Lucovsky,Mark H.; Wu,Winnie C.; Shaw,Rhae Christie; Moore,George M.; Gehlsen,John M.; Sauntry,David M., Schema-based services for identity-based access to device data.
  112. Lucovsky, Mark H.; Pierce, Shaun Douglas; Movva, Ramu; Kalki, Jagadeesh; Auerbach, David Benjamin; Ford, Peter Sewall; Yuan, Yun-Qi; Guu, Yi-Wen; George, Samuel John; Hoffman, William Raymond; Jacobs, Jay Christopher; Steckler, Paul Andrew; Hsueh, Walter C.; Keil, Kendall D.; Gopal, Burra; White, Steven D.; Leach, Paul J.; Ward, Richard B.; Smoot, Philip Michael; Fang, Lijiang; Taylor, Michael B.; Kannan, Suresh; Wu, Winnie C., Schema-based services for identity-based data access.
  113. Lucovsky,Mark H.; Pierce,Shaun Douglas; White,Steven D.; Movva,Ramu; Kalki,Jagadeesh; Auerbach,David Benjamin; Ford,Peter Sewall; Jacobs,Jay Christopher; Steckler,Paul Andrew; Hsueh,Walter C.; Keil,Kendall D.; Gopal,Burra; Kannan,Suresh; Guu,Yi Wen; George,Samuel John; Hoffman,William Raymond; Smoot,Philip Michael; Fang,Lijiang; Taylor,Michael B.; Wu,Winnie C.; Leach,Paul J.; Ward,Richard B.; Yuan,Yun Qi, Schema-based services for identity-based data access.
  114. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  115. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  116. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  117. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  118. Horvitz, Eric J.; Steckler, Paul A.; Pierce, Shaun D.; Fang, Lijiang; Lucovsky, Mark H.; Wu, Winnie C., Schemas for a notification platform and related information services.
  119. Kuehnrich, Franz; Palmer, Jonathan; Leiwe, Dan; Martinka, William; Polubinski, Jim, Secondary media return system and method.
  120. Chen, Yen-Fu; Handy-Bosma, John Hans; Selvage, Mei Yang; Walker, Keith Raymond, Sectional E-mail transmission.
  121. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  122. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  123. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  124. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  125. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system.
  126. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Secure electronic mail system.
  127. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Houg, Derek; Chen, Kung Ming; Rasmussen, Jeremy, Secure electronic mail system with configurable cryptographic engine.
  128. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronic mail system with for your eyes only features.
  129. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt; Wilson, Alex; Yee, Tina, Secure electronic mail system with thread/conversation opt out.
  130. LeVasseur, Thierry; Astudillo, Esteban; McLean, Matt, Secure electronics mail system.
  131. Schoen,Isadore; Boberski,Michael, Secure instant messaging system using instant messaging group policy certificates.
  132. Cook, David P., Secure message forwarding system detecting user's preferences including security preferences.
  133. Appenzeller, Guido; Boyen, Xavier; Spies, Terence, Secure messaging system with derived keys.
  134. Sutherland,Ivan E., Secure, distributed e-mail system.
  135. Goodman, Brian D.; DeLuca, Lisa Seacat, Securely identifying host systems.
  136. Goodman, Brian D.; DeLuca, Lisa Seacat, Securely identifying host systems.
  137. Nehowig, Kelly R.; Gale, David T.; Fischer, Lisa A.; Platfoot, Keith A.; Ekers, John E.; Zappe, Thomas A., Securely processing and tracking consumable supplies and consumable material.
  138. Betz, Linda N.; Ho, Wesley J.; Lingafelt, Charkes S.; Merrill, David P., Securing information within a cloud computing environment.
  139. Messing, John H., Server-based encrypted messaging method and apparatus.
  140. Gerstl, Peter; Karlsson, Magnus; Seider, Dirk; Suhre, Oliver, Space-efficient mail storing and archiving based on communication structure.
  141. Gerstl, Peter; Karlsson, Magnus; Seider, Dirk; Suhre, Oliver, Space-efficient mail storing and archiving based on communication structure.
  142. Jacobs, Michael, Storage and authentication of data transactions.
  143. Jacobs, Michael, Storage and authentication of data transactions.
  144. Maskatia, Imran; Rubinstein, Jason, System and method for applying parental control limits from content providers to media content.
