$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for controlling access to internet sites 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/173
출원번호 US-0494315 (2000-01-28)
발명자 / 주소
  • Hegli, Ronald
  • Carrington, John
  • Oei, David
출원인 / 주소
  • Websense, Inc.
대리인 / 주소
    Knobbe, Martens, Olson & Bear, LLP
인용정보 피인용 횟수 : 242  인용 특허 : 25

초록

A method and system for providing flexible access to Internet sites is described. The system includes a database of Internet sites that have been categorized so that the system determines the category of information that a user is accessing on the Internet. The system is also programmed so users are

대표청구항

A method and system for providing flexible access to Internet sites is described. The system includes a database of Internet sites that have been categorized so that the system determines the category of information that a user is accessing on the Internet. The system is also programmed so users are

이 특허에 인용된 특허 (25)

  1. Shannon Steven, Access control of networked data.
  2. McCreery Timothy David ; Zabetian Mahboud, Apparatus and method of analyzing internet activity.
  3. Mano Yoshizumi ; Chilamakuri Chenchu ; Shima Hisato, Apparatus for and method of automatically downloading and storing internet web pages.
  4. Dudley John Mills AU, Building a database of CCG values of web pages from extracted attributes.
  5. Cragun Brian John ; Day Paul Reuben, Censoring browser method and apparatus for internet viewing.
  6. Jones Gregory Alan ; Nakajima Satoshi ; Berkun Scott E. ; Franklin Christopher M., Downloading data while rejection of its use may be overridden.
  7. Feldman Daniel J., Entitlement management and access control system.
  8. Cirasole Peter ; DeRosa Robert ; Fox Robert, Method and system for content filtering information retrieved from an internet computer network.
  9. Nessett Danny M. ; Sherer William Paul, Multilayer firewall system.
  10. Willens Steven M., Network access control system and process.
  11. Emens Michael Lawrence ; Kraft Reiner ; Sundaresan Neelakantan, Rating hypermedia for objectionable content.
  12. Nilakantan Chandrasekharan (Cupertino CA) Yum Kiho (Campbell CA) Lin Ta-Sheng (San Jose CA), Remote smart filtering communication management system.
  13. Duffy Robert A. ; Griffin Lyle N., System and method for computer-based rating of information retrieved from a computer network.
  14. Schloss Robert Jeffrey, System and method for controlling access to data located on a content server.
  15. Humes Donald Creig, System and method for filtering data received by a computer system.
  16. Laslo Olah ; Ferenc Friedler ; Zoltan Kovacs HU, System and method for monitoring computer usage.
  17. Baker Brenda Sue (Berkeley Heights NJ) Grosse Eric (Berkeley Heights NJ), System and method for restricting user access rights on the internet based on rating information stored in a relational.
  18. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  19. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter ; Savage Herb, System for controlling users access to a distributive network in accordance with constraints present in common access.
  20. Shwed Gil (Jerusalem ILX), System for securing inbound and outbound data packet flow in a computer network.
  21. Bauer Jonathan A. ; Bodge Andrew ; Huberman Steven, System for synchronizing shared data between computers.
  22. Bradshaw Michael S. ; Shih George Y., System to control content and prohibit certain interactive attempts by a person using a personal computer.
  23. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  24. Rowland Bruce R. ; Friedman Lee G., User controlled browser identification disclosing mechanism.
  25. Kirsch Steven T., Web scan process.

이 특허를 인용한 특허 (242)

  1. Betz, Jonathan T.; Zhao, Shubin, Anchor text summarization for corroboration.
  2. Ritchford, Tom; Betz, Jonathan, Annotation framework.
  3. Petrou, David, Architecture for responding to a visual query.
  4. Betz, Jonathan T.; Menezes, Vivek, Attribute entropy as a signal in object normalization.
  5. Hogue, Andrew W.; Betz, Jonathan T., Automatic object reference identification and linking in a browseable fact repository.
  6. Hogue, Andrew W.; Betz, Jonathan T., Automatic object reference identification and linking in a browseable fact repository.
  7. Hogue, Andrew W.; Betz, Jonathan T., Automatic object reference identification and linking in a browseable fact repository.
