$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Security system for preventing unauthorized communications between networks by translating communications received in ip

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/00
출원번호 US-0350541 (1994-12-07)
발명자 / 주소
  • Gelb Edward J. (Wayne NJ)
출원인 / 주소
  • Matsushita Electric Corporation of America (Secaucus NJ 02)
인용정보 피인용 횟수 : 438  인용 특허 : 0

초록

A security system for connecting a first computer network to a second computer network is provided. The security device has a pair of computer motherboards, each of which has a network interface adapter for receiving and transferring communications from a computer network to a transfer adapter to be

대표청구항

A security system for preventing unauthorized communications between a first network of computers interconnected for Internet Protocol (IP) communications and a second network of computers interconnected for IP communications, while permitting application level communication services between compute

이 특허를 인용한 특허 (438)

  1. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  2. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  3. Schneck Phyllis A. ; Schwan Karsten ; Chokhani Santosh, Adaptive data security system and method.
  4. Schneck, Phyllis A.; Schwan, Karsten; Chokhani, Santosh, Adaptive data security system and method.
  5. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  6. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  7. Epstein, Jeremy; Thomas, Linda, Advanced data guard having independently wrapped components.
  8. Ji Shuang ; Chen Eva ; Liang Yung-Chang ; Tsai Warren,TWX, Apparatus and method for electronic mail virus detection and elimination.
  9. Boyle John M. ; Maiwald Eric S. ; Snow David W., Apparatus and method for providing network security.
  10. Satapati, Suresh, Apparatus and methods for handling name resolution over IPV6 using NAT-PT and DNS-ALG.
  11. Radatti,Peter V.; Eliseo,Timothy R., Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer.
  12. Radatti,Peter V.; Eliseo,Timothy R., Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer.
  13. Somasundaram,Mahadev; Jayasenan,Siva S.; Sivakumar,Senthil M., Apparatus and methods for performing network address translation (NAT) in a fully connected mesh with NAT virtual interface (NVI).
  14. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Apparatus for providing security over untrusted networks.
  15. Boulanger, Alan David; Danford, Robert William; Himberger, Kevin David; Jeffries, Clark Debs, Apparatus, method and program to detect and control deleterious code (virus) in computer network.
  16. Al-Khowaiter, Ahmad O.; Almadi, Soloman; AbuAlSaud, Zakarya; Al-Walaie, Soliman A., Apparatus, systems, platforms, and methods for securing communication data exchanges between multiple networks for industrial and non-industrial applications.
  17. Choy David Mun-Hien, Application-independent generator to generate a database transaction manager in heterogeneous information systems.
  18. Nilsen, B.o slashed.rge, Arrangement in a data communication system.
  19. Khalil, Mohamed; Akhtar, Haseeb; Pillai, Krishnakumar; Qaddoura, Emad A., Assisted power-up and hand off system and method.
  20. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  21. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  22. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  23. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  24. Volpano, Dennis M.; Zhao, Xinhua J., Bridged cryptographic VLAN.
  25. Volpano, Dennis Michael; Zhao, Xinhua J., Bridged cryptographic VLAN.
  26. Volpano, Dennis Michael; Zhao, Xinhua J., Bridged cryptographic VLAN.
  27. Christensen, Carl L.; Johnson, Charles L.; Arbuckle, Lynn Howard, Broadcast router having a shared configuration repository.
  28. Johnson R. Brent, Combined remote access and security system.
  29. Ellis, Frampton Erroll, Commercial distributed processing by personal computers over the internet.
  30. Tsuchiya, Kazuaki; Ikeda, Naoya; Hamamoto, Shinichi; Watanabe, Ken; Yasue, Toshikazu; Atarashi, Yoshifumi; Sumikawa, Munechika; Miyamoto, Takahisa; Higuchi, Hidemitsu, Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus.
  31. Tsuchiya, Kazuaki; Ikeda, Naoya; Hamamoto, Shinichi; Watanabe, Ken; Yasue, Toshikazu; Atarashi, Yoshifumi; Sumikawa, Munechika; Miyamoto, Takahisa; Higuchi, Hidemitsu, Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus.
  32. Tsuchiya,Kazuaki; Ikeda,Naoya; Hamamoto,Shinichi; Watanabe,Ken; Yasue,Toshikazu; Atarashi,Yoshifumi; Sumikawa,Munechika; Miyamoto,Takahisa; Higuchi,Hidemitsu, Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus.
  33. Tsuchiya,Kazuaki; Ikeda,Naoya; Hamamoto,Shinichi; Watanabe,Ken; Yasue,Toshikazu; Atarashi,Yoshifumi; Sumikawa,Munechika; Miyamoto,Takahisa; Higuchi,Hidemitsu, Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus.
  34. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  35. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  36. Ellis, Frampton E., Computer and microprocessor control units that are inaccessible from the internet.
  37. Ellis, Frampton E., Computer or microchip controlled by a firewall-protected master controlling microprocessor and firmware.
  38. Ellis, Frampton E., Computer or microchip including a network portion with RAM memory erasable by a firewall-protected master controller.
  39. Ellis, Frampton E., Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores.
  40. Ellis, Frampton E., Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores.
  41. Ellis, Frampton E., Computer or microchip with a master controller connected by a secure control bus to networked microprocessors or cores.
  42. Ellis, Frampton E., Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor.
  43. Ellis, Frampton E., Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM.
  44. Ellis, Frampton E., Computer or microchip with a secure system bios having a separate private network connection to a separate private network.
