$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Edge adapter apparatus and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
출원번호 US-0858309 (2001-05-15)
발명자 / 주소
  • Jungck,Peder J.
  • Najam,Zahid
  • Nguyen,Andrew T.
  • Penke,Ramachandra Rao
출원인 / 주소
  • Cloudshield Technologies, Inc.
대리인 / 주소
    Brinks Hofer Gilson &
인용정보 피인용 횟수 : 96  인용 특허 : 61

초록

An apparatus and method for enhancing the infrastructure of a network such as the Internet is disclosed. A packet interceptor/processor apparatus is coupled with the network so as to be able to intercept and process packets flowing over the network. Further, the apparatus provides external connectiv

대표청구항

We claim: 1. A method of processing a first data packet, transmitted over a network from a source to a first recipient, said first data packet comprising a header layer and an application data layer, and a second data packet transmitted over said network from the first recipient to the source, said

이 특허에 인용된 특허 (61)

  1. Starnes, Darrell J.; Elwahab, Amgad M.; Gabler, Jeffrey R.; Giap, Steven C.; Kothari, Rupali M.; Pronev, Svilen B.; Stewart, Christoher H., Accelerated content delivery over a network using reduced size objects.
  2. Krishnan, P.; Raz, Danny; Sugla, Binay, Adaptive re-ordering of data packet filter rules.
  3. Edmund Colby Munger ; Douglas Charles Schmidt ; Robert Dunham Short, III ; Victor Larson ; Michael Williamson, Agile network protocol for secure communications with assured system availability.
  4. Chow Yen-whei ; Hayes-Roth Frederick A. ; Jacobstein Neil A. ; Manley James E. ; McMahan Christopher B., Automatic retrieval of changed files by a network software agent.
  5. Turner Jonathan S. (St. Louis MO), Bandwidth management and congestion control scheme for multicast ATM networks.
  6. Gupta, Pankaj; Venkatachary, Srinivasan, Compact data structures for pipelined message forwarding lookups.
  7. Mitzenmacher Michael David ; Broder Andrei Zary ; Mogul Jeffrey Clifford, Compression protocol with multiple preset dictionaries.
  8. Beranek Michael J. ; Lita Christian, Content modification of internet web pages for a television class display.
  9. Chopra, Vikram; Desai, Ajay; Iyer, Raghunath; Iyer, Sundar; Jiandani, Moti; Shelat, Ajit; Yadav, Navneet, Control system for high speed rule processors.
  10. Narendran Balakrishnan ; Rangarajan Sampath ; Yajnik Shalini, Data distribution techniques for load-balanced fault-tolerant web access.
  11. George F. Irwin CA, Data packet processing system and method for a router.
  12. Hughes John H., Data processing system having memory controller for supplying current request and next request for access to the shared.
  13. David S. Schneider ; Michael B. Ribet ; Laurence R. Lipstone ; Daniel Jensen, Distributed administration of access to information.
  14. Schneider, David S.; Ribet, Michael B.; Lipstone, Laurence R.; Jensen, Daniel, Distributed administration of access to information.
  15. Unger Jay ; Fuller Glen, Efficient method for compressing, storing, searching and transmitting natural language text.
  16. Huitema Christian, Enhanced domain name service using a most frequently used domain names table and a validity code table.
  17. Sridhar Manickam R. ; Boruchovich Boris ; Sigel Steven ; Louchez Sylvain ; Khan Malik Z. ; Sabin Mary, Enhanced network communication.
  18. Crayford Ian ; Kerstein Denise ; Chow Peter Ka-Fai ; Egbert Chandan ; Runaldue Thomas J., External rules checker interface.
  19. Leighton F. Thomson ; Lewin Daniel M., Global hosting system.
  20. Dutta, Partha P.; Kumar, Mahesh M; Lerner, Michah, High resolution access control.
  21. Hughes, Patrick Alan; Elswick, Paul Blair, Inappropriate site management software.
  22. Lindbo, Sverker; Lothberg, Peter; Vixie, Paul, Internet communication system.
  23. Smallcomb Joseph ; Daniel Ray Allen, Internet upstream request compression.
  24. Bartoldus, Robert William; Bass, Brian Mitchell; Droz, Timothy Lee; Nellenbach, Scott David; Potter, Jr., Kenneth H.; Rovner, Edward Joel, LAN frame copy decision for LAN switches.