  8. Roberts, Guy; Sargent, John; Engelken, Dallas; Barton, Chris; Kelly, Nick, Automatically verifying that anti-phishing URL signatures do not fire on legitimate web sites.
  9. Hogue, Andrew W.; Rohde, Douglas L. T.; Weinberger, Peter J., Bloom filters for query simulation.
  10. Antkowiak, Ryan D.; Gazdic, Daniel J.; Gura, Damon E.; Himawan, Budyanto; Ho, Audrey F. Y.; Leverenz, Jeffrey M., Browser based heterogenous technology ecosystem.
  11. Frattinger, Christopher J.; Ward, Matthew J., Browser based wagering game systems and configuration.
  12. Anderson,Todd J.; Caird,Stephen; Lamkins,David B; Larason,John T.; Packer,Alan C., Category name service able to override the category name based on requestor privilege information.
  13. Inokuchi,Akihiro; Kashima,Hisashi, Classification factor detection.
  14. Meenan,Patrick; Damick,Jeffrey Joseph, Classifying devices using a local proxy server.
  15. Cha, Derek Hee Jun; Chen, Paul, Cloud to local router security.
  16. Nickerson, Rand B.; Treschl, Mark A., Computer-implemented system and method for measuring and reporting business intelligence based on comments collected from web page users using software associated with accessed web pages.
  17. Nickerson, Rand B.; Treschl, Mark A., Computer-implemented system and method for measuring and reporting business intelligence based on comments collected from web page users using software associated with accessed web pages.
  18. Mohan, Rengaswamy, Concept-based analysis of structured and unstructured data using concept inheritance.
  19. Mohan, Rengaswamy; Mohan, Usha; Sha, David D., Concept-based categorization of unstructured objects.
  20. Mohan, Rengaswamy; Mohan, Usha; Sha, David D., Concept-based searching of unstructured objects.
  21. Mohan, Rengaswamy; Mohan, Usha; Sha, David D., Concept-based trends and exceptions tracking.
  22. Hiraga,Masaki, Contents filtering method, contents filtering apparatus and contents filtering program.
  23. Antkowiak, Ryan D.; Garvey, Jesse L.; Gazdic, Daniel J.; Gura, Damon E.; Himawan, Budyanto; Ho, Audrey F. Y.; Kloes, Robertus A. I.; Leverenz, Jeffrey M., Controlling wagering game system browser areas.
  24. Antkowiak, Ryan D.; Garvey, Jesse L.; Gazdic, Daniel J.; Gura, Damon E.; Himawan, Budyanto; Ho, Audrey F. Y.; Kloes, Robertus A. I.; Leverenz, Jeffrey M., Controlling wagering game system browser areas.
  25. Antkowiak, Ryan D.; Garvey, Jesse L.; Gazdic, Daniel J.; Gura, Damon E.; Himawan, Budyanto; Ho, Audrey F. Y.; Kloes, Robertus A. I.; Leverenz, Jeffrey M., Controlling wagering game system browser areas.
  26. Carlander, Carrie, Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications.
  27. Carlander, Carrie, Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications.
  28. McQueen, Carrie, Controlling, filtering, and monitoring of mobile device access to the internet, data, voice, and applications.
  29. Betz, Jonathan T., Corroborating facts extracted from multiple sources.
  30. Zhao, Shubin; Czuba, Krzysztof, Corroborating facts in electronic documents.
  31. Zhao, Shubin; Czuba, Krzysztof, Corroborating facts in electronic documents.
  32. Morimoto, Masahiro; Shirai, Yoshikatsu; Takeda, Hideki; Hasuko, Kazumi; Hanatani, Akiteru; Halskov, Jakob; Yoshida, Nanako, Data analysis system, data analysis method, data analysis program, and storage medium.
  33. Morimoto, Masahiro; Shirai, Yoshikatsu; Takeda, Hideki; Hasuko, Kazumi; Hanatani, Akiteru; Halskov, Jakob; Yoshida, Nanako, Data analysis system, data analysis method, data analysis program, and storage medium.
