$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Selective data encryption using style sheet processing 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-001/28
출원번호 US-0422430 (1999-10-21)
§371/§102 date 20000607 (20000607)
발명자 / 주소
  • Davis, Mark C.
  • Hind, John R.
  • Peters, Marcia L.
  • Topol, Brad B.
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Myers, Bigel, Sibley &
인용정보 피인용 횟수 : 210  인용 특허 : 13

초록

A method, system, and computer program product for selectively encrypting one or more elements of a document using style sheet processing. Disclosed is a policy-driven augmented style sheet processor (e.g. an Extensible Stylesheet Language, or “XSL”, processor) that creates a selectively-encrypted d

대표청구항

1. A computer program product embodied on computer readable media readable by a computing system in a computing environment, for enforcing security policy using style sheet processing, comprising:computer-readable program code for obtaining an input document; computer-readable program code for obtai

이 특허에 인용된 특허 (13)

  1. Ciacelli Mark Louis ; Urda John William ; Lam Wai Man ; Kouloheris Jack Lawrence ; Fetkovich John Edward, Apparatus, method and computer program product for protecting copyright data within a computer system.
  2. Chen, Shyh-Kwei; Chung, Jen-Yao; Cohen, Mitchell A.; Fu, Shiwa S.; Gottemukkala, Vibby, Dynamic business process automation system using XML documents.
  3. Hind, John Raithel; Lindquist, David B.; Topol, Brad B.; Wesley, Ajamu A., Enforcing data policy using style sheet processing.
  4. Michael I. Hyman ; Phani K. Vaddadi, Extension of parsable structures.
  5. Kramer Glenn A. ; Vogel Mark B., Hierarchical models of consumer attributes for targeting content in a privacy-preserving manner.
  6. Carter Stephen R., Method and apparatus for collaborative document control.
  7. Mehran Moshfeghi, Method and apparatus for controlling browser functionality in the context of an application.
  8. Baisley Donald Edward ; Kumar C. Suresh, Method for versioning a UML model in a repository in accordance with an updated XML representation of the UML model.
  9. John R. Hind ; David Bruce Lection ; Leonard Douglas Tidwell, II ; Brad B. Topol ; Ajamu A. Wesley, Retrieval of style sheets from directories based upon partial characteristic matching.
  10. Kuroda Yasutsugu,JPX, Security level control apparatus and method for a network securing communications between parties without presetting th.
  11. Pebley Kevin M. ; Carlton Todd D., System and method for transferring encrypted sections of documents across a computer network.
  12. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  13. Gennaro Rosario ; Johnson Donald Byron ; Karger Paul Ashley ; Matyas ; Jr. Stephen Michael ; Peyravian Mohammad ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Two-phase cryptographic key recovery system.

이 특허를 인용한 특허 (210)

  1. Costea, Mihai; Ryvkin, Konstantin; Pearson, Malcolm E.; Williams, Roy, Access limited EMM distribution lists.
  2. April, Benjamin, Alteration of web documents for protection against web-injection attacks.
  3. Takeuchi,Masayuki; Kitoh,Shinichi; Furuya,Nobutoshi; Yoshino,Takeshi, Apparatus and method for controlling data access using encrypted link position information.
  4. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  5. Bache, Vijay Kumar Ananthapur; Bera, Jhilam; Kumar, Arvind; Sahoo, Bidhu, Application testing on a blockchain.
  6. Murray,Michael C.; Erickson,Paul R.; Fisher,Oliver G.; Hopcroft,Michael J.; Raman,Suryanarayanan V., Architectures for and methods of providing network-based software extensions.
  7. Levin, Douglas Andrew; Shah, Ashesh C.; Pedersen, Palle Martin, Authenticating licenses for legally-protectable content based on license profiles and content identifiers.
  8. Ardeleanu,Adriana; Paoli,Jean D.; Mooney,Stephen J.; Raman,Suryanarayanan V.; Jha,Rajesh K.; Sikchi,Prakash, Authoring arbitrary XML documents using DHTML and XSLT.
  9. Evan, Michael J.; Levine, Jonathan D.; Pangrazio, III, Donald M., Automated encryption and password protection for downloaded documents.
  10. Bell,Joshua S.; Catorcini,Alessandro; Begun,Andrew Paul; Paoli,Jean D.; Jin,Jun; Mollicone,Laurent; Raj,Willson Kulandai, Building a view on markup language data through a set of components.
