$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Protected computing environment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
  • G06F-021/10
  • G06F-021/57
  • H04L-009/32
출원번호 US-0390505 (2009-02-23)
등록번호 US-9189605 (2015-11-17)
발명자 / 주소
  • Barde, Sumedh N.
  • Schwartz, Jonathan D.
  • Kuhn, Reid Joseph
  • Grigorovitch, Alexandre Vicktorovich
  • Debique, Kirt A.
  • Knowlton, Chadd B.
  • Alkove, James M.
  • Dunbar, Geoffrey T.
  • Grier, Michael J.
  • Ma, Ming
  • Upadhyay, Chaitanya D.
  • Sherwani, Adil Ahmed
  • Kishan, Arun Upadhyaya
출원인 / 주소
  • Microsoft Technology Licensing, LLC
대리인 / 주소
    Drakos, Kate
인용정보 피인용 횟수 : 0  인용 특허 : 337

초록

A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the s

대표청구항

1. A method of loading a plurality of kernel components to create a secure computing environment within a computing device, the method comprising: loading, by a kernel loader of the plurality of kernel components of a kernel of an operating system of the computing device, a protected environment (“P

이 특허에 인용된 특허 (337)

  1. Outram John D. (Taylor\s Lane Bosham ; Chichester W. Sussex GB2 P018 8QQ) Outram Richard G. (Clarence Street Darmouth Devon GB2 TQ6 9NW), Adaptive data logger.
  2. Blair,Paul; Hansen,Kurt L.; Seifert,Dean, Airline ticket payment and reservation system and methods.
  3. Brosh Scott (Arlington TX) Wright Timothy (Lake Dallas TX), Anti-counterfeiting process using lenticular optics and color masking.
  4. Mansell,David Hennah; Nonweiler,Michael Robert; Middleton,Peter Guy, Apparatus and method for controlling access to a memory.
  5. Ezaki Tadashi,JPX ; Hirai Jun,JPX, Apparatus and method for effectively inhibiting unauthorized copying of picture signals which does not interfere with an authorized display thereof.
  6. Huddleston Paul M. (Stone Mountain GA) Porter ; Jr. G. Burns (Doraville GA) Rooney David T. (Marietta GA), Apparatus and method for monitoring an energy management system.
  7. Chou Wayne W. ; Elteto Laszlo ; Kulinets Joseph M. ; LaRussa Joseph, Apparatus and method for preventing theft of computer devices.
  8. Robert J. Gray, Apparatus and method for providing and authentication system.
  9. Muratani Hirofumi,JPX ; Muto Akihiro,JPX, Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use.
  10. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  11. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  12. Anselm Anthony C., Apparatus for affixing a strain wire into the wiring of flexible electric conduit.
  13. Russ, Samuel H.; Gaul, Michael A.; Wasilewski, Anthony J.; Pinder, Howard G., Apparatus for entitling and transmitting service instances to remote client devices.
  14. Lem Paulus M. (Wilnis NLX), Apparatus for monitoring the replay of audio/video information carriers.
  15. Robert D. Cassagnol ; Douglas M. Dillon ; David S. Kloper ; Sandra J. Weber ; Brandon E. Bautz, Apparatus for providing a secure processing environment.
  16. Takeda Masaru (Saitama JPX), Apparatus for transferring information between different window systems.
  17. Lacombe,John; Galloway,Jeffery L.; Majni,Tim, Application-level software watchdog timer.
  18. Hofsss Michael (Vaihingen/Enz DEX) Nitschke Werner (Ditzingen DEX) Schweren Harald (Korntal-Mnchingen DEX) Angerbauer Margit (Stuttgart DEX), Arrangement for testing a watchdog circuit.
  19. Berson William ; Bernobich Elizabeth ; Heiden Richard W. ; Potoczek Richard A. ; Sisson Robert W. ; Violante Anthony F., Auditable security system for the generation of cryptographically protected digital data.
  20. Parsons,Donald; Edwards,Judith; McCoy,Donald; Block,James, Automated banking machine component authentication system and method.
