$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and process for limiting distribution of information on a communication network based on geographic location 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • G06F-013/00
출원번호 UP-0647635 (1999-03-30)
등록번호 US-7792297 (2010-09-27)
국제출원번호 PCT/US1999/006943 (1999-03-30)
§371/§102 date 20000928 (20000928)
국제공개번호 WO99/051038 (1999-10-07)
발명자 / 주소
  • Piccionelli, Greg A.
  • Rittmaster, Ted R.
인용정보 피인용 횟수 : 111  인용 특허 : 57

초록

A communications system includes a plurality of recipient processors located at geographically remote locations with respect to each other and connected for communication with an information provider processor, over the communications network. The provider and recipient processors may comprise respe

대표청구항

What is claimed is: 1. A method for communicating text or image information between a plurality of first computers and a second computer coupled to a communications network dependent on geographic locations of the first computers, the method comprising: receiving, at the second computer, a request

이 특허에 인용된 특허 (57)

  1. Fahn Paul N. (Redwood City CA) Kaliski ; Jr. Burton S. (San Carlos CA) Robshaw Matthew J. B. (San Francisco CA) Fahn Paul N. (Redwood City CA), Abuse-resistant object distribution system and method.
  2. Moon Billy G. ; Baratt Manon, Apparatus and method for automatically configuring settings of a software application in a portable intelligent communications device.
  3. Schipper John F. (Palo Alto CA), Automatic cellular phone tracking.
  4. Oshizawa Hidekazu, Automobile navigation system using remote download of data.
  5. Hidary Murray, Cellular telephone advertising system.
  6. Dennison Everett ; Nass Edwin L. ; Duffy Timothy J. ; Pauley Gregory T. ; Jones Scott L. ; Shale Deborah J., Cellular telephone system that uses position of a mobile unit to make call management decisions.
  7. Hickman Paul L. (27140 Moody Rd. Los Altos Hills CA 94022) Stephens Lawrence K. (1250 Mildred Ave. San Jose CA 95125), Communication configurator and method for implementing same.
  8. John E. Boyd, Electronic advertising device and method of using the same.
  9. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  10. Bednarek Robert A. ; Rubin Philip A., GPS TV set top box with regional restrictions.
  11. Gehani Narain H. ; Roome William D. ; Trapp Richard James, Geo-enabled personal information manager.
  12. Murphy Michael ; Woo Arthur N. ; Nichols Mark ; Schipper John, Geographical position/image digital recording and display system.
  13. Bickley Robert H. (Paradise Valley AZ) Moy Leland L. (Scottsdale AZ) Yee David M. (Scottsdale AZ) Keller Theodore W. (Scottsdale AZ) Sikorski Roy W. (Scottsdale AZ), Global positioning system communications multi-interface.
  14. Beliveau Andre (Laval CAX), Individually defined personal home area for subscribers in a cellular telecommunications network.
  15. Kitano Hiroaki,JPX ; Rekimoto Junichi,JPX, Information retrieval apparatus and method.
  16. Tsumura Tomoki,JPX, Information service processor.
  17. Heron Craig,CAX, Integrated vehicle navigation, communications and entertainment system.
  18. Carpenter Mark Alan ; Lection David Bruce ; Molander Mark Edward, Location motion sensitive user interface.
  19. Sagers Richard C. (Fort Worth TX) Werner William D. (Coral Springs FL) Hall Scott M. (Fort Worth TX) Heinzelmann David W. (Bedford TX), Location-based adaptive radio control.
  20. Koss, Michael C., Location-based web browsing.
  21. Teare Melvin J. (Framingham MA) Walker Stephen S. (Marlborough MA), Location-sensitive remote database access control.
  22. Murray Bradley Arlice ; Cheraso Gregory Paul, Method and apparatus for adjusting a communication strategy in a radio communication system using location.
  23. MacDoran Peter F. ; Mathews Michael B. ; Ziel Fred A. ; Gold Kenn L. ; Anderson Steven M. ; Coffey Mark A. ; Denning Dorothy E., Method and apparatus for authenticating the location of remote users of networked computing systems.
  24. France Peter Glen,NZX ; Perreault Paul D., Method and apparatus for automated differential GPS processing.
  25. Rosen Kenneth H. ; Salimando Steven Charles, Method and apparatus for delivering local information to travelers.
  26. Hill Thomas Casey ; Olson Bernard Carl ; Neville George Brooke ; Appel Mark Jordan ; Cannon Gregory Lewis, Method and apparatus for geographic based control in a communication system.
  27. Stewart Brett B., Method and apparatus for geographic-based communications service.
