$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for extending Java applets sand box with public client storage 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/19
출원번호 US-0173384 (1998-10-15)
발명자 / 주소
  • Bardon, Didier D.
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Van Leeuwen, Leslie A.Bracewell & Patterson, L.L.P.
인용정보 피인용 횟수 : 188  인용 특허 : 6

초록

A Java applet sandbox, provided by restrictions originally set by the manufacturer of a Java enabled Internet browser, may be securely extended by introducing the notion of public and private client storage. In addition to the sandbox, users are given means of declaring a portion of the user machine

대표청구항

A Java applet sandbox, provided by restrictions originally set by the manufacturer of a Java enabled Internet browser, may be securely extended by introducing the notion of public and private client storage. In addition to the sandbox, users are given means of declaring a portion of the user machine

이 특허에 인용된 특허 (6)

  1. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  2. Lee Jong Y. ; Dharmaraj Satish K., Method and apparatus for providing security for servers executing application programs received via a network.
  3. Gong Li, Protection domains to provide security in a computer system.
  4. Gong Li, Secure class resolution, loading and definition.
  5. Bond Barry ; Bharati Sudeep, Security enhancement for untrusted executable code.
  6. Golan Gilad,ILX, Security monitor.

이 특허를 인용한 특허 (188)

  1. Schackow, Stefan N.; Kothari, Nikhil, Accessing network resources outside a security boundary.
  2. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V.; Hopcroft, Michael J., Architectures for and methods of providing network-based software extensions.
  3. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  4. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  5. Krieger, Michael D.; Paczkowski, Lyle W.; Schlesener, Matthew C., Billing varied service based on tier.
  6. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  7. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  8. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  9. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  10. Largman, Kenneth; More, Anthony B.; Blair, Jeffrey, Computer and method for safe usage of documents, email attachments and other content that may contain virus, spy-ware, or malicious code.
  11. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  12. Largman, Kenneth; More, Anthony; Blair, Jeffrey, Computer system and method having isolatable storage for enhanced immunity to viral and malicious code infection.
  13. Largman, Kenneth; More, Anthony B.; Blair, Jeffrey, Computer system and method of controlling communication port to prevent computer contamination by virus or malicious code.
  14. Largman,Kenneth; More,Anthony B.; Blair,Jeffrey, Computer system architecture and method providing operating-system independent virus-, hacker-, and cyber-terror-immune processing environments.
  15. Largman, Kenneth; More, Anthony B.; Blair, Jeffrey, Computer system capable of supporting a plurality of independent computing environments.
  16. Wiseman,Simon Robert, Computer system protection.
  17. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  18. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  19. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  20. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  21. Shukla, Dharma K.; Burdick, Matthew J.; Ghanaie-Sichanie, Arash; Augustine, Matthew S.; Krishnan, Hari, Data access programming model for occasionally connected applications.
  22. Templin, David Kehl; Fee, Gregory Darrell; Gryko, Izydor; Cantwell, James Gordon; Eng, Michael; Draine, Sean Conway; Saad, Stephanie Sweeny, Debugging applications under different permissions.
  23. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  24. Bye, Stephen James; Paczkowski, Lyle W.; Schlesener, Matthew C., Delivering digital content to a mobile device via a digital rights clearing house.
  25. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  26. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  27. Cordes, Kevin R.; Loman, Clinton H.; Mantel, Brian D.; Paczkowski, Lyle W.; Steele, Kenneth R., Digest of biographical information for an electronic device with static and dynamic portions.
  28. Cordes, Kevin R.; Loman, Clinton H.; Mantel, Brian D.; Paczkowski, Lyle W.; Steele, Kenneth R., Digest of biographical information for an electronic device with static and dynamic portions.
  29. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  30. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  31. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  32. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  33. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  34. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  35. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  36. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  37. McRoberts, Leo Michael; Paczkowski, Lyle W.; Rondeau, David E., End-to-end trusted communications infrastructure.
  38. McRoberts, Leo Michael; Paczkowski, Lyle W.; Rondeau, David E., End-to-end trusted communications infrastructure.
  39. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  40. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  41. Oliver, Mitchell B.; Horel, Gerald Charles; Minear, Brian, Execution of unverified programs in a wireless, device operating environment.
  42. Cope, Warren B.; Paczkowski, Lyle W., Extended trusted security zone radio modem.
  43. Bertz, Lyle T.; Bye, Stephen J.; Sershen, Daniel J., File retrieval in real-time brokering of digital content.
  44. Krstić, Ivan; Astrand, Love Hörnquist, File system access for one or more sandboxed applications.
  45. Krstić, Ivan; Åstrand, Love Hörnquist, File system access for one or more sandboxed applications.
  46. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  47. Bertz, Lyle T.; Bye, Stephen J.; Paczkowski, Lyle W.; Sershen, Daniel J., Framework for real-time brokering of digital content delivery.
  48. Bertz, Lyle T.; Bye, Stephen J.; Paczkowski, Lyle W.; Sershen, Daniel J., Framework for real-time brokering of digital content delivery.
  49. Bertz, Lyle T.; Paczkowski, Lyle W., Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers.
  50. Ghanaie-Sichanie, Arash; Augustine, Matthew S.; Shukla, Dharma K.; S, Hari Krishnan; Burdick, Matthew J., Hosted application sandbox model.
