$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Intermediate network authentication 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0254087 (1994-06-03)
발명자 / 주소
  • Atkinson Randall (Annandale VA)
출원인 / 주소
  • The United States of America as represented by the Secretary of the Navy (Washington DC 06)
인용정보 피인용 횟수 : 315  인용 특허 : 0

초록

An internetwork authentication method is provided for verifying a sending host by a receiving host or an intermediate router or gateway. The method comprises the steps of: obtaining a network address and a public key of a receiving host; utilizing the public key from the receiving host in combinatio

대표청구항

A method for authenticating an originating host at a receiving host, said method comprising the steps of: (a) obtaining a network address and a public key of said receiving host; (b) utilizing said public key from said receiving host in combination with a private key from said sending host to genera

이 특허를 인용한 특허 (315)

  1. Allavarpu, Sai V.; Angal, Rajeev, Abstract syntax notation to interface definition language converter framework for network management.
  2. Schneck Phyllis A. ; Schwan Karsten ; Chokhani Santosh, Adaptive data security system and method.
  3. Schneck, Phyllis A.; Schwan, Karsten; Chokhani, Santosh, Adaptive data security system and method.
  4. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  5. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  6. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  7. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  8. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  9. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  10. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  11. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  12. Larson, Victor; Short, III, Robert; Munger, Edmund; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  13. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  14. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  15. Munger, Edmund; Schmidt, Douglas; Short, III, Robert; Larson, Victor; Williamson, Michael, Agile network protocol for secure communications with assured system availability.
  16. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  17. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  18. Hagerman, Douglas L., Apparatus and method for implementing spoofing-and replay-attack-resistant virtual zones on storage area networks.
  19. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  20. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  21. Jennings, Cullen; Touitou, Dan; Wing, Daniel, Authentication of SIP and RTP traffic.
  22. Ogram Mark E., Automated credit card processing.
  23. Barcelou, David M., Automated transaction machine.
  24. Barcelou, David M., Automated transaction machine.
  25. Barcelou, David M., Automated transaction machine.
  26. Barcelou, David M., Automated transaction machine.
  27. Barcelou, David M., Automated transaction machine.
  28. Barcelou, David M., Automated transaction machine.
  29. Barcelou, David M., Automated transaction machine.
  30. Barcelou, David M., Automated transaction machine.
  31. Barcelou, David M., Automated transaction machine.
  32. Barcelou, David M., Automated transaction machine.
  33. Barcelou, David M., Automated transaction machine.
  34. Barcelou, David M., Automated transaction machine.
  35. Barcelou, David M., Automated transaction machine.
  36. Barcelou, David M., Automated transaction machine.
  37. Barcelou, David M., Automated transaction machine.
  38. Barcelou, David M., Automated transaction machine.
  39. Barcelou, David M., Automated transaction machine.
  40. Barcelou, David M., Automated transaction machine.
  41. Barcelou, David M., Automated transaction machine.
  42. Barcelou, David M., Automated transaction machine.
  43. Barcelou, David M., Automated transaction machine.
  44. Barcelou, David M., Automated transaction machine.
  45. Allavarpu, Sai V.; Angal, Rajeev; Karunaratne, Gihan R.; McCall, Mark B., CORBA metadata gateway to telecommunications management network.
  46. Antebi, Amit; Atsmon, Alon; Lev, Zvi; Cohen, Moshe, Card for interaction with a computer.
  47. Antebi, Amit; Atsmon, Alon; Lev, Zvi; Cohen, Moshe, Card for interaction with a computer.
  48. Kimura,Misao, Communication network system having secret concealment function, and communication method.
  49. Teraoka Fumio,JPX, Communication system and communication apparatus.
  50. Denker John Stewart, Communications protocol with improved security.
  51. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  52. Bardsley, Jeffrey Scott; Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Correlating network information and intrusion information to find the entry point of an attack upon a protected computer.