  45. Ellis, Frampton E., Computer or microchip with an internal hardware firewall and a master controlling device.
  46. Ellis, Frampton E., Computer or microchip with its system bios protected by one or more internal hardware firewalls.
  47. Grosse Eric, Computer security using virus probing.
  48. Sullivan Mark K., Computer system having virtual circuit address altered by local computer to switch to different physical data link to increase data transmission bandwidth.
  49. Ellis, Frampton E., Computer with at least one faraday cage and internal flexibility sipes.
  50. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Computerized access device with network security.
  51. Ellis, III, Frampton E., Computers and microchips with a faraday cage, a side protected by an internal hardware firewall and an unprotected side connected to the internet for network operations, and with internal hardware compartments.
  52. Ellis, Frampton E., Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments.
  53. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewall.
  54. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewalls.
  55. Ellis, III, Frampton E., Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  56. Ellis, III, Frampton Erroll, Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  57. Ellis, Frampton E., Computers including an undiced semiconductor wafer with Faraday Cages and internal flexibility sipes.
  58. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall and an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary inner hardware firewalls.
  59. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls.
  60. Ellis, Frampton E., Computers or microchips with a primary internal hardware firewall and with multiple internal harware compartments protected by multiple secondary interior hardware firewalls.
  61. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  62. Edwards,James W.; Saint Hilaire,Ylian; Richardson,John W., Connectivity in the presence of barriers.
  63. Dent, Warren T.; Kaethler, Judy; Remington, Darren B.; Saliba, Bassam A., Consumer-based system and method for managing and paying electronic billing statements.
  64. Dent, Warren T.; Kaethler, Judy; Remington, Darren B.; Saliba, Bassam A., Consumer-based system and method for managing and paying electronic billing statements.
  65. Michael S. Borella ; David A. Grabelsky ; Dan Nessett, Control channel security for realm specific internet protocol.
  66. Fontanella, D. Alan; Klinefelter, Gary M.; Upin, Jeffrey D.; Ekers, John E.; Platner, Thomas C.; Nehowig, Kelly R.; Goldenstein, Angela Marie, Credential production using a secured consumable supply.
  67. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  68. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  69. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  70. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  71. Mimura, Atsuhiko; Kumagai, Naoko; Kotani, Hiroki, Device and method for controlling access to open and non-open network segments.
  72. San Andres, Ramon J.; Sanderman, David S.; Nolan, Sean P., Directory service for a computer network.
  73. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Distributed monitoring for a video security system.
  74. Schuster, Guido M.; Borella, Michael S.; Grabelsky, David A.; Sidhu, Ikhlaq S., Distributed network address translation for a network telephony system.
  75. Ji, Shuang; Tao, Renkui, Distributed virus scanning arrangements and methods therefor.
  76. Wagner Richard Hiers, Editor for developing statements to support i/o operation on open network using segregator for segregating protocol sta.
  77. Remington,Darren B.; Dent,Warren T., Electronic bill presentment and payment system.
  78. Remington,Darren B.; Dent,Warren T., Electronic bill presentment and payment system.
  79. Remington, Darren B.; Dent, Warren T., Electronic bill presentment and payment system with bill dispute capabilities.
  80. Jeffrey C. Smith ; Jean-Christophe Bandini, Electronic document delivery system in which notification of said electronic document is sent a recipient thereof.
  81. McKelvey Mark Ambrose, Embedded security processor.
  82. Toga, James E., Firewall for controlling data transfers between networks based on embedded tags in content description language.
  83. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Firewall providing enhanced network security and user transparency.
  84. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  85. Dowd Patrick William ; Mchenry John Thomas, Firewall security apparatus for high-speed circuit switched networks.
  86. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  87. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  88. Toga, James E., Firewalls that filter based upon protocol commands.
  89. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  90. Sekiguchi, Kiyonori, Gateway apparatus for controlling apparatuses on home network.
  91. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Gateway device having an XML interface and associated method.
  92. Stockwell Edward B. ; Klietz Alan E., Generalized security policy management system and method.
  93. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  94. Ellis, Frampton E., Global network computers.
  95. Ellis, III, Frampton E., Global network computers.
  96. Ellis, III,Frampton E., Global network computers.
  97. Ellis, III,Frampton E., Global network computers.
  98. Ellis,Frampton E, Global network computers.
  99. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  100. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  101. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  102. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  103. Donahue Paul W. ; Dankworth Jeffrey A. ; Hinderks Larry W. ; Fish Laurence A. ; Lerner Ian A. ; Ballister Thomas C. ; Roberts ; III Roswell R., High bandwidth broadcast system having localized multicast access to broadcast content.
  104. Donahue Paul W. ; Dankworth Jeffrey A. ; Hinderks Larry W. ; Fish Laurence A. ; Lerner Ian A. ; Ballister Thomas C. ; Roberts ; III Roswell R., High bandwidth broadcast system having localized multicast access to broadcast content.
  105. Donahue Paul W. ; Dankworth Jeffrey A. ; Hinderks Larry W. ; Fish Laurence A. ; Lerner Ian A. ; Ballister Thomas C. ; Roberts ; III Roswell R., High bandwidth broadcast system having localized multicast access to broadcast content.
  106. Donahue, Paul W.; Dankworth, Jeffrey A.; Hinderks, Larry W.; Fish, Laurence A.; Lerner, Ian A.; Ballister, Thomas C.; Roberts, III, Roswell R., High bandwidth broadcast system having localized multicast access to broadcast content.