  51. Fresko, Nedim; Tuck, Richard D.; Long, Dean R. E., Hybrid system implementing distinct and co-existing application execution environments and methods for implementing the same.
  52. Fresko, Nedim; Tuck, Richard D.; Long, Dean R. E., Hybrid system implementing distinct and co-existing application execution environments and methods for implementing the same.
  53. Marquardt, Ronald R.; Paczkowski, Lyle W., Infrastructure for secure short message transmission.
  54. George, Sam; Kaza, Akhilesh; Harsh, Michael R., Isolating applications hosted by plug-in code.
  55. George, Sam; Kaza, Akhilesh; Harsh, Michael R., Isolating applications hosted by plug-in code.
  56. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., JTAG fuse vulnerability determination and protection using a trusted execution environment.
  57. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  58. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  59. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  60. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  61. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  62. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  63. Nelson, Tracy L.; Paczkowski, Lyle W., Mated universal serial bus (USB) wireless dongles configured with destination addresses.
  64. Owhadi, Eric; Bouchemoua, Mahmoud; Le-Rouzo, Christophe, Method and apparatus for providing support for an electronic device.
  65. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  66. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  67. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  68. Ruthfield, Scott L.; Banks, Richard, Method and systems of providing information to computer users.
  69. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory.
  70. Trefler, Alan; Hofmann, Andreas G., Methods and apparatus for integration of declarative rule-based processing with procedural programming in a digital data-processing environment.
  71. Trefler, Alan; Hofmann, Andreas G., Methods and apparatus for integration of declarative rule-based processing with procedural programming in a digital data-processing evironment.
  72. Trefler, Alan; Sachs, Baruch, Methods and apparatus for user interface optimization.
  73. Trefler, Alan; Hofmann, Andreas G., Methods and apparatus for work management and routing.
  74. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  75. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  76. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  77. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  78. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  79. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  80. Krstić, Ivan; Jennings, Austin G.; Hagy, Richard L., Methods for restricting resources used by a program based on entitlements.
  81. Morris, Nadia; Conner, William J., Methods of resetting passwords in network service systems including user redirection and related systems and computer program products.
  82. Morris, Scott; Conner, William, Methods of resetting passwords in network service systems including user redirection and related systems and computer-program products.
  83. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  84. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Sanchez, Lawrence M.; Licata, John A., Methods, systems, architectures and data structures for delivering software via a network.
  85. Cheng,Lebin, Mobile code security architecture in an application service provider environment.
  86. McCracken, Jr., Billy Gene; Spanel, Robert L.; Urbanek, Robert E., Mobile communication device profound identity brokering framework.
  87. McCracken, Jr., Billy Gene; Spanel, Robert L.; Urbanek, Robert E., Mobile communication device profound identity brokering framework.
  88. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  89. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services.
  90. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  91. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Raman,Suryanarayanan V., Network-based software extensions.
  92. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  93. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  94. Achanta, Phani Gopal V.; Hussain, Riaz Y.; Jones, Scott Thomas, Operating system-wide sandboxing via switchable user skins.
  95. Green, David E.; Payne, Richard; Wood, Trevor, Preventing propagation of malicious software during execution in a virtual machine.
  96. Khatutsky, Victor E., Proactive performance management for multi-user enterprise software systems.
  97. Khatutsky, Victor E., Proactive performance management for multi-user enterprise software systems.
  98. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  99. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  100. Bye, Stephen James; Paczkowski, Lyle W.; Schlesener, Matthew C., Protection for multimedia files pre-downloaded to a mobile device.
  101. Ezzat, Ahmed K., Providing a flexible protection model in a computer system by decoupling protection from computer privilege level.
  102. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  103. Cordes, Kevin R.; Loman, Clinton H.; Mantel, Brian D.; Paczkowski, Lyle W.; Steele, Kenneth R., Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device.
  104. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  105. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  106. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device.
  107. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  108. Trefler, Alan; Sachs, Baruch A., Rule-based user interface conformance methods.
  109. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  110. Perry, Matthew; Boodman, Aaron; Kay, Erik; Sargent, Antony John, Safe installation of browser extensions.
  111. Perry, Matthew; Boodman, Aaron; Kay, Erik; Sargent, Antony John, Safe installation of browser extensions.
  112. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  113. Jothimani, Premkumar, Secure file processing.
  114. Kunkel, Philip M.; Paczkowski, Lyle W., Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning.
  115. Ross, David Andrew; Franco, Roberto A.; Bedworth, John Green; Ganesh, Shankar; Kudallur, Venkatraman V.; Ganjam, Anantha P.; Schmucker, Kurt James, Security context lockdown.
  116. Largman, Kenneth; More, Anthony B.; Blair, Jeffrey, Self-repairing computing device and method of monitoring and repair.