  53. Fishman,Neil S.; Kramer,Michael, Credential authentication for mobile users.
  54. Tzakikario, Rephael; Touitou, Dan; Pazi, Guy, DNS anti-spoofing using UDP.
  55. Golshan, Ali, DNS denial of service attack protection.
  56. Challener, David Carroll; Cromer, Daryl Carvis; Davis, Mark Charles; Elliott, Scott Thomas; Locker, Howard Jeffrey; Trotter, Andy Lloyd; Ward, James Peter, Data processing system and method for maintaining secure user private keys in non-secure storage.
  57. Takahashi, Toshinari; Zhao, Fangming; Yamanaka, Shinji; Komano, Yuichi; Umesawa, Kentaro, Data transmitting apparatus and data authenticating method.
  58. Takahashi, Toshinari; Miyake, Hideyuki, Data transmitting device, data receiving device, and computer-readable storage medium.
  59. Hillis, W. Daniel; Ferren, Bran, Delegated authority evaluation system.
  60. Hills, W. Daniel; Ferren, Bran, Delegated authority to evaluate content.
  61. Hillis, W. Daniel; Ferren, Bran, Delegating authority to evaluate content.
  62. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  63. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  64. Maruyama,Hiroshi; Uramoto,Naohiko, Digital signature verification and program transmission.
  65. Jones, Brian Aaron; Lima, Bruno Miranda; Stapler, III, Richard Nathanial, Dispenser.
  66. Friedel, Michael, Distributed denial of service cellular signaling.
  67. Gupta, Amit; Perlman, Radia Joy; Chiu, Dah-Ming, Distributed filtering and monitoring system for a computer internetwork.
  68. Shima,Shigeyoshi, Electronic data transmission and reception system.
  69. Atsmon, Alon; Antebi, Amit; Altman, Nathan; Lev, Zvi; Cohen, Moshe, Electronic device and method of configuring thereof.
  70. Cohen Joshua L. ; Dean Cecil A. ; du Breuil Thomas L. ; Heer Daniel Nelson ; Maher David P. ; Poteat Vance Eugene ; Rance Robert John, Electronic identifiers for network terminal devices.
  71. Zizzi,Stephen, Encrypting file system.
  72. Shambroom W. David, Enhanced security for applications employing downloadable executable content.
  73. Ogram Mark E., Financial system of computers.
  74. Ogram Mark E., Financial transaction system.
  75. Gareau, Terrence, Flagging security threats in web service requests.
  76. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  77. Allavarpu, Sai V.; Angal, Rajeev, Generic and dynamic mapping of abstract syntax notation (ASN1) to and from interface definition language for network management.
  78. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  79. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  80. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  81. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  82. Thompson, Micheal; Groves, Vernon Richard, Health monitor based distributed denial of service attack mitigation.
  83. Thompson, Micheal; Groves, Vernon Richard, Health monitor based distributed denial of service attack mitigation.
  84. Sandhu, Ravi; deSa, Colin; Ganesan, Karuna, High security cryptosystem.
  85. Aura, Tuomas; Roe, Michael, Human input security codes.
  86. Allavarpu,Sai V.; Dong,Xeusi; Lee,Linda C., IDL event and request formatting for corba gateway.
  87. Jiang, Xuyang; Golshan, Ali, Implementing and optimizing secure socket layer intercept.
  88. Wiley Steve R. (Boise ID) Motes Matthew J. (Meridian ID), Indirect method for network peripheral automated detection.
  89. Bonefas, Rudy G.; Sobchak, Richard K.; Zombek, James M., Intelligent messaging network server interconnection.
  90. Clark Paul C., Intelligent token protected system with network authentication.
  91. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  92. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  93. Atsmon, Alon; Antebi, Amit; Cohen, Moshe; Shimoni, Sharon, Interactive toys.
  94. Cohen, Moshe; Sege, Alan, Interactive toys.
  95. Cohen, Moshe; Sege, Alan, Interactive toys.
  96. Cohen, Moshe; Sege, Alan, Interactive toys.
  97. Golshan, Ali; Jiang, Xuyang; Yang, Yang, Intercepting secure session upon receipt of untrusted certificate.
  98. Parker Lance T. ; Tusoni Lawrence D., Internet based training.
  99. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  100. Hillis,W. Daniel; Ferren,Bran, Knowledge web.