  21. Harris,Walter; Zajkowski,Timothy, Automated banking machine key loading system and method.
  22. Lockwood Lawrence B., Automatic business and financial transaction processing system.
  23. Sherwani, Adil A.; Punniamoorthy, Pranavakumar; Deshpande, Rajesh A; Rambhia, Avni H.; Kuhn, Reid J.; Van Dyke, Clifford P., Automatic update of computer-readable components to support a trusted environment.
  24. Chronister Clyde H. (6115 Bermuda Dunes Houston TX 77069), Ball valve having replaceable seals under full service pressure.
  25. Frank, Alexander, Binding a device to a computer.
  26. Arai Yoshinori,JPX ; Suzuki Masakazu,JPX, CT scanning apparatus.
  27. Jankowitz Charles M. ; Matula Valentine C. ; Munson Gary A. ; Wu Fang, Call handling method for credit and fraud management.
  28. Ahdout, Isaac; Hall, Martin H.; Xu, Zhangwei, Changing product behavior in accordance with license.
  29. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  30. Norskog, Allen C., Combined pointing device and bar code scanner.
  31. Farris Robert D. ; McDermott Christine D., Common channel signaling event detection and control.
  32. Proudler,Graeme John; Chan,David, Communications between modules of a computing apparatus.
  33. Venners Howard W. (Indianapolis IN) Beyers Jr. Billy W. (Greenfield IN) Hailey James E. (Indianapolis IN), Component audio/video system with timed control of plural peripheral devices.
  34. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  35. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  36. Curry Ian,CAX ; Van Oorschot Paul C.,CAX, Computer security system and method with on demand publishing of certificate revocation lists.
  37. Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
  38. Angelo, Michael F.; Wisecup, George David; Collins, David L., Computer system having security features for authenticating different components.
  39. Griffin,Jonathan, Computer system operable to revert to a trusted state.
  40. Challener,David Carroll; Goodman,Steven Dale; Reinberg,Kevin Michael; Springfield,Randall Scott; Ward,James Peter, Computer system with selectively available immutable boot block code.
  41. Yasuhiro Ishibashi JP, Computer system, and video decoder used in the system.
  42. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  43. Sullivan Robert R. ; Acken John M. ; Aucsmith David W., Conditional access and content security method.
  44. Auerbach,Alan B.; Murphy,Shawn M.; Smith,Walter R, Configurable collection of computer related metric data.
  45. Candelore,Brant L., Content distribution for multiple digital rights management.
  46. Okamoto,Ryuichi; Tokuda,Katsumi; Miura,Kouji, Content usage management system and server used in the system.
  47. Thomas Schmidt DE; Karl-Heinz Knobl DE, Control circuit for a microcontroller.
  48. Sprong Katherine A. ; Sprong Donald J., Controlled usage software.
  49. Havens, Darryl E.; Kishan, Arun U.; Ward, Richard B., Creating secure process objects.
  50. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  51. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  52. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Kern, Eric Richard; Springfield, Randall Scott, Data processing system and method for password protecting a boot device.
  53. Horning Randall (Longmont CO), Data protection system using different levels of reserve power to maintain data in volatile memories for any period of t.
  54. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  55. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  56. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  57. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  58. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  59. Frank,Alexander; Phillips,Thomas G.; Reilly,George V., Delicate metering of computer usage.
  60. Cutter, Jr.,Benjamin Brooks; Strom,Clifford Paul; Evans,Brian Patrick; Jain,Amit; Siu,Michael Yui Kwan, Device certificate self-individualization.
  61. Garg, Rahul; Mittal, Parul Alok; Modani, Natwar, Differential rewards with dynamic user profiling.
  62. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  63. Miller,Eric, Digital rights management negotiation for streaming media over a network.
  64. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  65. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  66. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  67. Anderson David B. ; Gaertner Mark A. ; Forehand Monty A. ; Norman ; Jr. Robert W., Disc storage system having a non-volatile cache to store write data in the event of a power failure.
  68. Lasker Jeffrey M. (Marlboro MA) McGillis James M. (Franklin MA), Disk controller with volatile and non-volatile cache memories.
  69. Browning Luke Matthew ; Cremel Olivier Alain Denis ; Peek Jeffrey Scott, Efficient forking of a process.
  70. Germer Warren R. (Dover NH) Balch Richard A. (Rochester NH), Electric meter with electronic rolling demand register.
  71. Bode Hans-Joergen (Mnchen DEX) Lueders Klaus (Markt Schwaben DEX), Electronic component with a shift register test architecture (boundary scan).