  34. Otsuka, Nobuo, Data cleansing system and method.
  35. Rochelle, Jonathan; Lemonik, Micah G.; Vespe, David J., Data from web documents in a spreadsheet.
  36. Hogue, Andrew W.; Vespe, David J.; Kehlenbeck, Alexander; Gordon, Michael; Reynar, Jeffrey C.; Alpert, David B., Data object visualization.
  37. Hogue, Andrew William; Vespe, David J.; Kehlenbeck, Alexander P.; Gordon, Michael; Reynar, Jeffrey C.; Alpert, David B., Data object visualization using graphs.
  38. Denesuk,Matthew; Gruhl,Daniel Frederick; McCurley,Kevin Snow; Meyer,Joerg; Rajagopalan,Sridhar; Tomkins,Andrew S.; Zien,Jason Yeong, Data store for knowledge-based data mining system.
  39. Vespe, David; Hogue, Andrew W., Date ambiguity resolution.
  40. Kumar, M. Bharath; Bharat, Krishna, Detecting novel document content.
  41. Kumar, M. Bharath; Bharat, Krishna, Detecting novel document content.
  42. Kumar,M. Bharath; Bharat,Krishna, Detecting novel document content.
  43. Packer,Alan; Rehfuss,Paul Stephen; Alexander,James H., Detecting sexually predatory content in an electronic communication.
  44. Larason, John Todd; Packer, Alan J., Determining a rating for a collection of documents.
  45. Larason,John Todd; Packer,Alan J., Determining a rating for a collection of documents.
  46. Vespe, David J.; Hogue, Andrew, Determining geographic locations for place names in a fact repository.
  47. Vespe, David; Hogue, Andrew, Determining geographic locations for place names in a fact repository.
  48. Dixon, Christopher John; Pinckney, Thomas, Determining website reputations using automatic testing.
  49. Jones, Kevin Brian; Pointon, Richard, Device internet resource access filtering system and method.
  50. Gagner, Mark B.; Gura, Damon E.; Sylla, Craig J., Distributing information in a wagering game system.
  51. Ahlander, John Lyman; Fonnesbeck, J. Michael; Toone, Nathan David; Valimaki, Mikko, Dynamic background rater for internet content.
  52. Shraim, Ihab; Shull, Mark, Early detection and monitoring of online fraud.
  53. Collins, Joseph; Shah, Amit Jindas, Electronic message content and header restrictive recipient handling system and method.
  54. Collins, Joseph; Shah, Amit Jindas, Electronic message content and header restrictive send device handling system and method.
  55. Collins, Joseph; Shah, Amit Jindas, Electronic message handling system and method between sending and recipient devices with separation of display of media component and header information.
  56. Collins, Joseph; Shah, Amit Jindas, Electronic message recipient handling system and method with media component and header information separation.
  57. Collins, Joseph; Shah, Amit Jindas, Electronic message recipient handling system and method with separated display of message content and header information.
  58. Collins, Joseph; Shah, Amit Jindas, Electronic message recipient handling system and method with separation of message content and header information.
  59. Collins, Joseph; Shah, Amit Jindas, Electronic message send device handling system and method with media component and header information separation.
  60. Collins, Joseph; Shah, Amit Jindas, Electronic message send device handling system and method with separated display and transmission of message content and header information.
  61. Collins, Joseph; Shah, Amit Jindas, Electronic message send device handling system and method with separation of message content and header information.
  62. Shraim, Ihab; Shull, Mark, Enhanced responses to online fraud.
  63. Betz, Jonathan T., Entity normalization via name normalization.
  64. Betz, Jonathan T., Entity normalization via name normalization.
  65. Betz, Jonathan T., Entity normalization via name normalization.
  66. Shamsi, Farhan; Kehlenbeck, Alex; Vespe, David; Petrovic, Nemanja, Entity type assignment.
  67. McCammon, Keiron; Chandra, Manish, Extracting information from formatted sources.
  68. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  69. Schneider, Eric, Fictitious domain name method, system, product, and apparatus.
  70. Ahlander, John Lyman; Valimaki, Mikko, Filtering cached content based on embedded URLs.
  71. Hegli, Ronald Bjorn; Lonas, Jr., Hal Case; Kester, Harold, Filtering techniques for managing access to internet sites or other software applications.