  101. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  102. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  103. Daniel Wayne Bertram ; David Paul Dutcher ; Scott Alan Lenharth ; James Michael Rolette, Jr. ; Stanley Alan Smith ; Courtney Joseph Spooner, Management of authentication discovery policy in a computer network.
  104. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  105. Hillis, W. Daniel; Ferren, Bran, Meta-Web.
  106. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  107. Smith, Jeffrey C., Method and apparatus for effecting secure document format conversion.
  108. Lewis, Michael; King, Frank; Arnold, Thomas; Wright, William; Pettit, John, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  109. Lewis,Michael; King,Frank; Arnold,Thomas; Wright,William; Pettit,John, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  110. Wright, William; Hu, Hung-Tzaw, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  111. Wright, William; Hu, Hung-Tzaw, Method and apparatus for evaluating fraud risk in an electronic commerce transaction.
  112. Lewis, Michael; King, Frank; Arnold, Thomas; Wright, William; Pettit, John, Method and apparatus for generating a bi-gram score in fraud risk analysis.
  113. Dror Ginossar IL, Method and apparatus for packet network congestion avoidance and control.
  114. Bruestle, Jeremy; Tucker, Mark L., Method and apparatus for secure communications and resource sharing between anonymous non-trusting parties with no central administration.
  115. Mott Timothy ; Story Guy ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen ; Kocher Paul, Method and apparatus for targeting a digital information playback device.
  116. Amit Gupta ; Radia J. Perlman, Method and apparatus for using digital signatures to filter packets in a network.
  117. Delany,Mark, Method and system for authenticating a message sender using domain keys.
  118. Delany,Mark, Method and system for authenticating a message sender using domain keys.
  119. Huitema,Christian, Method and system for authenticating messages.
  120. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  121. Bonefas, Rudy G.; Miller, Michael; Shelton, Dale; Wantz, Jay L., Method and system for deploying content to wireless devices.
  122. Bonefas, Rudy; Miller, Michael J.; Shelton, Dale; Wantz, L. Jay, Method and system for deploying content to wireless devices.
  123. Padmanabhan, Venkata N.; Simon, Daniel R., Method and system for detecting a communication problem in a computer network.
  124. Pettitt,John Philip, Method and system for detecting fraud in a credit card transaction over a computer network.
  125. Pettitt, John Philip, Method and system for detecting fraud in a credit card transaction over the internet.
  126. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  127. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  128. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  129. Anati, Ram; Glukhov, Maxim; Atsmon, Dan; Speyer, Gavriel, Method and system for remotely authenticating identification devices.
  130. Kausik, Balas N., Method and system for secure authenticated payment on a computer network.
  131. Kausik,Balas N., Method and system for secure authenticated payment on a computer network.
  132. Chen David De-Hui ; Kerr Joseph Brendan ; Owen Stephen Anton, Method and system for securing confidential data in a computer network.
  133. Hu,Chunzhe, Method based on border gateway protocol message for controlling messages security protection.
  134. Challener, David Carroll; Dayan, Richard Alan; Ward, James Peter; Vanover, Michael, Method for associating a pass phase with a secured public/private key pair.
  135. Challener, David Carroll; Dayan, Richard Alan; Ward, James Peter; Vanover, Michael, Method for associating a password with a secured public/private key pair.
  136. Angelo Michael F., Method for controlling access to a computer system by utilizing an external device containing a hash value representati.
  137. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  138. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  139. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  140. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  141. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  142. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  143. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow David Wayne ; Wrench ; Jr. Edwin H., Method for establishing trust in a computer network via association.
  144. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  145. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  146. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  147. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  148. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  149. O'Rourke, Chris; Shah, Gaurang K.; Menditto, Louis F.; Albert, Mark; Sutton, Michael S.; Tiwari, Pranav K.; Batz, Robert M.; Gray, Richard; Hull, Sean W.; Tsang, Tzu-Ming, Method for protecting a firewall load balancer from a denial of service attack.