  72. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  73. Dvorkis Paul (Stony Brook NY) Thomas Ralph (East Patchogve NY) Goren David (Ronkonkoma NY) Fuller Robert (Pataskala OH) Goldner Leonard H. (Cold Spring Harbor NY), Electronic stylus type optical reader.
  74. Campbell William C. (Longmont CO) Blair Barry O. (Lafayette CO), Electronic system with variable threshold power failure signaling.
  75. Keiichi Iwamura JP, Electronic watermark system electronic information distribution system and image filing apparatus.
  76. Zhang, Minda; Mehta, Pranav H., Enabling secure communications with a client.
  77. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  78. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  79. Matsuzaki Natsume,JPX ; Harada Syunji,JPX ; Tatebayashi Makoto,JPX, Encryption apparatus for ensuring security in communication between devices.
  80. Lieblich,Jason; Norman,Dustin, End user risk management.
  81. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  82. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  83. Westerinen, William J.; Carpenter, Todd L.; Frank, Alexander; Schmidt, Shon; Drake, Stephen Richard; Foster, David James; Yu, Tse-Ching James, Enhanced packaging for PC security.
  84. Wade Jack (La Jolla CA) Szaroletta William K. (Des Moines IA) Madden Thomas R. (San Diego CA), Enhanced security system for computing devices.
  85. Marsh,David J, Enhancing smart card usage for associating media content with households.
  86. Smith Sean William ; Weingart Steve Harris, Establishing and employing the provable untampered state of a device.
  87. Yang,Ming Hsuan, Face recognition using kernel fisherfaces.
  88. Lebizay Gerald (Vence NY FRX) Lien Yeong-Chang (Briarcliff Manor NY) Taso Michael M. (Yorktown Heights NY), Fault tolerant switch with selectable operating modes.
  89. Storey Thomas W., Fully integrated, on-line interactive frequency and award redemption program.
  90. Becker Seth P. ; Becker Paul J. ; Becker Scott E. ; Lombardo Paul V., Gemstons identification tracking and recovery system.
  91. Alcorn, Byron A., Graphical display system and method.
  92. Renton Paul (14926 20th SW. Seattle WA 98166), Hard drive security system.
  93. Zimmer,Vincent J.; Bulusu,Mallik, Hardened extended firmware interface framework.
  94. Circenis, Edgar, Hardware based utilization metering.
  95. Marsh, David J.; Reneris, Kenneth; Blythe, David R.; Debique, Kirt A., Hardware functionality scan for device authentication.
  96. Gordon M. Green ; Robin Anne Maley ; Michael H. Barnett ; Richard Eckerstrom ; Richard Allen Kamm ; Robert J. Keenoy ; Donald Louis Mikkelsen ; Coleman L. Munch ; Jesse N. Randall ; Michael , Health care policy on-line maintenance dissemination and compliance testing system.
  97. Edlund,David J.; Pledger,William A.; Studebaker,R. Todd, Hydrogen purification membranes, components and fuel processing systems containing the same.
  98. Bird Richard M. (Woodland Hills CA) Byrd Houston F. (Lewisville TX), Identification system for broadcast program segments.
  99. Adan Manolito E. ; Lipscomb Terry M., Image sensing operator input device.
  100. Manolito E. Adan ; Terry M. Lipscomb, Image sensing operator input device.
  101. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  102. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  103. Zavrel Robert Joseph, Information handling systems with broadband and narrowband communication channels between repository and display systems.
  104. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  105. Smola, Michael; Wegertseder, Dominik, Integrated circuit.
  106. Casto, James John; Qureshi, Qadeer Ahmad; Boothby, Hugh William, Integrated circuit package incorporating programmable elements.
  107. Hoffberg, Steven M., Intelligent electronic appliance system and method.
  108. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  109. Adams Phillip M. (Parowan UT) Holmstron Larry W. (Salt Lake City UT) Jacob Steve A. (South Weber UT) Powell Steven H. (Ogden UT) Condie Robert F. (Tuscon AZ) Culley Martin L. (Tuscon AZ), Kernels, description tables, and device drivers.
