$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Communication across domains 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
출원번호 US-0419254 (2012-03-13)
등록번호 US-8335929 (2012-12-18)
발명자 / 주소
  • Isaacs, Scott
  • Moore, George
  • Thorpe, Danny
  • Zissimopoulos, Vasileios
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Wolfe-SBMC
인용정보 피인용 횟수 : 1  인용 특허 : 156

초록

Communication across domains is described. In at least one implementation, a determination is made that an amount of data to be communicated via an Iframe exceeds a threshold amount. The data is divided into a plurality of portions that do not exceed the threshold amount. A plurality of messages is

대표청구항

1. A method implemented by one or more computing devices, the method comprising: determining that an amount of data to be communicated via an Iframe, incorporated within a webpage, exceeds a threshold amount that is permitted for communication using a single message;dividing the data into a pluralit

이 특허에 인용된 특허 (156)

  1. Cornelius, Richard D.; Stepniczka, Andreas; Chu, Kevin, Account settlement and financing in an e-commerce environment.
  2. Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
  3. Jerger Michael S. ; Bisset Jeffrey A. ; Sinclair Craig T. ; Toutonghi Michael J., Administering permissions associated with a security zone in a computer system security model.
  4. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  5. Hoshino, Masaaki; Tsunoda, Tomohiro, Advertisement insert apparatus and advertisement insert method, and storage medium.
  6. Kembel, John Albert; Kembel, George Andrew; Kim, Daniel S.; Russell, John; Wobbrock, Jake; Kembel, Geoffrey S.; Kembel, Jeremy L.; Gabbay, Lynn D., Apparatus and method for interacting with internet content via one or more applications that do not include native web browsing navigation control features.
  7. Hind John Raithel ; Lindquist David Bruce ; Nanavati Pratik Biharilal ; Tan Yih-Shin ; Wesley Ajamu Akinwunmi, Applet redirection for controlled access to non-orginating hosts.
  8. Smith,Adam W.; Moore,Anthony J.; Ebbo,David S.; Christensen,Erik B.; Olson,Erik B.; Yeon,Fabio A.; Rajan,Jayanth V.; Ballinger,Keith W.; Vasandani,Manu; Anders,Mark T.; Boulter,Mark A.; Kothari,Nikhi, Application program interface that enables communication for a network software platform.
  9. Shrader, Theodore Jack London; Rich, Bruce Arland; Yarsa, Julianne; Skibbie, Donna, Architecture for dynamic permissions in java.
  10. McCollum Tab ; Jury Thomas W., Assigning security levels to particular documents on a document by document basis in a database.
  11. Hinton,Heather Maria; Vandenwauver,Mark, Authentication and authorization protocol for secure web-based access to a protected resource.
  12. Gallagher,Thomas P., Automated detection of cross site scripting vulnerabilities.
  13. Mansour-Awad, Amany, Automated validation processing and workflow management.
  14. Abboud, Akram; Brantly, John Michael; Buchanan, Jr., William W.; Chin, Peter Gerard; Chu, Simon; Dayan, Richard Alan; Donovan, Peter Thomas; Green, David Michael; Green, Timothy J.; Lange, Thomas Wil, Automatic appliance server re-provision/re-purposing method.
  15. Nigel Edwards GB; Owen Rees GB; Qun Zhong, Browser system.
  16. Underwood, Roy Aaron, Business components framework.
  17. Slaughter, Gregory L.; Saulpaugh, Thomas E.; Duigou, Michael J., Client-specified display services in a distributed computing environment.
  18. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  19. Hailpern Brent Tzion ; Malkin Peter Kenneth ; Schloss Robert Jeffrey ; White Steve R. ; Yu Philip Shi-Lung ; Palmer Charles Campbell, Collaborative server processing of content and meta-information with application to virus checking in a server network.
  20. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  21. Seki Toshibumi (Yokohama JPX), Communication system capable of detecting missed messages.
  22. Stammers,Soren; Band,Jamie A.; Sadler,Andrew P.; Patterson,Andrew J., Component installer permitting interaction among isolated components in accordance with defined rules.
  23. Moran Thomas P. ; van Melle William J. ; Kurtenbach Gordon P.,CAX ; Chiu Patrick, Computer controlled display system using a graphical replay device to control playback of temporal data representing collaborative activities.