  117. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  118. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  119. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  120. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  121. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  122. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  123. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  124. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  125. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  126. Urbanek, Robert E., Subscriber identity module virtualization.
  127. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  128. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  129. Caronni, Germano; Gupta, Amit; Kumar, Sandeep; Markson, Tom R.; Schuba, Christoph L.; Scott, Glenn C., System and method for enabling scalable security in a virtual private network.
  130. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  131. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  132. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  133. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  134. Ross, David Andrew; Franco, Roberto A.; Bedworth, John Green; Ganesh, Shankar; Kudallur, Venkatraman V.; Ganjam, Anantha P.; Schmucker, Kurt James, System and method for local machine zone lockdown with relation to a network browser.
  135. Green, David E.; Payne, Richard; Kilmer, William, System and method for malicious software detection in multiple protocols.
  136. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  137. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  138. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  139. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  140. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  141. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  142. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  143. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  144. Paczkowski, Lyle W.; Spanel, Robert L.; Urbanek, Robert E., System and method for secure USIM wireless network access.
  145. Chase, James Edward, System and method for updating or modifying an application without manual coding.
  146. Frenkel, Benjamin A., System and software for creation and modification of software.
  147. Cordes, Kevin R.; Loman, Clinton H.; Paczkowski, Lyle W.; Steele, Kenneth R., System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device.
  148. Clinton, John W.; Trefler, Alan; Frenkel, Benjamin, Systems and methods for distributed rules processing.
  149. Frenkel, Benjamin A., Systems and methods for distributed rules processing.
  150. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  151. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  152. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  153. Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C.; Shipley, Trevor D., Systems and methods for provisioning and using multiple trusted security zones on an electronic device.
  154. Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C.; Shipley, Trevor D., Systems and methods for provisioning and using multiple trusted security zones on an electronic device.
  155. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  156. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  157. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  158. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  159. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  160. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  161. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  162. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  163. Abraham, Saji; Wilson, Hart; Basu, Tassaduq; Iskin, Sermet; Zhao, Liang, Trust level activation.
  164. Abraham, Saji; Wilson, Hart; Basu, Tassaduq; Iskin, Sermet; Zhao, Liang, Trust level activation.
  165. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted code generation and verification to prevent fraud from maleficent external devices that capture data.
  166. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted display and transmission of digital ticket documentation.
  167. Paczkowski, Lyle W.; Parsel, William M.; Rajagopal, Arun, Trusted policy and charging enforcement function.
  168. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted processing location within a graphics processing unit.
  169. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone access to peripheral devices.
  170. Paczkowski, Lyle W.; Parsel, William M.; Schlesener, Matthew C., Trusted security zone communication addressing on an electronic device.
  171. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone containers for the protection and confidentiality of trusted service manager data.
  172. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone enhanced with trusted hardware drivers.
  173. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew C., Trusted security zone watermark.
  174. Paczkowski, Lyle W.; Ray, Amar N.; Sisul, James P., Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system.
  175. Paczkowski, Lyle W.; Ray, Amar N.; Sisul, James P., Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system.
  176. Bye, Stephen J.; Paczkowski, Lyle W.; Parsel, William M.; Schlesener, Matthew C.; Shipley, Trevor D., Trusted signaling in long term evolution (LTE) 4G wireless communication.
  177. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  178. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  179. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  180. Fan, Xiaofeng; Wang, Helen J.; Dunagan, John D.; Malik, Mansoor A.; Batheja, Rajesh S., User interface for online ads.
  181. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
  182. Loman, Clint H.; Paczkowski, Lyle W.; Spanel, Robert L., Verification of mobile device integrity during activation.
  183. Paczkowski, Lyle W.; Parsel, William M.; Persson, Carl J.; Schlesener, Matthew Carl, Verifying Applications in Virtual Environments Using a Trusted Security Zone.
  184. Marsden, Walter L.; Green, David E., Virus detection by executing e-mail code in a virtual machine.
  185. Marsden, Walter L.; Green, David E., Virus detection by executing electronic message code in a virtual machine.
  186. Marsden, Walter L.; Green, David L., Virus detection by executing electronic message code in a virtual machine.
  187. Katzer, Robin Dale; Paczkowski, Lyle W., Web server bypass of backend process on near field communications and secure element chips.
  188. Katzer, Robin Dale; Paczkowski, Lyle W., Web server bypass of backend process on near field communications and secure element chips.

관련 콘텐츠

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로