  110. Christiano Matt (Saratoga CA), License management system for software applications.
  111. Duvvoori Vikram ; Sahai Vikram ; Parthasarathy Balaji ; Waldhauer Neil, License management system using daemons and aliasing.
  112. Reneris, Kenneth; Marsh, David J.; Blythe, David R.; Debique, Kirt A., Linking Diffie Hellman with HFS authentication by using a seed.
  113. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  114. Haveson, Ryan A.; Davis, Darren R.; Morris, Max G., Local peer-to-peer digital content distribution.
  115. Brehmer Gerald M. (Allen Park MI) Hill John P. (Westland MI), Low cost/low current watchdog circuit for microprocessor.
  116. Frank,Alexander; Light,Mark C.; Hall,Martin H., Maintaining and managing metering data for a subsidized computer.
  117. Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Manipulating rights-to-execute in connection with a software copy protection mechanism.
  118. Kurtze Jeffrey (Nashua NH) Cacciatore Ray (Westford MA) Zawojski Peter (Merrimack NH) Peters Eric C. (Carlisle MA) Walsh ; Jr. John (North Chelmsford MA), Media pipeline with multichannel video processing and playback.
  119. Mohammed, Sohail Baig; Debique, Kirt A.; Dunbar, Geoffrey T.; Nelson, Patrick N.; Weiss, Rebecca C.; Barde, Sumedh N.; Sherwani, Adil; Speed, Robin C. B.; Grigorovitch, Alexandre V., Media processing methods, systems and application program interfaces.
  120. Hori,Yoshihiro; Hioki,Toshiaki; Kanamori,Miwa; Yoshikawa,Takatoshi; Takemura,Hiroshi; Takahashi,Masataka; Hasebe,Takayuki; Furuta,Shigeki; Hatakeyama,Takahisa; Tonegawa,Tadaaki; Anazawa,Takeaki, Memory card and data distribution system using it.
  121. Cutter,Benjamin Brooks; Evans,Brian P.; Strom,Clifford P.; Parks,Michael Jay, Metering accessing of content and the like in a content protection system or the like.
  122. Hinckley, Kenneth P.; Sinclair, Michael J.; Szeliski, Richard S.; Conway, Matthew J.; Hanson, Erik J., Method and apparatus for computer input using six degrees of freedom.
  123. Breeden Robert L. (Boynton Beach FL) Muppidi Prabhakar (Boynton Beach FL), Method and apparatus for controlling access to a communication system.
  124. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; Glenn McDonald ; Kleppner Paul ; Morrissey Craig ; Tonra ; Jr. James E., Method and apparatus for controlling access to a product.
  125. Kramer, Gerald Arthur; Whitlow, Eric Scott, Method and apparatus for encouraging timely payments associated with a computer system.
  126. Lyle,James D., Method and apparatus for encrypting data transmitted over a serial link.
  127. Kubala,Jeffrey P.; Nick,Jeffrey M.; Yocom,Peter B., Method and apparatus for enforcing capacity limitations in a logically partitioned system.
  128. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  129. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  130. Chang Sheue-Ling ; Gosling James, Method and apparatus for enhancing software security and distributing software.
  131. Becker Craig Henry ; Cook John ; Folger Troy Douglas ; Knutson James Irwin, Method and apparatus for extending a java archive file.
  132. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Kleppner Paul ; Finnegan Neal ; Morrisey Craig ; Crowley Patrick, Method and apparatus for facilitating communication between collaborators in a networked environment.
  133. Lee,David A.; Graunke,Gary L., Method and apparatus for increasing the entropy of a pseudorandom number.
  134. Knutson James Irwin, Method and apparatus for licensing computer programs using a DSA signature.
  135. Land, David MacLeod; Getgood, Alan Bruce, Method and apparatus for managing credit inquiries within account receivables.
  136. Shin, Kum-Ho, Method and apparatus for maximizing an advertising effect using a control unit to detect if advertisement is being displayed and suspending a function if advertisement is not displayed.
  137. Frank, Alexander; Duffus, James, Method and apparatus for measuring presentation data exposure.
  138. Setala,Henri, Method and apparatus for medical X-radiography.
  139. Eskelinen,Jaakko Joonas, Method and apparatus for performing single-point projection imaging.
  140. Fink,Russell Andrew; Brannigan,Matthew Aloysius; Evans,Shelby Alana; Almeida,Aswin Morgan; Ferguson,Shelley Anne, Method and apparatus for providing adaptive self-synchronized dynamic address translation.