  24. Ji Shuang, Computer network malicious code scanner.
  25. Ji Shuang, Computer network malicious code scanner method and apparatus.
  26. Hiraga,Masaki, Contents filtering method, contents filtering apparatus and contents filtering program.
  27. Karger Paul A. (Acton MA), Cross-domain call system in a capability based digital data processing system.
  28. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
  29. Kennelly, Richard J.; Donahue, Peter E.; Farrell, Bernard; Cole, Robert E., Custom administrator views of management objects.
  30. Thomas A. Nolting ; Richard LaPearl ; Karen Dion, Data preparation for traffic track usage measurement.
  31. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  32. Valente, Luis Filipe Pereira; Cooper, Geoffrey Howard; Shaw, Robert Allen; Sherlock, Kieran Gerard, Declarative language for specifying a security policy.
  33. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Declarative permission requests in a computer system.
  34. Vigneaux Stevan ; Wheeler Blair F. ; Mason Philip ; Pierceall Richard M. ; Scott Adrian,GB2 ; Boucher ; Jr. Roland J. ; Morrison William C. ; Hennessy Richard D., Digital multimedia editing and data management system.
  35. Michael S. Jerger ; Jeffrey A. Bisset ; Craig T. Sinclair ; Michael J. Toutonghi, Directional set operations for permission based security in a computer system.
  36. Scanlan Thomas K., Dynamic assignment of security parameters to web pages.
  37. Erickson, Thomas D.; Kellogg, Wendy A.; Malkin, Peter K.; Richards, John T.; Yu, Philip S., Dynamic behavior-based access control system and method.
  38. LaMacchia,Brian A; Kohnfelder,Loren M.; Fee,Gregory Darrell; Toutonghi,Michael J., Evidence-based security policy manager.
  39. David Hitz ; Andrea Borr ; Robert J. Hawley ; Mark Muhlestein ; Joan Pearson, File access control in a multi-protocol file server.
  40. Goud,Gundrala D.; Zimmer,Vincent J., Firmware interfacing with network protocol offload engines to provide fast network booting, system repurposing, system provisioning, system manageability, and disaster recovery.
  41. Lee, Frank; Liang, Jeremy G.; Chen, Eva; Lin, Yi Jing, Identification of undesirable content in responses sent in reply to a user request for content.
  42. Fukuda,Kei; Suzuki,Motoyuki; Osawa,Muneaki; Miura,Kentaro, Information processing apparatus and processing method and program storage medium.
  43. Obayashi, Masayuki; Nobori, Masahiro; Oyama, Masami, Information processing apparatus including storage.
  44. Bloch, Joshua J., Inheritable thread-local storage.
  45. Van Doorn, Leendert Peter, Integrating operating systems and run-time systems.
  46. Lim,Mario; Win,Teresa; Belmonte,Emilio, Integrating user specified extensions into an information access system.
  47. Hoffberg, Steven M., Intelligent electronic appliance system and method.
  48. Wood, David L.; Weschler, Paul; Norton, Derk; Ferris, Chris; Wilson, Yvonne; Soley, William R., Log-on service providing credential level change without loss of session continuity.
  49. Moreh, Jahanshah; Olkin, Terry Michael; Bruns, Logan O'Sullivan; Perrin, Trevor Scott, METHOD AND SYSTEM OF FEDERATED AUTHENTICATION SERVICE FOR INTERACTING BETWEEN AGENT AND CLIENT AND COMMUNICATING WITH OTHER COMPONENTS OF THE SYSTEM TO CHOOSE AN APPROPRIATE MECHANISM FOR THE SUBJECT.
  50. Barnes, Brian C.; Strongin, Geoffrey S.; Schmidt, Rodney W., Memory management system and method for providing physical address based memory access security.
  51. Strongin, Geoffrey S.; Barnes, Brian C.; Schmidt, Rodney W., Memory management system and method providing increased memory access security.
  52. Boutros,Sami; Truong,Steve H., Method and apparatus for adding and updating protocol inspection knowledge to firewall processing during runtime.
  53. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  54. Hayden Peter C. (Mont Vernon NH), Method and apparatus for detecting and executing cross-domain calls in a computer system.
  55. Shore Samuel R. ; Tao Douglas Koji ; Schoolcraft Adelheid Maria ; Bardini Richard A. ; Kutner Michael A. ; Morgan Oliver Frederick, Method and apparatus for displaying in and out points during video editing.