  72. Hegli,Ronald Bjorn; Lonas, Jr.,Hal Case; Kester,Harold, Filtering techniques for managing access to internet sites or other software applications.
  73. Laroco, Jr., Leonardo A.; Jevtic, Nikola; Yakovenko, Nikolai V.; Reynar, Jeffrey, Finding and disambiguating references to entities on web pages.
  74. Laroco, Jr., Leonardo A.; Jevtic, Nikola; Yakovenko, Nikolai V.; Reynar, Jeffrey, Finding and disambiguating references to entities on web pages.
  75. Laroco, Jr., Leonardo A.; Jevtic, Nikola; Yakovenko, Nikolai V.; Reynar, Jeffrey, Finding and disambiguating references to entities on web pages.
  76. Shraim, Ihab; Shull, Mark, Generating phish messages.
  77. Chiles,David Clyde; Bosco,Eric, Home-networking.
  78. Chiles,David Clyde; Bosco,Eric, Home-networking.
  79. Schneider, Eric, Homepage access method, product, and apparatus.
  80. Schneider,Eric, Homepage access method, product, and apparatus.
  81. Betz, Jonathan T.; Hogue, Andrew W., ID persistence through normalization.
  82. Banerjee,Dwip N.; Paolini,Michael A.; Ravi,Kumar; Spring,Eduardo N., Iconic representation of linked site characteristics.
  83. Fetterly, Dennis Craig; Chien, Steve Shaw Tang, Identifying a web page as belonging to a blog.
  84. Jing, Feng; Zhang, Lei; Ma, Wei-Ying, Identifying sight for a location.
  85. Betz, Jonathan T., Identifying the unifying subject of a set of facts.
  86. Betz, Jonathan T., Identifying the unifying subject of a set of facts.
  87. Valencia-Campo, Alexander; Makalkin, Mikhail, Image and website filter using image comparison.
  88. Dixon, Christopher John; Pinckney, Thomas, Indicating Website reputations during Website manipulation of user information.
  89. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations based on website handling of personal information.
  90. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during an electronic commerce transaction.
  91. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during user interactions.
  92. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  93. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  94. Denesuk, Matthew; Gruhl, Daniel Frederick; McCurley, Kevin Snow; Rajagopalan, Sridhar; Tomkins, Andrew S., Knowledge-based data mining system.
  95. Denesuk,Matthew; Gruhl,Daniel Frederick; McCurley,Kevin Snow; Rajagopalan,Sridhar; Tomkins,Andrew S., Knowledge-based data mining system.
  96. Zhao, Shubin, Learning objects and facts from documents.
  97. Czuba, Krzysztof; Betz, Jonathan T.; Reynar, Jeffrey C., Learning synonymous object names from anchor texts.
  98. Owens, II,John Barclay; Meenan,Patrick, Local device access controls.
  99. Meenan,Patrick; Sengpiehl,Donald P.; Thornberg,Rich, Local proxy server for establishing device controls.
  100. Schneider, Jerome L., Malware management through kernel detection during a boot sequence.
  101. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J., Measuring a page-specific subjective user reaction concerning each of multiple web pages of a website.
  102. Black, Robert Barth, Method and aparatus for presence based resource management.
  103. Wright, Linda, Method and apparatus for creating and categorizing exemplar structures to access information regarding a collection of objects.
  104. Kay, James, Method and apparatus for electronic mail filtering.
  105. Kay, James, Method and apparatus for electronic mail filtering.
  106. Kay, James, Method and apparatus for electronic mail filtering.
  107. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  108. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  109. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  110. Foley, James M.; Johnson, Rick D.; Nambiar, Anant, Method and apparatus for enabling a user to select an authentication method.
  111. Yang,Yinan, Method and apparatus for evaluating trust and transitivity of trust of online services.
  112. Black, Robert Barth, Method and apparatus for presence based resource management.
  113. Elfayoumy, Sherif A.; Mohan, Rengaswamy, Method and computer program product for converting ontologies into concept semantic networks.