  107. Donahue, Paul W.; Dankworth, Jeffrey A.; Hinderks, Larry W.; Fish, Laurence A.; Lerner, Ian A.; Ballister, Thomas C.; Roberts, III, Roswell R., High bandwidth broadcast system having localized multicast access to broadcast content.
  108. Paul W. Donahue ; Jeffrey A. Dankworth ; Larry W. Hinderks ; Laurence A. Fish ; Ian A. Lerner ; Thomas C. Ballister ; Roswell R. Roberts, III, High bandwidth broadcast system having localized multicast access to broadcast content.
  109. Mark E. Millet ; Chi-Shing Ng, IP network for accomodating mobile users with incompatible network addressing.
  110. Millet, Mark E.; Ng, Chi-Shing, IP network for accomodating mobile users with incompatible network addressing.
  111. Klinefelter, Gary M.; Platner, Thomas C.; Schuler, Joseph F.; Gershenovich, Leon; Kaiser, David W.; Holland, Gary R., Identification card manufacturing security.
  112. Klinefelter,Gary M.; Platner,Thomas C.; Schuler,Joseph F.; Gershenovich,Leon; Kaiser,David W.; Holland,Gary R., Identification card manufacturing security.
  113. Holland,Gary R.; Fontanella, Jr.,David A.; Zappe,Thomas A.; Oeltjenbruns,Mark D.; Lohman,Steve P.; Wright,Joseph M.; Klinefelter,Gary M.; Sasse,Jeffrey J.; Lukaskawcez,Stacy W.; Platner,Thomas C.; Ibs,Jon J., Identification card manufacturing system supply ordering and diagnostic report.
  114. Lenz,Gary A.; Innes,Robert J., Identification card printer with client/server.
  115. Wu,Xiaoguang; Chen,Yang; Huang,Yejun; Ma,Huateng; Zeng,Liqing, Instant messaging system and method.
  116. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  117. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  118. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  119. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  120. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  121. Chun, Jon Andre; Hui Hsu, Stephen Dao; Hormuzdiar, James Noshir, Intelligent secure data manipulation apparatus and method.
  122. Aggarwal, Sudhanshu M.; Beebee, Peter L.; Surati, Rajeev; Wong, Leon C.W.; Calsyn, Martin R., Inter-enterprise messaging system using bridgehead servers.
  123. Sudhanshu M. Aggarwal ; Peter L. Beebee ; Rajeev Surati ; Leon C. W. Wong ; Martin R. Calsyn, Inter-enterprise messaging system using bridgehead servers.
  124. Hall Phillip Earl ; Harris Jeffrey Martin ; Woodward Ernest Earl ; Borgstahl Ronald W., Interactive appliance security system and method.
  125. Ellis,Frampton E., Internal firewall for a personal computer to deny access by a network to a user's secure portion.
  126. Ellis, III, Frampton E., Internal hardware firewalls for microchips.
  127. Gampper, James Michael, Internet data access acknowledgment applet and method.
  128. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  129. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  130. Borella, Michael S.; Beser, Nurettin B.; Sidhu, Ikhlaq S.; Schuster, Guido M., Internet telephony using network address translation.
  131. Borella, Michael S.; Beser, Nurettin B.; Sidhu, Ikhlaq S.; Schuster, Guido M., Internet telephony using network address translation.
  132. Levesque Roger H. ; Kraemer Jeffrey A. ; Nadkarni Ashok P., Key management for network communication.
  133. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  134. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  135. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Lifestyle multimedia security system.
  136. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  137. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  138. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  139. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  140. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  141. Naidoo,Surendra N.; Glasgow,William P.; Feldkamp,Gregory E., Lifestyle multimedia security system.
  142. Blair Steven Cameron ; Hassinger Sebastian ; Hurley ; II William W. ; Smith William Meyer ; Turek John J. E., Lightweight authentication system and method for validating a server access request.
  143. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Logical access block processing protocol for transparent secure file storage.
  144. Shaio, Sami; Hoff, Arthur Van, Maintaining packet security in a computer network.
  145. Ekers,John E.; Klinefelter,Gary M.; Fontanella,David A., Managed credential issuance.
  146. Ellis, John R.; Gifford, David K.; Treese, G. Winfield, Managing transfers of information in a communications network.
  147. Ellis, John R.; Gifford, David K.; Treese, G. Winfield, Managing transfers of information in a communications network.
  148. Ellis,John R.; Gifford,David K.; Treese,G. Winfield, Managing transfers of information in a communications network.
  149. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  150. Andersen David B. (16520 SW. Hillsboro Hwy. Hillsboro OR 97123) Tai Tsung-Yuan Charles (2496 NW. 141st Pl. Portland OR 97229), Mechanisms for accessing unique features of telephony networks from a protocol-Independent data transport interface.
  151. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  152. Klinefelter,Gary M.; Karst,Karl A., Method and Device for forming an ink-receptive card substrate.
  153. Schmidt Jonathan ; Donzis Lewis ; Donzis Henry ; Murphy John ; Baron Peter, Method and apparatus for communicating between a network workstation and an internet.
  154. Jeffrey C. Smith ; Jean-Christophe Bandini ; Randy Shoup, Method and apparatus for delivering documents over an electronic network.
  155. Aggarwal Ajay (Somersworth NH) Scott Walter (Salem NH) Rustici Eric (Londonderry NH) Bucciero David (Nashua NH) Haskins Andrew (Lee NH) Matthews Wallace (Exeter NH), Method and apparatus for determining a communications path between two nodes in an Internet Protocol (IP) network.