  28. Fan Rodric C. ; Mufti Amin A., Method and structure for distribution of travel information using network.
  29. Goertzel Mario C. ; Strom Susi E. ; Garg Praerit ; Shah Bharat, Method and system of security location discrimination.
  30. Theimer Marvin M. (Mountain View CA) Spreitzer Michael J. (Tracy CA) Weiser Mark D. (Palo Alto CA) Goldstein Richard J. (San Francisco CA) Elrod Scott A. (Redwood City CA) Swinehart Daniel C. (Palo A, Method for granting a user request having locational and contextual attributes consistent with user policies for devices.
  31. Grube Gary W. (Palatine IL) Naddell Marc C. (Schaumburg IL) Shaughnessy Mark L. (Algonquin IL), Method for providing alternate communication services based on geographic location.
  32. Grube Gary W. ; Naddell Marc C. ; Shaughnessy Mark L., Method for providing communication services based on geographic location.
  33. Linsk Steven J., Method for providing customized Web information based on attributes of the requester.
  34. Grube Gary W. (Palatine IL) Naddell Marc C. (Schaumburg IL) Shaughnessy Mark L. (Algonquin IL), Method for providing geographic dependent instructions to a user of a communications unit.
  35. Merriman Dwight Allen ; O'Connor Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  36. Soichi Kuwahara JP; Keiki Nishihara JP, Mobile communication terminal capable of executing location-related services.
  37. Cohen Eyal, Mobile display system.
  38. Obradovich Michael L. ; Pirtle John ; Dusek Corena, Personal communication and positioning system.
  39. Steiner Glenn C. (Los Altos CA) Banta Lloyd H. (Palo Alto CA) Trask Matthew M. (San Jose CA), Personal digital location assistant including a memory cartridge, a GPS smart antenna and a personal computing device.
  40. Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan ; Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Dev Roger ; Ibe Oliver ; Aggarwal Ajay ; Wohlers Todd, Policy management and conflict resolution in computer networks.
  41. Dussell William O. ; Janky James M. ; Schipper John F. ; Cowl David J., Position based personal digital assistant.
  42. Laurance Joel E. (Gaithersburg MD) Stewart Walter M. (Potomac MD), Satellite communication system and method with message authentication suitable for use in financial institutions.
  43. Tsukidate Ryota,JPX ; Takeuchi Yoshiyasu,JPX ; Machida Kazuhiro,JPX ; Harada Takenosuke,JPX ; Kaneko Shigeki,JPX ; Fujita Kenichi,JPX ; Goto Yoshimasa,JPX, Service supply apparatus for supplying a service of a broadcasting program with attribute information of the program.
  44. Landgren Patricia A., System and method for appending location information to a communication sent from a mobile terminal operating in a wireless communication system to an internet server.
  45. Shimada Kazutoshi,JPX, System and method for controlling access to subject data using location data associated with the subject data and a requ.
  46. Rouhollahzadeh Bagher ; Bhatia Ranjit, System and method for location-based marketing to mobile stations within a cellular network.
  47. Glick,Barry J.; Karpf,Ronald S.; Seiler,Mark E., System and method for using location identity to control access to digital information.
  48. Bouve W. Lincoln (Milton MA) Semple William T. (Arlington VA) Oxman Steven W. (Riva MD), System and methods for remotely accessing a selected group of items of interest from a database.
  49. Piccionelli Gregory A. ; Rittmaster Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
  50. Stewart Brett B., System for hybrid wired and wireless geographic-based communications service.
  51. Smith Benjamin Hewitt ; Smith Fred Hewitt, System for installing information related to a software application to a remote computer over a network.
  52. Fano Andrew Ernest, System, method and article of manufacture for location-based filtering for shopping agent in the physical world.
  53. Berger David A. ; Weber Jay C. ; Kramer Glenn A., System, method and article of manufacture for processing a plurality of transactions from a single initiation point on a.
  54. Bednarek Robert A. (Washington DC) Rubin Philip A. (Washington DC), TV set top box using GPS.
  55. Richard John Titmuss GB; Katherin Margaret Allen GB; Caroline Anne Michele Lebre GB; Robert Peter Moore GB, Telecommunications apparatus and method.
  56. Loomis Peter Van Wyck (Sunnyvale CA) Jones ; Jr. James E. (San Jose CA), Time and/or location tagging of an event.
  57. Loban Jerry M. (Grapevine TX) Ryng Henry D. (Phoenix AZ), Video billboard.