  114. Whitehead,Anthony David; Morin,Patrick Ryan, Method and device for classifying internet objects and objects stored on computer-readable media.
  115. Franken, Kenneth A.; Moubarak, Toufic; Perry, Jack, Method and system for creating television programming guide.
  116. Franken, Kenneth A.; Moubarak, Toufic; Perry, Jack, Method and system for providing household level television programming information.
  117. Lee, Jae Seung; Chung, Kyo Il, Method of web service and its apparatus.
  118. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  119. Schneider, Eric, Method, product, and apparatus for enhancing resolution services, registration services, and search services.
  120. Schneider, Eric, Method, product, and apparatus for processing a data request.
  121. Schneider, Eric, Method, product, and apparatus for requesting a network resource.
  122. Mohan, Rengaswamy; Mohan, Usha; Sha, David D., Method, system, and computer program product for concept-based multi-dimensional analysis of unstructured information.
  123. Shraim, Ihab; Shull, Mark, Methods and systems for analyzing data related to possible online fraud.
  124. Shraim, Ihab; Shull, Mark, Methods and systems for analyzing data related to possible online fraud.
  125. Shraim,Ihab; Shull,Mark, Methods and systems for analyzing data related to possible online fraud.
  126. Schepis, Adam; Newstadt, Keith, Methods and systems for enforcing parental-control policies on user-generated content.
  127. Odom, Paul S., Methods and systems for providing personalized contextual search results.
  128. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  129. Schneider, Eric, Methods, systems, products, and devices for processing DNS friendly identifiers.
  130. Tessman, Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  131. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  132. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  133. Tessman, Jr., Gary; Lippert, Patrick D.; Hayman, Timothy B., Monitoring digital images.
  134. Choti, Joseph Francis; Shaffer, Justin Alexander; Sun, Christopher; Soundararajan, Elangovan; Willis, Shadeed S.; Hochberg, Lincoln; Curtis, Sean, Multiple user login detection and response system.
  135. Choti, Joseph Francis; Shaffer, Justin Alexander; Sun, Christopher; Soundararajan, Elangovan; Willis, Shadeed S.; Hochberg, Lincoln; Curtis, Sean, Multiple user login detection and response system.
  136. Schneider, Eric, Network resource access method, product, and apparatus.
  137. Shraim, Ihab; Shull, Mark, Online fraud solution.
  138. Shraim, Ihab; Shull, Mark; Hepworth, James, Online fraud solution.
  139. Shraim, Ihab; Shull, Mark; Hepworth, James, Online fraud solution.
  140. Idei,Hideomi; Mogi,Kazuhiko; Nishikawa,Norifumi, Pre-fetch computer system.
  141. Idei, Hideomi; Mogi, Kazuhiko; Nishikawa, Norifumi; Nomoto, Toyohiro, Prefetch appliance server.
  142. Idei,Hideomi; Mogi,Kazuhiko; Nishikawa,Norifumi; Nomoto,Toyohiro, Prefetch appliance server.
  143. Chan, Victor S.; Khusial, Darshanand; Vandergoot, Jacob T., Previewing in live electronic commerce environment.
  144. Kim, Moon Ju; Rodriguez, Juan-Leon; Doganata, Yurdaer Nezihi; Drissi, Youssef; Kozakov, Lev, Promoting strategic documents by bias ranking of search results on a web browser.
  145. Dixon, Christopher John; Pinckney, Thomas, Providing alternative web content based on website reputation assessment.
  146. Oztekin,Bilgehan Uygar; Kamvar,Sepandar D.; Haveliwala,Taher H.; Jeh,Glen; Macduff,Tessa, Query boosting based on classification.
  147. Hogue, Andrew W.; Rohde, Douglas L. T., Query language.
  148. Zeng, Hua Jun; He, Qicai; Liu, Guimei; Chen, Zheng; Zhang, Benyu; Ma, Wei Ying, Query-based snippet clustering for search result grouping.
  149. Jing, Feng; Zhang, Lei; Ma, Wei-Ying, Ranking content based on relevance and quality.
  150. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  151. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  152. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  153. Nickerson, Rand B.; Treschl, Mark A.; Rudman, Jay S.; Krebs, Mark D., Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website.