  150. O'Rourke,Chris; Shah,Gaurang K; Menditto,Louis F; Albert,Mark; Sutton,Michael S; Tiwari,Pranav K; Batz,Robert M; Gray,Richard; Hull,Sean W; Tsang,Tzu Ming, Method for protecting a firewall load balancer from a denial of service attack.
  151. Shambroom W. David, Method for providing secure remote command execution over an insecure computer network.
  152. Shambroom,W. David, Method for providing simultaneous parallel secure command execution on multiple remote hosts.
  153. Angelo Michael F. ; Collins David L. ; Kim Donald D. ; Jansen Kenneth A., Method for securely communicating remote control commands in a computer network.
  154. Angelo, Michael F.; Michels, Peter J., Method for securely creating, storing and using encryption keys in a computer system.
  155. Hersent,Olivier, Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method.
  156. Pitsos,Errikos, Method, gateway and system for transmitting data between a device in a public network and a device in an internal network.
  157. Aura,Anssi Tuomas, Methods and systems for authenticating messages.
  158. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  159. O'Shea,Gregory; Roe,Michael, Methods and systems for unilateral authentication of messages.
  160. Shelest, Art; Thaler, David G.; O'Shea, Gregory; Roe, Michael; Zill, Brian D., Methods and systems for unilateral authentication of messages.
  161. Shelest,Art; Thaler,David G.; O'Shea,Gregory; Roe,Michael; Zill,Brian D., Methods and systems for unilateral authentication of messages.
  162. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  163. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  164. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  165. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  166. McGarvey,John R., Methods, systems and computer program products for authentication between clients and servers using differing authentication protocols.
  167. Jalan, Rajkumar; Kamat, Gurudeep; Szeto, Ronald Wai Lun, Mitigating TCP SYN DDoS attacks using TCP reset.
  168. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  169. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  170. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  171. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  172. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  173. Day Michael David, Network discovery system and method.
  174. Schuba, Christoph L.; Krsul, Ivan V.; Zamboni, Diego; Spafford, Eugene H.; Sundaram, Aurobindo M.; Kuhn, Markus G., Network protection for denial of service attacks.
  175. Aura, Tuomas; Roe, Michael, Non-cryptographic addressing.
  176. Wagner, Richard Hiers, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
  177. Wagner, Richard Hiers, Open network system and method for I/O operations with non-standard I/O devices using an extended open network protocol.
  178. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack defense.
  179. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack defense.
  180. Yang, Yang; Golshan, Ali, Perfect forward secrecy distributed denial of service attack detection.
  181. Cleveland, Randall; Schrock, Mike; Glover, Donald; Thirasuttakorn, Nat, Persistence based on server response in an IP multimedia subsystem (IMS).
  182. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  183. Atsmon, Alon; Antebi, Amit; Lev, Tsvi; Cohen, Moshe; Spcyer, Gavriel; Sege, Alan; Altman, Nathan; Anati, Rami, Physical presence digital authentication system.
  184. Atsmon, Alon; Antebi, Amit; Lev, Tsvi; Cohen, Moshe; Speyer, Gavriel; Sege, Alan; Altman, Nathan; Anati, Rami, Physical presence digital authentication system.
  185. Atsmon, Alon; Antebi, Amit; Lev, Zvi; Cohen, Moshe; Speyer, Gabriel; Sege, Alan; Altman, Nathan; Anati, Ram, Physical presence digital authentication system.
  186. Atsmon, Alon; Antebi, Amit; Lev, Zvi; Cohen, Moshe; Speyer, Gabriel; Sege, Alan; Altman, Nathan; Anati, Ram, Physical presence digital authentication system.
  187. Shambroom,W. David, Platform-neutral system and method for providing secure remote operations over an insecure computer network.
  188. Allavarpu, Sai V.; Bhalerao, Anand J., Pluggable authentication modules for telecommunications management network.
  189. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  190. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  191. Uskela, Sami, Preventing unauthorized use of service.
  192. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  193. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  194. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  195. Bellare Mihir ; Rogaway Phillip, Probabilistic signature scheme.