  156. Duncan,Robert J.; Lavian,Tal I., Method and apparatus for dynamically loading and managing software services on a network device.
  157. Smith Jeffrey C., Method and apparatus for effecting secure document format conversion.
  158. Volpano, Dennis Michael, Method and apparatus for local area networks.
  159. Volpano, Dennis Michael, Method and apparatus for local area networks.
  160. Montulli, Lou, Method and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes.
  161. Baldwin Wayne Ross ; Christensen Carol Sue ; Foster Robert Kimberlin ; Gaitatzes Athanasios ; Naik Sharad Janardhan ; Talbot Richard Dennis, Method and apparatus for network security in browser based interfaces.
  162. Kapoor, Rupesh, Method and apparatus for providing an internet protocol address with a domain name server.
  163. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  164. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by filtering information.
  165. Bellovin Steven Michael ; Cheswick William Roberts, Method and apparatus for restricting access to private information in domain name systems by redirecting query requests.
  166. Makansi, Tarek; Gampper, James Michael, Method and apparatus for transmitting messages.
  167. Marlatt,David A.; Abjanic,John B., Method and apparatus for validating documents based on a validation template.
  168. Borella,Michael S.; Beser,Nurettin B., Method and application programming interface for assigning multiple network addresses.
  169. Jain, Mudita; Koister, Jari; Boyle, Charles; Hayes, Brian, Method and device utilizing polymorphic data in E-commerce.
  170. Borella, Michael S.; Grabelsky, David; Sidhu, Ikhlaq; Petry, Brian D., Method and protocol for distributed network address translation.
  171. Michael S. Borella ; David Grabelsky ; Ikhlaq Sidhu ; Brian D. Petry, Method and protocol for distributed network address translation.
  172. Borella, Michael S.; Grabelsky, David, Method and system for address server redirection for multiple address networks.
  173. Borella, Michael S.; Beser, Nurettin B.; Grabelsky, David, Method and system for allocating persistent private network addresses between private networks.
  174. Jeffrey C. Smith ; Jean-Christophe Bandini, Method and system for binary data firewall delivery.
  175. Godwin,Debbie Ann, Method and system for checking the security on a distributed computing environment.
  176. Borella,Michael S.; Jaszewski,Gary; Nessett,Danny M., Method and system for controlling attacks on distributed network address translation enabled networks.
  177. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Method and system for counting web access requests.
  178. Borella, Michael S.; Grabelsky, David, Method and system for distributed generation of unique random numbers for digital tokens.
  179. Borella, Michael S.; Grabelsky, David; Mahler, Jerry; Sidhu, Ikhlaq, Method and system for distributed network address translation for mobile network devices.
  180. Grabelsky,David; Borella,Michael S.; Sidhu,Ikhlaq; Nessett,Danny M., Method and system for distributed network address translation with network security features.
  181. Borella, Michael S.; Grabelsky, David, Method and system for dual-network address utilization.
  182. Smith Jeffrey C. ; Bandini Jean-Christophe, Method and system for dynamic server document encryption.
  183. Nielsen Jakob, Method and system for escrowed backup of hotelled world wide web sites.
  184. Nielsen, Jakob, Method and system for escrowed backup of hotelled world wide web sites.
  185. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Method and system for establishing a security perimeter in computer networks.
  186. Jardin, Cary A., Method and system for establishing secure communication over computer networks.
  187. Nessett Danny M. ; Grabelsky David ; Borella Michael S. ; Sidhu Ikhlaq S., Method and system for locating network services with distributed network address translation.
  188. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  189. Malan, Gerald R.; Jahanian, Farnam, Method and system for profiling network flows at a measurement point within a computer network.
  190. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  191. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  192. Cain Michael Eugene, Method and system for providing secured access to a server connected to a private computer network.
  193. Slavin, Sean; Cook, Jay S.; El-Sabaaly, Hatem K., Method and system for remote control of a local system.
  194. Slavin,Sean; Cook,Jay S.; El Sabaaly,Hatem K., Method and system for remote control of a local system.
  195. Goldman Jonathan (Menlo Park CA) Saperstein Garry (Sunnyvale CA), Method and system for user authorization over a multi-user computer system.
  196. Grabelsky,David A.; Borella,Michael S.; Poplett,John; Dynarski,Richard J., Method for address mapping in a network access system and a network access device for use therewith.
  197. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  198. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  199. Beser, Nurettin B.; Borella, Michael, Method for encapsulating and transmitting a message includes private and forwarding network addresses with payload to an end of a tunneling association.
  200. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  201. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  202. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  203. Kapoor Rupesh, Method for providing an internet protocol address with a domain name server.
  204. Anderson Mark Stephen,AUX ; Yesberg John Desborough,AUX ; Pope Michael,AUX ; Nayda Lisa,AUX ; Hayman Ken,AUX ; Beahan Brendan,AUX, Method for providing message document security by deleting predetermined header portions and attaching predetermined hea.
  205. Hardman Neil R.,GBX ; Hopkins Alan J. ; Kesterson Hoyt L. ; Millington Steven A.,GBX ; Nugent Robert F.,GBX, Method for reducing message translation and traffic through intermediate applications and systems in an internet application.
  206. Chan Nai Tiong SG, Method for security partitioning of a computer system.
  207. Borella,Michael S.; Joseph,Boby; Grabelsky,David A., Method for supporting secondary address delivery on remote access servers.