  145. Maskatia, Imran; Rubinstein, Jason, System and method for applying parental control limits from content providers to media content.
  146. Kuehnrich, Franz, System and method for calibrating a vending apparatus.
  147. Kuehnrich,Franz, System and method for calibrating a vending apparatus.
  148. Kaplan, Gregg; Lowe, J. Mitchell; Hoersten, Eric; Kapcar, Christopher A., System and method for communicating secondary vending options.
  149. Kuehnrich, Franz; Hoersten, Eric, System and method for communicating vending information.
  150. Kuehnrich, Franz; Hoersten, Eric, System and method for communicating vending information.
  151. Kuehnrich, Franz; Kaplan, Gregg, System and method for communicating vending information.
  152. Kuehnrich, Franz; Kaplan, Gregg, System and method for communicating vending information.
  153. Kuehnrich, Franz; Kaplan, Gregg, System and method for communicating vending information.
  154. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  155. Mammen, Abraham, System and method for cross-platform applications on a wireless phone.
  156. Evans, Lynne Marie, System and method for displaying cluster spine groups.
  157. Evans, Lynne Marie, System and method for displaying groups of cluster spines.
  158. Knight, William C.; Nussbaum, Nicholas I.; Conwell, John W., System and method for displaying relationships between concepts to provide classification suggestions via inclusion.
  159. Knight, William C.; Nussbaum, Nicholas I.; Conwell, John W., System and method for displaying relationships between concepts to provide classification suggestions via injection.
  160. Knight, William C.; Nussbaum, Nicholas I.; Conwell, John W., System and method for displaying relationships between concepts to provide classification suggestions via nearest neighbor.
  161. Knight, William C.; Nussbaum, Nicholas I., System and method for displaying relationships between electronically stored information to provide classification suggestions via inclusion.
  162. Knight, William C.; Nussbaum, Nicholas I., System and method for displaying relationships between electronically stored information to provide classification suggestions via injection.
  163. Knight, William C.; Nussbaum, Nicholas I., System and method for displaying relationships between electronically stored information to provide classification suggestions via nearest neighbor.
  164. Gallivan, Dan, System and method for efficiently generating cluster groupings in a multi-dimensional concept space.
  165. Kawai, Kenji; McDonald, David T., System and method for evaluating a structured message store for message redundancy.
  166. Knight, William C.; McNee, Sean M.; Conwell, John, System and method for generating a reference set for use during document review.
  167. Evans, Lynne Marie, System and method for generating cluster spines.
  168. Evans, Lynne Marie, System and method for generating groups of cluster spines for display.
  169. Maskatia, Imran; Rubinstein, Jason, System and method for generating notifications related to new media.
  170. Gallivan, Dan; Kawai, Kenji, System and method for grouping similar documents.
  171. Hale, Tim, System and method for managing vending inventory.
  172. Hoersten,Eric; Lowe,J. Mitch, System and method for offline vending of a media product.
  173. Smith, Thomas Franklin; Martinka, William; Polubinski, Jim, System and method for optimizing utilization of inventory space for dispensable articles.
  174. Smith, Thomas Franklin; Martinka, William; Polubinski, Jim, System and method for optimizing utilization of inventory space for dispensable articles.
  175. Smith, Thomas Franklin; Martinka, William; Polubinski, Jr., Jim, System and method for optimizing utilization of inventory space for dispensable articles.
  176. Smith, Thomas Franklin; Martinka, William; Polubinski, Jr., Jim, System and method for optimizing utilization of inventory space for dispensable articles.
  177. Evans, Lynne Marie, System and method for placing candidate spines into a display with the aid of a digital computer.
  178. Evans, Lynne Marie, System and method for placing spine groups within a display.
  179. Knight, William C., System and method for providing a classification suggestion for concepts.
  180. Knight, William C., System and method for providing a classification suggestion for electronically stored information.
  181. Borchardt, Jonathan M.; Walter, Edward L., System and method for providing a dynamic user interface for a dense three-dimensional scene with a plurality of compasses.
  182. Borchardt, Jonathan M.; Walter, Edward L., System and method for providing a dynamic user interface including a plurality of logical layers.
  183. Borchardt, Jonathan M.; Walter, Edward L., System and method for providing a user-adjustable display of clusters and text.
  184. Knight, William C., System and method for providing classification suggestions using document injection.
  185. Bowers, Brad; Maskatia, Imran; Rubinstein, Jason, System and method for providing the identification of geographically closest article dispensing machines.