  141. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  142. Frank, Alexander; Steeb, Curt; Duffus, James; Light, Mark C.; Holladay, Martin; Sutton, Paul; Phillips, Thomas; Xu, Zeyong; Xu, Zhangwei, Method and apparatus for provisioning software.
  143. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  144. Langford Glenn C.,CAX ; Curry Ian H.,CAX, Method and apparatus for secure group communications.
  145. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  146. Mott Timothy ; Story Guy ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen ; Kocher Paul, Method and apparatus for targeting a digital information playback device.
  147. Archibald William Charles ; Spielman Terence Paul ; Spielman Jason, Method and apparatus that accounts for usage of digital applications.
  148. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  149. Ortlieb, Thomas E.; Read, Walter, Method and system for adaptive sampling testing of assemblies.
  150. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  151. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  152. Powell Robert D. ; Nitzberg Mark J., Method and system for digital image signatures.
  153. Bagshaw,Stephen A., Method and system for dual link communications encryption.
  154. Molaro,Donald Joseph, Method and system for implementing digital rights management.
  155. Johnson,Douglas Karl; Levine,Lewis J., Method and system for improved correction of registration error in a fluoroscopic image.
  156. Nicholson,Clark D.; Westerinen,William J., Method and system for improved reliability in storage devices.
  157. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  158. Wyman Robert M., Method and system for managing execution of licensed programs.
  159. Ahmad Arshad, Method and system for monitoring the use of rented software.
  160. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  161. Brice ; Jr. Frank W. ; Hefferon Eugene P. ; Scalzi Casper A. ; Tarcza Richard P., Method and system for providing a hardware machine function in a protected virtual machine.
  162. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Dennie Andy ; Kleppner Paul ; Finnegan Neal ; Morrissey Craig ; Steele Alan ; Crowley Patrick, Method and system for providing a networked collaborative work environment.
  163. Goud,Gundrala D.; Zimmer,Vincent J., Method and system to support a trusted set of operational environments using emulated trusted hardware.
  164. da Silva Luis A., Method for determining a source of failure during a file system access.
  165. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  166. Markl Katrin,DEX ; Freytag Claus,DEX ; Gunther Stephan,DEX ; Kubatzki Ralf,DEX ; Thiel Wolfgang,DEX, Method for entering data into a scale.
  167. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Method for executing trusted-path commands.
  168. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  169. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  170. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  171. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  172. Martin Seysen DE, Method for secure distribution of data.
  173. Peled,Ariel; Carny,Ofir; Troyansky,Lidror; Baratz,Arik; Arbel,Oded, Method for securing digital content.
  174. Sarvar Patel, Method for securing over-the-air communication in a wireless system.
  175. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method for selectively disabling interrupts on a secure execution mode-capable processor.
  176. Cognigni,Giorgio; Presciutti,Alessio, Method of controlling use of digitally encoded products.
  177. Merriman Dwight Allen ; O'Connor Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  178. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  179. Amberg Richard D. ; Wong Roger ; Lynch Michael,IEX, Method of installing software on and/or testing a computer system.
  180. Miki Mullor IL; Julian Valiko IL, Method of restricting software operation within a license limitation.
  181. Abrams, Peter C.; Bharadhwaj, Rajeev; Nathan, Swami; Rodriguez, Robert; Martyn, Craig W., Method system and apparatus for providing pay-per-use distributed computing resources.
  182. Baldev Krishan ; Leo Chien Chang ; Ronald G. Lambert, Methods and apparatus for delivering targeted information and advertising over the internet.
  183. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  184. Yacobi,Yacov; England,Paul; Yuval,Gideon A., Methods and apparatus for protecting information content.
  185. James O'Toole ; M. Frans Kaashoek, Methods and apparatus for remote configuration of an appliance on a network.
  186. Wilt,Nicholas P.; Nene,Sameer A.; Beda, III,Joseph S., Methods and system for managing computational resources of a coprocessor in a computing system.
  187. England,Paul; Peinado,Marcus; Wilt,Nicholas P., Methods and systems for cryptographically protecting secure content.
