$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for managing and enforcing user privacy 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-099/00
출원번호 US-0860605 (2001-05-21)
등록번호 US-7340438 (2008-03-04)
발명자 / 주소
  • Nordman,Ian
  • Alam��ki,Tero
  • V��nsk��,Marko
  • Tarkiainen,Mikko
  • Gyorb��r��,Norbert
  • Gripenberg,Casper
출원인 / 주소
  • Nokia Corporation
대리인 / 주소
    Morgan & Finnegan LLP
인용정보 피인용 횟수 : 117  인용 특허 : 41

초록

A system and method manages and enforces user privacy of user data in a network environment in various manners. The system and method can determine a context for interaction with a party, filter user data to be provided to the party based on the determined context, and transmit the filtered user dat

대표청구항

What is claimed is: 1. A method of managing user privacy of a user operating a user device in a network environment, comprising: communicating with a party via the user device across the network environment; determining a context for interaction between the user via the user device and the party; f

이 특허에 인용된 특허 (41)

  1. Derek L. Davis ; Jean-Charles Korta, Anonymity server.
  2. Domnitz, David, Apparatus and method for delivering information to an individual based on location and/or time.
  3. Goldhaber A. Nathaniel ; Fitts Gary, Attention brokerage.
  4. Proust Philippe,FRX ; Laget Anne,FRX ; Huet Cedric,FRX, Communication system for managing safely and independently a plurality of applications by each user card and corresponding user card and management method.
  5. Beaumont Robert M.,CAX ; Doiron Danny J.,CAX ; Keevill Christopher G.,CAX ; Pomeroy Trenton A.,CAX ; Pond Gerald L.,CAX ; Thorburn Mark L.,CAX ; Drummond Douglas B.,CAX ; Bouchard J. Marc,CAX, Display based marketing message control system and method.
  6. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  7. Casey Daniel S. ; Dykstra Ronald A. ; Forslund ; III Carl V. ; Greenberg Peter C., Furniture system (pathways-spaceframe).
  8. Kaplan Joshua D. (San Francisco CA), Kiosk apparatus and method for point of preview and for compilation of market data.
  9. Gilmour David L. ; Wang Hua-Wen, Method and apparatus for addressing an electronic document for transmission over a network.
  10. Gerace Thomas A., Method and apparatus for determining behavioral profile of a computer user.
  11. Francine G. Grimmer ; John Mark Chapra, Method and apparatus for dynamic discovery of data model allowing customization of consumer applications accessing privacy data.
  12. Gilmour David L. ; Wang Hua-Wen, Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions.
  13. Bro L. William, Method for mediating social and behavioral processes in medicine and business through an interactive telecommunications.
  14. Rosen Michael J. (Arlington MA) Goodenough-Trepagnier Cheryl (Arlington MA), Method for selecting communication devices for non-speaking patients.
  15. Richard, David Andrew, Method of providing dynamic regionally relevant data to a mobile environment.
  16. Epstein Michael A., Method of secure anonymous query by electronic messages transported via a public network and method of response.
  17. Nordman, Ian; Alamaki, Tero; Vanska, Marko; Gyorbiro, Norbert; Gripenberg, Casper; Tarkiainen, Mikko, Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment.
  18. Luchetti Robert J. ; Ackerly Anne C. ; Houda James D. ; Imrich Steven ; Miles Michael E., Modular utilities cover.
  19. Kaplan Joshua D., Network apparatus and method for preview of music products and compilation of market data.
  20. Reed Michael G. ; Syverson Paul F. ; Goldschlag David M., Onion routing network for securely moving data through communication networks.
  21. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  22. O'Flaherty Kenneth W. ; Stellwagen ; Jr. Richard G. ; Walter Todd A. ; Watts Reid M. ; Ramsey David A. ; Veldhuisen Adriaan W. ; Ozden Renda K., Privacy-enhanced database.
  23. Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
  24. Hauser Ralf Ch.,CHX ; Tsudik Gene, Secure anonymous information exchange in a network.
  25. Abadi Martin ; Bharat Krishna ; Marais Johannes, System and method for generating unique passwords.
  26. Adriaan W. Veldhuisen, System and method for managing data privacy in a database management system including a dependently connected privacy data mart.
  27. Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
  28. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  29. Herz Frederick S. M., System for customized electronic identification of desirable objects.