  11. Little, Herbert A.; Adams, Neil P.; Tapuska, David F.; Brown, Michael S.; Kirkup, Michael G.; Godfrey, James A., Certificate management and transfer system and method.
  12. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Godfrey, James Andrew; Kirkup, Michael Grant, Certificate management and transfer system and method.
  13. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Kirkup, Michael Grant; Godfrey, James Andrew, Certificate management and transfer system and method.
  14. Udupa, Sivaprasad; Paul, Narinder; Raphel, Jose; Kailash, Kailash, Cloud based inspection of secure content avoiding man-in-the-middle attacks.
  15. Dougherty, Jesse M.; Pearson, Malcolm E.; Thomas, Shawn M., Combining communication policies into common rules store.
  16. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  17. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  18. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  19. Teruyama, Katsuyuki, Communication system and communication method for communication based on encryption capabilities of device.
  20. Wang,Kuansan, Context sensitive encoding and decoding.
  21. Mollicone, Laurent; Begun, Andrew P.; Friend, Ned B.; Mooney, Stephen J., Conversion of structured documents.
  22. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  23. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  24. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  25. Bird, John J.; McCoy, Doyle J., Converting data into natural language form.
  26. Stanciu, Constantin; Halstead, Patrick H.; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  27. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  28. Stanciu, Constantin; Halstead, Patrick; Shur, Andrey; Essey, Edward G., Correlation, association, or correspondence of electronic forms.
  29. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  30. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  31. Ene Pietrosanu, Monica; Iskin, Sermet; Ramadoss, Rajesh, Cryptography correctness detection methods and apparatuses.
  32. Freeman, William C; Hom, Richard V, Data encryption at the client and server level.
  33. Rivers Moore,Jonathan E.; Paoli,Jean D.; Veselov,Evgeny N.; Bath,Kamaljit S.; Ardeleanu,Adriana; Sikchi,Prakash, Declarative solution definition.
  34. Frey,Bridget J.; Young,Michael Wei Chin, Delegated authentication using a generic application-layer network protocol.
  35. Bell, Joshua S.; Roberts, Scott M.; Jin, Jun; Teutsch, Brian C.; Mollicone, Laurent, Designer-created aspect for an electronic form template.
  36. Fortini, Christian; Paoli, Jean D.; Mollicone, Laurent; Mohan, Bulusu Krishna; Catorcini, Alessandro, Designing electronic forms.
  37. Gajjala, Vijay K.; Della-Libera, Giovanni M.; Balayoghan, Vaithialingam B.; Janczuk, Tomasz, Digests to identify elements in a signature process.
  38. Gajjala, Vijay K.; Della-Libera, Giovanni M.; Balayoghan, Vaithialingam; Janczuk, Tomasz, Digests to identify elements in a signature process.
  39. Enokida,Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
  40. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signature with an embedded view.
  41. O'Connor, Brian G.; Deobhakta, Kalpita S.; Ifrim, Silviu, Digital signatures for network forms.
  42. Catorcini, Alessandro; Narendran, Arungundram; Velzen, Danny van; Cris, Mihaela C., Digital signatures with an embedded view.
  43. Herbach, Jonathan D.; Donahue, James; Shapiro, William M., Distributed document version control.
  44. Herbach, Jonathan D.; Gilchrist, Gary, Distributed document version control.
  45. Moore, James F.; Wood, Charles B., Dynamic feed generation.
  46. Calcaterra, Jeffrey A.; Hind, John R.; Salahshour, Abdolreza, Dynamic, selective obfuscation of information for multi-party transmission.
  47. Stanciu,Constantin; Halstead,Patrick; Shur,Andrey; Essey,Edward G., Electronic form aggregation.
  48. Larcheveque, Jean-Marie H.; Narendran, Arungundram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., Electronic form user interfaces.
  49. Tyler, Simon; Malone, Steven; Maylor, Jackie; Van Ry, Wayne; Ribeiro, Francisco, Electronic message threat protection system for authorized users.
  50. Ice, Cynthia L.; Jia, Ming Fei; Li, Xing; Schwerdtfeger, Richard Scott, Enabling a user to select multiple objects in a document.
  51. Rivers-Moore, Jonathan E.; Moldovanu, Petru M.; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  52. Rivers-Moore, Jonathan E.; Moldovanu, Petru M; Singh, Balbir, Enabling electronic documents for limited-capability computing devices.
  53. Rogers, Justin; Mielke, Markus, Enabling pseudo-class styles without revealing personal information.
  54. Dallett, Nicholas K; Roberts, Scott M.; Teutsch, Brian C.; Jin, Jun; David, Willson Kulandai Raj; Bell, Joshua S.; Snow, David M; Tysbert, Aleksandr; Lai, Shuk Yan, Enabling selection of an inferred schema part.