  188. Alkove, James M.; Estrop, Stephen J., Methods and systems for protecting media content.
  189. Shinzaki, Takashi, Mobile electronic apparatus having function of verifying a user by biometrics information.
  190. Sporer Michael ; Kline Mark H. ; Zawojski Peter, Motion video processing circuit for capture playback and manipulation of digital motion video information on a computer.
  191. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  192. Siu,Michael Yiu Kwan; Strom,Clifford Paul; Evans,Brian Patrick, Multi-level nested open hashed data stores.
  193. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Multi-site software license balancing.
  194. Woest Karen L. (Wauwatosa WI) Stark James K. (Wauwatosa WI) Rasmussen David E. (Wales WI), Network control system with improved reliability.
  195. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  196. Conte Brian ; Hui Christine ; Key Roger, Network license compliance apparatus and method.
  197. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  198. Ergan, Cenk; Nicholson, Clark D.; Teodosiu, Dan; DeWhitt, Dean L.; Hill, Emily Nicole; Kodavalla, Hanumantha R.; Zwilling, Michael J.; Parchem, John M.; Fortin, Michael R.; Obr, Nathan Steven; Nagar, Rajeev Y.; Verma, Surenda; Powell, Therron; Westerinen, William J.; Zbikowski, Mark Joseph; Stemen, Patrick L., Non-volatile memory cache performance improvement.
  199. Peterson Gregory W. (Lyons CO) Kurzawa Leonard J. (Broomfield CO), Non-volatile memory storage and bilevel index structure for fast retrieval of modified records of a disk track.
  200. Bourne,Steven; Malik,Prashant; Krishnaswamy,Vinay; Shobe, Jr.,James B.; Venkatesh,Chandramouli; Narin,Attila, Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system.
  201. Ronning Joel A., On-line try before you buy software distribution system.
  202. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  203. Aas, Eric; Nuttall, Gordon R., Optical imaging device with speed variable illumination.
  204. Chu William W. Y., Password protected modular computer method and device.
  205. Balfanz, Dirk; Smetters, Diana K.; Durfee, Glenn E.; Smith, Trevor F., Personal domain controller.
  206. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  207. Alkove, James M.; Debique, Kirt A.; Grigorovitch, Alexandre V.; Powell, William C.; McKune, Jeffrey Richard, Policy engine and methods and systems for protecting data.
  208. Phillips,Thomas G; Schoppa,Christopher A; Westerinen,William J; Myers,Mark A, Portable computing environment.
  209. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Portable computing environment solution.
  210. Ung, Dara; Titus, Mark, Prepaid real-time web based reporting.
  211. Buchheit,Marcellus; Winzenried,Oliver, Procedure for the protection of computer software and/or computer-readable data as well as protective equipment.
  212. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  213. Hinsley Stewart R. (Stoke-On-Trent GB3) Hughes Christopher D. (Crewe GB3), Program attribute control in a computer system.
  214. Reddy,Karimireddy Hari; Lao,Guillermo; Budo Marek,Andrej, Protected content distribution system.
  215. Alkove,James M.; Knowlton,Chadd; Dunbar,Geoffrey, Protected media path and refusal response enabler.
  216. Dunbar,Geoffrey; Chu,Chengyun; Alkove,James M., Protected media path and refusal response enabler.
  217. Roberts David J. (Eastleigh GB2) Simmons John (Chandlers Ford GB2), Protection of data processing system against unauthorized programs.
  218. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Proving BIOS trust in a TCPA compliant system.
  219. Oliveira, Eduardo P.; Alkove, James M.; Prologo, Richard D.; Batterberry, Troy D.; Paka, Anand D., Proximity detection employed in connection with rights management system or the like.
  220. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  221. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  222. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  223. Hicks, Christian Bielefeldt; Creath, Peter Janssen, Remote authorization for unlocking electronic data system and method.
  224. Jean-Marc Frailong ; Charles A. Price ; Joseph John Tardo, Remote reconfiguration of a secure network interface.
  225. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Remote services for portable computing environment.
  226. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  227. Evans, Brian P.; Strom, Clifford P.; Parks, Michael Jay, Rendering digital content in a content protection system according to a plurality of chained digital licenses.