  30. Tso Michael Man-Hak ; Romrell David Alfred ; Gillespie Daniel Joshua, System for distributing electronic information to a targeted group of users.
  31. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
  32. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
  33. Gottsman Edward ; Brody Adam, System, method and article of manufacture for advanced mobile bargain shopping.
  34. Fano Andrew Ernest, System, method and article of manufacture for location-based filtering for shopping agent in the physical world.
  35. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  36. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  37. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  38. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  39. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  40. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  41. Himmelstein, Richard B., Vehicletalk.

이 특허를 인용한 특허 (117)

  1. Costea, Mihai; Ryvkin, Konstantin; Pearson, Malcolm E.; Williams, Roy, Access limited EMM distribution lists.
  2. Ferraro, Eugene F.; Foster, Steven; Pfaff, Kimberly L.; Persichetti, Mary Eileen; Palmer, Briggin A., Anonymous reporting system.
  3. Apotovsky, Boris; Koliadin, Oleksii, Apparatus and data processing systems for accessing an object.
  4. Apotovsky, Boris; Koliadin, Oleksii, Apparatus and data processing systems for accessing an object.
  5. Tatourian, Igor; Wouhaybi, Rita H.; Li, Hong; Kohlenberg, Tobias M., Apparatus and methods for providing recommendations based on environmental data.
  6. Slick, Royce; Matsubayashi, Don; Piazza, Kevin; Dusberger, Dariusz; Iwamoto, Neil, Authenticating a device with a server over a network.
  7. Coletrane, Candice L.; Pagan, William G.; Parker, Adam J., Automated privacy level suggestions for social networking.
  8. Patel, Mukesh K.; Logan, Jonathan A.; Gharaat, Amir H.; Lee, Richard; Hsu, Roger; Poniatowski, Robert; Lee, Anthony P., Automatic updates to a remote control device.
  9. Patel, Mukesh; Logan, Jonathan; Gharaat, Amir; Lee, Richard; Hsu, Roger; Ponjatowski, Robert; Lee, Anthony, Automatic updates to a remote control device.
  10. Dougherty, Jesse M.; Pearson, Malcolm E.; Thomas, Shawn M., Combining communication policies into common rules store.
  11. Roman, Manuel; Segal, Mara Clair; Desai, Dwipal; Rubin, Andrew E., Contextual user interface based on video game playback.
  12. Ramcharran, Ronald, Detecting secure or encrypted tunneling in a computer network.
  13. Ramcharran, Ronald, Detecting secure or encrypted tunneling in a computer network.
  14. Ramcharran, Ronald, Detecting secure or encrypted tunneling in a computer network.
  15. Patel, Mukesh; Logan, Jonathan; Gharaat, Amir; Lee, Richard; Hsu, Roger; Poniatowski, Robert; Lee, Anthony, Determining commands based on detected movements of a remote control device.
  16. Bouzid, Makram; Bonnefoy, David; Picault, Jerome, Distributed user profile.
  17. Jaye, Daniel; Secretan, James Q., Dual blind method and system for attributing activity to a user.
  18. Chow, Richard; Golle, Philippe J. P.; Jakobsson, Bjorn Markus; Staddon, Jessica N., Enterprise password reset.
  19. Zhang, Hao; Kay, Jeffrey B.; Pearson, Malcolm E.; Tribble, Eric D., Establishing secure, mutually authenticated communication credentials.
  20. Zhang, Hao; Kay, Jeffrey B.; Pearson, Malcolm E.; Tribble, Eric D., Establishing secure, mutually authenticated communication credentials.
  21. Gray, Robert; Morris, Anthony, Executable download tracking system.
  22. Gray, Josh Thomas; Jiang, Naiyi, Flow token.
  23. McHugh, Brian; Ramcharran, Ronald; Langsam, Peter J.; Metzger, Timothy C.; Antilley, Dan P.; Deats, Jonathan W., Insider threat correlation tool.
  24. McHugh, Brian; Ramcharran, Ronald; Langsam, Peter J.; Metzger, Timothy C.; Antilley, Dan P.; Deats, Jonathan W., Insider threat correlation tool.
  25. McHugh, Brian; Ramcharran, Ronald; Langsam, Peter J.; Metzger, Timothy C.; Antilley, Dan P.; Deats, Jonathan W., Insider threat correlation tool.