  56. Cohen, William W., Method and apparatus for extracting data from data sources on a network.
  57. Porter Mark A. (Woodside CA) Pawson Dave (Palo Alto CA), Method and apparatus for frame accurate access of digital audio-visual information.
  58. Magee James Michael ; Rawson ; III Freeman Leigh ; Sotomayor ; Jr. Guy Gil, Method and apparatus for management of mapped and unmapped regions of memory in a microkernel data processing system.
  59. Russell William C. (Laguna Hills CA) Kalwitz George A. (Costa Mesa CA) Barrett Lorraine F. (Yorba Linda CA), Method and apparatus for remotely altering programmable firmware stored in an interactive network board coupled to a net.
  60. Christie, David S.; Schmidt, Rodney; Strongin, Geoffrey S., Method and apparatus for storing and retrieving security attributes.
  61. Cooper, Phillip R.; Kohnfelder, Loren M.; Chavez, Roderick A., Method and apparatus for writing a windows application in HTML.
  62. Boezeman John Junior ; Consolatti Scott Michael ; King Dennis Donald, Method and system for a multimedia application development sequence editor using time event specifiers.
  63. Oliver,Jonathan J.; Koblas,David A.; Wilson,Brian K., Method and system for classifying a message based on canonical equivalent of acceptable items included in the message.
  64. Gardner,Jules E.; Gelles,Keith J.; Sloyer,Brian P., Method and system for creating and displaying images including pop-up images on a visual display.
  65. Kalantar, Michael Husayn; Merwah, Rahul Kumar; Tracey, John Michael, Method and system for cross-domain service invocation using a single data handle associated with the stored common data and invocation-specific data.
  66. Schneier,Bruce; Gross,Andrew H.; Callas,Jonathan D., Method and system for dynamic network intrusion monitoring, detection and response.
  67. Bardon, Didier D., Method and system for extending Java applets sand box with public client storage.
  68. Guthrie John, Method and system for inserting code to conditionally incorporate a user interface component in an HTML document.
  69. Hanson, Michael; Miller, Graham; Axe, Brian; Evans, Steven Richard, Method and system for process interaction among a group.
  70. Tock, Theron; Xia, Zeqing, Method and system for providing secure access to private networks.
  71. Zimmer,Vincent J.; Rothman,Michael A.; Li,Shaofan; Fish,Andrew J.; Doran,Mark S., Method and system for rapid repurposing of machines in a clustered, scale-out environment.
  72. Lincke Scott D. ; Marianetti ; II Ronald, Method and system for secure communications.
  73. Trevor Blumenau, Method and system for the discovery of cookies and other client information.
  74. Steele Douglas W. ; Goin Todd M. ; Bryant Craig W., Method for communicating between programming language controlled frames and CGI/HTML controlled frames within the same browser window.
  75. Trifon,Gal, Method for dynamically changing one Web page by another web page.
  76. Eilbott, Seth Aaron; Rodriguez, Jeffrey Edward; Walker, Michael John, Method for prefetching external resources to embedded objects in a markup language data stream.
  77. Laor Raviv, Method of and system for distributing and redeeming electronic coupons.
  78. Kelley, Edward E., Method of controlling web applications from redirecting a client to another web address.
  79. Lajoie,Marie Eve; St Arnaud,Fran챌ois; Baril,Steve; Boivin,Jacques, Method of remotely upgrading firmware in field-deployed devices.
  80. Fletcher,James Corvin; Kaminsky,David Louis; Kessler,Carl Shawn, Method, system and apparatus for selecting encryption levels based on policy profiling.
  81. Buchthal,David Michael; Forschler,Lucas Jason; Gallagher,Thomas Patrick; Loisey,Christophe Rene; Pullen,Walter David; Turski,Andrzej, Method, system, and computer-readable medium for filtering harmful HTML in an electronic document.
  82. Lewallen, Stephen Richard, Method, system, and program for generating a graphical user interface window for an application program.
  83. Pea,Roy D.; Mills,Michael I.; Hoffert,Eric; Rosen,Joseph H.; Dauber,Kenneth, Methods and apparatus for interactive map-based analysis of digital video content.
  84. Howard, Michael; Brown, Don L.; Clark, Quentin J.; Dillingham, Lara N.; Meijer, Ronald; Multerer, Boyd C.; Sellers, Timothy D., Methods and apparatus for synchronizing access control in a web server.