이 특허를 인용한 특허 (111)

  1. Dabbiere, Alan, Advanced authentication techniques.
  2. Bennett, James D.; Winslade, Christopher C., Advertising system supporting dual input interfaces.
  3. Phanse, Shruti; Kumar, Bhavesh Krishna, Anonymized application scanning for mobile devices.
  4. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  5. Stuntebeck, Erich, Application program as key for authorizing access to resources.
  6. Brannon, Jonathan Blake, Attempted security breach remediation.
  7. Marshall, John; Sorensen, Christian Blake, Attendance tracking via device presence.
  8. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  9. Stuntebeck, Erich Peter; Tse, Kar Fai; Lu, Chen; Xuan, Chaoting, Authenticator device facilitating file security.
  10. Dabbiere, David, Autonomous device interaction.
  11. Bennett, James D.; Winslade, Christopher C., Centralized, online multi-seller interface system.
  12. Bennett, James D.; Winslade, Christopher C., Centralized, online multi-seller interface system.
  13. Dabbiere, Alan; Stuntebeck, Erich, Certificate based profile confirmation.
  14. Stuntebeck, Erich, Controlling access to resources on a network.
  15. Marshall, John; Rykowski, Adam; Stuntebeck, Erich; Halebeed, Jyothiprakash, Controlling distribution of resources in a network.
  16. Marshall, John; Stuntebeck, Erich; Jayaprakash, Gopinath; Manton, John Joseph; Brannon, Jonathan Blake, Controlling distribution of resources on a network.
  17. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a network environment.
  18. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  19. Tse, Kar Fai, Controlling physical access to secure areas via client devices in a networked environment.
  20. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  21. Reagan, Spencer Gibson; Manton, John Joseph, Controlling resources used by computing devices.
  22. Herz, William S., Coordinate-based set top box policy enforcement system, method and computer program product.
  23. Stuntebeck, Erich, Data access sharing.
  24. Stuntebeck, Erich, Data access sharing.
  25. Redlich, Ron M.; Nemzow, Martin A., Data security system and with territorial, geographic and triggering event protocol.
  26. Manton, John Joseph, Delegating authorization to applications on a client device in a networked environment.
  27. Manton, John Joseph; Kommireddy, Sridhara Babu; Rykowski, Adam Stephen, Delegating authorization to applications on a client device in a networked environment.
  28. Dabbiere, Alan, Device management macros.
  29. Dabbiere, Alan; Stuntebeck, Erich, Distribution of variably secure resources in a networked environment.
  30. Appelman, Barry; Buonviri, Terry Christian; Buonviri, Joseph Paul; Erickson, Andrew Ivar; Jarmolowski, Thomas; Weltman, Robert Eugene, Dynamic identification of other users to an online user.
  31. Appelman, Barry; Erickson, Andrew Ivar; Lu, Larry L.; Weltman, Robert Eugene, Dynamic location of a subordinate user.
  32. Ortiz, Luis M.; Lopez, Kermit D., Electronic wireless hand held multimedia device.
  33. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  34. Pelkey, Joshua Grey, Enforcement of proximity based policies.
  35. Marshall, John, Enterprise-specific functionality watermarking and management.
  36. Marshall, John, Enterprise-specific functionality watermarking and management.
  37. Marshall, John, Enterprise-specific functionality watermarking and management.
  38. Stuntebeck, Erich, Facial capture managing access to resources by a device.
  39. Koren, Amit; Larrain, Francisco; Koshy, Tanya; Kaushik, Karan; Zilleruelo, Ricardo; Arenas, Matias; Kochar, Kavita; Wooten, Stephen, Fine print builder.
  40. Marshall, John, Functionality watermarking and management.
  41. Marshall, John, Functionality watermarking and management.
  42. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  43. Marshall, John; Stuntebeck, Erich, Functionality watermarking and management.
  44. Bennett, James D.; Winslade, Christopher C., Geographical and dispensing limits for E-promotions.
  45. Girdhar, Dhiraj; Meehan, Kevin; Peck, Brian Christopher; Shah, Dhara, Geographically based access management for internet of things device data.
  46. Girdhar, Dhiraj; Meehan, Kevin; Peck, Brian Christopher; Shah, Dhara, Geographically based access management for internet of things device data.
  47. DiRico, John; Stuntebeck, Erich, Individual-specific content management.
  48. Phanse, Shruti; Kumar, Bhavesh Krishna, Integrated application scanning and mobile enterprise computing management system.
  49. Linden, Thomas; Stults, George; Reams, Gerry; Cattin, Gerard, Location-aware configuration.
  50. Linden, Thomas; Stults, George; Reams, Gerry; Cattin, Gerard, Location-aware configuration.
  51. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Location-based configuration policy toggling.
  52. Gum, Arnold Jason, Location-based system permissions and adjustments at an electronic device.
  53. Genc-Kaya, Latife; Lai, Kamson; Wicha, Francisco Jose Larrain; L'Huillier, Gaston, Method and apparatus for determining promotion pricing parameters.
  54. Aggarwal, Neerav, Method and apparatus for location-based digital rights management.