  228. Amin, Samuel; Crites, Brian D.; Debique, Kirt A.; Mohammed, Sohail Baig; Nayak, Niranjan S.; Rudolph, Eric H.; Wilson, Mei L., Resolving partial media topologies.
  229. Jain, Amit; Cutter, Benjamin Brooks; Evans, Brian P.; Strom, Clifford P., Retention of information about digital-media rights in transformed digital media content.
  230. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  231. Knee Derek L. ; Davis Bradley K., Scanning mouse for a computer system.
  232. Davis Derek L., Secure BIOS.
  233. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  234. Komarla,Eshwari P.; Zimmer,Vincent J., Secure booting and provisioning.
  235. Saunders Keith A.,GBX, Secure data processing method and system.
  236. Nordenstam, Jan Olof; Hansson, Allan, Secure distribution and protection of encryption key information.
  237. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  238. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  239. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  240. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  241. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  242. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  243. Evans,Glenn F.; Bradstreet,John, Secure media path methods, systems, and architectures.
  244. Holtey Thomas O. (Newton MA), Secure memory card with programmed controlled security access control.
  245. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access control system.
  246. Folmsbee, Alan, Secure program execution using instruction buffer interdependencies.
  247. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  248. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  249. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  250. Hsiang,Peter C.; Chock,Raymond O.; Hess,Mark, Secure transaction microcontroller with secure boot loader.
  251. Puhl Larry C. ; Vogler Dean H. ; Dabbish Ezzat A., Secure wireless electronic-commerce system with digital product certificates and digital license certificates.
  252. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  253. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Security features for portable computing environment.
  254. Kuroda Yasutsugu,JPX, Security level control apparatus and method for a network securing communications between parties without presetting th.
  255. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  256. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  257. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  258. Wiseman, Willard M.; Grawrock, David W.; Brickell, Ernie; Wood, Matthew D.; Cihula, Joseph F., Session key exchange.
  259. Davis John E. (Reseda CA), Shadow memory system for storing variable backup blocks in consecutive time periods.
  260. Bereiter Thomas William, Software auditing mechanism for a distributed computer enterprise environment.
  261. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  262. Frison Michael R. ; Kirchberger Bela L., Software pay per use licensing system.
  263. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  264. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  265. Iguchi,Shinya; Tsunehiro,Takashi; Tsunoda,Motoyasu; Ishihara,Haruji; Mizushima,Nagamasa; Totsuka,Takashi, Storage device including a non-volatile memory.
  266. Howell, Gareth; Jones, Thobias M.; Mulye, Nishad; Virdi, Gurpratap, Strategies for processing media information using a plug-in processing module in a path-agnostic manner.
  267. Dan Asit ; Ramaswami Rajiv ; Sitaram Dinkar, Support for portable trusted software.
  268. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  269. Taylor David R. P. ; Lynch-Freshner Lawrence A. ; McKinlay Eric W. ; Pacheco Stephen P. ; Goyal Dinesh K., System and method for a communication system.
  270. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  271. Kusumoto, Laura Lee; Sacerdoti, Earl David; Sigler, Leila Janine; Sigler, Sonya Lee, System and method for consumer-selected advertising and branding in interactive media.
  272. Davis Derek L., System and method for copy-protecting distributed video content.
  273. Bisbee Stephen F. (Gibson Island MD) Trotter Douglas H. (Baltimore MD), System and method for electronic transmission storage and retrieval of authenticated documents.
  274. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  275. Tiller,James; Fish,Bryan; Baker,Theodore, System and method for implementing security management using a database-modeled security policy.
  276. Watanabe, Ryoji; Fung, Henry T.; Schwartz, Paul D., System and method for installing and servicing an operating system in a computer or information appliance.
  277. Amini, Lisa D.; Kienzle, Martin G.; Lepre, Jorge O., System and method for integrating arbitrary isochronous processing algorithms in general media processing systems.
  278. Narin,Attila, System and method for integrating secure and non-secure software objects.
  279. Strunk, David D.; Kephart, Aaron D.; Liseski, Steven J.; Fields, Robin M., System and method for interactive advertising.
  280. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  281. Frank,Alexander; Light,Mark C.; Westerinen,William J., System and method for maintaining persistent state data.