  85. Wilson, Perry W.; Pendergrass, J. Aaron; McDonell, III, C. Durward; Loscocco, Peter A.; Heine, David J.; Lewis, Bessie Y., Methods and system for program execution integrity measurement.
  86. Howard,Michael; Malhotra,Vikas, Methods and systems for screening input strings intended for use by web servers.
  87. Marolia,Sunil; Chia,Teck; Dinh,John D. V.; Soberano,Vincent P.; Hamasaki, Jr.,Glenn; Gustafson,James P.; Pakarinen,Toni; Jacobi,Sidney A., Mobile services network for update of firmware/software in mobile handsets.
  88. Rose, Anthony, Monitoring of computer-related resources and associated methods and systems for disbursing compensation.
  89. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  90. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich; Kothari, Pravin S., Network security monitoring system employing bi-directional communication.
  91. Michael J. Wallent ; Rajeev Dujari ; Anand Ramakrishna ; Loren M. Kohnfelder ; Lewis Geer, Network security zones.
  92. Lewis Robert W. ; Tanner Matthew A. ; Walker Timothy K., Object-oriented computer program, system, and method for developing control schemes for facilities.
  93. Zhu,Min; Wei,Songxiang; Pong,Alfred Lian Fui, On-line conference recording system.
  94. Ott, Donna E., Performance optimization of computer system by dynamically and immediately updating a configuration setting based on detected change in preferred use.
  95. Faden,Glenn, Policy abstraction mechanism.
  96. Karmouch,Ahmed; Gray,Tom; Mankovskii,Serge; Guennoun,Mouheine, Policy representations and mechanisms for the control of software.
  97. Grimm Robert ; Bershad Brian N., Process for transparently enforcing protection domains and access control as well as auditing operations in software components.
  98. Spiegel, Christopher J.; Gafken, Andrew H.; Hale, Robert P.; Stevens, Jr., William A., Protected boot flow.
  99. Aravamudan, Murali; Naqvi, Shamim A, Protecting communications network integrity.
  100. Shetty, Satish, Protocol-level malware scanner.
  101. Slaughter,Gregory L.; Saulpaugh,Thomas E.; Traversat,Bernard A.; Abdelaziz,Mohamed M., Remote function invocation with messaging in a distributed computing environment.
  102. Sankaranarayan, Mukund; Foltz, Forrest C.; Shaw, George; Sather, Dale A.; Raffman, Andy R.; Srinivasan, Jai; Backman, Terje K.; Parry, William G.; Bakin, David S.; Jones, Michael B.; McDowell, Sean C, Resource manager architecture.
  103. Abdelnur, Alejandro; Gupta, Abhay; Callaghan, Brent, Resource sharing on the internet via the HTTP.
  104. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  105. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K; Epling, Jeremiah S.; Sie, Daniel; Gu, Jianrong; Silbey, Marc; Nallathimmayyagari, Vidya; Tepordei, Bogdan, Running internet applications with low rights.
  106. McIlroy M. Douglas (Bernardsville NJ) Reeds James A. (New Providence NJ), Secure file handling in a computer operating system.
  107. Wallace, Jr., Clyde Riley, Secure network user states.
  108. Bond Barry ; Bharati Sudeep, Security enhancement for untrusted executable code.
  109. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  110. Golan Gilad,ILX, Security monitor.
  111. Vernon Ralph Austel ; Paul Ashley Karger ; David Claude Toll, Security policy for protection of files on a storage device.
  112. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  113. Moreh Jahanshah ; Olkin Terry M., Security system for event based middleware.
  114. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing.
  115. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a client proxy.
  116. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
  117. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a key recovery agent.
  118. Magee James Michael ; Rawson ; III Freeman L. ; Youngworth Christopher Dean, Shared memory support method and apparatus for a microkernel data processing system.
  119. Kikinis Dan, Simplified-file hyper text protocol.
  120. Gadi, Guy, Single sign-on for a network system that includes multiple separately-controlled restricted access resources.
  121. Hinton, Heather Maria; Moran, Anthony Scott; Falola, Dolapo Martin; Milman, Ivan Matthew; Wardrop, Patrick Ryan, Specializing support for a federation relationship.
  122. Hartrick Thomas V. (Gaithersburg MD) Higgins Patricia E. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Structured document tags invoking specialized functions.