  55. Koshy, Tanya; Arenas, Matias; L'Huillier, Gaston; Larrain, Francisco; Kaplan, Lori E.; Zilleruelo, Ricardo; Kochar, Kavita; Koren, Amit; Wooten, Stephen; Kaushik, Karan; Scholl, Nathaniel B.; Harris, Seth; Crawford, Jason A.; Duenas, Rodrigo; Genc-Kaya, Latife; Lai, Kamson; Eyal, Aviv; Misra, Deepika; Corominas, Natalia; Nkengla, Mechie; Van Orden, Mathew, Method, apparatus, and computer readable medium for providing a self-service interface.
  56. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  57. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  58. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  59. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  60. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  61. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  62. DeWeese, William; Brannon, Jonathan Blake; Stuntebeck, Erich, Multi-persona devices and management.
  63. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  64. Stuntebeck, Erich; Brannon, Jonathan Blake, On-demand security policy activation.
  65. Scholl, Nathaniel Blake; Crawford, Jason; Puckett, Joshua, Online ordering for in-shop service.
  66. Dabbiere, David, Peripheral device management.
  67. Dabbiere, David, Peripheral device management.
  68. Das, Sudeep; Sharma, Pramod; Vashisth, Sumant, Premises aware security.
  69. Bennett, James D.; Winslade, Christopher C., Promotion system supporting emailed promotions and at seller premises transaction completion.
  70. Bennett, James D.; Winslade, Christopher C., Promotion system supporting emailed promotions and at seller premises transaction completion.
  71. Marshall, John; DeWeese, William, Resource watermarking and management.
  72. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  73. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  74. Brannon, Jonathan Blake; Sorensen, Christian Blake, Rights management services integration with mobile device management.
  75. Bennett, James D.; Winslade, Christopher C., Sales channel management infrastructure.
  76. Bennett, James D.; Winslade, Christopher C., Sales promotion system supporting a plurality of sellers.
  77. DeWeese, William; Stuntebeck, Erich, Secondary device as key for authorizing access to resources.
  78. Marshall, John; Stuntebeck, Erich; Sorensen, Blake, Secure application leveraging of web filter proxy services.
  79. Bennett, James D.; Winslade, Christopher C., Seller promotion creation and modification.
  80. Marshall, John; DeWeese, William, Shared resource watermarking and management.
  81. Sorensen, Christian Blake, Social media and data sharing controls for data security purposes.
  82. Herz, William S., System and method for performing visual data post-processing based on information related to frequency response pre-processing.
  83. Krishnamurthy, Balachander, System and method of processing database queries.
  84. Krishnamurthy, Balachander, System and method of processing database queries.
  85. Mason, Andrew, System and methods for discount retailing.
  86. Mason, Andrew, System and methods for discount retailing.
  87. Mason, Andrew, System and methods for discount retailing.
  88. Mason, Andrew; Chennavasin, Don A.; Gupta, Suneel; Jesse, David; Keintz, Brett R.; Lerner, Yishai; Shah, Mihir; Stolte, Brian M., System and methods for providing location based discount retailing.
  89. Piccionelli, Gregory A.; Rittmaster, Ted R., System and process for limiting distribution of information on a communication network based on geographic location.
  90. Bennett, James D.; Winslade, Christopher C., System supporting promotion browsing and searching.
  91. Bennett, James D.; Winslade, Christopher C., System supporting seller's promotion creation.
  92. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  93. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  94. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  95. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  96. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  97. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathan Blake, Systems and methods for controlling email access.
  98. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  99. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  100. Dabbiere, Alan; Stuntebeck, Erich; Brannon, Jonathon Blake, Systems and methods for controlling email access.
  101. Stuntebeck, Erich, Systems and methods for controlling email access.
  102. Stuntebeck, Erich, Systems and methods for controlling email access.
  103. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  104. Stuntebeck, Erich; Dabbiere, David, Systems and methods for controlling email access.
  105. Stuntebeck, Erich; Burnett, Michelle, Systems and methods for controlling network access.
  106. Sahai, Anant, Systems and methods for facilitating transactions in accordance with a region requirement.
  107. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration policy toggling.
  108. Dabbiere, Alan; Marshall, John; Stuntebeck, Erich, Time-based configuration profile toggling.
  109. Dabbiere, Alan; Stuntebeck, Erich, Watermarking detection and management.
  110. Bennett, James D.; Winslade, Christopher C., Web search and promotion search engine integration.
  111. Ortiz, Luis M.; Lopez, Kermit D., Wireless transmission of sports venue-based data including video to hand held devices.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로