  196. Bellare,Mihir; Rogaway,Phillip, Probabilistic signature scheme.
  197. Pazi, Guy; Touitou, Dan; Golan, Alon; Afek, Yehuda, Protecting against spoofed DNS messages.
  198. Pazi,Guy; Touitou,Dan; Golan,Alon; Afek,Yehuda, Protecting against spoofed DNS messages.
  199. Touitou, Dan; Lewis, Darrel; Tzadikario, Rafi; Horowitz, Karen, Protection against reflection distributed denial of service attacks.
  200. Eller, Riley; Laub, Frank; Bruestle, Jeremy; Tucker, Mark L, Protocol link layer.
  201. Tasker, Michael, Reducing delays in a communication network using a re-fragmentation pipeline.
  202. Shelest,Art; Huitema,Christian, Reducing network configuration complexity with transparent virtual private networks.
  203. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  204. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  205. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  206. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  207. Lima, Bruno Miranda; Jones, Brian Aaron; Stapler, III, Richard Nathanial, Scent dispensation and fluid level sensing.
  208. Allavarpu,Sai V.; Dong,Xeusi; Lee,Linda C., Secure access to managed network objects using a configurable platform-independent gateway providing individual object-level access control.
  209. Boroughs, Randall Craig; Bonn, David Wayne, Secure and differentiated delivery of network security information.
  210. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  211. Angelo Michael F., Secure method for enabling/disabling power to a computer system following two-piece user verification.
  212. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  213. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  214. Angelo Michael F. ; Olarig Sompong P., Secure two-piece user authentication in a computer network.
  215. Michael F. Angelo, Securely generating a computer system password by utilizing an external encryption algorithm.
  216. Moreh Jahanshah ; Olkin Terry M., Security system for event based middleware.
  217. Tamir, Asaf; Sege, Alan; Dvash, Nir; Altman, Nathan; Atsmon, Alon, Sonic/ultrasonic authentication method.
  218. Allavarpu, Sai V.; Bhalerao, Anand J., Synchronous task scheduler for corba gateway.
  219. Cohen,Nimrod; Arieli,Guy, System and a method for testing network communication devices.
  220. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  221. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  222. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  223. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  224. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  225. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  226. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  227. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  228. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  229. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  230. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  231. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  232. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  233. Powers, Leslie, System and method for authentication and fail-safe transmission of safety messages.
  234. Gage,Timothy M.; Retana,Alvaro E., System and method for communicating packets in a network environment.
  235. Hankey Mhoon, System and method for conducting secure internet transactions.
  236. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  237. Retana, Alvaro E.; Cook, David A.; White, Russell I.; Yang, Yi; Chandra, Madhavi W., System and method for controlling the flooding of information in a network environment.
  238. Retana,Alvaro E.; Cook,David A.; White,Russell I.; Yang,Yi; Chandra,Madhavi W., System and method for controlling the flooding of information in a network environment.
  239. Bradfield, Christopher James, System and method for directing network traffic in tunneling applications.
  240. Wang,Xin, System and method for document distribution.
  241. Wagner, Richard Hiers, System and method for enabling transactions between a web server and a smart card, telephone, or personal digital assistant over the internet.
  242. Wagner, Richard Hiers, System and method for enabling transactions between a web server and an automated teller machine over the internet.
  243. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  244. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  245. Allavarpu,Sai V.; Bhat,Shivaram, System and method for event subscriptions for CORBA gateway.
  246. Chandra, Madhavi W.; Cook, David A.; Retana, Alvaro E.; White, Russell I.; Yang, Yi, System and method for exchanging awareness information in a network environment.
  247. Chandra,Madhavi W.; Cook,David A.; Retana,Alvaro E.; White,Russell I.; Yang,Yi, System and method for exchanging awareness information in a network environment.
  248. Ye,Feng; Zhang,Kui; Claise,Benoit, System and method for generating a traffic matrix in a network environment.
  249. Tamir, Asaf; Sege, Alan; Dvash, Nir; Altman, Nathan; Atsmon, Alon, System and method for identifying and/or authenticating a source of received electronic data by digital signal processing and/or voice authentication.