  25. Wong, Bruce F., Layer 2 funnel in fan out network device.
  26. Bryant Stewart F. (Redhill GB2) Seaman Michael J. (San Jose CA), Message processing system having separate message receiving and transmitting processors with message processing being di.
  27. Theodore Thomas Herzog ; Jie Chu ; Xi Xu, Method and apparatus for DNS resolution.
  28. Bakke Mark A. (Maple Grove MN) Fiore Edward J. (Ramsey MN), Method and apparatus for accelerated packet forwarding.
  29. Lim Swee B. ; Radia Sanjay R. ; Wong Thomas K., Method and apparatus for client-sensitive name resolution using DNS.
  30. Zhang Shujin ; Sitaraman Aravind ; Lou Shuxian, Method and apparatus for domain name service request resolution.
  31. Cohen Edith ; Krishnamurthy Balachander ; Rexford Jennifer Lynn, Method and apparatus for improving end to end performance of a data network.
  32. Qu, Diheng; Li, Kevin; Boutros, Sami; Fan, Seren; Truong, Steve, Method and apparatus for optimizing firewall processing.
  33. Strentzsch Scott A. ; Donzis Lewis T., Method and apparatus for providing network access control using a domain name system.
  34. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by redirecting query requests.
  35. Ariel Cohen ; Sampath Rangarajan ; Navjot Singh, Method and apparatus for transparently directing requests for web objects to proxy caches.
  36. Skopp Peter ; Vitale Benjamin F. ; Marur Vinod R. ; Tse Clifford S.C. ; Dulai Dharmender S., Method and apparatus to determine user identity and limit access to a communications network.
  37. Chastain, Alicia Anne; Paul, Christopher Joseph; Wendt, David Mark, Method and system for creating mail rules from existing mail.
  38. Colby Steven ; Krawczyk John J. ; Nair Raj Krishnan ; Royce Katherine ; Siegel Kenneth P. ; Stevens Richard C. ; Wasson Scott, Method and system for directing a flow between a client and a server.
  39. Yates David J. ; Heddaya Abdelsalam A. ; Mirdad Sulaiman A., Method and system for distributed caching, prefetching and replication.
  40. Mighdoll Lee S. ; Leak Bruce A. ; Perlman Stephen G. ; Goldman Phillip Y., Method for reducing delivery latency of an image or other secondary information associated with a file.
  41. Xie, Ken; Ke, Yan; Mao, Yuming, Method, apparatus and computer program product for a network firewall.
  42. Scott D. Lincke ; Ronald Marianetti, II ; Jeffrey C. Hawkins, Method, system and apparatus for packet minimized communications.
  43. Dally William J. ; Carvey Philip P. ; Dennison Larry R. ; King P. Allen, Methods and apparatus for event-driven routing.
  44. Tanaka Tetsuya,JPX ; Fukuda Akira,JPX ; Tanuma Hitoshi,JPX, Multiprocessor system shaving processor based idle state detection and method of executing tasks in such a multiprocess.
  45. Elliott Roger A. (Naperville IL) Lindquist Wayne V. (Lisle IL), Reliable local data network arrangement.
  46. Gifford David K., Replica routing.
  47. Rama Mwikalo ; John Ronk ; John Whittington ; Manuel Ricardo Saiz, Router-based domain name system proxy agent using address translation.
  48. Kloth, Axel K., Rule based IP data processing.
  49. Bhattacharya, Partha P.; Kamat, Sanjay D.; Rajan, Rajendran R.; Sarkar, Saswati, Search tree for policy based packet classification in communication networks.
  50. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Secure delivery of information in a network.
  51. Harish N. Mathur, Store-and-forward network switch using an embedded DRAM.
  52. Dutta, Partha P.; Vrsalovic, Dalibor F., System and method for dynamic retrieval loading and deletion of packet rules in a network firewall.
  53. Xie, Ying; Talluri, Madhusudhan K.; Iterum, Skef F.; Shirriff, Kenneth W., System and method for ensuring delivery of a single communication between nodes.