  154. Nickerson,Rand B.; Treschl,Mark A.; Rudman,Jay S., Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website.
  155. Nickerson,Rand B.; Treschl,Mark A.; Rudman,Jay S.; Krebs,Mark D., Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website.
  156. Nickerson, Rand B.; Treschl, Mark A.; Rudman, Jay S., Receiving page-specific user feedback concerning one or more particular web pages of a website.
  157. Collins, Joseph; Shah, Amit Jindas, Reduced traceability electronic message system and method.
  158. Collins, Joseph; Shah, Amit Jindas, Reduced traceability electronic message system and method.
  159. Collins, Joseph; Shah, Amit Jindas, Reduced traceability electronic message system and method for sending header information before message content.
  160. Eisendrath,Benjamin; Spannbauer,Bradley; Smith, Jr.,Stanley O., Regulating concurrent logins associated with a single account.
  161. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  162. McCammon, Keiron; Chandra, Manish, Reverse value attribute extraction.
  163. Horton,John J., Router polling system and method.
  164. Macduff, Tessa; Basu, Sugato; Haveliwala, Taher H.; Jeh, Glen; Kamvar, Sepandar D.; Oztekin, Bilgehan Uygar; Sahami, Mehran, Search boost vector based on co-visitation information.
  165. Odom, Paul S.; Kotlar, Dennis, Search engine methods and systems for displaying relevant topics.
  166. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  167. Schneider, Eric; Schneider, Steven; Heintz, Daniel V., Search engine request method, product, and apparatus.
  168. Nickerson, Rand B.; Treschl, Mark A., Soliciting user feedback regarding one or more web pages of a website without obscuring visual content.
  169. Kirby, James M, Speech screening.
  170. Kehlenbeck,Alexander P.; Hogue,Andrew W., Support for object search.
  171. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  172. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  173. Kester, Harold; Ruskin, Dan; Lee, Chris; Anderson, Mark, System and method for adapting an internet filter.
  174. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J.; Mesdaq, Ali A., System and method for analyzing web content.
  175. Baddour, Victor L.; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A., System and method for analyzing web content.
  176. Baddour, Victor L; Chenette, Stephan; Hubbard, Dan; Verenini, Nicholas J; Mesdaq, Ali A, System and method for analyzing web content.
  177. Mohan, Rengaswamy; Mohan, Usha; Sha, David D., System and method for concept based analysis of unstructured data.
  178. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  179. Hegli, Ronald; Carrington, John; Oei, David, System and method for controlling access to internet sites.
  180. Hegli, Ron; Lonas, Hal; Harris, Christopher K., System and method for developing a risk profile for an internet service.
  181. Hubbard, Daniel Lyle; Ruskin, Dan, System and method for dynamic and real-time categorization of webpages.
  182. Loveland, Damien Gerard, System and method for facilitating property comparisons.
  183. Madani, Omid; Connor, Michael James, System and method for learning a weighted index to categorize objects.
  184. Hartmann, Richard G.; Krissell, Daniel L.; Murphy, Jr., Thomas E.; Orzel, Francine M.; Rieth, Paul F.; Stevens, Jeffrey S., System and method for managing denial of service attacks.
  185. Nickerson, Rand B.; Treschl, Mark A.; Williams, Jr., Charles H.; Arnaud, Sebastien J.; Hunter, Kennith G., System and method for measuring and reporting user reactions to advertisements on a web page.
  186. Nickerson, Rand B.; Treschl, Mark A.; Wolfe, Sean E., System and method for mobile interaction.
  187. Nickerson, Rand B.; Treschl, Mark A., System and method for providing intelligent support.
  188. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J.; Samata, A. Gregory; Mason, David E., System and method for reporting to a website owner user reactions to particular web pages of a website.
  189. Nickerson,Rand B.; Treschl,Mark A.; Kidd,Kathryn L.; Crofoot,Matthew J.; Samata,A. Gregory; Mason,David E., System and method for reporting to a website owner user reactions to particular web pages of a website.
  190. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  191. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  192. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  193. Hubbard, Dan; Verenini, Nicholas Joseph; Baddour, Victor Louie, System and method of analyzing web content.