  55. Rising, III, Hawley K.; Tabatabai, Ali; Visharam, Mohammed Z., Encoding and distribution of schema for multimedia content descriptions.
  56. Suzuki, Koji; Hirose, Makoto; Hayashi, Naoki; Monma, Atsuhito, Encryption device, encryption processing method and program, and information protection system employing the encryption device.
  57. Moore, James F., Enhanced syndication.
  58. O'Connor, Brendan T.; Cavalieri, III, James L.; Fly, Robert C., Enhanced system security.
  59. Zhang, Hao; Kay, Jeffrey B.; Pearson, Malcolm E.; Tribble, Eric D., Establishing secure, mutually authenticated communication credentials.
  60. Zhang, Hao; Kay, Jeffrey B.; Pearson, Malcolm E.; Tribble, Eric D., Establishing secure, mutually authenticated communication credentials.
  61. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram C.; Sikchi, Prakash, Executing applications at appropriate trust levels.
  62. Stott, Nathaniel W.; Kelkar, Amol S; O'Connor, Brian G.; Rosenberg, Lee B; Catorcini, Alessandro; Narendran, Arungundram; Sikchi, Prakash, Executing applications at appropriate trust levels.
  63. Begun,Andrew Paul; Mollicone,Laurent; Catorcini,Alessandro, Form template data source change.
  64. Sack, Joseph Martin, Generating custom markup content to deter robots.
  65. Feigenbaum, Lee; Martin, Sean J.; Martin, Simon L.; Torres, Elias, Generation of unique significant key from URL get/post content.
  66. Della Libera, Giovanni M.; Gajjala, Vijay K.; Janczuk, Tomasz; Lambert, John R.; Waingold, Elliot, Generic security claim processing model.
  67. Araujo, Carlos Cesar; Brittenham, Peter James; Butler, Nicholas David; Callaway, Robert David; Rodriguez, Adolfo Francisco; Salz, Richard Eugene, High-performance XML processing in a common event infrastructure.
  68. Nishio, Masahiro, Information processing apparatus, information processing method, and program therefor.
  69. Watanabe,Takashi; Kaminaga,Masahiro; Endo,Takashi; Kumano,Seiichi, Information processing unit.
  70. Matsushima, Hideki; Futa, Yuichi; Takayama, Hisashi; Ito, Takayuki; Haga, Tomoyuki; Sato, Taichi, Information security device and information security system.
  71. Imamura, Takeshi; Tamura, Kent; Makino, Satoshi; Takase, Toshiro, Information, transformation and reverse transformation processing.
  72. Maylor, Jackie; Tyler, Simon; Bauer, Peter; Benamram, Gilly; Sowden, Paul; Malone, Steven; Van Ry, Wayne; Ribeiro, Francisco, Malware detection system based on stored data.
  73. Brychell,Joseph J.; Bocken,Xavier; Jervis,Robert; Bath,Kamaljit S.; Narendran,Arungundram; Vassiliev,Mikhail; van Velzen,Danny; Selim,Nora S.; Green,Hagen, Managing XML documents containing hierarchical database information.
  74. Sikchi,Prakash; Veselov,Evgeny N.; Mooney,Stephen J., Mapping between structured data and a visual surface.
  75. Pearson, Malcolm Erik; Warman, Leon R., Message data management.
  76. Pearson, Malcolm Erik; Warman, Leon R., Message data management.
  77. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., Message service indication system and method.
  78. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., Message service indication system and method.
  79. Burrows,Warwick Leslie, Method and apparatus for XSL/XML based authorization rules policy implementation.
  80. Nguyen, Nhut; Fang, Scott, Method and apparatus for secure storing of private data on user devices in telecommunications networks.
  81. Oh, Yun-Sang; Kim, Tae-sung; Jung, Kyung-im; Kim, Shin-han, Method and apparatus for transmitting rights object information between device and portable storage.
  82. Oh, Yun-sang; Kim, Tae-sung; Jung, Kyung-im; Kim, Shin-han, Method and apparatus for transmitting rights object information between device and portable storage.
  83. Matsakis, Nicholas; Morgan, Charles Robert; Kenton, Jeffrey; Nelson, Jan Christian; Dolph, V, Cyrus Abda; Kuznetsov, Eugene, Method and apparatus of streaming data transformation using code generator and translator.