  26. McHugh, Brian; Ramcharran, Ronald; Langsam, Peter J.; Metzger, Timothy C.; Antilley, Dan P.; Deats, Jonathan W., Insider threat correlation tool.
  27. Sorensen, Amanda; Byers, Allan, Insider threat correlation tool.
  28. Sorensen, Amanda; Byers, Allan, Insider threat correlation tool.
  29. Sorensen, Amanda; Byers, Allan, Insider threat correlation tool.
  30. Hastings, Ryan L.; Latta, Stephen G.; Vaught, Benjamin I.; Bennett, Darren, Interaction with virtual objects causing change of legal status.
  31. Macllwaine, John Hamilton; Stan, Patrick; Keshan, Surendra; Carlson, Mark, Merchant configured advertised incentives funded through statement credits.
  32. Pearson, Malcolm Erik; Warman, Leon R., Message data management.
  33. Pearson, Malcolm Erik; Warman, Leon R., Message data management.
  34. Maes, Stephane H., Method and apparatus for personalization and identity management.
  35. Kalavade, Asawaree, Method and apparatus for privacy-safe actionable analytics on mobile data usage.
  36. Kalavade, Asawaree, Method and apparatus for real-time collection of information about application level activity and other user information on a mobile data network.
  37. Kalavade, Asawaree, Method and apparatus for real-time multi-dimensional reporting and analyzing of data on application level activity and other user information on a mobile data network.
  38. Kalavade, Asawaree, Method and apparatus for storing data on application-level activity and other user information to enable real-time multi-dimensional reporting about user of a mobile data network.
  39. Kalavade, Asawaree, Method and apparatus for storing data on application-level activity and other user information to enable real-time multi-dimensional reporting about user of a mobile data network.
  40. Dowlatkhah, Sangar; Shaw, Venson, Method and apparatus for subscriber management.
  41. Dowlatkhah, Sangar; Shaw, Venson, Method and apparatus for subscriber management.
  42. Brandt, William M., Method and system for preventing identity theft in electronic communications.
  43. Lee, Bryant Christopher, Method for human editing of information in search results.
  44. Lee, Bryant Christopher, Method for human ranking of search results.
  45. Moona, Sanjay K.; Welsh, Kevin, Method of assessing an organization's network identity capability.
  46. Yamada, Eiju; Yamada, Kazuhiro; Kamiya, Dai; Onda, Yasushi; Kano, Izua; Murakami, Keiichi, Mobile terminal and program.
  47. Talanjeri Krishna, Prashantha; Ramoutar, Michael; Eames, Darin; Neckaraje, Sunil Kumar; Mangaiahgari, Phani Pavan Kumar; N, Anantha Krishnan, Mobile user interface for security panel.
  48. Patel, Mukesh K.; Logan, Jonathan A.; Gharaat, Amir; Lee, Richard; Hsu, Roger; Poniatowski, Robert; Lee, Anthony P., Multi-function remote control device.
  49. Jones, Jeffrey Dick; Nolan, Sean Patrick; Apacible, Johnson T.; Varadan, Vijay; Guarraci, Brian J.; White, Christopher C., Multiple entity authorization model.
  50. Muller, Samuel; Sommer, Dieter M., Negotiable information access in electronic social networks.
  51. Müller, Samuel; Sommer, Dieter, Negotiable information access in electronic social networks.
  52. Jain, Chandresh K.; Pearson, Malcolm E.; Waddoups, Nathan F.; Costea, Mihai; Tribble, Eric D., Perimeter message filtering with extracted user-specific preferences.
  53. Hastings, Ryan L.; Latta, Stephen G.; Vaught, Benjamin I.; Bennett, Darren, Physical interaction with virtual objects for DRM.
  54. Burger, Douglas Christopher; Lanier, Jaron Zepel; Strauss, Karin, Privacy enhancing personal data brokerage service.
  55. Patel, Mukesh K.; Logan, Jonathan A.; Gharaat, Amir; Lee, Richard; Hsu, Roger; Poniatowski, Robert; Lee, Anthony P., Privacy level indicator.
  56. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  57. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  58. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  59. Mathew, Ashvin Joseph; Vetrivel, Puhazholi; Mutha, Nayana Ramdas; Coco, Joseph Nicholas; Dunn, Melissa W., Profile and consent accrual.