  208. Toga James E., Method for transferring data between a network of computers dynamically based on tag information.
  209. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for transparently managing outbound traffic from an internal user of a private network destined for a public network.
  210. Deac, Cornelius, Method of allocating computer addresses to units of a system for running an industrial installation.
  211. Felger, David, Method of billing a purchase made over a computer network.
  212. Felger, David, Method of billing a purchase made over a computer network.
  213. Felger, David, Method of billing a purchase made over a computer network.
  214. Ellis, Frampton E., Method of securely controlling through one or more separate private networks an internet-connected computer having one or more hardware-based inner firewalls or access barriers.
  215. Ellis, Frampton E., Method of using one or more secure private networks to actively configure the hardware of a computer or microchip.
  216. Coss,Michael John; Majette,David L.; Sharp,Ronald L., Methods and apparatus for a computer network firewall with multiple domain support.
  217. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  218. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  219. Katseff Howard Paul ; Robinson Bethany Scott, Methods and apparatus for providing improved quality of packet transmission in applications such as internet telephony.
  220. Katseff Howard Paul ; Robinson Bethany Scott, Methods and apparatus for providing improved quality of packet transmission in applications such as internet telephony.
  221. Katseff Howard Paul ; Robinson Bethany Scott, Methods and apparatus for providing improved quality of packet transmission in applications such as internet telephony.
  222. Balabine, Igor, Methods and apparatus for securing access to a computer.
  223. Li, Wei, Methods and devices for detecting an IP address.
  224. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  225. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  226. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  227. Aggarwal Sudhanshu M. ; Beebee Peter L. ; Surati Rajeev ; Wong Leon C. W. ; Calsyn Martin R., Methods and systems for message forwarding and property notifications using electronic subscriptions.
  228. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security for ad hoc networked computerized devices.
  229. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  230. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods of operating a portable communications device with enhanced security.
  231. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  232. Ellis, Frampton E., Methods of securely controlling through one or more separate private networks an internet-connected computer having one or more hardware-based inner firewalls or access barriers.
  233. Ellis, Frampton E., Microchip with faraday cages and internal flexibility sipes.
  234. Ellis, Frampton E, Microchips with an internal hardware firewall.
  235. Ellis, III, Frampton E., Microchips with an internal hardware firewall protected portion and a network portion with microprocessors which execute shared processing operations with the network.
  236. Ellis, III, Frampton E., Microchips with an internal hardware firewall that by its location leaves unprotected microprocessors or processing units which performs processing with a network.
  237. Ellis, Frampton E, Microchips with inner firewalls, faraday cages, and/or photovoltaic cells.
  238. Ellis, Frampton E., Microchips with multiple internal hardware-based firewalls and dies.
  239. Holden, James M.; Levin, Stephen E.; Snow, David W.; Snow, legal representative, Mary; Wrench, Edwin H., Mixed enclave operation in a computer network.
  240. Watanuki, Tatsuya; Oura, Tetsuo; Sawada, Sunao, Mobile node, mobile agent and network system.
  241. Watanuki,Tatsuya; Oura,Tetsuo; Sawada,Sunao, Mobile node, mobile agent and network system.
  242. Monahan, Brian Quentin; Baldwin, Adrian John; Shiu, Simon Kai-Ying, Modelling network to assess security properties.
  243. Rodriguez, Juan O.; Berman, David J.; Lakin, James D., Modular data communication equipment system.
  244. Knowlson Kenneth L., Monitor network bindings for computer security.
  245. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  246. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  247. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  248. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  249. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  250. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  251. Reed Benjamin Clay ; Welch Steven R., Network address assignment using physical address resolution protocols.
  252. Kitai, Katsuyoshi; Masuoka, Yoshimasa; Yoshizawa, Satoshi; Maciel, Frederico Buchholz; Tarui, Toshiaki; Higuchi, Tatsuo; Murahashi, Hideki, Network data communication system.
  253. Nair, Suresh; Gilson, Michael J., Network interface for industrial controller providing application programmer interface.
  254. Friedman Aharon ; Bozoki Eva, Network security device.
  255. Dascalu Ziv,ILX, Network session wall passively listening to communication session, with use of access rules, stops further communication.
  256. Radatti, Peter V.; Harding, David J., Network traffic intercepting method and system.
  257. Wagner, Richard Hiers, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
  258. Wagner, Richard Hiers, Open network system and method for I/O operations with non-standard I/O devices using an extended open network protocol.
  259. Goodwin,James; Meza,Joseph; Zalatimo,David, Optimizations for tunneling between a bus and a network.
  260. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  261. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  262. Plassmann, Ernst Robert; Ault, Michael Bradford; Rosiles, Mickella Ann; Shi, Shaw-Ben; Shrader, Theodore Jack London; Rich, Bruce Arland, Passing environment variables from an hypertext protocol server application programming interface.
  263. Schaefer,Robert G.; Wardhan,Harsh, Performance path method and apparatus for exchanging data among systems using different data formats.
  264. Ellis, III, Frampton E., Personal and server computers having microchips with multiple processing units and internal firewalls.
  265. Policard, Claude M, Personal computer having a master computer system and an internet computer system and monitoring a condition of said master and internet computer systems.
  266. Ellis Frampton E., Personal computer microprocessor firewalls for internet distributed processing.
  267. Ellis, Frampton E., Personal computer, smartphone, tablet, or server with a buffer zone without circuitry forming a boundary separating zones with circuitry.