  84. Krislov, Clinton A., Method and system for automated document registration.
  85. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  86. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  87. Rodgers, Stephane; Dellow, Andrew, Method and system for preventing revocation denial of service attacks.
  88. Rodgers, Stephane; Dellow, Andrew, Method and system for preventing revocation denial of service attacks.
  89. Goodman, Daniel I., Method and system for real-time control of document printing.
  90. Goodman, Daniel I., Method and system for real-time control of document printing.
  91. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  92. Connell, John M., Method and system for secure transfer of electronic information.
  93. Zhan, Kaijun; Harper, James, Method for managing data in a shared computing environment.
  94. Staddon, Jessica N.; Golle, Philippe Jean-Paul, Method, apparatus, and program product for enabling access to flexibly redacted content.
  95. Staddon, Jessica N.; Golle, Philippe Jean-Paul, Method, apparatus, and program product for flexible redaction of content.
  96. Staddon, Jessica N.; Golle, Philippe Jean-Paul, Method, apparatus, and program product for revealing redacted information.
  97. Pedersen, Palle Martin; Golombek, David; Levin, Douglas A.; Smith, John J., Methods and apparatus for automated export compliance.
  98. Kuznetsov, Eugene; Salz, Richard E.; Wenocur, Jonathan H.; Nelson, Jan-Christian; Dolph V, Cyrus Abda; Matsakis, Nicholas D.; Ballou, Kenneth R., Methods and apparatus for processing markup language messages in a network.
  99. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods and systems for delivering software via a network.
  100. Kelkar,Amol S; Airapetyan,David; Sikchi,Prakash, Methods and systems for exchanging and rendering forms.
  101. Pedersen, Palle Martin, Methods and systems for identifying an area of interest in protectable content.
  102. Pedersen, Palle M., Methods and systems for managing software development.
  103. Sikchi, Prakash; Aggarwal, Ranjan; O'Connor, Brian G.; Airapetyan, David, Methods and systems for server side form processing.
  104. Ruthfield, Scott L.; Banks, Richard, Methods and systems of providing information to computer users.
  105. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  106. Ruthfield,Scott L.; Banks,Richard, Methods and systems of providing information to computer users.
  107. Ishizaki, Toshikazu, Methods for generating a partially encrypted and compressed database and decrypting and decompressing the database.
  108. James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Licata, John A.; Sanchez, Lawrence M., Methods, systems, architectures and data structures for delivering software via a network.
  109. Smuga, Michael A; Catorcini, Alessandro; Roberts, Scott M.; Raj David, Willson Kulandai; Begun, Andrew Paul, Mutually exclusive options in electronic forms.
  110. Lortz,Victor B.; Saint Hilaire,Ylian; Jason, Jr.,James L., Network policy distribution.
  111. Moore, James F., Network-accessible database of remote services.
  112. Murray, Michael C.; Erickson, Paul R.; Fisher, Oliver G.; Raman, Suryanarayanan V., Network-based software extensions.
  113. Shapiro, William M.; Donahue, James; Herbach, Jonathan D., Offline access in a document control system.
  114. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Offline editing of XML files using a solution.
  115. Rivers-Moore, Jonathan E.; van Velzen, Danny; Bora, Prachi, Opening network-enabled electronic documents.
  116. Jain, Chandresh K.; Pearson, Malcolm E.; Waddoups, Nathan F.; Costea, Mihai; Tribble, Eric D., Perimeter message filtering with extracted user-specific preferences.
  117. Croicu, Alexandru; Bath, Kamaljit S.; Shur, Andrey; Essey, Edward G.; Stott, Nathaniel W.; Perlow, Jonathan D.; Cupala, Shiraz J.; O'Connor, Brian G., Promoting data from structured data files.
  118. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  119. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., Providing certificate matching in a system and method for searching and retrieving certificates.
  120. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, Providing certificate matching in a system and method for searching and retrieving certificates.
  121. Mirzad, Nima; Begun, Andrew Paul; Palmer, Michael B.; Mollicone, Laurent, Query to an electronic form.
  122. Chalecki, Jason P.; Yiu, Kelvin S.; Sikchi, Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  123. Chalecki,Jason P.; Yiu,Kelvin S.; Sikchi,Prakash, Rendering an HTML electronic form by applying XSLT to XML using a solution.
  124. Levin, Douglas Andrew; Pedersen, Palle Martin; Shah, Ashesh C., Resolving license dependencies for aggregations of legally-protectable content.