  282. Erickson John S., System and method for managing copyrighted electronic media.
  283. Hall ; III Sheldon F. ; Stoikoff Ivan T., System and method for offering and providing secured credit card products.
  284. Agrawal,Rakesh; Kiernan,Gerald George; Srikant,Ramakrishnan; Xu,Yirong, System and method for order-preserving encryption for numeric data.
  285. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  286. Griffiths Laurence Kelvin,GBX, System and method for processing multimedia data streams using filter graphs.
  287. Frank, Alexander; Phillps, Thomas G., System and method for programming an isolated computing environment.
  288. Lockhart Roland T.,CAX ; Wiener Michael J.,CAX, System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user.
  289. Chess David M. ; Sorkin Gregory Bret ; White Steve Richard, System and method for protecting integrity of alterable ROM using digital signatures.
  290. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  291. Bull, John A.; Otway, David J., System and method for secure distribution of digital information to a chain of computer system nodes in a network.
  292. Misra Pradyumna K. ; Graziadio Bradley J. ; Spies Terence R., System and method for software licensing.
  293. Frank,Alexander; Westerinen,William J., System and method for trustworthy metering and deactivation.
  294. Chilimbi, Trishul M., System and method for using data address sequences of a program in a software development tool.
  295. Frank,Alexander; England,Paul, System and method to lock TPM always 'on' using a monitor.
  296. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  297. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  298. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  299. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  300. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  301. Steven Karl Schoch ; Paul Swart, System for controlling the use of licensed software.
  302. Strong Hovey R. (San Jose CA), System for decoupling clock amortization from clock synchronization.
  303. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  304. Riebe,Heinrich Henning; Aldis,David, System for persistently encrypting critical software data to control the operation of an executable software program.
  305. Osborn William R., System for preventing electronic memory tampering.
  306. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  307. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  308. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  309. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  310. Mori Ryoichi (Tokyo JPX), System for storing history of use of programs including user credit data and having access by the proprietor.
  311. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  312. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  313. Gunyakti,Caglar; Hatlelid,Kristjan E.; Zhang,Ning; Tan,Xiaoxi, Systems and methods for deterring software piracy in a volume license environment.
  314. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  315. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  316. Waxman, Peter David; Narin, Attila; Cottrille, Scott; Krishnaswamy, Vinay; DeMello, Marco A.; Venkatesh, Chandramouli; Byrum, Frank D.; Bourne, Steve, Systems and methods for issuing usage licenses for digital content and services.
  317. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  318. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  319. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  320. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  321. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  322. Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.
  323. Circenis, Edgar; Diamant, John R., Tamper-evident data management.
  324. Piosenka Gerald V. (Scottsdale AZ) Harrison David M. (Mesa AZ) Chandos Ronald V. (Tempe AZ), Tamperproof arrangement for an integrated circuit device.
  325. Wang, Zhenyu; Ma, Qingming, Technique for implementing high performance stable storage hierarchy in a computer network.
  326. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  327. Crane, Randall T.; Hastings, Brian L., Tracking pointing device motion using a single buffer for cross and auto correlation determination.
  328. Fierstein,Scott J.; Evans,Brian P.; Dunbar,Geoffrey T.; Alkove,James M.; Rosenstein,Daniel; Howard,Matthew; Ma,Ming; Grigorovitch,Alexandre Vicktorovich, Transcryption of digital content between content protection systems.
  329. Ginter Thomas,DEX, Updating mechanism for user programs in a computer system.
  330. Vogel, Keith R.; Chase, Charlie D.; Yiu, Kelvin S.; Hallin, Philip J.; Thomas, Louis K., Updating trusted root certificates on a client computer.
  331. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  332. Bourne, Steven; Venkatesh, Chandramouli; Krishnaswamy, Vinay, Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system.
  333. Welsh Russell J. (Toronto CAX), Video monitoring system.
  334. Martinez Ronald ; Schneier Bruce ; Guerin Greg, Virtual property system.
  335. Flavin Robert Alan ; Nihal Perwaiz ; Perez Ronald ; Smith Sean William, Watchdog for trusted electronic content distributions.
  336. Finch Richard (Austin TX) Schieve Eric (Austin TX), Watchdog timer for computer system reset.
  337. Clapp Craig S.K., w-bit non-linear combiner for pseudo-random number generation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로