  268. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable communications device with enhanced security.
  269. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Portable computerized device with network security.
  270. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  271. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  272. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  273. Smith Jeffrey C. ; Bandini Jean-Christophe, Private, trackable URLs for directed document delivery.
  274. Borella Michael S. ; Schuster Guido M. ; Mahler Jerry J. ; Sidhu Ikhlaq, Protocol and method for peer network device discovery.
  275. Volpano, Dennis Michael, Public access point.
  276. Volpano, Dennis Michael, Public access point.
  277. Todd, Stephen James Paul; Ayres, Malcolm David; Holloway, Timothy Nicholas; Holdsworth, Simon Anthony James; Schmidt, Marc-Thomas; Taylor, Michael George, Publish/subscribe data processing with subscription points for customized message processing.
  278. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  279. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  280. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  281. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  282. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  283. Abjanic, John B.; Marlatt, David A.; Malo, John A., Scalable network apparatus for content based switching or validation acceleration.
  284. Abjanic, John B.; Marlatt, David A.; Malo, John A., Scalable network apparatus for content based switching or validation acceleration.
  285. Abjanic, John B.; Marlatt, David A.; Malo, Jr., John A., Scalable network apparatus for content based switching or validation acceleration.
  286. Abjanic, John B.; Marlatt, David A.; Malo, Jr., John A., Scalable network apparatus for content based switching or validation acceleration.
  287. Ruetschi,Johannes; Blohm,Jeffrey, Screen saver displaying identity content.
  288. R. Brent Johnson, Secure electronic mail system.
  289. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure file system server architecture and methods.
  290. Pham,Duc; Nguyen,Tien Le; Zhang,Pu Paul; Lo,Mingchen, Secure file system server architecture and methods.
  291. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  292. Subramaniam Anand ; Ebrahimi Hashem M., Secure intranet access.
  293. Subramaniam, Anand; Ebrahimi, Hashem M, Secure intranet access.
  294. Cianfrocca Francis ; Sohn Adam H., Secure middleware and server control system for querying through a network firewall.
  295. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access controller implementing access control and auditing.
  296. McManis Charles E., Secure network protocol system and method.
  297. McManis Charles E. (Sunnyvale CA), Secure network protocol system and method.
  298. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  299. Hart ; Jr. Edward C. ; Kiernan Casey Lang ; Rajarajan Vij, Secure remote access computing system.
  300. Eastvold, Roger, Secure remote diagnostic customer support network.
  301. Green Michael W. ; Jensen Andrew W., Secure server utilizing separate protocol stacks.
  302. Elgamal Taher ; Hickman Kipp E.B., Secure socket layer application program apparatus and method.
  303. Birrell Andrew D. ; Wobber Edward P. ; Abadi Martin ; Stata Raymond P., Secure web tunnel.
  304. Yarborough,William Jordan, Secured FTP architecture.
  305. Nehowig, Kelly R.; Gale, David T.; Fischer, Lisa A.; Platfoot, Keith A.; Ekers, John E.; Zappe, Thomas A., Securely processing and tracking consumable supplies and consumable material.
  306. Kuroda Yasutsugu,JPX, Security level control apparatus and method for a network securing communications between parties without presetting th.
  307. Naidoo, Surendra N.; Glasgow, William P., Security system.
  308. Naidoo, Surendra N.; Glasgow, William P., Security system.
  309. Mayes John C. ; Coile Brantley W., Security system for network address translation systems.
  310. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  311. Mayes, John C.; Coile, Brantley W., Security system for network address translation systems.
  312. Mayes,John C.; Coile,Brantley W., Security system for network address translation systems.
  313. Dawes, Paul J., Security system with networked touchscreen and gateway.
  314. Smith, Jeffrey C.; Bandini, Jean-Christophe, Sender driven certification enrollment system.
  315. Kostreski Bruce ; Schneider Allan, Simulcasting digital video programs for broadcast and interactive services.
  316. Kostreski Bruce ; Schneider Allan, Simulcasting digital video programs for broadcast and interactive services.
  317. Huggins Frank ; Azpiazu Aurelio, Single computer system having multiple security levels.
  318. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  319. Frey Ernest J. ; Petty Norman W. ; Spencer Douglas A., Switch distribution via an intermediary switching network.
  320. Boden, Edward B.; Brzozowski, Wesley A.; Gruber, Franklin A.; Palermo, Donald A.; Williams, Michael D., System and method for IP network address translation using selective masquerade.
  321. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  322. Gooderum Mark P. ; Vu Trinh Q. ; Andreas Glenn, System and method for achieving network separation.
  323. Keorkunian,Gary S.; Hirst,Steven B.; Waldron,Melodie, System and method for anonymous observation and use of premium content by indirect access through portal.
  324. Pagan, Florence C. I.; Short, Joel E., System and method for authorizing a portable communication device.
  325. Coile, Brantley W., System and method for content management over network storage devices.
  326. Coile,Brantley W., System and method for content management over network storage devices.
  327. Leonardo C. Massarani, System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks.
  328. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  329. Pierce Edward Brockman ; Lisan Lin, System and method for correlating transaction messages in a communications network.
  330. Reynolds, James Andrew; Desch, Philip; Burley, Brett; Ward, Gene; Kenny, Joe; Howland, Michael; Howland, Christopher Allen, System and method for electronic secure geo-location obscurity network.
  331. Wagner, Richard Hiers, System and method for enabling transactions between a web server and a smart card, telephone, or personal digital assistant over the internet.