  125. Dougherty, Jesse M.; Pearson, Malcolm E.; Thomas, Shawn M., Reviewing effectiveness of communication rules system.
  126. Friend, Ned B.; Moldovanu, Petru M.; Kim, Jane T.; Pavlicic, Miladin; Cupala, Shiraz J., Role-dependent action for an electronic form.
  127. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  128. Sikchi,Prakash; O'Connor,Brian G.; Caldato,Claudio; Ifrim,Silviu, Scalable object model.
  129. Chen, Sherman (Xuemin); Rodgers, Steve, Secure key authentication and ladder system.
  130. Moore, James F., Security facility for maintaining health care data pools.
  131. Ganesh, Shankar; Bedworth, John G., Security restrictions on binary behaviors.
  132. Ganesh, Shankar; Bedworth, John G., Security restrictions on binary behaviors.
  133. Ganesh, Shankar; Bedworth, John G., Security restrictions on binary behaviors.
  134. Della-Libera, Giovanni M.; Gajjala, Vijay K.; Janczuk, Tomasz; Lambert, John R., Security scopes and profiles.
  135. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  136. Moore, James F.; Labovitch, Bela A., Security systems and methods for use with structured and unstructured data.
  137. Goodman, Brian Gerard; Fisher, James Arthur; Jesionowski, Leonard George, Selective encryption of data stored on removable media in an automated data storage library.
  138. Fisher, James A.; Goodman, Brian G.; Jesionowski, Leonard G., Selective encryption of data stored on removeable media in an automated data storage library.
  139. Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
  140. Wu, Junlong; Han, Jun, Sensitive data protection during user interface automation testing systems and methods.
  141. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  142. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  143. Ruthfield, Scott L.; Wolf, Richard J.; Hopcroft, Michael J.; Erickson, Paul R.; Nakajima, Satoshi, Single window navigation methods and systems.
  144. Ruthfield,Scott L.; Wolf,Richard J.; Hopcroft,Michael J.; Erickson,Paul R.; Nakajima,Satoshi, Single window navigation methods and systems.
  145. Pedersen, Palle Martin; Golombek, David; Levin, Douglas A.; Smith, John J., Software algorithm identification.
  146. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  147. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Morgan, Matthew D.; Franklin, Christopher Matthew, Spreadsheet fields in text.
  148. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  149. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Morgan,Matthew D.; Franklin,Christopher Matthew, Spreadsheet fields in text.
  150. Larcheveque, Jean-Marie H.; Ramagopalrao, Anand; Palmer, Michael B.; Catorcini, Alessandro, Structural editing with schema awareness.
  151. Larcheveque,Jean Marie H.; Ramagopalrao,Anand; Palmer,Michael B.; Catorcini,Alessandro, Structural editing with schema awareness.
  152. Hsu, Bofan; Sosiak, Sarah; Cupala, Shiraz J., Structured-document path-language expression methods and systems.
  153. Corell, Rob K.; Gaither, Shawn A., Style sheet generation.
  154. Moore, James F., Syndicating surgical data in a healthcare environment.
  155. Moore, James F., Syndicating ultrasound echo data in a healthcare environment.
  156. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  157. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  158. Fortini,Christian; Paoli,Jean D.; Mollicone,Laurent; Mohan,Bulusu Krishna; Catorcini,Alessandro, System and method for designing electronic forms.
  159. Paoli,Jean D.; Mollicone,Laurent; Friend,Ned B.; Kotler,Matthew J.; Lawrence,Thomas R.; Lai,Shuk Yan; Hendel,Sharma K.; Whitmarsh,Jason, System and method for designing electronic forms and hierarchical schemas.
  160. Brown, Michael K.; Kirkup, Michael G.; Brown, Michael S., System and method for displaying a security encoding indicator associated with a message attachment.
  161. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  162. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  163. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  164. Brown, Michael S., System and method for handling secure messages.
  165. Sikchi, Prakash; Barac, Dragos; Aggarwal, Ranjan; Mooney, Stephen J., System and method for incrementally transforming and rendering hierarchical data files.
  166. Kotler, Matthew J.; Anantharaman, Vinod; Franklin, Christopher Matthew; Fisher, Oliver G.; Gounares, Alexander G.; Morgan, Matthew D.; Wolf, Richard J., System and method for integrated spreadsheets and word processing tables.
  167. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod G.; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  168. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, System and method for integrating spreadsheets and word processing tables.
  169. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  170. Sikchi,Prakash; Narendran,Arungundram; Yiu,Kelvin S.; Barac,Dragos; Pavlicic,Miladin; Jha,Rajesh K., System and method for offline editing of data files.