  60. Geisner, Kevin A.; Bennett, Darren; Markovic, Relja; Latta, Stephen G.; McCulloch, Daniel J.; Scott, Jason; Hastings, Ryan L.; Kipman, Alex Aben-Athar; Fuller, Andrew John; Margolis, Jeffrey Neil; Perez, Kathryn Stone; Small, Sheridan Martin, Providing location occupancy analysis via a mixed reality device.
  61. Dougherty, Jesse M.; Pearson, Malcolm E.; Thomas, Shawn M., Reviewing effectiveness of communication rules system.
  62. Chern, Wei-Jhy, Security token destined for multiple or group of service providers.
  63. VonDerheide, James Alan; Dhamodharan, Rajasekaran, Successive offer communications with an offer recipient.
  64. VonDerheide, James Alan; Dhamodharan, Rajasekaran, Successive offer communications with an offer recipient.
  65. Agrawal, Sunil; Poling, Matthew J., System and method for a single request and single response authentication protocol.
  66. Davydov, Alexander; Cugi, Guido; Powell, Matthew, System and method for applying an OMA DRM permission model to JAVA MIDP applications.
  67. Kalavade, Asawaree, System and method for collecting, reporting, and analyzing data on application-level activity and other user information on a mobile data network.
  68. Nair, Rahul; Davis, Marc Eliot; Higgins, Christopher William; King, Simon P, System and method for data privacy in URL based context queries.
  69. Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Saunders, Peter D., System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions.
  70. Mendez, Daniel J.; NG, Mason, System and method for preventing access to data on a compromised remote device.
  71. Mendez, Daniel J.; Ng, Mason, System and method for preventing access to data on a compromised remote device.
  72. Perlman, Jeffrey William; Dempsey, Caroline Grace, System and method for promotion processing and authorization.
  73. Jeon, Jong Hong; Lee, Seung Yun; Lee, Kang Chan; Lee, Won Suk; In, Min Kyo; Kim, Sung Han, System and method for providing device file using device identifier.
  74. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  75. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  76. Saunders, Peter D.; Barnes, Brian T., System and method for secure transactions manageable by a transaction account provider.
  77. Kalavade, Asawaree, System and method for sharing anonymous user profiles with a third party.
  78. Kalavade, Asawaree, System and method for sharing anonymous user profiles with a third party.
  79. Oulahal, Rachid, System for controlled access to information contained in a terminal.
  80. Fordyce, III, Edward W.; Winters, Michelle Eng; Siegel, Kevin Paul; Amaro, Leigh; Byce, Charles Raymond; Savas, Nurtekin; Ciurea, Peter; VonDerheide, James Alan; Salmon, Diane C., Systems and methods for closing the loop between online activities and offline purchases.
  81. Fordyce, III, Edward W.; Winters, Michelle Eng; Siegel, Kevin Paul; Amaro, Leigh; Byce, Charles Raymond; Savas, Nurtekin; VonDerheide, James Alan; Salmon, Diane C., Systems and methods for targeted advertisement delivery.
  82. Scheidelman, Edward, Systems and methods of natural language processing and statistical analysis to identify matching categories.
  83. Winters, Michelle Eng; Griggs, Alfred William; DiGioacchino, Laura; Salmon, Diane C.; Siegel, Kevin Paul; Subramanian, Kaushik; VonDerheide, James Alan; Fordyce, III, Edward W.; Amaro, Leigh, Systems and methods to aggregate demand.
  84. Granville, III, Walter J., Systems and methods to communicate offer options via messaging in real time with processing of payment transaction.
  85. Fordyce, III, Edward W.; Winters, Michelle Eng; Siegel, Kevin Paul; Amaro, Leigh; Byce, Charles Raymond; Savas, Nurtekin, Systems and methods to deliver targeted advertisements to audience.
  86. Fordyce, III, Edward W.; Winters, Michelle Eng; Siegel, Kevin Paul; Amaro, Leigh; Byce, Charles Raymond; Savas, Nurtekin, Systems and methods to deliver targeted advertisements to audience.
  87. Winters, Michelle Eng, Systems and methods to enhance search data with transaction based data.
  88. Winters, Michelle Eng, Systems and methods to enhance search data with transaction based data.
  89. Winters, Michelle Eng, Systems and methods to enhance search data with transaction based data.
  90. Singh, Shantnu; Dreyer, Michael; Ciurea, Peter; VonDerheide, James Alan; Fordyce, III, Edward W., Systems and methods to facilitate loyalty reward transactions.