  332. Wagner, Richard Hiers, System and method for enabling transactions between a web server and an automated teller machine over the internet.
  333. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  334. Short, Joel E.; Kleinrock, Leonard, System and method for establishing network connection.
  335. Huang, Dehua; Sweeney, Adam J.; Sudame, Pradeep S.; Dobrota, Silviu; Jonnala, Premkumar, System and method for filtering network traffic.
  336. Huang, Dehua; Sweeney, Adam J.; Sudame, Pradeep S.; Dobrota, Silviu; Jonnala, Premkumar, System and method for filtering network traffic.
  337. Brockman, Pierce Edward; Patterson, Timothy K.; Kalyanpur, Guarang S., System and method for generating quality of service statistics for an international communications network.
  338. Andrew Flint CA; Irving Reid CA; Gene Amdur CA, System and method for implementing a security policy.
  339. Huang,Dehua; Sweeney,Adam J.; Johnson,Richard A.; Dobrota,Silviu, System and method for maintaining protocol status information in a network device.
  340. Brockman, Pierce Edward; Lin, Lisan; Ramirez, Emil Alfred Baenz, System and method for mass call onset detection in a communications network.
  341. Gaurang S. Kalyanpur ; Chad Daniel Harper ; Grant Michael Brehm ; Chunchun Jonina Chan, System and method for monitoring service quality in a communications network.
  342. Gerald Ray Lawson ; Chad Daniel Harper ; Grant Michael Brehm ; Gaurang S. Kalyanpur, System and method for monitoring service quality in a communications network.
  343. Boden,Edward B.; Gruber,Franklin A., System and method for network address translation integration with IP Security.
  344. Boden, Edward B.; Gruber, Franklin A., System and method for network address translation integration with IP security.
  345. Boden, Edward B.; Monroe, Tod A., System and method for network address translation integration with IP security.
  346. Boden,Edward B.; Melville,Mark J.; Monroe,Tod A.; Paxhia,Frank V., System and method for network address translation integration with IP security.
  347. Orlando, Robert J.; Simon, Scott; Hope, Jr., Gordon G.; Tallini, Damian J; Goklevent, Metin L.; Marino, Francis C, System and method for panel linking in a security system.
  348. Stephenson, Mark M.; Walters, Steven A., System and method for projecting content beyond firewalls.
  349. Stephenson, Mark M.; Walters, Steven A., System and method for projecting content beyond firewalls.
  350. Gabber Eran ; Gibbons Phillip P. ; Matias Yossi ; Mayer Alain J., System and method for providing anonymous personalized browsing by a proxy system in a network.
  351. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  352. Boebert, William E.; Rogers, Clyde O.; Andreas, Glenn; Hammond, Scott W.; Gooderum, Mark P., System and method for providing secure internetwork services via an assured pipeline.
  353. Boebert,William E.; Rogers,Clyde O.; Andreas,Glenn; Hammond,Scott W.; Gooderum,Mark P., System and method for providing secure internetwork services via an assured pipeline.
  354. Rony Zarom IL, System and method for rapid wireless application protocol translation.
  355. Applegate John ; Romatoski Jeff, System and method for redirecting network traffic to provide secure communication.
  356. Jakstadt, Eric G.; Waterston, Michael L.; Badari, Vasantha; Pfost, Jarrod E., System and method for secure third-party development and hosting within a financial services network.
  357. Jakstadt, Eric G.; Waterston, Michael L.; Badari, Vasantha; Pfost, Jarrod E., System and method for secure third-party development and hosting within a financial services network.
  358. Wagner, Richard Hiers, System and method for transacting communication over an open network.
  359. Johnson,R. Brent, System and method for virtual tape management with remote archival and retrieval via an encrypted validation communication protocol.
  360. Dascalu, Ziv, System and method of controlling communication sessions.
  361. Stockwell Edward B. ; Greve Paula Budig, System and method of electronic mail filtering using interconnected nodes.
  362. Dunn James M. ; Ganek Alan G. ; Stern Edith H. ; Willner Barry E., System and method of operation for providing user's security on-demand over insecure networks.
  363. de los Reyes, Gustavo; Macwan, Sanjay; Morovitz, Jennifer, System and method of problem detection in received Internet data, video data, and voice data.
  364. de los Reyes, Gustavo; Macwan, Sanjay; Morovitz, Jennifer, System and method of problem detection in received internet data, video data, and voice data.
  365. Booth, III, Earl Hardin; Lingafelt, Charles Steven; Nguyen, Phuong Thanh; Temoshenko, Leo; Wang, Xiaogang, System and method to monitor and determine if an active IPSec tunnel has become disabled.
  366. Nurettin B. Beser ; Michael Borella, System and method to negotiate private network addresses for initiating tunneling associations through private and/or public networks.
  367. Booth, III, Earl Hardin; Lingafelt, Charles Steven; Nguyen, Phuong Thanh; Temoshenko, Leo; Wang, Xiaogang, System and method to verify availability of a back-up secure tunnel.
  368. Allegre Fran.cedilla.ois,FRX ; Campana Mireille,FRX ; Roy Jean-Michel,FRX, System for control of access to computer machines which are connected in a private network.
  369. Baker, Lara H.; Bailey, David J., System for controlling movement of information using an information diode between a source network and a destination network.
  370. Wagner, Richard Hiers, System for enabling smart card transactions to occur over the internet and associated method.
  371. Aggarwal Sudhanshu ; Beebee Peter ; Koniaris Kleanthes ; Surati Rajeev, System for immediate popup messaging across the internet.