  54. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, System and method for network access control using adaptive proxies.
  55. Dutta, Partha P.; Vidovic, Nino; Vrsalovic, Dalibor F., System and method for network load balancing.
  56. Hu, Lee Chuan; Ros, Jordi; Shen, Calvin; Thorpe, Roger; Tsai, Wei Kang, System for bypassing a server to achieve higher throughput between data network and data storage system.
  57. Packer Robert L., System for managing flow bandwidth utilization at network, transport and application layers in store and forward network.
  58. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Techniques for eliminating redundant access checking by access filters.
  59. Jolitz, Lynne G., Term addressable memory of an accelerator system and method.
  60. Johnson Charles S. ; Shafiq Muhammad, Transaction state broadcast method using a two-stage multicast in a multiple processor cluster.
  61. Lakritz, David, Translation management system.

이 특허를 인용한 특허 (96)

  1. Sturm,Patricia Kay; Ireland,Patrick W.; Wybenga,Jack C., Apparatus and method for distributing forwarding table lookup operations among a plurality of microengines in a high-speed routing node.
  2. Jungck, Peder J., Apparatus and method for domain name resolution.
  3. Najam,Zahid; Jungck,Peder J.; Vu,Macduy T.; Nguyen,Andrew T; Triplett,Gregory Scott, Apparatus and method for interfacing with a high speed bi-directional network.
  4. Hayball,Clive; Bragg,Nigel; Bradley,Gordon; Biddiscombe,Martin; Cable,Julian; Davies,Philip, Apparatus and method for managing internet resource requests.
  5. Wybenga, Jack C.; Sturm, Patricia Kay; Ireland, Patrick W., Apparatus and method for performing security and classification in a multiprocessor router.
  6. Loc, Peter; Leistiko, Tyson; Rainnie, Hedley, Apparatus, method and computer program product for detection of a security breach in a network.
  7. Loc, Peter; Leistiko, Tyson; Rainnie, Hedley, Apparatus, method and computer program product for detection of a security breach in a network.
  8. Loc,Peter; Leistiko,Tyson; Rainnie,Hedley, Apparatus, method and computer program product for detection of a security breach in a network.
  9. Phillips, Steve; Potti, Sunil; Joshi, Praveen; Singhal, Pravin; Anthias, Tefcros; Tripathi, Rahul, Applying quality of service to application messages in network elements.
  10. Patel, Alpesh; Joshi, Praveen, Applying quality of service to application messages in network elements based on roles and status.
  11. Vogel, Jr., Gary Dennis; Saville, Roland; Droms, Ralph; Butaney, Vikas, Automated configuration of network device ports.
  12. Vogel, Jr., Gary Dennis; Saville, Roland; Droms, Ralph; Butaney, Vikas, Automated configuration of network device ports.
  13. Kommula, Sunanda Lakshmi, Canonical name (CNAME) handling for global server load balancing.
  14. Kommula, Sunanda Lakshmi, Canonical name (CNAME) handling for global server load balancing.
  15. Day, Mark Stuart, Centrally-controlled distributed marking of content.
  16. Joshi, Prajakta S., Configurable geographic prefixes for global server load balancing.
  17. Joshi, Prajakta S., Configurable geographic prefixes for global server load balancing.
  18. Joshi, Prajakta S., Configurable geographic prefixes for global server load balancing.
  19. Kleyman,Ilya; Gavrilescu,Alexandru, Controlled relay of media streams across network perimeters.
  20. Kirshnan, Mayilraj; Raghavan, Kollivakkam, Controlling computer program extensions in a network device.
  21. Arai, Masaya; Fujita, Manabu; Watanabe, Ken; Ino, Kensuke, Data communication system and method for preventing packet proliferation in a multi-device link aggregation network.
  22. Joshi, Prajakta S.; Cheung, David Chun Ying, Distributed health check for global server load balancing.
  23. Devarapalli, Sridhar J.; Joshi, Prajakta S., Domain name system security extensions (DNSSEC) for global server load balancing.
  24. Devarapalli, Sridhar J.; Joshi, Prajakta S., Domain name system security extensions (DNSSEC) for global server load balancing.