  91. Winters, Michelle Eng, Systems and methods to identify differences in spending patterns.
  92. Fordyce, III, Edward W.; Amaro, Leigh; Winters, Michelle Eng; Savas, Nurtekin; Byce, Charles Raymond; Hagey, Ryan, Systems and methods to match identifiers.
  93. Fordyce, III, Edward W.; Amaro, Leigh; Winters, Michelle Eng; Savas, Nurtekin; Byce, Charles Raymond; Hagey, Ryan, Systems and methods to match identifiers.
  94. Carlson, Mark; Stan, Patrick, Systems and methods to modify interaction rules during run time.
  95. LeBlanc, Diane; Salmon, Diane C., Systems and methods to optimize media presentations.
  96. LeBlanc, Diane; Salmon, Diane C., Systems and methods to optimize media presentations.
  97. Yoder, Jeanette; Byce, Charles Raymond; Winters, Michelle Eng, Systems and methods to optimize media presentations using a camera.
  98. Spears, Joseph; Carlson, Mark; Stan, Patrick, Systems and methods to process an offer campaign based on ineligibility.
  99. Carlson, Mark; Spears, Joseph; Stan, Patrick, Systems and methods to process referrals in offer campaigns.
  100. Carlson, Mark; Stan, Patrick, Systems and methods to provide and adjust offers.
  101. Norris, Mark; Bodington, Shaun; Stiff, Nicola; Olson, Raymond; Martin, Janet; Woods, Rosann; Carr, John, Systems and methods to provide benefits of account features to account holders.
  102. Fordyce, III, Edward W.; Winters, Michelle Eng; Amaro, Leigh, Systems and methods to provide intelligent analytics to cardholders and merchants.
  103. Yoder, Jeanette; Amaro, Leigh; Hagey, Ryan; Vroom, Derek A.; Bankston, Michael Steven, Systems and methods to provide messages in real-time with transaction processing.
  104. Yoder, Jeanette; Amaro, Leigh; Hagey, Ryan; Vroom, Derek A.; Bankston, Michael Steven, Systems and methods to provide messages in real-time with transaction processing.
  105. Yoder, Jeanette; Amaro, Leigh; Hagey, Ryan; Vroom, Derek A.; Bankston, Michael Steven, Systems and methods to provide messages in real-time with transaction processing.
  106. Clyne, Andrew, Systems and methods to provide offers to travelers.
  107. Clyne, Andrew, Systems and methods to provide offers to travelers.
  108. Yoder, Jeanette; Amaro, Leigh; Hagey, Ryan; Bankston, Michael Steven, Systems and methods to provide real-time offers via a cooperative database.
  109. Yoder, Jeanette; Amaro, Leigh; Hagey, Ryan; Bankston, Michael Steven, Systems and methods to provide real-time offers via a cooperative database.
  110. Carlson, Mark; Stan, Patrick; MacIlwaine, John Hamilton, Systems and methods to reward user interactions.
  111. Bantz, David F.; Gopalakrishnan, Ponani; Gruen, Daniel M.; Herger, Lorraine M.; Lee, Nathan Junsup; Shea, Dennis Gerard; Viveros, Marisa S., Techniques for providing a virtual workspace comprised of a multiplicity of electronic devices.
  112. Bantz,David F.; Gopalakrishnan,Ponani; Gruen,Daniel M.; Herger,Lorraine M.; Lee,Nathan Junsup; Shea,Dennis Gerard; Viveros,Marisa S., Techniques for providing a virtual workspace comprised of a multiplicity of electronic devices.
  113. Novak, Christopher Michael; Liu, James; Latta, Stephen; Andrews, Anton O. A.; Maitlen, Craig R.; Martin, Sheridan, Touch and social cues as inputs into a computer.
  114. Barrett, Melyssa; Winters, Michelle; Amaro, Leigh, Transaction aggregator for closed processing.
  115. Warman, Leon; Pearson, Malcolm E.; Kuznetsov, Andrei; Waddoups, Nathan F.; Tribble, Eric D., Updating configuration information to a perimeter network.
  116. Pompei, Francesco; Lee, Janette H.; Jarboe, Jason N., Wireless transmission of temperature data for a geographic area.
  117. Pompei, Francesco; Lee, Janette H.; Jarboe, Jason N., Wireless transmission of temperature data for a geographic area.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로