  372. Baehr Geoffrey G. ; Danielson William ; Lyon Thomas L. ; Mulligan Geoffrey ; Patterson Martin,FRX ; Scott Glenn C. ; Turbyfill Carolyn, System for packet filtering of data packet at a computer network interface.
  373. Baehr Geoffrey G. ; Danielson William ; Lyon Thomas L. ; Mulligan Geoffrey ; Patterson Martin,FRX ; Scott Glenn C. ; Turbyfill Carolyn, System for packet filtering of data packets at a computer network interface.
  374. Kazuhira Tanno JP, System for performing remote operation between firewall-equipped networks or devices.
  375. Boebert William E. ; Rogers Clyde O. ; Andreas Glenn ; Hammond Scott W. ; Gooderum Mark P., System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting.
  376. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, System for providing security for ad hoc networked computerized devices.
  377. Brown Gary S., System for remote pass-phase authentication.
  378. Brown Gary S., System for remote pass-phrase authentication.
  379. Gary S. Brown, System for remote pass-phrase authentication.
  380. Chen Eva Y. ; Ro Jonny T.,TWX ; Deng Ming M.,TWX ; Chi Leta M.,TWX, System, apparatus and method for the detection and removal of viruses in macros.
  381. Johnson R. Brent, System, method and article of manufacture to enhance computerized alert system information awareness and facilitate real-time intervention services.
  382. Johnson, R. Brent, System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol.
  383. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  384. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  385. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  386. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  387. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  388. Pagan, Florence C. I.; Short, Joel E., Systems and methods for authorizing, authenticating and accounting users having transparent computer access to a network using a gateway device.
  389. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  390. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  391. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for controlling user perceived connection speed.
  392. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  393. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  394. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  395. Judge, Paul, Systems and methods for message threat management.
  396. Judge, Paul, Systems and methods for message threat management.
  397. Judge, Paul, Systems and methods for message threat management.
  398. Judge, Paul, Systems and methods for message threat management.
  399. Judge,Paul, Systems and methods for message threat management.
  400. Judge,Paul, Systems and methods for message threat management.
  401. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  402. Short, Joel E.; Jacquet-Pagan, Florence; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  403. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing content and services on a network system.
  404. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  405. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  406. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  407. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Josh J., Systems and methods for providing content and services on a network system.
  408. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  409. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  410. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  411. Short, Joel E.; Pagan, Florence C. I.; Goldstein, Joshua J., Systems and methods for providing content and services on a network system.
  412. Short, Joel E; Pagan, Florence C. I.; Goldstein, Josh J, Systems and methods for providing dynamic network authorization, authentication and accounting.
  413. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  414. Judge,Paul, Systems and methods for upstream threat pushback.
  415. Short, Joel E.; Ewan, Ray S.; Sorcsek, Jerome, Systems and methods of communicating using XML.
  416. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  417. Ebrahimi, Hashem M.; Carter, Stephen R; Oyler, Mel J, Techniques for managing secure communications.
  418. Ebrahimi, Hashem Mohammad; Ackerman, Mark D.; Oyler, Mel J, Techniques for securely managing and accelerating data delivery.
  419. Brockman Pierce Edward ; Lawson Gerald Ray ; Zamir Tanveer ; Kalyanpur Gaurang S., Transaction control application part (TCAP) call detail record generation in a communications network.
  420. Kirby Alan J. ; Kraemer Jeffrey A. ; Nadkarni Ashok P., Transferring encrypted packets over a public network.
  421. Ellis,John R.; Gifford,David K.; Treese,G. Winfield, Transfers of information in a communications network.
  422. Templin Fred L. ; Gupta Ajay ; Skinner Gregory D. ; Tynan Dermot Matthew,IEX, Transparent and secure network gateway.
  423. Hammond Scott ; Young Jeffery ; Stockwell Edward B., Transparent security proxy for unreliable message exchange protocols.
  424. Reed Mark Joseph ; Arnovitz David A. ; Watt Charles ; Jacobs William Reese, Trusted gateway agent for web server programs.
  425. Luckenbaugh Gary L. ; Stoakes Forrest E., Trusted services broker for web page fine-grained security labeling.
  426. Ben Dor,Avner; Goodwin,James; Meza,Joseph; Young,Mark S.; Zalatimo,David, Tunneling between a bus and a network.
  427. Arendt James Wendell ; Manikundalam Ravindranath Kasinath ; Phelan James Michael, User level control of degree of client-side processing.
  428. Boyle John ; Holden James M. ; Levin Stephen E. ; Maiwald Eric S. ; Nickel James O. ; Snow ; deceased David Wayne ; Wrench ; Jr. Edwin H., Using trusted associations to establish trust in a computer network.
  429. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security system.
  430. Naidoo, Surendra N.; Glasgow, William P.; Feldkamp, Gregory E., Video security systems and methods.
  431. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  432. Kramer Glenn A. ; Weber Jay C., Virtual point of sale processing using gateway-initiated messages.
  433. Paulsen Gaige B. ; Walker Amanda, Virtual private network system and method.
  434. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen J.; Payne, Andrew C.; Treese, George W., Web advertising method.
  435. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  436. Shrader Theodore Jack London, Web-based administration of IP tunneling on internet firewalls.
  437. Wewalaarachchi, Bandu; Gunasingham, Hari; Sanjeewa, Lakshita; Sanjaya, Viraj, Webserver alternative for increased security.
  438. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트