  123. Touboul Shlomo,ILX ; Gal Nachshon,ILX, System and method for attaching a downloadable security profile to a downloadable.
  124. Duffy, Catherine M.; Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for browser creation and maintenance of forms.
  125. Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for browser definition of workflow documents.
  126. Ptacek, Thomas Henry; Newsham, Timothy Nakula; Friedrichs, Oliver, System and method for building an executable script for performing a network security audit.
  127. Estrada, Julio; Estrada, Miguel A.; Kraenzel, Carl J.; Shore, Maurice B., System and method for client replication of collaboration space.
  128. Brown Ross M. ; Greenberg Richard G., System and method for controlling access to data entities in a computer network.
  129. Jacobs, Lawrence; Liu, Xiang; Nakhoda, Shehzaad; Mishra, Rajiv; Zeng, Zheng; Desai, Sachin, System and method for customizing cached data.
  130. Srivastava,Biplav; Nanavati,Amit A.; Batra,Vishal S; Bhide,Manish A; Kamesam,Pasumarti V, System and method for dynamic exception handling using an external exception handler.
  131. Hamel,Larry, System and method for implementing click-through for browser executed software including ad proxy and proxy cookie caching.
  132. Brender Ronald F. (Hollis NH) Iles Michael V. (Basingstoke GB2), System and method for jacketing cross-domain calls in a multi-code execution and debugging system within a multi-archite.
  133. Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for online/offline uninterrupted updating of rooms in collaboration space.
  134. Touboul Shlomo,ILX, System and method for protecting a computer and a network from hostile downloadables.
  135. Rozman,Allen F; Cioffi,Alfonso J, System and method for protecting a computer system from malicious software.
  136. Snavely, Amy J.; Sjostrom, William M.; Musa, Mark A., System and method for providing a role table GUI via company group.
  137. Goldberg, Motti; Kenyon, Jeffrey D.; Winkel, Edwin K., System and method for retrieving documents responsive to a given user's role and scenario.
  138. Estrada, Julio; Estrada, Miguel A.; Shore, Maurice B., System and method for room decoration and inheritance.
  139. Marianne Mueller ; David Connelly, System and method for securing a program's execution in a network environment.
  140. Dieberger,Andreas; Ponceleon,Dulce Beatriz; Russell,Daniel Martin, System and method for visualizing and navigating content in a graphical user interface.
  141. Thomas Henry Ptacek ; Timothy Nakula Newsham ; Oliver Friedrichs, System and method providing custom attack simulation language for testing networks.
  142. Freund Gregor, System and methodology for managing internet access on a per application basis for client computers connected to the int.
  143. Notani Ranjit N. ; Mayer John E. ; Hilerio Israel, System and process for inter-domain interaction across an inter-domain connectivity plane.
  144. Notani Ranjit N. ; Mayer John E., System and process for inter-domain planning analysis and optimization using model agents as partial replicas of remote.
  145. Bodin William Kress (Boca Raton FL) Hyde David Michael (Boca Raton FL) Lay Tatchi Placido (Boca Raton FL) Wilkinson James (Southampton GBX) Yee Susan (Coral Springs FL), System for locking down part of portion of memory and updating page directory with entry corresponding to part of portio.
  146. Wakayama, Toshihiro, System for managing networked information contents.
  147. Weber,Michael D.; Shah,Viren R.; Ren,Chuangang, Systems and methods for detecting software security vulnerabilities.
  148. Green,Jeffrey; Gartside,Paul N; Bolin,Chris, Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient.
  149. Kikinis, Dan, Tailoring data and transmission protocol for efficient interactive data transactions over wide-area networks.
  150. Mason, Carlton Keith, Test programs for enterprise web applications.
  151. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  152. Bender,Michael S.; Stoltz,Benjamin H., Using token-based signing to install unsigned binaries.
  153. Moore, Anthony J.; Warren, Susan M.; Guthrie, Scott D.; Isaac, Steven A., Web controls validation.
  154. Moore,Anthony J.; Warren,Susan M.; Guthrie,Scott D.; Isaac,Steven A., Web controls validation.
  155. Haverstock, Paul; Estrada, Miguel; Estrada, Julio, Web server enabling browser access to HTML and Non-HTML documents.
  156. Angert Joseph C., pad encryption method and software.

이 특허를 인용한 특허 (1)

  1. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로