  250. Tamir, Asaf; Sege, Alan; Dvash, Nir; Altman, Nathan; Atsmon, Alon, System and method for identifying and/or authenticating a source of received electronic data by digital signal processing and/or voice authentication.
  251. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  252. Glawitsch, Gregor A., System and method for preventing a spoofed denial of service attack in a networked computing environment.
  253. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  254. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  255. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  256. Thai, Hien T.; Shatzkamer, Kevin D.; Gasson, Andrew G.; Andriantsiferana, Laurent; Hamel, Eric; Iyer, Jayaraman R., System and method for providing security in a network environment using accounting information.
  257. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communication over non-IP based networks.
  258. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  259. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  260. Zombek, James M.; Edwards, Donald J., System and method for re-directing requests from browsers for communications over non-IP based networks.
  261. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  262. Chandra,Madhavi W.; Cook,David A.; Retana,Alvaro E.; White,Russell I.; Yang,Yi, System and method for reducing information being transmitted in a network environment.
  263. Jacobson,Van; Poduri,Kedar; Kanna,Satish K; Alaettinoglu,Cengiz; Cobbs,Archibald L, System and method for secure communication of routing messages.
  264. Chandra,Madhavi W.; Cook,David A.; Retana,Alvaro E.; White,Russell I.; Yang,Yi, System and method for synchronizing link state databases in a network environment.
  265. Wagner, Richard Hiers, System and method for transacting communication over an open network.
  266. Wang,Xin, System and method for transferring the right to decode messages.
  267. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  268. Cook, David A.; Ng, James L.; Retana, Alvaro E.; White, Russell I., System and method for verifying the validity of a path in a network environment.
  269. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  270. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  271. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  272. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  273. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Silk,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  274. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  275. Wagner, Richard Hiers, System for enabling smart card transactions to occur over the internet and associated method.
  276. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  277. Byrne Shannon,CAX, System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers.
  278. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  279. Shambroom W. David, System for providing secure remote command execution network.
  280. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  281. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  282. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  283. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  284. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  285. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  286. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  287. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  288. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  289. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  290. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  291. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  292. Judge, Paul, Systems and methods for message threat management.
  293. Judge, Paul, Systems and methods for message threat management.
  294. Judge, Paul, Systems and methods for message threat management.
  295. Judge, Paul, Systems and methods for message threat management.
  296. Judge,Paul, Systems and methods for message threat management.
  297. Judge,Paul, Systems and methods for message threat management.
  298. Chincheck,Stanley; Kang,Myong Hoon; Moskowitz,Ira S; Parsonese,Jim, Systems and methods for providing increased computer security.
  299. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  300. Judge,Paul, Systems and methods for upstream threat pushback.
  301. Allavarpu,Sai V.; Angal,Rajeev; Bhalerao,Anand J., Thread-safe portable management interface.
  302. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  303. Arrow Leslie J. ; Bots Henk J. ; Hoke Mark R. ; Hunt William E. ; Huntley Bruce T., Translating packet addresses based upon a user identifier.
  304. Van Rijnsoever, Bartholomeus J., Transmission system.
  305. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  306. O'Keefe, Kevin, Trusted content server.
  307. Dutcher David Paul ; Lenharth Scott Alan ; Rolette ; Jr. James Michael ; Smith Stanley Alan, User authentication from non-native server domains in a computer network.
  308. Touitou, Dan; Pazi, Guy; Shtein, Yehiel; Tzadikario, Rephael, Using TCP to authenticate IP source addresses.
  309. Aura, Tuomas; Roe, Michael, Using time to determine a hash extension.
  310. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.
  311. Blinn, Arnold; Hagan, Cynthia; Gillett, Don, Validation of domain name control.
  312. Jones, Brian Aaron; Lima, Bruno Miranda; Stapler, III, Richard Nathanial, Vial for a scent dispenser.
  313. Hillis, W. Daniel; Ferren, Bran, Video game controller hub with control input reduction and combination schemes.
  314. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  315. Albert Herb ; Renton Paul ; Rowe Lorin ; Schramke Stephen R. ; Zorn Glen, Wireless adaptor and wireless financial transaction system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로