  171. Little, Herbert A.; Brown, Michael S., System and method for processing encoded messages.
  172. Little, Herbert Anthony; Brown, Michael Stephen, System and method for processing encoded messages.
  173. Brown, Michael S.; Adams, Neil P.; Brown, Michael K.; Kirkup, Michael G.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  174. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  175. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  176. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  177. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  178. Little, Herbert A., System and method for protecting master encryption keys.
  179. Larcheveque, Jean-Marie H.; Narendran, Arungudnram; Sikchi, Prakash; Levenkov, Alexei; Ardeleanu, Adriana; Shur, Andrey; Catorcini, Alessandro; Selim, Nora S.; Bath, Kamaljit S., System and method for real-time validation of structured data files.
  180. Battagin, Daniel C.; Levin, Ira; Megiddo, Eran, System and method for restricting user access to a network document.
  181. Brown, Michael Stephen; Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant; Brown, Michael Kenneth, System and method for retrieving related certificates.
  182. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., System and method for searching and retrieving certificates.
  183. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., System and method for searching and retrieving certificates.
  184. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, System and method for searching and retrieving certificates.
  185. Little, Herbert A.; Kirkup, Michael G., System and method for secure message key caching in a mobile communication device.
  186. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., System and method of indicating the strength of encryption.
  187. Adams, Neil P.; Brown, Michael S.; Little, Herbert A.; Brown, Michael K., System and method of indicating the strength of encryption.
  188. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony; Brown, Michael Kenneth, System and method of indicating the strength of encryption.
  189. Castagna, Brandon Matthew, System for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash.
  190. Frei, Brent; Jacobson, Tony; Arunkundram, Rajiv; Rucker, Erik; Maliska, Jr., Thomas P., Systems and methods for analyzing electronic communications to dynamically improve efficiency and visualization of collaborative work environments.
  191. Rivers Moore,Jonathan E.; Veselov,Eugene N., Systems and methods for editing XML documents.
  192. Kim, Jane T; Cupala, Shiraz J.; Sommer, Peter D.; Smith, J. Brian; Wang, Simin; Eason, Natalie M, Systems and methods for handwriting to a screen.
  193. Kim, Jane T; Sommer, Peter D.; Wang, Simin; Eason, Natalie M; Cupala, Shiraz J., Systems and methods for interacting with a computer through handwriting to a screen.
  194. Bender, Christopher L.; Brown, Michael K.; Brown, Michael S., Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function.
  195. Bender, Christopher L.; Brown, Michael K.; Brown, Michael S., Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function.
  196. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  197. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  198. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  199. Rockey, Eric S.; Talbott, Shannon P.; Kelly, Gavin M.; Jacobs, Nancy E.; Hopcroft, Michael J.; Westreich, Daniel J.; Perlow, Jonathan D.; Erickson, Paul R., Task-sensitive methods and systems for displaying command sets.
  200. Rockey,Eric S.; Talbott,Shannon P.; Kelly,Gavin M.; Jacobs,Nancy E.; Hopcroft,Michael J.; Westreich,Daniel J.; Perlow,Jonathan D.; Erickson,Paul R., Task-sensitive methods and systems for displaying command sets.
  201. Kelkar, Amol S.; van Velzen, Danny; Rivers Moore, Jonathan E., Template for rendering an electronic form.
  202. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  203. Sikchi, Prakash; Veselov, Evgeny N.; Mooney, Stephen J., Translation file.
  204. Warman, Leon; Pearson, Malcolm E.; Kuznetsov, Andrei; Waddoups, Nathan F.; Tribble, Eric D., Updating configuration information to a perimeter network.
  205. Kotler, Matthew J.; Gounares, Alexander G.; Fisher, Oliver G.; Wolf, Richard J.; Anantharaman, Vinod; Morgan, Matthew D.; Franklin, Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  206. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  207. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  208. Kotler,Matthew J.; Gounares,Alexander G.; Fisher,Oliver G.; Wolf,Richard J.; Anantharaman,Vinod; Morgan,Matthew D.; Franklin,Christopher Matthew, User interface for integrated spreadsheets and word processing tables.
  209. Moore, James F, Using RSS archives.
  210. Larcheveque,Jean Marie H.; Narendran,Arungundram; Sikchi,Prakash; Levenkov,Alexei; Ardeleanu,Adriana; Shur,Andrey; Catorcini,Alessandro; Selim,Nora S.; Bath,Kamaljit S., Validation of XML data files.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로