  194. Hubbard, Dan, System and method of controlling access to the internet.
  195. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  196. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  197. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  198. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  199. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  200. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  201. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  202. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  203. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  204. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  205. Kester,Harold M.; Hegli,Ronald B.; Dimm,John Ross; Anderson,Mark Richard, System and method of monitoring and controlling application files.
  206. O'Rourke,Kevin, System and user interface for communicating and processing patient record information.
  207. Hogue, Andrew William; Siemborski, Robert Joseph; Betz, Jonathan T., System for ensuring the internal consistency of a fact repository.
  208. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  209. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  210. Sinclair, John W.; Pettener, Ian James; Nash, Alistair H., System, method and apparatus for use in monitoring or controlling internet access.
  211. Heron, George L.; Bolin, Christopher S., System, method and computer program product for obtaining a reputation associated with a file.
  212. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface.
  213. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk associated with search results within a graphical user interface.
  214. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  215. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  216. Walker, Joanne; Rosenthal, Saul, Systems and methods for computer implemented treatment of behavioral disorders.
  217. Walker, Joanne; Rosenthal, Saul, Systems and methods for computer implemented treatment of behavioral disorders.
  218. Walker, Joanne; Rosenthal, Saul, Systems and methods for computer implemented treatment of behavorial disorders.
  219. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  220. Kenny, Shane; Kenny, Aaron, Systems and methods for delegation and notification of administration of internet access.
  221. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  222. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  223. Gilbert, Lanny, Systems and methods for limiting web site access.
  224. Gilbert, Lanny, Systems and methods for limiting web site access.
  225. Brukman, Michael Y.; Horling, Bryan C.; Zamir, Oren E., Systems and methods for promoting personalized search results based on personal information.
  226. Brukman, Michael Y.; Horling, Bryan; Zamir, Oren E., Systems and methods for promoting search results based on personal information.
  227. Allen,Richard Barnett; Bellwood,Thomas Alexander; Chumbley,Robert Bryant; Rutkowski,Matthew Francis, Systems and methods for user-constructed hierarchical interest profiles and information retrieval using same.
  228. Odom,Paul S.; Akileswar,Subramanian; Childers,Robie; Kotlar,Dennis, Topic identification and use thereof in information retrieval systems.
  229. Betz, Jonathan T.; Zhao, Shubin, Unsupervised extraction of facts.
  230. Betz, Jonathan T.; Zhao, Shubin, Unsupervised extraction of facts.
  231. Hogue, Andrew William, User interface for facts query engine with snippets from information sources that include query terms and answer terms.
  232. Hogue, Andrew William, User interface for facts query engine with snippets from information sources that include query terms and answer terms.
  233. Hogue, Andrew William, User interface for facts query engine with snippets from information sources that include query terms and answer terms.
  234. Petrou, David; Power, Theodore, User interface for presenting search results for multiple regions of a visual query.
  235. Jing, Feng; Zhang, Lei; Li, Ming Jing; Ma, Wei-Ying; Deng, Kefeng, User interface for viewing clusters of images.
  236. Jing, Feng; Zhang, Lei; Li, Ming Jing; Ma, Wei-Ying; Deng, Kefeng, User interface for viewing clusters of images.
  237. Jing, Feng; Zhang, Lei; Li, Ming Jing; Ma, Wei-Ying; Deng, Kefeng, User interface for viewing clusters of images.
  238. Antkowiak, Ryan D.; Gazdic, Daniel J.; Gura, Damon E.; Himawan, Budyanto; Ho, Audrey F. Y.; Leverenz, Jeffrey M., Wagering game presentation with multiple technology containers in a web browser.
  239. Antkowiak, Ryan D.; Gazdic, Daniel J.; Gura, Damon E.; Himawan, Budyanto; Ho, Audrey F. Y.; Leverenz, Jeffrey M., Web page constructions with different technology containers.
  240. Harris, Scott C., Wireless network having multiple communication allowances.
  241. Harris,Scott C., Wireless network having multiple communication allowances.
  242. Horton,John J., xDSL connection monitor.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로