  25. McAlister, Roy Edward, Fuel injection systems with enhanced corona burst.
  26. Hsu, Ivy Pei-Shan; Cheung, David Chun Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  27. Hsu, Ivy Pei-Shan; Cheung, David Chun-Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  28. Hsu, Ivy Pei-Shan; Cheung, David Chun-Ying; Jalan, Rajkumar Ramniranjan, Global server load balancing.
  29. Kommula, Sunanda L., Global server load balancing.
  30. Kommula, Sunanda L., Global server load balancing.
  31. Kommula, Sunanda Lakshmi; Hsu, Ivy Pei-Shan; Jalan, Rajkumar; Cheung, David Chun Ying, Global server load balancing.
  32. Joshi, Prajakta S., Global server load balancing support for private VIP addresses.
  33. Joshi, Prajakta S., Host-level policies for global server load balancing.
  34. Joshi, Prajakta S., Host-level policies for global server load balancing.
  35. Joshi, Prajakta S., Host-level policies for global server load balancing.
  36. Cross, Matthew E.; Mann, Bruce E., Intercept device for providing content.
  37. Shim, Jae Hee; Yu, Gun Woo; Kim, Sang Hee, Method and apparatus for controlling packet transmission and generating packet billing data on wired and wireless network.
  38. Mowat, J Eric, Method and apparatus for forwarding requests in a cache hierarchy based on user-defined forwarding rules.
  39. Ramarao, Karempudi; Anthias, Jr., Tefcros; Potti, Sunil; Kumar, Sandeep; Cho, Stephen; Chan, Alex Yin-Man; Jin, Yi; Ho, Ricky, Method and apparatus for high-speed processing of structured application messages in a network device.
  40. Ramarao, Karempudi; Anthias, Tefcros; Potti, Sunil; Kumar, Sandeep; Cho, Stephen; Chan, Alex Yiu-Man; Jin, Yi; Ho, Ricky, Method and apparatus for high-speed processing of structured application messages in a network device.
  41. Jennings, Cullen; Oran, David R.; Shankar, Shiva J.; Singh, Vishal Kumar, Method and apparatus for identifying a media path in a network.
  42. Rohrer, Carl F.; Smith, Patrick J.; Secatch, Stacey, Method and apparatus for processing data in an embedded system.
  43. Rothman,Michael A.; Zimmer,Vincent J., Method and apparatus to enhance platform boot efficiency.
  44. Yalovsky, Mark; Clarke, Simon P., Method and system for creating temporary visual indicia.
  45. Dawson, Travis; Evans, Mark, Method and system for detecting and mitigating RTP-based denial of service attacks.
  46. Kommula, Sunanda L., Method and system to clear counters used for statistical tracking for global server load balancing.
  47. Bergenwall, Martin; Zenner, Jan, Method for providing a DNS server address list from a server to a client.
  48. Liskov, Barbara; Carr, John F., Methods and apparatus for redirecting requests for content.
  49. Fan, Wei; Lee, Wenke; Miller, Matthew; Stolfo, Salvatore J., Methods for cost-sensitive modeling for intrusion detection and response.
  50. Eskin, Eleazar; Arnold, Andrew Oliver; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  51. Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore J., Methods of unsupervised anomaly detection using a geometric framework.
  52. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  53. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  54. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  55. Singhal, Rajiv; Wiborg, Christopher, Network based device for providing RFID middleware functionality.
  56. Matthys, Michael; Cheng, Lebin; Fei, Aiguo, Network devices for replacing an advertisement with another advertisement.
  57. Couturier, Russell L.; Chivaluri, Dinkar, Network testing methods and systems.
  58. Schieder, Andreas; Kampmann, Markus; Hartung, Frank; Rembarz, Rene, Node registering method.
  59. Singhal, Pravin; Tran, Luu; Kothambawala, Juzer; Agarwal, Anoop; Raghavan, Vijay, Ordered application message delivery using multiple processors in a network element.
  60. Anthias, Tefcros; Kumar, Sandeep; Ho, Ricky; Rajendran, Saravanakumar, Performing message payload processing functions in a network element on behalf of an application.
  61. Kumar, Sandeep; Anthias, Tefcros; Ho, Ricky; Rajendran, Saravanakumar, Performing message payload processing functions in a network element on behalf of an application.