  186. Knight, William C., System and method for providing visual suggestions for document classification via injection.
  187. Poor,Graham V.; Mahoney,Margaret Mary, System and method for proxy-enabling a wireless device to an existing IP-based service.
  188. Lowe, J. Mitch; Hoersten, Eric; Hamilton, Devin, System and method for regulating vendible media products.
  189. Lowe, J. Mitch; Hoersten, Eric; Hamilton, Devin, System and method for regulating vendible media products.
  190. Poor,Graham V.; Mahoney,Margaret Mary, System and method for remote application management of a wireless device.
  191. Gallivan, Dan, System and method for reorienting a display of clusters.
  192. Kawai, Kenji; Evans, Lynne Marie, System and method for scoring concepts in a document set.
  193. Lan, Sikun; Huang, Yong K.; Frazier, Kent; Sykes, Roy; Zusman, Joseph, System and method for secure message reply.
  194. Lan, Sikun; Huang, Yong K.; Frazier, Kent; Sykes, Roy; Zusman, Joseph, System and method for secure message reply.
  195. Lan, Sikun; Huang, Yong K.; Frazier, Kent; Sykes, Roy; Zusman, Joseph, System and method for secure message reply.
  196. Little, Herbert A.; Brown, Michael K.; Hammell, Jonathan F.; Brown, Michael S.; Kirkup, Michael G.; Adams, Neil P., System and method for securing data.
  197. Nussbaum, Lawrence Edward; Thompson, Stephen, System and method for securing data.
  198. Little, Herbert A.; Brown, Michael K.; Hammell, Jonathan F.; Brown, Michael S.; Kirkup, Michael G.; Adams, Neil P., System and method for securing data for redirecting and transporting over a wireless network.
  199. Polubinski, Jr., Jim; Ptacek, William, System and method for simultaneous article retrieval and transaction validation.
  200. Maskatia, Imran; Rubinstein, Jason, System and method for substituting a media article with alternative media.
  201. Evans, Lynne Marie, System and method for thematically arranging clusters in a visual display.
  202. Gasparini, Louis A; Harris, William H, System and method for validating e-mail messages.
  203. Lowe, J. Mitch, System and method for vending vendible media products.
  204. Lowe, J. Mitch, System and method for vending vendible media products.
  205. Tomkow,Terrence A., System and method for verifying delivery and integrity of electronic messages.
  206. Meltzer, Jason; Haslup, Jason, System and methods for multiple email services having a common domain.
  207. Raghunandan, Hulikunta Prahlad, System for directing e-mail to selected recipients by applying transmission control directives on aliases identifying lists of recipients to exclude or include recipients.
  208. Moreh, Jahanshah; Bruns, Logan O'Sullivan, System for on-line and off-line decryption.
  209. Moreh, Jahanshah; Bruns, Logan O'Sullivan, System for on-line and off-line decryption.
  210. Megiddo, Nimrod, System for securing electronic mail.
  211. Warasawa, Fumiki, System, method and program product for authenticating an e-mail and/or attachment.
  212. Drucker, Steven J., Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier.
  213. Wanek, Charles; Jones, Dan; Vernon, Todd, Systems and methods for secure data exchange in a distributed collaborative application.
  214. Wanek, Charles; Jones, Dan; Vernon, Todd, Systems and methods for secure data exchange in a distributed collaborative application.
  215. Wanek, Charles; Jones, Dan; Vernon, Todd, Systems and methods for secure data exchange in a distributed collaborative application.
  216. Marman, Timothy; Kukreja, Rajiv, Systems and methods to secure restricted information in electronic mail messages.
  217. Brown, Michael K.; Brown, Michael S.; Kirkup, Michael G., Transmission of secure electronic mail formats.
  218. Brown, Michael K.; Brown, Michael S.; Kirkup, Michael G., Transmission of secure electronic mail formats.
  219. Brown,Michael K.; Brown,Michael S.; Kirkup,Michael G., Transmission of secure electronic mail formats.
  220. Low, Sydney Gordon; Walker, Matthew Iain, Trusted electronic messaging system.
  221. Gress,David Stephen; Sealey,Robert Raymond, Unified messaging system configured for transport of encrypted messages.
  222. Appelman, Barry, Visually distinguishing paid messages.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로