  62. Bishara, Nafea; Daniel, Tsahi; Melman, David; Arad, Nir, Preventing denial-of-service attacks employing broadcast packets.
  63. Bishara, Nafea; Daniel, Tsahi; Melman, David; Arad, Nir, Preventing denial-of-service attacks employing broadcast packets.
  64. Raja,Nagendra Kumar; Aruunachalam,Lakshmanan, Reducing overhead in reverse proxy servers when processing web pages.
  65. Wu, Michael; Neff, Richard; R. A., Rajesh, Selective distribution of cell based video streams over packet based networks.
  66. Mukherjee, Sarit; Rangarajan, Sampath; Rodriguez, Pablo, Session level technique for improving web browsing performance on low speed links.
  67. Joshi, Prajakta S., Smoothing algorithm for round trip time (RTT) measurements.
  68. Joshi, Prajakta S., Smoothing algorithm for round trip time (RTT) measurements.
  69. Nocera, David C.; Tippur, Chandrashekar; Kasukhela, Bhaskar; Suprina, Darren Richard; Konkimalla, Rajiv, Stateless-agentless system and method of managing data in a computing environment.
  70. Nocera, David; Tippur, Chandrashekar; Kasukhela, Bhaskar; Konkimalla, Rajiv; Suprina, Darren Richard, Stateless-agentless system and method of managing data in a computing environment.
  71. Joshi, Prajakta Suresh; Kommula, Sunanda Lakshmi, Statistical tracking for global server load balancing.
  72. Karasaridis, Anestis; Flavel, Ashley; Miros, James, System and method for content delivery using dynamic region assignment.
  73. Gudov, Nikolay V.; Levashov, Dmitry A., System and method for detection of network attacks.
  74. Gould,Kenneth; Chen,John Anthony, System and method for managing e-mail message traffic.
  75. Jungck, Peder J., System and method for processing packets according to concurrently reconfigurable rules.
  76. Jungck, Peder J., System and method for processing packets according to user specified rules governed by a syntax.
  77. Gudov, Nikolay V.; Levashov, Dmitry A., System and method for reducing false positives during detection of network attacks.
  78. Jacobson, Van; Poduri, Kedar; Kanna, Satish K; Alaettinoglu, Cengiz, System and method for securing route processors against attack.
  79. Singh, Sumeet; Varghese, George; Bonomi, Flavio Giovanni; Chang, Jonathan J., System and method to process data packets in a network using stateful decision trees.
  80. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  81. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., System and methods for adaptive model generation for detecting intrusion in computer systems.
  82. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  83. Stolfo, Salvatore J.; Eskin, Eleazar; Herskop, Shlomo; Bhattacharyya, Manasi, System and methods for detecting malicious email transmission.
  84. Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore J., Systems and methods for adaptive model generation for detecting intrusions in computer systems.
  85. Engel, Yehiel; Ganor, Avraham; Horowitz, Tal; Schnarch, Michael Chaim; Shachar, Yaron; Weiser, Uri Chanan, Systems and methods for efficient handling of data traffic and processing within a processing device.
  86. Engel, Yehiel; Ganor, Avraham; Horowitz, Tal; Schnarch, Michael Chaim; Shachar, Yaron; Weiser, Uri Chanan, Systems and methods for efficient handling of data traffic and processing within a processing device.
  87. Engel, Yehiel; Ganor, Avraham; Horowitz, Tal; Schnarch, Michael Chaim; Shachar, Yaron; Weiser, Uri Chanan, Systems and methods for efficient handling of data traffic and processing within a processing device.
  88. McAlister, Roy Edward, Systems, methods, and devices with enhanced lorentz thrust.
  89. Leary,Matthew J.; Austin,Janet L.; Hallenbeck,George A.; Miller,Trevor E., Test harness for enterprise application integration environment.
  90. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  91. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of network access to an application.
  92. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  93. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  94. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  95. Jungck, Peder J.; Drown, Matthew Donald; Goller, Sean M., Transparent provisioning of services over a network.
  96. Kumar, Sandeep; Ramarao, Karempudi; Jiang, Yuquan; Jin, Yi; Anthias, Tefcros, XML message validation in a network infrastructure element.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로